Copyright © 2012 Raritan, Inc. KX2101V2-v3.5.0-D-E September 2012 255-62-3059-00 Dominion KX II-101-V2 User Guide Release 3.5.0
Chapter 1: Introduction 2 KX II-101-V2 Overview Thank you for purchasing the Dominion KX II-101-V2. The KX II-101-V2 provides a single keyboard, v
Chapter 5: User Management 92 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management >
Chapter 5: User Management 93 Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is
Chapter 5: User Management 94 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking pro
Chapter 5: User Management 95 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searc
Chapter 5: User Management 96 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used t
Chapter 5: User Management 97 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only us
Chapter 5: User Management 98 17. The KX II-101-V2 provides you with the ability to test the LDAP configuration from the Authentication Settings p
Chapter 5: User Management 99 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On yo
Chapter 5: User Management 100 The timeout is the length of time the KX II-101-V2 waits for a response from the RADIUS server before sending anoth
Chapter 5: User Management 101 CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than P
Chapter 1: Introduction 3 Diagram key KX II-101-V2 LAN Windows®, Linux® and Sun™ servers TCP/IP LAN Remote (network) access Mobile access
Chapter 5: User Management 102 RADIUS Communication Exchange Specifications The KX II-101-V2 sends the following RADIUS attributes to your RADIUS
Chapter 5: User Management 103 User Authentication Process When the device is configured to authenticate and authorize local users, the order in
Chapter 5: User Management 104 Remote authentication follows the process specified in the flowchart below:
Chapter 5: User Management 105 Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Passwor
106 In This Chapter Network Settings ... 106 Device Services ...
Chapter 6: Device Management 107 Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For c
Chapter 6: Device Management 108 e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discover
Chapter 6: Device Management 109 See LAN Interface Settings (on page 110) for information in configuring this section of the Network Settings pag
Chapter 6: Device Management 110 LAN Interface Settings The current parameter settings are identified in the Current LAN interface parameters fiel
Chapter 6: Device Management 111 Device Services The Device Services page allows you to configure the following functions: Enable SSH access
Chapter 1: Introduction 4 What's New in the Help The following information has been added based on enhancements and changes to the equipment
Chapter 6: Device Management 112 HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX II-101-V2. For exam
Chapter 6: Device Management 113 2. Select Enable Direct Port Access via URL if you would like users to have direct access to a target via the D
Chapter 6: Device Management 114 c. Authentication Protocol - the MD5 or SHA authentication protocol used by the SNMP v3 agent d. Authentication
Chapter 6: Device Management 115 Keyboard/Mouse Setup Use the Keyboard/Mouse Setup page to configure the Keyboard and Mouse interface between the
Chapter 6: Device Management 116 Admin Port To configure the admin serial port: 1. Choose Device Settings > Serial Port. The Serial Port Set
Chapter 6: Device Management 117 Modem server IP address - The address the user types to access the KX II-101-V2 web interface once connected
Chapter 6: Device Management 118 User Specified Time - Choose this option to input the date and time manually. For the User Specified Time opti
Chapter 6: Device Management 119 2. Select SNMP Logging Enabled to enable to remaining checkboxes. Required 3. Select either or both SNMP v1/v2
Chapter 6: Device Management 120 Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Man
Chapter 6: Device Management 121 Note: If you disable SNMP settings at any time, the SNMP information is retained so you do not have to reenter i
Chapter 1: Introduction 5 Product Photos KX II-101-V2 Product Features Interfaces Integrated PS/2 KVM connection USB connection for cont
Chapter 6: Device Management 122 Trap Name Description deviceUpgradeStarted The KX II-101-V2 has begun update via an RFP file. factoryReset The de
Chapter 6: Device Management 123 Trap Name Description securityBannerChanged A change has been made to the security banner. securityViolation Se
Chapter 6: Device Management 124 Viewing the KX II-101-V2 MIB To view the KX II-101-V2 MIB: 1. Choose Device Settings > Event Management - S
Chapter 6: Device Management 125 Note: IPv6 addresses cannot exceed 80 characters in length for the host name. Use the reset to factory defaults
Chapter 6: Device Management 126 Port Configuration The Port Configuration page displays a list of the KX II-101-V2 ports. Ports connected to KVM
Chapter 6: Device Management 127 Managing KVM Target Servers (Port Page) This Port page opens when you select a port from the Port Configuration
Chapter 6: Device Management 128 Valid Special Characters Character Description Character Description ! Exclamation point ; Semi-colon " Doub
Chapter 6: Device Management 129 Connecting the Power Strip Diagram key KX II-101-V2 Raritan power strip. DKX2-101-V2-PDU (DB9-RJ45 adapter)
Chapter 6: Device Management 130 5. Power ON the Raritan power strip. 6. Click to Device Settings > Serial Port to open the Serial Port page.
