Raritan KX2-432, KX2-416, KX2-132, KX2-232, KX2-216 User Manual

...
Dominion® KX II
KX2-116 KX2-132
KX2-216 KX2-232
User Guide
Copyright © 2007 Raritan, Inc.
DKX2-0D-E
June 2007
255-62-4023-00
KX2-416 KX2-432 KX2-464
This page intentionally left blank.
Copyright and Trademark Information
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without the express prior written consent of Raritan, Inc.
© Copyright 2007 Raritan, Inc., CommandCenter®, RaritanConsole, Dominion®, and the Raritan company logo are trademarks or registered trademarks of Raritan, Inc. All rights reserved. Java® is a registered trademark of Sun Microsystems, Inc. Internet Explorer and Active Directory are registered trademarks of Microsoft® Corporation. Netscape® and Netscape Navigator are registered trademarks of Netscape Communication Corporation. All other marks are registered trademarks or trademarks of their respective manufacturers.
© Copyright 2007 GoAhead Software, Inc. All Rights Reserved.
FCC Information
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial installation. This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. Operation of this equipment in a residential environment may cause harmful interference.
VCCI Information (Japan)
Raritan is not responsible for damage to this product resulting from accident, disaster, misuse, abuse, non-Raritan modification of the product, or other events outside of Raritan’s reasonable control or not arising under normal operating conditions.
U
C
LI STED
1F61
US
L
I.T.E.
For assistance in North or South America, please contact the Raritan Technical Support Team
by telephone (732) 764-8886, by fax (732) 764-8887, or by e-mail tech@raritan.com
Ask for Technical Support – Monday through Friday, 8:00am to 8:00pm, Eastern.
For assistance around the world, please see the last page of this guide for
regional Raritan office contact information.
Safety Guidelines
To avoid potentially fatal shock hazard and possible damage to Raritan equipment:
Do not use a 2-wire power cord in any product configuration.
Test AC outlets at your computer and monitor for proper polarity and grounding.
Use only with grounded outlets at both the computer and monitor. When using a backup UPS,
power the computer, monitor and appliance off the supply.
Rack Mount Safety Guidelines
In Raritan products which require Rack Mounting, please follow these precautions:
Operation temperature in a closed rack environment may be greater than room temperature.
Do not exceed the rated maximum ambient temperature of the appliances (refer to Appendix
A: Specifications for additional information).
Ensure sufficient airflow through the rack environment.
Mount equipment in the rack carefully to avoid uneven mechanical loading.
Connect equipment to the supply circuit carefully to avoid overloading circuits.
Ground all equipment properly, especially supply connections, such as power strips (other
than direct connections), to the branch circuit.
CONTENTS i
Contents
Chapter 1: Introduction................................................................. 1
Dominion KX II Overview...........................................................................................................1
Virtual Media..............................................................................................................................2
Product Photos...........................................................................................................................3
Product Features........................................................................................................................4
Hardware...........................................................................................................................................4
Software ............................................................................................................................................4
Terminology ...............................................................................................................................5
Package Contents......................................................................................................................5
User Guide.................................................................................................................................6
Overview............................................................................................................................................6
Organization of Information ...............................................................................................................6
Related Documentation.....................................................................................................................6
Chapter 2: Getting Started............................................................ 7
Login Information .......................................................................................................................7
Default IP Address.....................................................................................................................7
Supported Operating Systems (Clients) ....................................................................................7
Supported Browsers...................................................................................................................7
Supported Operating Systems and CIMs (Target Servers).......................................................8
Chapter 3: Installation and Configuration..................................... 9
Overview ....................................................................................................................................9
Step 1: Configure Target Servers..............................................................................................9
Video Resolution................................................................................................................................9
Desktop Background .......................................................................................................................10
Mouse Settings................................................................................................................................10
Operating System Mouse and Video Settings .................................................................................10
Step 2 (Optional): Configure Keyboard Language...................................................................18
Step 3: Configure Network Firewall Settings ...........................................................................18
Step 4: Connect the Equipment...............................................................................................19
Step 5: Dominion KX II Initial Configuration.............................................................................21
Changing the Default Password ......................................................................................................21
Assigning an IP Address..................................................................................................................22
Naming Target Servers....................................................................................................................23
Specifying Power Supply Auto-detection.........................................................................................23
Note to CC-SG Users......................................................................................................................24
Remote Authentication.............................................................................................................25
Supported Protocols........................................................................................................................25
Authentication vs. Authorization ...................................................................................................... 26
Users, Groups, and Access Permissions.................................................................................27
Overview..........................................................................................................................................27
Users...............................................................................................................................................27
Groups.............................................................................................................................................27
Relationship between Users and Groups ........................................................................................27
Chapter 4: Connecting to the Dominion KX II..............................29
User Interfaces.........................................................................................................................29
KX II Local Console KX II Devices................................................................................................29
KX II Remote Console KX II Devices............................................................................................29
Multi-Platform Client (MPC) KX I and KX II Devices.....................................................................30
Raritan Remote Client (RRC) KX I Devices Only..........................................................................30
Language Support....................................................................................................................31
Java® Runtime Environment (JRE).........................................................................................31
Launching the KX II..................................................................................................................32
KX II Console Layout.......................................................................................................................33
KX II Console Navigation .................................................................................................................34
Logging Out.....................................................................................................................................34
KX II Console Menu Tree ................................................................................................................35
Managing Favorites..................................................................................................................36
Manage Favorites Menu..................................................................................................................37
Favorites List ...................................................................................................................................38
ii CONTENTS
Discover Devices – Local Subnet....................................................................................................40
Discover Devices – KX Subnet........................................................................................................41
Add New Favorite............................................................................................................................42
Chapter 5: Accessing Target Servers .......................................... 43
Port Access Page.....................................................................................................................43
Port Action Menu......................................................................................................................44
Connecting to a Target Server.................................................................................................45
Switching between Target Servers..........................................................................................45
Disconnecting Target Servers..................................................................................................45
Power Controlling a Target Server...........................................................................................46
Power Cycle a Target Server...........................................................................................................46
Power On a Target Server...............................................................................................................46
Power Off a Target Server...............................................................................................................46
Chapter 6: Virtual KVM Client......................................................47
Note to CC-SG Users......................................................................................................................47
Options.....................................................................................................................................48
Menu Tree .......................................................................................................................................48
Toolbar ............................................................................................................................................48
Mouse Pointer Synchronization...............................................................................................49
Connection Menu.....................................................................................................................51
Properties Dialog.............................................................................................................................51
