Raritan Dominion KX Guida Utente Pagina 1

Navigare online o scaricare Guida Utente per Tavolini per PC/Workstation Raritan Dominion KX. Raritan Dominion KX User guide Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 223
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti

Sommario

Pagina 1 - Dominion KX II-101-V2

Copyright © 2012 Raritan, Inc. KX2101V2-v3.5.0-D-E September 2012 255-62-3059-00 Dominion KX II-101-V2 User Guide Release 3.5.0

Pagina 2 - VCCI Information (Japan)

Chapter 1: Introduction 2 KX II-101-V2 Overview Thank you for purchasing the Dominion KX II-101-V2. The KX II-101-V2 provides a single keyboard, v

Pagina 3 - Contents

Chapter 5: User Management 92 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management >

Pagina 4

Chapter 5: User Management 93 Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is

Pagina 5 - Contents

Chapter 5: User Management 94 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking pro

Pagina 6

Chapter 5: User Management 95 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searc

Pagina 7

Chapter 5: User Management 96 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used t

Pagina 8 - Index 211

Chapter 5: User Management 97 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only us

Pagina 9 - Introduction

Chapter 5: User Management 98 17. The KX II-101-V2 provides you with the ability to test the LDAP configuration from the Authentication Settings p

Pagina 10 - KX II-101-V2 Overview

Chapter 5: User Management 99 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On yo

Pagina 11 - KX II-101-V2 Help

Chapter 5: User Management 100 The timeout is the length of time the KX II-101-V2 waits for a response from the RADIUS server before sending anoth

Pagina 12 - Chapter 1: Introduction

Chapter 5: User Management 101  CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than P

Pagina 13 - Product Features

Chapter 1: Introduction 3 Diagram key KX II-101-V2 LAN Windows®, Linux® and Sun™ servers TCP/IP LAN Remote (network) access Mobile access

Pagina 14

Chapter 5: User Management 102 RADIUS Communication Exchange Specifications The KX II-101-V2 sends the following RADIUS attributes to your RADIUS

Pagina 15 - Terminology

Chapter 5: User Management 103 User Authentication Process When the device is configured to authenticate and authorize local users, the order in

Pagina 16 - Package Contents

Chapter 5: User Management 104 Remote authentication follows the process specified in the flowchart below:

Pagina 17 - Chapter 2

Chapter 5: User Management 105 Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Passwor

Pagina 18 - Getting Started

106 In This Chapter Network Settings ... 106 Device Services ...

Pagina 19 - Command Line Resolution

Chapter 6: Device Management 107 Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For c

Pagina 20 - GUI Resolution/Solaris 8

Chapter 6: Device Management 108 e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discover

Pagina 21 - Mouse Settings

Chapter 6: Device Management 109 See LAN Interface Settings (on page 110) for information in configuring this section of the Network Settings pag

Pagina 22

Chapter 6: Device Management 110 LAN Interface Settings The current parameter settings are identified in the Current LAN interface parameters fiel

Pagina 23

Chapter 6: Device Management 111 Device Services The Device Services page allows you to configure the following functions:  Enable SSH access

Pagina 24 - Windows 2000 Settings

Chapter 1: Introduction 4 What's New in the Help The following information has been added based on enhancements and changes to the equipment

Pagina 25

Chapter 6: Device Management 112 HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX II-101-V2. For exam

Pagina 26

Chapter 6: Device Management 113 2. Select Enable Direct Port Access via URL if you would like users to have direct access to a target via the D

Pagina 27 - Sun Solaris Settings

Chapter 6: Device Management 114 c. Authentication Protocol - the MD5 or SHA authentication protocol used by the SNMP v3 agent d. Authentication

Pagina 28 - IBM AIX Settings

Chapter 6: Device Management 115 Keyboard/Mouse Setup Use the Keyboard/Mouse Setup page to configure the Keyboard and Mouse interface between the

Pagina 29

Chapter 6: Device Management 116 Admin Port To configure the admin serial port: 1. Choose Device Settings > Serial Port. The Serial Port Set

Pagina 30

Chapter 6: Device Management 117  Modem server IP address - The address the user types to access the KX II-101-V2 web interface once connected

Pagina 31 - B: Target Server

Chapter 6: Device Management 118  User Specified Time - Choose this option to input the date and time manually. For the User Specified Time opti