Chapter 6: Device Management 131 To cancel without saving changes: Click Cancel. Managing Power Associations To make power associations
Chapter 1: Introduction 6 System Management Features Firmware upgradable over Ethernet Failsafe firmware upgrade capability Clock that ca
Chapter 6: Device Management 132 2. For that power strip, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet
Chapter 6: Device Management 133 Analog KVM Switch You can configure a Raritan analog KVM switch to work with the KX II-101-V2. The KX II-101-V2
Chapter 6: Device Management 134 8. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults: Click Reset to Defau
Chapter 6: Device Management 135 Note: If the KX II-101-V2 is set to restore to the factory defaults upon reset, the IP address, user name, and o
136 In This Chapter Overview ... 137 USB Connection Se
Chapter 7: Managing USB Connections 137 Overview To broaden the KX II-101-V2's compatibility with different KVM target servers, Raritan prov
Chapter 7: Managing USB Connections 138 2. Click USB Connection Settings to expand the USB Connection Settings section. 3. Select the USB connec
Chapter 7: Managing USB Connections 139 3. Click the User Defined KX II-101 USB Profile Configuration Table link to access the recommended confi
140 In This Chapter Security Settings ... 140 Configuring IP Acces
Chapter 8: Security Management 141 Limitation Description This field is enabled and required when the Enable Password Aging checkbox is selected.
Chapter 1: Introduction 7 User Features Web-based access through common browsers Intuitive graphical user interface (GUI) PC Share mode,
Chapter 8: Security Management 142 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor
Chapter 8: Security Management 143 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s
Chapter 8: Security Management 144 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e
Chapter 8: Security Management 145 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,
Chapter 8: Security Management 146 Encryption mode Description for more information. AES-256 The Advanced Encryption Standard (AES) is a National
Chapter 8: Security Management 147 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware
Chapter 8: Security Management 148 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desira
Chapter 8: Security Management 149 Set the Encryption & Share to Auto on the Security Settings page. See Encryption & Share. Microsoft
Chapter 8: Security Management 150 Drop - IP addresses are denied access to the KX II-101-V2 device. To add (append) rules: 1. Type the IP a
Chapter 8: Security Management 151 3. You are prompted to confirm the deletion. Click OK. To allow access to only one IP address and block all
Chapter 1: Introduction 8 Term Description Virtual media Enables a KVM target server to remotely access media from client PC and network file serv
Chapter 8: Security Management 152 SSL Certificates The KX II-101-V2 uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic
Chapter 8: Security Management 153 f. Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g.
