Raritan Computer DKX2-V2.3.5-0N-E User Manual

Page 1
Dominion KX II
User Guide
Release 2.3.5
Copyright © 2011 Raritan, Inc. DKX2-v2.3.5-0N-E March 2011 255-62-4023-00
Page 2
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc.
© Copyright 2011 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
FCC Information
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial installation. This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. Operation of this equipment in a residential environment may cause harmful interference.
VCCI Information (Japan)
Raritan is not responsible for damage to this product resulting from accident, disaster, misuse, abuse, non-Raritan modification of the product, or other events outside of Raritan's reasonable control or not arising under normal operating conditions.
Page 3
iii
Contents
Chapter 1 Introduction 1
KX II Overview ............................................................................................................................... 2
KX II Help ....................................................................................................................................... 4
Related Documentation ....................................................................................................... 5
KX II Client Applications ................................................................................................................ 5
Virtual Media .................................................................................................................................. 6
Product Photos .............................................................................................................................. 7
Product Features ........................................................................................................................... 9
Hardware ............................................................................................................................. 9
Software ............................................................................................................................. 10
Terminology ................................................................................................................................. 10
Package Contents ........................................................................................................................ 12
Chapter 2 Installation and Configuration 13
Overview ...................................................................................................................................... 13
Default Login Information ............................................................................................................. 13
Getting Started ............................................................................................................................. 14
Step 1: Configure KVM Target Servers ............................................................................. 14
Step 2: Configure Network Firewall Settings ..................................................................... 26
Step 3: Connect the Equipment ......................................................................................... 27
Step 4: Configure the KX II ................................................................................................ 29
Valid Special Characters for Target Names ...................................................................... 33
Step 5 (Optional): Configure Keyboard Language ............................................................ 35
Chapter 3 Working with Target Servers 37
Interfaces ..................................................................................................................................... 37
KX II Local Console Interface ............................................................................................ 38
KX II Remote Console Interface ........................................................................................ 38
Proxy Server Configuration for use with MPC, VKC and AKC .................................................... 50
Virtual KVM Client (VKC) ............................................................................................................. 51
Overview ............................................................................................................................ 51
Connecting to a KVM Target Server ................................................................................. 51
Toolbar ............................................................................................................................... 51
Switching Between KVM Target Servers .......................................................................... 53
Power Controlling a Target Server .................................................................................... 53
Disconnecting KVM Target Servers .................................................................................. 54
Choosing USB Profiles ...................................................................................................... 54
Connection Properties ....................................................................................................... 55
Connection Information ..................................................................................................... 57
Keyboard Options .............................................................................................................. 57
Page 4
Contents
iv
Video Properties ................................................................................................................ 63
Mouse Options................................................................................................................... 68
VKC Virtual Media ............................................................................................................. 73
Smart Cards (VKC, AKC and MPC) .................................................................................. 74
Tool Options ...................................................................................................................... 76
View Options ...................................................................................................................... 79
Help Options ...................................................................................................................... 80
Active KVM Client (AKC) ............................................................................................................. 80
Overview ............................................................................................................................ 80
AKC Supported Operating Systems and Browsers ........................................................... 81
Prerequisites for Using AKC .............................................................................................. 82
Multi-Platform Client (MPC) ......................................................................................................... 82
Launching MPC from a Web Browser ............................................................................... 82
Chapter 4 Rack PDU (Power Strip) Outlet Control 84
Overview ...................................................................................................................................... 84
Turning Outlets On/Off and Cycling Power ................................................................................. 85
Chapter 5 Virtual Media 88
Overview ...................................................................................................................................... 89
Prerequisites for Using Virtual Media .......................................................................................... 92
Using Virtual Media via VKC and AKC in a Windows Environment ............................................ 93
Using Virtual Media ...................................................................................................................... 94
File Server Setup (File Server ISO Images Only) ........................................................................ 95
Connecting to Virtual Media ......................................................................................................... 97
Local Drives ....................................................................................................................... 97
Conditions when Read/Write is Not Available ................................................................... 98
CD-ROM/DVD-ROM/ISO Images ...................................................................................... 99
Disconnecting Virtual Media ...................................................................................................... 100
Chapter 6 USB Profiles 101
Overview .................................................................................................................................... 101
CIM Compatibility ....................................................................................................................... 102
Available USB Profiles ............................................................................................................... 102
Selecting Profiles for a KVM Port .............................................................................................. 108
Mouse Modes when Using the Mac OS-X USB Profile with a DCIM-VUSB ................... 109
Chapter 7 User Management 110
User Groups ............................................................................................................................... 110
User Group List................................................................................................................ 111
Relationship Between Users and Groups ....................................................................... 111
Adding a New User Group ............................................................................................... 111
Modifying an Existing User Group ................................................................................... 118
Users .......................................................................................................................................... 119
User List ........................................................................................................................... 119
Page 5
Contents
v
Adding a New User .......................................................................................................... 120
Modifying an Existing User .............................................................................................. 120
Logging a User Off (Force Logoff) ................................................................................... 121
Authentication Settings .............................................................................................................. 122
Implementing LDAP/LDAPS Remote Authentication ...................................................... 123
Returning User Group Information from Active Directory Server .................................... 127
Implementing RADIUS Remote Authentication ............................................................... 128
Returning User Group Information via RADIUS .............................................................. 131
RADIUS Communication Exchange Specifications ......................................................... 131
User Authentication Process ........................................................................................... 133
Changing a Password ................................................................................................................ 134
Chapter 8 Device Management 135
Network Settings ........................................................................................................................ 135
Network Basic Settings .................................................................................................... 136
LAN Interface Settings ..................................................................................................... 138
Device Services ......................................................................................................................... 140
Enabling SSH .................................................................................................................. 140
HTTP and HTTPS Port Settings ...................................................................................... 140
Entering the Discovery Port ............................................................................................. 141
Configuring and Enabling Tiering .................................................................................... 142
Enabling Direct Port Access via URL .............................................................................. 146
Enabling the AKC Download Server Certificate Validation ............................................. 147
Configuring Modem Settings ..................................................................................................... 148
Configuring Date/Time Settings ................................................................................................. 149
Event Management .................................................................................................................... 151
Configuring Event Management - Settings ...................................................................... 151
Event Management - Destinations .................................................................................. 153
Power Supply Setup .................................................................................................................. 157
Configuring Ports ....................................................................................................................... 158
Configuring Standard Target Servers .............................................................................. 159
Configuring KVM Switches .............................................................................................. 160
Configuring Rack PDU (Power Strip) Targets ................................................................. 162
Configuring Blade Chassis .............................................................................................. 167
Configuring USB Profiles (Port Page) ............................................................................. 187
Configuring KX II Local Port Settings .............................................................................. 190
Port Group Management ........................................................................................................... 194
Chapter 9 Security Management 195
Security Settings ........................................................................................................................ 195
Login Limitations .............................................................................................................. 196
Strong Passwords ........................................................................................................... 198
User Blocking ................................................................................................................... 199
Encryption & Share .......................................................................................................... 201
Enabling FIPS 140-2 ....................................................................................................... 204
Page 6
Contents
vi
Configuring IP Access Control ................................................................................................... 205
SSL Certificates ......................................................................................................................... 207
Security Banner ......................................................................................................................... 209
Chapter 10 Maintenance 211
Audit Log .................................................................................................................................... 211
Device Information ..................................................................................................................... 212
Backup and Restore .................................................................................................................. 213
USB Profile Management .......................................................................................................... 216
Handling Conflicts in Profile Names ................................................................................ 217
Upgrading CIMs ......................................................................................................................... 217
Upgrading Firmware .................................................................................................................. 218
Upgrade History ......................................................................................................................... 221
Rebooting ................................................................................................................................... 221
Stopping CC-SG Management .................................................................................................. 223
Chapter 11 Diagnostics 225
Network Interface Page ............................................................................................................. 225
Network Statistics Page ............................................................................................................. 226
Ping Host Page .......................................................................................................................... 228
Trace Route to Host Page ......................................................................................................... 228
Device Diagnostics .................................................................................................................... 230
Chapter 12 Command Line Interface (CLI) 232
Overview .................................................................................................................................... 232
Accessing the KX II Using CLI ................................................................................................... 233
SSH Connection to the KX II ..................................................................................................... 233
SSH Access from a Windows PC .................................................................................... 233
SSH Access from a UNIX/Linux Workstation .................................................................. 234
Logging In .................................................................................................................................. 234
Navigation of the CLI ................................................................................................................. 235
Completion of Commands ............................................................................................... 236
CLI Syntax -Tips and Shortcuts ....................................................................................... 236
Common Commands for All Command Line Interface Levels ........................................ 236
Initial Configuration Using CLI ................................................................................................... 237
Setting Parameters .......................................................................................................... 237
Setting Network Parameters ............................................................................................ 238
CLI Prompts ............................................................................................................................... 238
CLI Commands .......................................................................................................................... 238
Security Issues ................................................................................................................ 239
Administering the KX II Console Server Configuration Commands .......................................... 239
Configuring Network .................................................................................................................. 240
Interface Command ......................................................................................................... 240
Name Command ........................................................................................................... 241
IPv6 Command ................................................................................................................ 241
Page 7
Contents
vii
Chapter 13 KX II Local Console 242
Overview .................................................................................................................................... 242
Using the KX II Local Console ................................................................................................... 242
Simultaneous Users ........................................................................................................ 242
KX II Local Console Interface .................................................................................................... 243
Security and Authentication ....................................................................................................... 243
Local Console Smart Card Access ............................................................................................ 244
Smart Card Access in KX2 8 Devices ............................................................................. 245
Local Console USB Profile Options ........................................................................................... 245
Available Resolutions................................................................................................................. 246
Port Access Page (Local Console Server Display) ................................................................... 247
Hot Keys and Connect Keys ...................................................................................................... 249
Connect Key Examples ................................................................................................... 249
Special Sun Key Combinations ................................................................................................. 250
Accessing a Target Server ........................................................................................................ 251
Returning to the KX II Local Console Interface ......................................................................... 251
Local Port Administration ........................................................................................................... 251
Configuring KX II Local Console Local Port Settings ...................................................... 252
KX II Local Console Factory Reset ................................................................................. 255
Resetting the KX II Using the Reset Button ............................................................................... 256
Appendix A Specifications 257
Physical Specifications .............................................................................................................. 257
Environmental Requirements .................................................................................................... 259
Supported Operating Systems (Clients) .................................................................................... 260
Supported CIMs and Operating Systems (Target Servers) ....................................................... 261
Supported Operating Systems and CIMs (KVM Target Servers) .............................................. 267
Computer Interface Modules (CIMs) .......................................................................................... 269
Supported Browsers .................................................................................................................. 270
Certified Modems ....................................................................................................................... 271
Devices Supported by the KX2-832 and KX2-864 Extended Local Port ................................... 271
Target Server Connection Distance and Video Resolution ....................................................... 271
KX2-832 and KX2-864 Extended Local Port Recommended Maximum Distances .................. 272
Remote Connection ................................................................................................................... 272
Supported Video Resolutions .................................................................................................... 272
Supported Keyboard Languages ............................................................................................... 274
Smart Card Readers .................................................................................................................. 275
Supported and Unsupported Smart Card Readers ......................................................... 275
Minimum System Requirements ...................................................................................... 276
TCP and UDP Ports Used ......................................................................................................... 278
Network Speed Settings ............................................................................................................ 280
Appendix B Updating the LDAP Schema 282
Returning User Group Information ............................................................................................. 282
From LDAP/LDAPS ......................................................................................................... 282
From Microsoft Active Directory ...................................................................................... 282
Page 8
Contents
viii
Setting the Registry to Permit Write Operations to the Schema ............................................... 283
Creating a New Attribute ............................................................................................................ 283
Adding Attributes to the Class ................................................................................................... 284
Updating the Schema Cache ..................................................................................................... 286
Editing rciusergroup Attributes for User Members ..................................................................... 286
Appendix C Informational Notes 289
Overview .................................................................................................................................... 289
Java Runtime Environment (JRE) ............................................................................................. 289
IPv6 Support Notes .................................................................................................................... 290
Keyboards .................................................................................................................................. 291
Non-US Keyboards .......................................................................................................... 291
Macintosh Keyboard ........................................................................................................ 293
Dell Chassis Cable Lengths and Video Resolutions ................................................................. 294
Fedora ........................................................................................................................................ 294
Resolving Fedora Core Focus ......................................................................................... 294
Mouse Pointer Synchronization (Fedora) ........................................................................ 294
VKC and MPC Smart Card Connections to Fedora Servers ........................................... 294
Resolving Issues with Firefox Freezing when Using Fedora .......................................... 295
Video Modes and Resolutions ................................................................................................... 295
SUSE/VESA Video Modes .............................................................................................. 295
Supported Video Resolutions Not Displaying .................................................................. 295
USB Ports and Profiles .............................................................................................................. 296
VM-CIMs and DL360 USB Ports ..................................................................................... 296
Help for Choosing USB Profiles ...................................................................................... 296
Changing a USB Profile when Using a Smart Card Reader ........................................... 298
CIMs ........................................................................................................................................... 298
Windows 3-Button Mouse on Linux Targets .................................................................... 298
Windows 2000 Composite USB Device Behavior for Virtual Media ................................ 299
Virtual Media .............................................................................................................................. 299
Virtual Media Not Refreshed After Files Added ............................................................... 299
Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB ................. 300
Target BIOS Boot Time with Virtual Media ...................................................................... 300
Virtual Media Connection Failures Using High Speed for Virtual Media Connections .... 300
CC-SG ....................................................................................................................................... 300
Virtual KVM Client Version Not Known from CC-SG Proxy Mode .................................. 300
Single Mouse Mode - Connecting to a KX II Target Under CC-SG Control Via VKC Using
Firefox .............................................................................................................................. 300
Proxy Mode and MPC ..................................................................................................... 301
Moving Between Ports of the KX II .................................................................................. 301
Page 9
Contents
ix
Appendix D FAQs 302
General Questions ..................................................................................................................... 303
Remote Access .......................................................................................................................... 305
Universal Virtual Media .............................................................................................................. 307
USB Profiles ............................................................................................................................... 308
Bandwidth and KVM-over-IP Performance ................................................................................ 310
Ethernet and IP Networking ....................................................................................................... 315
IPv6 Networking ......................................................................................................................... 317
Servers ....................................................................................................................................... 319
Blade Servers ............................................................................................................................ 320
Installation .................................................................................................................................. 322
Local Port ................................................................................................................................... 324
Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) ..................................... 326
Power Control ............................................................................................................................ 327
Scalability ................................................................................................................................... 329
Computer Interface Modules (CIMs) .......................................................................................... 331
Security ...................................................................................................................................... 332
Smart Cards and CAC Authentication ....................................................................................... 334
Manageability ............................................................................................................................. 335
Miscellaneous ............................................................................................................................ 336
Index 337
Page 10
1
In This Chapter
KX II Overview ........................................................................................... 2
KX II Help................................................................................................... 4
KX II Client Applications ............................................................................ 5
Virtual Media .............................................................................................. 6
Product Photos .......................................................................................... 7
Product Features ....................................................................................... 9
Terminology ............................................................................................. 10
Package Contents ................................................................................... 12
Chapter 1
Introduction
Page 11
Chapter 1: Introduction
2
KX II Overview
Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can be controlled with a standard KX II. With the KX II 8-user model, up to 32 servers can be controlled with the KX2-832 and up to 64 servers can be controlled with the KX2-864.