Connection Info................................................................................................................................53
Exit...................................................................................................................................................53
Keyboard Menu........................................................................................................................54
Send Ctrl+Alt+Delete.......................................................................................................................54
Keyboard Macros.............................................................................................................................54
Video Menu..............................................................................................................................57
Refresh Screen................................................................................................................................57
Auto-sense Video Settings ..............................................................................................................57
Calibrate Color.................................................................................................................................57
Video Settings .................................................................................................................................58
Mouse Menu ............................................................................................................................60
Synchronize Mouse.........................................................................................................................60
Single Mouse Cursor.......................................................................................................................60
Standard..........................................................................................................................................61
Intelligent .........................................................................................................................................61
Absolute...........................................................................................................................................61
Virtual Media............................................................................................................................61
Tools Menu ..............................................................................................................................62
Options............................................................................................................................................62
View Menu ...............................................................................................................................63
View Toolbar....................................................................................................................................63
Scaling.............................................................................................................................................63
Target Screen Resolution................................................................................................................63
Help Menu................................................................................................................................63
About Raritan Virtual KVM Client.....................................................................................................63
Chapter 7: Virtual Media ..............................................................65
Overview ..................................................................................................................................65
Prerequisites for Using Virtual Media.......................................................................................66
Using Virtual Media..................................................................................................................66
Opening a KVM Session..........................................................................................................67
Connecting to Virtual Media.....................................................................................................67
Local Drives.....................................................................................................................................67
CD-ROM/DVD-ROM/ISO Images....................................................................................................68
Disconnecting Virtual Media ....................................................................................................69
File Server Setup (File Server ISO Images Only)....................................................................70
Chapter 8: User Management.......................................................71
User List...................................................................................................................................72
Add New User..........................................................................................................................73
Modify Existing User........................................................................................................................74
User Group List........................................................................................................................75
Add New User Group...............................................................................................................76
CONTENTS iii
Setting Permissions.........................................................................................................................77
Setting Port Permissions .................................................................................................................77
Group-based IP ACL (Access Control List) .....................................................................................78
Modify Existing User Group.............................................................................................................80
Change Password....................................................................................................................82
Authentication Settings ............................................................................................................83
Implementing LDAP Remote Authentication....................................................................................85
Implementing RADIUS Remote Authentication ...............................................................................87
Chapter 9: Device Management...................................................89
Network Settings......................................................................................................................90
Network Basic Settings....................................................................................................................91
Network Miscellaneous Settings......................................................................................................92
LAN Interface Settings.....................................................................................................................92
Date/Time Settings...................................................................................................................94
Event Management..................................................................................................................95
Event Management – Settings.........................................................................................................95
Event Management – Destinations..................................................................................................97
SNMP Agent Configuration..............................................................................................................98
SNMP Trap Configuration................................................................................................................99
Power Supply Setup Page.....................................................................................................100
Port Configuration Page.........................................................................................................101
Power Control ........................................................................................................................102
Connect the Power Strip................................................................................................................102
Name the Power Strip (Port Page for Power Strips)......................................................................103
Associate Target Servers to Outlets (Port Page)...........................................................................104
Chapter 10: Security Settings....................................................107
Security Settings....................................................................................................................108
Login Limitations............................................................................................................................109
Strong Passwords..........................................................................................................................109
User Blocking ................................................................................................................................110
Encryption & Share........................................................................................................................111
IP Access Control...................................................................................................................113
Chapter 11: Maintenance...........................................................115
Audit Log................................................................................................................................116
Device Information.................................................................................................................117
Backup and Restore...............................................................................................................118
CIM Upgrade..........................................................................................................................120
Firmware Upgrade .................................................................................................................121
Upgrade Report......................................................................................................................123
Reboot....................................................................................................................................124
Chapter 12: Diagnostics.............................................................125
Diagnostics Menu...................................................................................................................125
Network Interface Page..........................................................................................................126
Network Statistics Page.........................................................................................................127
Ping Host Page......................................................................................................................129
Trace Route to Host Page .....................................................................................................130
KX Diagnostics.......................................................................................................................131
Chapter 13: KX II Lo
KX II Local Console................................................................................................................133
Physical Connections ....................................................................................................................133
Reset Button..................................................................................................................................134
Starting the KX II Local Console............................................................................................135
KX II Local Console Interface........................................................................................................135
Accessing Target Servers......................................................................................................136
Local Port Administration.......................................................................................................138
Local Port Settings (KX II Local Console Only) .............................................................................138
Factory Reset (KX II Local Console Only).....................................................................................140
cal Console................................................133
Chapter 14: CC U
nmanage.........................................................141
Overview ................................................................................................................................141
iv CONTENTS
Removing Dominion KX II from CC-SG Management...........................................................141
Appendix A: Specifications........................................................143
