Raritan Computer DKX2-v2.6.0-0R-E User Manual

Dominion KX II
User Guide
Release 2.6.0
Copyright © 2014 Raritan, Inc. DKX2-v2.6.0-0R-E March 2014 255-62-4023-00
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc.
© Copyright 2014 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
FCC Information
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial installation. This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. Operation of this equipment in a residential environment may cause harmful interference.
VCCI Information (Japan)
Raritan is not responsible for damage to this product resulting from accident, disaster, misuse, abuse, non-Raritan modification of the product, or other events outside of Raritan's reasonable control or not arising under normal operating conditions.
If a power cable is included with this product, it must be used exclusively for this product.
In Raritan products that require Rack Mounting, please follow these precautions:
Operation temperature in a closed rack environment may be greater than room temperature. Do
not exceed the rated maximum ambient temperature of the appliances. See Specifications (on page 287) in online help.
Ensure sufficient airflow through the rack environment. Mount equipment in the rack carefully to avoid uneven mechanical loading. Connect equipment to the supply circuit carefully to avoid overloading circuits. Ground all equipment properly, especially supply connections, such as power strips (other than
direct connections), to the branch circuit.
iii
Contents
Chapter 1 Introduction 1
KX II Overview ............................................................................................................................... 2
Package Contents .......................................................................................................................... 4
KX II Device Photos and Features ................................................................................................. 5
Product Features ........................................................................................................................... 7
Hardware ............................................................................................................................. 7
Software ............................................................................................................................... 8
KX II Client Applications................................................................................................................. 9
KX II Help ....................................................................................................................................... 9
Chapter 2 Installation and Configuration 10
Overview ...................................................................................................................................... 10
Rack Mounting ............................................................................................................................. 10
Forward Mount ................................................................................................................... 10
Rear Mount ........................................................................................................................ 11
Default Login Information ............................................................................................................. 12
Getting Started ............................................................................................................................. 12
Step 1: Configuring Network Firewall Settings .................................................................. 12
Step 2: Configure the KVM Target Servers ....................................................................... 13
Step 3: Connect the Equipment ......................................................................................... 16
Step 4: Configure the KX II ................................................................................................ 18
Step 5: Launching the KX II Remote Console ................................................................... 23
Step 6: Configuring the Keyboard Language (Optional) ................................................... 24
Step 7: Configure Tiering (Optional) .................................................................................. 25
Logging in to the KX II.................................................................................................................. 25
Allow Pop-Ups ............................................................................................................................. 26
Security Warnings and Validation Messages .............................................................................. 26
Java Validation and Access Warning ................................................................................ 26
Additional Security Warnings ............................................................................................. 27
Installing a Certificate................................................................................................................... 27
Example 1: Import the Certificate into the Browser ........................................................... 28
Example 2: Add the KX II to Trusted Sites and Import the Certificate .............................. 30
Chapter 3 Working with Target Servers 32
KX II Interfaces ............................................................................................................................ 32
KX II Local Console Interface: KX II Devices .............................................................................. 33
KX II Remote Console Interface .................................................................................................. 33
KX II Interface .................................................................................................................... 34
Left Panel ........................................................................................................................... 35
KX II Console Navigation ................................................................................................... 37
Contents
iv
Port Access Page (Remote Console Display) ................................................................... 38
Port Action Menu ............................................................................................................... 41
Managing Favorites ........................................................................................................... 43
Scanning Ports .................................................................................................................. 47
Logging Out ....................................................................................................................... 50
Proxy Server Configuration for Use with MPC, VKC and AKC.................................................... 50
Virtual KVM Client (VKC) and Active KVM Client (AKC) ............................................................. 52
Overview ............................................................................................................................ 52
Virtual KVM Client Java Requirements ............................................................................. 52
Virtual KVM Client (VKC) and Active KVM Client (AKC) Shared Features ....................... 53
Connect to a Target Server ............................................................................................... 53
Connection Properties ....................................................................................................... 54
Connection Information ..................................................................................................... 56
Connection Properties ....................................................................................................... 57
Toolbar Buttons and Status Bar Icons ............................................................................... 58
Keyboard Options .............................................................................................................. 60
Video Properties ................................................................................................................ 66
Mouse Options ................................................................................................................... 70
Tool Options ...................................................................................................................... 75
View Options ...................................................................................................................... 79
Digital Audio ....................................................................................................................... 82
Smart Cards ....................................................................................................................... 89
Version Information - Virtual KVM Client ........................................................................... 91
About the Active KVM Client ............................................................................................. 92
Multi-Platform Client (MPC) ......................................................................................................... 94
Launching MPC from a Web Browser ............................................................................... 94
Launching MPC on Mac Lion Clients ................................................................................ 95
Chapter 4 Virtual Media 96
Prerequisites for Using Virtual Media .......................................................................................... 96
KX II Virtual Media Prerequisites ....................................................................................... 96
Remote PC VM Prerequisites ............................................................................................ 97
Target Server VM Prerequisites ........................................................................................ 97
CIMs Required for Virtual Media ....................................................................................... 97
Mounting Local Drives ................................................................................................................. 97
Notes on Mounting Local Drives ........................................................................................ 97
Supported Tasks Via Virtual Media ............................................................................................. 98
Supported Virtual Media Types ................................................................................................... 98
Conditions when Read/Write is Not Available ................................................................... 98
Supported Virtual Media Operating Systems .............................................................................. 99
Number of Supported Virtual Media Drives ................................................................................. 99
Connecting and Disconnecting from Virtual Media .................................................................... 100
