Dominion KX II (KX2-832 and KX2-864) User Guide Release 2.1.8 Copyright © 2009 Raritan, Inc. DKX2-v2.1.
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc. © Copyright 2009 Raritan, Inc., CommandCenter®, Dominion®, Paragon® and the Raritan company logo are trademarks or registered trademarks of Raritan, Inc. All rights reserved. Java® is a registered trademark of Sun Microsystems, Inc.
Contents Chapter 1 Introduction 1 Dominion KX II Help....................................................................................................................... 1 Related Documentation ....................................................................................................... 1 What's New in the Help.................................................................................................................. 2 Dominion KX II Overview............................................
Contents Video Properties ................................................................................................................ 63 Mouse Options................................................................................................................... 67 VKC Virtual Media .............................................................................................................72 Tool Options ..............................................................................................
Contents Changing a Password................................................................................................................119 Chapter 7 Device Management 120 Network Settings........................................................................................................................120 Network Basic Settings....................................................................................................121 LAN Interface Settings............................................
Contents Upgrading CIMs .........................................................................................................................196 Upgrading Firmware ..................................................................................................................197 Upgrade History .........................................................................................................................199 Rebooting...........................................................................
Contents Dominion KX II Local Console Interface ....................................................................................222 Security and Authentication .......................................................................................................222 Available Resolutions.................................................................................................................223 Port Access Page (Local Console Server Display) ......................................................
Contents Setting the Registry to Permit Write Operations to the Schema ...............................................255 Creating a New Attribute............................................................................................................255 Adding Attributes to the Class ...................................................................................................256 Updating the Schema Cache..............................................................................................
Contents Appendix D FAQs 275 General Questions .....................................................................................................................276 Remote Access..........................................................................................................................278 Universal Virtual Media ..............................................................................................................280 USB Profiles....................................................
Chapter 1 Introduction In This Chapter Dominion KX II Help ..................................................................................1 What's New in the Help .............................................................................2 Dominion KX II Overview...........................................................................3 Virtual Media..............................................................................................5 Product Photos .........................................
Chapter 1: Introduction What's New in the Help The following information has been added based on enhancements and changes to the equipment and/or user documentation. • Information on the new Extended Local port feature on the KX2-832 and KX2-864 has been added to the help. • Information on features specific to the KX2-832 and KX2-864 has been updated in the Help as needed. • Specifications specific to the KX2-832 and KX2-864 have been added to the Help.
Chapter 1: Introduction Dominion KX II Overview The Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can be controlled with a standard Dominion KX II. With the Dominion KX II 8-user model, up to 32 servers can be controlled with the KX2-832 and up to 64 servers can be controlled with the KX2-864.
Chapter 1: Introduction 4
Chapter 1: Introduction Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Power strip Dominion KX II Local access Note: KX2-832 and KX2-864 also use an Extended Local port. Remote KVM and serial devices IP LAN/WAN Modem PSTN Remote (network) access Virtual Media All Dominion KX II models support virtual media.
Chapter 1: Introduction Product Photos Dominion KX II KX2-832 6
Chapter 1: Introduction KX2-864 7
Chapter 1: Introduction Product Features Hardware 8 • Integrated KVM-over-IP remote access • 1U or 2U rack-mountable (brackets included) • Dual power supplies with failover; autoswitching power supply with power failure warning • 8, 16, 32, or 64 (on KX2-464) server ports • 32 (KX2-832) or 64 (KX2-864) server ports • Up to 8 video channels, depending on the device model, that allows up to 8 users to connect to the Dominion KX II at once • Multiple user capacity (1/2/4/8 remote users; 1 local
Chapter 1: Introduction Software • Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs • Absolute Mouse Synchronization with D2CIM-VUSB CIM and D2CIM-DVUSB CIMs • Plug-and-Play • Web-based access and management • Intuitive graphical user interface (GUI) • 128-bit encryption of complete KVM signal, including video and virtual media • LDAP, Active Directory, RADIUS, or internal authentication and authorization • DHCP or fixed IP addressing • SNMP and Syslog management • IPv4 and IPv6 suppor
Chapter 1: Introduction Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) Dominion KX II Local Access Console Local User - an optional user console (consisting of a keyboard, mouse, and multi-sync VGA monitor) attached directly to the Dominion KX II to control KVM target servers (directly at the rack, not through the network). An Extended Local Port is also provided on the DKX2-832 and DKX2-864 models.
Chapter 1: Introduction Package Contents Each Dominion KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmount chassis.
Chapter 2 Installation and Configuration In This Chapter Overview..................................................................................................12 Default Login Information ........................................................................12 Getting Started ........................................................................................13 Overview This section provides a brief overview of the installation process.
Chapter 2: Installation and Configuration Default Value Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location. Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that will be accessed and controlled via the Dominion KX II. Before installing the Dominion KX II, configure all KVM target servers to ensure optimum performance.
Chapter 2: Installation and Configuration Mouse Settings The Dominion KX II operates in several mouse modes: • Absolute Mouse Mode™ (D2CIM-VUSB only) • Intelligent Mouse Mode (do not use an animated mouse) • Standard Mouse Mode Mouse parameters do not have to be altered for Absolute Mouse Synchronization but D2CIM-VUSB or D2CIM-DVUSB is required for this mode. For both the Standard and Intelligent mouse modes, mouse parameters must be set to specific values, which are described here.
Chapter 2: Installation and Configuration Windows XP®/Windows 2003® To configure KVM target servers running Microsoft Windows XP/2003: 1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab. c. In the Motion group: Set the mouse motion speed setting to exactly the middle speed. Disable the Enhanced pointer precision option. Disable the Snap To option. Click OK.
Chapter 2: Installation and Configuration Note: For KVM target servers running Windows 2000 or XP, you may wish to create a user name that will be used only for remote connections through the Dominion KX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the Dominion KX II connection. Windows XP and 2000 login pages revert to preset mouse parameters that differ from those suggested for optimal Dominion KX II performance.
Chapter 2: Installation and Configuration Animate controls and elements inside windows Animate windows when minimizing and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 3. Click OK and Close the Control Panel. Linux Settings (Red Hat 9) Note: The following settings are optimized for Standard Mouse mode only. To configure KVM target servers running Linux (graphical user interface): 1.
Chapter 2: Installation and Configuration Note: Once connected to the target server, in many Linux graphical environments, the <+> command will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, depending on your X server distribution. To configure KVM target servers running Linux (command line): 1. Set the mouse acceleration to exactly 1 and set the threshold to exactly 1. Enter this command: xset mouse 1 1.
Chapter 2: Installation and Configuration 3. Save the file. 4. Reboot the system in order for the changes to take effect. Linux Settings (Red Hat 4) Note: The following settings are optimized for Standard Mouse mode only. To configure KVM target servers running Linux (graphical user interface): 1. Configure the mouse settings: a. Choose Main Menu > Preferences > Mouse. The Mouse Preferences dialog appears. b. Open the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center.
Chapter 2: Installation and Configuration SUSE Linux 10.1 Settings Note: Do not attempt to synchronize the mouse at the SUSE login prompt. You must be connected to the target server to synchronize the mouse cursors. To configure the mouse settings: 1. Choose Desktop > Control Center. The Desktop Preferences dialog appears. 2. Click Mouse. The Mouse Preferences dialog appears. 3. Open the Motion tab. 4. Within the Speed group, set the Acceleration slider to the exact center position. 5.
Chapter 2: Installation and Configuration Tip: If you do not want to be prompted upon log out, follow these procedures instead. To make your settings permanent in Linux (no prompt): 1. Choose Desktop > Control Center > System > Sessions. 2. Click the Session Options tab. 3. Deselect the "Prompt on the log off" checkbox. 4. Select the "Automatically save changes to the session" checkbox and click OK. This option automatically saves your current session when you log out.
Chapter 2: Installation and Configuration 3. KVM target servers running the Solaris operating system must output VGA video (H-and-V sync, not composite sync). To change your Sun video card output from composite sync to the nondefault VGA output: 1. Issue the Stop+A command to drop to bootprom mode. 2. Issue the following command to change the output resolution: setenv output-device screen:r1024x768x70 3. Issue the boot command to reboot the server.
Chapter 2: Installation and Configuration Video Settings (POST) Sun systems have two different resolution settings: a POST resolution and a GUI resolution. Run these commands from the command line. Note: 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using. To check current POST resolution: • Run the following command as the root: # eeprom output-device To change POST resolution: 1. Run # eeprom output-device=screen:r1024x768x75. 2.
Chapter 2: Installation and Configuration 4. Use the sliders to set the Mouse acceleration to 1.0 and Threshold to 1.0. 5. Click OK. To configure the video: 1. From the Launcher, select Application Manager. 2. Select System_Admin. 3. Choose Smit > Devices > Graphic Displays > Select the Display Resolution and Refresh Rate. 4. Select the video card in use. 5. Click List. A list of display modes is presented. 6. Select a resolution and refresh rate supported by the Dominion KX II.
Chapter 2: Installation and Configuration To take advantage of the Dominion KX II: The firewall must allow inbound communication on: Web-access capabilities Port 443 - standard TCP port for HTTPS communication Automatic redirection of HTTP requests to HTTPS (so the more common “http://xxx.xxx.xxx.xxx” can be used instead of “https://xxx.xxx.xxx.
Chapter 2: Installation and Configuration A. AC Power To connect the power supply: 1. Attach the included AC power cord to the Dominion KX II and plug into an AC power outlet. 2. For dual power failover protection, attach the second included AC power cord and plug it into a different power source than the first power cord. Note: If you only attach one power cord, the power LED on the Dominion KX II front panel will be red because the system is set to automatically detect both sources.
Chapter 2: Installation and Configuration Enable Automatic Failover on the Network Configuration page. Note: Use both network ports only if you want to use one as a failover port. D. Local Access Port (Local PC) For convenient access to target servers while at the rack, use the Dominion KX II Local Access port. While the Local Access port is required for installation and setup, it is optional for subsequent use.
Chapter 2: Installation and Configuration E. Target Server Ports The Dominion KX II uses standard UTP cabling (Cat5/5e/6) to connect to each target server. To connect a target server to the Dominion KX II: 1. Use the appropriate Computer Interface Module (CIM). See Supported CIMs and Operating Systems (Target Servers) (on page 239) for more information about the CIMs to use with each operating system. 2. Attach the HD15 video connector of your CIM to the video port of your target server.
Chapter 2: Installation and Configuration 2. Once the unit has booted, the Dominion KX II Local Console is visible on the monitor attached to the Dominion KX II local port. Type the default username (admin) and password (raritan) and click Login. The Change Password screen is displayed. 3. Type your old password (raritan) in the Old Password field. 4. Type a new password in the New Password field and retype the new password in the Confirm New Password field.
Chapter 2: Installation and Configuration DHCP - Dynamic Host Configuration Protocol is used by networked computers (clients) to obtain unique IP addresses and other parameters from a DHCP server. With this option, network parameters are assigned by the DHCP server. If DHCP is used, enter the Preferred host name (DHCP only). Up to 63 characters. 4. If IPv6 is to be used, enter or select the appropriate IPv6-specific network settings in the IPv6 section: a.
Chapter 2: Installation and Configuration a. Primary DNS Server IP Address b. Secondary DNS Server IP Address 7. When finished, click OK. Your Dominion KX II device is now network accessible. See LAN Interface Settings (on page 123) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
Chapter 2: Installation and Configuration Naming Target Servers To name the target servers: 1. Connect all of the target servers if you have not already done so. See Step 3: Connect the Equipment (on page 25) for a description of connecting the equipment. 2. Using the Dominion KX II Local Console, choose Device Settings > Port Configuration. The Port Configuration page opens. 3. Click the Port Name of the target server you want to rename. The Port Page opens. 4.