Pagina 32 - USB Configuration

Chapter 6: Device Management 119 2. Select SNMP Logging Enabled to enable to remaining checkboxes. Required 3. Select either or both SNMP v1/v2

Pagina 33 - PS/2 Configuration

Chapter 6: Device Management 120 Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Man

Pagina 34 - D: Admin Port

Chapter 6: Device Management 121 Note: If you disable SNMP settings at any time, the SNMP information is retained so you do not have to reenter i

Pagina 35 - Setting a New Password

Chapter 1: Introduction 5 Product Photos KX II-101-V2 Product Features Interfaces  Integrated PS/2 KVM connection  USB connection for cont

Pagina 36 - Assigning an IP Address

Chapter 6: Device Management 122 Trap Name Description deviceUpgradeStarted The KX II-101-V2 has begun update via an RFP file. factoryReset The de

Pagina 37

Chapter 6: Device Management 123 Trap Name Description securityBannerChanged A change has been made to the security banner. securityViolation Se

Pagina 38 - Naming the Target Server

Chapter 6: Device Management 124 Viewing the KX II-101-V2 MIB To view the KX II-101-V2 MIB: 1. Choose Device Settings > Event Management - S

Pagina 39 - Create User Groups and Users

Chapter 6: Device Management 125 Note: IPv6 addresses cannot exceed 80 characters in length for the host name. Use the reset to factory defaults

Pagina 40

Chapter 6: Device Management 126 Port Configuration The Port Configuration page displays a list of the KX II-101-V2 ports. Ports connected to KVM

Pagina 41

Chapter 6: Device Management 127 Managing KVM Target Servers (Port Page) This Port page opens when you select a port from the Port Configuration

Pagina 42

Chapter 6: Device Management 128 Valid Special Characters Character Description Character Description ! Exclamation point ; Semi-colon " Doub

Pagina 43 - Working with Target Servers

Chapter 6: Device Management 129 Connecting the Power Strip Diagram key KX II-101-V2 Raritan power strip. DKX2-101-V2-PDU (DB9-RJ45 adapter)

Pagina 44 - Left Panel

Chapter 6: Device Management 130 5. Power ON the Raritan power strip. 6. Click to Device Settings > Serial Port to open the Serial Port page.

Pagina 45

Chapter 6: Device Management 131 To cancel without saving changes:  Click Cancel. Managing Power Associations To make power associations

Pagina 46 - Port Access Page

Chapter 1: Introduction 6 System Management Features  Firmware upgradable over Ethernet  Failsafe firmware upgrade capability  Clock that ca

Pagina 47 - Port Action Menu

Chapter 6: Device Management 132 2. For that power strip, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet

Pagina 48 - Managing Favorites

Chapter 6: Device Management 133 Analog KVM Switch You can configure a Raritan analog KVM switch to work with the KX II-101-V2. The KX II-101-V2

Pagina 49 - Favorites List Page

Chapter 6: Device Management 134 8. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults:  Click Reset to Defau

Pagina 50

Chapter 6: Device Management 135 Note: If the KX II-101-V2 is set to restore to the factory defaults upon reset, the IP address, user name, and o

Pagina 51 - Logging Out

136 In This Chapter Overview ... 137 USB Connection Se

Pagina 52 - Virtual KVM Client (VKC)

Chapter 7: Managing USB Connections 137 Overview To broaden the KX II-101-V2's compatibility with different KVM target servers, Raritan prov

Pagina 53

Chapter 7: Managing USB Connections 138 2. Click USB Connection Settings to expand the USB Connection Settings section. 3. Select the USB connec

Pagina 54

Chapter 7: Managing USB Connections 139 3. Click the User Defined KX II-101 USB Profile Configuration Table link to access the recommended confi

Pagina 55

140 In This Chapter Security Settings ... 140 Configuring IP Acces

Pagina 56

Chapter 8: Security Management 141 Limitation Description This field is enabled and required when the Enable Password Aging checkbox is selected.

