Dominion KX II User Guide Release 2.0.5 Copyright © 2007 Raritan, Inc.
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc. © Copyright 2007 Raritan, Inc., CommandCenter®, Dominion®, Paragon® and the Raritan company logo are trademarks or registered trademarks of Raritan Computer, Inc. All rights reserved. Java® is a registered trademark of Sun Microsystems, Inc.
Contents Chapter 1 Introduction 1 Dominion KX II Overview ....................................................................................................................... 2 Virtual Media ............................................................................................................................................. 3 Product Photos...........................................................................................................................................
Contents IBM AIX 5.3 Settings .................................................................................................................... 26 Make UNIX Settings Permanent ................................................................................................ 27 Apple Macintosh Settings ........................................................................................................... 27 Step 2 (Optional): Configure Keyboard Language .................................................
Contents Discover Devices - KX Subnet .................................................................................................... 55 Add New Favorite ....................................................................................................................... 56 Chapter 5 Accessing Target Servers 57 Port Access Page...................................................................................................................................... 58 Connecting to a Target Server ....
Contents Virtual Media ........................................................................................................................................... 84 Tools Menu............................................................................................................................................... 84 Options .......................................................................................................................................... 84 View Menu ............................
Contents Chapter 9 Device Management 121 Device Management Menu .................................................................................................................. 121 Network Settings ................................................................................................................................... 122 Network Basic Settings.............................................................................................................. 123 Network Miscellaneous Settings......
Contents IP Access Control................................................................................................................................... 153 Chapter 11 Maintenance 156 Maintenance Menu................................................................................................................................ 156 Maintenance Features (Local/Remote Console) ................................................................................ 156 Audit Log................................
Contents Chapter 14 CC Unmanage 187 Overview ................................................................................................................................................ 187 Removing Dominion KX II from CC-SG Management.................................................................... 188 Appendix A Specifications 190 Environmental Requirements..............................................................................................................
Contents Macintosh Keyboard ............................................................................................................................. 208 Mouse Pointer Synchronization (Fedora) .......................................................................................... 208 Resolving Fedora Core Focus .............................................................................................................. 209 SUSE/VESA Video Modes.......................................................
Table of Figures Figure 1: Dominion KX II Configuration ........................................................................................ 2 Figure 2: Dominion KX2-116.............................................................................................................. 3 Figure 3: Dominion KX2-432.............................................................................................................. 4 Figure 4: Dominion KX II CIMs: D2CIM-VUSB (left); D2CIM-PWR (right) ...................
Table of Figures Figure 38: Map Virtual Media CD/ISO Image.............................................................................. 94 Figure 39: File Server Setup ............................................................................................................. 96 Figure 40: User List ............................................................................................................................ 99 Figure 41: User Page............................................................
Table of Figures Figure 80: Reboot Confirmation.................................................................................................... 166 Figure 81: Network Interface ......................................................................................................... 168 Figure 82: Network Statistics (statistics)...................................................................................... 169 Figure 83: Network Statistics (interfaces).............................................
Chapter 1 Introduction In This Chapter Dominion KX II Overview................................................................................2 Virtual Media .....................................................................................................3 Product Photos ...................................................................................................3 Product Features ................................................................................................4 Terminology ......
Dominion KX II Overview Dominion KX II Overview Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access, and control of up to 64 servers from anywhere in the world via Web browser. At the rack, Dominion KX II provides BIOS-level control of up to 64 servers and other IT devices from a single keyboard, monitor, and mouse.
Chapter 1: Introduction Virtual Media All Dominion KX II models support virtual media. The benefits of virtual media - mounting of remote drives/media on the target server to support software installation, and diagnostics - are now available in all of the Dominion KX II models. Each Dominion KX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD, DVD, USB, internal and remote drives and images.
Product Features Figure 3: Dominion KX2-432 Figure 4: Dominion KX II CIMs: D2CIMVUSB (left); D2CIM-PWR (right) Product Features Hardware • Integrated KVM-over-IP remote access • 1U or 2U (KX2-464) rack-mountable; brackets included • Dual power supplies with failover; auto-switching power supply with power failure warning • 16, 32, or 64 (on KX2-464) server ports • Multiple user capacity (1/2/4 remote users; 1 local user) • UTP (Cat5/5e/6) server cabling • Dual Ethernet ports (10/100/1000 LAN
Chapter 1: Introduction One front and three back panel USB 2.
Terminology Terminology This manual uses the following terminology for the components of a typical Dominion KX II configuration: Figure 5: Terminology and Topology 6 Remote PC (client) Networked computers used to access and control target servers connected to the Dominion KX II. Refer to Supported Operating Systems (Clients) (on page 10) for a list of the Operating Systems supported by Dominion KX II remotely.
Chapter 1: Introduction Package Contents Each Dominion KX II ships as a fully-configured stand-alone product in a standard 1U (2U for KX2-464) 19" rackmount chassis.
User Guide Organization of Information The user guide is organized as follows: 8 • Chapter 1, Introduction. Overview, features, terminology, and package contents • Chapter 2, Getting Started. Login information; default IP Address; supported operating systems, browsers, and CIMs • Chapter 3, Installation and Configuration.
Chapter 1: Introduction • Appendix D, FAQs. General questions, remote access, universal virtual media, Ethernet and IP networking, servers, installation, local port, power control, scalability, Computer Interface Modules (CIMs), security, manageability, miscellaneous, and troubleshooting Related Documentation For more information about the Raritan Multi-Platform Client (MPC), refer to the Raritan Multi-Platform Client (MPC) and Raritan Remote Client (RRC) User Guide.
Getting Started Chapter 2 In This Chapter Login Information............................................................................................10 Default IP Address ..........................................................................................10 Supported Operating Systems (Clients) .......................................................10 Supported Browsers ........................................................................................
Chapter 2: Getting Started Red Hat Linux 9.0 Yes; Locally held ISO image, Remote File Server mounting directly from KX Red Hat Enterprise Workstation 3.0 and 4.0 Yes; Locally held ISO image, Remote File Server mounting directly from KX SUSE Linux Professional 9.
Supported Operating Systems and CIMs (Target Servers) Supported Operating Systems and CIMs (Target Servers) In addition to the new Dominion KX II D2CIMs, most Paragon® and Dominion KX I CIMs are supported. The following table displays the supported target server operating systems, CIMs, virtual media, and mouse modes: Note: D2CIM-VUSB is not supported on Sun (Solaris) targets.
Chapter 2: Getting Started Mac OS All Solaris OSs supported in Dominion KX I P2CIM-AUSB DCIM-USB UUSBPD DCIM-USB G2 P2CIM-SUN P2CIM-SUSB IBM AIX HP UX 9 9 DCIM-SUN 9 DCIM-SUSB DCIM-USB G2 P2CIM-PS2 DCIM-USB P2CIM-AUSB DCIM-USB G2 UUSBPD DCIM-PS2 P2CIM-PS2 DCIM-USB P2CIM-AUSB DCIM-USB G2 UUSBPD DCIM-PS2 Remote Power Strips Serial Devices D2CIM-VUSB 9 9 D2CIM-PWR P2CIM-SER Legend: • VM: Virtual Media (D2CIM-VUSB only) • AM: Absolute Mouse Synchronization (D2CIM-VUSB only) •
Installation and Configuration Chapter 3 In This Chapter Overview...........................................................................................................14 Step 1: Configure Target Servers ...................................................................15 Step 2 (Optional): Configure Keyboard Language......................................27 Step 3: Configure Network Firewall Settings ..............................................28 Step 4: Connect the Equipment.......................
Chapter 3: Installation and Configuration Step 1: Configure Target Servers Target servers are the computers that will be accessed and controlled via the Dominion KX II. Before installing Dominion KX II, configure all target servers to ensure optimum performance. This configuration applies only to target servers, not to the client workstations (remote PCs) used to access Dominion KX II remotely. Refer to Chapter 1: Introduction, Terminology (see "Terminology" on page 6) for additional information.
Step 1: Configure Target Servers 640x480 @120 Hz 1024x768 @72 Hz 1280x1024 @75 Hz 720x400 @70 Hz 1024x768 @75 Hz 1280x1024 @85 Hz 720x400 @84 Hz 1024x768 @85 Hz 1600x1200 @60 Hz Note: Composite Sync and Sync-on-Green video require an additional adapter. Desktop Background For optimal bandwidth efficiency and video performance, target servers running graphical user interfaces such as Windows, Linux, X-Windows, Solaris, and KDE require configuration.
Chapter 3: Installation and Configuration Windows XP / Windows 2003 Settings ¾ To configure target servers running Microsoft Windows XP/2003: 1. Configure the mouse settings: a. Select Start > Control Panel > Mouse. b. Open the Pointer Options tab. In the Motion group: 2. Set the mouse motion speed setting exactly to the middle speed. Disable the Enhanced pointer precision option. Click OK. Disable transition effects: a. Select the Display option from Control Panel. b.
Step 1: Configure Target Servers Windows 2000 Settings ¾ To configure target servers running Microsoft Windows 2000: 1. Configure the mouse settings: a. Select Start > Control Panel > Mouse. b. Open the Motion tab. 2. Set the acceleration to None. Set the mouse motion speed setting exactly to the middle speed. Click OK. Disable transition effects: a. Select the Display option from Control Panel. b. Open the Effects tab. c.
Chapter 3: Installation and Configuration c. Open the Advanced tab. d. Click the Settings button in the Performance group. The Performance Options dialog opens. e. Under Custom options, clear the following checkboxes: Animation options: Animate controls and elements inside windows Animate windows when minimizing and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking f. Click OK. g. Close the Control Panel.
Step 1: Configure Target Servers a. Select Main Menu > System Settings > Display. The Display Settings dialog opens. b. From the Display tab, select a Resolution supported by Dominion KX II. c. From the Advanced tab, verify that the Refresh Rate is supported by Dominion KX II.
Chapter 3: Installation and Configuration Note: If you change video resolution, you must logout of the target server and log back in for the video settings to take effect. Note for Red Hat 9 Target Servers If you are running Red Hat 9 on the target server using a USB CIM, and are experiencing problems with the keyboard and/or mouse, there is an additional configuration setting you can try. Tip: You might have to perform these steps even after a fresh OS installation.
Step 1: Configure Target Servers Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions. 2. Configure the screen resolution: a. Select Main Menu > System Settings > Display. The Display Settings dialog opens. b. From the Settings tab, select a Resolution supported by Dominion KX II. c. Click OK. Note: If you change video resolution, you must logout of the target server and log back in for the video settings to take effect. SUSE Linux 10.
