Raritan Computer DKSXII-V2.3.0-0D-E User Manual

Dominion KSX II
User Guide
Release 2.3.0
Copyright © 2010 Raritan, Inc. DKSXII-v2.3.0-0D-E December 2010 255-62-4030-00
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc.
© Copyright 2010 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
FCC Information
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial installation. This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. Operation of this equipment in a residential environment may cause harmful interference.
VCCI Information (Japan)
Raritan is not responsible for damage to this product resulting from accident, disaster, misuse, abuse, non-Raritan modification of the product, or other events outside of Raritan's reasonable control or not arising under normal operating conditions.
iii
Contents
Chapter 1 Introduction 1
KSX II Overview ............................................................................................................................. 2
What's New in Help ........................................................................................................................ 4
KSX II Help .................................................................................................................................... 5
Related Documentation ....................................................................................................... 5
KSX II Client Applications .............................................................................................................. 5
Virtual Media .................................................................................................................................. 6
Product Photos .............................................................................................................................. 6
Product Features ........................................................................................................................... 7
Hardware ............................................................................................................................. 7
Software ............................................................................................................................... 8
External Product Overview ............................................................................................................ 8
Terminology ................................................................................................................................. 11
Package Contents ........................................................................................................................ 13
Chapter 2 Installation and Configuration 14
Overview ...................................................................................................................................... 14
Default Login Information ............................................................................................................. 14
Getting Started ............................................................................................................................. 15
Step 1: Configure KVM Target Servers ............................................................................. 15
Step 2: Configure Network Firewall Settings ..................................................................... 24
Step 3: Connect the Equipment ......................................................................................... 25
Step 4: Configure the KSX II ............................................................................................. 30
Valid Special Characters for Target Names ...................................................................... 33
Step 5 (Optional): Configure Keyboard Language ............................................................ 37
Chapter 3 Working with Target Servers 38
Interfaces ..................................................................................................................................... 38
KSX II Local Console: KSX II Devices .............................................................................. 39
KSX II Remote Console Interface...................................................................................... 40
Proxy Server Configuration for use with KSX II, MPC, VKC and AKC ........................................ 52
Virtual KVM Client (VKC) ............................................................................................................. 53
Overview ............................................................................................................................ 53
Connecting to a KVM Target Server ................................................................................. 53
Toolbar ............................................................................................................................... 54
Switching Between KVM Target Servers .......................................................................... 55
Power Controlling a Target Server .................................................................................... 55
Disconnecting KVM Target Servers .................................................................................. 56
Choosing USB Profiles ...................................................................................................... 56
Connection Properties ....................................................................................................... 58
Contents
iv
Connection Information ..................................................................................................... 60
Keyboard Options .............................................................................................................. 60
Video Properties ................................................................................................................ 63
Mouse Options................................................................................................................... 69
VKC Virtual Media ............................................................................................................. 74
Smart Cards ....................................................................................................................... 75
Tool Options ...................................................................................................................... 76
View Options ...................................................................................................................... 79
Help Options ...................................................................................................................... 80
Active KVM Client (AKC) ............................................................................................................. 80
Overview ............................................................................................................................ 80
AKC Supported .NET Framework, Operating Systems and Browsers ............................. 81
Prerequisites for Using AKC .............................................................................................. 82
Multi-Platform Client (MPC) ......................................................................................................... 82
Launching MPC from a Web Browser ............................................................................... 82
Raritan Serial Console (RSC) ...................................................................................................... 83
Opening RSC from the Remote Console .......................................................................... 84
Chapter 4 Rack PDU (Power Strip) Outlet Control 86
Overview ...................................................................................................................................... 86
Turning Outlets On/Off and Cycling Power ................................................................................. 87
Chapter 5 Virtual Media 90
Overview ...................................................................................................................................... 91
Prerequisites for Using Virtual Media .......................................................................................... 94
Using Virtual Media via VKC and AKC in a Windows Environment ............................................ 95
Using Virtual Media ...................................................................................................................... 96
File Server Setup (File Server ISO Images Only) ........................................................................ 98
Connecting to Virtual Media ....................................................................................................... 100
Local Drives ..................................................................................................................... 100
Conditions when Read/Write is Not Available ................................................................. 101
CD-ROM/DVD-ROM/ISO Images .................................................................................... 101
Disconnecting Virtual Media ...................................................................................................... 103
Chapter 6 USB Profiles 104
Overview .................................................................................................................................... 104
CIM Compatibility ....................................................................................................................... 105
Available USB Profiles ............................................................................................................... 105
