Raritan Computer KSX II User Manual

Dominion KSX II
User Guide
2.3.5
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc.
© Copyright 2011 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
FCC Information
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial installation. This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. Operation of this equipment in a residential environment may cause harmful interference.
VCCI Information (Japan)
Raritan is not responsible for damage to this product resulting from accident, disaster, misuse, abuse, non-Raritan modification of the product, or other events outside of Raritan's reasonable control or not arising under normal operating conditions.
iii
Contents
Chapter 1 Introduction 1
KSX II Overview ............................................................................................................................. 2
KSX II Help .................................................................................................................................... 4
Related Documentation ....................................................................................................... 4
KSX II Client Applications .............................................................................................................. 4
Virtual Media .................................................................................................................................. 5
Product Features ........................................................................................................................... 5
Hardware ............................................................................................................................. 5
Software ............................................................................................................................... 6
External Product Overview ............................................................................................................ 7
Terminology ................................................................................................................................... 9
Package Contents ........................................................................................................................ 11
Chapter 2 Installation and Configuration 12
Overview ...................................................................................................................................... 12
Default Login Information ............................................................................................................. 12
Getting Started ............................................................................................................................. 13
Step 1: Configure KVM Target Servers ............................................................................. 13
Step 2: Configure Network Firewall Settings ..................................................................... 22
Step 3: Connect the Equipment ......................................................................................... 23
Step 4: Configure the KSX II ............................................................................................. 28
Valid Special Characters for Target Names ...................................................................... 31
Step 5 (Optional): Configure Keyboard Language ............................................................ 35
Chapter 3 Working with Target Servers 36
Interfaces ..................................................................................................................................... 36
KSX II Local Console: KSX II Devices .............................................................................. 37
KSX II Remote Console Interface...................................................................................... 38
Proxy Server Configuration for use with MPC, VKC and AKC .................................................... 50
Virtual KVM Client (VKC) ............................................................................................................. 51
Overview ............................................................................................................................ 51
Connecting to a KVM Target Server ................................................................................. 51
Toolbar ............................................................................................................................... 51
Switching Between KVM Target Servers .......................................................................... 53
Power Controlling a Target Server .................................................................................... 53
Disconnecting KVM Target Servers .................................................................................. 54
Choosing USB Profiles ...................................................................................................... 54
Connection Properties ....................................................................................................... 55
Connection Information ..................................................................................................... 57
Keyboard Options .............................................................................................................. 57
Contents
iv
Video Properties ................................................................................................................ 63
Mouse Options................................................................................................................... 68
VKC Virtual Media ............................................................................................................. 73
Smart Cards ....................................................................................................................... 74
Tool Options ...................................................................................................................... 76
View Options ...................................................................................................................... 79
Help Options ...................................................................................................................... 80
Active KVM Client (AKC) ............................................................................................................. 80
Overview ............................................................................................................................ 80
AKC Supported .NET Framework, Operating Systems and Browsers ............................. 81
Prerequisites for Using AKC .............................................................................................. 82
Multi-Platform Client (MPC) ......................................................................................................... 82
Launching MPC from a Web Browser ............................................................................... 82
Raritan Serial Console (RSC) ...................................................................................................... 83
Opening RSC from the Remote Console .......................................................................... 83
Chapter 4 Rack PDU (Power Strip) Outlet Control 86
Overview ...................................................................................................................................... 86
Turning Outlets On/Off and Cycling Power ................................................................................. 87
Chapter 5 Virtual Media 90
Overview ...................................................................................................................................... 91
Prerequisites for Using Virtual Media .......................................................................................... 94
Using Virtual Media via VKC and AKC in a Windows Environment ............................................ 95
Using Virtual Media ...................................................................................................................... 96
File Server Setup (File Server ISO Images Only) ........................................................................ 98
Connecting to Virtual Media ....................................................................................................... 100
Local Drives ..................................................................................................................... 100
Conditions when Read/Write is Not Available ................................................................. 101
CD-ROM/DVD-ROM/ISO Images .................................................................................... 101
Disconnecting Virtual Media ...................................................................................................... 103
Chapter 6 USB Profiles 104
Overview .................................................................................................................................... 104
CIM Compatibility ....................................................................................................................... 105
Available USB Profiles ............................................................................................................... 105
Selecting Profiles for a KVM Port .............................................................................................. 111
Mouse Modes when Using the Mac OS-X USB Profile with a DCIM-VUSB ................... 112
Chapter 7 User Management 113
User Groups ............................................................................................................................... 113
