Raritan Computer IPR-M2, IPR-TR361, IPR-M1, IPR-TR362, IPR-TR364 User Manual

D
User Manual
IPR-TR361 IPR-M1 IPR-TR362 IPR-M2 IPR-TR364 ver 3.2
U
C
LISTE
Copyright ©2004 Raritan Computer, Inc.
IPR-0I-E
June 2004
255-80-3100
1F61
US
L
I.T.E.
Raritan Computer Inc.
400 Cottontail Lane Somerset, NJ 08873 USA Tel. 1-732-764-8886 Fax. 1-732-764-8887 E-mail: sales@raritan.com http://www.raritan.com/
Raritan Computer Japan, Inc.
4th Flr. Shinkawa NS Building 1-26-2 Shin-kawa, Chuo-ku Tokyo 104-0033 Japan Tel. 81-03-3523-5991 Fax. 81-03-3523-5992 E-mail: sales@raritan.co.jp http://www.raritan.co.jp
Raritan Computer France
120 Rue Jean Jaures 93200 Levallois-Perret France Tel. 33-14-756-2039 Fax. 33-14-756-2061 E-mail: sales.france@raritan.com
http://www.raritan.fr
Raritan Computer U.K. Ltd.
36 Great St. Helen's London EC3A 6AP United Kingdom Tel. 44 20 7614 7700 Fax. 44 20 7614 7701 E-mail: sales.uk@raritan.com http://www.raritan.com
Raritan Computer Europe, B.V.
Eglantierbaan 16 2908 LV Capelle aan den IJssel The Netherlands
Tel. 31-10-284-4040 Fax. 31-10-284-4049 E-mail: sales.europe@raritan.com http://www.raritan.com/
Raritan Computer Taiwan, Inc.
5F, 121, Lane 235, Pao-Chiao Rd., Hsin Tien Taipei Hsien Taiwan, ROC Tel. 886-2-8919-1333 Fax. 886-2-8919-1338 E-mail: sales.asia@raritan.com http://www.raritan.com.tw
Raritan Computer Deutschland GmbH
Lichstraße 2 D-45127 Essen Germany Tel. 49-201-747-9820 Fax. 49-201-747-9850 E-mail: sales.germany@raritan.com http://www.raritan.de
Shanghai Representative Office of Raritan Computer, Inc.
RM 19C-1 Shanghai Shiye Building 18 Caoxi North Road Shanghai China 2000030 Tel. 86-21-64680475 Fax. 86-21-64627964 E-mail: sales.asia@raritan.com http://www.raritan.com.tw/
FCC Information
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial installation. This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. Operation of this equipment in a residential environment may cause harmful interference.
Trademark Information
Product names mentioned in this document are trademarks or registered trademarks of their respective companies. IP-Reach, Paragon, MasterConsole MX respective logos are trademarks or registered trademarks of Raritan Computer, Inc. PS/2, RS/6000, and PC/AT are registered trademarks of International Business Machines Corporation. Sun is a registered trademark of Sun Microsystems. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other marks are the property of their respective owners.
4
, MasterConsole II, MasterConsole, and their
Japanese Approvals
For assistance in the U.S., please contact the Raritan Technical Support Team
by telephone (732) 764-8886 or by fax (732) 764-8887, or e-mail us at tech@raritan.com
.
Ask for Technical Support – Monday through Friday, 8:00am to 8:00pm, EST.
For assistance outside the U.S., please contact your regional Raritan office.
This page intentionally left blank.