Pagina 57 - Keyboard Macros

Chapter 1: Introduction 7 User Features  Web-based access through common browsers  Intuitive graphical user interface (GUI)  PC Share mode,

Pagina 58

Chapter 8: Security Management 142 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor

Pagina 59

Chapter 8: Security Management 143 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s

Pagina 60 - Building a Keyboard Macro

Chapter 8: Security Management 144 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e

Pagina 61

Chapter 8: Security Management 145 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,

Pagina 62 - Running a Keyboard Macro

Chapter 8: Security Management 146 Encryption mode Description for more information. AES-256 The Advanced Encryption Standard (AES) is a National

Pagina 63 - Adjusting Video Settings

Chapter 8: Security Management 147 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware

Pagina 64

Chapter 8: Security Management 148 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desira

Pagina 65

Chapter 8: Security Management 149  Set the Encryption & Share to Auto on the Security Settings page. See Encryption & Share. Microsoft

Pagina 66

Chapter 8: Security Management 150  Drop - IP addresses are denied access to the KX II-101-V2 device. To add (append) rules: 1. Type the IP a

Pagina 67 - Using Screenshot from Target

Chapter 8: Security Management 151 3. You are prompted to confirm the deletion. Click OK. To allow access to only one IP address and block all

Pagina 68

Chapter 1: Introduction 8 Term Description Virtual media Enables a KVM target server to remotely access media from client PC and network file serv

Pagina 69 - Mouse Synchronization Tips

Chapter 8: Security Management 152 SSL Certificates The KX II-101-V2 uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic

Pagina 70 - Standard Mouse Mode

Chapter 8: Security Management 153 f. Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g.

Pagina 71 - Intelligent Mouse Mode

Chapter 8: Security Management 154 i. Reboot the KX II-101-V2 to send the saved CSR to a CA for SSL certificate. To download a CSR certificate

Pagina 72 - General Settings

Chapter 8: Security Management 155 Security Banner KX II-101-V2 provides you with the ability to add a security banner to the KX II-101-V2 login

Pagina 73

156 In This Chapter Audit Log... 156 Device Informatio

Pagina 74 - Keyboard Limitations

Chapter 9: Maintenance 157 Device Information The Device Information page provides detailed information about your KX II-101-V2 device. This info

Pagina 75 - Client Launch Settings

Chapter 9: Maintenance 158 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX

Pagina 76 - View Status Bar

Chapter 9: Maintenance 159 2. To do this: a. Save the backup file. The backup file is saved locally on your client machine with the name and lo

Pagina 77 - Full Screen Mode

Chapter 9: Maintenance 160 Upgrading Firmware Use the Firmware Upgrade page to upgrade the firmware for your KX II-101-V2. Important: Do not turn

Pagina 78

Chapter 9: Maintenance 161 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upg

Pagina 79 - Virtual Media

9 In This Chapter Overview ... 9 Default Login Inf

Pagina 80

Chapter 9: Maintenance 162  Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defaults. Note

Pagina 81 - Chapter 4: Virtual Media

Chapter 9: Maintenance 163 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. Stopping CC-SG Manag

Pagina 82 - Target Server

Chapter 9: Maintenance 164 2. Click Yes to begin the processing of removing the device from CC-SG management. A confirmation message will then di

Pagina 83 - XP environment

165 The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the KX II-101-V2 device. All of the Diag

Pagina 84 - Chapter 4: Virtual Media

Chapter 10: Diagnostics 166  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one

Pagina 85

Chapter 10: Diagnostics 167  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display

Pagina 86 - Using Virtual Media

Chapter 10: Diagnostics 168 Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP n

Pagina 87

Chapter 10: Diagnostics 169 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace ro

Pagina 88 - Connecting to Virtual Media

Chapter 10: Diagnostics 170 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical

Pagina 89

Chapter 10: Diagnostics 171 a. Click Save to File. The File Download dialog appears. b. Click Save. The Save As dialog appears. c. Navigate t

Pagina 90 - Disconnecting Virtual Media

Chapter 2: Installation and Configuration 10 Getting Started KX II-101-V2 users with Microsoft® Internet Explorer® version 6 or Windows 2000® m

Pagina 91 - User Management

172 In This Chapter Overview ... 172 Accessing the KX

Pagina 92

Chapter 11: Command Line Interface (CLI) 173 Accessing the KX II-101-V2 Using the CLI Access the KX II-101-V2 using one of the following methods:

Pagina 93 - Setting Port Permissions

Chapter 11: Command Line Interface (CLI) 174 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX®/Linux® workstation and

Pagina 94

Chapter 11: Command Line Interface (CLI) 175 Completion of Commands The CLI supports the completion of partially-entered commands. After entering

Pagina 95 - Setting Permissions

Chapter 11: Command Line Interface (CLI) 176 Command Description help Display an overview of the CLI syntax. quit Places the user back one level.