User Group List................................................................................................................ 114
Relationship Between Users and Groups ....................................................................... 114
Adding a New User Group ............................................................................................... 114
Modifying an Existing User Group ................................................................................... 119
Contents
v
Users .......................................................................................................................................... 120
User List ........................................................................................................................... 120
Adding a New User .......................................................................................................... 121
Modifying an Existing User .............................................................................................. 122
Logging a User Off (Force Logoff) ................................................................................... 122
Authentication Settings .............................................................................................................. 123
Implementing LDAP/LDAPS Remote Authentication ...................................................... 124
Returning User Group Information from Active Directory Server .................................... 127
Implementing RADIUS Remote Authentication ............................................................... 128
Returning User Group Information via RADIUS .............................................................. 132
RADIUS Communication Exchange Specifications ......................................................... 132
User Authentication Process ........................................................................................... 134
Changing a Password ................................................................................................................ 135
Chapter 8 Device Management 136
Network Settings ........................................................................................................................ 136
Network Basic Settings .................................................................................................... 137
LAN Interface Settings ..................................................................................................... 139
Device Services ......................................................................................................................... 141
Enabling Telnet ................................................................................................................ 141
Enabling SSH .................................................................................................................. 141
HTTP and HTTPS Port Settings ...................................................................................... 142
Entering the Discovery Port ............................................................................................. 142
Enabling Serial Console Access ...................................................................................... 142
Enabling Direct Port Access via URL .............................................................................. 143
Configuring Direct Port Access via Telnet, IP Address or SSH ...................................... 144
Enabling the AKC Download Server Certificate Validation ............................................. 146
Configuring Modem Settings ..................................................................................................... 147
Configuring Date/Time Settings ................................................................................................. 148
Event Management .................................................................................................................... 149
Configuring Event Management Settings ........................................................................ 150
Configuring Event Management - Destinations ............................................................... 152
Configuring Ports ....................................................................................................................... 155
Power Control .................................................................................................................. 158
Target Settings ................................................................................................................ 160
Configuring Blade Chassis .............................................................................................. 161
Configuring USB Profiles (Port Page) ............................................................................. 181
Configuring KSX II Local Port Settings ............................................................................ 183
Port Keywords ............................................................................................................................ 186
Port Group Management ........................................................................................................... 188
Chapter 9 Security Management 189
Security Settings ........................................................................................................................ 189
Login Limitations .............................................................................................................. 190
Strong Passwords ........................................................................................................... 192
User Blocking ................................................................................................................... 193
Encryption & Share .......................................................................................................... 195
Enabling FIPS 140-2 ....................................................................................................... 198
Contents
vi
Configuring IP Access Control ................................................................................................... 199
SSL Certificates ......................................................................................................................... 201
Security Banner ......................................................................................................................... 203
Chapter 10 Maintenance 205
Maintenance Features (Local/Remote Console) ....................................................................... 205
Audit Log .................................................................................................................................... 206
Device Information ..................................................................................................................... 207
Backup and Restore .................................................................................................................. 208
USB Profile Management .......................................................................................................... 210
Handling Conflicts in Profile Names ................................................................................ 211
Upgrading CIMs ......................................................................................................................... 212
Upgrading Firmware .................................................................................................................. 212
Upgrade History ......................................................................................................................... 215
Rebooting ................................................................................................................................... 215
CC Unmanage ........................................................................................................................... 216
Stopping CC-SG Management ........................................................................................ 217
Chapter 11 Diagnostics 219
Network Interface Page ............................................................................................................. 220
Network Statistics Page ............................................................................................................. 220
Ping Host Page .......................................................................................................................... 222
Trace Route to Host Page ......................................................................................................... 223
Device Diagnostics .................................................................................................................... 224
Chapter 12 Command Line Interface (CLI) 226
Overview .................................................................................................................................... 227
Accessing the KSX II Using CLI ................................................................................................ 228
SSH Connection to the KSX II ................................................................................................... 228
SSH Access from a Windows PC .................................................................................... 228
SSH Access from a UNIX/Linux Workstation .................................................................. 228
Telnet Connection to the KSX II ................................................................................................ 229
Enabling Telnet ................................................................................................................ 229