Access a Virtual Media Drive on a Client Computer ....................................................... 100
Mounting CD-ROM/DVD-ROM/ISO Images .................................................................... 101
Disconnect from Virtual Media Drives ............................................................................. 102
Virtual Media in a Windows XP Environment ............................................................................ 102
Virtual Media in a Linux Environment ........................................................................................ 102
Active System Partitions .................................................................................................. 102
Drive Partitions ................................................................................................................ 103
Root User Permission Requirement ................................................................................ 103
Contents
v
Virtual Media in a Mac Environment .......................................................................................... 103
Active System Partition .................................................................................................... 103
Drive Partitions ................................................................................................................ 103
Virtual Media File Server Setup (File Server ISO Images Only)................................................ 104
Chapter 5 Rack PDU (Power Strip) Outlet Control 105
Overview .................................................................................................................................... 105
Turning Outlets On/Off and Cycling Power ............................................................................... 106
Chapter 6 USB Profiles 108
Overview .................................................................................................................................... 108
CIM Compatibility ....................................................................................................................... 109
Available USB Profiles ............................................................................................................... 109
Mouse Modes when Using the Mac Boot Menu .............................................................. 115
Selecting Profiles for a KVM Port .............................................................................................. 115
Chapter 7 User Management 116
User Groups ............................................................................................................................... 116
User Group List................................................................................................................ 117
Relationship Between Users and Groups ....................................................................... 117
Adding a New User Group ............................................................................................... 117
Modifying an Existing User Group ................................................................................... 124
Users .......................................................................................................................................... 125
Adding a New User .......................................................................................................... 125
View the KX II Users List ................................................................................................. 126
View Users by Port .......................................................................................................... 126
Disconnecting Users from Ports ...................................................................................... 127
Logging Users Off the KX II (Force Logoff) ..................................................................... 127
Modifying an Existing User .............................................................................................. 128
Authentication Settings .............................................................................................................. 128
Implementing LDAP/LDAPS Remote Authentication ...................................................... 129
Returning User Group Information from Active Directory Server .................................... 133
Implementing RADIUS Remote Authentication ............................................................... 134
Returning User Group Information via RADIUS .............................................................. 137
RADIUS Communication Exchange Specifications ......................................................... 137
User Authentication Process ........................................................................................... 139
Changing a Password ................................................................................................................ 140
Chapter 8 Device Management 141
Network Settings ........................................................................................................................ 141
Network Basic Settings .................................................................................................... 141
Assign the KX II an IP Address ....................................................................................... 142
Configure the IPv4 Settings ............................................................................................. 142
Configure the IPv6 Settings ............................................................................................. 143
Configure the DNS Settings ............................................................................................ 143
Contents
vi
LAN Interface Settings ..................................................................................................... 144
Device Services ......................................................................................................................... 145
Enabling SSH .................................................................................................................. 145
HTTP and HTTPS Port Settings ...................................................................................... 146
Entering the Discovery Port ............................................................................................. 146
Configuring and Enabling Tiering .................................................................................... 147
Enabling Direct Port Access via URL .............................................................................. 152
Enabling the AKC Download Server Certificate Validation ............................................. 156
Configuring SNMP Agents ............................................................................................... 157
Configuring Modem Settings ........................................................................................... 159
Configuring Date/Time Settings ....................................................................................... 161
Event Management ......................................................................................................... 162
Power Supply Setup .................................................................................................................. 170
Configuring Ports ....................................................................................................................... 171
Configuring Standard Target Servers .............................................................................. 173
Configuring KVM Switches .............................................................................................. 174
Configuring CIM Ports ..................................................................................................... 176
Configuring Rack PDU (Power Strip) Targets ................................................................. 177
Configuring Blade Chassis .............................................................................................. 183
Configuring USB Profiles (Port Page) ............................................................................. 204
Configuring KX II Local Port Settings .............................................................................. 206
Connect and Disconnect Scripts ................................................................................................ 211
Applying and Removing Scripts ....................................................................................... 211
Adding Scripts .................................................................................................................. 212
Modifying Scripts ............................................................................................................. 215
Importing and Exporting Scripts ...................................................................................... 215
Port Group Management ........................................................................................................... 216
Creating Port Groups ....................................................................................................... 217
Creating a Dual Video Port Group ................................................................................... 218
Changing the Default GUI Language Setting ............................................................................ 219
Chapter 9 Security Management 221
Security Settings ........................................................................................................................ 221
Login Limitations .............................................................................................................. 222
Strong Passwords............................................................................................................ 224
User Blocking ................................................................................................................... 225
Encryption & Share .......................................................................................................... 227
Enabling FIPS 140-2 ....................................................................................................... 230
Configuring IP Access Control ................................................................................................... 232
SSL Certificates ......................................................................................................................... 234
Security Banner ......................................................................................................................... 237
Chapter 10 Maintenance 239
Audit Log .................................................................................................................................... 239
Device Information ..................................................................................................................... 240
Backup and Restore .................................................................................................................. 242
USB Profile Management .......................................................................................................... 244