Remote Connection ...............................................................................................................144
KVM Properties......................................................................................................................144
TCP and UDP Ports Used .....................................................................................................145
Target Server Connection Distance and Video Resolution ...................................................146
Network Speed Settings.........................................................................................................146
Appendix B: Updating the LDAP Schema...................................147
Returning User Group Information.........................................................................................147
From LDAP....................................................................................................................................147
From Microsoft Active Directory.....................................................................................................147
Setting the Registry to Permit Write Operations to the Schema............................................147
Creating a New Attribute........................................................................................................147
Adding Attributes to the Class................................................................................................148
Updating the Schema Cache.................................................................................................149
Editing RCI User Group Attributes for User Members...........................................................149
Appendix C: Informational Notes...............................................151
Overview ................................................................................................................................151
Non-US Keyboards................................................................................................................151
French Keyboard...........................................................................................................................151
Java Runtime Environment (JRE)..................................................................................................152
Keyboard Language Preference (Fedora Linux Clients)................................................................152
Macintosh Keyboard ..............................................................................................................152
Mouse Pointer Synchronization (Fedora) ..............................................................................153
Resolving Fedora Core Focus ...............................................................................................153
SUSE/VESA Video Modes.....................................................................................................153
CIMs.......................................................................................................................................154
Windows 3-Button Mouse on Linux Targets..................................................................................154
Virtual Media..........................................................................................................................154
Dell OptiPlex and Dimension Computers.......................................................................................154
Virtual Media not Refreshed after Files Added..............................................................................154
Target BIOS Boot Time with Virtual Media....................................................................................154
CC-SG....................................................................................................................................154
Virtual KVM Client Version not Known from CC-SG Proxy Mode.................................................. 154
Proxy Mode and MPC....................................................................................................................154
Appendix D: FAQs.......................................................................155
General Questions.................................................................................................................155
Remote Access......................................................................................................................157
Universal Virtual Media..........................................................................................................159
Ethernet and IP Networking...................................................................................................160
Servers...................................................................................................................................163
Installation..............................................................................................................................164
Local Port...............................................................................................................................166
Power Control ........................................................................................................................168
Scalability...............................................................................................................................169
Computer Interface Modules (CIMs)......................................................................................170
Security ..................................................................................................................................171
Manageability.........................................................................................................................172
Miscellaneous ........................................................................................................................173
Troubleshooting .....................................................................................................................174
FIGURES v
Figures
Figure 1: Dominion KX II Configuration........................................................................................................1
Figure 2: Dominion KX2-116........................................................................................................................3
Figure 3: Dominion KX2-432........................................................................................................................3
Figure 4: Dominion KX II CIMs: D2CIM-VUSB (left); D2CIM-PWR (right)....................................................3
Figure 5: Terminology and Topology ...........................................................................................................5
Figure 6: Solaris Mouse Configuration.......................................................................................................15
Figure 7: Dominion KX II Connections....................................................................................................... 19
Figure 8: Network Settings.........................................................................................................................22
Figure 9: Port Configuration.......................................................................................................................23
Figure 10: Authentication/Authorization Flow Diagram ..............................................................................26
Figure 11: Dominion KX II Remote Console Login Page...........................................................................32
Figure 12: KX II Remote Console Main Page ............................................................................................ 33
Figure 13: KX II Local Console Main Page ................................................................................................ 33
Figure 14: Sample Menu Hierarchy (breadcrumbs)...................................................................................34
Figure 15: KX II Console Menu Tree (Local and Remote).........................................................................35
Figure 16: Favorite Devices (sidebar)........................................................................................................36
Figure 17: Manage Favorites Menu...........................................................................................................37
Figure 18: Favorites List ............................................................................................................................38
Figure 19: Edit (Favorite Information) ........................................................................................................39
Figure 20: Discover Devices - Local Subnet..............................................................................................40
Figure 21: Discover Devices – KX Subnet.................................................................................................41
Figure 22: Add New Favorite ..................................................................................................................... 42
Figure 23: Port Access...............................................................................................................................43
Figure 24: Port Action Menu ......................................................................................................................45
Figure 25: Port Action Menu (power options).............................................................................................46
Figure 26: Virtual KVM Client Window.......................................................................................................47
Figure 27: Virtual KVM Client Menu Tree ..................................................................................................48
Figure 28: Dual Mouse Cursors.................................................................................................................49
Figure 29: Properties Dialog ......................................................................................................................51
Figure 30: Connection Info.........................................................................................................................53
Figure 31: Keyboard Macros...................................................................................................................... 54
Figure 32: Add Keyboard Macro................................................................................................................55
Figure 33: Keyboard Macro Example......................................................................................................... 55
Figure 34: New Macro in Keyboard Menu.................................................................................................. 56
Figure 35: Video Settings...........................................................................................................................58
Figure 36: Single Mouse Cursor Message.................................................................................................60
Figure 37: (Tools) Options ......................................................................................................................... 62
Figure 38: Virtual Media Connection..........................................................................................................65
Figure 39: Open KVM Session...................................................................................................................67
Figure 40: Map Virtual Media Drive............................................................................................................67
Figure 41: Map Virtual Media CD/ISO Image............................................................................................. 68
vi FIGURES
Figure 42: File Server Setup......................................................................................................................70
Figure 43: User Management Menu ..........................................................................................................71
Figure 44: User List....................................................................................................................................72
Figure 45: User Page.................................................................................................................................73
Figure 46: User Group List.........................................................................................................................75
Figure 47: Group Page ..............................................................................................................................76
Figure 48: Group-based IP Access Control List......................................................................................... 78
Figure 49: IP ACL Example........................................................................................................................79
Figure 50: Modify Group............................................................................................................................80
Figure 51: Change Password.....................................................................................................................82