The KX II supports up to 8 video channels, allowing up to eight concurrent users to connect to eight different video targets at any given point in time. At the rack, the KX II provides BIOS-level control of up to 64 servers and other IT devices from a single keyboard, monitor, and mouse. The integrated remote access capabilities of the KX II provide the same levels of control of your servers via a web browser.
The KX II is easily installed using standard UTP (Cat 5/5e/6) cabling. Its advanced features include virtual media, 128-bit encryption, dual power supplies, remote power control, dual Ethernet, LDAP, RADIUS, Active Directory®, Syslog integration, external modem capabilities, and web management. The KX II 8-user model also provides an extended local port located on the back of the device. These features enable you to deliver higher up-time, better productivity, and bulletproof security - at any time from anywhere.
KX II products can operate as standalone appliances and do not rely on a central management device. For larger data centers and enterprises, numerous KX II devices (along with Dominion SX devices for remote serial console access and Dominion KSX for remote/branch office management) can be integrated into a single logical solution using Raritan's CommandCenter Secure Gateway (CC-SG) management unit.
Page 12
Chapter 1: Introduction
3
Page 13
Chapter 1: Introduction
4
Diagram key
Cat5 cable
Remote virtual media USB drive(s)
Computer Interface Module (CIM)
Rack PDU (power strip)
KX II
Local access
Note: KX2-832 and KX2-864 also use an extended local port.
Remote KVM and serial devices
IP LAN/WAN
Modem
PSTN
Remote (network) access
KX II Help
The KX II help provides information on how to install, set up, and configure the KX II. It also includes information on accessing target servers and power strips, using virtual media, managing users and security, and maintaining and diagnosing the KX II.
A PDF version of the help can be downloaded from the Raritan
Firmware and Documentation page http://www.raritan.com/support/firmware-and-documentation/ on the
Raritan website. Raritan recommends that you refer to the Raritan website for the most up-to-date user guides available.
To use online help, Active Content must be enabled in your browser. If you are using Internet Explorer 7, you must enable Scriplets. Consult your browser help for information on enabling these features.
Page 14
Chapter 1: Introduction
5
Related Documentation
Product
Works with...
MPC
RRC
VKC
RSC
AKC
KX II (Generation 2)
KX II 2.2 (or later)
The KX II help is accompanied by a KX II Device Quick Setup Guide, which can be found on the Raritan Firmware and Documentation page
http://www.raritan.com/support/firmware-and-documentation/ of
Raritan's website. Installation requirements and instructions for client applications used with
the KX II can be found in the KVM and Serial Access Clients Guide, also found on the Raritan website. Where applicable, specific client functions used with the KX II are included in the help.
KX II Client Applications
The following client applications can be used in the KX II:
See the KVM and Serial Client Guide for additional information on the client applications. Also see the Working with Target Servers (on page
37) section of this guide, which contains information on using the clients with the KX II.
Note: MPC and VKC require the Java™ Runtime Environment (JRE™). AKC is .NET based.
Page 15
Chapter 1: Introduction
6
Virtual Media
All KX II models support virtual media. The benefits of virtual media ­mounting of remote drives/media on the target server to support software installation and diagnostics - are now available in all of the KX II models.
Each KX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD, DVD, USB, internal and remote drives and images. Unlike other solutions, the KX II supports virtual media access of hard drives and remotely mounted images for added flexibility and productivity.
Virtual media sessions are secured using 128-bit AES or RC4 encryption.
The D2CIM-VUSB CIM and D2CIM-DVUSB (computer interface module) support virtual media sessions to KVM target servers supporting the USB
2.0 interface. These CIMs also support Absolute Mouse Synchronization™ as well as remote firmware update.
Note: The black connector on the DVUSB CIM is used for keyboard and mouse. The gray connector is used for virtual media. Keep both plugs of the CIM connected to the device. The device may not operate properly if both plugs are not connected to the target server.
Page 16
Chapter 1: Introduction
7
Product Photos
KX II
KX2-832
Page 17
Chapter 1: Introduction
8
KX2-864
Page 18
Chapter 1: Introduction
9
Product Features
Hardware
Integrated KVM-over-IP remote access 1U or 2U rack-mountable (brackets included) Dual power supplies with failover; autoswitching power supply with
power failure warning
8, 16, 32, or 64 (on KX2-464) server ports 32 (KX2-832) or 64 (KX2-864) server ports Support for tiering in which a base KX II device is used to access
multiple other tiered devices. See Configuring and Enabling
Tiering (on page 142) for more information on tiering.
Up to 8 video channels, depending on the device model, that allows
up to 8 users to connect to the KX II at once
Multiple user capacity (1/2/4/8 remote users; 1 local user) UTP (Cat5/5e/6) server cabling Dual Ethernet ports (10/100/1000 LAN) with failover Field upgradable Local User port for in-rack access
USB keyboard/mouse ports. One front and three back panel USB 2.0 ports for supported USB
devices
Fully concurrent with remote user access Local graphical user interface (GUI) for administration
Extended local port on the KX2-832 and KX2-864 models provide
extended reach to in-rack access on KX2 devices
Centralized access security Integrated power control LED indicators for dual power status, network activity, and remote
user status
Hardware Reset button Serial port to connect to an external modem
Page 19
Chapter 1: Introduction
10
Software
Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs Absolute Mouse Synchronization with D2CIM-VUSB CIM and
D2CIM-DVUSB CIMs
Plug-and-Play Web-based access and management Intuitive graphical user interface (GUI) 128-bit encryption of complete KVM signal, including video and
virtual media
LDAP, Active Directory®, RADIUS, or internal authentication and
authorization
DHCP or fixed IP addressing Smart card/CAC authentication SNMP and Syslog management IPv4 and IPv6 support Power control associated directly with servers to prevent mistakes Integration with Raritan's CommandCenter Secure Gateway
(CC-SG) management unit
CC Unmanage feature to remove device from CC-SG control
Terminology
This manual uses the following terminology for the components of a typical KX II configuration:
Page 20
Chapter 1: Introduction
11
Diagram Key
TCP/IP IPv4 and/or IPv6
KVM (Keyboard, Video, Mouse)
UTP Cable (Cat5/5e/6)
KX II
Local Access Console Local User - an optional user console (consisting of a
keyboard, mouse, and multi-sync VGA monitor) attached directly to the KX II to control KVM target servers (directly at the rack, not through the network). A USB smart card reader can also be attached at the Local port to mount onto a target server. An extended local port is also provided on the DKX2-832 and DKX2-864 models.
Remote PC Networked computers used to access and control KVM
target servers connected to the KX II. A USB smart card reader can also be attached to the remote PC and attached to a target server via the KX II.
CIMS Dongles that connect to each target server or rack PDU
(power strip). Available for all of the supported operating systems.
Target Servers KVM Target Servers - servers with video cards and
user interfaces (for example, Windows® operating system®, Linux®, Solaris™, etc.) accessed remotely via the KX II.
Dominion PX Rack PDU (Power Strips) Raritan rack PDUs accessed remotely via the KX II.
See Supported CIMs and Operating Systems (Target Servers) for a list of the supported operating systems and CIMs, and see Supported
Operating Systems (Clients) (on page 260) for a list of the operating
systems supported by the KX II remotely.
Page 21
Chapter 1: Introduction
12
Package Contents
Amount included
Item
1
KX II device
1
KX II Quick Setup Guide
1
Rackmount kit
1
AC power cords
1
Cat5 network cable
1
Cat5 network crossover cable
1
Set of 4 rubber feet (for desktop use)
1
Application note
1
Warranty card
Each KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmount chassis. Each KX II device ships with the following contents:
Page 22
13
In This Chapter
Overview .................................................................................................. 13
Default Login Information ........................................................................ 13
Getting Started ........................................................................................ 14
Default
Value
User name
The default user name is admin. This user has administrative privileges.
Password
The default password is raritan. Passwords are case sensitive and must be entered in the
exact case combination in which they were created. For example, the default password raritan must be entered entirely in lowercase letters.
The first time you start the KX II, you are required to change the default password.
IP address
The KX II ships with the default IP address of
192.168.0.192.
Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location.
Chapter 2
Installation and Configuration
Overview
This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter.
To install and configure the KX II:
Step 1: Configure KVM Target Servers (on page 14) Step 2: Configure Network Firewall Settings (on page 26) Step 3: Connect the Equipment (on page 27) Step 4: Configure the KX II (on page 29) Step 5 (Optional): Configure Keyboard Language (on page 35)
Also included in this section is the default login information you will need. Specifically, the default IP address, user name, and password. See
Default Login Information (on page 13).
Default Login Information
Page 23
Chapter 2: Installation and Configuration
14
Getting Started
Step 1: Configure KVM Target Servers
KVM target servers are the computers that will be accessed and controlled via the KX II. Before installing the KX II, configure all KVM target servers to ensure optimum performance. This configuration applies only to KVM target servers, not to the client workstations (remote PCs) used to access the KX II remotely. See Terminology (on page 10) for additional information.
Desktop Background
For optimal bandwidth efficiency and video performance, KVM target servers running graphical user interfaces such as Windows®, Linux®, X-Windows, Solaris™, and KDE require configuration. The desktop background need not be completely solid but desktop backgrounds featuring photos or complex gradients might degrade performance.
Mouse Settings
The KX II operates in several mouse modes:
Absolute Mouse Mode™ (D2CIM-VUSB only)  Intelligent Mouse Mode (do not use an animated mouse) Standard Mouse Mode
Mouse parameters do not have to be altered for Absolute Mouse Synchronization but D2CIM-VUSB or D2CIM-DVUSB is required for this mode. For both the Standard and Intelligent mouse modes, mouse parameters must be set to specific values, which are described here. Mouse configurations will vary on different target operating systems. Consult your OS documentation for additional detail.
Intelligent mouse mode generally works well on most Windows platforms. Intelligent mouse mode may produce unpredictable results when active desktop is set on the target. For additional information on Intelligent mouse mode settings, see Intelligent Mouse Mode (on page
71). Servers with internal KVM switches inside the blade chassis typically do
not support absolute mouse technology.
Page 24
Chapter 2: Installation and Configuration
15
Windows XP, Windows 2003 and Windows 2008 Settings
To configure KVM target servers running Microsoft® Windows
XP® operating system, Windows 2003® operating system or Windows 2008® operating systems:
1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab. c. In the Motion group:
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhance pointer precision" option. Disable the Snap To option. Click OK.
Note: When you are running Windows 2003 on your target server, if you access the server via KVM and perform any one off the actions listed below, mouse synchronization may be lost if it has been previously enabled. You will need to select the Synchronize Mouse command from the Mouse menu in the client to enable it again. Following are the actions that may cause this to occur:
- Opening a text editor.
- Accessing the Mouse Properties, Keyboard Properties, and Phone and Mode Options from the Windows Control Panel.
2. Disable transition effects: a. Select the Display option from the Control Panel. b. Click the Appearance tab. c. Click the Effects button. d. Deselect the "Use the following transition effect for menus and
tooltips" option.
e. Click OK.
3. Close the Control Panel.
Page 25
Chapter 2: Installation and Configuration
16
Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the KX II connection.
Windows XP, 2000, and 2008 login pages revert to preset mouse parameters that differ from those suggested for optimal KX II performance. As a result, mouse synchronization may not be optimal for these screens.
WARNING! Proceed only if you are comfortable adjusting the registry on Windows KVM target servers. You can obtain better KX II mouse synchronization at the login pages by using the Windows registry editor to change the following settings: HKey_USERS\.DEFAULT\Control Panel\Mouse: > MouseSpeed = 0;MouseThreshold 1=0;MouseThreshold 2=0.