Handling Conflicts in Profile Names ................................................................................ 245
Contents
vii
Upgrading CIMs ......................................................................................................................... 245
Upgrading Firmware .................................................................................................................. 245
Upgrade History ......................................................................................................................... 247
Rebooting the KX II .................................................................................................................... 248
Stopping CC-SG Management .................................................................................................. 249
Chapter 11 Diagnostics 251
Network Interface Page ............................................................................................................. 251
Network Statistics Page ............................................................................................................. 251
Ping Host Page .......................................................................................................................... 253
Trace Route to Host Page ......................................................................................................... 254
Device Diagnostics .................................................................................................................... 255
Chapter 12 Command Line Interface (CLI) 257
Overview .................................................................................................................................... 257
Accessing the KX II Using CLI ................................................................................................... 258
SSH Connection to the KX II ..................................................................................................... 258
SSH Access from a Windows PC .................................................................................... 258
SSH Access from a UNIX/Linux Workstation .................................................................. 258
Logging In .................................................................................................................................. 259
Navigation of the CLI ................................................................................................................. 259
Completion of Commands ............................................................................................... 259
CLI Syntax -Tips and Shortcuts ....................................................................................... 260
Common Commands for All Command Line Interface Levels ........................................ 260
Initial Configuration Using CLI ................................................................................................... 261
Setting Parameters .......................................................................................................... 261
Setting Network Parameters ............................................................................................ 261
CLI Prompts ............................................................................................................................... 262
CLI Commands .......................................................................................................................... 262
Security Issues ................................................................................................................ 263
Administering the KX II Console Server Configuration Commands .......................................... 263
Configuring Network .................................................................................................................. 263
Interface Command ......................................................................................................... 264
Name Command ........................................................................................................... 265
IPv6 Command ................................................................................................................ 265
Chapter 13 KX II Local Console 266
Overview .................................................................................................................................... 266
Simultaneous Users ................................................................................................................... 266
KX II Local Console Interface: KX II Devices ............................................................................ 267
Security and Authentication ....................................................................................................... 267
Available Resolutions................................................................................................................. 267
Port Access Page (Local Console Server Display) ................................................................... 268
Accessing a Target Server ........................................................................................................ 268
Scanning Ports - Local Console ................................................................................................ 269
Local Port Scan Mode ..................................................................................................... 270
Contents
viii
Local Console Smart Card Access ............................................................................................ 270
Smart Card Access in KX2 8xx Devices ......................................................................... 271
Local Console USB Profile Options ........................................................................................... 272
Hot Keys and Connect Keys ...................................................................................................... 273
Connect Key Examples ................................................................................................... 273
Special Sun Key Combinations ................................................................................................. 274
Returning to the KX II Local Console Interface ......................................................................... 275
Local Port Administration ........................................................................................................... 275
Configuring KX II Local Console Local Port Settings ...................................................... 275
KX II Local Console Factory Reset.................................................................................. 279
Connect and Disconnect Scripts ................................................................................................ 281
Applying and Removing Scripts ....................................................................................... 281
Adding Scripts .................................................................................................................. 282
Modifying Scripts ............................................................................................................. 285
Resetting the KX II Using the Reset Button ............................................................................... 285
Appendix A Specifications 287
Hardware ................................................................................................................................... 287
KX II Physical Specifications ........................................................................................... 287
Supported Target Server Video Resolution/Refresh Rate/Connection Distance ............ 289
Supported Computer Interface Module (CIMs) Specifications ........................................ 289
Digital CIM Target Server Timing and Video Resolution ................................................. 292
Digital Video CIMs for Macs ............................................................................................ 295
Supported Paragon II CIMS and Configurations ............................................................. 296
Supported Remote Connections ..................................................................................... 300
Network Speed Settings .................................................................................................. 300
Dell Chassis Cable Lengths and Video Resolutions ....................................................... 301
Smart Card Minimum System Requirements .................................................................. 301
Supported and Unsupported Smart Card Readers ......................................................... 303
Supported Audio Device Formats .................................................................................... 305
Audio Playback and Capture Recommendations and Requirements ............................. 305
Number of Supported Audio/Virtual Media and Smartcard Connections ........................ 307
Certified Modems............................................................................................................. 307
Devices Supported by the Extended Local Port .............................................................. 307
KX2 8xx Extended Local Port Recommended Maximum Distances ............................... 308
Mac Mini BIOS Keystroke Commands ............................................................................ 308
Using a Windows Keyboard to Access Mac Targets ....................................................... 309
TCP and UDP Ports Used ............................................................................................... 309
Software ..................................................................................................................................... 311
Supported Operating Systems (Clients) .......................................................................... 311
Supported Browsers ........................................................................................................ 312
Supported Video Resolutions .......................................................................................... 313
KX II Supported Keyboard Languages ............................................................................ 315
Events Captured in the Audit Log and Syslog ................................................................. 316
Contents
ix
Appendix B Dual Video Port Groups 317
Overview .................................................................................................................................... 317
Recommendations for Dual Port Video ..................................................................................... 318
Dual Video Port Group Supported Mouse Modes ..................................................................... 318
CIMs Required for Dual Video Support ..................................................................................... 319
Dual Port Video Group Usability Notes...................................................................................... 319