Accessing Telnet from a Windows PC ............................................................................ 229
Local Serial Port Connection to the KSX II ................................................................................ 229
Port Settings .................................................................................................................... 230
Logging On ................................................................................................................................ 230
Navigation of the CLI ................................................................................................................. 232
Completion of Commands ............................................................................................... 232
CLI Syntax -Tips and Shortcuts ....................................................................................... 233
Common Commands for All Command Line Interface Levels ........................................ 233
Initial Configuration Using CLI ................................................................................................... 234
Setting Parameters .......................................................................................................... 234
Setting Network Parameters ............................................................................................ 234
CLI Prompts ............................................................................................................................... 235
CLI Commands .......................................................................................................................... 235
Security Issues ................................................................................................................ 236
Contents
vii
Target Connections and the CLI ................................................................................................ 236
Setting Emulation on a Target ......................................................................................... 236
Port Sharing Using CLI .................................................................................................... 237
Administering the KSX II Console Server Configuration Commands ........................................ 237
Configuring Network .................................................................................................................. 237
Interface Command ......................................................................................................... 238
Name Command ........................................................................................................... 238
Connect Commands ........................................................................................................ 239
IPv6 Command ................................................................................................................ 240
Chapter 13 KSX II Local Console 241
Overview .................................................................................................................................... 241
Using the KSX II Local Console ................................................................................................. 241
Simultaneous Users ........................................................................................................ 241
KSX II Local Console Interface .................................................................................................. 242
Security and Authentication ....................................................................................................... 242
Local Console Smart Card Access ............................................................................................ 243
Local Console USB Profile Options ........................................................................................... 244
Available Resolutions................................................................................................................. 245
Port Access Page (Local Console Server Display) ................................................................... 246
Server Display ............................................................................................................................ 247
Hot Keys and Connect Keys ...................................................................................................... 248
Connect Key Examples ................................................................................................... 248
Supported Keyboard Languages ............................................................................................... 249
Special Sun Key Combinations ................................................................................................. 250
Accessing a Target Server ........................................................................................................ 251
Returning to the KSX II Local Console Interface ....................................................................... 251
Local Port Administration ........................................................................................................... 252
KSX II Local Console Local Port Settings ....................................................................... 252
KSX II Local Console Factory Reset ............................................................................... 255
Contents
viii
Resetting the KSX II Using the Reset Button ............................................................................ 256
Chapter 14 Modem Configuration 257
Certified Modems for UNIX, Linux and MPC ............................................................................. 257
Low Bandwidth KVM Settings .................................................................................................... 258
Client Dial-Up Networking Configuration ................................................................................... 259
Windows 2000 Dial-Up Networking Configuration ..................................................................... 259
Windows Vista Dial-Up Networking Configuration ..................................................................... 263
Windows XP Dial-Up Networking Configuration ........................................................................ 264
Appendix A Specifications 270
Physical Specifications .............................................................................................................. 270
Supported Operating Systems (Clients) .................................................................................... 271
Supported Operating Systems and CIMs (KVM Target Servers) .............................................. 272
Supported Browsers .................................................................................................................. 275
Computer Interface Modules (CIMs) .......................................................................................... 275
Supported Paragon CIMS and Configurations .......................................................................... 276
KSX II to KSX II Guidelines ............................................................................................. 277
KSX II to Paragon II Guidelines ....................................................................................... 278
Supported Video Resolutions .................................................................................................... 280
KSX II Local Console Support Languages ................................................................................ 281
TCP and UDP Ports Used ......................................................................................................... 281
Smart Card Readers .................................................................................................................. 283
Supported and Unsupported Smart Card Readers ......................................................... 283
Minimum System Requirements ...................................................................................... 284
Environmental Requirements .................................................................................................... 286
Emergency Connectivity ............................................................................................................ 286
Electrical Specifications ............................................................................................................. 287
Remote Connection ................................................................................................................... 287
KVM Properties .......................................................................................................................... 287
Ports Used ................................................................................................................................. 287
Target Server Connection Distance and Video Resolution ....................................................... 289
Distances for Serial Devices ...................................................................................................... 289
Network Speed Settings ............................................................................................................ 290
Connectivity ............................................................................................................................... 291
KSX II Serial RJ-45 Pinouts ....................................................................................................... 292
DB9F Nulling Serial Adapter Pinouts .............................................................................. 292
DB9M Nulling Serial Adapter Pinouts .............................................................................. 293