Windows Vista Settings
To configure KVM target servers running Windows Vista®
operating system:
1. Configure the mouse settings: a. Choose Start > Settings > Control Panel > Mouse. b. Select "Advanced system settings" from the left navigation panel.
The System Properties dialog opens. c. Click the Pointer Options tab. d. In the Motion group:
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhanced pointer precision" option.
Click OK.
2. Disable animation and fade effects: a. Select the System option from the Control Panel. b. Select Performance Information then Tools > Advanced Tools >
Adjust to adjust the appearance and performance of Windows. c. Click the Advanced tab. d. Click the Settings button in the Performance group to open the
Performance Options dialog. e. Under Custom options, deselect the following checkboxes: Animation options:
Page 26
Chapter 2: Installation and Configuration
17
Animate controls and elements inside windows
Animate windows when minimizing and maximizing Fade options:
Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
3. Click OK and Close the Control Panel.
To configure KVM target servers running Windows 7® operating
system:
1. Configure the mouse settings: a. Choose Start > Control Panel > Hardware and Sound > Mouse. b. Click the Pointer Options tab. c. In the Motion group:
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhanced pointer precision" option. Click OK.
2. Disable animation and fade effects: a. Select Control Panel > System and Security. b. Select System and then select "Advanced system settings" from
the left navigation panel. The System Properties dialog appears. c. Click the Advanced tab. d. Click the Settings button in the Performance group to open the
Performance Options dialog. e. Under Custom options, deselect the following checkboxes:
Animation options:
Animate controls and elements inside windows
Animate windows when minimizing and maximizing Fade options:
Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
3. Click OK and Close the Control Panel.
Page 27
Chapter 2: Installation and Configuration
18
Windows 2000 Settings
To configure KVM target servers running Microsoft® Windows
2000® operating system:
1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Motion tab.
Set the acceleration to None. Set the mouse motion speed setting to exactly the middle
speed.
Click OK.
2. Disable transition effects: a. Select the Display option from the Control Panel. b. Click the Effects tab.
Deselect the "Use the following transition effect for menus
and tooltips" option.
3. Click OK and close the Control Panel.
Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the KX II connection.
Windows XP, 2000, and 2008 login pages revert to preset mouse parameters that differ from those suggested for optimal KX II performance. As a result, mouse synchronization may not be optimal for these screens.
WARNING! Proceed only if you are comfortable adjusting the registry on Windows KVM target servers. You can obtain better KX II mouse synchronization at the login pages by using the Windows registry editor to change the following settings: HKey_USERS\.DEFAULT\Control Panel\Mouse: > MouseSpeed = 0;MouseThreshold 1=0;MouseThreshold 2=0.
Linux Settings (Red Hat 9)
Note: The following settings are optimized for Standard Mouse mode only.
To configure KVM target servers running Linux® (graphical user
interface):
1. Configure the mouse settings:
Page 28
Chapter 2: Installation and Configuration
19
a. Choose Main Menu > Preferences > Mouse. The Mouse
Preferences dialog appears. b. Click the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact
center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. f. Close the Mouse Preferences dialog.
Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions.
2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display. The Display
Settings dialog appears. b. From the Display tab, select a Resolution supported by the KX II. c. From the Advanced tab, verify that the Refresh Rate is
supported by the KX II.
Note: Once connected to the target server, in many Linux graphical environments, the <Ctrl> <Alt> <+> command will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, depending on your X server distribution.
To configure KVM target servers running Linux (command line):
1. Set the mouse acceleration to exactly 1 and set the threshold to exactly 1. Enter this command: xset mouse 1 1. This should be set for execution upon login.
2. Ensure that each target server running Linux is using a resolution supported by the KX II at a standard VESA resolution and refresh rate.
3. Each Linux target server should also be set so the blanking times are within +/- 40% of VESA standard values:
a. Go to the Xfree86 Configuration file XF86Config. b. Using a text editor, disable all non-KX II supported resolutions. c. Disable the virtual desktop feature (not supported by the KX II). d. Check blanking times (+/- 40% of VESA standard). e. Restart computer.
Page 29
Chapter 2: Installation and Configuration
20
Note: If you change the video resolution, you must log off of the target server and log back in for the video settings to take effect.
Note for Red Hat 9 KVM Target Servers
If you are running Red Hat® 9 on the target server using a USB CIM, and are experiencing problems with the keyboard and/or mouse, there is an additional configuration setting you can try.
Tip: You might have to perform these steps even after a fresh OS installation.
To configure Red Hat 9 servers using USB CIMs:
1. Locate the configuration file (usually /etc/modules.conf) in your system.
2. Using the editor of your choice, make sure that the alias usb-controller line in the modules.conf file is as follows:
alias usb-controller usb-uhci
Note: If there is another line using usb-uhci in the /etc/modules.conf file, it needs to be removed or commented out.
3. Save the file.
4. Reboot the system in order for the changes to take effect.
Linux Settings (Red Hat 4)
Note: The following settings are optimized for Standard Mouse mode only.
To configure KVM target servers running Linux® (graphical user
interface):
1. Configure the mouse settings: a. Red Hat 5 users, choose Main Menu > Preferences > Mouse.
Red Hat 4 users, choose System > Preferences > Mouse. The
Mouse Preferences dialog appears. b. Click on the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact
center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. f. Close the Mouse Preferences dialog.
Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions.
Page 30
Chapter 2: Installation and Configuration
21
2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display. The Display
Settings dialog appears. b. On the Settings tab, select a Resolution supported by the KX II. c. Click OK.
Note: Once connected to the target server, in many Linux graphical environments, the <Ctrl> <Alt> <+> command will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, depending on your X server distribution
Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
SUSE Linux 10.1 Settings
Note: Do not attempt to synchronize the mouse at the SUSE Linux® login prompt. You must be connected to the target server to synchronize the mouse cursors.
To configure the mouse settings:
1. Choose Desktop > Control Center. The Desktop Preferences dialog appears.
2. Click Mouse. The Mouse Preferences dialog appears.
3. Open the Motion tab.
4. Within the Speed group, set the Acceleration slider to the exact center position.
5. Within the Speed group, set the Sensitivity slider to low.
6. Within the Drag & Drop group, set the Threshold slider to small.
7. Click Close.
To configure the video:
1. Choose Desktop Preferences > Graphics Card and Monitor. The Card and Monitor Properties dialog appears.
2. Verify that a Resolution and Refresh Rate is in use that is supported by the KX II. See Supported Video Resolutions (on page 272) for more information.
Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
Page 31
Chapter 2: Installation and Configuration
22
Make Linux Settings Permanent
Note: These steps may vary slightly depending on the specific version of Linux® in use.
To make your settings permanent in Linux (prompt):
1. Choose System Menu > Preferences > Personal > Sessions.
2. Click the Session Options tab.
3. Select the "Prompt on log off" checkbox and click OK. This option prompts you to save your current session when you log out.
4. Upon logging out, select the "Save current setup" option from the dialog.
5. Click OK.
Tip: If you do not want to be prompted upon log out, follow these procedures instead.
To make your settings permanent in Linux (no prompt):
1. Choose Desktop > Control Center > System > Sessions.
2. Click the Session Options tab.
3. Deselect the "Prompt on the log off" checkbox.
4. Select the "Automatically save changes to the session" checkbox and click OK. This option automatically saves your current session when you log out.
Sun Solaris Settings
To configure KVM target servers running Sun™ Solaris™:
1. Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. This can be performed from:
The graphical user interface.
The command line xset mouse a t where a is the acceleration
and t is the threshold.
Page 32
Chapter 2: Installation and Configuration
23
2. All KVM target servers must be configured to one of the display
Display resolution
Vertical refresh rate
Aspect ratio
1600 x 1200
60 Hz
4:3
1280 x 1024
60,75,85 Hz
5:4
1152 x 864
75 Hz
4:3
1024 x 768
60,70,75,85 Hz
4:3
800 x 600
56,60,72,75,85 Hz
4:3
720 x 400
85 Hz
9:5
640 x 480
60,72,75,85 Hz
4:3
If you have:
Use this video output adapter:
Sun 13W3 with composite sync output
APSSUN II Guardian converter
Sun HD15 with composite sync output
1396C converter to convert from HD15 to 13W3 and an APSSUN II Guardian converter to support composite sync
Sun HD15 with separate sync output
APKMSUN Guardian converter
resolutions supported by the KX II. The most popular supported resolutions for Sun machines are:
3. KVM target servers running the Solaris operating system must output VGA video (H-and-V sync, not composite sync).
To change your Sun video card output from composite sync to
the nondefault VGA output:
1. Issue the Stop+A command to drop to bootprom mode.
2. Issue the following command to change the output resolution: setenv output-device screen:r1024x768x70
3. Issue the boot command to reboot the server.
You can also contact your Raritan representative to purchase a video output adapter:
Note: Some of the standard Sun background screens may not center precisely on certain Sun servers with dark borders. Use another background or place a light colored icon in the upper left hand corner.
Mouse Settings
To configure the mouse settings (Sun Solaris 10.1):
1. Choose Launcher. Application Manager - Desktop Controls opens.
Page 33
Chapter 2: Installation and Configuration
24
2. Choose Mouse Style Manager. The Style Manager - Mouse dialog appears.
3. Set the Acceleration slider to 1.0.
4. Set the Threshold slider to 1.0.
5. Click OK.
Accessing the Command Line
1. Right click.
2. Choose Tools > Terminal. A terminal window opens. (It is best to be at the root to issue commands.)
Video Settings (POST)
Sun systems have two different resolution settings: a POST resolution and a GUI resolution. Run these commands from the command line.
Note: 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using.
To check current POST resolution:
Run the following command as the root: # eeprom output-device
To change POST resolution:
1. Run # eeprom output-device=screen:r1024x768x75.
2. Log out or restart computer.
Video Settings (GUI)
The GUI resolution can be checked and set using different commands depending on the video card in use. Run these commands from the command line.
Note: 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using.
Page 34
Chapter 2: Installation and Configuration
25
Card
To check resolution:
To change resolution:
32-bit
# /usr/sbin/pgxconfig -prconf
1. # /usr/sbin/pgxconfig -res 1024x768x75
2. Log out or restart computer.
64-bit
# /usr/sbin/m64config -prconf
1. # /usr/sbin/m64config -res 1024x768x75
2. Log out or restart computer.
32-bit and 64-bit
# /usr/sbin/fbconfig -prconf
1. # /usr/sbin/fbconfig -res 1024x768x75
2. Log out or restart computer.
IBM AIX 5.3 Settings
Follow these steps to configure KVM target servers running IBM® AIX™
5.3.
To configure the mouse:
1. Go to Launcher.
2. Choose Style Manager.
3. Click Mouse. The Style Manager - Mouse dialog appears.
4. Use the sliders to set the Mouse acceleration to 1.0 and Threshold to
1.0.
5. Click OK.
To configure the video:
1. From the Launcher, select Application Manager.
2. Select System_Admin.
3. Choose Smit > Devices > Graphic Displays > Select the Display Resolution and Refresh Rate.
4. Select the video card in use.
5. Click List. A list of display modes is presented.
6. Select a resolution and refresh rate supported by the KX II. See
Supported Video Resolutions (on page 272) for more information.
Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
Page 35
Chapter 2: Installation and Configuration
26
Make UNIX Settings Permanent
To take advantage of the KX II:
The firewall must allow inbound communication on:
Web-access capabilities
Port 443 - standard TCP port for HTTPS communication
Automatic redirection of HTTP requests to HTTPS (so the more common
“http://xxx.xxx.xxx.xxx” can be
used instead of “https://xxx.xxx.xxx.xxx”)
Port 80 - standard TCP port for HTTP communication
Note: These steps may vary slightly depending on the type of UNIX® (for example, Solaris™, IBM® AIX™) and the specific version in use.
1. Choose Style Manager > Startup. The Style Manager - Startup dialog appears.
2. On the Logout Confirmation dialog, select the On option. This option prompts you to save your current session when you log out.
Apple Macintosh Settings
For KVM target servers running an Apple Macintosh® operating system, the preferred method is to use the D2CIM-VUSB and Absolute Mouse Synchronization.
Note: 'USB Profile 'Mac OS-X, version 10.4.9 and later' must be selected from the USB Profile menu or the Port Configuration page.
Step 2: Configure Network Firewall Settings
To access KX II through a network firewall via Multi-Platform Client or through the Port Access page, your firewall must allow communication on TCP Port 5000 or another port that you designate.
See Network Settings (on page 135) for additional information about designating another discovery port.
Page 36
Chapter 2: Installation and Configuration
27
Step 3: Connect the Equipment
Connect the KX II to the power supply, network, local PC, local video display, keyboard and mouse, and target servers. The letters in the diagram correspond to the topics in this section that describe the connection.
A. AC Power
To connect the power supply:
1. Attach the included AC power cord to the KX II and plug into an AC power outlet.
2. For dual power failover protection, attach the second included AC power cord and plug it into a different power source than the first power cord.
Note: If you only attach one power cord, the power LED on the KX II front panel will be red because the system is set to automatically detect both sources. See Power Supply Setup (on page 157) for information about turning off automatic detection for the power source that is not in use.
B. Modem Port (Optional)
The KX II features a dedicated modem port for remote access even when the LAN/WAN is unavailable. Using a straight-through serial (RS-232) cable, connect an external serial modem to the port labeled MODEM on the back of the KX II (see Specifications (on page 257) for a list of certified modems and Configuring Modem Settings (on page
148) for information on configuring the modem).
Note: Raritan recommends configuring the modem by enabling the CD (carrier detect) setting.