Chapter 3: Installation and Configuration Make Linux Settings Permanent Note: These steps may vary slightly depending on the specific version of Linux in use. ¾ To make your settings permanent in Linux (prompt): 1. Select Main Menu > Preferences > More Preferences > Sessions. The Sessions dialog opens. 2. Open the Session Options tab. 3. Check the Prompt on logout checkbox and click OK. This option prompts you to save your current session when you logout. 4.
Step 1: Configure Target Servers From the graphical user interface: Figure 6: Solaris Mouse Configuration With the command line: xset mouse a t (where “a” is the acceleration and “t” is the threshold.) 2. All target servers must be configured to one of the display resolutions supported by Dominion KX II.
Chapter 3: Installation and Configuration You can also contact your Raritan representative to purchase a video output adapter: If you Have: Use this Video Output Adapter: Sun 13W3 with composite sync output APSSUN II Guardian converter Sun HD15 with composite sync output 1396C converter to convert from HD15 to 13W3 and an APSSUN II Guardian converter to support composite sync Sun HD15 with separate sync output APKMSUN Guardian converter Note: Some of the standard Sun background screens may not cent
Step 1: Configure Target Servers ¾ To change POST resolution: 1. # eeprom output-device=screen:r1024x768x75 2. Logout or restart computer. Video Settings (GUI) The GUI resolution can be checked and set using different commands depending on the video card in use. Please Note that 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using. Run these commands from the command line.
Chapter 3: Installation and Configuration 3. Select Smit > Devices > Graphic Displays > Select the Display Resolution and Refresh Rate. 4. Select the video card in use. 5. Click List. A list of display modes is presented. 6. Select a resolution and refresh rate supported by the Dominion KX II. Please refer to Supported Video Resolutions for more information. Note: If you change video resolution, you must logout of the target server and log back in for the video settings to take effect.
Step 3: Configure Network Firewall Settings Change the Keyboard Layout Code (Sun Targets) Use this procedure if you are using a DCIM-SUSB and would like the keyboard layout changed to another language. ¾ To change the keyboard layout code (DCIM-SUSB only): 1. Open a Text Editor window on the Sun workstation. 2. Check that the NUM LOCK key is active and press the left CTRL key and the DEL key on your keyboard. The Caps Lock LED starts to blink, indicating that the CIM is in Layout Code Change mode.
Chapter 3: Installation and Configuration Step 4: Connect the Equipment Connect the Dominion KX II to the power supply, network, local PC, and target servers. The numbers in the diagram correspond to the sections describing the connection. Figure 7: Dominion KX II Connections 1. AC Power ¾ To connect the power supply: 1. Attach the included AC power cord to the Dominion KX II and plug into an AC power outlet. 2.
Step 4: Connect the Equipment 2. Network Ports Dominion KX II provides two Ethernet ports for failover purposes (not for load-balancing). By default, only LAN1 is active and the automatic failover is disabled. When enabled, if the Dominion KX II internal network interface or the network switch to which it is connected becomes unavailable, LAN2 will be enabled using the same IP address. ¾ To connect the network: 1.
Chapter 3: Installation and Configuration 4. Target Server Ports Dominion KX II uses standard UTP cabling (Cat5/5e/6) to connect to each target server. Refer to Appendix A: Specifications (see "Specifications" on page 190) for additional information. ¾ To connect a target server to the Dominion KX II: 1. Use the appropriate Computer Interface Module (CIM). Refer to Supported CIMs for more information about the CIMs to use with each operating system. 2.
Step 5: Dominion KX II Initial Configuration Changing the Default Password The Dominion KX II ships with a default password. The first time you start the Dominion KX II you are required to change that password. ¾ To change the default password: 1. Power ON the Dominion KX II using the power switch(es) at the back of the unit. Please wait for the Dominion KX II unit to boot. (A beep signals that the boot is complete.) 2.
Chapter 3: Installation and Configuration ) Right parenthesis ] Right bracket * Asterisk ^ Caret + Plus sign _ Underscore , Comma ` Grave accent - Dash { Left brace . Period | Pipe sign / Forward slash } Right brace < Less than sign ~ Tilde Assigning an IP Address These procedures describe how to assign an IP Address using the Network Settings page. For complete information about all of the fields and the operation of this page, refer to Network Settings (on page 122). 1.
Step 5: Dominion KX II Initial Configuration 2. Specify a meaningful Device Name for your Dominion KX II unit; up to 16 alphanumeric characters, special characters (see "Valid Special Characters" on page 32), and no spaces. 3. Select the IP auto configuration from the drop-down list: None (Static IP). This option requires that you manually specify the network parameters. This is the recommended option because the Dominion KX II is an infrastructure device and its IP Address should not change.
Chapter 3: Installation and Configuration 2. Using the KX II Local Console, select Device Settings > Port Configuration. The Port Configuration page opens: Figure 9: Port Configuration 3. Click on the Port Name of the target server you want to rename. The Port Page (see "Associate Target Servers to Outlets (Port Page)" on page 143) opens. 4. Assign a name to identify the server connected to that port.
Remote Authentication For more information, refer to Power Supply Setup Page (on page 136). Note to CC-SG Users If you are using Dominion KX II in a CC-SG configuration, perform the installation steps as outlined above, and when finished, consult the CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide to proceed (all found on Raritan's Website under Support: http://www.raritan.com/support/productdocumentation).
Chapter 3: Installation and Configuration Authentication vs. Authorization Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed. This is called authorization.
Users, Groups, and Access Permissions Note the importance of the group to which a given user belongs, as well as the need to configure the group named, “Unknown”. If the external authentication server returns a group name that is not recognized by the Dominion KX II, that user's permissions are determined by the permanent group named “Unknown”.
Chapter 3: Installation and Configuration Individual Group An individual group is essentially a “group” of one. That is, the specific user is in its own group, not affiliated with other real groups. Individual groups can be identified by the “@” in the Group Name. The individual group allows a user account to have the same rights as a group. In addition to the system-supplied default groups, you can create groups and specify the appropriate permissions to suit your needs.
Chapter 4 Connecting to the Dominion KX II In This Chapter User Interfaces..................................................................................................40 KX II Local Console: KX II Devices ...............................................................41 Dominion KX II Remote Console: Dominion KX II Devices......................42 Multi-Platform Client (MPC): KX I and Dominion KX II Devices ............43 Raritan Remote Client (RRC): KX I Devices Only .................................
Chapter 4: Connecting to the Dominion KX II KX II Local Console: KX II Devices When you are located at the server rack, Dominion KX II provides standard KVM switching and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers; the performance is exactly as if you were directly connected to the server's keyboard, mouse, and video ports.
Dominion KX II Remote Console: Dominion KX II Devices Dominion KX II Remote Console: Dominion KX II Devices The Dominion KX II Remote Console is a browser-based graphical user interface that allows you to access target servers connected to the Dominion KX II and to remotely administer the Dominion KX II. The Dominion KX II Remote Console provides a digital connection to your connected target servers.
Chapter 4: Connecting to the Dominion KX II Multi-Platform Client (MPC): KX I and Dominion KX II Devices The Raritan Multi-Platform Client (MPC) is a graphical interface that allows you to remotely access the target devices connected to Dominion units. MPC can be installed for standalone use or accessed through a Web browser. After installing the Dominion KX II, either download a standalone version of Raritan MPC and establish an initial network connection, or launch the application directly.
Raritan Remote Client (RRC): KX I Devices Only Raritan Remote Client (RRC): KX I Devices Only Raritan Remote Client (RRC) is a graphical user interface providing remote access to the target devices. Note: RRC cannot be used with the Dominion KX II; use MPC instead. Language Support The Dominion KX II provides keyboard support for the following languages: US English, UK English, Traditional Chinese, Simplified Chinese, Japanese, Korean, French, and German.
Chapter 4: Connecting to the Dominion KX II Launching the Dominion KX II Important: Regardless of the browser used, you must allow pop-ups from the Dominion device's IP address to launch the Dominion KX II Remote Console. Figure 11: Dominion KX II Remote Console Login Page Note: Depending on your browser and security settings, you may see various security and certificate warnings. It is necessary to accept these warnings to launch the Dominion KX II Remote Console.
Launching the Dominion KX II 4. Type your Username and Password. If this is the first time logging in, log in with the factory default username and password (admin and raritan (all lower case)); you will be prompted to change the default password. Refer to Changing the Default Password (on page 32) for more information. 5. Click Login.
Chapter 4: Connecting to the Dominion KX II ¾ To scroll through pages longer than the screen: • Use Page Up and Page Down keys on your keyboard, or • Use the scroll bar on the right For more information about navigation and selection in the Raritan Multi-Platform Client (MPC), refer to the Raritan Multi-Platform Client (MPC) and Raritan Remote Client (RRC) User Guide. Logging Out ¾ To quit the Dominion KX II Console: Click Logout in the upper right-hand corner of the page.
Launching the Dominion KX II In addition to being identified in the menu tree above, menu option variations between the Dominion KX II Local Console and the Dominion KX II Remote Console are identified in the following table: Option 48 Local Console Remote Console Virtual Media 9 File Server Setup 9 Backup/Restore 9 Firmware Upgrade 9 KX Diagnostics 9 Manage Favorites 9 Favorites List 9 Discover Devices - Local Subnet 9 Discover Devices - KX Subnet 9 Add New Device to Favorites 9 H
Chapter 4: Connecting to the Dominion KX II Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently.
Managing Favorites ¾ To access a favorite Dominion KX II device: Click the device name for that device (listed beneath Favorite Devices). A new browser opens to that device. ¾ To toggle the Favorite Devices list display between name and IP Address: To display Favorites by IP Address: Click the Display by IP button. Favorite Devices currently displayed by name; Click Display by IP to toggle. To display Favorites by name: Click the Display by Name button.
Chapter 4: Connecting to the Dominion KX II Favorites List From the Favorites List page, you can add, edit, and delete devices from your list of Favorites. ¾ To open the Favorites List page: Select Manage > Favorites List. The Favorites List page opens: Figure 15: Favorites List ¾ To add a Favorite: Click the Add button. The Add New Favorite (on page 56) page opens. ¾ To delete a Favorite: Important: Please exercise caution in the removal of favorites; you are not prompted to confirm their deletion.