Selecting Profiles for a KVM Port .............................................................................................. 111
Mouse Modes when Using the Mac OS-X USB Profile with a DCIM-VUSB ................... 112
Chapter 7 User Management 113
User Groups ............................................................................................................................... 113
User Group List................................................................................................................ 114
Relationship Between Users and Groups ....................................................................... 114
Contents
v
Adding a New User Group ............................................................................................... 114
Modifying an Existing User Group ................................................................................... 119
Users .......................................................................................................................................... 120
User List ........................................................................................................................... 120
Adding a New User .......................................................................................................... 121
Modifying an Existing User .............................................................................................. 122
Logging a User Off (Force Logoff) ................................................................................... 122
Authentication Settings .............................................................................................................. 123
Implementing LDAP/LDAPS Remote Authentication ...................................................... 124
Returning User Group Information from Active Directory Server .................................... 127
Implementing RADIUS Remote Authentication ............................................................... 128
Returning User Group Information via RADIUS .............................................................. 131
RADIUS Communication Exchange Specifications ......................................................... 131
User Authentication Process ........................................................................................... 133
Changing a Password ................................................................................................................ 134
Chapter 8 Device Management 135
Network Settings ........................................................................................................................ 135
Network Basic Settings .................................................................................................... 136
LAN Interface Settings ..................................................................................................... 138
Device Services ......................................................................................................................... 140
Enabling Telnet ................................................................................................................ 140
Enabling SSH .................................................................................................................. 140
HTTP and HTTPS Port Settings ...................................................................................... 141
Entering the Discovery Port ............................................................................................. 141
Enabling Serial Console Access ...................................................................................... 141
Enabling Direct Port Access via URL .............................................................................. 142
Configuring Direct Port Access via Telnet, IP Address or SSH ...................................... 143
Enabling the AKC Download Server Certificate Validation ............................................. 146
Configuring Modem Settings ..................................................................................................... 147
Configuring Date/Time Settings ................................................................................................. 148
Event Management .................................................................................................................... 149
Configuring Event Management Settings ........................................................................ 150
Configuring Event Management - Destinations ............................................................... 152
Configuring Ports ....................................................................................................................... 155
Power Control .................................................................................................................. 158
Target Settings ................................................................................................................ 160
Configuring Blade Chassis .............................................................................................. 161
Configuring USB Profiles (Port Page) ............................................................................. 181
Configuring KSX II Local Port Settings ............................................................................ 183
Port Keywords ............................................................................................................................ 186
Port Group Management ........................................................................................................... 188
Chapter 9 Security Management 189
Security Settings ........................................................................................................................ 189
Login Limitations .............................................................................................................. 190
Strong Passwords ........................................................................................................... 191
User Blocking ................................................................................................................... 192
Contents
vi
Encryption & Share .......................................................................................................... 193
Enabling FIPS 140-2 ....................................................................................................... 196
Configuring IP Access Control ................................................................................................... 198
SSL Certificates ......................................................................................................................... 200
Security Banner ......................................................................................................................... 202
Chapter 10 Maintenance 204
Maintenance Features (Local/Remote Console) ....................................................................... 204
Audit Log .................................................................................................................................... 205
Device Information ..................................................................................................................... 206
Backup and Restore .................................................................................................................. 207
USB Profile Management .......................................................................................................... 210
Handling Conflicts in Profile Names ................................................................................ 211
Upgrading CIMs ......................................................................................................................... 211
Upgrading Firmware .................................................................................................................. 212
Upgrade History ......................................................................................................................... 214
Rebooting ................................................................................................................................... 215
CC Unmanage ........................................................................................................................... 216
Stopping CC-SG Management ........................................................................................ 217
Chapter 11 Diagnostics 219
Network Interface Page ............................................................................................................. 219
Network Statistics Page ............................................................................................................. 219
Ping Host Page .......................................................................................................................... 221
Trace Route to Host Page ......................................................................................................... 222
Device Diagnostics .................................................................................................................... 223
Chapter 12 Command Line Interface (CLI) 225
Overview .................................................................................................................................... 226
Accessing the KSX II Using CLI ................................................................................................ 227
SSH Connection to the KSX II ................................................................................................... 227
SSH Access from a Windows PC .................................................................................... 227