Page 37
Chapter 2: Installation and Configuration
28
C. Network Port
Connection
Description
Monitor
Attach a standard multi-sync VGA monitor to the HD15 (female) video
The KX II provides two Ethernet ports for failover purposes (not for load-balancing). By default, only LAN1 is active and the automatic failover is disabled. When enabled, if the KX II internal network interface or the network switch to which it is connected becomes unavailable, LAN2 will be enabled using the same IP address.
Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends that you either not monitor the failover port or monitor it only after a failover occurs.
To connect the network:
1. Connect a standard Ethernet cable (included) from the network port labeled LAN1 to an Ethernet switch, hub, or router.
2. To make use of the optional KX II Ethernet failover capabilities: Connect a standard Ethernet cable from the network port labeled
LAN2 to an Ethernet switch, hub, or router.
Enable Automatic Failover on the Network Configuration page.
Note: Use both network ports only if you want to use one as a failover port.
D. Local Access Port (Local Video Display, Keyboard and Mouse)
For convenient access to target servers while at the rack, use the KX II Local Access port. While the Local Access port is required for installation and setup, it is optional for subsequent use. The Local Access port also provides a graphical user interface from the KX II Local Console for administration and target server access.
The KX2-832 and KX2-864 also provide you with an Extended Local port, labeled EXT LOCAL on the back of the device, for access to target servers while at the rack. The Extended Local port is not required for the initial installation and setup. It is configured from the Local Console and Remote Console.
To connect the local port:
Attach a multi-sync VGA monitor, mouse, and keyboard to the
respective Local User ports using a USB keyboard and mouse. The physical connections for the Local User and Extended Local ports can be found on the back panel of the KX II.
Page 38
Chapter 2: Installation and Configuration
29
Connection
Description
port.
Keyboard
Attach a standard USB keyboard to one of the USB Type A (female) ports.
Mouse
Attach a standard USB mouse to one of the USB Type A (female) ports.
E. Target Server Ports
The KX II uses standard UTP cabling (Cat5/5e/6) to connect to each target server.
To connect a target server to the KX II:
1. Use the appropriate Computer Interface Module (CIM). See Supported CIMs and Operating Systems (Target Servers) for more information about the CIMs to use with each operating system.
2. Attach the HD15 video connector of your CIM to the video port of your target server. Ensure that your target server's video has already been configured to a supported resolution and refresh rate. For Sun servers, also ensure that your target server's video card has been set to output standard VGA (H-and-V sync) and not composite sync.
3. Attach the keyboard/mouse connector of your CIM to the corresponding ports on your target server. Using a standard straight-through UTP (Cat5/5e/6) cable, connect the CIM to an available server port on the back of your KX II device.
Note: The DCIM-USB G2 provides a small slide switch on the back of the CIM. Move the switch to P for PC-based USB target servers. Move the switch to S for Sun USB target servers.
A new switch position takes effect only after the CIM is power-cycled. To power-cycle the CIM, remove the USB connector from the target server and plug it back in a few seconds later.
Step 4: Configure the KX II
The first time you power up the KX II device, there is some initial configuration that you need to perform through the KX II Local Console:
Change the default password. Assign the IP address. Name the KVM target servers.
Page 39
Chapter 2: Installation and Configuration
30
Changing the Default Password
The KX II ships with a default password. The first time you start the KX II you are required to change that password.
To change the default password:
1. Power on the KX II using the power switch(s) at the back of the unit. Wait for the KX II unit to boot. (A beep signals that the boot is complete.)
2. Once the unit has booted, the KX II Local Console is visible on the monitor attached to the KX II local port. Type the default username (admin) and password (raritan) and click Login. The Change Password screen is displayed.
3. Type your old password (raritan) in the Old Password field.
4. Type a new password in the New Password field and retype the new password in the Confirm New Password field. Passwords can be up to 64 characters in length and can consist of English, alphanumeric characters as well as special characters.
5. Click Apply.
6. You will receive confirmation that the password was successfully changed. Click OK. The Port Access page is displayed.
Note: The default password can also be changed from the Raritan Multi-Platform Client (MPC).
Assigning an IP Address
These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings.
To assign an IP address:
1. Choose Device Settings > Network. The Network Settings page opens.
2. Specify a meaningful Device Name for your KX II device. Up to 32 alphanumeric characters using valid special characters and no spaces.
3. In the IPv4 section, enter or select the appropriate IPv4-specific network settings:
a. Enter the IP Address if needed. The default IP address is
192.168.0.192.
b. Enter the Subnet Mask. The default subnet mask is
255.255.255.0.
Page 40
Chapter 2: Installation and Configuration
31
c. Enter the Default Gateway if None is selected from the IP Auto
Configuration drop-down.
d. Enter the Preferred DHCP Host Name if DHCP is selected from
the IP Auto Configuration drop-down.
e. Select the IP Auto Configuration. The following options are
available:
None (Static IP) - This option requires that you manually specify
the network parameters.
This is the recommended option because the KX II is an infrastructure device and its IP address should not change.
DHCP - Dynamic Host Configuration Protocol is used by
networked computers (clients) to obtain unique IP addresses and other parameters from a DHCP server.
With this option, network parameters are assigned by the DHCP server. If DHCP is used, enter the Preferred host name (DHCP only). Up to 63 characters.
4. If IPv6 is to be used, enter or select the appropriate IPv6-specific network settings in the IPv6 section:
a. Select the IPv6 checkbox to activate the fields in the section. b. Enter a Global/Unique IP Address. This is the IP address
assigned to the KX II.
c. Enter the Prefix Length. This is the number of bits used in the
IPv6 address. d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to
the device. It is used for neighbor discovery or when no routers
are present. Read-Only f. Zone ID. This identifies the device with which the address is
associated. Read-Only g. Select the IP Auto Configuration. The following options are
available: None - Use this option if you do not want an auto IP configuration
and prefer to set the IP address yourself (static IP). This is the
default and recommended option.
If None is selected for the IP auto configuration, the following Network Basic Settings fields are enabled: Global/Unique IP Address, Prefix Length, and Gateway IP Address allowing you to manually set the IP configuration.
Router Discovery - Use this option to automatically assign IPv6
addresses that have Global or Unique Local significance beyond
that of the Link Local, which only applies to a directly connected
subnet.
Page 41
Chapter 2: Installation and Configuration
32
5. Select Obtain DNS Server Address Automatically if DHCP is selected and Obtain DNS Server Address is enabled. When Obtain DNS Server Address Automatically, the DNS information provided by the DHCP server will be used.
6. If Use the Following DNS Server Addresses is selected, regardless of whether DHCP is selected or not, the addresses entered in this section will be used to connect to the DNS server.
Enter the following information if the Following DNS Server Addresses option is selected. These addresses are the primary and secondary DNS addresses that will be used if the primary DNS server connection is lost due to an outage.
a. Primary DNS Server IP Address b. Secondary DNS Server IP Address
7. When finished, click OK.
See LAN Interface Settings (on page 138) for information in configuring this section of the Network Settings page.
Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues. In these instances, setting the KX II LAN Interface Speed & Duplex field to 100 Mbps/Full Duplex (or whatever option is appropriate to your network) addresses the issue. See the Network Settings (on page 135) page for more information.
Naming Target Servers
To name the target servers:
1. Connect all of the target servers if you have not already done so. See Step 3: Connect the Equipment for a description of connecting the equipment.
2. Using the KX II Local Console, choose Device Settings > Port Configuration. The Port Configuration page opens.
3. Click the Port Name of the target server you want to rename. The Port Page opens.
4. Assign a name to identify the server connected to that port. The name can be up to 32 characters, and alphanumeric and special characters are allowed.
5. Click OK.
Page 42
Chapter 2: Installation and Configuration
33
Valid Special Characters for Target Names
Character
Description
Character
Description
!
Exclamation point
;
Semi-colon
"
Double quote
=
Equal sign
#
Pound sign
>
Greater than sign
$
Dollar sign
?
Question mark
%
Percent sign
@
At sign
&
Ampersand
[
Left bracket
(
Left parenthesis
\
Backward slash
)
Right parenthesis
]
Right bracket
*
Asterisk
^
Caret
+
Plus sign
_
Underscore
,
Comma
`
Grave accent
-
Dash
{
Left brace
.
Period
|
Pipe sign
/
Forward slash
}
Right brace
<
Less than sign
~
Tilde
:
Colon
Specifying Power Supply Autodetection
The KX II provides dual power supplies and can automatically detect and provide notification regarding the status of these power supplies. Proper configuration ensures that the KX II sends the appropriate notifications should a power supply fail.
The Power Supply Setup page is configured to automatically detect both power supplies when two power supplies are used. If only one power supply is used in your configuration, you can disable automatic detection from the Power Supply Setup page.
To enable automatic detection for the power supplies in use:
1. Choose Device Settings > Power Supply Setup. The Power Supply Setup page opens.
2. If you are plugging power input into power supply number one (left-most power supply at the back of the device), select the Powerln1 Auto Detect option.
Page 43
Chapter 2: Installation and Configuration
34
3. If you are plugging power input into power supply number two (right-most power supply at the back of the device), select the Powerln2 Auto Detect option.
4. Click OK.
Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the device turns red.
To disable power supply autodetection for the power supply not
in use:
1. Using the KX II Local Console, choose Device Settings > Power Supply Setup. The Power Supply Setup page opens.
2. Clear autodetection for the power supply that you are not using.
For more information, see Power Supply Setup (on page 157).
Note to CC-SG Users
If you are using the KX II in a CC-SG configuration, perform the installation steps, and when finished, consult the CommandCenter
Secure Gateway User Guide, Administrator Guide, or Deployment Guide to proceed (all found on Raritan's website, www.raritan.com,
under Support).
Note: The remainder of this help applies primarily to deploying the KX II device(s) without the integration functionality of CC-SG.
Remote Authentication
Note to CC-SG Users
When the KX II is controlled by CommandCenter Secure Gateway, CC-SG authenticates users and groups, except for local users requiring Local port access. When CC-SG is controlling the KX II, Local port users will be authenticated against the local user database or the remote authentication server (LDAP/LDAPS or RADIUS) configured on the KX II. They will not be authenticated against the CC-SG user database.
For additional information about CC-SG authentication, see the CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide, which can be downloaded from the Support section of the Raritan website http://www.raritan.com.
Supported Protocols
To simplify management of usernames and passwords, the KX II provides the ability to forward authentication requests to an external authentication server. Two external authentication protocols are supported: LDAP/LDAPS and RADIUS.
Page 44
Chapter 2: Installation and Configuration
35
Note on Microsoft Active Directory
Microsoft® Active Directory® uses the LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the KX II. If it has the IAS (Internet Authorization Server) component, a Microsoft Active Directory server can also serve as a RADIUS authentication source.
Create User Groups and Users
As part of the initial configuration, you must define user groups and users in order for users to access the KX II.
The KX II uses system-supplied default user groups and allows you to create groups and specify the appropriate permissions to suit your needs.
User names and passwords are required to gain access to the KX II. This information is used to authenticate users attempting to access your KX II. See User Management for details on adding and editing user groups and users.
Step 5 (Optional): Configure Keyboard Language
Note: This step is not required if you are using the US/International language keyboard.
If you are using a non-US language, the keyboard has to be configured for the appropriate language. In addition, the keyboard language for the client machine and the KVM target servers has to match.
Consult the documentation for your operating system for additional information about changing the keyboard layout.
Changing the Keyboard Layout Code (Sun Targets)
Use this procedure if you are using a DCIM-SUSB and would like the keyboard layout changed to another language.
To change the keyboard layout code (DCIM-SUSB only):
1. Open a Text Editor window on the Sun™ workstation.
2. Check that the Num Lock key is active and press the left Ctrl key and the Del key on your keyboard. The Caps Lock light starts to blink, indicating that the CIM is in Layout Code Change mode. The text window displays: Raritan Computer, Inc. Current keyboard layout code = 22h (US5 UNIX).
3. Type the layout code desired (for example, 31 for the Japanese keyboard).
4. Press Enter.
Page 45
Chapter 2: Installation and Configuration
36
5. Shut down the device and power on once again. The DCIM-SUSB performs a reset (power cycle).
6. Verify that the characters are correct.
Page 46
37
In This Chapter
Interfaces ................................................................................................. 37
Proxy Server Configuration for use with MPC, VKC and AKC ................ 50
Virtual KVM Client (VKC) ......................................................................... 51
Active KVM Client (AKC) ......................................................................... 80
Multi-Platform Client (MPC) ..................................................................... 82
Interfaces
User Interface
Local
Remote
Access
Admin
Access
Admin
KX II Local Console
KX II Remote Console
Virtual KVM Client
Multi-Platform Client (MPC)
Active KVM Client (AKC)
Chapter 3
Working with Target Servers
There are several user interfaces in the KX II, providing you with easy access any time, anywhere. These include the KX II Local Console, the KX II Remote Console, and the Multi-Platform Client (MPC). The following table identifies these interfaces and their use for target server access and administration locally and remotely:
The following sections of the help contain information about using specific interfaces to access the KX II and manage targets:
Local Console Remote Console Virtual KVM Client Multi-Platform Client
Page 47
Chapter 3: Working with Target Servers
38
KX II Local Console Interface
When you are located at the server rack, the KX II provides standard KVM management and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers; the performance is exactly as if you were directly connected to the server's keyboard, mouse, and video ports. Additionally, the KX II provides terminal emulation when accessing serial targets.
There are many similarities among the KX II Local Console and the KX II Remote Console graphical user interfaces. Where there are differences, they are noted in the help.
