free hit counter
Raritan Dominion KX III Administrator's Manual

Raritan Dominion KX III Administrator's Manual

Hide thumbs Also See for Dominion KX III:
Table of Contents

Advertisement

Dominion KX III
Administrators Guide
Release 3.1.2
Copyright © 2015 Raritan, Inc.
DKX3A-v3.1.2-0E-E
April 2015
255-62-0002-00

Advertisement

Table of Contents
loading

Summary of Contents for Raritan Dominion KX III

  • Page 1 Dominion KX III Administrators Guide Release 3.1.2 Copyright © 2015 Raritan, Inc. DKX3A-v3.1.2-0E-E April 2015 255-62-0002-00...
  • Page 2 Raritan, Inc. © Copyright 2015 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
  • Page 3: Table Of Contents

    Contents Chapter 1 Introduction Overview ............................1 What's New in Help ........................1 Package Contents .......................... 2 KX III Device Photos and Features ....................2 Hardware ..........................2 Software ..........................3 Dominion KX3-832....................... 4 Dominion KX3-864....................... 6 Supported Users and Ports per Model ................7 KX III Remote and Local Console Interfaces .................
  • Page 4 Contents Step 7: Create and Install an SSL Certificate ..............41 Rack PDU (Power Strip) Outlet Control ..................41 Overview ..........................41 Turning Outlets On/Off and Cycling Power ............... 43 USB Profiles ..........................44 Overview ..........................44 CIM Compatibility....................... 44 Available USB Profiles .......................
  • Page 5 Example Dual Port Video Group Configuration ............... 226 Dual Port Video Configuration Steps ................227 Raritan Client Navigation when Using Dual Video Port Groups ........230 Direct Port Access and Dual Port Video Groups ............. 231 Dual Port Video Groups Displayed on the Ports Page ............ 231 Updating the LDAP Schema ......................
  • Page 6 Contents Root User Permission Requirement ................246 Virtual Media in a Mac Environment ..................246 Active System Partition ....................246 Drive Partitions ........................ 246 Virtual Media File Server Setup (File Server ISO Images Only)..........247 Chapter 5 Virtual KVM Client (VKC) Help Overview ............................
  • Page 7 Contents Scaling ..........................279 Full Screen Mode......................280 Connect to Virtual Media......................280 Smart Cards ..........................281 Smart Card Minimum System Requirements, CIMs and Supported/Unsupported Smart Card Readers ........................281 Authentication When Accessing a Smart Card Reader........... 281 PC Share Mode and Privacy Settings when Using Smart Cards ........281 Smart Card Reader Detected ..................
  • Page 8 Contents Proxy Server Configuration for Use with Virtual KVM Client (VKC) and Active KVM Client (AKC) ............................296 Connect to a Target from Virtual KVM Client (VKC) or Active KVM Client (AKC)..... 297 Chapter 7 Mobile KVM Client (MKC) Help Remotely Access Targets Using a Mobile Device ..............
  • Page 9 Contents Chapter 9 KX III Local Console Overview ............................ 319 Accessing a Target Server ......................319 Local Console Video Resolutions ....................320 Simultaneous Users ........................320 Local Port Hot Keys and Connect Keys..................320 Return to the KX III Local Console from a Target Server - Default Hot Key ....321 Local Port Auto-Sense (Video Refresh) - Default Hot Key ..........
  • Page 10 Contents Build Data and Power Circuits for the KX III ................347 Submit an Add Item Request for the KX III ................347 Manage the KX III Work Order ....................347 Visualize the KX III in a Cabinet Elevation and on the Floor Map ..........348 Managing the KX III Lifecycle ....................
  • Page 11 Contents IPv6 Support Notes ........................379 Operating System IPv6 Support Notes ................379 AKC Download Server Certification Validation IPv6 Support Notes ....... 379 Dual Stack Login Performance Issues ..................380 CIM Notes ..........................380 Windows 3-Button Mouse on Linux Targets ..............380 Windows 2000 Composite USB Device Behavior for Virtual Media ........
  • Page 12 Contents Appendix F Frequently Asked Questions General FAQs ..........................395 Remote Access .......................... 397 Universal Virtual Media ......................400 Bandwidth and KVM-over-IP Performance ................402 IPv6 Networking ......................... 406 Servers ............................407 Blade Servers ..........................408 Installation ..........................410 Local Port - KX IIII ........................412 Extended Local Port ........................
  • Page 13: Chapter 1 Introduction