Pagina 96

Chapter 11: Command Line Interface (CLI) 177 Diagnostics The Diagnostics menu enables you to set the logging options for different modules of the

Pagina 97

Chapter 11: Command Line Interface (CLI) 178 Command Option Description verbose [on|off] Turns verbose logging on and off. Setlog Command Example

Pagina 98

Chapter 11: Command Line Interface (CLI) 179 Command Option Description ipauto Static or dynamic IP address ip ipaddress IP address of the KX II-

Pagina 99

Chapter 11: Command Line Interface (CLI) 180 Listports Command The Listports command lists the number of active users, user names, port, and statu

Pagina 100 - Chapter 5: User Management

181 In This Chapter Overview ... 181 Removing a KX II-

Pagina 101 - Authentication Settings

Chapter 2: Installation and Configuration 11 Resolutions 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz

Pagina 102

Chapter 12: CC-SG Management 182 Removing a KX II-101-V2 from CC-SG Management Unless the KX II-101-V2 is released from CC-SG control, you cannot

Pagina 103

Chapter 12: CC-SG Management 183 2. Click Yes. A message appears, confirming that the device is no longer under CC management. 3. Click OK. Th

Pagina 104

184 In This Chapter Physical Specifications ... 184 Supported Operating Syst

Pagina 105

Appendix A: Specifications 185 KX II-101-V2... Description Remote Connection: Network Protocols 1 Ethernet (RJ45) port with activity status indic

Pagina 106

Appendix A: Specifications 186 Mode Operating system Browser 32-bit mode  Firefox® 1.06 - 4 or later Windows Server 2003®  Internet Explorer 6

Pagina 107

Appendix A: Specifications 187 Certified Modems  USRobotics® 56K 5686E  ZOOM® v90  ZOOM v92  USRobotics Sportster® 56K  USRobotic

Pagina 108

Appendix A: Specifications 188 Resolutions 800x600 @75Hz 1360x768@60Hz 800x600 @85Hz 1366x768@60Hz 800x600 @90Hz 1368x768@60Hz 800x600 @100Hz 1400

Pagina 109

Appendix A: Specifications 189 Language Regions Keyboard layout Korean South Korea Dubeolsik Hangul Japanese Japan JIS Keyboard French

Pagina 110

Appendix A: Specifications 190 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 112

Pagina 111 - User Authentication Process

Appendix A: Specifications 191 Network Speed Settings KX II-101-V2 network speed setting Network switch port setting Auto 100/Full 100/Half 10

Pagina 112

This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, rep

Pagina 113 - Changing a Password

Chapter 2: Installation and Configuration 12 To change the command line resolution: 1. Run the following command: # eeprom output-device=screen

Pagina 114 - Device Management

Appendix A: Specifications 192 communication,” however, note that the KX II-101-V2 behavior deviates from expected behavior Note: For reliable net

Pagina 115

193 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...

Pagina 116 - Chapter 6: Device Management

Appendix B: Updating the LDAP Schema 194 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to th

Pagina 117

Appendix B: Updating the LDAP Schema 195 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create

Pagina 118

Appendix B: Updating the LDAP Schema 196 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.

Pagina 119 - Device Services

Appendix B: Updating the LDAP Schema 197 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object di

Pagina 120

Appendix B: Updating the LDAP Schema 198 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window op

Pagina 121

Appendix B: Updating the LDAP Schema 199 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properti

Pagina 122

Appendix B: Updating the LDAP Schema 200 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes lis

Pagina 123 - Serial Port Settings

201 The KX II-101-V2 device can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brack

Pagina 124

Chapter 2: Installation and Configuration 13 Mouse Settings The KX II-101-V2 operates in several mouse modes: Absolute Mouse Synchronization™, In

Pagina 125

Appendix C: Rack Mount 202 Diagram key Screws

Pagina 126 - Event Management

203 In This Chapter Java Runtime Environment (JRE) ... 203 IPv6 Support Notes ...

Pagina 127

Appendix D: Informational Notes 204 IPv6 Support Notes Operating System IPv6 Support Notes Java Java™ 1.6 supports IPv6 for the following:  Sol

Pagina 128

Appendix D: Informational Notes 205 Sun Blade Video, Keyboard, and Mouse Support Limitation Video If you are accessing a Sun™ Blade 100 with the