Managing Favorites 2. Click the Edit button. The Edit page opens: Figure 16: Edit (Favorite Information) 3. 4. 52 Update the fields as necessary: Description. Type something meaningful. IP Address. Type the IP Address of the Dominion KX II unit. Port. Change the discovery Port (if necessary). Click OK.
Chapter 4: Connecting to the Dominion KX II Discover Devices - Local Subnet This option discovers the devices on your local subnet (that is, the subnet where the Dominion KX II Remote Console is running); access these devices directly from this page, or add them to your list of favorites.
Managing Favorites ¾ To discover devices on the local subnet: 1. Select Favorites > Discover Devices - Local Subnet. The Discover Devices - Local Subnet page opens. 2. Select the appropriate discovery port (refer to Network Miscellaneous Settings (on page 124) for information about the discovery port): • To use the default discovery port, check the Use Default Port 5000 option. • To use a different discovery port: a. Clear the Use Default Port 5000 option. b.
Chapter 4: Connecting to the Dominion KX II Discover Devices - KX Subnet This option discovers the devices on the KX device subnet (that is, the subnet of the Dominion KX II device IP address itself); access these devices directly from this page, or add them to your list of favorites. This feature allows multiple Dominion KX II units to interoperate and scale automatically. The Dominion KX II Remote Console automatically discovers the Dominion KX II units in the subnet of the Dominion KX II.
Managing Favorites Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the Dominion KX II device subnet. ¾ To access a discovered device: Click the device name or IP Address for that device. A new browser opens to that device. Add New Favorite ¾ To add a device to your favorites list: 1. Select Manage Favorites > Add New Device to Favorites. The Add New Favorite page opens: Figure 19: Add New Favorite 56 2. Type a meaningful Description. 3.
Chapter 5 Accessing Target Servers In This Chapter Port Access Page ..............................................................................................58 Connecting to a Target Server........................................................................59 Port Action Menu ............................................................................................60 Switching between Target Servers ................................................................61 Disconnecting Target Servers.
Port Access Page Port Access Page After successfully logging into the Dominion KX II Remote Console, the Port Access page opens. This page lists all of the Dominion KX II ports, the connected target servers, and their status and availability. The Port Access page provides access to the target servers connected to the Dominion KX II. Target servers are servers that you want to control through the Dominion KX II unit; they are connected to the Dominion KX II ports at the back of the unit.
Chapter 5: Accessing Target Servers Port Number. Numbered from 1 to the total number of ports available for the Dominion KX II unit. Please Note that ports connected to power strips will not be among those listed, resulting in gaps in the Port Number sequence. Port Name. The name of the Dominion KX II port; initially set to Dominion-KX2-Port#, but you can change the name to something more descriptive. When you click on a Port Name link, the Port Action Menu is opened. Status.
Port Action Menu 3. Select Connect. A Virtual KVM Client (on page 64) window opens to the target server connected to that port. Port Action Menu 1. When you click on a Port Name in the Port Access list, the Port Action menu is displayed. Please note that only options available for the selected port are listed in the Port Action menu: Connect. Creates a new connection to the target server. For the KX II Remote Console, a new Virtual KVM Client (on page 64) window is opened.
Chapter 5: Accessing Target Servers 2. Power Cycle. Power cycles the target server through the associated outlets. This option is visible only when there is a power association (one or more) to this target and when the user has permission to operate this service. Select the desired menu option for that port to execute it. Switching between Target Servers With the Dominion KX II, you can access several target servers. Dominion KX II provides the ability to switch from one target server to another.
Power Controlling a Target Server Power Controlling a Target Server Note: These features are available only when you have made power associations. Refer to power control for more information. Power Cycle a Target Server ¾ To power cycle a target server: 1. From the KX II Remote Console, click the Port Access tab to open it. The Port Access page opens. 2. Click the Port Name of the appropriate target server. The Port Action Menu is displayed. Figure 22: Port Action Menu (power options) 3.
Chapter 5: Accessing Target Servers Power Off a Target Server ¾ To power OFF a target server: 1. From the KX II Remote Console, click the Port Access tab to open it. The Port Access page opens. 2. Click the Port Name of the appropriate target server. The Port Action Menu is displayed. 3. Select Power Off.
Chapter 6 Virtual KVM Client In This Chapter Overview...........................................................................................................65 Options..............................................................................................................66 Mouse Pointer Synchronization.....................................................................67 Connection Menu ............................................................................................69 Keyboard Menu .
Chapter 6: Virtual KVM Client Overview Whenever you access a target server using the KX II Remote Console, a Virtual KVM Client window is opened. There is one Virtual KVM Client for each target server connected to; these windows can be accessed via the Windows Taskbar. Virtual KVM Client windows can be minimized, maximized, and moved around your computer desktop. Note: Refreshing your HTML browser will close the Virtual KVM Client connection, so please exercise caution.
Options Status Bar Real-time information on connection parameters, target server window size, concurrent connections, Caps Lock indicator, and Num Lock indicator. Note to CC-SG Users If you are using Dominion KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you are planning to use the Multi-Platform Client (MPC). Options Menu Tree The following diagram represents all of the menu options available in the Virtual KVM Client.
Chapter 6: Virtual KVM Client Refresh screen Auto-sense video Send Ctrl+Alt+Delete Toggles single/double mouse modes Full screen Resize video to fit screen Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, you will see two mouse pointers: one belonging to your remote client workstation and the other belonging to the target server.
Mouse Pointer Synchronization Mouse Synchronization Tips Be sure to follow these steps when obtaining mouse synchronization: 1. Verify that the selected video resolution and refresh rate is among those supported by the Dominion KX II. The Virtual KVM Client Connection Info dialog displays the actual values that the KX II is seeing. Please refer to Supported Video Resolutions for more information about the video resolutions that are supported. 2.
Chapter 6: Virtual KVM Client Connection Menu Properties Dialog The Dominion KX II dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. Dominion KX II units optimize KVM output not only for LAN use, but also for WAN and dialup use. These units can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
Connection Menu 512 Kb (Medium DSL/T1) 384 Kb (Slow DSL/T1) 256 Kb (Cable) 128 Kb (Dual ISDN) 56 Kb (ISP Modem) 33 Kb (Fast Modem) 24 Kb (Slow Modem) Please note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting. But the system will be most responsive when the settings match the real world environment. 3.
Chapter 6: Virtual KVM Client ¾ To cancel without saving changes: Click Cancel. Connection Info ¾ To obtain information about your Virtual KVM Client connection: Select Connection > Connection Info.
Connection Menu The following information is displayed about the current connection: • Device Name. The name of the Dominion KX II device. • IP Address. The IP Address of the Dominion KX II device. • Port. The KVM Communication TCP/IP Port used to access the target device. • Data In/Second. Data rate in. • Data Out/Second. Data rate out. • Connect Time. The duration of the connect time. • FPS. The frames per second transmitted for video. • Horizontal Resolution.
Chapter 6: Virtual KVM Client Keyboard Menu Send Ctrl+Alt+Delete Due to its frequent use, a Ctrl+Alt+Delete macro has been preprogrammed into the Virtual KVM Client. This key sequence is sent to the target server to which you are currently connected.
Keyboard Menu Creating a Keyboard Macro ¾ To create a keyboard macro (add a macro): 1. Select Keyboard > Keyboard Macros. The Keyboard Macros window opens: Figure 28: Keyboard Macros 2. Click Add. The Add Keyboard Macro window opens: Figure 29: Add Keyboard Macro 3. Type a name in the Keyboard Macro Name field. This is the name that will display on the Virtual KVM Client menu bar after the macro is created. In this example, type Minimize All Windows. 4. In the Keys to Press drop-down list: a.
Chapter 6: Virtual KVM Client b. Click the Press Key button after each selection. As each key is selected, it displays in the Keys to Release field. In this example, select two keys: the Windows key and the letter D key. 5. In the Keys to Release field: a. Select each key for which you would like to emulate a key release (in the order in which they are to be released). b. Click Release Key after each selection. In this example, both keys pressed must also be released. 6.
Keyboard Menu ¾ To cancel without saving changes: Click Cancel. ¾ To clear all fields and start over: Click the Clear button. Running a Keyboard Macro Once you have created a keyboard macro, execute it by clicking on its name in the Keyboard menu. ¾ To execute a macro (using this example): Select Keyboard > Minimize All Windows. An alternative method is to select the macro from the Keyboard Macros window. ¾ To execute a macro: 1. Select Keyboard > Keyboard Macros. The Keyboard Macros window opens.
Chapter 6: Virtual KVM Client ¾ To remove a macro: 1. Select Keyboard > Keyboard Macros. The Keyboard Macros window opens. 2. Select the macro from among those listed. 3. Click Remove. The macro is deleted.
Video Menu Calibrate Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The Dominion KX II color settings are on a target server-basis. Calibrate Color Adjusts color settings to optimize the video display. Note: The Calibrate Color option applies to the current connection only. ¾ To calibrate the color: 1. Open a remote KVM connection to any target server running a graphical user interface. 2.
Chapter 6: Virtual KVM Client ¾ To change the video settings: 1. Select Video > Video Settings. The Video Settings window opens displaying the current settings: Figure 32: Video Settings 2. Use the sliders to adjust the settings to achieve the desired results (as you adjust the settings the effects are immediately visible): Noise Filter. Dominion KX II can filter out the electrical interference of video output from graphics cards. This feature optimizes picture quality and reduces bandwidth.
Video Menu Red. Controls the brightness of the red signal. Green. Controls the brightness of the green signal. Blue. Controls the brightness of the blue signal. Color Contrast Settings: Controls the contrast adjustment. Contrast Red. Controls the red signal. Contrast Green. Controls the green signal. Contrast Blue. Controls the blue signal.
Chapter 6: Virtual KVM Client 3. Best possible video mode: Dominion KX II will perform the full Auto Sense process when switching targets or target resolutions. Selecting this option calibrates the video for the best image quality. Quick sense video mode: With this option, the Dominion KX II will use a quick video Auto Sense in order to show the target's video sooner. This option is especially useful for entering a target server's BIOS configuration right after a reboot. Click Apply.
Mouse Menu ¾ To synchronize the mouse: • Select Mouse > Synchronize Mouse, or • Click the Synchronize Mouse button from the toolbar Single Mouse Cursor Single Mouse Cursor enters single mouse mode, in which only the target server mouse cursor is shown; the local PC mouse pointer no longer appears on-screen. While in single mouse mode, the Synchronize Mouse option is not available (there is no need to synchronize a single mouse cursor).