Chapter 2: Installation and Configuration Character Description Character Description % Percent sign @ At sign & Ampersand [ Left bracket ( Left parenthesis \ Backward slash ) Right parenthesis ] Right bracket * Asterisk ^ Caret + Plus sign _ Underscore , Comma ` Grave accent - Dash { Left brace .
Chapter 2: Installation and Configuration Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the device turns red. To disable power supply autodetection for the power supply not in use: 1. Using the Dominion KX II Local Console, choose Device Settings > Power Supply Setup. The Power Supply Setup page opens. 2. Clear autodetection for the power supply that you are not using. For more information, see Power Supply Setup (on page 135).
Chapter 2: Installation and Configuration Note on Microsoft Active Directory Microsoft Active Directory uses the LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the Dominion KX II. If it has the IAS (Internet Authorization Server) component, a Microsoft Active Directory server can also serve as a RADIUS authentication source.
Chapter 2: Installation and Configuration 3. Type the layout code desired (for example, 31 for the Japanese keyboard). 4. Press Enter. 5. Shut down the device and power on once again. The DCIM-SUSB performs a reset (power cycle). 6. Verify that the characters are correct.
Chapter 3 Working with Target Servers In This Chapter Interfaces .................................................................................................37 Virtual KVM Client ...................................................................................51 Interfaces There are several user interfaces in the Dominion KX II, providing you with easy access any time, anywhere. These include the Dominion KX II Local Console, the Dominion KX II Remote Console, and the Multi-Platform Client (MPC).
Chapter 3: Working with Target Servers Dominion KX II Local Console Interface When you are located at the server rack, the Dominion KX II provides standard KVM management and administration via the Dominion KX II Local Console. The Dominion KX II Local Console provides a direct KVM (analog) connection to your connected servers; the performance is exactly as if you were directly connected to the server's keyboard, mouse, and video ports.
Chapter 3: Working with Target Servers from the Dominion device's IP address to launch the Dominion KX II Remote Console. Depending on your browser and security settings, you may see various security and certificate warnings. It is necessary to accept these warnings to launch the Dominion KX II Remote Console. You can reduce the number of warning messages during subsequent log ins by checking the following options on the security and certificate warning messages: • In the future, do not show this warning.
Chapter 3: Working with Target Servers 6. See Virtual KVM Client (on page 51) for information on the Dominion KX II functions available via the Remote Console. Dominion KX II Console Layout Both the Dominion KX II Remote Console and the Dominion KX II Local Console interfaces provide an HTML (web-based) interface for configuration and administration, as well as target server list and selection. The options are organized into various tabs.
Chapter 3: Working with Target Servers Port Access Page After successfully logging on to the Dominion KX II Remote Console, the Port Access page appears. This page lists all of the Dominion KX II ports, the connected KVM target servers, and their status and availability. The Port Access page provides access to the KVM target servers connected to the Dominion KX II. KVM target servers are servers that you want to control through the Dominion KX II device.
Chapter 3: Working with Target Servers Availability - The Availability can be Idle, Connected, Busy, or Unavailable. Blade servers will have an availability of either shared or exclusive when a connection to that blade is in place. 2. Click View by Port or View by Group to switch between views. In addition to the Port Number, Port Name, Status, Type, and Availability, a Group column is also displayed on the View by Group tab. This column contains the port groups that are available. 3.
Chapter 3: Working with Target Servers Port Action Menu When you click a Port Name in the Port Access list, the Port Action menu appears. Choose the desired menu option for that port to execute it. Note that only currently available options, depending on the port's status and availability, will be listed in the Port Action menu: • Connect - Creates a new connection to the target server. For the Dominion KX II Remote Console, a new Virtual KVM Client (on page 51) page appears.
Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently.
Chapter 3: Working with Target Servers Note: Both IPv4 and IPv6 addresses are supported. Manage Favorites Page To open the Manage Favorites page: • Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local Subnet Discover Raritan devices on the client PC's local subnet.
Chapter 3: Working with Target Servers Discovering Devices on the Local Subnet This option discovers the devices on your local subnet, which is the subnet where the Dominion KX II Remote Console is running. These devices can be accessed directly from this page or you can add them to your list of favorites. See Favorites List Page (on page 45). To discover devices on the local subnet: 1. Choose Manage > Discover Devices - Local Subnet. The Discover Devices - Local Subnet page appears. 2.
Chapter 3: Working with Target Servers Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the remote console subnet. To access a discovered device: • Click the device name or IP address for that device. A new browser opens to that device. Note: Both IPv4 and IPv6 addresses are supported. Discovering Devices on the Dominion KX II Subnet This option discovers devices on the device subnet, which is the subnet of the Dominion KX II device IP address itself.
Chapter 3: Working with Target Servers To discover devices on the device subnet: 1. Choose Manage > Discover Devices - Dominion KX II Subnet. The Discover Devices - Dominion KX II Subnet page appears. 2. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Favorites List: 1. Select the checkbox next to the device name/IP address. 2. Click Add.
Chapter 3: Working with Target Servers 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate Dominion KX II device. 2. Click the Edit button. The Edit page appears. 3. Update the fields as necessary: Description IP Address/Host Name - Type the IP address of the Dominion KX II device Port (if necessary) Product Type 4. Click OK.
Chapter 3: Working with Target Servers Logging Out To quit the Dominion KX II Remote Console: • Click Logout in the upper right-hand corner of the page. Note: Logging out also closes any open Virtual KVM Client and serial client sessions. Multi-Platform Client Interface Raritan Multi-Platform Client (MPC) is a graphical user interface for the Raritan product lines, providing remote access to target servers connected to Raritan KVM over IP devices.
Chapter 3: Working with Target Servers Note: Depending on your browser and browser security settings, you may see various security and certificate check and warning messages. It is necessary to accept the options in order to open MPC. Note: If you are using FireFox 3.0.3, you may experience problems launching the application. If this occurs, clear the browser cache and launch the application again.
Chapter 3: Working with Target Servers VKC Toolbar and Shortcut Keys Button Button Name Connection Properties Description Opens the Modify Connection Properties dialog from which you can manually adjust bandwidth options (such as connection speed, color depth, and so forth). Same as choosing Connection > Properties or choosing Connection Properties on the shortcut menu, which is opened by pressing Ctrl+Left Alt+M.
Chapter 3: Working with Target Servers Button Button Name Send Ctrl+Alt+Del Description Sends a Ctrl+Alt+Del hot key combination to the target server. Same as choosing Keyboard > Send Ctrl+Alt+Del. Single Cursor Starts Single Cursor mode in which the Mode local mouse pointer no longer appears onscreen. Same as choosing Mouse > Single Cursor Mode. Press Ctrl+Alt+X to exit this mode. Alternatively, choose Single/Double Cursor from the shortcut menu, which is opened by pressing Ctrl+Left Alt+M.
Chapter 3: Working with Target Servers 3. Choose Switch From in the Port Action menu. The Virtual KVM Client window switches to the new target server you selected. Power Controlling a Target Server Note: These features are available only when you have made power associations. To power cycle a KVM target server: 1. From the Dominion KX II Remote Console, click the Port Access tab. The Port Access page opens. 2. Click the Port Name of the appropriate target server. The Port Action menu appears. 3.
Chapter 3: Working with Target Servers Disconnecting KVM Target Servers Note: This item is not available on the Dominion KX II Local Console. The only way to disconnect from the switched target in the Local Console is to use the hot key. To disconnect a target server: 1. Click the port name of the target you want to disconnect. The Port Action menu appears. 2. Choose Disconnect. Tip: You can also close the Virtual KVM Client window by selecting Connection > Exit from the Virtual KVM menu.
Chapter 3: Working with Target Servers Connection Properties The Dominion KX II dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The Dominion KX II devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
Chapter 3: Working with Target Servers 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) Note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting. But the system will be most responsive when the settings match the real world environment. 3.
Chapter 3: Working with Target Servers Connection Information To obtain information about your Virtual KVM Client connection: • Choose Connection > Connection Info. The Connection Info window opens. The following information is displayed about the current connection: • Device Name - The name of the Dominion KX II device. • IP Address - The IP address of the Dominion KX II device. • Port - The KVM communication TCP/IP port used to access the target device. • Data In/Second - Data rate in.
Chapter 3: Working with Target Servers Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Click Add. The Add Keyboard Macro dialog appears. 3. Type a name for the macro in the Keyboard Macro Name field. This name will appear in the Keyboard menu after it is created. 4. From the Hot-Key Combination field, select a keyboard combination from the drop-down list. This allows you to execute the macro with a predefined keystroke. Optional 5.
Chapter 3: Working with Target Servers 8. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Keyboard Macros dialog appears and lists the new keyboard macro.
Chapter 3: Working with Target Servers 9. Click Close to close the Keyboard Macros dialog. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu.
Chapter 3: Working with Target Servers 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted. Hot-key combinations that coincide with blade chassis switching key sequences will not be sent to blades housed in those chassis. Setting CIM Keyboard/Mouse Options To access the DCIM-USBG2 setup menu: 1. Put the mouse focus on a window such as Note Pad (Windows) or an equivalent.
Chapter 3: Working with Target Servers Video Properties Refresh Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways: • The Refresh Screen command forces a refresh of the video screen. • The Auto-sense Video Settings command automatically detects the target server's video settings. • The Calibrate Color command calibrates the video to enhance the colors being displayed.
Chapter 3: Working with Target Servers Video Settings Use the Video Settings command to manually adjust the video settings. To change the video settings: 1. Choose Video > Video Settings or click the Video Settings button in the toolbar to open the Video Settings dialog. 2. Adjust the following settings as required. As you adjust the settings the effects are immediately visible: a. Noise Filter The Dominion KX II device can filter out the electrical interference of video output from graphics cards.
Chapter 3: Working with Target Servers j. Phase - Phase values range from 0 to 31 and will wrap around. Stop at the phase value that produces the best video image for the active target server. k. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor. l. Vertical Offset - Controls the vertical positioning of the target server display on your monitor. 3. Select Auto Color Calibration to enable this feature. 4.
Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen. Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot from Target server command. You save this screenshot to a file location of your choosing and can save it as either a bitmap, JPEG, or PNG file.
Chapter 3: Working with Target Servers 3. Click Save to save the screenshot. Mouse Options When controlling a target server, the Dominion KX II Remote Console displays two mouse cursors: one belonging to your client workstation and the other belonging to the target server. You can operate in either single mouse mode or dual mouse mode. When in dual mouse mode, and provided the option is properly configured, the mouse cursors will align.
Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, you will see two mouse cursors: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode • Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place. • Do not use an animated mouse. • Disable active desktop on KVM target servers. Synchronize Mouse In dual mouse mode, the Synchronize Mouse command forces realignment of the target server mouse pointer with Virtual KVM Client mouse pointer.
Chapter 3: Working with Target Servers Intelligent Mouse Mode In Intelligent Mouse mode, the Dominion KX II device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. In this mode, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acceleration. For this mode to work properly, certain conditions must be met. To enter intelligent mouse mode: • Choose Mouse > Intelligent.
Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed. This mode is supported on servers with USB ports.
Chapter 3: Working with Target Servers To exit single mouse mode: 1. Press Ctrl+Alt+O on your keyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media for complete information about setting up and using virtual media. Tool Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client, including logging, setting the keyboard type, and defining hot keys for exiting Full Screen mode and Single Cursor mode. To set the tools options: 1.