Pagina 129

Appendix D: Informational Notes 206 HP UX RX 1600 Keyboard and Mouse Configuration If you are using an HP® UX RX 1600 running UNIX®, do the follow

Pagina 130

207 In This Chapter General FAQs ... 207 IPv6 Networking ...

Pagina 131

Appendix E: FAQs 208 Question Answer What new features are available in the latest release? With Release 3.5 (and above), the following features a

Pagina 132 - SysLog Configuration

Appendix E: FAQs 209 Question Answer What if I have an external server with an IPv6 address that I want to use with my KX II-101-V2? The KX II-10

Pagina 134 - Port Configuration

211 9 9 Pin Pinout • 192 A A Power • 23 Absolute Mouse Mode • 64 Accessing the KX II-101-V2 Using the CLI • 173 Adding a New User • 91, 92 Adding a

Pagina 135 - Renaming a Port

Chapter 2: Installation and Configuration 14 d. Deselect the "Use the following transition effect for menus and tooltips" option. e. C

Pagina 136 - Valid Special Characters

Index 212 Disconnecting Users from Ports • 90, 91 Disconnecting Virtual Media • 79, 82 Discovering Raritan Devices on the KX II-101-V2 Subnet • 42

Pagina 137 - Connecting the Power Strip

Index 213 Modifying an Existing User • 92 Modifying an Existing User Group • 88 Modifying and Removing Keyboard Macros • 54 Mounting • 7 Mounting

Pagina 138

Index 214 Sun Blade Video, Keyboard, and Mouse Support Limitation • 205 Sun Solaris Settings • 19 Sun Video Resolution • 11 Supported Browsers • 1

Pagina 139 - Managing Power Associations

U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Pres

Pagina 140

Chapter 2: Installation and Configuration 15 d. Click Settings in the Performance group to open the Performance Options dialog. e. Under Custom

Pagina 141 - Analog KVM Switch

Chapter 2: Installation and Configuration 16  Fade or slide menus into view  Fade or slide ToolTips into view  Fade out menu items after cli

Pagina 142

Chapter 2: Installation and Configuration 17 Linux Settings (Red Hat 4 and 5, and Fedora 14) Note: The following settings are optimized for Stand

Pagina 143

Chapter 2: Installation and Configuration 18 b. Using a text editor, disable all non-KX II-101-V2 supported resolutions. c. Disable the virtual

Pagina 144 - Managing USB Connections

Chapter 2: Installation and Configuration 19 c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed gr

Pagina 145 - USB Connection Settings

Chapter 2: Installation and Configuration 20 Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. A target server running

Pagina 146

Chapter 2: Installation and Configuration 21 2. Click on Mouse Settings and set the Mouse Acceleration to 1.0 and Threshold to 3.0. Step 2: Con

Pagina 147

iii Contents Chapter 1 Introduction 1 KX II-101-V2 Overview ...

Pagina 148 - Security Management

Chapter 2: Installation and Configuration 22 Step 3: Connect the Equipment The KX II-101-V2 has the physical connections described in the diagram.

Pagina 149

Chapter 2: Installation and Configuration 23 Diagram key Admin port Use to do one of the following:  Configure and manage the device with a te

Pagina 150

Chapter 2: Installation and Configuration 24 USB Configuration To configure the KX II-101-V2 for use with a USB target server: 1. Use the atta

Pagina 151

Chapter 2: Installation and Configuration 25 Diagram key for USB Connection Video connection from the KX II-101-V2 to the target USB connection

Pagina 152

Chapter 2: Installation and Configuration 26 Note: If you are using virtual media, you must use the USB connection. Diagram key for PS/2 connectio

Pagina 153

Chapter 2: Installation and Configuration 27 E: Local User Port The Local User port serves as a pass-through to the target server video so that i

Pagina 154

Chapter 2: Installation and Configuration 28 9. Click Apply. You will receive confirmation that the password was successfully changed. 10. Click

Pagina 155

Chapter 2: Installation and Configuration 29 c. Enter the Prefix Length. This is the number of bits used in the IPv6 address. d. Enter the Gat

Pagina 156

Chapter 2: Installation and Configuration 30 See LAN Interface Settings (on page 110) for information in configuring this section of the Network S

Pagina 157

Chapter 2: Installation and Configuration 31 Remote Authentication Note to CC-SG Users When the KX II-101-V2 is controlled by CommandCenter Secur

Pagina 158

Contents iv Video Properties ... 55 M

Pagina 159

Chapter 2: Installation and Configuration 32 Configure the KX II-101-V2 Using a Terminal Emulation Program (Optional) You can use the Admin serial

Pagina 160 - SSL Certificates

Chapter 2: Installation and Configuration 33 10. To configure new network settings, at the Network prompt, type interface followed by one of the

Pagina 161

Chapter 2: Installation and Configuration 34 Command Argument Options  auto - Automatically sets speed and interface mode based on the network.