CONTENTS i
Contents
Chapter 1: Introduction .................................................................. 1
IP-Reach Overview....................................................................................................................1
Access via Internet, LAN/WAN, or dial-up Modem..............................................................1
Product Photos...........................................................................................................................2
Package Contents......................................................................................................................2
Product Features........................................................................................................................3
Terminology ...............................................................................................................................4
Model Differentiation..................................................................................................................4
Chapter 2: Installation.................................................................... 5
Configuring Target Servers........................................................................................................5
Server Video Resolution......................................................................................................5
Windows XP Settings..........................................................................................................5
Windows 2000 / ME Settings...............................................................................................5
Windows 95 / 98 / NT Settings............................................................................................5
Linux Settings......................................................................................................................6
Sun Solaris Settings............................................................................................................6
Apple Macintosh Settings....................................................................................................6
Apple Macintosh Settings....................................................................................................7
Configuring Network Firewall Settings.......................................................................................7
Configuring Paragon KVM Switches..........................................................................................7
TR Series Physical Connections................................................................................................8
AC Power Line.....................................................................................................................8
Local Admin Console...........................................................................................................8
Primary Network Port ..........................................................................................................8
Secondary Network Port (optional) .....................................................................................8
KVM Input Ports ..................................................................................................................8
KVM Output / Local Access Console Ports (optional).........................................................8
Telephone Line Port (optional)............................................................................................8
Serial Input Port (optional)...................................................................................................9
M Series Physical Connections .................................................................................................9
AC Power Line.....................................................................................................................9
Local Admin Console...........................................................................................................9
Network Port........................................................................................................................9
KVM Input Ports ..................................................................................................................9
KVM Output / Local Access Console Ports (optional).......................................................10
Dedicated Modem Port (optional)......................................................................................10
Serial Input Port (optional).................................................................................................10
Initial Configuration ..................................................................................................................11
Connect to IP-Reach Remotely ...............................................................................................13
Launch Raritan Remote Client (RRC)...............................................................................13
Establish a Connection......................................................................................................14
Note to CommandCenter Users...............................................................................................14
Chapter 3: Raritan Remote Client ................................................ 15
Invoking Raritan Remote Client (RRC) via Web Browser........................................................15
Security Settings................................................................................................................15
Launching Raritan Remote Client .....................................................................................15
Removing RRC from Browser Cache................................................................................16
Optional: Installing Raritan Remote Client Software................................................................17
RRC Window Layout................................................................................................................18
RRC Navigator.........................................................................................................................19
Navigator Options..............................................................................................................20
Creating New Profiles........................................................................................................20
Establishing a New Connection.........................................................................................22
Closing a Remote Connection...........................................................................................22
RRC Toolbar and Shortcuts.....................................................................................................23
RRC Status Bar........................................................................................................................24
Remote KVM Console Control.................................................................................................25
Single Mouse Mode / Dual Mouse Mode ..........................................................................26
Full Screen Mode ..............................................................................................................26
Selecting Servers with a KVM Switch ...............................................................................27
Keyboard Macros ..............................................................................................................28
Connection and Video Properties......................................................................................31
Color Calibration................................................................................................................34
ii CONTENTS
Remote Serial Control..............................................................................................................35
Physical Connection..........................................................................................................35
Remote Connection...........................................................................................................35
Changing Serial Settings...................................................................................................36
Remote Device Administration.................................................................................................36
Configuration Menus .........................................................................................................36
Firmware Upgrade.............................................................................................................36
Device Restart...................................................................................................................36
Device Configuration Backup and Restore .......................................................................36
Log Files............................................................................................................................36
Chapter 4: Administrative Functions ........................................... 39
Accessing the Administrative Functions ..................................................................................39
Local Admin Console.........................................................................................................39
Remote Admin Console.....................................................................................................40
Navigating the Administrative Menus.......................................................................................40
Network Configuration..............................................................................................................41
Path Configuration ...................................................................................................................42
Security Configuration..............................................................................................................45
Performance Settings...............................................................................................................47
Remote Authentication: Users, Groups, and Access Permissions..........................................48
Overview............................................................................................................................48
Relationship between Users and Group Entries ...............................................................48
Create or Change Group Accounts...................................................................................49
Assign Port Access Permissions.......................................................................................50
Delete Group Accounts .....................................................................................................51
Create or Change User Accounts .....................................................................................52
Delete User Accounts........................................................................................................53
Remote Authentication Implementation...................................................................................54
Introduction........................................................................................................................54
Remote Authentication Implementation ............................................................................54
General Settings for Remote Authentication.....................................................................56
Time and Date..........................................................................................................................60
Log Off Users.....................................................................................................................60
View IP-Reach Status..............................................................................................................61
Restart or Shutdown the IP-Reach..........................................................................................61
Diagnostics...............................................................................................................................62
Appendix A: Specifications .......................................................... 63
Remote Connection .................................................................................................................63
Raritan Remote Client (RRC) Software...................................................................................63
KVM Input ................................................................................................................................63
Cable Specifications.................................................................................................................64
KVM Switch Specifications ......................................................................................................64
Output Specifications...............................................................................................................64
Appendix B: SNMP Features......................................................... 65
Appendix C: Frequently Asked Questions.................................... 67
Appendix D: Troubleshooting ....................................................... 69
Problems and Suggested Solutions.........................................................................................69
Event Log File and On-Screen Error Codes............................................................................74
Important Information
Login
The default IP-Reach login user name is <admin>, with the password <raritan>. This user has
administrative privileges.