Permissions and Dual Video Port Group Access ...................................................................... 320
Example Dual Port Video Group Configuration ......................................................................... 321
Dual Port Video Configuration Steps ......................................................................................... 322
Step 1: Configure the Target Server Display ................................................................... 322
Step 2: Connect the Target Server to the KX III .............................................................. 323
Step 3: Configure the Mouse Mode and Ports ................................................................ 324
Step 4: Create the Dual Video Port Group ...................................................................... 324
Step 5: Launch a Dual Port Video Group ........................................................................ 325
Raritan Client Navigation when Using Dual Video Port Groups ................................................ 325
Direct Port Access and Dual Port Video Groups ....................................................................... 326
Dual Port Video Groups Displayed on the Ports Page .............................................................. 326
Appendix C Accessing a PX2 from the KX II 327
Overview .................................................................................................................................... 327
Connecting the Paragon II to the KX II ...................................................................................... 328
Appendix D Updating the LDAP Schema 330
Returning User Group Information ............................................................................................. 330
From LDAP/LDAPS ......................................................................................................... 330
From Microsoft Active Directory ...................................................................................... 330
Setting the Registry to Permit Write Operations to the Schema ............................................... 331
Creating a New Attribute ............................................................................................................ 331
Adding Attributes to the Class ................................................................................................... 332
Updating the Schema Cache ..................................................................................................... 334
Editing rciusergroup Attributes for User Members ..................................................................... 334
Appendix E Informational Notes 337
Overview .................................................................................................................................... 337
Java Runtime Environment (JRE) Notes ................................................................................... 337
Java Runtime Environment (JRE) ................................................................................... 337
Java Not Loading Properly on Mac ................................................................................. 338
IPv6 Support Notes .................................................................................................................... 339
Operating System IPv6 Support Notes ........................................................................... 339
AKC Download Server Certification Validation IPv6 Support Notes ............................... 339
Dual Stack Login Performance Issues ....................................................................................... 340
CIM Notes .................................................................................................................................. 340
Windows 3-Button Mouse on Linux Targets .................................................................... 340
Windows 2000 Composite USB Device Behavior for Virtual Media ................................ 341
Contents
x
Virtual Media Notes .................................................................................................................... 341
Cannot Connect to Drives from Linux Clients ................................................................. 341
Cannot Write To/From a File from a Mac Client .............................................................. 342
Virtual Media via VKC and AKC in a Windows Environment .......................................... 343
Virtual Media Not Refreshed After Files Added ............................................................... 343
Virtual Media Linux Drive Listed Twice............................................................................ 344
Accessing Virtual Media on a Windows 2000 ................................................................. 344
Disconnecting Mac and Linux Virtual Media USB Drives ................................................ 344
Target BIOS Boot Time with Virtual Media ...................................................................... 344
Virtual Media Connection Failures Using High Speed for Virtual Media Connections .... 344
USB Port and Profile Notes ....................................................................................................... 345
VM-CIMs and DL360 USB Ports ..................................................................................... 345
Help Choosing USB Profiles ............................................................................................ 345
Changing a USB Profile when Using a Smart Card Reader ........................................... 347
Keyboard Notes ......................................................................................................................... 347
Non-US Keyboards .......................................................................................................... 347
Mac Keyboard Keys Not Supported for Remote Access................................................. 350
Video Mode and Resolution Notes ............................................................................................ 350
SUSE/VESA Video Modes .............................................................................................. 350
List of Supported Target Video Resolutions Not Displaying ........................................... 351
Audio .......................................................................................................................................... 351
Audio Playback and Capture Issues................................................................................ 351
Audio in a Linux Environment .......................................................................................... 352
Audio in a Windows Environment .................................................................................... 352
CC-SG Notes ............................................................................................................................. 352
Virtual KVM Client Version Not Known from CC-SG Proxy Mode .................................. 352
Single Mouse Mode when Connecting to a Target Under CC-SG Control ..................... 352
Proxy Mode and MPC ..................................................................................................... 353
Moving Between Ports on a Device................................................................................. 353
Browser Notes ........................................................................................................................... 353
Resolving Fedora Core Focus ......................................................................................... 353
Mouse Pointer Synchronization (Fedora) ........................................................................ 353
VKC and MPC Smart Card Connections to Fedora Servers ........................................... 354
Resolving Issues with Firefox Freezing when Using Fedora .......................................... 354
Contents
xi
Appendix F Frequently Asked Questions 355
General FAQs ............................................................................................................................ 355
Remote Access .......................................................................................................................... 356
Universal Virtual Media .............................................................................................................. 359
Bandwidth and KVM-over-IP Performance ................................................................................ 361
Ethernet and IP Networking ....................................................................................................... 367
IPv6 Networking ......................................................................................................................... 369
Servers ....................................................................................................................................... 371
Blade Servers ............................................................................................................................ 372
Installation .................................................................................................................................. 374
Local Port ................................................................................................................................... 376
Extended Local Port (Dominion KX2-832 and KX2-864 models only) ...................................... 378
Intelligent Power Distribution Unit (PDU) Control ...................................................................... 379
Local Port Consolidation, Tiering and Cascading ...................................................................... 380
Computer Interface Modules (CIMs) .......................................................................................... 383
Security ...................................................................................................................................... 384
Smart Cards and CAC Authentication ....................................................................................... 386
Manageability ............................................................................................................................. 386
Documentation and Support ...................................................................................................... 388
Miscellaneous ............................................................................................................................ 388
Index 391
1
In This Chapter
KX II Overview ........................................................................................... 2
Package Contents ..................................................................................... 4
KX II Device Photos and Features ............................................................ 5
Product Features ....................................................................................... 7
KX II Client Applications ............................................................................ 9
KX II Help................................................................................................... 9
Chapter 1