    KVM Client (AKC) New feature that collects image, video and text files, and then bundles them in a zip file so it can be sent to Raritan Technical Support. The ciles are collect by selecting a single menu command from the Tools menu in either the Virtual KVM Client (VKC) or Active...
  • Page 14: Package Contents

    Chapter 1: Introduction  Restore KX II Backup File to a KX III To help customers migrating from the previous generation KX II to KX III, the KX III can restore (i.e. import) a backup file exported from the KX II to populate many of the KX III’s settings and options - Applying KX II Appliance Setting to a KX III Using a Backup/Restore File (on page 197)
  • Page 15: Software

    Chapter 1: Introduction  DVI support via a standard DVI cable  ® ® Remote access and power management from an iPhone or iPad  Support for tiering in which a base KX III device is used to access multiple other tiered devices ...
  • Page 16: Dominion Kx3-832

     IPv4 and IPv6 support  Power control associated directly with servers to prevent mistakes  Integration with Raritan's CommandCenter Secure Gateway (CC- SG) management unit  CC Unmanage feature to remove device from CC-SG control  Support of Raritan PX1 and PX2 appliances...
  • Page 17 Chapter 1: Introduction Diagram key Dual Power AC 100V/240V Dual 10/100/1000 Ethernet access Local USB ports DVI-D port 32 KVM ports for UTP Cabling (Cat5/5e/6) Tier port for tiering devices Modem port for external modems...
  • Page 18: Dominion Kx3-864

    Chapter 1: Introduction Dominion KX3-864 KX3-864 Photos KX3-864 Features Diagram key Dual Power AC 100V/240V Dual 10/100/1000 Ethernet access Local USB ports DVI-D port 64 KVM ports for UTP Cabling (Cat5/5e/6) Tier port for optional tiering devices...
  • Page 19: Supported Users And Ports Per Model

    Chapter 1: Introduction Diagram key Modem port for optional external modems Supported Users and Ports per Model Model Ports Remote users KX3-864 KX3-832 KX3-808 KX3-464 KX3-432 KX3-416 KX3-232 KX3-216 KX3-132 KX3-116 KX3-108 KX III Remote and Local Console Interfaces Use the Remote Console interface to configure and manage the KX III over a network connection.
  • Page 20: Kx Iii Kvm Client Applications

    KVM Client help is provided as part of KX III online help. Online help is accompanied by the KX III Quick Setup Guide, which can be found on the Raritan Firmware, Upgrades and Documentation page of Raritan's website (http://www.raritan.com/support/firmware-and- documentation).
  • Page 21: Chapter 2 Getting Started

    If you have not already done so, install and configure KX III. See the KX III Quick Setup Guide that came with the KX III device or download it from the Raritan Support website http://www.raritan.com/support. Allow Pop-Ups Regardless of the browser used, you must allow pop-ups from the device's IP address to launch the KX III Remote Console.
  • Page 22: Java Validation And Access Warning

    When logging in to KX III, Java 1.7 prompts you to validate KX III, and to allow access to the application. Raritan recommends installing an SSL certificate in each KX III device in order to reduce Java warnings, and enhance security. See Certificates...
  • Page 23: Example 1: Import The Certificate Into The Browser