SSH Access from a UNIX/Linux Workstation .................................................................. 227
Telnet Connection to the KSX II ................................................................................................ 228
Enabling Telnet ................................................................................................................ 228
Accessing Telnet from a Windows PC ............................................................................ 228
Local Serial Port Connection to the KSX II ................................................................................ 228
Port Settings .................................................................................................................... 229
Logging On ................................................................................................................................ 229
Navigation of the CLI ................................................................................................................. 231
Completion of Commands ............................................................................................... 231
CLI Syntax -Tips and Shortcuts ....................................................................................... 232
Common Commands for All Command Line Interface Levels ........................................ 232
Initial Configuration Using CLI ................................................................................................... 233
Setting Parameters .......................................................................................................... 233
Setting Network Parameters ............................................................................................ 233
Contents
vii
CLI Prompts ............................................................................................................................... 234
CLI Commands .......................................................................................................................... 234
Security Issues ................................................................................................................ 235
Target Connections and the CLI ................................................................................................ 235
Setting Emulation on a Target ......................................................................................... 235
Port Sharing Using CLI .................................................................................................... 236
Administering the KSX II Console Server Configuration Commands ........................................ 236
Configuring Network .................................................................................................................. 236
Interface Command ......................................................................................................... 237
Name Command ........................................................................................................... 237
Connect Commands ........................................................................................................ 238
IPv6 Command ................................................................................................................ 239
Chapter 13 KSX II Local Console 240
Overview .................................................................................................................................... 240
Using the KSX II Local Console ................................................................................................. 240
Simultaneous Users ........................................................................................................ 240
KSX II Local Console Interface .................................................................................................. 241
Security and Authentication ....................................................................................................... 241
Local Console Smart Card Access ............................................................................................ 242
Local Console USB Profile Options ........................................................................................... 243
Available Resolutions................................................................................................................. 244
Port Access Page (Local Console Server Display) ................................................................... 245
Server Display ............................................................................................................................ 246
Hot Keys and Connect Keys ...................................................................................................... 247
Connect Key Examples ................................................................................................... 247
Supported Keyboard Languages ............................................................................................... 248
Special Sun Key Combinations ................................................................................................. 249
Accessing a Target Server ........................................................................................................ 250
Returning to the KSX II Local Console Interface ....................................................................... 250
Local Port Administration ........................................................................................................... 250
KSX II Local Console Local Port Settings ....................................................................... 251
KSX II Local Console Factory Reset ............................................................................... 253
Contents
viii
Resetting the KSX II Using the Reset Button ............................................................................ 254
Chapter 14 Modem Configuration 256
Certified Modems for UNIX, Linux and MPC ............................................................................. 256
Low Bandwidth KVM Settings .................................................................................................... 257
Client Dial-Up Networking Configuration ................................................................................... 258
Windows 2000 Dial-Up Networking Configuration ..................................................................... 258
Windows Vista Dial-Up Networking Configuration ..................................................................... 261
Windows XP Dial-Up Networking Configuration ........................................................................ 262
Appendix A Specifications 269
Physical Specifications .............................................................................................................. 269
Supported Operating Systems (Clients) .................................................................................... 270
Supported Operating Systems and CIMs (KVM Target Servers) .............................................. 271
Supported Browsers .................................................................................................................. 274
Computer Interface Modules (CIMs) .......................................................................................... 274
Supported Paragon CIMS and Configurations .......................................................................... 275
KSX II to KSX II Guidelines ............................................................................................. 276
KSX II to Paragon II Guidelines ....................................................................................... 277
Supported Video Resolutions .................................................................................................... 279
KSX II Local Console Support Languages ................................................................................ 280
TCP and UDP Ports Used ......................................................................................................... 280
Smart Card Readers .................................................................................................................. 282
Supported and Unsupported Smart Card Readers ......................................................... 282
Minimum System Requirements ...................................................................................... 283
Environmental Requirements .................................................................................................... 285
Emergency Connectivity ............................................................................................................ 285
Electrical Specifications ............................................................................................................. 286
Remote Connection ................................................................................................................... 286
KVM Properties .......................................................................................................................... 286
Ports Used ................................................................................................................................. 286
Target Server Connection Distance and Video Resolution ....................................................... 288
Distances for Serial Devices ...................................................................................................... 288
Network Speed Settings ............................................................................................................ 289
Connectivity ............................................................................................................................... 290