The KX II Local Console Factory Reset option is available in the KX II Local Console but not the KX II Remote Console.
KX II Remote Console Interface
The KX II Remote Console is a browser-based graphical user interface that allows you to log in to KVM target servers and serial targets connected to the KX II and to remotely administer the KX II.
The KX II Remote Console provides a digital connection to your connected KVM target servers. When you log into a KVM target server using the KX II Remote Console, a Virtual KVM Client window opens.
There are many similarities among the KX II Local Console and the KX II Remote Console graphical user interfaces, and where there are differences, they are noted in the user manual. The following options are available in the KX II Remote Console but not the KX II Local Console:
Virtual Media Favorites Backup/Restore Firmware Upgrade Upgrade Report SSL Certificates
Launching the KX II Remote Console
Important: Regardless of the browser used, you must allow pop-ups from the device's IP address to launch the KX II Remote Console.
Page 48
Chapter 3: Working with Target Servers
39
Depending on your browser and security settings, you may see various security and certificate warnings. It is necessary to accept these warnings to launch the KX II Remote Console.
You can reduce the number of warning messages during subsequent log ins by checking the following options on the security and certificate warning messages:
In the future, do not show this warning. Always trust content from this publisher.
To launch the KX II Remote Console:
1. Log in to any workstation with network connectivity to your KX II and Java Runtime Environment® installed (JRE® is available on the Java
website http://java.sun.com/).
2. Launch a supported web browser such as Internet Explorer® or Firefox®.
3. Type the following URL: http://IP-ADDRESS, where IP-ADDRESS is the IP address assigned to your KX II. You can also use https, the DNS name of the KX II assigned by the administrator (provided that a DNS server has been configured), or just simply type the IP address in the browser (KX II always redirects the IP address from HTTP to HTTPS.) The Login page opens.
4. Type your user name and password. If this is the first time logging in, log in with the factory default user name (admin) and password (raritan, all lower case). You will be prompted to change the default password. Click Login.
Note: If your administrator requires you read and/or accept a security agreement in order to access the device, a security banner will be displayed after you have entered your login credentials and clicked Login.
See Virtual KVM Client (VKC) (on page 51) for information on the KX II functions available via the Remote Console.
Page 49
Chapter 3: Working with Target Servers
40
Interface and Navigation
KX II Console Layout
Both the KX II Remote Console and the KX II Local Console interfaces provide an HTML (web-based) interface for configuration and administration, as well as target server list and selection. The options are organized into various tabs.
After successful login, the Port Access page opens listing all ports along with their status and availability. Three tabs are provided on the page allowing you to view by port, view by group or view by search. You can sort by Port Number, Port Name, Status (Up and Down), and Availability (Idle, Connected, Busy, Unavailable, and Connecting) by clicking on the column heading. See Port Access Page (on page 43) for more information.
Page 50
Chapter 3: Working with Target Servers
41
Left Panel
Information
Description
When displayed?
Time & Session
The date and time the current session started.
Always User
Username
Always
State
The current state of the application, either idle or active. If idle, the application tracks and displays the time the session has been idle.
Always
Your IP
The IP address used to access the KX II.
Always
Last Login
The last login date and time.
Always
Under CC-SG Management
The IP address of the CC-SG device managing the KX II.
When the KX II is being managed by CC-SG.
Device Information
Information specific to the KX II you are using.
Always
Device Name
Name assigned to the device.
Always
IP Address
The IP address of the KX II.
Always
Firmware
Current version of firmware.
Always Device Model
Model of the KX II
Always
Network
The name assigned to the current network.
Always
PowerIn1
Status of the power 1 outlet connection. Either on or off.
When connected.
PowerIn2
Status of the power 2 outlet connection. Either on or off.
When connected.
The left panel of the KX II interface contains the following information. Note that some information is conditional and will only be displayed if you are a certain of user, are using certain features, and so on. This conditional information is noted here.
Page 51
Chapter 3: Working with Target Servers
42
Information
Description
When displayed?
Configured As Base or Configured As Tiered
If you are using a tiering configuration, this indicates if the KX II you are accessing is the base device or a tiered device.
When the KX II is part of a tiered configuration.
Port States
The statuses of the ports being used by the KX II.
Always
Connect Users
The users, identified by their username and IP address, who are currently connected to the KX II.
Always
Help - User Guide
Links to online help.
Always
Favorite Devices
See Managing Favorites (on page 46).
Always
FIPS Mode
FIPS Mode: EnabledSSL Certificate: FIPS Mode Compliant
When FIPS is enabled.
KX II Console Navigation
The KX II Console interfaces provide many methods for navigation and making your selections.
To select an option (use any of the following):
Click on a tab. A page of available options appears. Hover over a tab and select the appropriate option from the menu. Click the option directly from the menu hierarchy displayed
(breadcrumbs).
To scroll through pages longer than the screen:
Use Page Up and Page Down keys on your keyboard. Use the scroll bar on the right.
Page 52
Chapter 3: Working with Target Servers
43
Port Access Page
After successfully logging on to the KX II Remote Console, the Port Access page appears. This page lists all of the KX II ports, the connected KVM target servers, and their status and availability. The Port Access page provides access to the KVM target servers connected to the KX II. KVM target servers are servers that you want to control through the KX II device. They are connected to the KX II ports at the back of the device.
Note: For each connection to a KVM target server, a new Virtual KVM Client window opens.
If you are using a tiered configuration in which a base KX II device is used to access multiple other tiered devices, the tiered devices are viewed on the Port Access page by clicking on the Expand Arrow icon to the left of the base device name. See Configuring and Enabling
Tiering (on page 142) for more information on tiering.
Also displayed on the Port Access page are blade chassis that have been configured in the KX II. The blade chassis is displayed in an expandable, hierarchical list on the Port Access page, with the blade chassis at the root of the hierarchy and the individual blades labeled and displayed below the root. Use the Expand Arrow icon next to the root chassis to display the individual blades.
Note: To view the blade chassis in a hierarchal order, blade-chassis subtypes must be configured for the blade server chassis.
By default, the View by Port tab will be displayed on the Port Access page. The View by Group tab displays port groups and can be expandable to display ports that are assigned to the port group. The View by Search tab allows you to search by port name. The search feature supports the use of an asterisk (*) as a wildcard, and full and partial names.
To use the Port Access page:
1. From the KX II Remote Console, click the Port Access tab. The Port Access page opens.
The KVM target servers are initially sorted by Port Number. You can change the display to sort on any of the columns.
Port Number - Numbered from 1 to the total number of ports
available for the KX II device. Note that ports connected to power strips will not be among those listed, resulting in gaps in the Port Number sequence.
Port Name - The name of the KX II port. Initially, this is set to
Dominion-KX2-Port# but you can change the name to something more descriptive. When you click a Port Name link, the Port Action Menu appears.
Page 53
Chapter 3: Working with Target Servers
44
Note: Do not use apostrophes for the Port (CIM) Name.
Status - The status for standard servers is either up or down. Type - The type of server or CIM. For blade chassis, the type can
be Blade Chassis, Blade, BladeChassisAdmin, and BladeChassisURL.
2. Click View by Port, View by Group or View by Search to switch between views.
3. Click the Port Name of the target server you want to access. The Port Action Menu appears. See Port Action Menu (on page 44) for details on available menu options.
4. Choose the desired menu command from the Port Action Menu.
To change the display sort order:
Click the column heading by which you want to sort. The list of KVM
target servers is sorted by that column.
Port Action Menu
When you click a Port Name in the Port Access list, the Port Action menu appears. Choose the desired menu option for that port to execute it. Note that only currently available options, depending on the port's status and availability, will be listed in the Port Action menu:
Connect - Creates a new connection to the target server. For the KX
II Remote Console, a new Virtual KVM Client (see "Virtual KVM
Client (VKC)" on page 51) page appears. For the KX II Local
Console, the display switches to the target server and switches away from the local user interface. On the local port, the KX II Local Console interface must be visible in order to perform the switch. Hot key switching is also available from the local port.
Note: This option is not available from the KX II Remote Console for an available port if all connections are busy.
Switch From - Switches from an existing connection to the selected
port (KVM target server). This menu item is available only for KVM targets. This option is visible only when a Virtual KVM Client is opened.
Note: This menu item is not available on the KX II Local Console.
Disconnect - Disconnects this port and closes the Virtual KVM Client
page for this target server. This menu item is available only when the port status is up and connected, or up and busy.
Note: This menu item is not available on the KX II Local Console. The only way to disconnect from the switched target in the Local Console is to use the hot key.
Page 54
Chapter 3: Working with Target Servers
45
Power On - Powers on the target server through the associated
outlet. This option is visible only when there are one or more power associations to the target.
Power Off - Powers off the target server through the associated
outlets. This option is visible only when there are one or more power associations to the target, when the target power is on (port status is up), and when user has permission to operate this service.
Power Cycle - Power cycles the target server through the associated
outlets. This option is visible only when there are one or more power associations to the target, and when the user has permission to operate this service.
Page 55
Chapter 3: Working with Target Servers
46
Managing Favorites
A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to:
Create and manage a list of favorite devices Quickly access frequently-used devices List your favorites either by Device Name, IP Address, or DNS
hostname
Discover KX II devices on its subnet (before and after login) Retrieve discovered KX II devices from the connected KX device
(after login)
To access a favorite KX II device:
Click the device name (listed beneath Favorite Devices). A new
browser opens to that device.
To display favorites by name:
Click Display by Name.
To display favorites by IP Address:
Click Display by IP.
To display favorites by the host name:
Click Display by Host Name.
Page 56
Chapter 3: Working with Target Servers
47
Note: Both IPv4 and IPv6 addresses are supported.
Use:
To:
Favorites List
Manage your list of favorite devices.
Discover Devices - Local Subnet
Discover Raritan devices on the client PC's local subnet.
Discover Devices - KX II Subnet
Discover the Raritan devices on the KX II device subnet.
Add New Device to Favorites
Add, edit, and delete devices from your list of Favorites.
Manage Favorites Page
To open the Manage Favorites page:
Click the Manage button in the left panel. The Manage Favorites
page appears and contains the following:
Favorites List Page
From the Favorites List page, you can add, edit, and delete devices from your list of favorites.
To open the Favorites List page:
Choose Manage > Favorites List. The Favorites List page opens.
Discovering Devices on the Local Subnet
This option discovers the devices on your local subnet, which is the subnet where the KX II Remote Console is running. These devices can be accessed directly from this page or you can add them to your list of favorites. See Favorites List Page (on page 47).
To discover devices on the local subnet:
1. Choose Manage > Discover Devices - Local Subnet. The Discover Devices - Local Subnet page appears.
2. Choose the appropriate discovery port: To use the default discovery port, select the Use Default Port
5000 checkbox. To use a different discovery port: a. Deselect the Use Default Port 5000 checkbox. b. Type the port number in the Discover on Port field.
Page 57
Chapter 3: Working with Target Servers
48
c. Click Save.
3. Click Refresh. The list of devices on the local subnet is refreshed.
To add devices to your Favorites List:
1. Select the checkbox next to the device name/IP address.
2. Click Add.
Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the remote console subnet.
To access a discovered device:
Click the device name or IP address for that device. A new browser
opens to that device.
Note: Both IPv4 and IPv6 addresses are supported.
Discovering Devices on the KX II Subnet
This option discovers devices on the device subnet, which is the subnet of the KX II device IP address itself. You can access these devices directly from this the Subnet page or add them to your list of favorites. See Favorites List Page (on page 47).
This feature allows multiple KX II devices to interoperate and scale automatically. The KX II Remote Console automatically discovers the KX II devices, and any other Raritan device, in the subnet of the KX II.
To discover devices on the device subnet:
1. Choose Manage > Discover Devices - KX II Subnet. The Discover Devices - KX II Subnet page appears.
2. Click Refresh. The list of devices on the local subnet is refreshed.
To add devices to your Favorites List:
1. Select the checkbox next to the device name/IP address.
2. Click Add.
Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the KX II device subnet.
To access a discovered device:
Click the device name or IP address for that device. A new browser
opens to that device.
Note: Both IPv4 and IPv6 addresses are supported.
Page 58
Chapter 3: Working with Target Servers
49
Adding, Deleting and Editing Favorites
To add a device to your favorites list:
1. Choose Manage > Add New Device to Favorites. The Add New Favorite page appears.
2. Type a meaningful description.
3. Type the IP Address/Host Name for the device.
4. Change the discovery Port (if necessary).
5. Select the Product Type.
6. Click OK. The device is added to your list of favorites.
To edit a favorite:
1. From the Favorites List page, select the checkbox next to the appropriate KX II device.
2. Click the Edit button. The Edit page appears.
3. Update the fields as necessary:
Description IP Address/Host Name - Type the IP address of the KX II device Port (if necessary) Product Type
4. Click OK.
To delete a favorite:
Important: Exercise caution in the removal of favorites. You are not prompted to confirm their deletion.
1. Select the checkbox next to the appropriate KX II device.
2. Click the Delete button. The favorite is removed from your list of favorites.
Note: Both IPv4 and IPv6 addresses are supported.
Logging Out
To quit the KX II Remote Console:
Click Logout in the upper right-hand corner of the page.
Note: Logging out also closes any open Virtual KVM Client and serial client sessions.
Page 59
Chapter 3: Working with Target Servers
50
Proxy Server Configuration for use with MPC, VKC and AKC
When the use of a Proxy Server is required, a SOCKS proxy must also be provided and configured on the remote client PC.
Note: If the installed proxy server is only capable of the HTTP proxy protocol, you cannot connect.