Introduction

Chapter 1: Introduction
2

KX II Overview

Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can be controlled with a standard KX II. With the KX II 8-user model, up to 32 servers can be controlled with the KX2-832 and up to 64 servers can be controlled with the KX2-864. A scan feature allows you to locate and view up to 32 targets. The targets are displayed as thumbnails in a slide show from which users connect to each target.
The KX II supports up to 8 video channels, allowing up to eight concurrent users to connect to eight different video targets at any given point in time. Digital audio devices are supported, allowing you to connect to playback and record devices from the remote client PC to the target server. At the rack, the KX II provides BIOS-level control of up to 64 servers and other IT devices from a single keyboard, monitor, and mouse. The integrated remote access capabilities of the KX II provide the same levels of control of your servers via a web browser.
The KX II is easily installed using standard UTP (Cat 5/5e/6) cabling. Its advanced features include virtual media, 256-bit encryption, dual power supplies, remote power control, dual Ethernet, LDAP, RADIUS, Active Directory®, Syslog integration, external modem capabilities, and web management. The KX II 8-user model also provides an extended local port located on the back of the device. These features enable you to deliver higher up-time, better productivity, and bulletproof security - at any time from anywhere.
KX II products can operate as standalone appliances and do not rely on a central management device. For larger data centers and enterprises, numerous KX II devices (along with Dominion SX devices for remote serial console access and Dominion KSX for remote/branch office management) can be integrated into a single logical solution using Raritan's CommandCenter Secure Gateway (CC-SG) management unit.
Chapter 1: Introduction
3
Chapter 1: Introduction
4
Diagram key
Local port access
Tiering
IP-based network access
Extended local port
Modem
Mobile access via iPhone® and iPad® using CC-SG
Virtual media
Digital audio
Smart card access at the rack
CIMs
Remote smart card access
Cat5/6 cable

Package Contents

Each KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmount chassis. Each KX II device ships with the following contents:
1 - KX II device 1 - KX II Quick Setup Guide 1 - Rackmount kit 2 - AC power cords 2 - Cat5 network cable 1 - Cat5 network crossover cable 1 - Set of 4 rubber feet (for desktop use) 1 - Application note 1 - Warranty card
Chapter 1: Introduction
5

KX II Device Photos and Features

KX II
KX2-808
Chapter 1: Introduction
6
KX2-832
KX2-864
See KX II Dimensions and Physical Specifications (on page 287) for product specifications. See Supported Computer Interface Module
(CIMs) Specifications (on page 289) for CIM specifications and images.
Chapter 1: Introduction
7

Product Features

Model
Remote users
Ports
KX II-864
8
64
KX II-832
8
32
KX II-808
8 8 KX II-464
4
64
KX II-432
4
32

Hardware

Integrated KVM-over-IP remote access 1U or 2U rack-mountable (brackets included) Dual power supplies with failover; autoswitching power supply with
power failure warning
Support for tiering in which a base KX II device is used to access
multiple other tiered devices. See Configuring and Enabling
Tiering (on page 147) for more information on tiering.
Multiple user capacity (1/2/4/8 remote users; 1 local user) UTP (Cat5/5e/6) server cabling Dual Ethernet ports (10/100/1000 LAN) with failover Field upgradable Local User port for in-rack access
Keyboard/mouse ports on the KX2-808, KX2-832 and KX2-864
are USB only
One front and three back panel USB 2.0 ports for supported USB
devices
Fully concurrent with remote user access Local graphical user interface (GUI) for administration
Extended local port provides extended reach to in-rack access on
KX2-8xx devices
Centralized access security Integrated power control LED indicators for dual power status, network activity, and remote
user status
Hardware Reset button Serial port to connect to an external modem Supported users and ports per model:
Chapter 1: Introduction
8
Model
Remote users
Ports
KX II-416
4
16
KX II-232
2
32
KX II-216
2
16
KX II-132
1
32
KX II-116
1
16
KX II-108
1
8