KSX II Serial RJ-45 Pinouts ....................................................................................................... 291
DB9F Nulling Serial Adapter Pinouts .............................................................................. 291
DB9M Nulling Serial Adapter Pinouts .............................................................................. 292
DB25F Nulling Serial Adapter Pinouts ............................................................................ 292
DB25M Nulling Serial Adapter Pinouts ............................................................................ 293
Appendix B Updating the LDAP/LDAPS Schema 294
Returning User Group Information ............................................................................................. 294
From LDAP/LDAPS ......................................................................................................... 294
From Microsoft Active Directory ...................................................................................... 294
Contents
ix
Setting the Registry to Permit Write Operations to the Schema ............................................... 295
Creating a New Attribute ............................................................................................................ 295
Adding Attributes to the Class ................................................................................................... 296
Updating the Schema Cache ..................................................................................................... 298
Editing rciusergroup Attributes for User Members ..................................................................... 298
Appendix C Informational Notes 301
Overview .................................................................................................................................... 301
Java ........................................................................................................................................... 301
AES 256 Prerequisites and Supported Configurations for Java ..................................... 301
Java Runtime Environment (JRE) ................................................................................... 302
IPv6 Support Notes .................................................................................................................... 303
Keyboards .................................................................................................................................. 304
Non-US Keyboards .......................................................................................................... 304
Macintosh Keyboard ........................................................................................................ 307
Dell Chassis Cable Lengths and Video Resolutions ................................................................. 307
Fedora ........................................................................................................................................ 308
Resolving Fedora Core Focus ......................................................................................... 308
Mouse Pointer Synchronization (Fedora) ........................................................................ 308
VKC and MPC Smart Card Connections to Fedora Servers ........................................... 308
Resolving Issues with Firefox Freezing when Using Fedora .......................................... 308
USB Ports and Profiles .............................................................................................................. 309
VM-CIMs and DL360 USB Ports ..................................................................................... 309
Help for Choosing USB Profiles ...................................................................................... 309
Changing a USB Profile when Using a Smart Card Reader ........................................... 311
SUSE/VESA Video Modes ........................................................................................................ 311
CIMs ........................................................................................................................................... 311
Windows 3-Button Mouse on Linux Targets .................................................................... 311
Virtual Media .............................................................................................................................. 312
Dell OptiPlex and Dimension Computers ........................................................................ 312
Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB ................. 312
Virtual Media Not Refreshed After Files Added ............................................................... 312
Target BIOS Boot Time with Virtual Media ...................................................................... 312
Virtual Media Connection Failures Using High Speed for Virtual Media Connections .... 312
CC-SG ....................................................................................................................................... 313
Virtual KVM Client Version Not Known from CC-SG Proxy Mode .................................. 313
Single Mouse Mode - Connecting to a KSX II Target Under CC-SG Control Via VKC
Using Firefox .................................................................................................................... 313
Moving Between Ports of the KSX II ............................................................................... 313
Contents
x
Appendix D FAQs 314
General Questions ..................................................................................................................... 315
Serial Access ............................................................................................................................. 317
Universal Virtual Media .............................................................................................................. 322
USB Profiles ............................................................................................................................... 323
IPv6 Networking ......................................................................................................................... 325
Remote Access .......................................................................................................................... 326
Ethernet and IP Networking ....................................................................................................... 328
Servers ....................................................................................................................................... 332
Blade Servers ............................................................................................................................ 332
Installation .................................................................................................................................. 335
Local Port ................................................................................................................................... 337
Power Control ............................................................................................................................ 339
Scalability ................................................................................................................................... 340
Security ...................................................................................................................................... 341
Smart Cards and CAC Authentication ....................................................................................... 343
Managability ............................................................................................................................... 344
Miscellaneous ............................................................................................................................ 345
Index 347
1
In This Chapter
KSX II Overview ........................................................................................ 2
What's New in Help ................................................................................... 4
KSX II Help ................................................................................................ 5
KSX II Client Applications .......................................................................... 5
Virtual Media .............................................................................................. 6
Product Photos .......................................................................................... 6
Product Features ....................................................................................... 7
External Product Overview ........................................................................ 8
Terminology ............................................................................................. 11
Package Contents ................................................................................... 13
Chapter 1
Introduction
Chapter 1: Introduction
2
KSX II Overview
Raritan's Dominion KSX II is an enterprise-class, secure digital device that provides a single integrated solution for remote KVM (keyboard, video, mouse) server access and serial device management, as well as power control from anywhere in the world from a web browser. At the rack, the KSX II provides control of all KVM server and serial targets from a single keyboard, monitor, and mouse. Total access and control of all serial targets is also available from a single local serial port. The integrated remote access capabilities of the KSX II provide full access and control of your servers from a web browser.