Passwords are case sensitive and must be entered in the exact case combination in which they
were created.
The default password <raritan> must be entered entirely in lowercase letters.
To ensure security, change the default password as soon as possible.
Default IP Address
IP-Reach ships with the default IP address of 192.168.0.192.
Firmware
This manual applies to IP-Reach Firmware v3.2 and above.
TeleReach
Prior to 31 January 2003, the IP-Reach product line was known as “TeleReach.”
This page intentionally left blank.
CHAPTER 1: INTRODUCTION 1
Chapter 1: Introduction
IP-Reach Overview
Congratulations on your purchase of IP-Reach, the industry-leading solution for multi-platform, high­performance, network-based, remote KVM console access. IP-Reach enables highly-secure, multi-user, bandwidth-efficient, and software-independent access to your servers’ KVM consoles via a web browser.
IP-Reach connects to the keyboard, video, and mouse ports of up to four servers or KVM switches. Using Raritan's powerful frame-grabber and Video Compression Algorithm, it captures, digitizes, and compresses the video signal before transmitting to a remote PC. The remote user has direct access and total control of target servers for maintenance, administration, and trouble-shooting, from running GUI applications to BIOS-level troubleshooting, and even rebooting.
Use IP-Reach for convenient access to servers anytime, from anywhere:
Control servers from within the building or across a campus
Manage servers at branch offices from a central site
Provide remote support for worldwide data centers
Troubleshoot, reconfigure, and reboot servers from home
Provide convenient and secure lights-out server management
Access via Internet, LAN/WAN, or dial-up Modem
IP-Reach provides a broad array of remote access methods to control any server connected to a Raritan KVM Switch. Since servers can also be accessed out-of-band with IP-Reach, remote access to mission­critical target servers is always available - even if the network is down.
2 IP-REACH USER MANUAL
Product Photos
IP-Reach M Series
IP-Reach TR Series
Package Contents
IP-Reach ships as a fully configured stand-alone product in a standard 2U 19” rackmount chassis, along with the following contents:
TR Series M Series
(1) IP-Reach unit (1) IP-Reach unit
(1) IP-Reach TR Series Quick Installation and Setup Guide
(1) IP-Reach User Manual (1) IP-Reach User Manual
(1) Raritan Remote Client software CD-ROM
(1) Rackmount Kit (1) Rackmount Kit
(1) Power Cord (1) Power Cord
(1) RJ11 telephone cord (N) CCP20 coaxial cables
(N) CCP20 coaxial cables
(N) CCP20F coaxial cables
(N = number of ports)
(1) IP-Reach M Series Quick Installation and Setup Guide
(1) Raritan Remote Client software CD-ROM
CHAPTER 1: INTRODUCTION 3
Product Features
Access
Remote KVM access via the Internet, LAN/WAN, or dial-up modem
Up to four simultaneous user throughput to switch(es) or server(s)
Up to 16 simultaneous users (using PC-share mode)
Web browser accessible
Remote access to serial devices (VT100) connected to IP-Reach serial port
Performance
Superior compression algorithm for exceptional performance
No impact on target server performance
Automatic sensing of video resolution for optimum display
High-performance mouse tracking and synchronization
Reliability
Dual failover power supplies*
Dual failover Ethernet*
Integrated modem* / Dedicated Modem Port** allows servers to be accessible even if network is
unavailable
Security
SSL 128-bit RSA public key, 128-bit RC4 private key encryption
Single, configurable TCP port for firewall protection
Supports RADIUS and LDAP authentication protocols
Administration
Remote Administration via Web Browser interface
Tight integration with CommandCenter management appliance
SNMP Support
Firmware upgradeable over Ethernet
Simplified installation and user interface
User console for direct analog access to KVM switch
Extensive downloadable user event log
DHCP or fixed IP addressing
* IP-Reach TR Series only
** IP-Reach M Series only
4 IP-REACH USER MANUAL
Terminology
This manual makes use of the following terms to indicate components of a typical IP-Reach configuration. While reading the manual, please refer to the diagram below for clarification when necessary.
LAN/WAN
Target Server(s)
Remote PC
Local Access Console
Local Admin Console
Servers to be accessed remotely via IP-Reach and its connected KVM configuration.