DB25F Nulling Serial Adapter Pinouts ............................................................................ 293
DB25M Nulling Serial Adapter Pinouts ............................................................................ 294
Appendix B Updating the LDAP/LDAPS Schema 295
Returning User Group Information ............................................................................................. 295
From LDAP/LDAPS ......................................................................................................... 295
From Microsoft Active Directory ...................................................................................... 295
Contents
ix
Setting the Registry to Permit Write Operations to the Schema ............................................... 296
Creating a New Attribute ............................................................................................................ 296
Adding Attributes to the Class ................................................................................................... 297
Updating the Schema Cache ..................................................................................................... 299
Editing rciusergroup Attributes for User Members ..................................................................... 299
Appendix C Informational Notes 303
Overview .................................................................................................................................... 303
Java ........................................................................................................................................... 303
AES 256 Prerequisites and Supported Configurations for Java ..................................... 303
Java Runtime Environment (JRE) ................................................................................... 304
IPv6 Support Notes .................................................................................................................... 305
Keyboards .................................................................................................................................. 306
Non-US Keyboards .......................................................................................................... 306
Macintosh Keyboard ........................................................................................................ 309
Dell Chassis Cable Lengths and Video Resolutions ................................................................. 309
Fedora ........................................................................................................................................ 310
Resolving Fedora Core Focus ......................................................................................... 310
Mouse Pointer Synchronization (Fedora) ........................................................................ 310
VKC and MPC Smart Card Connections to Fedora Servers ........................................... 310
Resolving Issues with Firefox Freezing when Using Fedora .......................................... 310
USB Ports and Profiles .............................................................................................................. 311
VM-CIMs and DL360 USB Ports ..................................................................................... 311
Help for Choosing USB Profiles ...................................................................................... 311
Changing a USB Profile when Using a Smart Card Reader ........................................... 313
SUSE/VESA Video Modes ........................................................................................................ 313
CIMs ........................................................................................................................................... 313
Windows 3-Button Mouse on Linux Targets .................................................................... 313
Virtual Media .............................................................................................................................. 314
Dell OptiPlex and Dimension Computers ........................................................................ 314
Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB ................. 314
Virtual Media Not Refreshed After Files Added ............................................................... 314
Target BIOS Boot Time with Virtual Media ...................................................................... 314
Virtual Media Connection Failures Using High Speed for Virtual Media Connections .... 314
CC-SG ....................................................................................................................................... 315
Virtual KVM Client Version Not Known from CC-SG Proxy Mode .................................. 315
Single Mouse Mode - Connecting to a KSX II Target Under CC-SG Control Via VKC
Using Firefox .................................................................................................................... 315
Moving Between Ports of the KSX II ............................................................................... 315
Contents
x
Appendix D FAQs 316
General Questions ..................................................................................................................... 316
Serial Access ............................................................................................................................. 318
Universal Virtual Media .............................................................................................................. 323
USB Profiles ............................................................................................................................... 324
IPv6 Networking ......................................................................................................................... 326
Remote Access .......................................................................................................................... 327
Ethernet and IP Networking ....................................................................................................... 329
Servers ....................................................................................................................................... 333
Blade Servers ............................................................................................................................ 334
Installation .................................................................................................................................. 336
Local Port ................................................................................................................................... 338
Power Control ............................................................................................................................ 340
Scalability ................................................................................................................................... 341
Security ...................................................................................................................................... 342
Smart Cards and CAC Authentication ....................................................................................... 344
Managability ............................................................................................................................... 345
Miscellaneous ............................................................................................................................ 346
Index 347
1
In This Chapter
KSX II Overview ........................................................................................ 2
KSX II Help ................................................................................................ 4
KSX II Client Applications .......................................................................... 4
Virtual Media .............................................................................................. 5
Product Features ....................................................................................... 5
External Product Overview ........................................................................ 7
Terminology ............................................................................................... 9
Package Contents ................................................................................... 11
Chapter 1
Introduction
Chapter 1: Introduction
2
KSX II Overview
Raritan's Dominion KSX II is an enterprise-class, secure digital device that provides a single integrated solution for remote KVM (keyboard, video, mouse) server access and serial device management, as well as power control from anywhere in the world from a web browser. At the rack, the KSX II provides control of all KVM server and serial targets from a single keyboard, monitor, and mouse. Total access and control of all serial targets is also available from a single local serial port. The integrated remote access capabilities of the KSX II provide full access and control of your servers from a web browser.
KSX II is easily installed using standard UTP (Cat 5/5e/6) cabling. Its advanced features include virtual media, up to 256-bit encryption, remote power control, dual Ethernet, LDAP, RADIUS, Active Directory®, Syslog integration, and web management. These features enable you to deliver higher uptime, better productivity, and bulletproof security - any time from anywhere.
KSX II products can operate as standalone devices and do not rely on a central management device. For larger data centers and enterprises, multiple KSX II devices can be integrated into a single logical solution with other Raritan devices using Raritan's CommandCenter Secure Gateway (CC-SG) management unit.