KSX II is easily installed using standard UTP (Cat 5/5e/6) cabling. Its advanced features include virtual media, up to 256-bit encryption, remote power control, dual Ethernet, LDAP, RADIUS, Active Directory®, Syslog integration, and web management. These features enable you to deliver higher uptime, better productivity, and bulletproof security - any time from anywhere.
KSX II products can operate as standalone devices and do not rely on a central management device. For larger data centers and enterprises, multiple KSX II devices can be integrated into a single logical solution with other Raritan devices using Raritan's CommandCenter Secure Gateway (CC-SG) management unit.
Chapter 1: Introduction
3
Diagram key
Cat5 cable
Remote virtual media USB drive(s)
Computer Interface Module (CIM)
Rack PDU (power strip)
KSX II
Local access
Remote KVM and serial devices
IP LAN/WAN
Modem access
PSTN
Remote (network) access
Chapter 1: Introduction
4
What's New in Help
The following information has been added based on enhancements and changes to the equipment and/or user documentation.
You are able to configure HTTP and/or HTTPS ports used by the
KSX II. See HTTP and HTTPS Port Settings (on page 141).
Information on the new KSX II support for smart card readers has
been added to the help. See Smart Cards (on page 75), and Smart
Card Readers (on page 282).
A security banner feature has been added that allows you to create
and display a security banner and optionally require users to accept or decline a security agreement during the KSX II login process. See
Security Banner (on page 202).
The KSX II now contains an embedded FIPS 140-2 validated
cryptographic module. See Encryption & Share (on page 193).
The KSX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL
CIMs, which provide two RJ45 connections to different KVM switches. See Supported Paragon CIMS and Configurations (on page 275).
A Direct Port Access feature that allows you to connect directly to
targets from your browser has been added to the KSX II. See Device
Services (on page 140).
Active KVM Client is now supported by the KSX II. See Active KVM
Client (AKC) (on page 80).
USB profiles are now supported by the KSX II. See USB Profiles
(on page 104).
Support for additional widescreen video resolutions has been added
to the KSX II. See Supported Video Resolutions (on page 279).
A new tab has been added to the Port Access page that allows you
to search for a server by name. See Port Access Page (on page
45).
KSX II now supports Microsoft's Window 7® operating system. See
Supported Operating Systems (Clients) (on page 270) and Supported Operating Systems and CIMs (KVM Target Servers)
(on page 271).
You can now log a user off (force logoff). See Logging a User Off
(Force Logoff) (on page 122).
Please see the release notes for a more detailed explanation of the changes applied to the device and this version of the help.
Chapter 1: Introduction
5
KSX II Help
The KSX II help provides information on how to install, set up, and configure the KSX II. It also includes information on accessing target servers and power strips, using virtual media, managing users and security, and maintaining and diagnosing the KSX II.
A PDF version of the help can be downloaded from the Raritan
Firmware and Documentation page http://www.raritan.com/support/firmware-and-documentation/ on the
Raritan website. Raritan recommends that you refer to the Raritan website for the most up-to-date user guides available.
To use online help, Active Content must be enabled in your browser. If you are using Internet Explorer 7, you must enable Scriplets. Consult your browser help for information on enabling these features.
Related Documentation
The KSX II help is accompanied by a KSX II Device Quick Setup Guide, which can be found on the Raritan Firmware and Documentation page
http://www.raritan.com/support/firmware-and-documentation/ of
Raritan's website. Installation requirements and instructions for client applications used with
the KSX II can be found in the KVM and Serial Access Clients Guide, also found on the Raritan website. Where applicable, specific client functions used with the KSX II are included in the help.
KSX II Client Applications
The following client applications can be used with the KSX II:
Virtual KVM Client (VKC) Active KVM Client (AKC) Multiplatform Client (MPC) Raritan Serial Console (RSC)
See the KVM and Serial Client Guide for additional information on the client applications. Also see the Working with Target Servers (on page
38) section of this guide, which contains information on using the clients with the KSX II.
Note: MPC and VKC require the Java™ Runtime Environment (JRE™). AKC is .NET based.
Chapter 1: Introduction
6
Virtual Media
Product Photos
All KSX II models support virtual media. The benefits of virtual media ­mounting of remote drives/media on the target server to support software installation and diagnostics - are now available in all of the KSX II models. Virtual media sessions can be secured by using 128-bit and 256-bit AES or RC4 encryption.
Each KSX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD, DVD, USB, internal and remote drives, and images. Unlike other solutions, the KSX II supports virtual media access of hard drives and remotely mounted images for added flexibility and productivity.