To configure the SOCKS proxy:
1. On the client, select Control Panel > Internet Options.
a. On the Connections tab, click 'LAN settings'. The Local Area
Network (LAN) Settings dialog opens.
b. Select 'Use a proxy server for your LAN'. c. Click Advanced. The Proxy Settings dialog opens. d. Configure the proxy servers for all protocols. IMPORTANT: Do not
select 'Use the same proxy server for all protocols'.
Note: The default port for a SOCKS proxy (1080) is different from HTTP proxy (3128).
2. Click OK at each dialog to apply the settings.
3. Next, configure the proxies for Java™ applets by selecting Control Panel > Java.
e. On the General tab, click Network Settings. The Network Settings
dialog opens.
f. Select Use Proxy Server. g. Click Advanced. The Advanced Network Settings dialog opens. h. Configure the proxy servers for all protocols. IMPORTANT: Do not
select 'Use the same proxy server for all protocols'.
Note: The default port for a SOCKS proxy (1080) is different from HTTP proxy (3128).
4. If you are using standalone MPC, you must also do the following:
i. Open the start.bat file in MPC directory with a text editor. j. Insert the following parameters to the command line. Add them
before "-classpath": -DsocksProxyHost=<socks proxy ip addr>
-DsocksProxyPort=<socks proxy port>
The parameters should look as follows:
Page 60
Chapter 3: Working with Target Servers
51
start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70
Button
Button Name
Description
Connection Properties
Opens the Modify Connection Properties dialog from which you can manually adjust bandwidth options (such as connection speed, color depth, and so forth).
-XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true
-DsocksProxyHost=192.168.99.99 -DsocksProxyPort=1080
-classpath .\sdeploy.jar;.\sFoxtrot.jar;.\jaws.jar;.\sMpc.jar com.raritan.rrc.ui.RRCApplication %1
Virtual KVM Client (VKC)
Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help.
Overview
Whenever you access a target server using the Remote Console, a Virtual KVM Client (VKC) window opens. There is one Virtual KVM Client for each target server connected. These windows can be accessed via the Windows® task bar.
Virtual KVM Client windows can be minimized, maximized, and moved around your computer desktop.
Note: Refreshing your HTML browser closes the Virtual KVM Client connection, so exercise caution.
Note: If you are using Firefox 3.0.3, you may experience problems launching the application. If this occurs, clear the browser cache and launch the application again.
Connecting to a KVM Target Server
To connect to a KVM target server:
1. From the KX II Remote Console, click the Port Access tab to open it. The Port Access page opens.
2. Click the Port Name of the target you want to access. The Port Action menu appears.
3. Click Connect. A Virtual KVM Client window opens to the target server connected to that port.
Toolbar
Page 61
Chapter 3: Working with Target Servers
52
Button
Button Name
Description
Video Settings
Opens the Video Settings dialog, allowing you to manually adjust video conversion parameters.
Color Calibration
Adjusts color settings to reduce excess color noise.
Same as choosing Video > Color Calibrate.
Note: Not available in KX II-101-V2.
Target Screenshot
Click to take a screenshot of the target server and save it to a file of your choosing.
Synchronize Mouse
Dual-mouse mode forces the realignment of the target server mouse pointer with the mouse pointer.
Note: Not available in KX II-101-V2.
Refresh Screen
Forces a refresh of the video screen.
Auto-sense Video Settings
Forces a refresh of the video settings (resolution, refresh rate).
Smart Card
Opens a dialog that allows you to select from a list of smart card readers connected to a client PC.
Note: This function is only available on the KSX II
2.3.0 or later, and the KX II 2.1.10 or later.
Send Ctrl+Alt+Del
Sends a Ctrl+Alt+Del hot key combination to the target server.
Single Cursor Mode
Starts Single Cursor mode in which the local mouse pointer no longer appears onscreen.
Press Ctrl+Alt+O to exit this mode.
Note: Not available in KX II-101-V2.
Full Screen Mode
Maximizes the screen real estate to view the target server desktop.
Scaling
Increases or reduces the target video size so you can view the entire contents of the target server window without using the scroll bar.
Page 62
Chapter 3: Working with Target Servers
53
Switching Between KVM Target Servers
With the KX II, you can access several KVM target servers. The KX II provides the ability to switch from one target server to another.
Note: This feature is available in the KX II Remote Console only.
To switch between KVM target servers:
1. While already using a target server, access the KX II Port Access page.
2. Click the port name of the target you want to access. The Port Action menu appears.
3. Choose Switch From in the Port Action menu. The Virtual KVM Client window switches to the new target server you selected.
Power Controlling a Target Server
Note: These features are available only when you have made power associations.
To power cycle a KVM target server:
1. From the KX II Remote Console, click the Port Access tab. The Port Access page opens.
2. Click the Port Name of the appropriate target server. The Port Action menu appears.
3. Choose Power Cycle. A confirmation message appears.
To power on a target server:
1. From the KX II Remote Console, click the Port Access tab. The Port Access page opens.
2. Click the port name of the appropriate target server. The Port Action menu appears.
3. Choose Power On. A confirmation message appears.
To power off a target server:
1. From the KX II Remote Console, click the Port Access tab to open it. The Port Access page opens.
2. Click the port name of the appropriate target server. The Port Action menu appears.
3. Choose Power Off. A confirmation message appears.
Page 63
Chapter 3: Working with Target Servers
54
Disconnecting KVM Target Servers
Note: This item is not available on the KX II Local Console. The only way to disconnect from the switched target in the Local Console is to use the hot key.
To disconnect a target server:
1. Click the port name of the target you want to disconnect. The Port Action menu appears.
2. Choose Disconnect.
Tip: You can also close the Virtual KVM Client window by selecting Connection > Exit from the Virtual KVM menu.
Choosing USB Profiles
When you connect to a KVM target server for the first time, as described in Connecting to a KVM Target Server (on page 51), the preferred USB profile for the port is automatically used. If you have connected to the target server previously using a different profile, the USB profile from the last connection is used. You are alerted to the use of a profile other than the preferred profile by a warning similar to the following:
After you have connected to a target server, you can change the USB profile as necessary. By default, the profiles that appear under the USB Profile menu in the VKC are those that you are most likely to use. These profiles have been preselected by the administrator for use with the connected target server, based on your operational requirements. However, all profiles are available to be selected via the Other Profiles option on the USB Profile menu.
To choose a USB profile:
1. Connect to a KVM target server as described in Connecting to a
KVM Target Server (on page 51).
2. In VKC, choose a USB profile from the USB Profile menu.
The name of the profile indicates the operating system or server with which it should be used. See USB Profiles (on page 101) for details on USB profiles.
Page 64
Chapter 3: Working with Target Servers
55
Connection Properties
The dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
The parameters in the Properties dialog can be optimized to suit your needs for different operating environments. Connection properties are saved across subsequent connections to generation 2 devices once they are set and saved.
To set the connection properties:
1. Choose Connection > Properties or click the Connection Properties button in the toolbar. The Properties dialog appears.
Note: KX II-101 does not support 1G Ethernet.
2. Choose the Connection Speed from the drop-down list. The device can automatically detect available bandwidth and not limit bandwidth use. However, you can also adjust this usage according to bandwidth limitations.
Auto 1G Ethernet 100 Mb Ethernet 10 Mb Ethernet 1.5 Mb (MAX DSL/T1) 1 Mb (Fast DSL/T1) 512 Kb (Medium DSL/T1) 384 Kb (Slow DSL/T1)
Page 65
Chapter 3: Working with Target Servers
56
256 Kb (Cable) 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem)
Note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting. But the system will be most responsive when the settings match the real world environment.
3. Choose the Color Depth from the drop-down list. The device can dynamically adapt the color depth transmitted to remote users in order to maximize usability in all bandwidths.
15-bit RGB Color 8-bit RGB Color 4-bit Color 4-bit Gray 3-bit Gray 2-bit Gray Black and White
Important: For most administrative tasks (server monitoring, reconfiguring, and so on), the full 24-bit or 32-bit color spectrum made available by most modern video graphics cards is not necessary. Attempting to transmit such high color depths wastes network bandwidth.
4. Use the slider to select the desired level of Smoothing (15-bit color mode only). The level of smoothing determines how aggressively to blend screen regions with small color variation into a single smooth color. Smoothing improves the appearance of target video by reducing displayed video noise.
5. Click OK to set these properties.
Page 66
Chapter 3: Working with Target Servers
57
Connection Information
To obtain information about your Virtual KVM Client
connection:
Choose Connection > Info... The Connection Info window opens.
The following information is displayed about the current connection:
Device Name - The name of the device. IP Address - The IP address of the device. Port - The KVM communication TCP/IP port used to access the
target device.
Data In/Second - Data rate in. Data Out/Second - Data rate out. Connect Time - The duration of the connect time. FPS - The frames per second transmitted for video. Horizontal Resolution - The screen resolution horizontally. Vertical Resolution - The screen resolution vertically. Refresh Rate - How often the screen is refreshed. Protocol Version - RFB protocol version.
To copy this information:
Click Copy to Clipboard. The information is available to be pasted
into the program of your choice.
Keyboard Options
Keyboard Macros
Keyboard macros ensure that keystroke combinations intended for the target server are sent to and interpreted only by the target server. Otherwise, they might be interpreted by the computer on which the Virtual KVM Client is running (your client PC).
Macros are stored on the client PC and are PC-specific. Therefore, if you use another PC, you cannot see your macros. In addition, if another person uses your PC and logs in under a different name, that user will see your macros since they are computer-wide.
Keyboard macros created in the Virtual KVM Client are available in Multi-Platform Client (MPC) and vice versa. However, keyboard macros created in Active KVM Client (AKC) cannot be used in VKC or MPC, and vice versa.
Note: KX II-101 does not support AKC.
Page 67
Chapter 3: Working with Target Servers
58
Import/Export Keyboard Macros
Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC). Macros exported from MPC or VKC cannot be imported into AKC.
Note: KX II-101 does not support AKC.
To import macros:
1. Choose Keyboard > Import Keyboard Macros to open the Import Macros dialog. Browse to the folder location of the macro file.
2. Click on the macro file and click Open to import the macro. a. If too many macros are found in the file, an error message is
displayed and the import terminates once OK is selected.
b. If the import fails, an error dialog appears and a message
regarding why the import failed is displayed. Select OK to continue the import without importing the macros that cannot be imported.
3. Select the macros to be imported by checking their corresponding checkbox or using the Select All or Deselect All options.
4. Click OK to begin the import. a. If a duplicate macro is found, the Import Macros dialog appears.
Do one of the following:
Page 68
Chapter 3: Working with Target Servers
59
Click Yes to replace the existing macro with the imported
version.
Click Yes to All to replace the currently selected and any
other duplicate macros that are found.
Click No to keep the original macro and proceed to the next
macro
Click No to All keep the original macro and proceed to the
next macro. Any other duplicates that are found are skipped as well.
Click Cancel to stop the import. Alternatively, click Rename to rename the macro and import
it. If Rename is selected, the Rename Macro dialog appears. Enter a new name for the macro in the field and click OK. The dialog closes and the process proceeds. If the name that is entered is a duplicate of a macro, an alert appears and you are required to enter another name for the macro.
b. If during the import process the number of allowed, imported
macros is exceeded, a dialog appears. Click OK to attempt to continue importing macros or click Cancel to stop the import process.
The macros are then imported. If a macro is imported that contains a hot key that already exists, the hot key for the imported macro is discarded.
To export macros:
1. Choose Tools > Export Macros to open the Select Keyboard Macros to Export dialog.
2. Select the macros to be exported by checking their corresponding checkbox or using the Select All or Deselect All options.
Page 69
Chapter 3: Working with Target Servers
60
3. Click Ok. The Export Keyboard Macro. A dialog from which to locate and select the macro file appears. By default, the macro exists on your desktop.
4. Select the folder to save the macro file to, enter a name for the file and click Save. If the macro already exists, you receive an alert message. Select Yes to overwrite the existing macro or No to close the alert without overwriting the macro.
Building a Keyboard Macro
To build a macro:
1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog appears.
2. Click Add. The Add Keyboard Macro dialog appears.
3. Type a name for the macro in the Keyboard Macro Name field. This name appears in the Keyboard menu after it is created.
4. From the Hot-Key Combination field, select a keyboard combination from the drop-down list. This allows you to execute the macro with a predefined keystroke. Optional
5. In the Keys to Press drop-down list, select each key you would like to use to emulate the keystrokes that is used to perform the command. Select the keys in the order by which they are to be pressed. After each selection, select Add Key. As each key is selected, it appears in the Macro Sequence field and a Release Key command is automatically added after each selection.
6. To use the Send Text to Target function for the macro, click the Construct Macro from Text button.
7. For example, create a macro to close a window by selecting Left Ctrl + Esc. This appears in the Macro Sequence box as follows:
Page 70
Chapter 3: Working with Target Servers
61
Press Left Ctrl Release Left Ctrl Press Esc Release Esc
8. Review the Macro Sequence field to be sure the macro sequence is defined correctly.
a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step and
then click the up or down arrow buttons to reorder them as needed.
9. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Keyboard Macros dialog appears and lists the new keyboard macro.
10. Click Close to close the Keyboard Macros dialog. The macro now appears on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro.
Page 71
Chapter 3: Working with Target Servers
62
Running a Keyboard Macro
Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu.
Run a Macro from the Menu Bar
When you create a macro, it appears under the Keyboard menu. Execute the keyboard macro by clicking on it in the Keyboard menu.