Software

Virtual media support in Windows®, Mac® and Linux® environments
with D2CIM-VUSB and D2CIM-DVUSB CIMs and digital CIMs
Support for digital audio over USB Port scanning and thumbnail view of up to 32 targets within a
configurable scan set
Absolute Mouse Synchronization with D2CIM-VUSB CIM,
D2CIM-DVUSB CIM and digital CIMs
Plug-and-Play Web-based access and management Intuitive graphical user interface (GUI) Support for dual port video output 256-bit encryption of complete KVM signal, including video and
virtual media
LDAP, Active Directory®, RADIUS, or internal authentication and
authorization
DHCP or fixed IP addressing Smart card/CAC authentication SNMP, SNMP3 and Syslog management IPv4 and IPv6 support Power control associated directly with servers to prevent mistakes Integration with Raritan's CommandCenter Secure Gateway (CC-SG)
management unit
CC Unmanage feature to remove device from CC-SG control Support of Raritan PX1 and PX2 appliances
Chapter 1: Introduction
9

KX II Client Applications

The following client applications can be used in the KX II: KX II 2.2 (and later):
Virtual KVM Client (VKC) Active KVM Client (AKC) Multi-Platform Client (MPC)
KX II (Generation 2):
Virtual KVM Client (VKC) Multi-Platform Client (MPC)
Java™ 1.7 is required to use the Java-based Java-based KX II Virtual KVM Client (VKC) and Multi-Platform Client (MPC)..
Microsoft .NET® 3.5 (or later) is required to use KX II with the Microsoft Windows®-based Active KVM Client (AKC).

KX II Help

KX II online help is considered your primary help resource. PDF versions of help are a secondary resource.
See the KX II Release Notes for important information on the current release before you begin using the KX II.
KVM Client help is provided as part of KX II online help. Online help is accompanied by the KX II Quick Setup Guide, which is
included with your KX II and can be found on the Raritan Support page of Raritan's website (http://www.raritan.com/support/firmware-and-documentation).
Note: To use online help, Active Content must be enabled in your browser.
10
In This Chapter
Overview .................................................................................................. 10
Rack Mounting ......................................................................................... 10
Default Login Information ........................................................................ 12
Getting Started ........................................................................................ 12
Logging in to the KX II ............................................................................. 25
Allow Pop-Ups ......................................................................................... 26
Security Warnings and Validation Messages .......................................... 26
Installing a Certificate .............................................................................. 27

Overview

Chapter 2

Installation and Configuration

Rack Mounting

This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter.
Before installing the KX II, configure the target server you want to access via the KX II so you ensure optimum performance.
The KX II can be mounted in 1U (1.75", 4.4 cm) of vertical space in a standard 19" equipment rack.
Note: The Raritan device depicted in the rack mounting diagrams is for example purposes only and may not depict your device. The mounting instructions are specific to your device.

Forward Mount

The steps correspond to the numbers shown in the front rackmount diagrams.
1. Secure the cable-support bar to the back end of the side brackets using two of the included screws.
2. Slide the KX II between the side brackets, with its rear panel facing the cable-support bar, until its front panel is flush with the “ears” of the side brackets.
3. Secure the KX II to the side brackets using the remaining included screws (three on each side).
4. Mount the entire assembly in your rack, and secure the side brackets' ears to the rack's front rails with your own screws, bolts, cage nuts, and so on.
Chapter 2: Installation and Configuration
11
5. When connecting cables to the rear panel of the KX II drape them over the cable-support bar.

Rear Mount

The steps correspond to the numbers shown in the rear rackmount diagrams.
1. Secure the cable-support bar to the front end of the side brackets, near the side brackets' “ears,” using two of the included screws.
2. Slide the KX II between the side brackets, with its rear panel facing the cable-support bar, until its front panel is flush with the back edges of the side brackets.
3. Secure the KX II to the side brackets using the remaining included screws (three on each side).
4. Mount the entire assembly in your rack and secure the side brackets' ears to the rack's front rails with your own screws, bolts, cage nuts, and so on.
5. When connecting cables to the rear panel of the user station or switch, drape them over the cable-support bar.
Chapter 2: Installation and Configuration
12

Default Login Information

Default
Value
User name
admin This user has administrative privileges.
Password
raritan The first time you start the KX II, you are required to
change the default password.
IP address
192.168.0.192.
Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location.

Getting Started

Note that the following configuration requirements apply only to the target server, not to the computers that you remotely access the KX II.
Step 1: Configuring Network Firewall Settings

TCP Port 5000

Allow network and firewall communication on TCP Port 5000 to enable remote access to the KX II.
Alternatively, configure the KX II to use a different TCP port, then allow communication on that port.