Chapter 6: Virtual KVM Client Standard This is the standard mouse synchronization algorithm using relative mouse positions. Standard mouse mode requires that acceleration is disabled and other mouse parameters are set correctly in order for the client and server mouse to stay synchronized. Standard mouse mode is the default.
Virtual Media Virtual Media Refer to the chapter on Virtual Media (on page 87) for complete information about setting up and using virtual media. Tools Menu Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client: synchronize mouse when in dual mouse mode, enable logging, keyboard type, and the exit target screen resolution mode hotkey. ¾ To set the tools options: 1. Select Tools > Options. The Options window opens: Figure 34: (Tools) Options 84 2.
Chapter 6: Virtual KVM Client 4. Exit Target Screen Resolution Mode - Hotkey. When you enter target screen resolution mode, the display of the target server becomes full screen and acquires the same resolution as the target server. This is the hotkey used for exiting this mode; select from the drop-down list. 5. Exit Single Cursor Mode - Hotkey. When you enter single cursor mode, only the target server mouse cursor is visible.
Help Menu ¾ To exit target screen resolution mode: Press the hotkey configured in the Tools Options dialog. The default is Ctrl+Alt+M. Note to CC-SG Users: Target Screen Resolution is disabled; full screen mode is available only when the Dominion KX II device is not under CC-SG management. Help Menu About Raritan Virtual KVM Client This menu option provides version information about the Virtual KVM Client should you require assistance from Raritan technical support.
Chapter 7 Virtual Media In This Chapter Overview...........................................................................................................88 Prerequisites for Using Virtual Media ..........................................................90 Using Virtual Media ........................................................................................91 Opening a KVM Session .................................................................................92 Connecting to Virtual Media.........
Overview Overview Virtual media extends KVM capabilities by enabling target servers to remotely access media from the client PC and network file servers. With this feature, media mounted on the client PC and network file servers is essentially mounted virtually by the target server. The target server can then read from and write to that media as if it were physically connected to the target server itself.
Chapter 7: Virtual Media Figure 35: Virtual Media Connection 89
Prerequisites for Using Virtual Media Prerequisites for Using Virtual Media The following conditions must be met in order to use virtual media: Dominion KX II • For users requiring access to virtual media, KX permissions must be set to allow access to the relevant ports, as well as virtual media access (VM Access port permission) for those ports. Port permissions are set at the group-level; please refer to Setting Port Permissions (on page 106) for more information.
Chapter 7: Virtual Media Using Virtual Media With the Dominion KX II virtual media feature, you can mount up to two drives (of different types). These drives are accessible for the duration of the KVM session. For example, you can mount a specific CD-ROM, use it, and then disconnect it when you are done. The CD-ROM virtual media “channel” will remain open, however, so that you can virtually mount another CDROM. These virtual media “channels” remain open until the KVM session is closed.
Opening a KVM Session Opening a KVM Session ¾ To open a KVM session: 1. Open the Port Access page from the Dominion KX II Remote Console. Figure 36: Open KVM Session 2. Connect to the target server from the Port Access page: a. Click the Port Name for the appropriate server. b. Select the Connect option from the Port Action Menu. The target server opens in a Virtual KVM Client (on page 64) window.
Chapter 7: Virtual Media Connecting to Virtual Media Local Drives This option mounts an entire drive; the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only; it does not include network drives, CD-ROM, or DVD-ROM drives. This is the only option for which Read-Write is available. Note: Target servers running certain version of the Windows operating system may not accept new mass storage connections after an NTFS-formatted partition (e.g.
Connecting to Virtual Media 4. Click Connect. The media will be mounted on the target server virtually. You can access the media just like any other drive Conditions when Read-Write is not Available Virtual media read-write is not available in the following situations: • For all hard drives. • When the drive is write-protected.
Chapter 7: Virtual Media b. Select the drive from the Local CD/DVD Drive drop-down list. All available internal and external CD and DVD drive names will be populated in the drop-down list. c. 3. Click Connect. For ISO images: a. Select the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive. ISO format is the only format supported. b. Click the Browse button. c. Navigate to the path containing the disk image you want to use and click Open.
File Server Setup (File Server ISO Images Only) File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images. Use the Dominion KX II Remote Console File Server Setup page to designate the files server(s) and image paths that you want to access using Dominion KX II Virtual Media.
Chapter 7: Virtual Media 3. Check the Selected checkbox for all media that you want accessible as virtual media. 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog. ¾ To cancel without saving: Click Cancel.
Chapter 8 User Management In This Chapter User Management Menu ................................................................................98 User List ............................................................................................................99 Add New User ...............................................................................................100 User Group List..............................................................................................
Chapter 8: User Management User List The User List page displays a list of all users including their Username, Full Name, and User Group. The list can be sorted on any of the columns by clicking on the column name. From the User List page, you can also add, modify, or delete users. ¾ To view the list of users: Select User Management > User List. The User List page opens: Figure 40: User List ¾ To add a new user: Click the Add button. The User page opens.
Add New User Add New User It is a good idea to define user groups before creating Dominion KX II users, because when you add a user, you must assign that user to an existing user group. From the User page, you can add new users, modify user information, and reactivate users that have been deactivated. Note: A username can be deactivated (Active checkbox is cleared) when the number of failed login attempts has exceeded the maximum login attempts set in the Security Settings screen.
Chapter 8: User Management 5. Select the group from the User Group drop-down list. The list contains all groups you have created in addition to the systemsupplied default groups ( (default setting), Admin, Individual Group). If you do not want to associate this user with an existing User Group, select Individual Group from the drop-down list. For more information about permissions for an Individual Group, refer to Set Permissions for Individual Group (on page 110). 6.
User Group List User Group List User groups are used with local and remote authentication (via RADIUS or LDAP). It is a good idea to define user groups before creating individual users, because when you add a user, you must assign that user to an existing user group. The User Group List page displays a list of all user groups, which can be sorted in ascending or descending order by clicking on the Group Name column heading. From the User Group List page, you can also add, modify, or delete user groups.
Chapter 8: User Management ¾ To delete a user group: Important: Before deleting a group, ensure that no users are assigned to it, or those users will also be deleted. Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Select a group from among those listed by checking the checkbox to the left of the Group Name. 2. Click Delete. 3. You are prompted to confirm the deletion. Click OK. Add New User Group ¾ To add a new user group: 1.
Add New User Group Click the Add button from the User Group List page Figure 43: Group Page 104
Chapter 8: User Management The Group page is organized into the following categories: Group, Permissions, Port Permissions, and IP ACL. 2. Type a descriptive name for the new user group into the Group Name field. 3. Set the Permissions for the group. Check the boxes before the permissions you want to assign to all of the users belonging to this group. Refer to Setting Permissions (on page 105) for more information. 4. Set the Port Permissions.
Add New User Group Permission Description Security SSL certificate, security settings (VM Share, PC-Share), IP ACL User Management User and group management, remote authentication (LDAP/RADIUS), login settings Setting Port Permissions For each server port, you can specify the type of access, the type of access to the virtual media, and the power control. Please note that the default setting for all permissions is disabled.
Chapter 8: User Management This feature limits access to the Dominion KX II device by users in the selected group to specific IP addresses. This feature applies only to users belonging to a specific group, unlike the IP Access Control List feature which applies to all access attempts to the device, is processed first, and takes priority. Refer to IP Access Control (on page 153) for more information. Important: IP Address 127.0.0.1 is used by the Dominion KX II Local Port.
Add New User Group ¾ To replace a rule: 1. Specify the Rule # you want to replace. 2. Populate the Starting IP and Ending IP fields. 3. Select the Action from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same Rule #. ¾ To delete a rule: 1. Specify the Rule # you want to delete. 2. Click Delete. 3. You are prompted to confirm the deletion. Click OK. Important: ACL rules are evaluated in the order in which they are listed.
Chapter 8: User Management Modify Existing User Group Note: All permissions are enabled (and cannot be changed) for the Admin group. ¾ To modify an existing user group: 1. From the Group page, change the appropriate fields and set the appropriate permissions.
Add New User Group 2. Set the Permissions for the group. Check the boxes before the permissions you want to assign to all of the users belonging to this group. Refer to Setting Permissions (on page 105) for more information. 3. Set the Port Permissions. Specify the server ports that can be accessed by users belonging to this group (and the type of access). Refer to Setting Port Permissions (on page 106) for more information. 4. Set the IP ACL (optional).
Chapter 8: User Management Change Password ¾ To change your password: 1. Select User Management > Change Password. The Change Password page opens: Figure 47: Change Password 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field; retype the new password in the Confirm New Password field.
Authentication Settings Authentication Settings From the Authentication Settings page you can configure the type of authentication used for access to your Dominion KX II. Refer to Authentication vs. Authorization for more information about how authentication and authorization operate and differ. Note: Even if you select remote authentication (LDAP or RADIUS), local authentication is still used. 112 ¾ To configure authentication: 1. Select User Management > Authentication Settings.
Chapter 8: User Management Figure 48: Authentication Settings 2. Select the option for the authentication protocol you want to use (Local Authentication, LDAP, or RADIUS). Selecting the LDAP option enables the remaining LDAP fields; selecting the RADIUS option enables the remaining RADIUS fields. 3. If you selected Local Authentication, proceed to step 6. 4.
Authentication Settings 5. If you selected RADIUS, read the section entitled Implementing RADIUS Remote Authentication (on page 118) for information about completing the fields in the RADIUS section of the Authentication Settings page. 6. When finished, click OK to save. ¾ To cancel without saving changes: Click Cancel. ¾ To return to factory defaults: Click the Reset to Defaults button.
Chapter 8: User Management Implementing LDAP Remote Authentication Lightweight Directory Access Protocol (LDAP) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn. Reminder: Microsoft Active Directory functions natively as an LDAP authentication server.
Authentication Settings 2. (Optional) Type the IP Address or DNS name of your backup LDAP server in the Secondary LDAP Server field. When the Enable Secure LDAP option is checked, the DNS name must be used. Please note that the remaining fields share the same settings with the Primary LDAP Server field. 3. Type the server secret (password) required to authenticate against your remote authentication server in the Secret Phrase field and again in the Confirm Secret Phrase field. 4.
Chapter 8: User Management Returning User Group Information from Active Directory Server The Dominion KX II supports user authentication to Active Directory (AD) without requiring that users be defined locally on the Dominion KX II. This allows Active Directory user accounts and passwords to be maintained exclusively on the AD server.