Chapter 3: Working with Target Servers 5. Exit Single Cursor Mode - Hotkey. When you enter single cursor mode, only the target server mouse cursor is visible. This is the hot key used to exit single cursor mode and bring back the client mouse cursor. 6. Click OK. Keyboard Limitations Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
Chapter 3: Working with Target Servers View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off): • Choose View > View Toolbar. Scaling Scaling your target window allows you to view the entire contents of the target server window.
Chapter 3: Working with Target Servers Help Options About Raritan Virtual KVM Client This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support. To obtain version information: • Choose Help > About Raritan Virtual KVM Client. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file so it can be accessed later when dealing with support (if needed).
Chapter 4 Virtual Media In This Chapter Overview..................................................................................................77 Prerequisites for Using Virtual Media ......................................................79 File Server Setup (File Server ISO Images Only) ...................................80 Using Virtual Media .................................................................................81 Connecting to Virtual Media ................................................
Chapter 4: Virtual Media Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client PC and network file servers. With this feature, media mounted on a client PC and network file servers is essentially "mounted virtually" by the target server. The target server can then read from and written to that media as if it were physically connected to the target server itself.
Chapter 4: Virtual Media 78
Chapter 4: Virtual Media Diagram key Desktop PC CD/DVD drive Dominion KX II USB mass storage device CIM PC hard drive Target server Remote file server (ISO images) Prerequisites for Using Virtual Media With the Dominion KX II virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session.
Chapter 4: Virtual Media If you would prefer not to change Vista account permissions, run Internet Explorer as an administrator. To do this, click the Start Menu, locate IE, right-click it and select Run as Administrator. Target Server • KVM target servers must support USB connected drives. • KVM target servers running Windows 2000 must have all of the recent patches installed. • USB 2.0 ports are both faster and preferred.
Chapter 4: Virtual Media 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog. Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of third-party software used by the KX2. Using Virtual Media With the Dominion KX II virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target.
Chapter 4: Virtual Media If you would prefer not to change Vista account permissions, run Internet Explorer as an administrator. To do this, click the Start Menu, locate IE, right-click it and select Run as Administrator. Target Server • KVM target servers must support USB connected drives. • KVM target servers running Windows 2000 must have all of the recent patches installed. • USB 2.0 ports are both faster and preferred.. 1.
Chapter 4: Virtual Media Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives. This is the only option for which Read/Write is available.
Chapter 4: Virtual Media 4. Click Connect. The media will be mounted on the target server virtually. You can access the media just like any other drive. Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations: • For all hard drives. • When the drive is write-protected. • When the user does not have Read/Write permission: Port Permission Access is set to None or View. Port Permission VM Access is set to Read-Only or Deny.
Chapter 4: Virtual Media b. Choose the drive from the Local CD/DVD Drive drop-down list. All available internal and external CD and DVD drive names will be populated in the drop-down list. c. Click Connect. 3. For ISO images: a. Choose the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive. ISO format is the only format supported. b. Click the Browse button. c. Navigate to the path containing the disk image you want to use and click Open.
Chapter 4: Virtual Media Disconnecting Virtual Media To disconnect the virtual media drives: • For local drives, choose Virtual Media > Disconnect Drive. • For CD-ROM, DVD-ROM, and ISO images, choose Virtual Media > Disconnect CD-ROM/ISO Image. Note: In addition to disconnecting the virtual media using the Disconnect command, simply closing the KVM connection closes the virtual media as well.
Chapter 5 USB Profiles In This Chapter Overview..................................................................................................87 CIM Compatibility ....................................................................................88 Available USB Profiles.............................................................................88 Selecting Profiles for a KVM Port ............................................................
Chapter 5: USB Profiles CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. A VM-CIM that has not had its firmware upgraded will support a broad range of configurations (Keyboard, Mouse, CD-ROM, and Removable Drive) but will not be able to make use of profiles optimized for particular target configurations. Given this, existing VM-CIMs should be upgraded with latest firmware in order to access USB profiles.
Chapter 5: USB Profiles USB profile BIOS DellOptiplex Keyboard Only Description Dell Optiplex BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell Optiplex BIOS when using D2CIM-VUSB. When using the new D2CIM-DVUSB, use 'Generic' profile.
Chapter 5: USB Profiles USB profile BIOS DellPowerEdge Keyboard Only Description Dell PowerEdge BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB. When using the new D2CIM-DVUSB, use 'Generic' profile.
Chapter 5: USB Profiles USB profile BIOS Generic Description BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.
Chapter 5: USB Profiles USB profile BIOS Lenovo ThinkPad T61 & X61 Description BIOS Lenovo ThinkPad T61 and X61 (boot from Virtual Media) Use this profile to boot the T61 and X61 series laptops from Virtual Media. Restrictions: • BIOS Mac USB bus speed limited to full-speed (12 MBit/s) BIOS Mac Use this profile for Mac BIOS.
Chapter 5: USB Profiles USB profile Description HP Proliant DL360/DL380 G4 HP Proliant DL360/DL380 G4 (Windows 2003 Server (Windows 2003 Server Installation) Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server when installing Windows 2003 Server without the help of HP SmartStart CD.
Chapter 5: USB Profiles USB profile Supermicro Mainboard Phoenix (AwardBIOS) Description Supermicro Mainboard Phoenix AwardBIOS Use this profile for the Supermicro series mainboards with Phoenix AwardBIOS. Restrictions: • Suse 9.2 Virtual CD-ROM and disk drives cannot be used simultaneously SuSE Linux 9.2 Use this for SuSE Linux 9.2 distribution.
Chapter 5: USB Profiles USB profile Troubleshooting 3 Description Troubleshooting Profile 3 • Mass Storage first • Keyboard and Mouse (Type 2) • USB bus speed limited to full-speed (12 MBit/s) • Virtual CD-ROM and disk drives cannot be used simultaneously WARNING: USB enumeration will trigger whenever Virtual Media is connected or disconnected.
Chapter 6 User Management In This Chapter User Groups ............................................................................................96 Users .....................................................................................................105 Authentication Settings..........................................................................108 Changing a Password ...........................................................................
Chapter 6: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group. The User Group List page displays a list of all user groups, which can be sorted in ascending or descending order by clicking on the Group Name column heading.
Chapter 6: User Management The Group page is organized into the following categories: Group, Permissions, Port Permissions, and IP ACL. 2. Type a descriptive name for the new user group into the Group Name field (up to 30 characters). Set the permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 103). 1. Set the port permissions.
Chapter 6: User Management Note: Several administrative functions are available within MPC and from the Dominion KX II Local Console. These functions are available only to members of the default Admin group. Note: Both IPv4 and IPv6 addresses are supported.
Chapter 6: User Management 100
Chapter 6: User Management Setting Port Permissions For each server port, you can specify the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setting for all permissions is Deny. Port Access Option Description Deny Denied access completely View View the video (but not interact with) the connected target server Control Control the connected target server.
Chapter 6: User Management This feature limits access to the Dominion KX II device by users in the selected group to specific IP addresses. This feature applies only to users belonging to a specific group, unlike the IP Access Control List feature that applies to all access attempts to the device, is processed first, and takes priority. Important: The IP address 127.0.0.1 is used by the Dominion KX II Local Port and cannot be blocked.
Chapter 6: User Management 2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number. To delete a rule: 1. Specify the rule number you want to delete. 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the order in which they are listed.
Chapter 6: User Management Permission Description Security SSL certificate, security settings (VM Share, PC-Share), IP ACL User Management User and group management, remote authentication (LDAP/LDAPS/RADIUS), login settings Setting Permissions for an Individual Group To set permissions for an individual user group: 1. Locate the group from among the groups listed. Individual groups can be identified by the @ in the Group Name. 2. Click the Group Name. The Group page opens. 3.
Chapter 6: User Management Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Choose a group from among those listed by checking the checkbox to the left of the Group Name. 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and passwords to gain access to the Dominion KX II. This information is used to authenticate users attempting to access your Dominion KX II.
Chapter 6: User Management Adding a New User It is a good idea to define user groups before creating Dominion KX II users because, when you add a user, you must assign that user to an existing user group. See Adding a New User Group (on page 97). From the User page, you can add new users, modify user information, and reactivate users that have been deactivated.
Chapter 6: User Management 5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK. Logging a User Off (Force Logoff) If you are an administrator, you are able to log out another locally authenticated user who is logged on to the Dominion KX II. To log out a user: 1. Open the User List page by choosing User Management > User List or click the Connected User link in the left panel of the page. 2.
Chapter 6: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed. This is called authorization. When the Dominion KX II is configured for remote authentication, the external authentication server is used primarily for the purposes of authentication, not authorization.
Chapter 6: User Management Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn. Reminder: Microsoft Active Directory functions natively as an LDAP/LDAPS authentication server.
Chapter 6: User Management 10. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is enabled when the Enable Secure LDAP checkbox is selected. 11. Certificate File - Consult your authentication server administrator to get the CA certificate file in Base64 encoded X-509 format for the LDAP/LDAPS server. Use the Browse button to navigate to the certificate file. This field is enabled when the Enable Secure LDAP option is selected. 12.
Chapter 6: User Management 15. Active Directory Domain. Type the name of the Active Directory Domain. For example, testradius.com. Consult with your Active Directive Administrator for a specific domain name. Note: Both IPv4 and IPv6 addresses are supported.
Chapter 6: User Management Returning User Group Information from Active Directory Server The Dominion KX II supports user authentication to Active Directory (AD) without requiring that users be defined locally on the Dominion KX II. This allows Active Directory user accounts and passwords to be maintained exclusively on the AD server.
Chapter 6: User Management Implementing RADIUS Remote Authentication Remote Authentication Dial-in User Service (RADIUS) is an AAA (authentication, authorization, and accounting) protocol for network access applications. To use the RADIUS authentication protocol: 1. Click User Management > Authentication Settings to open the Authentication Settings page. 2. Click the RADIUS radio button to enable the RADIUS section of the page. 3. Click the page. icon to expand the RADIUS section of the 4.
Chapter 6: User Management CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PAP. Note: Both IPv4 and IPv6 addresses are supported.
Chapter 6: User Management Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the Dominion KX II determines the permissions for a given user based on the permissions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
Chapter 6: User Management Attribute Data Log in Log out Accounting-Request(4) 116 Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-Port (5) Always 0. NAS-IP-Address (4) The IP address for the Dominion KX II. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting.
Chapter 6: User Management User Authentication Process When the device is configured to authenticate and authorize local users from CC, the order in which the user credentials are validated follows the following process: 117
Chapter 6: User Management Remote authentication follows the process specified in the flowchart below: 118
Chapter 6: User Management Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field. Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and special characters. 4. Click OK. 5.
Chapter 7 Device Management In This Chapter Network Settings ...................................................................................120 Device Services.....................................................................................125 Modem Settings.....................................................................................125 Configuring Date/Time Settings ............................................................127 Event Management ...........................................
Chapter 7: Device Management Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings (on page 120). 1. Choose Device Settings > Network. The Network Settings page opens. 2. Specify a meaningful Device Name for your Dominion KX II device. Up to 32 alphanumeric characters using valid special characters and no spaces. 3.
Chapter 7: Device Management e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present. Read-Only f. Zone ID. This identifies the device with which the address is associated. Read-Only g. Select the IP Auto Configuration. The following options are available: None - Use this option if you do not want an auto IP configuration and prefer to set the IP address yourself (static IP).
Chapter 7: Device Management See LAN Interface Settings (on page 123) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues. In these instances, setting the Dominion KX II LAN Interface Speed & Duplex field to 100 Mbps/Full Duplex (or whatever option is appropriate to your network) addresses the issue.