A Windows-based computer used to access and control target servers connected to IP-Reach.
An optional user console, consisting of a PS/2 keyboard, PS/2 mouse, and VGA monitor, directly attached to IP-Reach to control target servers locally (not through the network).
Single-port IP-Reach models (IPR-TR361 and IPR-M1) allow connection of one local access console. Dual-port IP-Reach models (IPR-TR362 and IPR-M2) allow connection of two local access consoles, three-port IP-Reach models allow connection on three consoles, and so on.
A PS/2 keyboard and VGA monitor directly attached to IP-Reach, used for administration and setup. From this console, you can access IP-Reach administration menus directly. You cannot view Target Servers of the connected KVM configuration using this screen.
Although IP-Reach also allows remote administration via the network, the local admin console provides the most convenient means to perform initial setup.
Model Differentiation
Raritan offers two IP-Reach model lines: the TR Series and the M Series. Both model lines offer the same feature set and high performance. However, the TR Series offers the following hardware benefits demanded by carrier-grade class applications:
Dual Redundant Power Supply
Dual Failover Ethernet Controllers
Upgradeable Port Density (up to four ports)
Integrated Modem
2U Rack Height
CHAPTER 2: INSTALLATION 5
Chapter 2: Installation
Configuring Target Servers
Before installing IP-Reach, first configure any target servers that you wish to access via IP-Reach, in order to ensure optimum performance, as outlined below. Note that the following configuration requirements apply only to target servers, not to the computers that you will be using to access IP-Reach remotely (see Chapter 1: Introduction, Terminology).
Server Video Resolution
For optimal bandwidth efficiency and video performance, target servers running graphical user interfaces such as Windows, X-Windows, Solaris, and KDE should be configured with desktop backgrounds set to a predominantly solid, light-colored graphic. Backgrounds featuring photos or complex gradients should be avoided.
Ensure that the server’s video resolution and refresh rate are supported by IP-Reach, and that the signal is non-interlaced. IP-Reach supports the following video resolutions:
Text Modes
640x480 @ 60Hz
640x480 @ 72Hz
640x480 @ 75Hz
640x480 @ 85Hz
800x600 @ 56Hz
800x600 @ 60Hz
800x600 @ 72Hz
800x600 @ 75Hz
800x600 @ 85Hz
1024x768 @ 60Hz
1024x768 @ 70Hz
1024x768 @ 75Hz
1024x768 @ 85Hz
1152x864 @ 60Hz
1152x864 @ 75Hz
1280x1024 @ 60Hz
Windows XP Settings
On target servers running Microsoft Windows XP, disable the “Enhanced Pointer Precision” option, and set the mouse motion speed exactly to the middle speed setting. These parameters are found in Control Panel
Mouse Mouse Pointers.
Note: For Target Servers running Windows NT, 2000, or XP, you may wish to create a username to be used only for remote connections through IP-Reach. This allows you to keep the Target Server’s slow mouse pointer motion/acceleration settings exclusive to the IP-Reach connection only, as other users may desire faster mouse speeds.
Note: Windows XP and 2000 login screens revert to pre-set mouse parameters that differ from those suggested for optimal IP-Reach performance; therefore, mouse sync will not be optimal at these screens. If you are comfortable adjusting the registry on Windows target servers, you can obtain better IP-Reach mouse synchronization at login screens by using the Windows registry editor to change the following settings: Default user mouse motion speed = 0; mouse threshold 1= 0; mouse threshold 2 = 0.
Windows 2000 / ME Settings
On target servers running Microsoft Windows 2000 / ME, set the mouse pointer acceleration to “none” and the mouse motion speed exactly to the middle speed setting. These parameters are found in Control Panel
Mouse.
Windows 95 / 98 / NT Settings
On target servers running Microsoft Windows 95 / 98 / NT, set the mouse motion speed to the slowest
setting in Control Panel Mouse Motion.
6 IP-REACH USER MANUAL
Linux Settings
On target servers running Linux graphical interfaces, set the mouse acceleration to exactly 1 and set threshold to exactly 1.
As mentioned above, please ensure that each target server running Linux is using a resolution supported by IP-Reach at a standard VESA resolution and refresh rate. Each Linux target server should also be set so the blanking times are within +/- 40% of VESA standard values.
To check for these parameters:
Go to the Xfree86 Configuration file XF86Config
Using a text editor, disable all non-IP-Reach supported resolutions
Disable the virtual desktop feature, which is not supported by IP-Reach
Check blanking times (+/- 40% of VESA standard).