    Chapter 2: Getting Started Example 1: Import the Certificate into the Browser In this example, you import the Certificate into the browser. Steps Open an IE browser, then log in to KX III. ™ Click More Information on the first Java security warning.
  • Page 24 Chapter 2: Getting Started Steps Click the Content tab. Click Certificates. The Certificate Import Wizard opens and walks you through each step.  File to Import - Browse to locate the Certificate  Certificate Store - Select the location to store the Certificate Click Finish on the last step of the Wizard.
  • Page 25: Example 2: Add The Kx Iii To Trusted Sites And Import The Certificate

    Chapter 2: Getting Started Example 2: Add the KX III to Trusted Sites and Import the Certificate In this example, the KX III's URL is added as a Trusted Site, and the Self Signed Certificate is added as part of the process. Steps Open an IE browser, then select Tools >...
  • Page 26 Chapter 2: Getting Started Steps Open an IE browser, then log in to KX III. ™ Click More Information on the first Java security warning. Click View Certificate Details on the More Information dialog. You are prompted to install the certificate. Follow the wizard steps. For details see, Example 1: Import the Certificate into the Browser (on page 11)
  • Page 27: Converting A Binary Certificate To A Base64-Encoded Der Certificate (Optional)

    Chapter 2: Getting Started Converting a Binary Certificate to a Base64-Encoded DER Certificate (Optional) KX III requires an SSL certificate in either Base64-Encoded DER format or PEM format. If you are using an SSL certificate in binary format, you cannot install it. However, you can convert your binary SSL certificate.
  • Page 28 Chapter 2: Getting Started The Certificate Export Wizard opens. Click Next to start the Wizard. Select "Base-64 encoded X.509" in the second Wizard dialog. Click Next to save the file as a Base-64 encoded X.509. You can now install the certificate on your KX III.
  • Page 29: Logging In To The Kx Iii

    Chapter 2: Getting Started Logging In to the KX III Log in to your KX III Remote Console from any workstation with network ™ connectivity. Java 1.7 is required to use the Java-based Virtual KVM ® Client (VKC). Alternatively, Microsoft .NET 3.5 (or later) is required to ®...
  • Page 30: Chapter 3 Kx Iii Administration

    Chapter 3 KX III Administration In This Chapter Overview ....................18 KX III Installation and Configuration ............19 Rack PDU (Power Strip) Outlet Control ..........41 USB Profiles .................... 44 User Management ................... 51 Device Management ................77 Security Management ................175 Maintenance ..................
  • Page 31: Kx Iii Installation And Configuration

    KX III Installation and Configuration See the KX III Quick Setup Guide that came with your device or download it from Raritan's Support website for a quick reference to the basic, bear minimum setup steps. Additional information and optional steps included here but not in the QSG include: ...
  • Page 32: Factory Default Login Ip Information

    Chapter 3: KX III Administration Rear Mount The steps correspond to the numbers shown in the rear rackmount diagrams. 1. Secure the cable-support bar to the front end of the side brackets, near the side brackets' “ears,” using two of the included screws. 2.
  • Page 33: Step 1: Configuring Network Firewall Settings

    Chapter 3: KX III Administration Setting Value (all lowercase) This user has administrative privileges. Password raritan (all lowercase) The first time you start the KX III, you are required to change the default password. IP address 192.168.0.192 Important: For backup and business continuity purposes, it is strongly recommended you create a backup administrator username and password, and keep that information in a secure location.
  • Page 34 Chapter 3: KX III Administration Mouse Settings Raritan recommends using Absolute Mouse Synchronization to minimize mouse settings on target servers. Additional Supported Mouse Settings (on page 22). In this mode, absolute coordinates are used to keep the client and target cursors in synch, even when the target mouse is set to a different acceleration or speed.
  • Page 35 If you do not set this profile, the mouse does synch in OS X. To do this, do one of the following: 1. Connect to the Mac target from the Raritan KVM Client. 2. Select USB Profile > Other Profiles > Mac OS-X (10.4.9 and later).
  • Page 36: Step 3: Connecting The Equipment