Chapter 7: Device Management 10 Mbps/Half - Both LEDs blink 10 Mbps/Full - Both LEDs blink 100 Mbps/Half - Yellow LED blinks 100 Mbps/Full - Yellow LED blinks 1000 Mbps/Full (gigabit) - Green LED blinks Half-duplex provides for communication in both directions, but only one direction at a time (not simultaneously). Full-duplex allows communication in both directions simultaneously. Note: Occasionally there are problems running at 10 Mbps in either half or full duplex.
Chapter 7: Device Management 128 Kilobit 5. Click OK to apply the LAN settings. Device Services 1. Choose Device Settings > Device Services. The Device Service Settings page appears. 2. Enter the Discovery Port. The Dominion KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can configure it to use any TCP port except 80 and 443.
Chapter 7: Device Management 4. Enter the initial modem string in the Modem Init String field. If the modem string is left blank, the following string is sent to the modem by default: ATZ OK AT OK. This information is used to configure modem settings. Because different modems have different ways of settings these values, this document does not specify how to set these values, rather the user should refer to the modem to create the appropriate modem-specific string.
Chapter 7: Device Management 6. Click OK to commit your changes or click Reset to Defaults to return the settings to their defaults. See Certified Modems (on page 245) for information on certified modems that work with the Dominion KX II. For information on settings that will give you the best performance when connecting to the Dominion KX II via modem, see Creating, Modifying and Deleting Profiles in MPC Generation 2 Devices in the KVM and Serial Access Clients Guide.
Chapter 7: Device Management 2. Choose your time zone from the Time Zone drop-down list. 3. To adjust for daylight savings time, check the "Adjust for daylight savings time" checkbox. 4. Choose the method you would like to use to set the date and time: User Specified Time - Choose this option to input the date and time manually. For the User Specified Time option, enter the date and time. For the time, use the hh:mm format (using a 24-hour clock).
Chapter 7: Device Management Event Management The Dominion KX II Event Management feature provides a set of screens for enabling and disabling the distribution of system events to SNMP Managers, Syslog, and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or several destinations.
Chapter 7: Device Management 2. Type the IP Address/Host Name of your Syslog server in the IP Address field. 3. Click OK. To reset to factory defaults: • Click Reset To Defaults. Note: Both IPv4 and IPv6 addresses are supported. Note: IPv6 addresses cannot exceed 80 characters in length for the host name.
Chapter 7: Device Management Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management - Destinations page to select the system events to track and where to send this information. Note: SNMP traps will be generated only if the SNMP Logging Enabled option is selected. Syslog events will be generated only if the Enable Syslog Forwarding option is selected.
Chapter 7: Device Management 3. Click OK.
Chapter 7: Device Management To reset to factory defaults: • Click Reset To Defaults. Warning: When using SNMP traps over UDP, it is possible for the Dominion KX II and the router that it is attached to to fall out of synchronization when the Dominion KX II is rebooted, preventing the reboot completed SNMP trap from being logged. SNMP Agent Configuration SNMP-compliant devices, called agents, store data about themselves in Management Information Bases (MIBs) and return this data to the SNMP managers.
Chapter 7: Device Management 134 Trap Name Description ipConflictResolved An IP Address conflict was resolved. networkFailure An Ethernet interface of the product can no longer communicate over the network. networkParameterChanged A change has been made to the network parameters. passwordSettingsChanged Strong password settings have changed. portConnect A previously authenticated user has begun a KVM session. portConnectionDenied A connection to the target port was denied.
Chapter 7: Device Management Trap Name Description userModified A user account has been modified. userPasswordChanged This event is triggered if the password of any user of the device is modified. userSessionTimeout A user with an active session has experienced a session termination due to timeout. userUploadedCertificate A user uploaded a SSL certificate. vmImageConnected User attempted to mount either a device or image on the target using Virtual Media.
Chapter 7: Device Management 2. If you are plugging power input into power supply number one (left-most power supply at the back of the unit), then select the Powerln1 Auto Detect option. 3. If you are plugging power input into power supply number two (right-most power supply at the back of the unit), then select the Powerln2 Auto Detect option. 4. Click OK. Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the unit turns red.
Chapter 7: Device Management Configuring Ports The Port Configuration page displays a list of the Dominion KX II ports. Ports connected to KVM target servers (blades and standard servers) and power strips are displayed in blue and can be edited. For ports with no CIM connected or with a blank CIM name, a default port name of Dominion-KX2_Port# is assigned, where Port# is the number of the Dominion KX II physical port. To access a port configuration: 1. Choose Device Settings > Port Configuration.
Chapter 7: Device Management Port Type Port type Description DCIM Dominion CIM Not Available No CIM connected PCIM Paragon CIM PowerStrip Power CIM VM Virtual Media CIM (D2CIM-VUSB and D2CIM-DVUSB) Blade Chassis Blade chassis and the blades associated with that chassis (displayed in a hierarchical order) 2. Click the Port Name for the port you want to edit. For KVM ports, the Port page is opened. From this page, you can name the ports and create power associations.
Chapter 7: Device Management Connecting a Power Strip To connect the power strip: 1. Connect the male RJ-45 of the D2CIM-PWR to the female RJ-45 connector on the power strip. 2. Connect the female RJ-45 connector of the D2CIM-PWR to any of the available female system port connectors on the Dominion KX II using a straight through Cat5 cable. 3. Attach an AC power cord to the target server and an available power strip outlet. 4. Connect the power strip to an AC power source. 5.
Chapter 7: Device Management 2. Connect the female RJ-45 connector of the D2CIM-PWR to any of the available female system port connectors on the Dominion KX II using a straight through Cat5 cable. 3. Attach an AC power cord to the target server and an available power strip outlet. 4. Connect the power strip to an AC power source. 5. Power on the Dominion KX II device.
Chapter 7: Device Management Naming the Power Strip (Port Page for Power Strips) This Port page opens when you select a port from the Port Configuration page that is connected to a Raritan remote power strip. The Type and the Name fields are prepopulated. Note: The (CIM) Type cannot be changed. The following information is displayed for each outlet in the power strip: [Outlet] Number, Name, and Port Association. Use this page to name the power strip and its outlets.
Chapter 7: Device Management 3. Click OK.
Chapter 7: Device Management Manage KVM Target Servers Associated with Outlets (Port Page) This Port page opens when you select a port from the Port Configuration page that is connected to a target server. From this page, you can make power associations, change the port name to something more descriptive, and update target server settings if you are using the D2CIM-VUSB CIM. The (CIM) Type and the (Port) Name fields are prepopulated; note that the CIM type cannot be changed.
Chapter 7: Device Management Removing Power Associations Do not physically remove a power strip from the Dominion KX II without first removing the power strip association in Device Settings. When a target has been associated with a power strip and the target is removed from the Dominion KX II, the power association remains. When this occurs, you are not able to access the Port Configuration for that disconnected target server in Device Settings so that the power association can be properly remove.
Chapter 7: Device Management Configuring Blade Chassis In addition to standard servers and power strips, the Dominion KX II offers you the ability to control blade chassis that are plugged into a Dominion KX II port. Up to eight blade chassis can be managed through the Dominion KX II at a given time. As with standard servers, blade chassis are autodetected by the Dominion KX II once they are connected.
Chapter 7: Device Management The Dominion KX II also supports use of hot key sequences to switch KVM access to a blade chassis. For blade chassis that allow users to select a hot key sequence, those options will be provided on the Port Configuration page. For blade chassis that come with predefined hot key sequences, those sequences will be prepopulated on the Port Configuration page once the blade chassis is selected.
Chapter 7: Device Management If you move a blade chassis from one KX II port to another KX II port, interfaces that were added to the blade chassis node in CC-SG will be lost in CC-SG. All other information will be retained.
Chapter 7: Device Management Generic Blade Chassis Configuration The Generic Blade Chassis' selection provides only a manual configuration mode of operation. See Supported Blade Chassis Models (on page 160), Supported CIMs for Blade Chassis (on page 161), and Required and Recommended Blade Chassis Configurations (on page 163) for important, additional information when configuring the blade chassis. 1. Connect the blade chassis to the Dominion KX II.
Chapter 7: Device Management The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access to the URL links entered in this section of the page is governed by the blade chassis port permissions. a. Active - To activate the link once it is configured, select the Active checkbox. Leave the checkbox deselected to keep the link inactive. Entering information into the link fields and saving can still be done even if Active is not selected.
Chapter 7: Device Management 3. On the Port Configuration page, click on the name of the blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio button. The page will then display the necessary fields to configure a blade chassis. 5. Select the Dell blade chassis model from the Blade Server Chassis Model drop-down. To configure a Dell PowerEdge M1000e: 1. If you selected Dell PowerEdge M1000e, auto-discovery is available. Configure the blade chassis as applicable.
Chapter 7: Device Management If operating in Auto-discovery mode, the Installed box will display the slots containing blades during discovery. 5. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon page. to expand the section on the The first URL link is intended for use to connect to the blade chassis Administration Module GUI.
Chapter 7: Device Management b. Maximum Number of Slots - The default maximum number of slots available on the blade chassis is automatically entered. c. Administrative Module Primary IP Address/Host Name - Not applicable. d. Port Number - The default port number for the blade chassis is 22. Not applicable. e. Username - Not applicable. f. Password - Not applicable. 2. Change the blade chassis name if needed. 3.
Chapter 7: Device Management e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be associated with the username and password entries. It is in these fields you should enter the field names for the username and password fields used on the login screen for the web application. You can view the HTML source of the login screen to find the field names, not the field labels.
Chapter 7: Device Management d. Port Number - The default port number for the blade chassis is 22. Change the port number if applicable. Required for auto-discovery mode e. Username - Enter the username used to access the blade chassis. Required for auto-discovery mode f. Password - Enter the password used to access the blade chassis. Required for auto-discovery mode 2.
Chapter 7: Device Management Note: Leave the username and password fields blank for DRAC, ILO, and RSA web applications or the connection will fail. e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be associated with the username and password entries. It is in these fields you should enter the field names for the username and password fields used on the login screen for the web application.
Chapter 7: Device Management 4. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon page. to expand the section on the The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access to the URL links entered in this section of the page is governed by the blade chassis port permissions. a.
Chapter 7: Device Management Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web application associated with an RSA, DRAC or ILO Processor card. You must have DNS configured or URLs will not resolve. You do not need to have DNS configured for IP addresses. To add a web browser interface: 1.
Chapter 7: Device Management HP® Blade Chassis Configuration (Port Group Management) The Dominion KX II supports the aggregation of ports connected to certain types of blades into a group representing the blade chassis. Specifically, HP BladeServer blades and Dell PowerEdge 1855/1955 blades when the DellPowerEdge 1855/1955 is connected from each individual blade to a port on the Dominion KX II.
Chapter 7: Device Management 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. Select the Blade Server Group checkbox. If you want to designate that these ports are attached to blades housed in a blade chassis (for example, HP c3000 or Dell PowerEdge 1855), select the Blade Server Group checkbox.
Chapter 7: Device Management To delete a port group: 1. Click on the Port Group Management page, select the checkbox of the port group you want to delete. 2. Click the Delete button. 3. Click OK on the warning message. Supported Blade Chassis Models This table contains the blade chassis models that are supported by the Dominion KX II and the corresponding profiles that should be selected per chassis model when configuring them in the Dominion KX II application.
Chapter 7: Device Management Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the Dominion KX II: • DCIM-PS2 • DCIM-USBG2 • D2CIM-VUSB • D2CIM-DVUSB Following is a table containing supported CIMs for each blade chassis model that the Dominion KX II supports.