The new D2CIM-VUSB and D2CIM-DVUSB CIMs (computer interface module) support virtual media sessions to KVM target servers supporting the USB 2.0 interface. This new CIM also supports Absolute Mouse Synchronization as well as remote firmware updates.
Note: The black connector on the DVUSB CIM is used for keyboard and mouse. The gray connector is used for virtual media. Keep both plugs of the CIM connected to the device. The device may not operate properly if both plugs are not connected to the target server.
Chapter 1: Introduction
7
KSX II 144 and 188
CIM
Serial Adapter
Product Features
Hardware
KVM and serial remote access over IP 1U rack-mountable; brackets included DKSX2-144 - 4 serial/4 KVM server ports DKSX2-188 - 8 serial/8 KVM server ports 1 KVM channel shareable by 8 users, multiple serial users. UTP (Cat5/5e/6) server cabling Dual Ethernet ports (10/100/1000 LAN) with failover Field upgradeable Local KVM port for in-rack access
PS/2 keyboard/mouse ports One front and three back panel USB 2.0 ports for supported USB
devices
Fully concurrent with remote user access Local Graphical User Interface (GUI) for administration Both KVM and serial targets can be connected using KVM local
port
Local serial port (RS232) for CLI-based administration and serial
target access
Integrated power control Dual dedicated power control ports LED indicators for network activity, and remote KVM user status Hardware reset button Internal modem Centralized access security
Chapter 1: Introduction
8
Software
Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs Absolute Mouse Synchronization with D2CIM-VUSB CIM and
D2CIM-DVUSB CIMs
Plug-and-Play Web-based access and management Intuitive Graphical User Interface (GUI) 256-bit encryption of complete KVM signal, including video and
virtual media
LDAP/LDAPS, Active Directory®, RADIUS, or internal with local
authentication and authorization
DHCP or fixed IP addressing Smart card/CAC authentication SNMP and Syslog management IPv4 and IPv6 support Power control associated directly with servers to prevent mistakes Integration with Raritan's CommandCenter Secure Gateway
(CC-SG) management unit
CC Unmanage feature to remove the device from CC-SG control
External Product Overview
The following diagram indicates the external components of the KSX II. Note that the KSX II 144 will have 4 KVM ports and 4 serial ports as compared to the KSX II 188 used in the diagram, which has 8 KVM ports and 8 serial ports.
Chapter 1: Introduction
9
Item
Description
USB port
Remote indicator light
LAN1 and LAN2 indicator lights
Power indicator light
Chapter 1: Introduction
10
Item
Description
AC power cord plug See Power Control (on page 158) for additional
information.
Power on/off switch
LAN 3 port
Note: The LAN 3 port is reserved for future use.
LAN1 and LAN2 ports See Step 3: Connect the Equipment (on page 25) for
additional information.
Admin port See Step 3: Connect the Equipment (on page 25) for
additional information.
External modem port See Modem Configuration (on page 256) for additional
information.
Reset button See Resetting the KSX II Using the Reset Button (on
page 254) for additional information.
Local port See Step 3: Connect the Equipment (on page 25) for
additional information.
KVM ports See Step 3: Connect the Equipment (on page 25) for
additional information.
Power Ctrl. 1 and Power Ctrl. 2 See Power Control (on page 158) for additional
information.
Serial ports See Step 3: Connect the Equipment (on page 25) for
additional information.
Chapter 1: Introduction
11
Terminology
This manual uses the following terminology for the components of a typical KSX II configuration:
Chapter 1: Introduction
12
Diagram key
TCP/IP
IPv4 and/or IPv6
KVM (Keyboard, Video, Mouse)
UTP Cable (Cat5/5e/6)
KSX II
Local Access Console
Local User - an optional user console (consisting of a keyboard, mouse, and multi-sync VGA monitor) attached directly to the KSX II to control KVM target servers and serial targets locally (directly at the rack, not through the network). A USB smart card reader can also be attached at the Local port to mount onto a target server.
Local Administrator - use the Local Administrator port to connect the KSX II directly to a workstation to manage your serial targets and configure the system with a terminal emulation program such as HyperTerminal. The Local Administrator port requires the use of a standard null modem cable.
Remote PC Networked computers used to access and control KVM target
servers and serial targets connected to the KSX II. Refer to Supported Operating Systems (Clients) for a list of the Operating Systems supported by the KSX II remotely.
CIMs Dongles that connect to each target server. Available for all of
the supported Operating Systems. Refer to Supported CIMs for information about the CIMs supported by the KSX II.
Serial Adapter Adapters that connect serial cables.