Chapter 8: Security Management 154 i. Reboot the KX II-101-V2 to send the saved CSR to a CA for SSL certificate. To download a CSR certificate
Chapter 8: Security Management 155 Security Banner KX II-101-V2 provides you with the ability to add a security banner to the KX II-101-V2 login
156 In This Chapter Audit Log... 156 Device Informatio
Chapter 9: Maintenance 157 Device Information The Device Information page provides detailed information about your KX II-101-V2 device. This info
Chapter 9: Maintenance 158 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX
Chapter 9: Maintenance 159 2. To do this: a. Save the backup file. The backup file is saved locally on your client machine with the name and lo
Chapter 9: Maintenance 160 Upgrading Firmware Use the Firmware Upgrade page to upgrade the firmware for your KX II-101-V2. Important: Do not turn
Chapter 9: Maintenance 161 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upg
9 In This Chapter Overview ... 9 Default Login Inf
Chapter 9: Maintenance 162 Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defaults. Note
Chapter 9: Maintenance 163 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. Stopping CC-SG Manag
Chapter 9: Maintenance 164 2. Click Yes to begin the processing of removing the device from CC-SG management. A confirmation message will then di
165 The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the KX II-101-V2 device. All of the Diag
Chapter 10: Diagnostics 166 Statistics - Produces a page similar to the one displayed here. Interfaces - Produces a page similar to the one
Chapter 10: Diagnostics 167 Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display
Chapter 10: Diagnostics 168 Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP n
Chapter 10: Diagnostics 169 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace ro
Chapter 10: Diagnostics 170 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical
Chapter 10: Diagnostics 171 a. Click Save to File. The File Download dialog appears. b. Click Save. The Save As dialog appears. c. Navigate t
Chapter 2: Installation and Configuration 10 Getting Started KX II-101-V2 users with Microsoft® Internet Explorer® version 6 or Windows 2000® m
172 In This Chapter Overview ... 172 Accessing the KX
Chapter 11: Command Line Interface (CLI) 173 Accessing the KX II-101-V2 Using the CLI Access the KX II-101-V2 using one of the following methods:
Chapter 11: Command Line Interface (CLI) 174 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX®/Linux® workstation and
Chapter 11: Command Line Interface (CLI) 175 Completion of Commands The CLI supports the completion of partially-entered commands. After entering
Chapter 11: Command Line Interface (CLI) 176 Command Description help Display an overview of the CLI syntax. quit Places the user back one level.
Chapter 11: Command Line Interface (CLI) 177 Diagnostics The Diagnostics menu enables you to set the logging options for different modules of the
Chapter 11: Command Line Interface (CLI) 178 Command Option Description verbose [on|off] Turns verbose logging on and off. Setlog Command Example
Chapter 11: Command Line Interface (CLI) 179 Command Option Description ipauto Static or dynamic IP address ip ipaddress IP address of the KX II-
Chapter 11: Command Line Interface (CLI) 180 Listports Command The Listports command lists the number of active users, user names, port, and statu
181 In This Chapter Overview ... 181 Removing a KX II-
Chapter 2: Installation and Configuration 11 Resolutions 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz
Chapter 12: CC-SG Management 182 Removing a KX II-101-V2 from CC-SG Management Unless the KX II-101-V2 is released from CC-SG control, you cannot
Chapter 12: CC-SG Management 183 2. Click Yes. A message appears, confirming that the device is no longer under CC management. 3. Click OK. Th
184 In This Chapter Physical Specifications ... 184 Supported Operating Syst
Appendix A: Specifications 185 KX II-101-V2... Description Remote Connection: Network Protocols 1 Ethernet (RJ45) port with activity status indic
Appendix A: Specifications 186 Mode Operating system Browser 32-bit mode Firefox® 1.06 - 4 or later Windows Server 2003® Internet Explorer 6
Appendix A: Specifications 187 Certified Modems USRobotics® 56K 5686E ZOOM® v90 ZOOM v92 USRobotics Sportster® 56K USRobotic
Appendix A: Specifications 188 Resolutions 800x600 @75Hz 1360x768@60Hz 800x600 @85Hz 1366x768@60Hz 800x600 @90Hz 1368x768@60Hz 800x600 @100Hz 1400
Appendix A: Specifications 189 Language Regions Keyboard layout Korean South Korea Dubeolsik Hangul Japanese Japan JIS Keyboard French
Appendix A: Specifications 190 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 112
Appendix A: Specifications 191 Network Speed Settings KX II-101-V2 network speed setting Network switch port setting Auto 100/Full 100/Half 10
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, rep
Chapter 2: Installation and Configuration 12 To change the command line resolution: 1. Run the following command: # eeprom output-device=screen
Appendix A: Specifications 192 communication,” however, note that the KX II-101-V2 behavior deviates from expected behavior Note: For reliable net
193 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...