Chapter 7: Device Management Blade chassis Connection method Dell PowerEdge M1000e The KVM Switch Module (iKVM) is Integrated with this chassis. Recommended CIM(s) • DCIM-USBG2 The iKVM is compatible with the following peripherals: • USB keyboards, USB pointing devices • VGA monitors with DDC support. Source: Dell Chassis Management Controller, Firmware Version 1.
Chapter 7: Device Management Blade chassis Connection method IBM BladeCenter E The current model BladeCenter E chassis (8677-3Rx) ships standard with one Advanced Management Module. Recommended CIM(s) • DCIM-USBG2 • D2CIM-DVUSB Source: IBM BladeCenter Products and Technology IBM BladeCenter T The BladeCenter T chassis ships standard with • one Advanced Management Module.
Chapter 7: Device Management Blade chassis Dell PowerEdge M1000e 164 Required/recommended action • Disable the iKVM GUI screensaver. An authorize dialog will appear, preventing iKVM from working correctly, if this is not done. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM. iKVM may not work correctly if this is not done. • Configure the iKVM GUI Main menu to select target blades by Slot, not by Name. iKVM may not work correctly if this is not done.
Chapter 7: Device Management Blade chassis Dell PowerEdge 1855/1955 IBM/Dell Auto-Discovery IBM KX2 Virtual Media Required/recommended action • Disable the iKVM GUI screensaver. An Authorize dialog will appear if this is not done and will prevent the iKVM from operating correctly. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM. iKVM may not work correctly if this is not done. • Configure the iKVM GUI Main menu to select target blades by Slot, not by Name.
Chapter 7: Device Management Blade Chassis Sample URL Formats This table contains sample URL formats for blade chassis being configured in the Dominion KX II. Blade chassis Dell M1000e Dell 1855 IBM BladeCenter E or H 166 Sample URL format • URL: https://192.168.60.44/cgi-bin/webcgi/login • Username: root • Username Field: user • Password: calvin • Password Field: password • URL: https://192.168.60.
Chapter 7: Device Management Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles for Port section of the Port page. The USB profiles chosen in the Port page become the profiles available to the user in VKC when connecting to a KVM target server from the port. The default is the Windows 2000/XP/Vista profile. For information about USB profiles, see USB Profiles (on page 87).
Chapter 7: Device Management Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appear in the Selected list. These are the profiles that can be use for the KVM target server connected to the port. To specify a preferred USB profile: 1. After selecting the available profiles for a port, choose one from the Preferred Profile for Port menu. The default is Generic. The selected profile will be used when connecting to the KVM target server.
Chapter 7: Device Management 2. Click Remove. The selected profiles appear in the Available list. These profiles are no longer available for a KVM target server connected to this port. To apply a profile selection to multiple ports: 1. In the Apply Selected Profiles to Other Ports section, select the Apply checkbox for each KVM port you want to apply the current set of selected USB profiles to. To select all KVM ports, click Select All. To deselect all KVM ports, click Deselect All.
Chapter 7: Device Management 2. Select the checkbox next to the Standard Local Port to enable it. Deselect the checkbox to disable it. By default, the Standard Local port is enabled but can be disabled as needed. 3. If you are using a KX2-832 or KX2-864 device, select the checkbox next to the Extended Local Port to enable it. Deselect the checkbox(s) to disable it. If both the Standard Local Port and Extended Local Port are disabled, the local ports cannot be accessed.
Chapter 7: Device Management 5. Choose the local port hotkey. The local port hotkey is used to return to the Dominion KX II Local Console interface when a target server interface is being viewed.
Chapter 7: Device Management None. There is no authentication for Local Console access. This option is recommended for secure environments only. Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is under CC-SG management.
Chapter 7: Device Management KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two local port options: the Standard Local port and the Extended Local port. Each of these port options is enabled and disabled from the Remote Console on the Port Configuration page or from the Local Console on the Local Port Settings page (see Configuring Dominion KX II Local Port Settings (on page 169)).
Chapter 8 Powerstrip Outlet Control In This Chapter Overview................................................................................................174 Turning Outlets On/Off and Cycling Power ...........................................175 Overview The Dominion KX II allows you to control PX and Baytech powerstrip outlets connected to the Dominion KX II through a D2CIM-PWR. Note: For information on setting up a PX, see the Dominion PX User Guide.
Chapter 8: Powerstrip Outlet Control Initially, when you open the Powerstrip page, the powerstrips that are currently connected to the Dominion KX II are displayed in the Powerstrip drop-down. Additionally, information relating to the currently selected powerstrip is displayed. The name, state, and powerstrip port associations are not displayed, nor are the on, off, and cycle controls. Click the Refresh button to view this information and the outlet controls.
Chapter 8: Powerstrip Outlet Control 4. Click On. 5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its state will be displayed as 'on'. To turn an outlet off: 1. Click Off. 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The outlet will be turned off and its state will be displayed as 'off'. To cycle the power of an outlet: 1. Click the Cycle button. The Power Cycle Port dialog opens.
Chapter 8: Powerstrip Outlet Control 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog.
Chapter 9 Security Management In This Chapter Security Settings....................................................................................178 Checking Your Browser for AES Encryption .........................................185 Configuring IP Access Control ..............................................................185 SSL Certificates.....................................................................................
Chapter 9: Security Management To reset back to defaults: • Click Reset to Defaults. Login Limitations Using login limitations, you can specify restrictions for single login, password aging, and the logging out idle users. Limitation Description Enable single login limitation When selected, only one login per user name is allowed at any time. When deselected, a given user name/password combination can be connected into the device from several client workstations simultaneously.
Chapter 9: Security Management Limitation Description Enable password aging When selected, all users are required to change their passwords periodically based on the number of days specified in Password Aging Interval field. This field is enabled and required when the Enable Password Aging checkbox is selected. Enter the number of days after which a password change is required. The default is 60 days.
Chapter 9: Security Management Field Description Maximum length of strong password The default is 16, but can be up to 64 characters long. Enforce at least one lower case character When checked, at least one lower case character is required in the password. Enforce at least one upper case character When checked, at least one upper case character is required in the password. Enforce at least one numeric character When checked, at least one numeric character is required in the password.
Chapter 9: Security Management Option Description Timer Lockout Users are denied access to the system for the specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled: Attempts - The number of unsuccessful login attempts after which the user will be locked out. The valid range is 1 - 10 and the default is 3 attempts. Lockout Time - The amount of time for which the user will be locked out.
Chapter 9: Security Management Encryption mode Description Auto This is the recommended option. The Dominion KX II autonegotiates to the highest level of encryption possible. RC4 Secures user names, passwords and KVM data, including video transmissions using the RSA RC4 encryption method. This is a 128-bit Secure Sockets Layer (SSL) protocol that provides a private communications channel between the Dominion KX II device and the Remote PC during initial connection authentication.
Chapter 9: Security Management Private - No PC share. This is the default mode. Each target server can be accessed exclusively by only one user at a time. PC-Share - KVM target servers can be accessed by up to eight users (administrator or non-administrator) at one time. Each remote user has equal keyboard and mouse control, however, note that uneven control will occur if one user does not stop typing or moving the mouse. 4. If needed, select VM Share Mode.
Chapter 9: Security Management Checking Your Browser for AES Encryption The Dominion KX II supports AES-256. If you do not know if your browser uses AES, check with the browser manufacturer or navigate to the https://www.fortify.net/sslcheck.html website using the browser with the encryption method you want to check. This website detects your browser's encryption method and displays a report. Note: IE6 does not support AES 128 or 256-bit encryption.
Chapter 9: Security Management 3. Choose the Default Policy. This is the action taken for IP addresses that are not within the ranges you specify. Accept - IP addresses are allowed access to the Dominion KX II device. Drop - IP addresses are denied access to the Dominion KX II device. Note: Both IPv4 and IPv6 addresses are supported. To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/Mask or IPv6/Prefix Length field.
Chapter 9: Security Management 2. Click Delete. 3. You are prompted to confirm the deletion. Click OK.
Chapter 9: Security Management SSL Certificates The Dominion KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the Dominion KX II has to identify itself to a client using a cryptographic certificate. It is possible to generate a Certificate Signing Request (CSR) and install a certificate signed by the Certificate Authority (CA) on the Dominion KX II.
Chapter 9: Security Management 2. Complete the following fields: a. Common name - The network name of the Dominion KX II once it is installed in the user's network (usually the fully qualified domain name). It is identical to the name that is used to access the Dominion KX II with a web browser but without the prefix “http://”. In case the name given here and the actual network name differ, the browser will pop up a security warning when the Dominion KX II is accessed using HTTPS. b.
Chapter 9: Security Management To upload a CSR: 1. Upload the certificate to the Dominion KX II by clicking the Upload button. Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed certificate is not matched with the private key used to generate the original CSR, the certificate will not be useful. This applies to uploading and downloading the CSR and private key files.
Chapter 10 Maintenance In This Chapter Audit Log................................................................................................191 Device Information.................................................................................192 Backup and Restore ..............................................................................193 USB Profile Management ......................................................................195 Upgrading CIMs................................................
Chapter 10: Maintenance Device Information The Device Information page provides detailed information about your Dominion KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. To view information about your Dominion KX II and CIMs: • Choose Maintenance > Device Information. The Device Information page opens.
Chapter 10: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your Dominion KX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another Dominion KX II by backing up the user configuration settings from the Dominion KX II in use and restoring those configurations to the new Dominion KX II.
Chapter 10: Maintenance To restore your Dominion KX II: WARNING: Exercise caution when restoring your Dominion KX II to an earlier version. Usernames and password in place at the time of the backup will be restored. If you do not remember the old administrative usernames and passwords, you will be locked out of the Dominion KX II. In addition, if you used a different IP address at the time of the backup, that IP address will be restored as well.
Chapter 10: Maintenance USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech support. These profiles are designed to address the needs of your target server’s configuration, in the event that the set of standard profiles does not already address them. Raritan tech support will provide the custom profile and work with you to verify the solution for your target server’s specific needs.
Chapter 10: Maintenance As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so will terminate any Virtual Media sessions that were in place. Handling Conflicts in Profile Names A naming conflict between custom and standard USB profiles may occur when a firmware upgrade is performed.
Chapter 10: Maintenance 3. Click the Upgrade button. You are prompted to confirm the upgrade. 4. Click OK to continue the upgrade. Progress bars are displayed during the upgrade. Upgrading takes approximately 2 minutes or less per CIM. Upgrading Firmware Use the Firmware Upgrade page to upgrade the firmware for your Dominion KX II and all attached CIMs. This page is available in the Dominion KX II Remote Console only.
Chapter 10: Maintenance 6. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed for your confirmation (if you opted to review CIM information, that information is displayed as well): Note: At this point, connected users are logged out, and new login attempts are blocked. 7. Click Upgrade. Please wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade.
Chapter 10: Maintenance For information about upgrading the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Client Guide. Note: Firmware upgrades are not supported via modem. Upgrade History The Dominion KX II provides information about upgrades performed on the Dominion KX II and attached CIMS. To view the upgrade history: • Choose Maintenance > Upgrade History. The Upgrade History page opens.
Chapter 10: Maintenance users will be logged off. To reboot your Dominion KX II: 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot.
Chapter 10: Maintenance Stopping CC-SG Management While the Dominion KX II is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC-SG management. If you are managing the Dominion KX II through CC-SG and connectivity between CC-SG and the Dominion KX II is lost after the specified timeout interval (typically 10 minutes), you are able to end the CC-SG management session from the Dominion KX II console.