Chapter 1: Introduction
3
Diagram key
Cat5 cable
Remote virtual media USB drive(s)
Computer Interface Module (CIM)
Rack PDU (power strip)
KSX II
Local access
Remote KVM and serial devices
IP LAN/WAN
Modem access
PSTN
Remote (network) access
Chapter 1: Introduction
4
KSX II Help
The KSX II help provides information on how to install, set up, and configure the KSX II. It also includes information on accessing target servers and power strips, using virtual media, managing users and security, and maintaining and diagnosing the KSX II.
A PDF version of the help can be downloaded from the Raritan
Firmware and Documentation page http://www.raritan.com/support/firmware-and-documentation/ on the
Raritan website. Raritan recommends that you refer to the Raritan website for the most up-to-date user guides available.
To use online help, Active Content must be enabled in your browser. If you are using Internet Explorer 7, you must enable Scriplets. Consult your browser help for information on enabling these features.
Related Documentation
The KSX II help is accompanied by a KSX II Device Quick Setup Guide, which can be found on the Raritan Firmware and Documentation page
http://www.raritan.com/support/firmware-and-documentation/ of
Raritan's website. Installation requirements and instructions for client applications used with
the KSX II can be found in the KVM and Serial Access Clients Guide, also found on the Raritan website. Where applicable, specific client functions used with the KSX II are included in the help.
KSX II Client Applications
The following client applications can be used with the KSX II:
Virtual KVM Client (VKC) Active KVM Client (AKC) Multiplatform Client (MPC) Raritan Serial Console (RSC)
See the KVM and Serial Client Guide for additional information on the client applications. Also see the Working with Target Servers (on page
36) section of this guide, which contains information on using the clients with the KSX II.
Note: MPC and VKC require the Java™ Runtime Environment (JRE™). AKC is .NET based.
Chapter 1: Introduction
5
Virtual Media
Product Features
All KSX II models support virtual media. The benefits of virtual media ­mounting of remote drives/media on the target server to support software installation and diagnostics - are now available in all of the KSX II models. Virtual media sessions can be secured by using 128-bit and 256-bit AES or RC4 encryption.
Each KSX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD, DVD, USB, internal and remote drives, and images. Unlike other solutions, the KSX II supports virtual media access of hard drives and remotely mounted images for added flexibility and productivity.
The new D2CIM-VUSB and D2CIM-DVUSB CIMs (computer interface module) support virtual media sessions to KVM target servers supporting the USB 2.0 interface. This new CIM also supports Absolute Mouse Synchronization as well as remote firmware updates.
Note: The black connector on the DVUSB CIM is used for keyboard and mouse. The gray connector is used for virtual media. Keep both plugs of the CIM connected to the device. The device may not operate properly if both plugs are not connected to the target server.
Hardware
KVM and serial remote access over IP 1U rack-mountable; brackets included DKSX2-144 - 4 serial/4 KVM server ports DKSX2-188 - 8 serial/8 KVM server ports 1 KVM channel shareable by 8 users, multiple serial users. UTP (Cat5/5e/6) server cabling Dual Ethernet ports (10/100/1000 LAN) with failover Field upgradeable Local KVM port for in-rack access
One front and three back panel USB 2.0 ports for supported USB
devices
Fully concurrent with remote user access Local Graphical User Interface (GUI) for administration Both KVM and serial targets can be connected using KVM local
port
Chapter 1: Introduction
6
Local serial port (RS232) for CLI-based administration and serial
target access
Integrated power control Dual dedicated power control ports LED indicators for network activity, and remote KVM user status Hardware reset button Internal modem Centralized access security
Software
Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs Absolute Mouse Synchronization with D2CIM-VUSB CIM and
D2CIM-DVUSB CIMs
Plug-and-Play Web-based access and management Intuitive Graphical User Interface (GUI) 256-bit encryption of complete KVM signal, including video and
virtual media
LDAP/LDAPS, Active Directory®, RADIUS, or internal with local
authentication and authorization
DHCP or fixed IP addressing Smart card/CAC authentication SNMP and Syslog management IPv4 and IPv6 support Power control associated directly with servers to prevent mistakes Integration with Raritan's CommandCenter Secure Gateway
(CC-SG) management unit
CC Unmanage feature to remove the device from CC-SG control
Chapter 1: Introduction
7
External Product Overview
Item
Description
USB port
Remote indicator light
LAN1 and LAN2 indicator lights
Power indicator light
The following diagram indicates the external components of the KSX II. Note that the KSX II 144 will have 4 KVM ports and 4 serial ports as compared to the KSX II 188 used in the diagram, which has 8 KVM ports and 8 serial ports.
Chapter 1: Introduction
8
Item
Description
AC power cord plug See Power Control (on page 158) for additional
information.