    Chapter 3: KX III Administration 5. Select 'Mac OS-X (10.4.9) and later' from the Available box, then click Add to add it to the Selected box. 6. Click on 'Mac OS-X (10.4.9) and later' in the Selected box. This automatically adds it to the Preferred Profile drop-down. 7.
  • Page 37 Chapter 3: KX III Administration A. AC Power Use the power cords that came with the KX III. Attach the female end of the AC power cord to an KX III power port and plug the male end into an AC power outlet. For dual-power failover protection, plug the female end of the second AC power cord in to the second KX III power port.
  • Page 38 A single link DVI cable is used to connect to a local DVI monitor or keyboard tray (not included with the KX III). Connect to the DVI port on Raritan's T1700-LED keyboard tray. Use a required DVI-D to VGA converter to connect to VGA monitors.
  • Page 39 VGA monitor and secure it by tightening the screws. Note: The DVI-D to VGA converter is not included with the KX III. Contact Raritan Sales for information. E. Connect Target Servers to the KX III To connect a target server to the KX III:...
  • Page 40: Step 4: Configuring The Kx Iii

    1. Once the unit has booted, enter the default username admin and password raritan. 2. Click Login. 3. Enter the old password raritan, then enter and reenter a new password. 4. Passwords can be up to 64 characters in length consisting of English alphanumeric characters and special characters.
  • Page 41 Chapter 3: KX III Administration Assign the KX III a Device Name Choose Device Settings > Network. The Basic Network Settings page opens. Specify a meaningful Device Name for your KX III device. Up to 32 alphanumeric and valid special characters, no spaces between characters.
  • Page 42 Chapter 3: KX III Administration Set up your IP Auto Configuration by selecting - None or DHCP None - for a static IP. Default selection. Recommended option. If None is selected, you must manually specify the network parameters by entering the Default Gateway.
  • Page 43 Chapter 3: KX III Administration DHCP - with this option, the IP address is automatically assigned by a DHCP server. Dynamic Host Configuration Protocol is used by networked computers (clients) to obtain unique IP addresses and other parameters from a DHCP server.
  • Page 44 Chapter 3: KX III Administration None - for a static IP. Default selection. Recommended option. If None is selected, you must manually specify -  Global/Unique IP Address - this is the IP address assigned to KX III  Prefix Length - this is the number of bits used in the IPv6 address ...
  • Page 45 Chapter 3: KX III Administration Configure the DNS Settings Do one of the following to configure DNS -  "Obtain DNS Server Address Automatically"  "Use the Following DNS Server Addresses" Select "Obtain DNS Server Address Automatically" if DHCP is selected. The DNS information is then provided by the DHCP server that is used.
  • Page 46 Chapter 3: KX III Administration Enter the following information if the "Use the Following DNS Server Addresses" is selected -  Primary DNS Server IP Address  Secondary DNS Server IP Address These addresses are the primary and secondary DNS addresses used if the primary DNS server connection is lost due to an outage.
  • Page 47 Chapter 3: KX III Administration Specify Power Supply Autodetection KX III provides dual power supplies. When both power supplies are used, KX III automatically detects them and notifies you of their status. Additionally, both the Powerln1 and Powerln2 Auto Detect checkboxes are automatically selected on the Power Supply Setup page (select Device Settings >...
  • Page 48 Chapter 3: KX III Administration Configure Date/Time Settings (Optional) Optionally, configure the date and time settings. The date and time settings impact SSL certificate validation if LDAPS is enabled. Use the Date/Time Settings page to specify the date and time for KX III. There are two ways to do this: ...
  • Page 49 For additional information about CC-SG authentication, see the CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide, which can be downloaded from the Support section of the Raritan website http://www.raritan.com. Supported Protocols To simplify management of usernames and passwords, the KX III provides the ability to forward authentication requests to an external authentication server.
  • Page 50: Step 5: Launching The Kx Iii Remote Console