Restart computer
Note: In many Linux graphical environments, the command <Ctrl+Alt+Plus> will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config file.
Sun Solaris Settings
All target servers must be configured to one of the display resolutions supported by IP-Reach. The most popular supported resolutions for Sun machines are:
1024x768@60Hz
1024x768@70Hz
1024x768@75Hz
1024x768@85Hz
1152x900@66Hz
1152x900@76Hz
1280x1024@60Hz
Target servers running the Solaris operating system must output VGA video (H-and-V sync, not composite sync). To change your Sun video card output from composite sync to the non-default VGA output, first issue the Stop+A command to drop to bootprom mode. Then, issue the command:
setenv output-device screen:r1024x768x70
to change the output resolution. Issue the “boot” command to reboot the server.
Alternatively, you may contact your Raritan representative to purchase a video output adapter. 13W3 Suns with composite sync output require APSSUN II Raritan guardian for use with IP-Reach. HD15 Suns with composite sync output require 1396C Raritan converter to convert from HD15 to 13W3 and an APSSUN II Raritan guardian converter to support composite sync. HD15 Suns with separate sync output require an APKMSUN Raritan guardian for use with IP-Reach.
Note that KVM switch brands other than Raritan’s may or may not properly handle PS/2-to-Sun signals.
On target servers running the Solaris operating system, set the mouse acceleration value to exactly 1 and threshold to exactly 1. Set this at the graphical user interface (shown below), or with the command line “xset mouse a t” where “a” is the acceleration and “t” is the threshold.
CHAPTER 2: INSTALLATION 7
Apple Macintosh Settings
For target servers running an Apple Macintosh operating system, while using IP-Reach to access and control your target server, you must set the IP-Reach client (Raritan Remote Client) to “single cursor” mode. Dual cursor mode is not supported, and the two mouse pointers will not appear in sync if you attempt to control a Macintosh server via IP-Reach in dual cursor mode.
Configuring Network Firewall Settings
If you wish to access IP-Reach through a network firewall, your firewall must allow communication on TCP Port 5000. Alternatively, IP-Reach can be configured to use a different TCP port of your own designation (see Chapter 4: Administrative Functions, Network Configuration).
In order to take advantage of IP-Reach's web-access capabilities, the firewall must allow inbound communication on TCP Port 443 – the standard TCP port for HTTPS communication. In order to take advantage of IP-Reach's redirection of HTTP requests to HTTPS (so that users may type the more common, "http://xxx.xx.xxxx", instead of "https://xxx.xx.xxxx"), then the firewall must allow inbound communication on TCP Port 80 – the standard TCP port for HTTP communication.
Configuring Paragon KVM Switches
If you will be using IP-Reach to access Raritan’s Paragon enterprise-class KVM switch, first perform the following optimization before connecting IP-Reach:
One by one, view each target server accessible from the Paragon user station and adjust the “video gain setting” to –15 (negative 15). Adjust Paragon video gain by pressing the + or – keys on your the numerical keypad while viewing the On-Screen User Interface (OSUI).
During adjustment, the bottom line of the OSUI menu will show the gain setting parameter changing as the + or – keys are pressed. Gain settings of negative 15 result in the clearest image when each Target Server is viewed through IP-Reach from a Remote PC. Perform this setting for each target server and each user station that will be connected to IP-Reach.
8 IP-REACH USER MANUAL
TR Series Physical Connections
Back Panel of IP-Reach TR Series
AC Power Line
Attach the included AC power cord to IP-Reach and into an AC Power Outlet.
Local Admin Console
Attach a PS/2 keyboard and multisync monitor to the indicated ports (see diagram above) in the back of IP­Reach.
Primary Network Port
Connect a standard Ethernet cable from the network port to an Ethernet switch, hub, or router.
Secondary Network Port (optional)
Connect a standard Ethernet cable from the network port to an Ethernet switch, hub, or router. IP-Reach automatically fails over to the secondary Network Port when the Primary Network Port is unavailable. See Chapter 4: Administrative Functions, Network Configuration for instructions on enabling failover Ethernet support.
KVM Input Ports
Connect the included CCP20 cable(s) from “KVM In” port to the KVM console of server or KVM switch to be accessed remotely.