Figure 52: Authentication Settings .............................................................................................................83
Figure 53: Authentication Settings (LDAP).................................................................................................85
Figure 54: Authentication Settings (RADIUS) ............................................................................................87
Figure 55: Device Settings Menu...............................................................................................................89
Figure 56: Network Settings....................................................................................................................... 90
Figure 57: Network Settings (Network Basic Settings)...............................................................................91
Figure 58: Network Settings (Network Miscellaneous Settings)................................................................. 92
Figure 59: Network Settings (LAN Interface Settings)................................................................................92
Figure 60: Date/Time Settings ...................................................................................................................94
Figure 61: Event Management – Settings..................................................................................................95
Figure 62: Syslog Configuration.................................................................................................................96
Figure 63: Event Management - Destinations............................................................................................ 97
Figure 64: Power Supply Setup ............................................................................................................... 100
Figure 65: Port Configuration...................................................................................................................101
Figure 66: Power Strip Connections ........................................................................................................102
Figure 67: Port Page (power strips).........................................................................................................103
Figure 68: Port Page (KVM ports)............................................................................................................ 104
Figure 69: Port Page (Target Server Settings for D2CIM-VUSB).............................................................105
Figure 70: Security Menu.........................................................................................................................107
Figure 71: Security Settings.....................................................................................................................108
Figure 72: Security Settings (Strong Passwords).....................................................................................109
Figure 73: Security Settings (User Blocking)............................................................................................110
Figure 74: Security Settings (Encryption & Share)...................................................................................111
Figure 75: Security Settings (Encryption Mode Warning Message)......................................................... 111
Figure 76: IP Access Control ...................................................................................................................113
Figure 77: Maintenance Menu .................................................................................................................115
Figure 78: Audit Log.................................................................................................................................116
Figure 79: Device Information..................................................................................................................117
Figure 80: Backup/Restore ...................................................................................................................... 118
Figure 81: CIM Upgrade from KX Flash...................................................................................................120
Figure 82: Firmware Upgrade..................................................................................................................121
Figure 83: Firmware Upgrade Review .....................................................................................................122
Figure 84: Firmware Upgrade Successful................................................................................................122
FIGURES vii
Figure 85: Upgrade Report ......................................................................................................................123
Figure 86: Reboot....................................................................................................................................124
Figure 87: Reboot Confirmation............................................................................................................... 124
Figure 88: Diagnostics Menu ...................................................................................................................125
Figure 89: Network Interface.................................................................................................................... 126
Figure 90: Network Statistics (statistics).................................................................................................. 127
Figure 91: Network Statistics (interfaces).................................................................................................127
Figure 92: Network Statistics (route)........................................................................................................128
Figure 93: Ping Host................................................................................................................................129
Figure 94: Trace Route to Host................................................................................................................130
Figure 95: KX Diagnostics........................................................................................................................131
Figure 96: Diagnostics Scripts .................................................................................................................132
Figure 97: File Download.........................................................................................................................132
Figure 98: Dominion KX II Local Console................................................................................................133
Figure 99: Local User Panel on Dominion KX II.......................................................................................133
Figure 100: Reset Button (back of unit) ...................................................................................................134
Figure 101: Local Console Port Access...................................................................................................136
Figure 102: Local Port Settings................................................................................................................ 138
Figure 103: Factory Reset (Local Console Only).....................................................................................140
Figure 104: Device Managed by CC-SG Message..................................................................................141
Figure 105: Remove from CC-SG Management...................................................................................... 141
Figure 106: Confirm CC Unmanage.........................................................................................................142
Figure 107: Device Removed from CC Management ..............................................................................142
Figure 108: Create New Attribute.............................................................................................................148
Figure 109: Adding the Attributes to the Class......................................................................................... 148
Figure 110: ADSI Edit..............................................................................................................................149
Figure 111: User Properties..................................................................................................................... 150
Figure 112: Edit Attribute (adding user to KX II group) ............................................................................150
viii FIGURES
CHAPTER 1: INTRODUCTION 1
Chapter 1: Introduction
Dominion KX II Overview
Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access, and control of up to 64 servers from anywhere in the world via Web browser. At the rack, Dominion KX II provides BIOS-level control of up to 64 servers and other IT devices from a single keyboard, monitor, and mouse. The integrated remote access capabilities of the Dominion KX II provide the same levels of control of your servers via Web browser.
Dominion KX II is easily installed using standard UTP (Cat 5/5e/6) cabling. Its advanced features include virtual media, 128-bit encryption, dual power supplies, remote power control, dual Ethernet, LDAP, RADIUS, Active Directory, Syslog integration, and Web management. These features enable you to deliver higher uptime, better productivity, and bulletproof security – at any time from anywhere.
Dominion KX II products can operate as standalone appliances and do not rely on a central management device. For larger data centers and enterprises, numerous Dominion KX II units (along with Dominion SX units for remote serial console access and Dominion KSX for remote/branch office management) can be integrated into a single logical solution using Raritan’s CommandCenter Secure Gateway (CC-SG) management appliance.
Figure 1: Dominion KX II Configuration
2 DOMINION KX II USER GUIDE
Virtual Media
All Dominion KX II models support virtual media. The benefits of virtual media – mounting of remote drives/media on the target server to support software installation, and diagnostics – are now available in all of the Dominion KX II models.
Each Dominion KX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD, DVD, USB, internal and remote drives and images. Unlike other solutions, the Dominion KX II supports virtual media access of hard drives and remotely mounted images for added flexibility and productivity.
Virtual media sessions are secured using 128-bit AES or RC4 encryption. The new D2CIM-VUSB CIM (computer interface module) supports virtual media sessions to
target servers supporting the USB 2.0 interface. This new CIM also supports Absolute Mouse Synchronization™ as well as remote firmware update.
CHAPTER 1: INTRODUCTION 3
Product Photos
Figure 2: Dominion KX2-116
Figure 3: Dominion KX2-432
Figure 4: Dominion KX II CIMs: D2CIM-VUSB (left); D2CIM-PWR (right)
4 DOMINION KX II USER GUIDE
Product Features
Hardware
Integrated KVM-over-IP remote access
1U or 2U (KX2-464) rack-mountable; brackets included
Dual power supplies with failover; auto-switching power supply with power failure warning
16, 32, or 64 (on KX2-464) server ports
Multiple user capacity (1/2/4 remote users; 1 local user)
UTP (Cat5/5e/6) server cabling
Dual Ethernet ports (10/100/1000 LAN) with failover
Field upgradeable
Local user port for in-rack access
PS/2 keyboard/mouse ports
One front and three back panel USB 2.0 ports for supported USB devices
Fully concurrent with remote user access
Local Graphical User Interface (GUI) for administration
Centralized access security
Integrated power control
LED indicators for dual power status, network activity, and remote user status
Hardware reset button
Software
Virtual media with D2CIM-VUSB CIM
Absolute Mouse Synchronization with D2CIM-VUSB CIM
Plug-and-Play
Web-based access and management
Intuitive Graphical User Interface (GUI)
128-bit encryption of complete KVM signal, including video and virtual media
LDAP, Active Directory, RADIUS, or internal authentication and authorization
DHCP or fixed IP addressing
SNMP and Syslog management
Power control associated directly with servers to prevent mistakes
Integration with Raritan’s CommandCenter Secure Gateway (CC-SG) management appliance
CC Unmanage feature to remove device from CC-SG control
CHAPTER 1: INTRODUCTION 5
Terminology
This manual uses the following terminology for the components of a typical Dominion KX II configuration:
Figure 5: Terminology and Topology
Remote PC (client)
Networked computers used to access and control target servers connected to the Dominion KX II. Refer to Supported Operating
Systems (Clients) for a list of the Operating Systems supported by
Dominion KX II remotely.
Local Access Console (client)
An optional user console (consisting of a keyboard, mouse, and multi­sync VGA monitor) attached directly to Dominion KX II to control target servers locally (directly at the rack, not through the network).
CIMs (Computer Interface Modules)
Dongles that connect to each target server and Raritan power strip. Available for all of the supported Operating Systems. Refer to
Supported CIMs
for information about the CIMs supported by
Dominion KX II.
Target Servers
Servers with video cards and user interfaces (e.g., Windows®, Linux®, Solaris™, etc.) accessed remotely via Dominion KX II. Refer to Supported Operating Systems and CIMs (Target Servers)
for
a list of the supported Operating Systems and CIMs.