Chapter 10: Maintenance 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
Chapter 11 Diagnostics In This Chapter Network Interface Page .........................................................................203 Network Statistics Page.........................................................................204 Ping Host Page......................................................................................206 Trace Route to Host Page .....................................................................206 Device Diagnostics ...................................................
Chapter 11: Diagnostics Network Statistics Page The Dominion KX II provides statistics about your network interface. To view statistics about your network interface: 1. Choose Diagnostics > Network Statistics. The Network Statistics page opens. 2. Choose the appropriate option from the Options drop-down list: 204 Statistics - Produces a page similar to the one displayed here.
Chapter 11: Diagnostics Interfaces - Produces a page similar to the one displayed here. Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.
Chapter 11: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another Dominion KX II is accessible. To ping the host: 1. Choose Diagnostics > Ping Host. The Ping Host page appears. 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232 characters in length. 3. Click Ping.
Chapter 11: Diagnostics 2. Type either the IP address or host name into the IP Address/Host Name field. Note: The host name cannot exceed 232 characters in length. 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The output of trace route is displayed in the Result field.
Chapter 11: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. Device diagnostics downloads the diagnostics information from the Dominion KX II to the client machine. Two operations can be performed on this page: • Execute a special diagnostics script provided by Raritan Technical Support during a critical error debugging session. The script is uploaded to the device and executed.
Chapter 11: Diagnostics a. Click the Save to File button. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
Chapter 12 Command Line Interface (CLI) In This Chapter Overview................................................................................................210 Accessing the Dominion KX II Using CLI ..............................................211 SSH Connection to the Dominion KX II.................................................211 Telnet Connection to the Dominion KX II ..............................................212 Logging In ....................................................................
Chapter 12: Command Line Interface (CLI) Accessing the Dominion KX II Using CLI Access the Dominion KX II by using one of the following methods: • Telnet via IP connection • SSH (Secure Shell) via IP connection • Local Port-via RS-232 serial interface A number of SSH/Telnet clients are available and can be obtained from the following locations: • Putty - http://www.chiark.greenend.org.uk/~sgtatham/putty/ http://www.chiark.greenend.org.uk/~sgtatham/putty/ • SSH Client from ssh.com - www.ssh.
Chapter 12: Command Line Interface (CLI) SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX/Linux workstation and log in as the user admin, enter the following command: ssh -l admin 192.168.30.222 The Password prompt appears. See Logging In (on page 213). Note: Both IPv4 and IPv6 addresses are supported. Telnet Connection to the Dominion KX II Due to the lack of security, user name, password and all traffic is in clear-text on the wire. Telnet access is disabled by default.
Chapter 12: Command Line Interface (CLI) Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default password: raritan The welcome message displays. You are now logged on as an administrator. After reviewing the following Navigation of the CLI (on page 214) section, perform the Initial Configuration tasks.
Chapter 12: Command Line Interface (CLI) Navigation of the CLI Before using the CLI, it is important to understand CLI navigation and syntax. There are also some keystroke combinations that simplify CLI use. Completion of Commands The CLI supports the completion of partially-entered commands. After entering the first few characters of an entry, press the Tab key. If the characters form a unique match, the CLI will complete the entry.
Chapter 12: Command Line Interface (CLI) Common Commands for All Command Line Interface Levels Following are the commands that are available at all CLI levels. These commands also help navigate through the CLI. Commands top Description Return to the top level of the CLI hierarchy, or the “username” prompt. history Display the last 200 commands the user entered into the Dominion KX II CLI. help Display an overview of the CLI syntax. quit Places the user back one level.
Chapter 12: Command Line Interface (CLI) Setting Network Parameters Network parameters are configured using the interface command. admin > Config > Network > interface enable true if lan1 ip 192.16.151.12 mask 255.255.255 gw 192.168.51.12 When the command is accepted, the device automatically drops the connection. You must reconnect to the device using the new IP address and the user name and password you created in the resetting factory default password section.
Chapter 12: Command Line Interface (CLI) • Command Description history Display the current session's command line history. listports List accessible ports. logout Logout of the current CLI session. top Return to the root menu. userlist List active user sessions. Enter admin > config > network. Command Description help Display overview of commands. history Display the current session's command line history. interface Set/get network parameters.
Chapter 12: Command Line Interface (CLI) Administering the Dominion KX II Console Server Configuration Commands Note: CLI commands are the same for SSH, Telnet, and Local Port access sessions. The Network command can be accessed in the Configuration menu for the Dominion KX II. Configuring Network The network menu commands are used to configure the Dominion KX II network adapter. 218 Commands interface Description Configure the Dominion KX II device network interface.
Chapter 12: Command Line Interface (CLI) Interface Command The Interface command is used to configure the Dominion KX II network interface.
Chapter 12: Command Line Interface (CLI) IPv6 Command Use the IPv6 command to set IPv6 network parameters and retrieve existing IPv6 parameters.
Chapter 13 Dominion KX II Local Console In This Chapter Overview................................................................................................221 Using the Dominion KX II Local Console ..............................................221 Dominion KX II Local Console Interface................................................222 Security and Authentication...................................................................222 Available Resolutions ................................................
Chapter 13: Dominion KX II Local Console Dominion KX II Local Console Interface When you are located at the server rack, the Dominion KX II provides standard KVM management and administration via the Dominion KX II Local Console. The Dominion KX II Local Console provides a direct KVM (analog) connection to your connected servers; the performance is exactly as if you were directly connected to the server's keyboard, mouse, and video ports.
Chapter 13: Dominion KX II Local Console Available Resolutions The Dominion KX II Local Console provides the following resolutions to support various monitors: • 800x600 • 1024x768 • 1280x1024 Each of these resolutions supports a refresh rate of 60Hz and 75Hz.
Chapter 13: Dominion KX II Local Console Port Access Page (Local Console Server Display) After you login to the Dominion KX II Local Console, the Port Access page opens. This page lists all of the Dominion KX II ports, the connected KVM target servers, and their status and availability. Also displayed on the Port Access page are blade chassis that have been configured in the Dominion KX II.
Chapter 13: Dominion KX II Local Console The KVM target servers are initially sorted by Port Number. You can change the display to sort on any of the columns. Port Number - Numbered from 1 to the total number of ports available for the Dominion KX II device. Note that ports connected to power strips will not be among those listed, resulting in gaps in the Port Number sequence. Port Name - The name of the Dominion KX II port.
Chapter 13: Dominion KX II Local Console Hot Keys and Connect Keys Because the Dominion KX II Local Console interface is completely replaced by the interface for the target server you are accessing, a hot key is used to disconnect from a target and return to the local port GUI. A connect key is used to connect to a target or switch between targets. The Local Port hot key allows you to rapidly access the Dominion KX II Local Console user interface when a target server is currently being viewed.
Chapter 13: Dominion KX II Local Console Blade chassis Connect key action Key sequence example Disconnect from a target and return to the local port GUI Disconnect from target port 5, slot 11 and return to the local port GUI (the page from which you connected to target): • Double Click Scroll Lock Special Sun Key Combinations The following key combinations for Sun Microsystems server’s special keys operate on the local port.
Chapter 13: Dominion KX II Local Console Accessing a Target Server To access a target server: 1. Click the Port Name of the target you want to access. The Port Action Menu is displayed. 2. Choose Connect from the Port Action menu. The video display switches to the target server interface. Returning to the Dominion KX II Local Console Interface Important: The Dominion KX II Local Console default hot key is to press the Scroll Lock key twice rapidly.
Chapter 13: Dominion KX II Local Console Configuring Dominion KX II Local Console Local Port Settings From the Local Port Settings page, you can customize many settings for the Dominion KX II Local Console including keyboard, hot keys, video switching delay, power save mode, local user interface resolution settings, and local user authentication. Note: Only users with administrative privileges can access these functions.
Chapter 13: Dominion KX II Local Console Hot key: Take this action: Double Click Scroll Lock Press Scroll Lock key twice quickly Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key Press the left Alt key twice quickly Double Click Left Shift key Press the left Shift key twice quickly Double Click Left Ctrl key Press the left Ctrl key twice quickly 4. Select the Local Port Connectkey.
Chapter 13: Dominion KX II Local Console Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is under CC-SG management. Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access, you will have to remove the device from under CC-SG management (from within CC-SG). You will then be able to check this checkbox. 10. Click OK.
Chapter 13: Dominion KX II Local Console Configuring Dominion KX II Local Port Settings from the Local Console The Standard Local port and the Extended Local port can be configured from the Remote Console on the Port Configuration page or from the Local Console on the Local Port Settings page. See Configuring Dominion KX II Local Port Settings (on page 169) for details on configuring these ports.
Chapter 13: Dominion KX II Local Console Ping interval (seconds) Timeout (seconds) 1. Click Reset to continue. You will be prompted to confirm the factory reset because all network settings will be permanently lost. 2. Click OK button proceed. Upon completion, the Dominion KX II device is automatically restarted. Resetting the Dominion KX II Using the Reset Button On the back panel of the device, there is a Reset button.
Appendix A Specifications In This Chapter Physical Specifications ..........................................................................234 Environmental Requirements ................................................................237 Computer Interface Modules (CIMs) .....................................................237 Supported CIMs and Operating Systems (Target Servers) ..................239 Certified Modems ..................................................................................
Appendix A: Specifications Part number Line item description DKX2-132 DKX2-216 DKX2-232 DKX2-416 DKX2-432 UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) 32-Port 785813624079 Dual Power 9.0 lbs Dominion KX II 100/240 V with 1-user 50/60 Hz 4.1 kg Network 0.6A Access and 26 Watts Local Port, Virtual Media, Dual Power 1.75" x 17.3" x 11.4" 14.9 lbs 22" x 16.6" x 6.5" 44mm x 439mm x 290mm 6.
Appendix A: Specifications Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DKX2-464 64-Port 785813625298 Dual Power 11.29 Dominion KX II 100/240 V lbs with 4-user 50/60 Hz 5.12 kg Network 1A Access and 64 Watts Local Port, Virtual Media, Dual Power 17.3” x 11.6” x 3.5” 19.8 lbs 22” x 16.5” x 6.
Appendix A: Specifications Environmental Requirements Operating Temperature 0°C- 40°C (32°F - 104°F) Humidity 20% - 85% RH Altitude N/A Vibration 5-55-5 HZ, 0.38mm, 1 minutes per cycle; 30 minutes for each axis (X, Y, Z) Shock N/A Non-Operating Temperature 0°C- 50°C (32°F - 122°F) Humidity 10% - 90% RH Altitude N/A Vibration 5-55-5 HZ, 0.
Appendix A: Specifications 238 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DCIM-USB Dominion KX I & II Computer Interface Module [USB Port] 0.2 lbs 1.3" x 3.0" x 0.6" 0.2 lbs 7.2" x 9" x 0.6" 785813338518 DCIM-SUSB Dominion KX I & II Computer Interface Module [USB Port for Sun] 0.2 lbs 1.3" x 3.0" x 0.6" 0.2 lbs 7.2" x 9" x 0.6" 785813338556 DCIM-USBG2 Dominion KX 0.
Appendix A: Specifications Part number Line item description D2CIM-DVUSB D2CIM-DVUSB32PAC D2CIM-DVUSB -64PAC Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) Dominion KX 0.23 lbs, II Computer 105 g Interface Module [Dual USB Port with Virtual Media] 3.53”x1.68”x.76” .25 lbs, 112.5 g 3.9”x5.7”x 1.0” 785813339508 Bulk pack of 10.1 lbs, 32 4.6 kg D2CIM-DVUS B 21.9”x12.2”x4.3” Bulk pack of 22.5 lbs, 64 10.2 kg D2CIM-DVUS B 9.4”x22.6”x13.0” 89.7x42.7x19.