KVM Output / Local Access Console Ports (optional)
User ports “KVM Out” allow direct analog access to the server or KVM switch attached to corresponding “KVM Input” ports. Connect the included CCP20F cable(s) from the ports labeled “User Port” to a PS/2 keyboard, PS/2 mouse, and multisync VGA monitor.
Note: Local Access Consoles can be attached to User Ports 1 through 4. Each Local Access Console will view the KVM switch or server attached to the corresponding KVM Port. For example, the User Console attached to User Port 1 will view the KVM switch or server attached to KVM Port 1. The User Console attached to User Port 2 will view the KVM switch or server attached to KVM Port 2, and so on.
Telephone Line Port (optional)
IP-Reach TR Series models feature an integrated modem for remote access when the LAN/WAN is unavailable. Use the included telephone cable to connect the port labeled “Tel Line” to an analog telephone jack.
CHAPTER 2: INSTALLATION 9
Serial Input Port (optional)
Serially-controlled devices (VT100 terminal emulation) may be accessed remotely via IP-Reach by attaching them to the Serial IN port found on the back of IP-Reach.
The serial port on IP-Reach is of type DTE; when connecting another DTE serial device to IP-Reach, use a null modem serial cable. When connecting a DCE serial device to IP-Reach, use a straight­through serial cable.
M Series Physical Connections
Power
Switch
Serial Input
Local Access
Console Ports 1-2
AC Power Line
Dedicated
Modem
KVM Input
Ports 1-2
Local Admin
Console
Back Panel of IP-Reach M Series
AC Power Line
Attach the included AC power cord to IP-Reach, and into an AC power outlet.
Local Admin Console
Attach a PS/2 keyboard and multisync monitor to the corresponding ports in the back of IP-Reach marked “Admin Console.”
Network Port
Network Port
Connect a standard Ethernet cable from the network port to an Ethernet switch, hub, or router.
KVM Input Ports
Connect the DB25 end of an included CCP20 cable(s) to the “KVM” ports and connect the other end of the CCP cable to corresponding PS/2 keyboard, mouse, and VGA video ports of the KVM switches or servers to which you wish to provide remote network access.
10 IP-REACH USER MANUAL
KVM Output / Local Access Console Ports (optional)
Connect a PS/2 keyboard, mouse, and multisync monitor to these ports if you want local direct analog access to the servers or KVM switches connected to the corresponding “KVM In” ports.
Note: For IP-Reach Model M2, the Local Access Console attached to a KVM Out Port will view the KVM switch or server attached to the corresponding KVM In Port number. For example, the User Console attached to KVM Out Port 1 will view the KVM switch or server attached to KVM In Port 1.
Dedicated Modem Port (optional)
IP-Reach M Series models feature a dedicated modem port. By attaching a standard external serial modem to this port, users may retain remote access to IP-Reach when the LAN/WAN is unavailable.
Use a standard, straight-thru serial cable to connect IP-Reach to your external serial modem. Then connect the “Tel Line” port of your modem to an analog phone line (see your external serial modem’s documentation for more details).
Serial Input Port (optional)
Serially-controlled devices (VT100 terminal emulation) may be accessed remotely via IP-Reach by attaching them to the Serial IN port found on the back of IP-Reach.
The serial port on IP-Reach is of type DTE, when connecting another DTE serial device to IP-Reach, use a null modem serial cable. When connecting a DCE serial device to IP-Reach, use a straight-through serial cable.
CHAPTER 2: INSTALLATION 11
Initial Configuration
During initial configuration, the IP-Reach Setup Wizard helps you quickly set up IP-Reach for the first time. The IP-Reach Setup Wizard appears only when accessing the Administrative Menus on an unconfigured IP-Reach, and guides you through initial configuration parameters. The easiest way to perform this initial configuration is by using the Local Admin Console (see ‘Physical Connection’ instructions in the previous sections).
1. Power ON IP-Reach via the power switch on the back of the IP-Reach unit.
2. The Welcome to IP-Reach Setup Wizard Screen will appear on the Local Admin Console.
3. Press the letter <B> on the Local Admin Console keyboard to begin the IP-Reach Setup Wizard.
4. The Network Configuration Screen appears.
5. Use the <Tab>, <> or <> keys to select each line on the Network Configuration screen and the
<space bar>, or the <> or <> keys to toggle between available entries. Press the <Enter>, <Tab> or <> keys when your entry on each line is complete. Below are descriptions of each field, and the
appropriate values to assign.