TCP Port 443

Allow access to TCP Port 443 (Standard HTTPS) so you can access KX II via a web browser.

TCP Port 80

Allow access to TCP Port 80 (Standard HTTP) to enable automatic redirection of HTTP requests to HTTPS.
Chapter 2: Installation and Configuration
13

Step 2: Configure the KVM Target Servers

Target Server Video Resolutions

For optimal bandwidth efficiency and video performance, KVM target servers running graphical user interfaces such as Windows®, Linux®, X-Windows, Solaris™, and KDE may require configuration.
The desktop background does not need to be completely solid, but desktop backgrounds featuring photos or complex gradients might degrade performance.
Ensure that the server video resolution and refresh rate are supported by KX II, and that the signal is non-interlaced.
See the KX II Online Help for a list of supported target server video resolutions.

Mouse Settings

Following are the mouse settings for various operating systems. These settings are configured on your target operating system unless
otherwise indicated. See the KX II Online Help for details on configuring these mouse
settings.
Windows 7 and Windows Vista Mouse Settings
Configure these mouse settings in Windows 7® and Windows
Vista®:
Configure the motion settings:
Set the mouse motion speed setting to exactly the middle speed Disable the "Enhanced pointer precision" option
Disable animation and fade effects:
Animate controls and elements inside windows Animate windows when minimizing and maximizing Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking
Chapter 2: Installation and Configuration
14
Windows XP, Windows 2003, Windows 2008 Mouse Settings
Configure these mouse settings in Windows XP®, Windows
2003® and Windows 2008®:
Configure the Motion settings:
Set the mouse motion speed setting to exactly the middle speed Disable the "Enhance pointer precision" option Disable the Snap To option
Disable transition effects:
Deselect the "Use the following transition effect for menus and
tooltips" option

Windows 2000 Mouse Settings

Configure these Windows 2000® mouse settings:
Configure the Motion settings:
Set the acceleration to None Set the mouse motion speed setting to exactly the middle speed
Disable transition effects:
Deselect the "Use the following transition effect for menus and
tooltips" option

Apple Mac Mouse Settings

Configure these Apple Mac® mouse settings:
Absolute Mouse Synchronization is required for proper mouse synchronization on KVM target servers running a Mac® operating system.
In order for Absolute Mouse Synchronization to work, a virtual media CIM is required. For a list of supported CIMs, see Supported Computer Interface Module (CIMs) Specifications.
Once you have completed your KX II installation, set the Mac USB profile. If you do not set this profile, the mouse does synch in OS X.
To do this, do one of the following:
1. Connect to the Mac target from the Raritan KVM Client.
2. Select USB Profile > Other Profiles > Mac OS-X (10.4.9 and later).
Or
Chapter 2: Installation and Configuration
15
3. In KX II, select Device Settings > Port Configuration, then click on the target name to open the Port page.
4. Expand 'Select USB Profiles for Port' section.
5. Select 'Mac OS-X (10.4.9) and later' from the Available box, then click Add to add it to the Selected box.
6. Click on 'Mac OS-X (10.4.9) and later' in the Selected box. This automatically adds it to the Preferred Profile drop-down.
7. Select 'Mac OS-X (10.4.9) and later' from the Preferred Profile drop-down, then check the checkbox under 'Set Active Profile As Preferred Profile'.
Click OK to apply.

Linux Mouse Settings

Configure these Linux® mouse settings:
(Standard Mouse Mode only) Set the mouse acceleration to exactly
1 and set the threshold to exactly 1. Enter the following command: xset mouse 1 1. This should be set for execution upon login.

Sun Solaris Mouse Settings

Configure these Sun® Solaris™ mouse settings:
Set the mouse acceleration value to exactly 1 and the threshold to
exactly 1
Ensure that your video card is set to a supported resolution and that
its output is VGA, not composite sync

IBM AIX Mouse Settings

Configure these IBM AIX® mouse settings:
Go to the Style Manager, click on Mouse Settings and set Mouse
Acceleration to 1.0 and Threshold to 3.0
Chapter 2: Installation and Configuration
16

Step 3: Connect the Equipment

A. AC Power

Connect the power supply(s):
1. Attach the included AC power cord to the KX II, and plug it into an AC power outlet.
2. For dual-power failover protection, attach the second included AC power cord to the KX II, and plug it into a different power source than the first power cord.

B. Modem Port (Optional)

Please see the KX II Online Help for information on connecting modems.

C. Network Port

The KX II provides two Ethernet ports for failover purposes - not for load-balancing.
By default, only LAN1 is active, and the automatic failover is disabled. Enable network failover if you want LAN2 to use the same IP address
should the KX II internal network interface or the network switch it is connected to become unavailable.
To connect to the network:
1. Connect a standard Ethernet cable from the network port labeled LAN1 to an Ethernet switch, hub, or router.
2. To use the optional KX II Ethernet failover capabilities: a. Connect a standard Ethernet cable from the network port labeled
LAN2 to an Ethernet switch, hub, or router.
Chapter 2: Installation and Configuration
17
Enable 'Automatic Failover' on the KX II Network Configuration page.