Appendix A: Specifications Supported Paragon CIMs • 240 P2CIM-PS2 Operating system and serial devices (where applicable) • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and 4.0 • SUSE Linux Professional 9.
Appendix A: Specifications Supported Paragon CIMs • UKVMPD • P2CIM-SUN • P2CIM-SUSB • P2CIM-SER Operating system and serial devices (where applicable) • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and 4.0 • SUSE Linux Professional 9.
Appendix A: Specifications Supported Dominion KX I DCIMs • DCIM-PS2 • 242 DCIM-USB Target server • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and 4.0 • SUSE Linux Professional 9.2 and 10 • Fedora Core 3 and above • IBM AIX • HP UX • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.
Appendix A: Specifications Supported Dominion KX I DCIMs • DCIM-USB G2 Target server • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and 4.0 • SUSE Linux Professional 9.
Appendix A: Specifications Supported Dominion KX II D2CIMs • D2CIM-VUSB Target server and remote power strips (where applicable) • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • SUSE Linux Professional 9.2 and 10 • Fedora Core 3 and above • Red Hat Linux 9.0 • SUSE Linux Professional 9.2 and 10 • Mac OS Virtual media Absolute mouse mode Note: D2CIM-VUSB is not supported on Sun (Solaris) targets.
Appendix A: Specifications Certified Modems • US Robotics 56K 5686E • ZOOM v90 • ZOOM v92 • US Robotics Sportster 56K • US Robotics Courier 56K Devices Supported by the KX2-832 and KX2-864 Extended Local Port The Extended Local Port supports attachment from the following devices: • Paragon II User Station (P2-UST) connected directly to Extended Local port. • Paragon II Enhanced User Station (P2-EUST) connected directly to Extended Local port.
Appendix A: Specifications Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so forth and the subjective nature of video quality, Raritan cannot guarantee performance across all distances in all environments. See the Supported Video Resolutions (on page 246) for the video resolutions supported by the Dominion KX II.
Appendix A: Specifications Resolutions 640x350 @85 Hz 800x600 @56 Hz 1024x768 @100 Hz 640x400 @56 Hz 800x600 @60 Hz 1152x864 @60 Hz 640x400 @84 Hz 800x600 @70 Hz 1152x864 @70 Hz 640x400 @85 Hz 800x600 @72 Hz 1152x864 @75 Hz 640x480 @60 Hz 800x600 @75 Hz 1152x864 @85 Hz 640x480 @66.6 Hz 800x600 @85 Hz 1152x870 @75.1 Hz 640x480 @72 Hz 800x600 @90 Hz 1152x900 @66 Hz 640x480 @75 Hz 800x600 @100 Hz 1152x900 @76 Hz 640x480 @85 Hz 832x624 @75.
Appendix A: Specifications Language Regions Keyboard layout Chinese Traditional Hong Kong S. A. R., Republic of China (Taiwan) Chinese Traditional Chinese Simplified Mainland of the People’s Republic of China Chinese Simplified Korean South Korea Dubeolsik Hangul Japanese Japan JIS Keyboard French France French (AZERTY) layout keyboard.
Appendix A: Specifications Client OS Virtual media (VM) support on client SUSE Linux Professional 9.2 Yes. Locally held ISO image, Remote and 10 File Server mounting directly from Dominion KX II Fedora™ Core 5 and above Yes. Locally held ISO image, Remote File Server mounting directly from Dominion KX II Mac® No Solaris No At this time, the JRE plug-in is available only for the Windows 32-bit operating system.
Appendix A: Specifications Supported Browsers Dominion KX II supports the following browsers: • Internet Explorer 6, 7 and 8 • Firefox 1.5, 2.0, and 3.0 • Mozilla 1.7 • Safari 2.
Appendix A: Specifications Port Description HTTP, Port 80 All requests received by the Dominion KX II via HTTP (port 80) are automatically forwarded to HTTPS for complete security. The Dominion KX II responds to Port 80 for user convenience, relieving users from having to explicitly type in the URL field to access the Dominion KX II, while still preserving complete security.
Appendix A: Specifications Network Speed Settings Dominion KX II network speed setting Network switch port setting Auto Auto 1000/Full 100/Full 100/Half 10/Full 10/Half Highest Available Speed 1000/Full Dominion KX II: 100/Full 100/Half Dominion KX II: 10/Full 10/Half Switch: 100/Half 1000/Full 100/Full 100/Half Switch: 10/Half 1000/Full 1000/Full No No No No Communica Communicat Communica Communicat tion ion tion ion Dominion KX II: 100/Half Dominion KX II: 100/Half 100/Full Switch:
Appendix A: Specifications Functions; not recommended NOT supported by Ethernet specification; product will communicate, but collisions will occur Per Ethernet specification, these should be “no communication,” however, note that the Dominion KX II behavior deviates from expected behavior Note: For reliable network communication, configure the Dominion KX II and the LAN switch to the same LAN Interface Speed and Duplex.
Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ........................................................254 Setting the Registry to Permit Write Operations to the Schema ...........255 Creating a New Attribute .......................................................................255 Adding Attributes to the Class ...............................................................
Appendix B: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory Schema root node in the left pane of the window and then click Operations Master. The Change Schema Master dialog appears. 2. Select the "Schema can be modified on this Domain Controller" checkbox. Optional 3. Click OK.
Appendix B: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field. 7. Type a meaningful description in the Description field. 8. Click the Syntax drop-down arrow and choose Case Insensitive String from the list. 9.
Appendix B: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
Appendix B: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1. Right-click Active Directory Schema in the left pane of the window and select Reload the Schema. 2. Minimize the Active Directory Schema MMC (Microsoft Management Console) console.
Appendix B: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
Appendix B: Updating the LDAP Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
Appendix B: Updating the LDAP Schema 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the Dominion KX II) in the Edit Attribute field. 10. Click OK.
Appendix C Informational Notes In This Chapter Overview................................................................................................262 Java Runtime Environment (JRE) .........................................................262 IPv6 Support Notes ...............................................................................263 Keyboards .............................................................................................264 Mouse Pointer Synchronization (Fedora).................
Appendix C: Informational Notes IPv6 Support Notes Java Java 1.5 supports IPv6 for the following: • Solaris 8 and higher • Linux kernel 2.1.2 and higher (RedHat 6.1 and higher) Java 5.0 and above supports the IPv6 for the following: • Solaris 8 and higher • Linux kernel 2.1.2 and higher (kernel 2.4.0 and higher recommended for better IPv6 support) • Windows XP SP1 and Windows 2003, Windows Vista The following IPv6 configurations are not supported by Java: • J2SE 1.
Appendix C: Informational Notes Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux Clients Only) The Virtual KVM Client and the Multi-Platform Client (MPC) do not process the key combination of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux clients. To obtain the caret symbol: From a French keyboard, press the ^ key (to the right of the P key), then immediately press the space bar. Alternatively, create a macro consisting of the following commands: 1.
Appendix C: Informational Notes Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde symbol: Create a macro consisting of the following commands: • Press right Alt. • Press 2. • Release 2. • Release right Alt.
Appendix C: Informational Notes Language Configuration method Norwegian Keyboard Indicator Swedish Keyboard Indicator Danish Keyboard Indicator Japanese System Settings (Control Center) Korean System Settings (Control Center) Slovenian System Settings (Control Center) Italian System Settings (Control Center) Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment.
Appendix C: Informational Notes Macintosh Keyboard When a Macintosh is used as the client, the following keys on the Mac keyboard are not captured by the Java Runtime Environment (JRE): • F9 • F10 • F11 • F14 • F15 • Volume Up • Volume Down • Mute • Eject As a result, the Virtual KVM Client and the Multi-Platform Client (MPC) are unable to process these keys from a Mac client's keyboard.
Appendix C: Informational Notes Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using the following cable lengths and video resolutions when you are connecting to Dell blade chassis from the Dominion KX II: Cable length Video resolution 50 ft. 1024x768x60 50 ft. 1280x1024x60 30 ft.
Appendix C: Informational Notes SUSE/VESA Video Modes The SuSE X.org configuration tool SaX2 generates video modes using modeline entries in the X.org configuration file. These video modes do not correspond exactly with VESA video mode timing (even when a VESA monitor is selected). The Dominion KX II, on the other hand, relies on exact VESA mode timing for proper synchronization. This disparity can result in black borders, missing sections of the picture, and noise. To configure the SUSE video display: 1.
Appendix C: Informational Notes Help for Choosing USB Profiles When you are connected to a KVM target server in VKC, you can view information about USB profiles via the Help on USB Profiles command on the USB Profile menu.
Appendix C: Informational Notes USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles, see Available USB Profiles (on page 88). Raritan provides a standard selection of USB configuration profiles for a wide range of operating system and BIOS level server implementations. These are intended to provide an optimal match between remote USB device and target server configurations.
Appendix C: Informational Notes CIMs Windows 3-Button Mouse on Linux Targets When using a 3-button mouse on a Windows client connecting to a Linux target, the left mouse button may get mapped to the center button of the Windows client 3-button mouse. Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000 operating system does not support USB composite devices, like Raritan’s D2CIM-VUSB, in the same manner as non-composite USB devices.
Appendix C: Informational Notes Virtual Media Virtual Media Not Refreshed After Files Added After a virtual media drive has been mounted, if you add a file(s) to that drive, those files may not be immediately visible on the target server. Disconnect and then reconnect the virtual media connection. Target BIOS Boot Time with Virtual Media The BIOS for certain targets may take longer to boot if media is mounted virtually at the target. To shorten the boot time: 1.
Appendix C: Informational Notes Moving Between Ports of the Dominion KX II If you move a between ports of the same Dominion KX II and resume management within one minute, CC-SG may display an error message. If you resume management, the display will be updated.
Appendix D FAQs In This Chapter General Questions.................................................................................276 Remote Access .....................................................................................278 Universal Virtual Media..........................................................................280 USB Profiles ..........................................................................................281 Ethernet and IP Networking .......................................
Appendix D: FAQs General Questions What is the Dominion KX II? The Dominion KX II is a second generation digital KVM (keyboard/video/ mouse) switch that enables one, two, four or eight IT administrators to access and control 8, 16, 32 or 64 servers over the network with BIOS-level functionality. The Dominion KX II is completely hardware and operating system independent. Users can troubleshoot and reconfigure servers even when servers are down.
Appendix D: FAQs In general, customers can continue to use their existing switches for many years. As their data centers expand, customers can purchase and use the new Dominion KX II models. Raritan's centralized management unit, CommandCenter Secure Gateway, and the Multi-Platform Client (MPC) both support KX I and Dominion KX II switches seamlessly. Will my existing KX I CIMs work with the Dominion KX II switch? Yes, existing KX I CIMs will work with the Dominion KX II switch.
Appendix D: FAQs Remote Access How many users can remotely access servers on each Dominion KX II? The Dominion KX II models offer remote connections for up to eight users per user channel to simultaneously access and control a unique target server. For one-channel devices like the DKX2-116, up to eight remote users can access and control a single target server.
Appendix D: FAQs Speed 100Mbps Description Theoretical 100Mbit network speed Time 0.05 seconds 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network speed .4 seconds 6Mbps Likely practical 10Mbit network speed .8 seconds 512Kbps Cable modem download speed (typical) 8 seconds How do I access servers connected to the Dominion KX II if the network ever becomes unavailable? You can access servers at-the-rack or via modem.