Name: Designate a unique name for this IP-Reach unit, for example, “Miami Data Center.” The
default name is IP-Reach.
Enable Ethernet Interface: Designates whether IP-Reach should enable its Ethernet adapter as active
(default: YES).
Note: Network connections must be 10BASE-T or 100BASE-TX Ethernet
12 IP-REACH USER MANUAL
- Line Speed & Duplex: Enter the visual efficiency for the monitor: Auto detect 10 Mbps/Full
Duplex, 10 Mbps/Half Duplex, 100 Mbps/Full Duplex, or 100 Mbps/Half Duplex
- Obtain IP address automatically (DHCP):
YES: Enables dynamic IP addressing for IP-Reach. Each time IP-Reach boots, it requests
an IP address from the local DHCP server. Note that this setting can make remote access to IP-Reach from outside the LAN difficult, since the dynamically assigned IP address must be known in order to initiate a connection.
NO (default): Assigns a fixed IP address to the IP-Reach unit (recommended).
IP Address: Enter the IP address for IP-Reach given by your Network
Administrator.
Subnet Mask: Enter a Subnet Mask provided by your Network
Administrator.
Default Gateway: Enter the Default Gateway if your Network Administrator
specifies one.
Enable Modem Interface: Enables Dial-up Modem access (default: YES). For IP-Reach M Series, an
external serial modem must be connected in order for this function to work properly (see Chapter 2:
Installation, M Series Physical Connections, Dedicated Modem Port
Enable Web Browser Interface: Enables web browser access to IP-Reach (default: YES).
Use Default TCP Port 5000:
- YES (default): Utilizes the default port 5000.
- NO: Enter an alternate port number.
.
Note: In order to access IP-Reach from beyond a firewall, your firewall settings must enable two-way communication through the default port 5000 or the non-default port configured above.
Enable IP Failover (TR Series only): This setting (appears only for TR Series models), enables
activation of the secondary Ethernet port in case of failover.
- When enabled, IP-Reach will verify the availability of its primary Ethernet port at a constant
interval indicated by the Ping Interval in seconds setting.
- At each regular ping verification, if the primary Ethernet port is unavailable for an interval
longer than that designated by the Failover Timeout in seconds, IP-Reach automatically disables its primary Ethernet Port and enables its secondary Ethernet Port.
6. Press <Ctrl+S> to save entries. The Main Menu will appear.
7. On the Main Menu, select [R] Restart or shutdown the IP-Reach, and press the <Enter> key.
8. When prompted, press the letter <R> on your keyboard to restart IP-Reach.
9. IP-Reach will restart and the IP-Reach Initialization screen appears upon boot up.
10. Congratulations! IP-Reach is now ready for initial connection.
Proceed to the next section to initiate your first remote connection to IP-Reach. After you have become familiar with the remote operation of IP-Reach, consult Chapter 4: Administrative Menus to review the complete administrative functions provided by IP-Reach.
CHAPTER 2: INSTALLATION 13
Connect to IP-Reach Remotely
Having completed the physical installation of IP-Reach, you are now ready to establish an initial network connection. Below are basic instructions for doing so. Please see Chapter 3: Raritan Remote Client for detailed instructions, being sure to review the “KVM Session Properties” and “Color Calibration” sections to optimize your IP-Reach performance.
Launch Raritan Remote Client (RRC)
1. Log into any Windows-based computer with network access to IP-Reach.
2. If you are using Windows NT, 2000, or XP, ensure that you are not a “restricted” user.
3. Launch Microsoft Internet Explorer. Ensure that your Internet Explorer security settings allow the
download and execution of ActiveX controls.
Note: The Windows default security setting of “Medium” is sufficient.
4. In the URL Address field, type the IP address you assigned to IP-Reach in Step II-6. Press [ENTER]
to load and launch the web access client.
14 IP-REACH USER MANUAL
p
Establish a Connection
Upon launching the Raritan Remote Client (RRC), IP-Reach will request your user credentials. Log on with the default username and password (<admin> and <raritan>). You will connect to your IP-Reach unit. Use the RRC Navigator, found on the left-hand side of the RRC window, to select and connect to a port.
The RRC Navigator displays any known Raritan networked appliances.
Double-click on a port to establish control over the server or KVM switch attached to that
ort.
Users with Administrator privileges may modify IP-Reach configuration settings
Remotely access VT100 serial consoles connected to the “Serial IN” port of IP-Reach.