Run a Macro Using a Keyboard Combination
If you assigned a keyboard combination to a macro when building it, you can execute the macro by pressing its assigned keystrokes. For example, press the keys Ctrl+Alt+0 simultaneously to minimize all windows on a Windows target server.
Modifying and Removing Keyboard Macros
To modify a macro:
1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears.
2. Choose the macro from among those listed.
3. Click Modify. The Add/Edit Macro dialog appears.
4. Make your changes.
5. Click OK.
To remove a macro:
1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears.
2. Choose the macro from among those listed.
3. Click Remove. The macro is deleted.
Hot-key combinations that coincide with blade chassis switching key sequences will not be sent to blades housed in those chassis.
Setting CIM Keyboard/Mouse Options
To access the DCIM-USBG2 setup menu:
1. Put the mouse focus on a window such as Note Pad (Windows® operating system) or an equivalent.
2. Select Set CIM Keyboard/Mouse options. This is the equivalent of sending the Left-Control and Num Lock to the target. The CIM setup menu options are then displayed.
Page 72
Chapter 3: Working with Target Servers
63
3. Set the language and mouse settings.
4. Exit the menu to return to normal CIM functionality.
Video Properties
Refreshing the Screen
The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways:
The Refresh Screen command forces a refresh of the video screen. The Auto-sense Video Settings command automatically detects the
target server's video settings.
The Calibrate Color command calibrates the video to enhance the
colors being displayed.
In addition, you can manually adjust the settings using the Video Settings command.
To refresh the video settings, do one of the following:
Choose Video > Refresh Screen or click the Refresh Screen button
Auto-Sense Video Settings
in the toolbar.
The Auto-sense Video Settings command forces a re-sensing of the video settings (resolution, refresh rate) and redraws the video screen.
To automatically detect the video settings, do the following:
Choose Video > Auto-sense Video Settings or click the Auto-Sense
Video Settings button in the toolbar. A message stating that the auto adjustment is in progress appears.
Page 73
Chapter 3: Working with Target Servers
64
Calibrating Color
Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The color settings are on a target server-basis.
Note: The Calibrate Color command applies to the current connection only.
Note: The KX II-101 does support color calibration.
To calibrate the color, do the following:
Choose Video > Calibrate Color or click the Calibrate Color button
in the toolbar. The target device screen updates its color
calibration.
Adjusting Video Settings
Use the Video Settings command to manually adjust the video settings.
To change the video settings:
1. Choose Video > Video Settings or click the Video Settings button
in the toolbar to open the Video Settings dialog.
2. Adjust the following settings as required. As you adjust the settings the effects are immediately visible:
a. Noise Filter
The device can filter out the electrical interference of video output from graphics cards. This feature optimizes picture quality and reduces bandwidth. Higher settings transmit variant pixels only if a large color variation exists in comparison to the neighboring pixels. However, setting the threshold too high can result in the unintentional filtering of desired screen changes. Lower settings transmit most pixel changes. Setting this threshold too low can result in higher bandwidth use.
b. PLL Settings
Clock - Controls how quickly video pixels are displayed across the video screen. Changes made to clock settings cause the video image to stretch or shrink horizontally. Odd number settings are recommended. Under most circumstances this setting should not be changed because the autodetect is usually quite accurate.
Phase - Phase values range from 0 to 31 and will wrap around. Stop at the phase value that produces the best video image for the active target server.
Page 74
Chapter 3: Working with Target Servers
65
c. Brightness: Use this setting to adjust the brightness of the target
server display.
d. Brightness Red - Controls the brightness of the target server
display for the red signal. e. Brightness Green - Controls the brightness of the green signal. f. Brightness Blue - Controls the brightness of the blue signal. g. Contrast Red - Controls the red signal contrast. h. Contrast Green - Controls the green signal. i. Contrast Blue - Controls the blue signal.
If the video image looks extremely blurry or unfocused, the settings for clock and phase can be adjusted until a better image appears on the active target server.
Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes.
j. Horizontal Offset - Controls the horizontal positioning of the
target server display on your monitor. k. Vertical Offset - Controls the vertical positioning of the target
server display on your monitor.
3. Select Automatic Color Calibration to enable this feature.
4. Select the video sensing mode: Best possible video mode
The device will perform the full Auto Sense process when switching targets or target resolutions. Selecting this option calibrates the video for the best image quality.
Quick sense video mode
With this option, the device will use a quick video Auto Sense in order to show the target's video sooner. This option is especially useful for entering a target server's BIOS configuration right after a reboot.
5. Click OK to apply the settings and close the dialog. Click Apply to
apply the settings without closing the dialog.
Page 75
Chapter 3: Working with Target Servers
66
Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
Page 76
Chapter 3: Working with Target Servers
67
Using Screenshot from Target
You are able to take a screenshot of a target server using the Screenshot from Target server command. If needed, save this screenshot to a file location of your choosing as a bitmap, JPEG or PNG file.
To take a screenshot of the target server:
1. Select Video > Screenshot from Target or click the Screenshot from
Target button on the toolbar.
2. In the Save dialog, choose the location to save the file, name the file,
and select a file format from the 'Files of type' drop-down.
3. Click Save to save the screenshot.
Page 77
Chapter 3: Working with Target Servers
68
Changing the Maximum Refresh Rate
If the video card you are using on the target uses custom software and you are accessing the target through MPC or VKC, you may need to change the maximum refresh rate of the monitor in order for the refresh rate to take effect on the target.
To adjust the monitor refresh rate:
1. In Windows®, select Display Properties > Settings > Advanced to
open the Plug and Play dialog.
2. Click on the Monitor tab.
3. Set the 'Screen refresh rate'.
4. Click OK and then OK again to apply the setting.
Mouse Options
When controlling a target server, the Remote Console displays two mouse cursors: one belonging to your client workstation and the other belonging to the target server.
You can operate in either single mouse mode or dual mouse mode. When in dual mouse mode, and provided the option is properly configured, the mouse cursors align.
When there are two mouse cursors, the device offers several mouse modes:
Absolute (Mouse Synchronization) Intelligent (Mouse Mode) Standard (Mouse Mode)
Page 78
Chapter 3: Working with Target Servers
69
Mouse Pointer Synchronization
When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server. While in motion, the client mouse pointer slightly leads the target mouse pointer due to mouse acceleration settings.
On fast LAN connections, you can disable the Virtual KVM Client mouse pointer and view only the target server's pointer. You can toggle between these two modes (single mouse and dual mouse).
Mouse Synchronization Tips
Be sure to follow these steps when configuring mouse synchronization:
1. Verify that the selected video resolution and refresh rate are among
those supported by the device. The Virtual KVM Client Connection Info dialog displays the actual values that the device is seeing.
2. For KX II devices, verify that the cable length is within the specified
limits for the selected video resolution.
3. Verify that the mouse and video have been properly configured
during the installation process.
4. Force an auto-sense by clicking the Virtual KVM Client auto-sense
button.
5. If that does not improve the mouse synchronization (for Linux, UNIX,
and Solaris KVM target servers): a. Open a terminal window. b. Enter the xset mouse 1 1 command. c. Close the terminal window.
6. Click the "Virtual KVM Client mouse synchronization" button .
Page 79
Chapter 3: Working with Target Servers
70
Additional Notes for Intelligent Mouse Mode
Be sure that there are no icons or applications in the upper left
section of the screen since that is where the synchronization routine takes place.
Do not use an animated mouse. Disable active desktop on KVM target servers.
Synchronize Mouse
In dual mouse mode, the Synchronize Mouse command forces realignment of the target server mouse pointer with Virtual KVM Client mouse pointer.
To synchronize the mouse, do one of the following:
Choose Mouse > Synchronize Mouse or click the Synchronize
Mouse button in the toolbar.
Note: This option is available only in Standard and Intelligent mouse modes.
Standard Mouse Mode
Standard Mouse mode uses a standard mouse synchronization algorithm using relative mouse positions. Standard Mouse mode requires that mouse acceleration is disabled and other mouse parameters are set correctly in order for the client and server mouse to stay synchronized.
To enter Standard Mouse mode:
Choose Mouse > Standard.
Page 80
Chapter 3: Working with Target Servers
71
Intelligent Mouse Mode
In Intelligent Mouse mode, the device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. Intelligent mouse mode is the default for non-VM targets.
In this mode, the mouse cursor does a “dance” in the top left corner of
the screen and calculates the acceleration. For this mode to work properly, certain conditions must be met.
To enter intelligent mouse mode:
Choose Mouse > Intelligent.
Intelligent Mouse Synchronization Conditions
The Intelligent Mouse Synchronization command, available on the Mouse menu, automatically synchronizes mouse cursors during moments of inactivity. For this to work properly, however, the following conditions must be met:
The active desktop should be disabled on the target. No windows should appear in the top left corner of the target page. There should not be an animated background in the top left corner of
the target page.
The target mouse cursor shape should be normal and not animated. The target mouse speeds should not be set to very slow or very high
values.
Advanced mouse properties such as “Enhanced pointer precision" or
“Snap mouse to default button in dialogs” should be disabled.
Choose “Best Possible Video Mode” in the Video Settings window. The edges of the target video should be clearly visible (that is, a
black border should be visible between the target desktop and the remote KVM console window when you scroll to an edge of the target video image).
When using the intelligent mouse synchronization function, having a
file icon or folder icon located in the upper left corner of your desktop may cause the function not to work properly. To be sure to avoid any problems with this function, Raritan recommends you do not have file icons or folder icons in the upper left corner of your desktop.
After autosensing the target video, manually initiate mouse synchronization by clicking the Synchronize Mouse button on the toolbar. This also applies when the resolution of the target changes if the mouse cursors start to desync from each other.
If intelligent mouse synchronization fails, this mode will revert to standard mouse synchronization behavior.
Page 81
Chapter 3: Working with Target Servers
72
Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets.
Absolute Mouse Mode
In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed. This mode is supported on servers with USB ports and is the default mode for VM and dual VM targets.
To enter absolute mouse mode:
Choose Mouse > Absolute.
Note: The absolute mouse setting requires a USB target system and is the recommended mouse setting for KX II-101.
Note: For KX II devices, Absolute Mouse Synchronization is available for use with the virtual media-enabled USB CIM (D2CIM-VUSB and D2CIM-DVUSB) only.
Single Mouse Cursor
Single Mouse mode uses only the target server mouse cursor and the local mouse pointer no longer appears onscreen. While in single mouse mode, the Synchronize Mouse command is not available (there is no need to synchronize a single mouse cursor).
Note: VKC for the KX II-101 uses an icon set that differs from the icon set used in VKC for other Dominion KX products. See VKC Toolbar for the KX II-101 for additional information.
To enter single mouse mode, do the following:
1. Choose Mouse > Single Mouse Cursor.
Page 82
Chapter 3: Working with Target Servers
73
2. Click the Single/Double Mouse Cursor button in the toolbar.
To exit single mouse mode:
1. Press Ctrl+Alt+O on your keyboard to exit single mouse mode.
VKC Virtual Media
See the chapter on Virtual Media for complete information about setting up and using virtual media.
Page 83
Chapter 3: Working with Target Servers
74
Smart Cards (VKC, AKC and MPC)
Using the KX II 2.1.10 or later, you are able to mount a smart card reader onto a target server to support smart card authentication and related applications. For a list of supported smart cards, smart card readers, and additional system requirements, see Supported and Unsupported
Smart Card Readers (on page 275).
When accessing a server remotely, you will have the opportunity to select an attached smart card reader and mount it onto the server. Smart card authentication is used with the target server, it is not used to log into the device. Therefore, changes to smart card PIN and credentials do not require updates to device accounts. When mounted onto the target server, the card reader and smart card will cause the server to behave as if they had been directly attached. Removal of the smart card or smart card reader will cause the user session to be locked or you will be logged out depending on how the card removal policy has been setup on the target server OS. When the KVM session is terminated, either because it has been closed or because you switch to a new target, the smart card reader will be automatically unmounted from the target server.
When PC-Share mode is enabled on the device, multiple users can share access to a target server. However, when a smart card reader is connected to a target, the device will enforce privacy regardless of the PC-Share mode setting. In addition, if you join a shared session on a target server, the smart card reader mounting will be disabled until exclusive access to the target server becomes available.
After a KVM session is established to the target server, a Smart Card menu and button are available in the Virtual KVM Client (VKC), Active KVM Client (AKC) and Multi-Platform Client (MPC). Once the menu is opened or the Smart Card button is selected, the smart card readers that have been detected as attached to the remote client are displayed. From this dialog you can attach additional smart card readers, refresh the list of smart card readers attached to the target, and detach smart card readers. You are also able to remove or reinsert a smart card. This function can be used to provide notification to a target server OS that requires a removal/reinsertion in order to display the appropriate login dialog. Using this function allows the notification to be sent to a single target without affecting other active KVM sessions.
To mount a smart card reader:
1. Click the Smart Card menu and then select Smart Card Reader.
Alternatively, click the Smart Card button in the toolbar.
2. Select the smart card reader from the Select Smart Card Reader
dialog.
3. Click Mount.
Page 84
Chapter 3: Working with Target Servers
75
4. A progress dialog will open. Check the 'Mount selected card reader
automatically on connection to targets' checkbox to mount the smart card reader automatically the next time you connect to a target. Click OK to begin the mounting process.
To update the smart card in the Select Smart Card Reader
dialog:
Click Refresh List if a new smart card reader has been attached to
the client PC.
To send smart card remove and reinsert notifications to the
target:
Select the smart card reader that is currently mounted and click the
Remove/Reinsert button.
To unmount a smart card reader:
Select the smart card reader to be unmounted and click the Unmount
button.