D. Local Access Port (Local PC)

For access to target servers at the rack, use the KX II Local Access port. The Local Access port also provides a graphical user interface from the
KX II Local Console for administration and target server access. While the Local Access port is required for installation and setup, it is
optional for subsequent use.
Note: The KX2-808, KX2-832 and KX2-864 also provide an Extended Local port labeled EXT LOCAL on the back of the device for access to target servers while at the rack. The Extended Local port is not required for the initial installation and setup. It is not enabled by default and is configured from the Local Console and the Remote Console.
To connect the local port:
Attach a multi-sync VGA monitor, mouse, and keyboard to the
respective Local User ports using USB keyboard and mouse. The Local User and Extended Local ports are on the back panel of the KX II.
Monitor - attach a standard multi-sync VGA monitor to the HD15
(female) video port
Keyboard - attach either a standard keyboard to the Mini-DIN6
(female) keyboard port, or a standard USB keyboard to one of the USB Type A (female) ports
Mouse - attach either a standard mouse to the Mini-DIN6 (female)
mouse port, or a standard USB mouse to one of the USB Type A (female) ports

E. Target Server Ports

The KX II uses standard UTP cabling (Cat5/5e/6) to connect to each target server.
For information on the supported distances between the KX II and target server, see Supported Target Server Connection Distance/Refresh Rate/Video Resolution in KX II Online Help.
If you are using digital CIMs (DCIMs), review Digital CIM Target Server Timing and Video Resolution in KX II Online Help.
To connect a target server to the KX II:
1. Use the appropriate CIM or DCIM. Attach the video connector of your CIM/DCIM to the video port of your target server.
Chapter 2: Installation and Configuration
18
2. Ensure that your target server's video is configured to a supported resolution and refresh rate.
For Sun servers, ensure your target server's video card is set to output standard VGA (H-and-V sync) and not composite sync.
3. Attach the keyboard/mouse connector of your CIM/DCIM to the corresponding ports on your target server.
Use a DCIM if you are connecting from the target server video port to the KX II.
4. Attach the CIM/DCIM to an available server port on the back of the KX II using a standard, straight-through UTP (Cat5/5e/6) cable for CIMs, or standard USB cable for DCIMs.
Note: The DCIM-USB G2 provides a small slide switch on the back of the CIM. Move the switch to P for PC-based USB target servers. Move the switch to S for Sun USB target servers. Power-cycle the CIM by removing the USB connector from the target server, then plugging it back in a few seconds later in order to apply the new switch position.

Step 4: Configure the KX II

For the following steps, you must change the default password and assign the KX II its IP address at the Local Console.
All other steps can be performed from either the Local Console, or from the KX II Remote Console via a supported web browser using the KX II's default IP address.
Java™ 1.7 is required to use the Java-based Java-based KX II Virtual KVM Client (VKC) and Multi-Platform Client (MPC)..
Microsoft .NET® 3.5 (or later) is required to use KX II with the Microsoft Windows®-based Active KVM Client (AKC).

Change the Default Password

The first time you start the KX II, you are required to change the default password.
To change the default password:
1. Once the unit has booted, enter the default username admin and password raritan. Click Login.
2. Enter the old password raritan, then enter and reenter a new password.
Passwords can be up to 64 characters in length consisting of English, alphanumeric and special characters.
3. Click Apply. Click OK on the Confirmation page.
Chapter 2: Installation and Configuration
19

Assign the KX II an IP Address

To assign an IP address to the KX II:
1. Choose Device Settings > Network. The Network Settings page opens.
2. Specify a meaningful Device Name for your KX II device.
Up to 32 alphanumeric and valid special characters, no spaces between characters.
3. Next, configure the IPv4, IPv6 and DNS settings.

Configure the IPv4 Settings

1. In the IPv4 section, enter or select the appropriate IPv4-specific network settings:
a. Enter the IP Address if needed. The default IP address is
192.168.0.192.
b. Enter the Subnet Mask. The default subnet mask is
255.255.255.0.
c. Enter the Default Gateway if None is selected from the IP Auto
Configuration drop-down.
d. Enter the Preferred DHCP Host Name if DHCP is selected from
the IP Auto Configuration drop-down.
e. Select the IP Auto Configuration. The following options are
available:
None (Static IP) - This option requires you manually specify the
network parameters.
This is the recommended option because the KX II is an infrastructure device, and its IP address should not change.
Select this option if you want to ensure redundant failover capabilities should the primary Ethernet port (or the switch/router to which it is connected) fail. If it fails, KX III fails over to the secondary network port with the same IP address, ensuring there is not interruption.
DHCP - Dynamic Host Configuration Protocol is used by
networked computers (clients) to obtain unique IP addresses and other parameters from a DHCP server.
With this option, network parameters are assigned by the DHCP server.
If DHCP is used, enter the Preferred host name (DHCP only). Up to 63 characters.
2. Next, configure IPv6 and/or DNS settings.
Loading...
+ 378 hidden pages