Once connected to a port, keystrokes and video signals are transmitted in real-time, as if you were situated locally.
Click on “Synchronize Mouse” to converge the mouse pointers displayed.
The RRC Toolbar provides single-click access to RRC’s most frequently-used
The RRC Status Bar provides real-time information on connection parameters.
Note to CommandCenter Users
If you are using IP-Reach in a CommandCenter configuration, perform the installation steps as outlined above. After completing the steps in this chapter, please consult the CommandCenter user guide to proceed with your installation. The rest of this user guide applies primarily to users deploying IP-Reach unit(s) without the integration functionality of CommandCenter.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 15
Chapter 3: Raritan Remote Client
Invoking Raritan Remote Client (RRC) via Web Browser
IP-Reach features Web Browser access, providing a connection from any Windows-based Remote PC running Microsoft Internet Explorer 4.0+, Mozilla 1.1+, and Netscape 7+.
Security Settings
Accessing IP-Reach via web browser requires appropriate settings in the Internet Explorer security settings tab:
“Download Signed ActiveX controls” should be set to either “Enable” or “Prompt”
“Run ActiveX controls and plug-ins” should be set to either “Enable” or “Prompt”
Please consult your Microsoft Internet Explorer documentation for details regarding these settings.
Note: Microsoft Windows 2000 and Microsoft Windows XP restricts certain types of users from downloading and running ActiveX controls and plug-ins, regardless of the above settings in Internet Explorer. Please consult your Microsoft Windows documentation for more information.
Launching Raritan Remote Client
1. After confirming that your browser security settings are configured appropriately, type the IP address
assigned to your IP-Reach unit (see Chapter 2: Installation, Initial Configuration) in the URL Address field of your web browser.
Note: IP-Reach ships with the default IP address of 192.168.0.192
2. IP-Reach redirects you to an HTTPS (128-bit) secure web page for launching RRC.
16 IP-REACH USER MANUAL
3. Depending on your browser’s security configuration, you may see any or all of the following dialog
boxes, confirming the access and launch of an externally-provided program. Click [Yes] to advance through any of these prompts.
Note: Microsoft Windows 2000 and Microsoft Windows XP restrict certain types of users from downloading and running ActiveX controls and plug-ins, regardless of the settings in Internet Explorer and regardless of your approval of the above warnings. Please review the previous section, "Security Settings" and consult your Microsoft Windows documentation for more information.
Removing RRC from Browser Cache
To remove RRC from your browser cache, whether to perform an upgrade, save disk space, or remove evidence of RRC being executed on a PC, follow the standard procedure according to your web browser software.
Directions for Internet Explorer v6.0:
1. If you have used RRC recently, exit and restart Internet Explorer.
2. On the Internet Explorer menu bar, select Tools Internet Options.
3. When the "Internet Options" dialog box appears, click on "Settings."
4. When the "Settings" dialog box appears, click on "View Objects."
5. Internet Explorer will display a list of cached program objects. Select any entries named "TeleControl
Class" and delete them.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 17
Optional: Installing Raritan Remote Client Software
Note: This step is optional. IP-Reach can be accessed from a Remote PC either by installing RRC software, or by launching RRC via web browser (see previous section). Accessing IP-Reach via web browser does not require any software installation on the Remote PC.
1. Insert the provided RRC CD-ROM into the CD-ROM drive of your PC.
2. The RRC setup program will run automatically. If it does not, right-click on your PC’s CD-ROM drive
in Windows Explorer and choose Auto Play.
3. Follow the on-screen instructions in the InstallShield Wizard to complete RRC installation on your
Remote PC. Under “Select Components,” you must select either the US version for a US Remote PC keyboard, or the Japanese version for a Japanese Remote PC keyboard.
Note: The Japanese version of RRC enables a Japanese keyboard at the Remote PC and also requires a Japanese keyboard to be set at the Target Server. The interface information remains in English.
4. Depending on the configuration of your PC, the RRC installation program may automatically install
Direct X and Microsoft Foundation Class libraries if required. If this occurs, you will be directed to restart your PC upon completing installation.
5. A Raritan Remote Client icon will be added to your desktop. Click on this icon to launch RRC.
18 IP-REACH USER MANUAL
RRC Window Layout
Raritan Remote Client functions are grouped into five general sections on the screen. Each section will be discussed in detail further in this chapter.
Menu Bar Toolbar
Navigator Remote Desktop Status Bar
Loading...
+ 58 hidden pages