Smart card reader mounting is also supported from the Local Console. See Local Console Smart Card Access (on page 244) in your Dominion device help.
Page 85
Chapter 3: Working with Target Servers
76
Tool Options
From the Tools menu, you can specify certain options for use with the Virtual KVM Client, including logging, setting the keyboard type, and defining hot keys for exiting Full Screen mode and Single Cursor mode.
Note: The KX II-101 and KX II-101-V2 do not support single cursor mode.
To set the tools options:
1. Choose Tools > Options. The Options dialog appears.
2. Select the Enable Logging checkbox only if directed to by Technical
Support. This option creates a log file in your home directory.
3. Choose the Keyboard Type from the drop-down list (if necessary).
The options include:
US/International French (France) German (Germany) Japanese United Kingdom Korean (Korea) French (Belgium) Norwegian (Norway) Portuguese (Portugal) Danish (Denmark) Swedish (Sweden) German (Switzerland) Hungarian (Hungary) Spanish (Spain) Italian (Italy) Slovenian Translation: French - US Translation: French - US International
Note: In AKC, the keyboard type defaults to the local client, so this option does not apply.
Note: The KX II-101 does not support AKC.
Page 86
Chapter 3: Working with Target Servers
77
4. Exit Full Screen Mode - Hotkey. When you enter Full Screen mode,
Language
Configuration method
US Intl
Default
the display of the target server becomes full screen and acquires the same resolution as the target server. This is the hot key used for exiting this mode.
5. Exit Single Cursor Mode - Hotkey. When you enter single cursor
mode, only the target server mouse cursor is visible. This is the hot key used to exit single cursor mode and bring back the client mouse
cursor. Click OK. Client Launch Settings KX II users can also configure client launch settings that allow you to
define the size of the screen for a KVM session.
6. Select the Client Launch Settings tab. a. To configure the target window settings: Select 'Standard - sized to target Resolution' to open the window
using the target's current resolution. If the target resolution is greater than the client resolution, the target window covers as much screen area as possible and scroll bars are added (if
needed). Select Full Screen to open the window in full screen mode. a. To configure the monitor on which the target viewer is launched: Select 'Monitor Client Was Launched from' if you want the target
viewer to be launched using the same display as the application
that is being used on the client (for example, a web browser or
applet).
7. Use Select From Detected Monitors to select from a list of target monitors that are currently detected by the application. If a previously selected monitor is no longer detected, 'Currently Selected Monitor Not Detected' is displayed.
8. Click OK.
Keyboard Limitations
Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE
limitation.
Language Configuration on Linux
Because the Sun JRE on Linux has problems generating the correct Key Events for foreign-language keyboards configured using System Preferences, Raritan recommends that you configure foreign keyboards using the methods described in the following table.
Page 87
Chapter 3: Working with Target Servers
78
Language
Configuration method
French
Keyboard Indicator
German
System Settings (Control Center)
Japanese
System Settings (Control Center)
UK
System Settings (Control Center)
Korean
System Settings (Control Center)
Belgian
Keyboard Indicator
Norwegian
Keyboard Indicator
Danish
Keyboard Indicator
Swedish
Keyboard Indicator
Hungarian
System Settings (Control Center)
Spanish
System Settings (Control Center)
Italian
System Settings (Control Center)
Slovenian
System Settings (Control Center)
Portuguese
System Settings (Control Center)
Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment.
Page 88
Chapter 3: Working with Target Servers
79
View Options
View Toolbar
You can use the Virtual KVM client with or without the toolbar display.
To toggle the display of the toolbar (on and off):
Choose View > View Toolbar.
Scaling
Scaling your target window allows you to view the entire contents of the target server window. This feature increases or reduces the size of the target video to fit the Virtual KVM Client window size, and maintains the aspect ratio so that you see the entire target server desktop without using the scroll bar.
To toggle scaling (on and off):
Choose View > Scaling.
Target Screen Resolution
When you enter Full Screen mode, the target's full screen is displayed and acquires the same resolution as the target server. The hot key used for exiting this mode is specified in the Options dialog (the default is Ctrl+Alt+M). While in Full Screen mode, moving your mouse to the top of the screen will display the Full Screen mode menu bar.
To enter full screen mode:
Choose View > Full Screen.
To exit full screen mode:
Press the hot key configured in the Tools Options dialog. The default
is Ctrl+Alt+M. For AKC, select Connection/Exit from the hidden menu bar, which is accessed by hovering your mouse at the top of the screen.
Note: KX II-101 does not support AKC.
Alternatively, if you want to access the target in full screen mode at all times, you can make Full Screen mode the default.
To set Full Screen mode as the default mode:
1. Click Tools > Options to open the Options dialog.
2. Select Enable Launch in Full Screen Mode and click OK.
Page 89
Chapter 3: Working with Target Servers
80
Help Options
About Raritan Virtual KVM Client
This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support.
To obtain version information:
1. Choose Help > About Raritan Virtual KVM Client.
2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file so it can be accessed later when dealing with support (if needed).
Active KVM Client (AKC)
Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help.
Overview
The Microsoft Windows .NET-based Active KVM Client (AKC) is available with the KX II 2.2 (or later) and supports all KX II models, although the KX2-101 is not currently supported. AKC is based on Microsoft Windows .NET technology and allows users to run the client in Windows environments without the use of the Java Runtime Environment (JRE), which is required to run Raritan's Virtual KVM and Multi-Platform clients. AKC also works with CC-SG.
AKC and VKC share similar features with the exception of the following:
Minimum system requirements Supported operating systems and browsers Keyboard macros created in AKC cannot be used in VKC.
See the Virtual KVM Client (VKC) (on page 51) section for information on using the available features of the application. If there is a difference between how AKC functions as compared to VKC, it is noted in the topic.
Also see Enabling Direct Port Access (see "Enabling Direct Port
Access via URL" on page 146)and Enabling the AKC Download Server Certificate Validation (on page 147) for configuration
information on using AKC.
Note: If you are using direct port access with AKC, you must open a new browser window or browser tab for each target you want to access. If you try to access another target by entering the DPA URL into the same browser window or browser tab you are currently accessing a target from, you will not be able to connect and may receive an error.
Page 90
Chapter 3: Working with Target Servers
81
AKC Supported Operating Systems and Browsers
.NET Framework
AKC requires Windows .NET® version 3.5, and will work with both 3.5 and 4.0 installed.
Operating Systems
When launched from Internet Explorer®, AKC allows you to reach target servers via the KX II 2.2 (or later). AKC is compatible with the following platforms running .NET Framework 3.5:
Windows XP® operating system  Windows Vista® operating system (up to 64 bit)  Windows 7® operating system (up to 64 bit)
Note: You must be using Windows 7 if WINDOWS PC FIPs is turned on and you are accessing a target using AKC and a smartcard.
Since .NET is required to run AKC, if you do not have .NET installed or you have an unsupported version of .NET installed, you will receive a message instructing you to check the .NET version.
Browser
Internet Explorer 6 or later
If you attempt to open AKC from a browser other than IE 6 or later, you will receive an error message instructing you to check your browser and to switch to Internet Explorer.
Page 91
Chapter 3: Working with Target Servers
82
Prerequisites for Using AKC
In order to use AKC:
Ensure the cookies from the IP address of the device that is being
accessed are not currently being blocked.
Windows Vista, Windows 7 and Windows 2008 server users should
ensure that the IP address of the device being accessed is included in their browser's Trusted Sites Zone and that Protected Mode is not on when accessing the device.
Enable AKC Download Server Certificate Validation If the device (or CC-SG) administrator has enabled the Enable AKC
Download Server Certificate Validation option:
Administrators must upload a valid certificate to the device or
generate a self-signed certificate on the device. The certificate must have a valid host designation.
Each user must add the CA certificate (or a copy of self-signed
certificate) to the Trusted Root CA store in their browser.
When launching AKC from the CC-SG Admin Client, you must have JRE™ 1.6.0_10 or above.
Multi-Platform Client (MPC)
Raritan Multi-Platform Client (MPC) is a graphical user interface for the Raritan product lines, providing remote access to target servers connected to Raritan KVM over IP devices. For details on using MPC, see the KVM and Serial Access Clients Guide available on Raritan's website on the same page as the user guide. Instructions on launching MPC are provided there.
Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help.
Launching MPC from a Web Browser
Important: Regardless of the browser you use, you must allow pop-ups from the Dominion device's IP address in order to open MPC.
Important: Only Mac 10.5 and 10.6 with an Intel® processor can run JRE 1.6 and, therefore, be used as a client. Mac 10.5.8 does not support MPC as a standalone client.
1. To open MPC from a client running any supported browser, type http://IP-ADDRESS/mpc into the address line, where IP-ADDRESS is the IP address of your Raritan device. MPC opens in a new window.
Page 92
Chapter 3: Working with Target Servers
83
Note: The Alt+Tab command toggles between windows only on the local system.
When MPC opens, the Raritan devices that were automatically detected and which are found on your subnet are displayed in the Navigator in tree format.
2. If your device is not listed by name in the navigator, add it manually: a. Choose Connection > New Profile. The Add Connection window
opens.
b. In the Add Connection window, type a device Description,
specify a Connection Type, add the device IP address, and click OK. These specifications can be edited later.
3. In the Navigator panel on the left of the page, double-click the icon that corresponds to your Raritan device to connect to it.
Note: Depending on your browser and browser security settings, you may see various security and certificate check and warning messages. It is necessary to accept the options in order to open MPC.
Note: If you are using Firefox 3.0.3, you may experience problems launching the application. If this occurs, clear the browser cache and launch the application again.
Page 93
84
In This Chapter
Overview .................................................................................................. 84
Turning Outlets On/Off and Cycling Power ............................................. 85
Overview
Chapter 4
Rack PDU (Power Strip) Outlet Control
The KX II allows you to control Raritan PX and RPC series rack PDU (power strip) outlets connected to the KX II through a D2CIM-PWR.
Once a PX or RPC series is setup and then attached to the KX II, the rack PDU and its outlets can be controlled from the Powerstrip page in the KX II interface. This page is accessed by clicking on the Power menu at the top of the page.
The Powerstrip page will display rack PDUs attached to the KX II for which the user has been granted appropriate port access permissions. In the case of tiered configurations, the Powerstrip page will display both rack PDUs attached to the base and tiered KX IIs, for which the user has been granted appropriate port access permissions.
Note: For information on setting up a PX, see the Dominion PX User Guide.
From the Powerstrip page, you are able to turn the outlets on and off, as well as cycle their power. You are also able to view the following power strip and outlet information:
Powerstrip Device Information:
Name Model Temperature Current Amps Maximum Amps Voltage Power in Watts Power in Volts Ampere
Outlet Display Information:
Name - Named assigned to the outlet when it was configured. State - On or Off status of the outlet.
Page 94
Chapter 4: Rack PDU (Power Strip) Outlet Control
85
Control - Turn outlets on or off, or cycle their power. Association - The ports associated with the outlet.
Initially, when you open the Powerstrip page, the power strips that are currently connected to the KX II are displayed in the Powerstrip drop-down. Additionally, information relating to the currently selected power strip is displayed. If no power strips are connected to the KX II, a message stating "No powerstrips found" will be displayed in the Powerstrip Device section of the page.
Turning Outlets On/Off and Cycling Power
To turn an outlet on:
1. Click the Power menu to access the Powerstrip page.
2. From the Powerstrip drop-down, select the PX rack PDU (power strip) you want to turn on.
3. Click Refresh to view the power controls.
4. Click On.
Page 95
Chapter 4: Rack PDU (Power Strip) Outlet Control
86
5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its state will be displayed as 'on'.
To turn an outlet off:
1. Click Off.
2. Click OK on the Power Off dialog.
3. Click OK on the Power Off confirmation dialog. The outlet will be turned off and its state will be displayed as 'off'.
To cycle the power of an outlet:
1. Click the Cycle button. The Power Cycle Port dialog opens.
Page 96
Chapter 4: Rack PDU (Power Strip) Outlet Control
87
2. Click OK. The outlet will then cycle (note that this may take a few seconds).
3. Once the cycling is complete the dialog will open. Click OK to close the dialog.
Page 97
88
In This Chapter
Overview .................................................................................................. 89
Prerequisites for Using Virtual Media ...................................................... 92
Using Virtual Media via VKC and AKC in a Windows Environment ........ 93
Using Virtual Media ................................................................................. 94
File Server Setup (File Server ISO Images Only) ................................... 95
Connecting to Virtual Media .................................................................... 97
Disconnecting Virtual Media .................................................................. 100
Chapter 5
Virtual Media
Page 98
Chapter 5: Virtual Media
89
Overview
Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client PC and network file servers. With this feature, media mounted on a client PC and network file servers is essentially "mounted virtually" by the target server. The target server can then read from and write to that media as if it were physically connected to the target server itself. In addition to data file support via virtual media files are supported by virtual media via a USB connection.
Virtual media can include internal and USB-mounted CD and DVD drives, USB mass storage devices, PC hard drives, and ISO images (disk images).
Note: ISO9660 is the standard supported by Raritan. However, other ISO standards can be used.
Virtual media provides the ability to perform additional tasks remotely, such as:
Transferring files Running diagnostics Installing or patching applications Complete installation of the operating system
This expanded KVM control eliminates most trips to the data center, saving time and money, thereby making virtual media very powerful.
Page 99
Chapter 5: Virtual Media
90
Page 100
Chapter 5: Virtual Media
91
Diagram key
Desktop PC
CD/DVD drive
KX II
USB mass storage device
CIM
PC hard drive
Target server
Remote file server (ISO images)
Loading...