Appendix B: Updating the LDAP Schema 194 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to th
Appendix B: Updating the LDAP Schema 195 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create
Appendix B: Updating the LDAP Schema 196 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.
Appendix B: Updating the LDAP Schema 197 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object di
Appendix B: Updating the LDAP Schema 198 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window op
Appendix B: Updating the LDAP Schema 199 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properti
Appendix B: Updating the LDAP Schema 200 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes lis
201 The KX II-101-V2 device can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brack
Chapter 2: Installation and Configuration 13 Mouse Settings The KX II-101-V2 operates in several mouse modes: Absolute Mouse Synchronization™, In
Appendix C: Rack Mount 202 Diagram key Screws
203 In This Chapter Java Runtime Environment (JRE) ... 203 IPv6 Support Notes ...
Appendix D: Informational Notes 204 IPv6 Support Notes Operating System IPv6 Support Notes Java Java™ 1.6 supports IPv6 for the following: Sol
Appendix D: Informational Notes 205 Sun Blade Video, Keyboard, and Mouse Support Limitation Video If you are accessing a Sun™ Blade 100 with the
Appendix D: Informational Notes 206 HP UX RX 1600 Keyboard and Mouse Configuration If you are using an HP® UX RX 1600 running UNIX®, do the follow
207 In This Chapter General FAQs ... 207 IPv6 Networking ...
Appendix E: FAQs 208 Question Answer What new features are available in the latest release? With Release 3.5 (and above), the following features a
Appendix E: FAQs 209 Question Answer What if I have an external server with an IPv6 address that I want to use with my KX II-101-V2? The KX II-10
211 9 9 Pin Pinout • 192 A A Power • 23 Absolute Mouse Mode • 64 Accessing the KX II-101-V2 Using the CLI • 173 Adding a New User • 91, 92 Adding a
Chapter 2: Installation and Configuration 14 d. Deselect the "Use the following transition effect for menus and tooltips" option. e. C
Index 212 Disconnecting Users from Ports • 90, 91 Disconnecting Virtual Media • 79, 82 Discovering Raritan Devices on the KX II-101-V2 Subnet • 42
Index 213 Modifying an Existing User • 92 Modifying an Existing User Group • 88 Modifying and Removing Keyboard Macros • 54 Mounting • 7 Mounting
Index 214 Sun Blade Video, Keyboard, and Mouse Support Limitation • 205 Sun Solaris Settings • 19 Sun Video Resolution • 11 Supported Browsers • 1
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Pres
Chapter 2: Installation and Configuration 15 d. Click Settings in the Performance group to open the Performance Options dialog. e. Under Custom
Chapter 2: Installation and Configuration 16 Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after cli
Chapter 2: Installation and Configuration 17 Linux Settings (Red Hat 4 and 5, and Fedora 14) Note: The following settings are optimized for Stand
Chapter 2: Installation and Configuration 18 b. Using a text editor, disable all non-KX II-101-V2 supported resolutions. c. Disable the virtual
Chapter 2: Installation and Configuration 19 c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed gr
Chapter 2: Installation and Configuration 20 Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. A target server running
Chapter 2: Installation and Configuration 21 2. Click on Mouse Settings and set the Mouse Acceleration to 1.0 and Threshold to 3.0. Step 2: Con
iii Contents Chapter 1 Introduction 1 KX II-101-V2 Overview ...