Authentication Settings Implementing RADIUS Remote Authentication Remote Authentication Dial-in User Service (RADIUS) is an AAA (authentication, authorization, and accounting) protocol for network access applications. ¾ To use the RADIUS authentication protocol: Figure 50: Authentication Settings (RADIUS) 118 1. Type the IP Address of your primary and (optional) secondary remote authentication servers in the Primary Radius Server and Secondary Radius Server fields, respectively. 2.
Chapter 8: User Management 3. Authentication Port. The default authentication port is 1812; change as required. 4. Accounting Port. The default accounting port is 1813; change as required. 5. Timeout (in seconds). The default timeout is 1 second; change as required. The timeout is the length of time the Dominion KX II waits for a response from the RADIUS server before sending another authentication request. 6. Retries. The default number of retries is 3; change as required.
Authentication Settings RADIUS Communication Exchange Specifications The Dominion KX II unit sends the following RADIUS attributes to your RADIUS server: Attribute Data Login Access-Request (1) NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-IP-Address (4) The IP Address for the Dominion KX II unit. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting. User-Password(2): The encrypted password.
Chapter 9 Device Management In This Chapter Device Management Menu ..........................................................................121 Network Settings ...........................................................................................122 Date/Time Settings.........................................................................................128 Event Management........................................................................................129 Power Supply Setup Page...........
Network Settings Network Settings Use the Network Settings page to customize the network configuration (e.g., IP Address, discovery port, and LAN interface parameters) for your Dominion KX II unit. Important: Dominion KX II must be rebooted for new network settings to take effect. Before changing the network configuration, ensure that there are no other active user connections to the device; all connections will be dropped when the Dominion KX II unit reboots.
Chapter 9: Device Management 2. Update the Network Basic Settings. Refer to Network Basic Settings (on page 123) for more information about each of the fields. 3. Update the Network Miscellaneous Settings. Refer to Network Miscellaneous Settings (on page 124) for more information about each of the fields. 4. Update the LAN Interface Settings. Refer to LAN Interface Settings (on page 125) for more information about each of the fields. 5. Click OK to set these configurations.
Network Settings • Device Name. Type a unique name for the device (up to 16 characters; spaces are not allowed). Name your device so you can easily identify it. The default name for a Dominion KX II unit is: “DominionKX”. Remote users will also see this name. However, if an MPC user has created a Connection Profile for this device, that user will see the Description field from the Profile instead. • IP auto configuration. Select from among the options available in the drop-down list: None.
Chapter 9: Device Management • Discovery Port. Dominion KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can configure it to use any TCP port except 80 and 443. To access the Dominion KX II unit from beyond a firewall, your firewall settings must enable two-way communication through the default port 5000 or a non-default port configured here.
Network Settings 100 Mbps/Full 1000 Mbps/Full Gigabit Half-duplex provides for communication in both directions, but only one direction at a time (not simultaneously). Full-duplex allows communication in both directions simultaneously. Note: Occasionally there are problems running at 10 Mbps in either half or full duplex. If you are experiencing problems, please try another speed and duplex. Please refer to Network Speed Settings (on page 195) for more information. • Enable Automatic Failover.
Chapter 9: Device Management • Set System ACL. Click this button to set a global-level Access Control List for your Dominion KX II by ensuring that your device does not respond to packets being sent from disallowed IP addresses. The IP Access Control (on page 153) page opens. Note: These ACL values are global, affecting the Dominion KX II unit as a whole. You can also create ACLs on a group-level basis.
Date/Time Settings Date/Time Settings Use the Date/Time Settings page to specify the date and time for the Dominion KX II. There are two ways to do this: • Manually set the date and time, or • Synchronize with a Network Time Protocol (NTP) Server. ¾ To set the date and time: 1. Select Device Settings > Date/Time. The Date/Time Settings page opens: Figure 55: Date/Time Settings 128 2. Select your time zone from the Time Zone drop-down list. 3.
Chapter 9: Device Management 4. For the User Specified Time option, enter the date and time as follows: a. Select the Month from the drop-down list. b. Type the Day of the Month. c. Type the Year in yyyy format. d. Enter the Time in hh:mm format (using a 24-hour clock). 5. For the Synchronize with NTP Server option: a. Enter the IP address of the Primary Time server. b. (Optional) Enter the IP address of the Secondary Time server. 6. Click OK.
Event Management Event Management - Settings SNMP Configuration Simple Network Management Protocol (SNMP) is a protocol governing network management and the monitoring of network devices and their functions. Dominion KX II offers SNMP Agent support through Event Management. Refer to SNMP Agent Configuration (on page 133) and SNMP Trap Configuration (on page 133) for more information about SNMP Agents and Traps. ¾ To configure SNMP (enable SNMP logging): 1.
Chapter 9: Device Management 2. Check the Enable SNMP Logging option; this enables the remaining SNMP fields. 3. In the Name, Contact, and Location fields, type the SNMP Agent's (this Dominion unit's) name as it appears in the Dominion KX II Console interface, a contact name related to this unit, and where the Dominion unit is physically located, respectively. 4. Type the Agent Community String (the Dominion unit's string).
Event Management Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management Destinations page to select which system events to track and where to send this information. Note: SNMP traps will only be generated if the SNMP Logging Enabled option is checked; Syslog events will only be generated if the Enable Syslog Forwarding option is checked.
Chapter 9: Device Management 2. Check the checkboxes for those Event line items you want to enable or disable, and where you want to send the information. Tip: Enable or disable entire Categories by checking or clearing the Category line checkboxes, respectively. 3. Click OK. ¾ To cancel without saving changes: Click Cancel. ¾ To reset to factory defaults: Click the Reset To Defaults button.
Event Management 134 Trap Name Description deviceUpgradeStarted The Dominion KX II has begun update via an RFP file. ethernetFailover An Ethernet failover was detected and restored on a new Ethernet interface. factoryReset The device has been reset to factory defaults. firmwareFileDiscarded Firmware file was discarded. firmwareUpdateFailed Firmware update failed. firmwareValidationFailed Firmware validation failed. groupAdded A group has been added to the Dominion KX II system.
Chapter 9: Device Management Trap Name Description startCCManagement The device has been put under CommandCenter Management. stopCCManagement The device has been removed from CommandCenter Management. userAdded A user has been added to the system. userAuthenticationFailure A user attempted to log in without a correct username and/or password. userConnectionLost A user with an active session has experienced an abnormal session termination. userDeleted A user account has been deleted.
Power Supply Setup Page Power Supply Setup Page The Dominion KX II provides dual power supplies, and can automatically detect and provide notification regarding the status of these power supplies. Use the Power Supply Setup page to specify whether you are using one or both of the power supplies. Proper configuration ensures that the Dominion KX II sends the appropriate notifications should a power supply fail.
Chapter 9: Device Management Note: If either of these checkboxes is checked and power input is not actually connected, the power LED at the front of the unit displays red. ¾ To turn off the automatic detection: Clear the checkbox for the appropriate power supply. ¾ To reset to factory defaults: Click the Reset To Defaults button. ¾ To cancel without saving changes: Click the Cancel button. Note: Dominion KX II does NOT report power supply status to CommandCenter.
Port Configuration Page Port Configuration Page The Port Configuration page displays a list of the Dominion KX II ports. Ports connected to target servers or power strips are displayed in blue and can be edited. For ports with no CIM connected or with a blank CIM name, a default port name of Dominion-KX2_Port# is assigned, where Port# is the number of the Dominion KX II physical port. ¾ To change a port configuration: 1. Select Device Settings > Port Configuration.
Chapter 9: Device Management Note: Do not use apostrophes for the Port (CIM) Name. 2. Port Type. The type of CIM connected to the port: Port Type Description DCIM Dominion CIM Not Available No CIM connected PCIM Paragon CIM PowerStrip Power CIM VM Virtual Media CIM (D2CIM-VUSB) Click the Port Name for the port you want to edit. For KVM ports, the Port page (see "Associate Target Servers to Outlets (Port Page)" on page 143) is opened.
Power Control Power Control Connect the Power Strip The numbers in this diagram correspond to the steps listed below. Figure 61: Power Strip Connections 140 ¾ To connect the power strip: 1. Connect the male RJ-45 of the D2CIM-PWR to the female RJ-45 connector on the power strip. 2. Connect the female RJ-45 connector of the D2CIM-PWR to any of the available female system port connectors on the Dominion KX II using a straight through Cat 5 cable. 3.
Chapter 9: Device Management Name the Power Strip (Port Page for Power Strips) This Port page opens when you select a port from the Port Configuration (see "Port Configuration Page" on page 138) page that is connected to a Raritan remote power strip. The Type and the Name fields are prepopulated; please note that the (CIM) Type cannot be changed. The following information is displayed for each outlet in the power strip: outlet Number, Name, and Port Association.
Power Control Note: When a power strip is associated to a target server (port), the outlet name is replaced by the target server name (even if you assigned another name to the outlet). ¾ To name the power strip (and outlets): Note: CommandCenter Service Gateway does not recognize power strip names containing spaces. 1. Change the Name of the power strip to something you will remember. 2. Change the (Outlet) Name if desired. (Outlet names default to Outlet #.) 3. Click OK.
Chapter 9: Device Management Associate Target Servers to Outlets (Port Page) This Port page opens when you select a port from the Port Configuration (see "Port Configuration Page" on page 138) page that is connected to a target server. From this page, you can make power associations, change the Port Name to something more descriptive, and update target server settings if you are using the D2CIM-VUSB CIM (see "Note for D2CIMVUSB CIM Usage" on page 145).
Power Control ¾ To make power associations (associate power strip outlets to target servers): Note: When a power strip is associated to a target server (port), the outlet name is replaced by the target server name (even if you assigned another name to the outlet). 1. Select the power strip from the Power Strip Name drop-down list. 2. For that power strip, select the outlet from the Outlet Name dropdown list. 3. Repeat steps 1 and 2 for all desired power associations. 4. Click OK.
Chapter 9: Device Management Note for D2CIM-VUSB CIM Usage If you are using the D2CIM-VUSB, there are additional settings on the Port page to improve performance. Figure 64: Port Page (Target Server Settings for D2CIM-VUSB) If you are experiencing synchronization issues and are using the D2CIMVUSB CIM for a Mac target server, check the Absolute mouse scaling for MAC server option. Certain BIOS do not support USB high-speed capabilities and the attempt to auto-negotiate does not work.
Chapter 10 Security Settings In This Chapter Security Settings Menu .................................................................................146 Security Settings.............................................................................................147 IP Access Control ...........................................................................................153 Security Settings Menu The Security menu is organized as follows: Security Settings and IP Access Control.