Target Servers KVM Target Servers - servers with video cards and user
interfaces (for example, Windows®, Linux®, Solaris™, and so forth) connected remotely via the KSX II. Refer to Supported Operating Systems and CIMs (Target Servers) for a list of the supported Operating Systems and CIMs.
Serial Targets - Servers, routers, and switches that have a
Chapter 1: Introduction
13
Diagram key
serial port connected remotely via KSX II.
Routers
Dominion PX Rack PDU (Power Strip)
Raritan rack PDUs accessed remotely via the KSX II.
Package Contents
Amount included
Item
1
Dominion KSX II device 1
Dominion KSX II Quick Setup Guide
1
Rackmount Kit
1
AC Power Cord
1
Cat5 Network Cable
1
Cat5 Network Crossover Cable
1
Set of 4 Rubber Feet (for desktop use)
1
Application Note
1
Warranty Card
1
Phone Line Cable
1
Loopback Adapter
Each KSX II ships as a fully-configured stand-alone product in a standard 1U 19" rackmount chassis. Each KSX II device ships with the following contents:
14
In This Chapter
Overview .................................................................................................. 14
Default Login Information ........................................................................ 14
Getting Started ........................................................................................ 15
Default
Value
User name
The default user name is admin. This user has administrative privileges.
Password
The default password is raritan. Passwords are case sensitive and must be entered in the
exact case combination in which they were created. For example, the default password raritan must be entered entirely in lowercase letters.
The first time you start the KSX II, you are required to change the default password.
IP address
The KSX II ships with the default IP address of
192.168.0.192.
Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location.
Chapter 2
Installation and Configuration
Overview
This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter.
To install and configure the KSX II:
Step 1: Configure KVM Target Servers (on page 15) Step 2: Configure Network Firewall Settings (on page 24) Step 3: Connect the Equipment (on page 25) Step 4: Configure the KSX II (on page 30) Step 5 (Optional): Configure Keyboard Language (on page 37)
You will need to know the default IP address, username, and password for initial configuration. See Default Login Information (on page 14).
Default Login Information
Chapter 2: Installation and Configuration
15
Getting Started
Step 1: Configure KVM Target Servers
KVM target servers are the computers that will be accessed and controlled via the KSX II. Before installing the KSX II, configure all KVM target servers to ensure optimum performance. This configuration applies only to KVM target servers, not to the client workstations (remote PCs) used to access the KSX II remotely. See Terminology for additional information.
Desktop Background
For optimal bandwidth efficiency and video performance, KVM target servers running graphical user interfaces such as Windows®, Linux®, X-Windows, Solaris™, and KDE require configuration. The desktop background need not be completely solid but desktop backgrounds featuring photos or complex gradients might degrade performance.
Mouse Settings
The KSX II operates in several mouse modes:
Absolute Mouse Mode™ (D2CIM-VUSB only)  Intelligent Mouse Mode (do not use an animated mouse) Standard Mouse Mode
Mouse parameters do not have to be altered for Absolute Mouse Synchronization but D2CIM-VUSB or D2CIM-DVUSB is required for this mode. For both the Standard and Intelligent mouse modes, mouse parameters must be set to specific values, which are described here. Mouse configurations will vary on different target operating systems. Consult your OS documentation for additional detail.
Intelligent mouse mode generally works well on most Windows platforms. Intelligent mouse mode may produce unpredictable results when active desktop is set on the target. For additional information on Intelligent mouse mode settings, see Intelligent Mouse Mode (on page
72). Servers with internal KVM switches inside the blade chassis typically do
not support absolute mouse technology.
Chapter 2: Installation and Configuration
16
Operating System Mouse and Video Settings
This section provides video mode and mouse information specific to the operating system in use on the target server.
Windows XP, Windows 2003 and Windows 2008 Settings
To configure KVM target servers running Windows XP®,
Windows 2003® and Windows 2008®:
1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab. c. In the Motion group:
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhance pointer precision" option. Disable the Snap To option. Click OK.
2. Disable transition effects: a. Select the Display option from the Control Panel. b. Click the Appearance tab.
Click the Effects button. Deselect the "Use the following transition effect for menus
and tooltips" option.
3. Click OK and close the Control Panel.
Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KSX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the KSX II connection.
Windows XP, 2000, and 2008 login pages revert to preset mouse parameters that differ from those suggested for optimal KSX II performance. As a result, mouse synchronization may not be optimal for these screens.