Chapter 2: Installation and Configuration 22 Step 3: Connect the Equipment The KX II-101-V2 has the physical connections described in the diagram.
Chapter 2: Installation and Configuration 23 Diagram key Admin port Use to do one of the following: Configure and manage the device with a te
Chapter 2: Installation and Configuration 24 USB Configuration To configure the KX II-101-V2 for use with a USB target server: 1. Use the atta
Chapter 2: Installation and Configuration 25 Diagram key for USB Connection Video connection from the KX II-101-V2 to the target USB connection
Chapter 2: Installation and Configuration 26 Note: If you are using virtual media, you must use the USB connection. Diagram key for PS/2 connectio
Chapter 2: Installation and Configuration 27 E: Local User Port The Local User port serves as a pass-through to the target server video so that i
Chapter 2: Installation and Configuration 28 9. Click Apply. You will receive confirmation that the password was successfully changed. 10. Click
Chapter 2: Installation and Configuration 29 c. Enter the Prefix Length. This is the number of bits used in the IPv6 address. d. Enter the Gat
Chapter 2: Installation and Configuration 30 See LAN Interface Settings (on page 110) for information in configuring this section of the Network S
Chapter 2: Installation and Configuration 31 Remote Authentication Note to CC-SG Users When the KX II-101-V2 is controlled by CommandCenter Secur
Contents iv Video Properties ... 55 M
Chapter 2: Installation and Configuration 32 Configure the KX II-101-V2 Using a Terminal Emulation Program (Optional) You can use the Admin serial
Chapter 2: Installation and Configuration 33 10. To configure new network settings, at the Network prompt, type interface followed by one of the
Chapter 2: Installation and Configuration 34 Command Argument Options auto - Automatically sets speed and interface mode based on the network.
35 In This Chapter Interfaces ... 35 Virtual KVM Clie
Chapter 3: Working with Target Servers 36 3. Select the Enable Direct Port Access via URL checkbox. 4. Click Save. To define a direct port acc
Chapter 3: Working with Target Servers 37 Information Description When displayed? State The current state of the application, either idle or acti
Chapter 3: Working with Target Servers 38 The left panel can be collapsed in order to increase the display area of the page. To collapse and the
Chapter 3: Working with Target Servers 39 Port Name - The name of the KX II-101-V2 port. Initially, this is set to Dominion_KX2_101_Port1 but
Chapter 3: Working with Target Servers 40 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices yo
Chapter 3: Working with Target Servers 41 Manage Favorites Page To open the Manage Favorites page: Click Manage in the left panel. The Mana
Contents v Device Services ...
Chapter 3: Working with Target Servers 42 3. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Favori
Chapter 3: Working with Target Servers 43 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favori
Chapter 3: Working with Target Servers 44 Virtual KVM Client (VKC) Please note this client is used by various Raritan products. As such, reference
Chapter 3: Working with Target Servers 45 Button Button name Description Note: Not available in KX II-101-V2. Target Screenshot Click to take a
Chapter 3: Working with Target Servers 46 Button Button name Description Scaling Increases or reduces the target video size so you can view the e
Chapter 3: Working with Target Servers 47 Connection Properties The dynamic video compression algorithms maintain KVM console usability under var
Chapter 3: Working with Target Servers 48 256 Kb (Cable) 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem)
Chapter 3: Working with Target Servers 49 Connection Information To obtain information about your Virtual KVM Client connection: Choose Conn
Chapter 3: Working with Target Servers 50 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi
Chapter 3: Working with Target Servers 51 Click Yes to replace the existing macro with the imported version. Click Yes to All to replace th
Contents vi Configuring IP Access Control ... 149
Chapter 3: Working with Target Servers 52 3. Click Ok. An "Export Keyboard Macros to" dialog is displayed. Locate and select the macro
Chapter 3: Working with Target Servers 53 Release F4 Release Left Alt 6. Review the Macro Sequence field to be sure the macro sequence is define
Chapter 3: Working with Target Servers 54 Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you
Chapter 3: Working with Target Servers 55 Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen.