Chapter 10: Security Settings Security Settings From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security. Raritan web server certificates are self-signed; Java applet certificates are signed by a VeriSign certificate.
Security Settings 2. Update the Login Limitations (on page 148) settings as appropriate. 3. Update the Strong Passwords (on page 149) settings as appropriate. 4. Update the User Blocking (on page 150) settings as appropriate. 5. Update the Encryption & Share (on page 151) settings as appropriate. 6. Click OK when you are done. ¾ To close the page without saving any changes: Click Cancel. ¾ To reset back to defaults: Click Reset to Defaults.
Chapter 10: Security Settings Strong Passwords Strong passwords provide more secure local authentication for the system. Using Strong Passwords, you can specify criteria defining the format of valid Dominion KX II local passwords such as minimum and maximum length, required characters, and password history retention. Figure 66: Security Settings (Strong Passwords) • Enable strong passwords.
Security Settings Enforce at least one printable special character. When checked, at least one special character (printable) is required in the password. Number of restricted passwords based on history. This field represents the password history depth; that is, the number of prior passwords that cannot be repeated. The range is 1-12; the default is 5.
Chapter 10: Security Settings • Deactivate User-ID. When selected, this option specifies that the user will be locked out of the system after the number of failed login attempts specified in the Failed Attempts field: Failed Attempts. The number of unsuccessful login attempts after which the user's User-ID will be deactivated. This field is enabled when the Deactivate User-ID option is selected. The valid range is 1 - 10.
Security Settings • Encryption Mode. Select one of the options from the drop-down list. When an encryption mode is selected, a warning is displayed that if your browser does not support the selected mode, you will not be able to connected to the Dominion KX II: Figure 69: Security Settings (Encryption Mode Warning Message) Auto. This is the recommended option; the Dominion KX II autonegotiates to the highest level of encryption possible. RC4.
Chapter 10: Security Settings PC-Share: Target servers can be accessed by up to eight users (administrator or non-administrator) at one time. Each remote user has equal keyboard and mouse control, however, please note that uneven control will occur if one user does not stop typing or moving the mouse. • VM Share Mode. This option is enabled only when PC-Share Mode is enabled.
IP Access Control ¾ To use IP Access Control: 1. Open the IP Access Control page using one of these methods: Select Security > IP Access Control, or Click the Set System ACL button from the Network Settings (on page 122) page The IP Access Control page opens: Figure 70: IP Access Control 154 2. Check the Enable IP Access Control checkbox to enable IP access control and the remaining fields on the page. 3. Select the Default Policy.
Chapter 10: Security Settings 4. Repeat steps 1 through 3 for each rule you want to enter. ¾ To insert a rule: 1. Type a Rule #. A Rule # is required when using the Insert command. 2. Type the IP Address and subnet mask in the IP/Mask field. 3. Select the Policy from the drop-down list. 4. Click Insert. If the Rule # you just typed equals an existing Rule #, the new rule is placed ahead of the exiting rule and all rules are moved down in the list. ¾ To replace a rule: 1.
Chapter 11 Maintenance In This Chapter Maintenance Menu ........................................................................................156 Maintenance Features (Local/Remote Console) ........................................156 Audit Log........................................................................................................157 Device Information........................................................................................159 Backup and Restore .............................
Chapter 11: Maintenance Use: To: Local Remote Upgrade Report View information about the latest upgrade performed. 9 9 Reboot Reboot the Dominion Dominion KX II unit. 9 9 Audit Log A log is created of Dominion KX II system events. ¾ To view the audit log for your Dominion KX II unit: Select Maintenance > Audit Log.
Audit Log The Audit Log page displays events by date and time (most recent events listed first). The Audit Log provides the following information: • Date. The date and time that the event occurred; 24-hour clock. • Event. The event name as listed in the Event Management page. • Description. Detailed description of the event. ¾ To save the Audit Log: Note: Saving the Audit Log is available only on the Dominion KX II Remote Console, not on the Local Console. 1. Click the Save to File button.
Chapter 11: Maintenance Device Information The Device Information page provides detailed information about your Dominion KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. ¾ To view information about your Dominion KX II and CIMs: Select Maintenance > Device Information.
Backup and Restore Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your Dominion KX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another Dominion KX II, by backing up the user configuration settings from the Dominion KX II in use and restoring those configurations to the new Dominion KX II.
Chapter 11: Maintenance 3. Select the location, specify a file name, and click Save. A Download Complete dialog opens. 4. Click Close. The backup file is saved locally on your client machine with the name and location specified. ¾ To restore your Dominion KX II: WARNING: Please exercise caution when restoring your Dominion KX II to an earlier version. Usernames and password in place at the time of the backup will be restored.
CIM Upgrade CIM Upgrade Use this procedure to upgrade CIMs using the firmware versions stored in the memory of your Dominion KX II unit. In general, all CIMs are upgraded when you upgrade the device firmware using the Firmware Upgrade (on page 163) page. Use the CIM Upgrade page to upgrade new CIMs. Note: Only D2CIM-VUSB and D2CIM-PWR can be upgraded from this page. ¾ To upgrade CIMs using the Dominion KX II memory: 1. Select Maintenance > CIM Firmware Upgrade.
Chapter 11: Maintenance Firmware Upgrade Use the Firmware Upgrade page to upgrade the firmware for your Dominion KX II unit and all attached CIMs. This page is available in the Dominion KX II Remote Console only. Important: Do not turn off your Dominion KX II unit or disconnect CIMs while the upgrade is in progress - doing so will likely result in damage to the unit or CIMs. ¾ To upgrade your Dominion KX II unit: 1. Locate the appropriate Raritan firmware distribution file (*.
Firmware Upgrade 6. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed for your confirmation (if you opted to review CIM information, that information is displayed as well): Figure 76: Firmware Upgrade Review Note: At this point, connected users are logged out, and new login attempts are blocked. 7. Click Upgrade. Please wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade.
Chapter 11: Maintenance For information about upgrading the device firmware using the MultiPlatform Client, refer to the Raritan Multi-Platform Client (MPC) and Raritan Remote Client (RRC) User Guide. Upgrade Report Dominion KX II provides information about upgrades performed on the Dominion KX II unit and attached CIMS. ¾ To view the upgrade report: Select Maintenance > Upgrade Report.
Reboot logged off. ¾ To reboot your Dominion KX II: 1. Select Maintenance > Reboot. The Reboot page opens: Figure 79: Reboot 2. Click the Reboot button. You are prompted to confirm the action: Figure 80: Reboot Confirmation 3. Click Yes to proceed with the reboot. ¾ To exit without rebooting: Click No.
Chapter 12 Diagnostics In This Chapter Diagnostics Menu ..........................................................................................167 Network Interface Page ................................................................................168 Network Statistics Page ................................................................................169 Ping Host Page ...............................................................................................171 Trace Route to Host Page........
Network Interface Page Network Interface Page The Dominion KX II provides information about the status of your network interface. ¾ To view information about your network interface: Select Diagnostics > Network Interface. The Network Interface page opens: Figure 81: Network Interface The following information is displayed: • Whether the Ethernet interface is up or down. • Whether the gateway is ping-able or not. • The LAN port that is currently active.
Chapter 12: Diagnostics Network Statistics Page The Dominion KX II provides statistics about your network interface. ¾ To view statistics about your network interface: 1. Select Diagnostics > Network Statistics. The Network Statistics page opens. 2. Select the appropriate option from the Options drop-down list: Statistics.
Network Statistics Page Interfaces. Produces a page similar to the one displayed here: Figure 83: Network Statistics (interfaces) Route. Produces a page similar to the one displayed here: Figure 84: Network Statistics (route) 3. Click the Refresh button. The relevant information is displayed in the Result field.
Chapter 12: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP Address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another Dominion KX II unit is accessible. ¾ To ping the host: 1. Select Diagnostics > Ping Host. The Ping Host page opens: Figure 85: Ping Host 2. Type either the hostname or IP Address into the Hostname or IP Address field. 3. Click Ping.
Trace Route to Host Page Trace Route to Host Page Trace route is a network tool used to determine the route taken all the way to the provided hostname or IP Address. ¾ To trace the route to the host: 1. Select Diagnostics > Trace Route to Host. The Trace Route to Host page opens: Figure 86: Trace Route to Host 172 2. Type either the Hostname or IP Address into the Hostname or IP Address field. 3. Select the Maximum Hops from the drop-down list (5 or 10). 4. Click the Trace Route button.
Chapter 12: Diagnostics KX Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. KX Diagnostics downloads the diagnostics information from Dominion KX II to the client machine. Three operations can be performed on this page: • Command Line Interface. Enable or disable the Command Line Interface functionality.
KX Diagnostics Figure 87: KX Diagnostics 2. To enable the Command Line Interface for use by Raritan Technical Support: Note: UDP Port 21 is required for this feature. a. Check the Enable Command Line Interface for KX Diagnostics checkbox. b. Click OK. c. UDP port 21 must be opened and made available to Raritan Technical Support. d. Raritan Technical Support will also need to know the administrative password for the Dominion KX II. e. 3.
Chapter 12: Diagnostics a. Click the Save to File button. The File Download dialog opens: Figure 89: File Download b. Click Save. The Save As dialog opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
Chapter 13 KX II Local Console In This Chapter KX II Local Console .......................................................................................176 Starting the KX II Local Console..................................................................178 Accessing Target Servers ..............................................................................180 Local Port Administration ............................................................................
Chapter 13: KX II Local Console Physical Connections The physical connections for the local ports can be found on the back panel of the Dominion KX II: Figure 91: Local User Panel on Dominion KX II Monitor: Attach a standard multi-sync VGA monitor to the HD15 (female) video port. Keyboard: Attach either a standard PS/2 keyboard to the Mini-DIN6 (female) keyboard port, or a standard USB keyboard to one of the USB Type A (female) ports.
Starting the KX II Local Console The actions that are performed when the reset button is pressed are defined in the graphical user interface. Refer to Security Settings, Encryption & Share (see "Encryption & Share" on page 151) for more information. Note: It is recommended that you save the audit log prior to performing a factory reset. The audit log is deleted when a factory reset is performed and the reset event is not logged in the audit log.
Chapter 13: KX II Local Console Security and Authentication In order to use the Dominion KX II Local Console, you must first authenticate with a valid username and password. Dominion KX II provides a fully-integrated authentication and security scheme, whether your access is via the network or the local port.