Power Strips
Raritan power strips accessed remotely via the Dominion KX II.
Package Contents
Each Dominion KX II ships as a fully-configured stand-alone product in a standard 1U (2U for KX2-464) 19" rackmount chassis. Each Dominion KX II unit ships with the following contents:
(1) Dominion KX II Unit (1) Dominion KX II Quick Installation and Setup Guide (1) Raritan User Manuals CD-ROM (1) Rackmount Kit (2) AC Power Cords (1) Cat5 Network Cable (1) Cat5 Network Crossover Cable (1) Set of 4 Rubber Feet (for desktop use) (1) Application Note (1) Warranty Card
6 DOMINION KX II USER GUIDE
User Guide
Overview
The Dominion KX II User Guide provides the information to install, set up and configure, access target servers and power strips, use virtual media, manage users and security, and maintain and diagnose the Dominion KX II.
This user guide is specific to Dominion KX II (version 2.0); for information pertaining to version
1.4, refer to the Dominion KX 1.4 User Guide.
Organization of Information
The user guide is organized as follows:
Chapter 1, Introduction. Overview, features, terminology, and package contents
Chapter 2, Getting Started. Login information; default IP Address; supported operating
systems, browsers, and CIMs
Chapter 3, Installation and Configuration. Target server configuration; firewall settings;
physical device connections; initial KX II unit configuration; remote authentication; and users, groups, and access permissions
Chapter 4, Connecting to the Dominion KX II. User interfaces; starting the KX II Remote
Console; Dominion KX II Favorites
Chapter 5, Accessing Target Servers. Access, control, and switching between target servers
Chapter 6, Virtual KVM Client. Target server control, mouse pointer synchronization,
keyboard macros, and video settings
Chapter 7, Virtual Media. Virtual media configuration and access
Chapter 8, User Management. User and group management, passwords, group-based IP
access control, and authentication settings
Chapter 9, Device Management. Network settings, date/time, event management, power
supply setup, port configuration, and power control
Chapter 10, Security Settings. Security settings and IP access control
Chapter 11, Maintenance. Audit log; device information; backup and restore; firmware and
CIM upgrades; and reboot
Chapter 12, Diagnostics. Network interface, network statistics, ping host, trace route to host,
and KX diagnostics
Chapter 13, KX II Local Console. Starting the KX II Local Console, accessing target servers,
and local port administration
Chapter 14, CC Unmanage. Removing the KX II from CC-SG control
Appendix A, Specifications. Physical specifications; ports used; target server connection
distance and video resolution; and network speed settings
Appendix B, Updating the LDAP Schema. Update LDAP schema (for experienced users)
Appendix C, Informational Notes. Important notes on Dominion KX II usage
Appendix
IP networking, servers, installation, local port, power control, scalability, Computer Interface Modules (CIMs), security, manageability, miscellaneous, and troubleshooting
D, FAQs. General questions, remote access, universal virtual media, Ethernet and
Related Documentation
For more information about the Raritan Multi-Platform Client (MPC), refer to the Raritan Multi­Platform Client (MPC) and Raritan Remote Client (RRC) User Guide.
For more information about the entire Raritan product line, refer to the Raritan User Manuals & Quick Setup Guides CD ROM or Raritan’s Web site
http://www.raritan.com/support/productdocumentation
CHAPTER 2: GETTING STARTED 7
Chapter 2: Getting Started
Login Information
The default Dominion KX II login user name is admin and the default password is raritan.
This user has administrative privileges.
Passwords are case sensitive and must be entered in the exact case combination in which they
were created. For example, the default password raritan must be entered entirely in lowercase letters.
The first time you start the Dominion KX II you are required to change the default password.
Tip: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location.
Default IP Address
Dominion KX II ships with the default IP address of 192.168.0.192.
Supported Operating Systems (Clients)
The following operating systems are supported on the Dominion KX II Remote Console, Virtual KVM Client™, and Multi-Platform Client (MPC):
CLIENT OS VIRTUAL MEDIA (VM) SUPPORT ON CLIENT
Windows XP Yes Windows 2000 SP4 Yes Windows Vista Yes Red Hat Linux 9.0 Yes; Locally held ISO image, Remote File Server
mounting directly from KX
Red Hat Enterprise Workstation 3.0 and 4.0 Yes; Locally held ISO image, Remote File Server
mounting directly from KX
SUSE Linux Professional 9.2 and 10 Yes; Locally held ISO image, Remote File Server
mounting directly from KX
Fedora™ Core 5 and above Yes; Locally held ISO image, Remote File Server
mounting directly from KX Mac® No Solaris No
Supported Browsers
Dominion KX II supports the following browsers:
Internet Explorer 6 and 7
Firefox® 1.5 and 2.0
Mozilla® 1.7
Safari 2.0
8 DOMINION KX II USER GUIDE
Supported Operating Systems and CIMs (Target Servers)
In addition to the new Dominion KX II D2CIMs, most Paragon® and Dominion KX I CIMs are supported. The following table displays the supported target server operating systems, CIMs, virtual media, and mouse modes:
SUPPORTED CIMS MOUSE MODES
TARGET SERVER
PARAGON CIMS
Windows XP Windows 2000 Windows 2000 Server Windows 2003 Server Windows Vista Red Hat Linux 9.0
Red Hat Enterprise Workstation 3.0 and 4.0
SUSE Linux Professional
9.2 and 10
Fedora Core 3 and above
Mac OS
All Solaris OSs supported in Dominion KX I
IBM AIX
HP UX
Remote Power Strips D2CIM-PWR Serial Devices P2CIM-SER
P2CIM-PS2 P2CIM-AUSB UKVMPD UUSBPD
P2CIM-PS2 P2CIM-AUSB UKVMPD UUSBPD P2CIM-PS2 P2CIM-AUSB UKVMPD UUSBPD P2CIM-PS2 P2CIM-AUSB UKVMPD UUSBPD P2CIM-AUSB UUSBPD
P2CIM-SUN P2CIM-SUSB
P2CIM-PS2 P2CIM-AUSB UUSBPD P2CIM-PS2 P2CIM-AUSB UUSBPD
DOMINION KX I
DCIMS
DCIM-PS2 DCIM-USB DCIM-USB G2
DCIM-PS2 DCIM-USB DCIM-USB G2
DCIM-PS2 DCIM-USB DCIM-USB G2
DCIM-PS2 DCIM-USB DCIM-USB G2
DCIM-USB DCIM-USB G2 DCIM-SUN DCIM-SUSB DCIM-USB G2 DCIM-USB DCIM-USB G2 DCIM-PS2 DCIM-USB DCIM-USB G2 DCIM-PS2
DOMINION KX II
D2CIMS
D2CIM-VUSB
D2CIM-VUSB (excluding Red Hat Enterprise Workstation 3.0)
D2CIM-VUSB
D2CIM-VUSB
D2CIM-VUSB
VM
AM IM SM
9 9 9 9
9
9
9
9 9
9
9
9
9
9
9
Legend:
VM: Virtual Media (D2CIM-VUSB only)
AM: Absolute Mouse Synchronization (D2CIM-VUSB only)
IM: Intelligent Mouse Mode
SM: Standard Mouse Mode
9: Supported
Note: D2CIM-VUSB is not supported on Sun (Solaris) targets.