Chapter 3: Working with Target Servers 56 The device can filter out the electrical interference of video output from graphics cards. This feature
Chapter 3: Working with Target Servers 57 Best possible video mode The device will perform the full Auto Sense process when switching targets
Chapter 3: Working with Target Servers 58 Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on c
Chapter 3: Working with Target Servers 59 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot
Chapter 3: Working with Target Servers 60 Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and
Chapter 3: Working with Target Servers 61 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor
Contents vii Chapter 12 CC-SG Management 181 Overview ...
Chapter 3: Working with Target Servers 62 Additional Notes for Intelligent Mouse Mode Be sure that there are no icons or applications in the up
Chapter 3: Working with Target Servers 63 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s
Chapter 3: Working with Target Servers 64 Please note that mouse configurations will vary on different target operating systems. Consult your OS g
Chapter 3: Working with Target Servers 65 Norwegian (Norway) Portuguese (Portugal) Danish (Denmark) Swedish (Sweden) German (Switz
Chapter 3: Working with Target Servers 66 Keyboard Limitations Turkish Keyboards If using a Turkish keyboard, you must connect to a target server
Chapter 3: Working with Target Servers 67 Client Launch Settings Configuring client launch settings allows you to define the screen settings for
Chapter 3: Working with Target Servers 68 Configure Scan Settings in VKC and AKC The KX II and LX provide a port scanning feature that searches fo
Chapter 3: Working with Target Servers 69 Scaling Scaling your target window allows you to view the entire contents of the target server window.
Chapter 3: Working with Target Servers 70 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file
71 In This Chapter Overview ... 72 Using Virtual Med
Contents viii Appendix E FAQs 207 General FAQs ...
Chapter 4: Virtual Media 72 Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from the clien
Chapter 4: Virtual Media 73
Chapter 4: Virtual Media 74 Note: If you are using virtual media, you must use the USB connection. Prerequisites for Using Virtual Media With the
Chapter 4: Virtual Media 75 Virtual Media in a Windows XP Environment If you are running the Virtual KVM Client in a Windows® XP environment, use
Chapter 4: Virtual Media 76 Virtual Media in a Linux Environment Following is important information for Linux® users regarding using virtual media
Chapter 4: Virtual Media 77 guest_user@administrator-desktop:~$ getfacl -a /dev/sr0 getfacl: Removing leading '/' from absolute path na
Chapter 4: Virtual Media 78 Virtual Media in a Mac Environment Following is important information for Mac® users regarding using virtual media. A
Chapter 4: Virtual Media 79 Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. 2. Open a
Chapter 4: Virtual Media 80 Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is moun
Chapter 4: Virtual Media 81 Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the st
1 In This Chapter KX II-101-V2 Overview ... 2 KX II-101-V2 Help ...
Chapter 4: Virtual Media 82 Note: If you are working with files on a Linux® target, use the Linux Sync command after the files are copied using vi
83 In This Chapter User Groups ... 83 Users ...
Chapter 5: User Management 84 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good i
Chapter 5: User Management 85 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the
Chapter 5: User Management 86 control. It is possible to be locked out of your KX II-101-V2 if your IP address is within a range that has been den
Chapter 5: User Management 87 To replace a rule: 1. Specify the rule number you want to replace. 2. Type the Starting IP and Ending IP fields
Chapter 5: User Management 88 Permission Description Note: The Admin user group has this permission by default. Device Settings Network settings,
Chapter 5: User Management 89 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of th
Chapter 5: User Management 90 View Users by Port The User By Ports page lists all authenticated local and remote users and ports they are being co
Chapter 5: User Management 91 Logging Users Off the KX II-101-V2 (Force Logoff) If you are an administrator, you are able to log off any authent
Commenti su questo manuale