Pagina 162

35 In This Chapter Interfaces ... 35 Virtual KVM Clie

Pagina 163 - Security Banner

Chapter 3: Working with Target Servers 36 3. Select the Enable Direct Port Access via URL checkbox. 4. Click Save. To define a direct port acc

Pagina 164 - Maintenance

Chapter 3: Working with Target Servers 37 Information Description When displayed? State The current state of the application, either idle or acti

Pagina 165 - Device Information

Chapter 3: Working with Target Servers 38 The left panel can be collapsed in order to increase the display area of the page. To collapse and the

Pagina 166 - Backup and Restore

Chapter 3: Working with Target Servers 39  Port Name - The name of the KX II-101-V2 port. Initially, this is set to Dominion_KX2_101_Port1 but

Pagina 167 - Chapter 9: Maintenance

Chapter 3: Working with Target Servers 40 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices yo

Pagina 168 - Upgrading Firmware

Chapter 3: Working with Target Servers 41 Manage Favorites Page To open the Manage Favorites page:  Click Manage in the left panel. The Mana

Pagina 169 - Factory Reset

Contents v Device Services ...

Pagina 170 - Rebooting the KX II-101-V2

Chapter 3: Working with Target Servers 42 3. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Favori

Pagina 171 - Stopping CC-SG Management

Chapter 3: Working with Target Servers 43 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favori

Pagina 172 - Chapter 9: Maintenance

Chapter 3: Working with Target Servers 44 Virtual KVM Client (VKC) Please note this client is used by various Raritan products. As such, reference

Pagina 173 - Diagnostics

Chapter 3: Working with Target Servers 45 Button Button name Description Note: Not available in KX II-101-V2. Target Screenshot Click to take a

Pagina 174 - Chapter 10: Diagnostics

Chapter 3: Working with Target Servers 46 Button Button name Description Scaling Increases or reduces the target video size so you can view the e

Pagina 175 - Chapter 10: Diagnostics

Chapter 3: Working with Target Servers 47 Connection Properties The dynamic video compression algorithms maintain KVM console usability under var

Pagina 176 - Trace Route to Host Page

Chapter 3: Working with Target Servers 48  256 Kb (Cable)  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem)

Pagina 177

Chapter 3: Working with Target Servers 49 Connection Information To obtain information about your Virtual KVM Client connection:  Choose Conn

Pagina 178 - Device Diagnostics

Chapter 3: Working with Target Servers 50 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi

Pagina 179

Chapter 3: Working with Target Servers 51  Click Yes to replace the existing macro with the imported version.  Click Yes to All to replace th

Pagina 180 - Command Line Interface (CLI)

Contents vi Configuring IP Access Control ... 149

Pagina 181

Chapter 3: Working with Target Servers 52 3. Click Ok. An "Export Keyboard Macros to" dialog is displayed. Locate and select the macro

Pagina 182 - Navigation of the CLI

Chapter 3: Working with Target Servers 53 Release F4 Release Left Alt 6. Review the Macro Sequence field to be sure the macro sequence is define

Pagina 183 - Shortcuts

Chapter 3: Working with Target Servers 54 Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you

Pagina 184 - CLI Commands

Chapter 3: Working with Target Servers 55 Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen.

Pagina 185 - Setlog Command

Chapter 3: Working with Target Servers 56 The device can filter out the electrical interference of video output from graphics cards. This feature

Pagina 186 - Interface Command

Chapter 3: Working with Target Servers 57  Best possible video mode The device will perform the full Auto Sense process when switching targets

Pagina 187 - IPv6 Command

Chapter 3: Working with Target Servers 58 Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on c

Pagina 188 - Userlist Command Example

Chapter 3: Working with Target Servers 59 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot

Pagina 189 - CC-SG Management

Chapter 3: Working with Target Servers 60 Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and

Pagina 190 - Chapter 12: CC-SG Management

Chapter 3: Working with Target Servers 61 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor

Pagina 191 - Using CC-SG in Proxy Mode

Contents vii Chapter 12 CC-SG Management 181 Overview ...