CHAPTER 3: INSTALLATION AND CONFIGURATION 9
Chapter 3: Installation and Configuration
Overview
This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter.
To install and configure Dominion KX II:
1. Configure the target servers.
2. (Optional) Configure the keyboard language.
3. Configure the network firewall settings.
4. Connect the equipment.
5. Configure the Dominion KX II unit.
Step 1: Configure Target Servers
Target servers are the computers that will be accessed and controlled via the Dominion KX II. Before installing Dominion KX II, configure all target servers to ensure optimum performance. This configuration applies only to target servers, not to the client workstations (remote PCs) used to access Dominion KX II remotely. Refer to Chapter 1: Introduction, Terminology information.
for additional
To configure the target servers:
Check the video resolution.
Check the desktop background.
Adjust the mouse settings.
Perform OS-specific mouse and video configuration.
Video Resolution
Ensure that each target server’s video resolution and refresh rate are supported by Dominion KX II and that the signal is non-interlaced.
Supported Video Resolutions
Video resolution and ca synchronization. Refer to Target Server Connection Distance and Video Resolution information. Dominion KX II supports these resolutions:
640x350 @70 Hz 720x400 @85 Hz 1024x768 @90 Hz 640x350 @85 Hz 800x600 @56 Hz 1024x768 @100 Hz 640x400 @56 Hz 800x600 @60 Hz 1152x864 @60 Hz 640x400 @84 Hz 800x600 @70 Hz 1152x864 @70 Hz 640x400 @85 Hz 800x600 @72 Hz 1152x864 @75 Hz 640x480 @60 Hz 800x600 @75 Hz 1152x864 @85 Hz 640x480 @66.6 Hz 800x600 @85 Hz 1152x870 @75.1 Hz 640x480 @72 Hz 800x600 @90 Hz 1152x900 @66 Hz 640x480 @75 Hz 800x600 @100 Hz 1152x900 @76 Hz 640x480 @85 Hz 832x624 @75.1 Hz 1280x960 @60 Hz 640x480 @90 Hz 1024x768 @60 Hz 1280x960 @85 Hz 640x480 @100 Hz 1024x768 @70 Hz 1280x1024 @60 Hz 640x480 @120 Hz 1024x768 @72 Hz 1280x1024 @75 Hz 720x400 @70 Hz 1024x768 @75 Hz 1280x1024 @85 Hz 720x400 @84 Hz 1024x768 @85 Hz 1600x1200 @60 Hz
ble length are important factors in the ability to obtain mouse
for more
Note: Composite Sync and Sync-on-Green video require an additional adapter.
10 DOMINION KX II USER GUIDE
Desktop Background
For optimal bandwidth efficiency and video performance, target servers running graphical user interfaces such as Windows, Linux, X-Windows, Solaris, and KDE require configuration. The desktop background need not be completely solid; but desktop backgrounds featuring photos or complex gradients might degrade performance.
Mouse Settings
The Dominion KX II operates in several mouse modes:
Absolute Mouse Synchronization
Intelligent Mouse Mode
Standard Mouse Mode
(do not use an animated mouse)
(D2CIM-VUSB only)
For both the Standard and Intelligent mouse modes, mouse parameters must be set to specific values, which are described later in this manual. Mouse parameters do not
have to be altered for Absolute Mouse Synchronization; D2CIM-VUSB is required for this mode. Mouse configurations will vary on different target operating systems; consult your OS documentation for additional detail.
Intelligent mouse mode generally works well on most Windows platforms. Intelligent mouse mode may produce unpredictable results when active desktop is set on the target. For additional information on Intelligent Mouse mode, refer to the Raritan Multi-Platform Client (MPC) and
Raritan Remote Client (RRC) User Guide (Appendix B: Conditions for Intelligent Mouse Synchronization) available on Raritan’s Website
http://www.raritan.com/support/productdocumentation
, or on the Raritan User Manuals & Quick
Setup Guides CD ROM included with your Dominion KX II shipment.
Operating System Mouse and Video Settings
This section provides video mode and mouse information specific to the Operating System in use on the target server.
Windows XP / Windows 2003 Settings
To configure target se
rvers running Microsoft Windows XP/2003:
1. Configure the mouse settings:
a. Select Start > Control Panel > Mouse. b. Open the Pointer Options tab. In the Motion group:
- Set the mouse motion speed setting exactly to the middle speed.
- Disable the Enhanced pointer precision option.
- Click OK.
2. Disable transition effects:
a. Select the Display option from Control Panel. b. Open the Appearance tab. c. Click the Effects button. d. Clear the Use the following transition effect for menus and tooltips option. e. Click OK. f. Close the Control Panel.
CHAPTER 3: INSTALLATION AND CONFIGURATION 11
Note: For target servers running Windows 2000 or XP, you may wish to create a user name that will be used only for remote connections through Dominion KX II. This will enable you to keep the target server’s slow mouse pointer motion/acceleration settings exclusive to the Dominion KX II connection.
Windows XP and 2000 login screens revert to pre-set mouse parameters that differ from those suggested for optimal Dominion KX II performance. As a result, mouse synchronization may not be optimal for these screens. WARNING! Proceed only if you are comfortable adjusting the registry on Windows target servers. You can obtain better Dominion KX II mouse synchronization at login screens by using the Windows registry editor to change the following settings (HKEY_CURRENT_USER\Control Panel\Mouse): MouseSpeed = 0; MouseThreshold 1= 0; MouseThreshold 2 = 0.