Power on/off switch
LAN 3 port
Note: The LAN 3 port is reserved for future use.
LAN1 and LAN2 ports See Step 3: Connect the Equipment for additional
information.
Admin port See Step 3: Connect the Equipment for additional
information.
External modem port See Modem Configuration (on page 257) for additional
information.
Reset button See Resetting the KSX II Using the Reset Button (on
page 256) for additional information.
Local port See Step 3: Connect the Equipment for additional
information.
KVM ports See Step 3: Connect the Equipment for additional
information.
Power Ctrl. 1 and Power Ctrl. 2 See Power Control (on page 158) for additional
information.
Serial ports See Step 3: Connect the Equipment for additional
information.
Chapter 1: Introduction
9
Terminology
This manual uses the following terminology for the components of a typical KSX II configuration:
Chapter 1: Introduction
10
Diagram key
TCP/IP
IPv4 and/or IPv6
KVM (Keyboard, Video, Mouse)
UTP Cable (Cat5/5e/6)
KSX II
Local Access Console
Local User - an optional user console (consisting of a keyboard, mouse, and multi-sync VGA monitor) attached directly to the KSX II to control KVM target servers and serial targets locally (directly at the rack, not through the network). A USB smart card reader can also be attached at the Local port to mount onto a target server.
Local Administrator - use the Local Administrator port to connect the KSX II directly to a workstation to manage your serial targets and configure the system with a terminal emulation program such as HyperTerminal. The Local Administrator port requires the use of a standard null modem cable.
Remote PC Networked computers used to access and control KVM target
servers and serial targets connected to the KSX II. Refer to Supported Operating Systems (Clients) for a list of the Operating Systems supported by the KSX II remotely.
CIMs Dongles that connect to each target server. Available for all of
the supported Operating Systems. Refer to Supported CIMs for information about the CIMs supported by the KSX II.
Serial Adapter Adapters that connect serial cables.
Target Servers KVM Target Servers - servers with video cards and user
interfaces (for example, Windows®, Linux®, Solaris™, and so forth) connected remotely via the KSX II. Refer to Supported Operating Systems and CIMs (Target Servers) for a list of the supported Operating Systems and CIMs.
Serial Targets - Servers, routers, and switches that have a
Chapter 1: Introduction
11
Diagram key
serial port connected remotely via KSX II.
Routers
Dominion PX Rack PDU (Power Strip)
Raritan rack PDUs accessed remotely via the KSX II.
Package Contents
Amount included
Item
1
Dominion KSX II device 1
Dominion KSX II Quick Setup Guide
1
Rackmount Kit
1
AC Power Cord
1
Cat5 Network Cable
1
Cat5 Network Crossover Cable
1
Set of 4 Rubber Feet (for desktop use)
1
Application Note
1
Warranty Card
1
Phone Line Cable
1
Loopback Adapter
Each KSX II ships as a fully-configured stand-alone product in a standard 1U 19" rackmount chassis. Each KSX II device ships with the following contents:
12
In This Chapter
Overview .................................................................................................. 12
Default Login Information ........................................................................ 12
Getting Started ........................................................................................ 13
Default
Value
User name
The default user name is admin. This user has administrative privileges.
Password
The default password is raritan. Passwords are case sensitive and must be entered in the
exact case combination in which they were created. For example, the default password raritan must be entered entirely in lowercase letters.
The first time you start the KSX II, you are required to change the default password.
IP address
The KSX II ships with the default IP address of
192.168.0.192.
Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location.
Chapter 2
Installation and Configuration
Overview
This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter.
To install and configure the KSX II:
Step 1: Configure KVM Target Servers (on page 13) Step 2: Configure Network Firewall Settings (on page 22) Step 3: Connect the Equipment (on page 22) Step 4: Configure the KSX II (on page 28) Step 5 (Optional): Configure Keyboard Language (on page 35)
You will need to know the default IP address, username, and password for initial configuration. See Default Login Information (on page 12).
Default Login Information
Chapter 2: Installation and Configuration
13
Getting Started
Step 1: Configure KVM Target Servers
KVM target servers are the computers that will be accessed and controlled via the KSX II. Before installing the KSX II, configure all KVM target servers to ensure optimum performance. This configuration applies only to KVM target servers, not to the client workstations (remote PCs) used to access the KSX II remotely. See Terminology for additional information.
Desktop Background
For optimal bandwidth efficiency and video performance, KVM target servers running graphical user interfaces such as Windows®, Linux®, X-Windows, Solaris™, and KDE require configuration. The desktop background need not be completely solid but desktop backgrounds featuring photos or complex gradients might degrade performance.