Accessing Target Servers Accessing Target Servers Server Display After you login to the KX II Local Console, the Port Access page opens. This page lists all of the Dominion KX II ports, the connected target servers, and their status and availability. Figure 93: Local Console Port Access The target servers are initially sorted by Port Number; you can change the display to sort on any of the columns. • Port Number. Numbered from 1 to the total number of ports available for the Dominion KX II unit.
Chapter 13: KX II Local Console • Status. The Status is either up or down. • Availability. Valid Values per include Idle, Connected, Busy, or Unavailable. ¾ To change the sort order: Click the column heading you want to sort on. The list of target servers is sorted by that column. Hotkeys Because the Dominion KX II Local Console interface is completely replaced by the interface for the target server you are accessing, a hotkey is utilized so you can switch between these interfaces.
Local Port Administration Local Port Administration The Dominion KX II can be managed by either the KX II Local Console or the KX II Remote Console. Please note that the KX II Local Console also provides access to these administrative functions: • Local Port Settings • Factory Reset Note: Only users with administrative privileges can access these functions.
Chapter 13: KX II Local Console 2. 3. Select the appropriate Keyboard Type from among the options in the drop-down list: US US/International UK French German JIS (Japanese Industry Standard) Simplified Chinese Traditional Chinese Dubeolsik Hangul (Korean) Select the Local Port Hotkey. The Local Port Hotkey is used to return to the KX II Local Console interface when a target server interface is being viewed.
Local Port Administration 7. 8. 9. 1280x1024 Select the Refresh Rate from the drop-down list: 60 Hz 75 Hz Select the type of Local User Authentication: Local/LDAP/RADIUS. This is the recommended option; for more information about authentication, refer to Remote Authentication (on page 36) and Authentication vs. Authorization (on page 37). None. There is no authentication for local console access. This option is recommended for secure environments only.
Chapter 13: KX II Local Console Factory Reset (KX II Local Console Only) Note: This feature is available only on the Dominion KX II Local Console. The Dominion KX II offers several types of reset modes from the Local Console user interface. Note: It is recommended that you save the audit log prior to performing a factory reset. The audit log is deleted when a factory reset is performed and the reset event is not logged in the audit log.
Local Port Administration Subnet Mask Gateway IP address Primary DNS server IP address Secondary DNS server IP address Discovery Port Bandwidth Limit LAN Interface Speed & Duplex Enable Automatic Failover Ping Interval (seconds) Timeout (Seconds) You will be prompted to confirm this action because all network settings will be permanently lost. 186 1. Click Reset to continue. You will be prompted to confirm the factory reset. 2. Click the Really Reset button to proceed.
Chapter 14 CC Unmanage In This Chapter Overview.........................................................................................................187 Removing Dominion KX II from CC-SG Management ............................
Removing Dominion KX II from CC-SG Management Removing Dominion KX II from CC-SG Management Unless the Dominion KX II is released from CC-SG control, you cannot access the device directly. If, however, the Dominion KX II does not receive heartbeat messages from CommandCenter (e.g., CommandCenter is not on the network), you can release the Dominion KX II from CC-SG control in order to access the device. This is accomplished by using the CC Unmanage feature.
Chapter 14: CC Unmanage 2. Click the Really Unmanage button. A message is displayed confirming that the device is no longer under CC management: Figure 99: Device Removed from CC Management 3. Click OK. The Dominion KX II login page opens.
Appendix A Specifications In This Chapter Environmental Requirements ......................................................................190 Remote Connection .......................................................................................193 KVM Properties .............................................................................................193 TCP and UDP Ports Used.............................................................................
Appendix A: Specifications Physical Specifications Part Number DKX2-116 DKX2-132 DKX2-216 DKX2-232 DKX2-416 DKX2-432 Line Item Description 16-Port Dominion KX II with 1user Network Access and Local Port; Virtual Media, Dual Power 32-Port Dominion KX II with 1user Network Access and Local Port; Virtual Media, Dual Power 16-Port Dominion KX II with 2user Network Access and Local Port; Virtual Media, Dual Power 32-Port Dominion KX II with 2user Network Access and Local Port; Virtual Media, Dual Po
Environmental Requirements Electrical Specifications Parameter Value Input Nominal Frequencies 50/60 Hz Nominal Voltage Range 100/240 VAC Maximum Current AC RMS 0.6A max.
Appendix A: Specifications Part Number DCIM-SUN D2CIM-PWR D2CIM-VUSB32PAC D2CIM-VUSB 64PAC Line Item Description Dominion KX I & II Computer Interface Module [Sun Port, HD15 Video] Dominion KX II Computer Interface Module for Remote Power strips Bulk pack of 32 D2CIM-VUSB Bulk pack of 64 D2CIM-VUSB Product Weight 0.2 lbs 0.2 lbs 6.4 lb 12.8 lb Product Dimensions (WxDxH) 1.3" x 3.0" x 0.6" 1.3" x 3.0" x 0.6" (1.3" x 3.0" x 0.6")*32 (1.3" x 3.0" x 0.6")*64 Shipping Weight 0.2 lbs 0.
TCP and UDP Ports Used TCP and UDP Ports Used 194 • HTTP, Port 80 - All requests received by Dominion KX II via HTTP (port 80) are automatically forwarded to HTTPS for complete security. Dominion KX II responds to Port 80 for user convenience, relieving users from having to explicitly type “https://” in the URL field to access Dominion KX II, but while still preserving complete security.
Appendix A: Specifications • SNMP Default UDP Ports (optional) - Port 161 is used for inbound/outbound read/write SNMP access and port 162 is used for outbound traffic for SNMP traps. • UDP Port 21 - Port 21 is used for the Dominion KX II command line interface (when you are working with Raritan Technical Support).
Network Speed Settings Legend: Does not function, as expected Supported Functions; not recommended NOT supported by Ethernet specification; product will communicate, but collisions will occur Per Ethernet specification, these should be “no communication”, however, note that the Dominion KX II behavior deviates from expected behavior Note: For reliable network communication, configure the Dominion KX II and the LAN switch to the same LAN Interface Speed and Duplex.
Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ............................................................197 Setting the Registry to Permit Write Operations to the Schema .............198 Creating a New Attribute .............................................................................198 Adding Attributes to the Class ..............................................................
Setting the Registry to Permit Write Operations to the Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. 1. Right-click the Active Directory Schema root node in the left pane of the window, and then click Operations Master. The Change Schema Master dialog opens: Figure 100: Change Schema Master 2.
Appendix B: Updating the LDAP Schema 3. Click New, and then select Attribute. When the warning message appears, click Continue and the Create New Attribute window opens. Figure 101: Create New Attribute 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field. 7. Type a meaningful description in the Description field. 8.
Adding Attributes to the Class 2. Scroll to the user class in the right pane, and right-click on it. Figure 102: Adding the Attributes 3. Select Properties from the menu. The user Properties window appears. 4. Click on the Attributes tab to open it. Figure 103: Adding the Attributes to the Class 200 5. Click Add. 6. Select rciusergroup from the Select Schema Object list. 7. Click OK from the Select Schema Object dialog.
Appendix B: Updating the LDAP Schema 8. Click OK from the user Properties dialog. Updating the Schema Cache 1. Right-click Active Directory Schema in the left pane of the window and select Reload the Schema from the shortcut menu. 2. Minimize the Active Directory Schema MMC (Microsoft Management Console) console.
Editing rciusergroup Attributes for User Members 5. Open the Domain. 6. In the left pane of the window, select the CN=Users folder. Figure 105: ADSI Edit (CN=Users) 202 7. Locate the user name whose properties you want to adjust in the right pane. Right-click on the user name and select Properties. 8. Click on the Attribute Editor tab if it is not already open.
Appendix B: Updating the LDAP Schema 9. Select rciusergroup from the Attributes list.
Editing rciusergroup Attributes for User Members 10. Click Edit. The String Attribute Editor dialog opens: Figure 107: User Properties 11. Type the user group (created in Dominion Dominion KX II) in the Edit Attribute field. Figure 108: Edit Attribute (adding user to KX II group) 12. Click OK. 13. Click OK.
Appendix C Informational Notes In This Chapter Overview.........................................................................................................205 Non-US Keyboards........................................................................................205 Macintosh Keyboard .....................................................................................208 Mouse Pointer Synchronization (Fedora)...................................................208 Resolving Fedora Core Focus...........
Non-US Keyboards Note: These procedures do not apply to the circumflex accent (above vowels). In all cases, the ^ key (to the right of the P key) works on French keyboards to create the circumflex accent when used in combination with another character. Accent Symbol (Windows XP Clients only) From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 7 results in the accented character displaying twice when using French keyboards with Windows XP clients.
Appendix C: Informational Notes Java Runtime Environment (JRE) Because of a limitation in the Java Runtime Environment (JRE), Fedora, Linux, and Solaris clients receive an invalid response from Alt Gr on UK English and US International language keyboards. Fedora, Linux, and Solaris do not pick up events for the Alt Gr key combination for Java 1.4.2 or 1.5. Java 1.6 appears to improve on this, although the keyPressed and keyReleased events for Alt Gr still identify it as an “unknown key code”.
Macintosh Keyboard Macintosh Keyboard When a Macintosh is used as the client, the following keys on the Mac keyboard are not captured by the Java Runtime Environment (JRE): • F9 • F10 • F11 • F14 • F15 • Volume Up • Volume Down • Mute • Eject As a result, the Virtual KVM Client and the Multi-Platform Client (MPC) are unable to process these keys from a Mac client's keyboard.
Appendix C: Informational Notes Resolving Fedora Core Focus Using the Multi-Platform Client (MPC), occasionally there is an inability to log into a Dominion KX II device or to access target servers (Windows, SUSE, etc.). In addition, the Ctrl+Alt+M key combination may not bring up the Keyboard Shortcut menu. This situation occurs with the following client configuration: Fedora Core 6 and Firefox 1.5 or 2.0.
CIMs CIMs Windows 3-Button Mouse on Linux Targets When using a 3-button mouse on a Windows client connecting to a Linux target, the left mouse button may get mapped to the center button of the Windows client 3-button mouse.
Appendix C: Informational Notes CC-SG Virtual KVM Client Version not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from CommandCenter Secure Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”. Proxy Mode and MPC If you are using Dominion KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you are planning to use the Multi-Platform Client (MPC).
Appendix D FAQs In This Chapter General Questions .........................................................................................213 Remote Access................................................................................................215 Universal Virtual Media ...............................................................................217 Ethernet and IP Networking ........................................................................218 Servers .....................................