Windows 2000 Settings
To configure target servers running Microsoft Windows 2000:
1. Configure the mouse settings:
a. Select Start > Control Panel > Mouse. b. Open the Motion tab.
- Set the acceleration to None.
- Set the mouse motion speed setting exactly to the middle speed.
- Click OK.
2. Disable transition effects:
a. Select the Display option from Control Panel. b. Open the Effects tab. c. Clear the Use the following transition effect for menus and tooltips option. d. Click OK. e. Close the Control Panel.
Windows Vista
To configure target se
rvers running Microsoft Windows Vista:
1. Configure the mouse settings:
a. Select Start > Settings > Control Panel > Mouse. b. Open the Pointer Options tab. In the Motion group:
- Set the mouse motion speed setting exactly to the middle speed.
- Disable the Enhanced pointer precision option.
- Click OK.
2. Disable animation and fade effects:
a. Select the System option from Control Panel. b. Select Advanced system settings. The System Properties dialog opens. c. Open the Advanced tab. d. Click the Settings button in the Performance group. The Performance Options dialog
opens.
e. Under Custom options, clear the following checkboxes:
12 DOMINION KX II USER GUIDE
Animation options:
Fade options:
Animate controls and elements inside windows Animate windows when minimizing and maximizing
Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking
f. Click OK. g. Close the Control Panel.
Linux Settings (Red Hat 9)
Note: The following settings are optimized for standard mouse mode only.
To configure target servers running Linux (graphical user interface):
1. Configure the mouse settings:
a. Select Main Menu > Preferences > Mouse. The Mouse Preferences dialog opens. b. Open the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. f. Close the Mouse Preferences dialog.
Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions.
2. Configure the screen resolution:
a. Select Main Menu > System Settings > Display. The Display Settings dialog opens. b. From the Display tab, select a Resolution supported by Dominion KX II. c. From the Advanced tab, verify that the Refresh Rate is supported by Dominion KX II.
Note: Once connected to the target server, in many Linux graphical environments, the <CTRL> <ALT> <+> command will change the video resolution, scrolling through all available
resolutions that remain enabled in the XF86Config file.
To configure target servers running Linux (command line):
1. Set the mouse acceleration to exactly 1 and set the threshold to exactly 1. Enter this command:
xset mouse 1 1. This should be set for execution upon login.
2. Ensure that each target server running Linux is using a resolution supported by Dominion KX
II at a standard VESA resolution and refresh rate.
3. Each Linux target server should also be set so the blanking times are within +/- 40% of
VESA standard values:
Go to the Xfree86 Configuration file XF86Config
Using a text editor, disable all non-Dominion KX II supported resolutions
Disable the virtual desktop feature (not supported by Dominion KX II)
Check blanking times (+/- 40% of VESA standard)
Restart computer
CHAPTER 3: INSTALLATION AND CONFIGURATION 13
Note: If you change video resolution, you must logout of the target server and log back in for the video settings to take effect.
Note for Red Hat 9 Target Servers
If you are running Red Hat 9 on the target server using a USB CIM, and are experiencing problems with the keyboard and/or mouse, there is an additional configuration setting you can try.
Tip: You might have to perform these steps even after a fresh OS installation.
To configure Red Hat 9 servers using USB CIMs:
1. Locate the configuration file (usually /etc/modules.conf) in your system.
2. Using the editor of your choice, make sure that the alias usb-controller line in the
modules.conf file is as follows:
alias usb-controller usb-uhci
Note: If there is another line using usb-uhci in the /etc/modules.conf file, it needs to be removed or commented out.
3. Save the file.
4. Reboot the system in order for the changes to take effect.
Linux Settings (Red Hat 4)
Note: The following settings are optimized for standard mouse mode only.
To configure target servers running Linux (graphical user interface):
1. Configure the mouse settings:
a. Select Main Menu > Preferences > Mouse. The Mouse Preferences dialog opens. b. Open the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. f. Close the Mouse Preferences dialog.
Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions.
2. Configure the screen resolution:
a. Select Main Menu > System Settings > Display. The Display Settings dialog opens. b. From the Settings tab, select a Resolution supported by Dominion KX II. c. Click OK.
Note: If you change video resolution, you must logout of the target server and log back in for the video settings to take effect.
14 DOMINION KX II USER GUIDE
SUSE Linux 10.1 Settings
Note: Do not attempt to synchronize the mouse at the SUSE login prompt. You must be connected to the target server to synchronize the mouse cursors.
To configure the mouse settings:
1. Select Desktop > Control Center. The Desktop Preferences dialog opens.
2. Select Mouse. The Mouse Preferences dialog opens.
3. Open the Motion tab.
4. Within the Speed group, set the Acceleration slider to the exact center position.
5. Within the Speed group, set the Sensitivity slider to low.
6. Within the Drag & Drop group, set the Threshold slider to small.
7. Click Close.
To configure the video:
1. From Desktop Preferences, select Graphics Card and Monitor. The Card and Monitor
Properties dialog opens.
2. Verify that a Resolution and Refresh Rate is in use that is supported by Dominion KX II.
Please refer to Supported Video Resolutions
for more information.
Note: If you change video resolution, you must logout of the target server and log back in for the video settings to take effect.
Make Linux Settings Permanent
Note: These steps may vary slightly depending on the specific version of Linux in use.
To make your settings permanent in Linux (prompt):
1. Select Main Menu > Preferences > More Preferences > Sessions. The Sessions dialog
opens.
2. Open the Session Options tab.
3. Check the Prompt on logout checkbox and click OK. This option prompts you to save your
current session when you logout.
4. Upon logging out, check the Save current setup option from the dialog presented.
5. Click OK.
Tip: If you do not
want to be prompted upon logout, follow these procedures instead.
To make your settings permanent in Linux (no prompt):
1. Select Main Menu > Preferences > More Preferences > Sessions. The Session dialog
opens.
2. Open the Session Options tab.
3. Clear the Prompt on logout checkbox.
4. Check the Automatically save changes to the session checkbox and click OK. This option
automatically saves your current session when you logout.
CHAPTER 3: INSTALLATION AND CONFIGURATION 15
Sun Solaris Settings
To configure target servers running Sun Solaris:
1. Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. This can be
performed:
From the graphical user interface:
Figure 6: Solaris Mouse Configuration
With the command line:
xset mouse a t
(where “a” is the acceleration and “t” is the threshold.)