Pagina 192 - Specifications

Chapter 3: Working with Target Servers 62 Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the up

Pagina 193

Chapter 3: Working with Target Servers 63 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s

Pagina 194 - Connectors

Chapter 3: Working with Target Servers 64 Please note that mouse configurations will vary on different target operating systems. Consult your OS g

Pagina 195 - Supported Video Resolutions

Chapter 3: Working with Target Servers 65  Norwegian (Norway)  Portuguese (Portugal)  Danish (Denmark)  Swedish (Sweden)  German (Switz

Pagina 196 - Supported Keyboard Languages

Chapter 3: Working with Target Servers 66 Keyboard Limitations Turkish Keyboards If using a Turkish keyboard, you must connect to a target server

Pagina 197 - TCP and UDP Ports Used

Chapter 3: Working with Target Servers 67 Client Launch Settings Configuring client launch settings allows you to define the screen settings for

Pagina 198 - Appendix A: Specifications

Chapter 3: Working with Target Servers 68 Configure Scan Settings in VKC and AKC The KX II and LX provide a port scanning feature that searches fo

Pagina 199 - Network Speed Settings

Chapter 3: Working with Target Servers 69 Scaling Scaling your target window allows you to view the entire contents of the target server window.

Pagina 200 - 9 Pin Pinout

Chapter 3: Working with Target Servers 70 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file

Pagina 201 - Updating the LDAP Schema

71 In This Chapter Overview ... 72 Using Virtual Med

Pagina 202 - Creating a New Attribute

Contents viii Appendix E FAQs 207 General FAQs ...

Pagina 203

Chapter 4: Virtual Media 72 Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from the clien

Pagina 204

Chapter 4: Virtual Media 73

Pagina 205 - Updating the Schema Cache

Chapter 4: Virtual Media 74 Note: If you are using virtual media, you must use the USB connection. Prerequisites for Using Virtual Media With the

Pagina 206 - 4. Open the Domain

Chapter 4: Virtual Media 75 Virtual Media in a Windows XP Environment If you are running the Virtual KVM Client in a Windows® XP environment, use

Pagina 207

Chapter 4: Virtual Media 76 Virtual Media in a Linux Environment Following is important information for Linux® users regarding using virtual media

Pagina 208

Chapter 4: Virtual Media 77 guest_user@administrator-desktop:~$ getfacl -a /dev/sr0 getfacl: Removing leading '/' from absolute path na

Pagina 209 - Appendix C

Chapter 4: Virtual Media 78 Virtual Media in a Mac Environment Following is important information for Mac® users regarding using virtual media. A

Pagina 210 - Diagram key

Chapter 4: Virtual Media 79 Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. 2. Open a

Pagina 211 - Informational Notes

Chapter 4: Virtual Media 80 Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is moun

Pagina 212 - IPv6 Support Notes

Chapter 4: Virtual Media 81 Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the st

Pagina 213 - Keyboard and Mouse

1 In This Chapter KX II-101-V2 Overview ... 2 KX II-101-V2 Help ...

Pagina 214

Chapter 4: Virtual Media 82 Note: If you are working with files on a Linux® target, use the Linux Sync command after the files are copied using vi

Pagina 215 - Appendix E

83 In This Chapter User Groups ... 83 Users ...

Pagina 216 - IPv6 Networking

Chapter 5: User Management 84 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good i

Pagina 217 - Appendix E: FAQs

Chapter 5: User Management 85 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the

Pagina 218

Chapter 5: User Management 86 control. It is possible to be locked out of your KX II-101-V2 if your IP address is within a range that has been den

Pagina 219

Chapter 5: User Management 87 To replace a rule: 1. Specify the rule number you want to replace. 2. Type the Starting IP and Ending IP fields

Pagina 220

Chapter 5: User Management 88 Permission Description Note: The Admin user group has this permission by default. Device Settings Network settings,

Pagina 221 - Index

Chapter 5: User Management 89 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of th

Pagina 222

Chapter 5: User Management 90 View Users by Port The User By Ports page lists all authenticated local and remote users and ports they are being co

Pagina 223

Chapter 5: User Management 91 Logging Users Off the KX II-101-V2 (Force Logoff) If you are an administrator, you are able to log off any authent

Commenti su questo manuale

Nessun commento