Appendix D: FAQs General Questions Question Answer What is Dominion KX II? Dominion KX II is a second generation digital KVM (Keyboard, Video Mouse) switch that enables IT administrators to access and control 16, 32, or 64* servers over the network with BIOS-level functionality. Dominion KX II is completely hardware and OS-independent; users can troubleshoot and reconfigure servers even when servers are down.
General Questions Question Answer How do I migrate from the Dominion KX I to Dominion KX II? In general, KX I customers can continue to use their existing switches for many years. As their data centers expand, customers can purchase and use the new KX II models. Raritan's centralized management appliance, CommandCenter Secure Gateway, and the Multi-Platform Client (MPC) both support KX I and KX II switches seamlessly.
Appendix D: FAQs Remote Access Question Answer How many users can remotely access servers on each Dominion KX II? Dominion KX II models offer remote connections for up to eight users per channel for simultaneous access and control of a unique target server. For one-channel devices like the DKX2-116, up to eight remote users can access and control a single target server.
Remote Access Question Answer What is the file size of the applet that is used to access Dominion KX II? How long does it take to retrieve? The Virtual KVM Client applet used to access Dominion KX II is approximately 500KB in size. The following chart describes the time required to retrieve Dominion KX II's applet at different network speeds: 100Mbps Theoretical 100Mbit network speed 0.05 second s 60Mbps Likely practical 100Mbit network speed 0.
Appendix D: FAQs Question Answer My modem connection dropped and I got the error message “There was an unexpected communications error connection terminated.” What should I do? This might have happened based on the frequency with which the user tried to connect via modem. Reboot the KX unit and modem, and for future connections, wait at least two (2) minutes between attempts. Sometimes during a Virtual KVM Client session, the Alt key appears to get stuck.
Ethernet and IP Networking Ethernet and IP Networking Question Answer Does the Dominion KX II offer dual gigabit Ethernet ports to provide redundant failover, or load balancing? Yes. Dominion KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should the primary Ethernet port (or the switch/router to which it is connected) fail, Dominion KX II will failover to the secondary network port with the same IP address ensuring that server operations are not disrupted.
Appendix D: FAQs Question Answer How much bandwidth does Dominion KX II require? Dominion KX II offers next generation KVM-over-IP technology - the very best video compression available. Raritan has received numerous technical awards confirming its high video quality transmissions and the low bandwidth utilization. Raritan pioneered the KVM-over-IP functionality that allows users to tailor their video parameters to conserve network bandwidth.
Ethernet and IP Networking Question Answer What is the slowest connection (lowest bandwidth) over which Dominion KX II can operate? 33Kbps or above is recommended for acceptable KX performance over a modem connection. What is the speed of Dominion KX II's Ethernet interfaces? Dominion KX II supports Gigabit as well as 10/100 Ethernet. KX II supports two 10/100/1000 speed Ethernet interfaces, with configurable speed and duplex settings (either auto-detected or manually set).
Appendix D: FAQs Question Answer Can Dominion KX II be used with CITRIX? Dominion KX II may work with remote access products like CITRIX if configured appropriately, but Raritan cannot guarantee it will work with acceptable performance. Products like CITRIX utilize video redirection technologies similar in concept to digital KVM switches so that two KVM-over-IP technologies are being used simultaneously.
Servers Servers Question Answer Does Dominion KX II depend on a Windows server to operate? Absolutely not. Because users depend on the KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructure to fix problems), Dominion KX II is designed to be completely independent from any external server.
Appendix D: FAQs Question Answer What comes in the Dominion KX II box? The following is included: (a) Dominion KX II unit; (b) Quick Setup Guide; (c) standard 19" rack mount brackets; (d) User manual CDROM; (e) Network cable; (f) Crossover cable; (g) Localized AC Line Cord; (h) Warranty certificate and other documentation.
Installation Installation Question Answer Besides the unit itself, what do I need to order from Raritan to install Dominion KX II? Each server that connects to Dominion KX II requires a Dominion or Paragon Computer Interface Module (CIM), an adapter that connects directly to the keyboard, video, and mouse ports of the server. What kind of Cat5 cabling should be used in my installation? Dominion KX II can use any standard UTP (unshielded twisted pair) cabling, whether Cat5, Cat5e, or Cat6.
Appendix D: FAQs Question Answer How many servers can be connected to each Dominion KX II unit? Dominion KX II models range from 16 or 32 server ports in a 1U chassis to 64 server ports in a 2U chassis. This is the industry's highest digital KVM switch port density.
Local Port Local Port Question Answer Can I access my servers directly from the rack? Yes. At the rack, Dominion KX II functions just like a traditional KVM switch - allowing control of up to 64 servers using a single keyboard, monitor, and mouse. When I am using the local port, do I prevent other users from accessing servers remotely? No. The Dominion KX II local port has a completely independent access path to the servers.
Appendix D: FAQs Question Answer If I use the local port to change the name of a connected server, does this change propagate to remote access clients as well? Does it propagate to the optional CommandCenter appliance? Yes. The local port presentation is identical and completely in sync with remote access clients, as well as Raritan's optional CommandCenter Secure Gateway management appliance.
Power Control Power Control Question Answer Does Dominion KX II have a dual power option? All Dominion KX II models come equipped with dual AC inputs and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then the KX II will automatically switch to the other. Does the power supply used by Dominion KX II automatically detect voltage settings? Yes. Dominion KX II's power supply can be used in AC voltage ranges from 100-240 volts, at 50-60 Hz.
Appendix D: FAQs Scalability Question Answer How do I connect multiple Dominion KX II devices together into one solution? Multiple Dominion KX II units do not need to be physically connected together. Instead, each Dominion KX II unit connects to the network, and they automatically work together as a single solution if deployed with Raritan's optional CommandCenter Secure Gateway (CC-SG) management appliance. CC-SG acts as a single access point for remote access and management.
Computer Interface Modules (CIMs) Computer Interface Modules (CIMs) Question Answer Can I use Computer Interface Modules (CIMs) from Raritan's analog matrix KVM switch, Paragon, with Dominion KX II? Yes. Certain Paragon computer interface modules (CIMs) may work with Dominion KX II (please check the Raritan Dominion KX II release notes on the web site for the latest list of certified CIMs). Can I use Dominion KX II Computer Interface Modules (CIMs) with Raritan's analog matrix KVM switch, Paragon? No.
Appendix D: FAQs Security Question Answer What kind of encryption does Dominion KX II use? Dominion KX II uses industry-standard (and extremely secure) 128-bit RC4 or AES encryption, both in its SSL communications as well as its own data stream. Literally no data is transmitted between remote clients and Dominion KX II that is not completely secured by encryption.
Security Question Answer If the Dominion KX II Encryption Mode is set to Auto, what level of encryption is achieved? The encryption level that is auto-negotiated is dependent on the browser in use: 232 Browser Encryption Level Internet Explorer 6 RC4 Internet Explorer 7 AES-128 Firefox 1.5 RC4 Firefox 2.0 RC4 Mozilla 1.7 RC4 Safari 2.0.
Appendix D: FAQs Manageability Question Answer Can Dominion KX II be remotely managed and configured via Web browser? Yes. Dominion KX II can be completely configured remotely via Web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) version installed. Can I backup and restore Dominion KX II's configuration? Yes. Dominion KX II's device and user configurations can be completely backed up for later restoration in the event of a catastrophe.
Miscellaneous Miscellaneous Question Answer What is Dominion KX II's default IP address? 192.168.0.192 What is Dominion KX II's default username and password? The KX II's default username and password are admin/raritan [all lower case]. However, for the highest level of security, the KX II forces the administrator to change the Dominion KX II default administrative username and password when the unit is first booted up.
Appendix D: FAQs Troubleshooting Question Answer I am logged into the Dominion KX II using Firefox, and I opened another Firefox browser. I am automatically logged into the same Dominion KX II with the second Firefox browser. Is this right? Yes, this is correct behavior and is the direct result of how browsers and cookies function. I am logged into the Dominion KX II using Firefox and I attempt to log into another Dominion KX II using another Firefox browser session from the same client.
Index 1 1. AC Power • 29 2 2. Network Ports • 30 3 3. Local Access Port (local PC) • 30 4 4.
Index Dominion KX II Devices • 44 E Editing rciusergroup Attributes for User Members • 211 Electrical Specifications • 201 Encryption & Share • 94, 154, 157, 186 Environmental Requirements • 199 Ethernet and IP Networking • 228 Event Management • 134 Event Management - Destinations • 137 Event Management - Settings • 135 Exit • 76 F Factory Reset (KX II Local Console Only) • 43, 194 FAQs • 222 Favorites List • 54 File Server Setup (File Server ISO Images Only) • 95, 100 Firmware Upgrade • 44, 168, 169 Fr
Index Managing Favorites • 44, 52 Menu Tree • 70 Miscellaneous • 244 Modify Existing User • 103, 105 Modify Existing User Group • 106, 113 Modifying a Keyboard Macro • 80 Mouse Menu • 71, 85 Mouse Pointer Synchronization • 71 Mouse Pointer Synchronization (Fedora) • 218 Mouse Settings • 16 Mouse Synchronization Tips • 72 Multi-Platform Client (MPC) KX I and Dominion KX II Devices • 45 Port Action Menu • 62, 63, 188, 189 Port Configuration Page • 144, 147, 149 Power Control • 146, 238 Power Controlling a
Index Security Settings • 104, 152, 153 Security Settings Menu • 152 Send Ctrl+Alt+Delete • 77 Server Display • 188 Servers • 232 Set Permissions for Individual Group • 105, 115 Setting Permissions • 109, 114 Setting Port Permissions • 94, 109, 110, 115 Setting the Registry to Permit Write Operations to the Schema • 207 Simultaneous Users • 186 Single Mouse Cursor • 86 SNMP Agent Configuration • 135, 139 SNMP Configuration • 135 SNMP Trap Configuration • 135, 139 Software • 5 Specifications • 31, 199 Speci
Index W Windows 2000 Settings • 18 Windows 3-Button Mouse on Linux Targets • 220 Windows Vista • 18 Windows XP / Windows 2003 Settings • 17 241
¾ U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800 724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732 764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com ¾ Europe Monday - Friday 8:30 a.m. - 5 p.m. GMT+1 CET Phone: +31-10-2844040 Email: tech.europe@raritan.com ¾ Japan Monday - Friday 9:30 a.m. - 5:30 p.m.