2. All target servers must be configured to one of the display resolutions
supported by
Dominion KX II. The most popular supported resolutions for Sun machines are:
DISPLAY RESOLUTION VERTICAL REFRESH RATE ASPECT RATIO
1600 x 1200 75 Hz 4:3 1280 x 1024 60,75,85 Hz 5:4 1152 x 864 75 Hz 4:3 1024 x 768 60,70,75,85 Hz 4:3 800 x 600 56,60,72,75,85 Hz 4:3 720 x 400 85 Hz 9:5 640 x 480 60,72,75,85 Hz 4:3
3. Target servers running the Solaris operating system must output VGA video (H-and-V sync,
not composite sync).
To change your Sun video card output from composite sync to the non-default VGA output:
1. Issue the Stop+A command to drop to bootprom mode.
2. Issue the following command to change the output resolution:
setenv output-device screen:r1024x768x70
3. Issue the “boot” command to reboot the server.
You can also contact your Raritan representative to purchase a video output adapter:
IF YOU HAVE: USE THIS VIDEO OUTPUT ADAPTER:
Sun 13W3 with composite sync output APSSUN II Guardian converter Sun HD15 with composite sync output 1396C converter to convert from HD15 to 13W3 and an APSSUN II
Guardian converter to support composite sync
Sun HD15 with separate sync output APKMSUN Guardian converter
Note: Some of the standard Sun background screens may not center precisely on certain Sun servers, with dark borders. Use another background or place a light colored icon in the upper left hand corner.
16 DOMINION KX II USER GUIDE
Mouse Settings
To configure the mouse settings (Sun Solaris 10.1):
1. Select Launcher. Application Manager – Desktop Controls opens.
2. Select Mouse Style Manager. The Style Manager – Mouse dialog opens.
3. Set the Acceleration slider to 1.0.
4. Set the Threshold slider to 1.0.
5. Click OK.
Accessing the Command Line
1. Right click.
2. Select Tools > Terminal. A terminal window opens. (It is best to be at the root to issue
commands.)
Video Settings (POST)
Sun systems have two different resolution settings: a POST resolution and a GUI resolution. Please note that 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using. Run these commands from the command line.
To check current POST resolution:
Run the following command as root: # eeprom output-device
To change POST resolution:
1. # eeprom output-device=screen:r1024x768x75
2. Logout or restart computer.
Video Settings (GUI)
The GUI resolution can be checked and set using different commands depending on the video card in use. Please note that 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using. Run these commands from the command line.
The following table is organized by card:
CARD TO CHECK RESOLUTION: TO CHANGE RESOLUTION:
32-bit # /usr/sbin/pgxconfig –prconf 1. # /usr/sbin/pgxconfig –res 1024x768x75
2. Logout or restart computer.
64-bit # /usr/sbin/m64config –prconf 1. # /usr/sbin/m64config –res 1024x768x75
2. Logout or restart computer.
32-bit and
# /usr/sbin/fbconfig –prconf 1. # /usr/sbin/fbconfig –res 1024x768x75
2. Logout or restart computer.
64-bit
CHAPTER 3: INSTALLATION AND CONFIGURATION 17
IBM AIX 5.3 Settings
Follow these steps in this section to configure target servers running IBM AIX 5.3.
To configure the mouse:
1. Go to Launcher.
2. Select Style Manager.
3. Click Mouse. The Style Manager – Mouse dialog opens.
4. Use the sliders to set the Mouse acceleration to 1.0 and Threshold to 1.0.
5. Click OK.
To configure the video:
1. From the Launcher, select Application Manager.
2. Select System_Admin.
3. Select Smit > Devices > Graphic Displays > Select the Display Resolution and Refresh
Rate.
4. Select the video card in use.
5. Click List. A list of display modes is presented.
6. Select a resolution and refresh rate supported by the Dominion KX II. Please refer to
Supported Video Resolutions
for more information.
Note: If you change video resolution, you must logout of the target server and log back in for the video settings to take effect.
Make UNIX Settings Permanent
Note: These steps may vary slightly depending on the type of UNIX (e.g., Solaris, IBM AIX) and the specific version in use.
1. Select Style Manager > Startup. The Style Manager – Startup dialog opens.
2. Select the Logout Confirmation Dialog option of On. This option prompts you to save your
current session when you logout.
Apple Macintosh Settings
For target servers running
an Apple Macintosh operating system, the preferred method is to use
the D2CIM-VUSB and Absolute Mouse Synchronization.
Note: Enable the Absolute mouse scaling for MAC server option in the Port
page.
18 DOMINION KX II USER GUIDE
Step 2 (Optional): Configure Keyboard Language
Note: This step is not required if you are using the US/International language keyboard.
If you are using a non-US language, the keyboard has to be configured for the appropriate language. In addition, the keyboard language for the client machine and the target servers has to match.
Please consult the documentation for your operating system for additional information about changing the keyboard layout.
Change the Keyboard Layout Code (Sun Targets)
Use this procedure if y
ou are using a DCIM-SUSB and would like the keyboard layout changed
to another language.
To change the keyboard layout code (DCIM-SUSB only):
1. Open a Text Editor window on the Sun workstation.
2. Check that the NUM LOCK key is active and press the left CTRL key and the DEL key on
your keyboard. The Caps Lock LED starts to blink, indicating that the CIM is in Layout Code Change mode. The text window displays: Raritan Computer, Inc. Current keyboard layout code = 22h (US5 UNIX).
3. Type the layout code desired (for example, 31 for the Japanese keyboard).
4. Press Enter.
5. Shut down the unit and power ON once again. The DCIM-SUSB performs a reset (power
cycle).
6. Using MPC, type something to verify that the characters are correct.
Step 3: Configure Network Firewall Settings
To access Dominion KX II through a network firewall, your firewall must allow communication on TCP Port 5000 or another port that you designate. Refer to Network Settings information about designating another discovery port.
for additional
Firewall Settings
TO TAKE ADVANTAGE OF THE DOMINION KX II: THE FIREWALL MUST ALLOW INBOUND COMMUNICATION
Web-access capabilities Port 443 – standard TCP port for HTTPS communication Automatic redirection of HTTP requests to HTTPS (i.e., so users can type the more common “http://xxx.xxx.xxx.xxx” instead of “https://xxx.xxx.xxx.xxx”)
ON:
Port 80 – standard TCP port for HTTP communication
Loading...
+ 158 hidden pages