Mouse Settings
The KSX II operates in several mouse modes:
Absolute Mouse Mode™ (D2CIM-VUSB only)  Intelligent Mouse Mode (do not use an animated mouse) Standard Mouse Mode
Mouse parameters do not have to be altered for Absolute Mouse Synchronization but D2CIM-VUSB or D2CIM-DVUSB is required for this mode. For both the Standard and Intelligent mouse modes, mouse parameters must be set to specific values, which are described here. Mouse configurations will vary on different target operating systems. Consult your OS documentation for additional detail.
Intelligent mouse mode generally works well on most Windows platforms. Intelligent mouse mode may produce unpredictable results when active desktop is set on the target. For additional information on Intelligent mouse mode settings, see Intelligent Mouse Mode (on page
71). Servers with internal KVM switches inside the blade chassis typically do
not support absolute mouse technology.
Chapter 2: Installation and Configuration
14
Operating System Mouse and Video Settings
This section provides video mode and mouse information specific to the operating system in use on the target server.
Windows XP, Windows 2003 and Windows 2008 Settings
To configure KVM target servers running Windows XP®,
Windows 2003® and Windows 2008®:
1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab. c. In the Motion group:
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhance pointer precision" option. Disable the Snap To option. Click OK.
2. Disable transition effects: a. Select the Display option from the Control Panel. b. Click the Appearance tab.
Click the Effects button. Deselect the "Use the following transition effect for menus
and tooltips" option.
3. Click OK and close the Control Panel.
Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KSX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the KSX II connection.
Windows XP, 2000, and 2008 login pages revert to preset mouse parameters that differ from those suggested for optimal KSX II performance. As a result, mouse synchronization may not be optimal for these screens.
WARNING! Proceed only if you are comfortable adjusting the registry on Windows KVM target servers. You can obtain better KSX II mouse synchronization at the login pages by using the Windows registry editor to change the following settings: HKey_USERS\.DEFAULT\Control Panel\Mouse: > MouseSpeed = 0;MouseThreshold 1=0;MouseThreshold 2=0.
Chapter 2: Installation and Configuration
15
Windows Vista Settings
To configure KVM target servers running Windows Vista®
operating system:
1. Configure the mouse settings: a. Choose Start > Settings > Control Panel > Mouse. b. Select "Advanced system settings" from the left navigation panel.
The System Properties dialog opens. c. Click the Pointer Options tab. d. In the Motion group:
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhanced pointer precision" option.
Click OK.
2. Disable animation and fade effects: a. Select the System option from the Control Panel. b. Select Performance Information then Tools > Advanced Tools >
Adjust to adjust the appearance and performance of Windows. c. Click the Advanced tab. d. Click the Settings button in the Performance group to open the
Performance Options dialog. e. Under Custom options, deselect the following checkboxes:
Animation options:
Animate controls and elements inside windows
Animate windows when minimizing and maximizing Fade options:
Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
3. Click OK and Close the Control Panel.
To configure KVM target servers running Windows 7® operating
system:
1. Configure the mouse settings: a. Choose Start > Control Panel > Hardware and Sound > Mouse. b. Click the Pointer Options tab. c. In the Motion group:
Chapter 2: Installation and Configuration
16
Set the mouse motion speed setting to exactly the middle
speed.
Disable the "Enhanced pointer precision" option. Click OK.
2. Disable animation and fade effects: a. Select Control Panel > System and Security. b. Select System and then select "Advanced system settings" from
the left navigation panel. The System Properties dialog appears. c. Click the Advanced tab. d. Click the Settings button in the Performance group to open the
Performance Options dialog. e. Under Custom options, deselect the following checkboxes:
Animation options:
Animate controls and elements inside windows
Animate windows when minimizing and maximizing Fade options:
Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
3. Click OK and Close the Control Panel.
Windows 2000 Settings
To configure KVM target servers running Microsoft Windows
2000® operating system:
1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Motion tab.
Set the acceleration to None. Set the mouse motion speed setting to exactly the middle
speed.
Click OK.
2. Disable transition effects: a. Select the Display option from the Control Panel. b. Click the Effects tab.
Chapter 2: Installation and Configuration
17
Deselect the "Use the following transition effect for menus
and tooltips" option.
3. Click OK and close the Control Panel.
Linux Settings (Red Hat 4)
Note: The following settings are optimized for Standard Mouse mode only.
To configure KVM target servers running Linux® (graphical user
interface):
1. Configure the mouse settings: a. Red Hat 5 users, choose Main Menu > Preferences > Mouse.
Red Hat 4 users, choose System > Preferences > Mouse. The
Mouse Preferences dialog appears. b. Click on the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact
center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. f. Close the Mouse Preferences dialog.
Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions.
2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display. The Display
Settings dialog appears. b. On the Settings tab, select a Resolution supported by the KSX II. c. Click OK.
Note: Once connected to the target server, in many Linux graphical environments, the <Ctrl> <Alt> <+> command will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, depending on your X server distribution
Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
Chapter 2: Installation and Configuration
18
SUSE Linux 10.1 Settings
Note: Do not attempt to synchronize the mouse at the SUSE Linux® login prompt. You must be connected to the target server to synchronize the mouse cursors.
To configure the mouse settings:
1. Choose Desktop > Control Center. The Desktop Preferences dialog appears.
2. Click Mouse. The Mouse Preferences dialog appears.
3. Open the Motion tab.
4. Within the Speed group, set the Acceleration slider to the exact center position.
5. Within the Speed group, set the Sensitivity slider to low.
6. Within the Drag & Drop group, set the Threshold slider to small.
7. Click Close.
To configure the video:
1. Choose Desktop Preferences > Graphics Card and Monitor. The Card and Monitor Properties dialog appears.
2. Verify that a Resolution and Refresh Rate is in use that is supported by the KSX II. See Supported Video Resolutions (on page 280) for more information.
Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
Make Linux Settings Permanent
Note: These steps may vary slightly depending on the specific version of Linux® in use.
To make your settings permanent in Linux (prompt):
1. Choose System Menu > Preferences > Personal > Sessions.
2. Click the Session Options tab.
3. Select the "Prompt on log off" checkbox and click OK. This option prompts you to save your current session when you log out.
4. Upon logging out, select the "Save current setup" option from the dialog.
5. Click OK.
Chapter 2: Installation and Configuration
19
Tip: If you do not want to be prompted upon log out, follow these
Display resolution
Vertical refresh rate
Aspect ratio
1600 x 1200
60 Hz
4:3
procedures instead.
To make your settings permanent in Linux (no prompt):
1. Choose Desktop > Control Center > System > Sessions.
2. Click the Session Options tab.
3. Deselect the "Prompt on the log off" checkbox.
4. Select the "Automatically save changes to the session" checkbox and click OK. This option automatically saves your current session when you log out.
Make UNIX Settings Permanent
Note: These steps may vary slightly depending on the type of UNIX® (for example, Solaris™, IBM® AIX™) and the specific version in use.
1. Choose Style Manager > Startup. The Style Manager - Startup dialog appears.
2. On the Logout Confirmation dialog, select the On option. This option prompts you to save your current session when you log out.
Sun Solaris Settings
To configure KVM target servers running Sun™ Solaris™:
1. Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. This can be performed from:
The graphical user interface.
The command line xset mouse a t where a is the acceleration
and t is the threshold.
2. All KVM target servers must be configured to one of the display resolutions supported by the KSX II. The most popular supported resolutions for Sun machines are:
Chapter 2: Installation and Configuration
20
Display resolution
Vertical refresh rate
Aspect ratio
1280 x 1024
60,75,85 Hz
5:4
1152 x 864
75 Hz
4:3
1024 x 768
60,70,75,85 Hz
4:3
800 x 600
56,60,72,75,85 Hz
4:3
720 x 400
85 Hz
9:5
640 x 480
60,72,75,85 Hz
4:3
3. KVM target servers running the Solaris operating system must output
If you have:
Use this video output adapter:
Sun 13W3 with composite sync output
APSSUN II Guardian converter
Sun HD15 with composite sync output
1396C converter to convert from HD15 to 13W3 and an APSSUN II Guardian converter to support composite sync
Sun HD15 with separate sync output
APKMSUN Guardian converter
VGA video (H-and-V sync, not composite sync).
To change your Sun video card output from composite sync to
the nondefault VGA output:
1. Issue the Stop+A command to drop to bootprom mode.
2. Issue the following command to change the output resolution: setenv output-device screen:r1024x768x70
3. Issue the boot command to reboot the server.
You can also contact your Raritan representative to purchase a video output adapter:
Note: Some of the standard Sun background screens may not center precisely on certain Sun servers with dark borders. Use another background or place a light colored icon in the upper left hand corner.
Mouse Settings
To configure the mouse settings (Sun Solaris 10.1):
1. Choose Launcher. Application Manager - Desktop Controls opens.
2. Choose Mouse Style Manager. The Style Manager - Mouse dialog appears.
3. Set the Acceleration slider to 1.0.
Loading...
+ 332 hidden pages