Appendix D: FAQs Universal Virtual Media What Dominion KX II models support virtual media? All of the Dominion KX II models support virtual media. It is available standalone and through Raritan's CommandCenter Secure Gateway, Raritan's centralized management unit. What types of virtual media does the Dominion KX II support? The Dominion KX II supports the following types of media: internal and USB-connected CD/DVD drives, USB mass storage devices, PC hard drives, and ISO images.
Appendix D: FAQs USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services such as virtual media. The USB Profile tailors the Dominion KX II’s USB interface to the server to accommodate these server specific characteristics. Why would I use a USB profile? USB Profiles are most often required at the BIOS level where there may not be full support for the USB specification when accessing virtual media drives.
Appendix D: FAQs A BIOS profile has been tailored to match the requirements of a particular server’s BIOS that does not implement the full USB specification. The profile enables use of keyboard, mouse, and virtual media at the BIOS level, overcoming the restrictions or limitations of the BIOS. Do I need a special CIM to use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware.
Appendix D: FAQs Ethernet and IP Networking Does the Dominion KX II offer dual gigabit Ethernet ports to provide redundant fail-over? Yes. The Dominion KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should the primary Ethernet port (or the switch/router to which it is connected) fail, the Dominion KX II will failover to the secondary network port with the same IP address, ensuring that server operations are not disrupted.
Appendix D: FAQs Other factors include the server’s video resolution, networking speed and characteristics, client PC resources, and video card noise. The Dominion KX II has very sophisticated video processing algorithms that optimize bandwidth and performance for a variety of environments. In addition, they are highly configurable since there are many settings to optimize bandwidth usage. In particular, the Connection Speed setting in the remote clients (VKC, MPC) can be set to reduce the bandwidth used.
Appendix D: FAQs User task Default Close browser 100 - 150 KB/s 1Mbit speed 1Mbit speed & 15 bit & 8 bit color color 75 - 100 KB/s 30 - 60KB/s Open Start menu 75 - 100 KB/s 50 -75 KB/s 20 - 30 KB/s Close Start menu 75 - 100 KB/s 25 - 50 KB/s 10 - 15 KB/s Starfield screen saver 25 - 50 KB/s 10 - 15 KB/s 7 - 10 KB/s 3D pipes screen saver 10 - 100 KB/s 5 - 20 KB/s 2 - 10 KB/s Windows media video 500 - 1200 KB/s 300 - 500 KB/s 150 - 300 KB/s QuickTime video #1 700 - 2500 KB/s 400 - 5
Appendix D: FAQs With the reduced bandwidth settings, bandwidth is reduced significantly for virtually all tasks. With the 15 bit color setting, perceived performance is similar to the default parameters. Further, bandwidth reductions are possible with additional changes in the settings. Please note that these bandwidth figures are only examples and may vary from those seen in your environment due to many factors.
Appendix D: FAQs The connection speed and color depth settings can be tweaked to optimize performance for slower bandwidth links. For example, in the Multi-Platform Client or the Virtual KVM Client, set the connection speed to 1.5Mb or 1Mb and the color depth to 8 bit. Even lower connection speeds and color depths can be used for very low bandwidth situations. I want to connect over the Internet.
Appendix D: FAQs Only one. The Dominion KX II protects network security by only requiring access to a single TCP port to operate. This port is completely configurable for additional security. Note that, of course, to use the Dominion KX II's optional web browser capability, the standard HTTPS port 443 must also be open. Does the Dominion KX II require an external authentication server to operate? No. The Dominion KX II is a completely self-sufficient.
Appendix D: FAQs When changing the IP address of the Dominion KX II or swapping in a new Dominion KX II, sufficient time must be allowed for its IP and MAC addresses to be known throughout the Layer 2 and Layer 3 networks.
Appendix D: FAQs IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Protocol Version 6”. IPv6 is the “next generation” IP protocol which will replace the current IP Version 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses. It also improves IPv4 in areas such as routing and network auto-configuration. IPv6 is expected to gradually replace IPv4, with the two coexisting for a number of years.
Appendix D: FAQs The Dominion KX II’s default networking is set at the factory for IPv4 only. When you are ready to use IPv6, then follow the above instructions to enable IPv6/IPv4 dual stack operation. Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6. The Dominion KX II User Guide describes the Dominion KX II’s support for IPv6.
Appendix D: FAQs Servers Does the Dominion KX II depend on a Windows server to operate? Absolutely not. Because users depend on the KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructure to fix problems), the Dominion KX II is designed to be completely independent from any external server.
Appendix D: FAQs Blade Servers Can I connect blade servers to the Dominion KX II? Yes you can. The Dominion KX II supports popular blade server models from the leading blade server manufacturers: HP, IBM and Dell. Which blade servers are supported? The following models are supported: • Dell PowerEdge 1855, 1955 and M1000e • HP BladeSystem c3000 and c7000 • IBM BladeCenter H and E Note: IBM BladeCenter Model S, T, and HT are handled using the IBM (Other) selection.
Appendix D: FAQs Are the Paragon Blade CIMs used? No, the Paragon II Blade CIM will not work with the Dominion KX II. Which CIM should I use? It depends on the type of KVM ports on the specific make and model of the blade server you are using. The following CIMs are supported: DCIM-PS2, DCIM-USBG2, D2CIM-VUSB and D2CIM-DVUSB.
Appendix D: FAQs I'm running VMware on some of my blade servers. Is this supported? Yes, with CC-SG you can display and access virtual machines running on blade servers. Is virtual media supported? We support VM on IBM BladeCenter Model H and E with the D2CIM DVUSB. Is absolute mouse synchronization supported? Servers with internal KVM switches inside the blade chassis typically do not support absolute mouse technology.
Appendix D: FAQs Installation Besides the device itself, what do I need to order from Raritan to install the Dominion KX II? Each server that connects to the Dominion KX II requires a Dominion or Paragon Computer Interface Module (CIM), an adapter that connects directly to the keyboard, video, and mouse ports of the server. What kind of Cat5 cabling should be used in my installation? The Dominion KX II can use any standard UTP (unshielded twisted pair) cabling, whether Cat5, Cat5e, or Cat6.
Appendix D: FAQs Servers connected to the Dominion KX II do not require any software agents to be installed, because the Dominion KX II connects directly via hardware to servers' keyboard, video, and mouse ports. How many servers can be connected to each the Dominion KX II device? The Dominion KX II models range from 8, 16, or 32 server ports in a 1U chassis to 64 server ports in a 2U chassis. This is the industry's highest digital KVM switch port density.
Appendix D: FAQs Local Port Can I access my servers directly from the rack? Yes. At the rack, the Dominion KX II functions just like a traditional KVM switch, allowing control of up to 64 servers using a single keyboard, monitor, and mouse. When I am using the local port, do I prevent other users from accessing servers remotely? No. The Dominion KX II local port has a completely independent access path to the servers.
Appendix D: FAQs If I use the local port to change the name of a connected server, does this change propagate to remote access clients as well? Does it propagate to the optional CommandCenter unit? Yes. The local port presentation is identical and completely in sync with remote access clients, as well as Raritan's optional CommandCenter Secure Gateway management device.
Appendix D: FAQs Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) What is the Extended Local port? The Dominion KX2-832 and KX2-864 feature an extended local port. The Dominion KX II eight user models have a Standard Local port, plus a new extended local port that extends the local port, via Cat5 cable, beyond the rack to a control room, another point in the data center or to a Paragon II switch.
Appendix D: FAQs Power Control Does the Dominion KX II have a dual power option? All of the Dominion KX II models come equipped with dual AC inputs and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then the Dominion KX II will automatically switch to the other. Does the power supply used by the Dominion KX II automatically detect voltage settings? Yes. The Dominion KX II's power supply can be used in AC voltage ranges from 100-240 volts, at 50-60 Hz.
Appendix D: FAQs To take advantage of the Dominion KX II's integrated power control user interface, and more importantly, integrated security, use Raritan's Remote Power Control (RPC) power strips. RPCs come in many outlet, connector, and amp variations. The D2CIM-PWR must be purchased to connect the RPC to the Dominion KX II. Scalability How do I connect multiple Dominion KX II devices together into one solution? Multiple Dominion KX II devices do not need to be physically connected together.
Appendix D: FAQs Computer Interface Modules (CIMs) Can I use Computer Interface Modules (CIMs) from Raritan's analog matrix KVM switch, Paragon, with the Dominion KX II? Yes. Certain Paragon computer interface modules (CIMs) may work with the Dominion KX II (check the Raritan Dominion KX II release notes on the website for the latest list of certified CIMs).
Appendix D: FAQs Security What kind of encryption does the Dominion KX II use? The Dominion KX II uses industry-standard (and extremely secure) RC4 or AES encryption, both in its SSL communications as well as its own data stream. Literally no data is transmitted between remote clients and the Dominion KX II that is not completely secured by encryption.
Appendix D: FAQs The encryption level that is autonegotiated is dependent on the browser in use. Manageability Can the Dominion KX II be remotely managed and configured via web browser? Yes, the Dominion KX II can be completely configured remotely via web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) version installed.
Appendix D: FAQs Miscellaneous What is the Dominion KX II's default IP address? 192.168.0.192 What is the Dominion KX II's default user name and password? The Dominion KX II's default user name is admin and the default password is raritan [all lower case]. However, for the highest level of security, the Dominion KX II forces the administrator to change the Dominion KX II default administrative user name and password when the unit is first booted up.
Index A A.
Index Disconnecting KVM Target Servers • 55 Disconnecting Virtual Media • 82, 86 Discovering Devices on the Dominion KX II Subnet • 47 Discovering Devices on the Local Subnet • 46 Dominion KX II Console Layout • 40 Dominion KX II Console Navigation • 40 Dominion KX II Help • 1 Dominion KX II Local Console • 221 Dominion KX II Local Console Factory Reset • 232 Dominion KX II Local Console Interface • 38, 222 Dominion KX II Overview • 3 Dominion KX II Remote Console Interface • 38 E E.
Index Logging Out • 50 Login Limitations • 178, 179 M Macintosh Keyboard • 267 Maintenance • 191 Make Linux Settings Permanent • 20 Make UNIX Settings Permanent • 24 Manage Favorites Page • 45 Manage KVM Target Servers Associated with Outlets (Port Page) • 143 Manageability • 305 Managing Favorites • 44 Miscellaneous • 306 Modem Settings • 26, 125 Modifying an Existing User • 106 Modifying an Existing User Group • 104 Modifying and Removing Keyboard Macros • 61 Mouse Options • 67 Mouse Pointer Synchroniza
Index Setting Network Parameters • 216 Setting Parameters • 215 Setting Permissions • 98, 103, 104 Setting Permissions for an Individual Group • 104, 106 Setting Port Permissions • 101, 104 Setting the Registry to Permit Write Operations to the Schema • 255 Simultaneous Users • 221 Single Mouse Cursor • 71 Single Mouse Mode - Connecting to a Dominion KX II Target Under CC-SG Control Via VKC Using Firefox • 273 Software • 9 Special Sun Key Combinations • 227 Specifications • 26, 173, 234 Specifying Power Su
Index VKC Virtual Media • 72 VM-CIMs and DL360 USB Ports • 269 W What's New in the Help • 2 Windows 2000 Composite USB Device Behavior for Virtual Media • 272 Windows 2000® Settings • 14 Windows 3-Button Mouse on Linux Targets • 272 Windows Vista® Settings • 16 Windows XP®/Windows 2003® • 15 Working with Target Servers • 37, 146 311
U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Europe Europe Monday - Friday 8:30 a.m. - 5 p.m. GMT+1 CET Phone: +31-10-2844040 Email: tech.europe@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m.