WARNING! Proceed only if you are comfortable adjusting the registry on Windows KVM target servers. You can obtain better KSX II mouse synchronization at the login pages by using the Windows registry editor to change the following settings: HKey_USERS\.DEFAULT\Control Panel\Mouse: > MouseSpeed = 0;MouseThreshold 1=0;MouseThreshold 2=0.
Chapter 2: Installation and Configuration
17
Windows Vista Settings
To configure KVM target servers running Windows Vista®
operating system:
1. Configure the mouse settings: a. Choose Start > Settings > Control Panel > Mouse. b. Select "Advanced system settings" from the left navigation panel.
The System Properties dialog opens. c. Click the Pointer Options tab. d. In the Motion group:
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhanced pointer precision" option.
Click OK.
2. Disable animation and fade effects: a. Select the System option from the Control Panel. b. Select Performance Information then Tools > Advanced Tools >
Adjust to adjust the appearance and performance of Windows. c. Click the Advanced tab. d. Click the Settings button in the Performance group to open the
Performance Options dialog. e. Under Custom options, deselect the following checkboxes:
Animation options:
Animate controls and elements inside windows
Animate windows when minimizing and maximizing Fade options:
Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
3. Click OK and Close the Control Panel.
To configure KVM target servers running Windows 7® operating
system:
1. Configure the mouse settings: a. Choose Start > Control Panel > Hardware and Sound > Mouse. b. Click the Pointer Options tab. c. In the Motion group:
Chapter 2: Installation and Configuration
18
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhanced pointer precision" option. Click OK.
2. Disable animation and fade effects: a. Select Control Panel > System and Security. b. Select System and then select "Advanced system settings" from
the left navigation panel. The System Properties dialog appears. c. Click the Advanced tab. d. Click the Settings button in the Performance group to open the
Performance Options dialog. e. Under Custom options, deselect the following checkboxes:
Animation options:
Animate controls and elements inside windows
Animate windows when minimizing and maximizing Fade options:
Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
3. Click OK and Close the Control Panel.
Windows 2000 Settings
To configure KVM target servers running Microsoft Windows
2000® operating system:
1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Motion tab.
Set the acceleration to None. Set the mouse motion speed setting to exactly the middle
speed.
Click OK.
2. Disable transition effects: a. Select the Display option from the Control Panel. b. Click the Effects tab.
Chapter 2: Installation and Configuration
19
Deselect the "Use the following transition effect for menus
and tooltips" option.
3. Click OK and close the Control Panel.
Linux Settings (Red Hat 4)
Note: The following settings are optimized for Standard Mouse mode only.
To configure KVM target servers running Linux® (graphical user
interface):
1. Configure the mouse settings: a. Red Hat 5 users, choose Main Menu > Preferences > Mouse.
Red Hat 4 users, choose System > Preferences > Mouse. The
Mouse Preferences dialog appears. b. Click on the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact
center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. f. Close the Mouse Preferences dialog.
Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions.
2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display. The Display
Settings dialog appears. b. On the Settings tab, select a Resolution supported by the KSX II. c. Click OK.
Note: Once connected to the target server, in many Linux graphical environments, the <Ctrl> <Alt> <+> command will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, depending on your X server distribution
Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
Chapter 2: Installation and Configuration
20
SUSE Linux 10.1 Settings
Note: Do not attempt to synchronize the mouse at the SUSE Linux® login prompt. You must be connected to the target server to synchronize the mouse cursors.
To configure the mouse settings:
1. Choose Desktop > Control Center. The Desktop Preferences dialog appears.
2. Click Mouse. The Mouse Preferences dialog appears.
3. Open the Motion tab.
4. Within the Speed group, set the Acceleration slider to the exact center position.
5. Within the Speed group, set the Sensitivity slider to low.
6. Within the Drag & Drop group, set the Threshold slider to small.
7. Click Close.
To configure the video:
1. Choose Desktop Preferences > Graphics Card and Monitor. The Card and Monitor Properties dialog appears.
2. Verify that a Resolution and Refresh Rate is in use that is supported by the KSX II. See Supported Video Resolutions (on page 279) for more information.
Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
Make Linux Settings Permanent
Note: These steps may vary slightly depending on the specific version of Linux® in use.
To make your settings permanent in Linux (prompt):
1. Choose System Menu > Preferences > Personal > Sessions.
2. Click the Session Options tab.
3. Select the "Prompt on log off" checkbox and click OK. This option prompts you to save your current session when you log out.
4. Upon logging out, select the "Save current setup" option from the dialog.
5. Click OK.
Loading...
+ 332 hidden pages