    Chapter 3: KX III Administration Note on Microsoft Active Directory ® ® Microsoft Active Directory uses the LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the KX III. If it has the IAS (Internet Authorization Server) component, a Microsoft Active Directory server can also serve as a RADIUS authentication source.
  • Page 51 Chapter 3: KX III Administration Access a Target Server from the KX III To access a target server: 1. On the KX III Port Access page, click the Port Name of the target you want to access. The Port Action Menu is displayed. 2.
  • Page 52: Step 6: Configuring The Keyboard Language (Optional)

    The Caps Lock light starts to blink, indicating that the CIM is in Layout Code Change mode. The text window displays: Raritan Computer, Inc. Current keyboard layout code = 22h (US5 UNIX). Type the layout code desired (for example, 31 for...
  • Page 53: Step 7: Create And Install An Ssl Certificate

    Rack PDU (Power Strip) Outlet Control Overview The KX III allows you to control Raritan PX and RPC series rack PDU (power strip) outlets connected to the KX III through a D2CIM-PWR. Once a PX or RPC series is setup and then attached to the KX III, the rack PDU and its outlets can be controlled from the Powerstrip page in the KX III interface.
  • Page 54 Chapter 3: KX III Administration  Temperature  Current Amps  Maximum Amps  Voltage  Power in Watts  Power in Volts Ampere  Outlet Display Information:  Name - Named assigned to the outlet when it was configured. ...
  • Page 55: Turning Outlets On/Off And Cycling Power

    Chapter 3: KX III Administration Provided you have privileges to do so, you can manage power from the Virtual KVM Client (VKC) and Active KVM Client (AKC) as well. See Remote Power Management via Virtual KVM Client (VKC) or Active KVM Client (AKC) (on page 293) Turning Outlets On/Off and Cycling Power...
  • Page 56: Usb Profiles

    To change settings in the BIOS menu or boot from a virtual media drive, depending on the target server model, a BIOS profile may be more appropriate. Should none of the standard USB profiles provided by Raritan work with a given KVM target, please contact Raritan Technical Support for assistance.
  • Page 57: Available Usb Profiles

    The current release of the KX III comes with the selection of USB profiles described in the following table. New profiles are included with each firmware upgrade provided by Raritan. As new profiles are added, they will be documented in the help.
  • Page 58 Chapter 3: KX III Administration USB profile Description BIOS DellPowerEdge Dell PowerEdge BIOS Access (Keyboard and Mouse Only) Keyboard and Mouse Only Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB. When using the new D2CIM-DVUSB, use 'Generic' profile.
  • Page 59 Chapter 3: KX III Administration USB profile Description  USB bus speed limited to full-speed (12 MBit/s) ® BIOS HP Compaq BIOS HP Compaq DC7100/DC7600 DC7100/DC7600 Use this profile to boot the HP Compaq DC7100/DC7600 series desktops from virtual media. Restrictions: ...
  • Page 60 Chapter 3: KX III Administration USB profile Description HP Proliant DL360/DL380 G4 HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) ® (Windows 2003 Server Use this profile for the HP Proliant DL360/DL380 G4 series Installation) server when installing Windows 2003 Server without the help of HP SmartStart CD.
  • Page 61 Chapter 3: KX III Administration USB profile Description Phoenix AwardBIOS. Restrictions:  Virtual CD-ROM and disk drives cannot be used simultaneously Suse 9.2 SuSE Linux 9.2 Use this for SuSE Linux 9.2 distribution. Restrictions:  Absolute mouse synchronization™ not supported ...
  • Page 62 Chapter 3: KX III Administration USB profile Description Media CIM This profile resembles the behavior of the original KX3 release with Full Speed for virtual media CIM option checked. Useful for BIOS that cannot handle High Speed USB devices. Restrictions: ...
  • Page 63: Selecting Profiles For A Kvm Port

    Chapter 3: KX III Administration Selecting Profiles for a KVM Port The KX III comes with a set of USB profiles that you can assign to a KVM port based on the characteristics of the KVM target server it connects to. You assign USB profiles to a KVM port in the Device Settings >...
  • Page 64 Chapter 3: KX III Administration User Description another group. An individual group is essentially a “group” of one. Individual Group That is, the specific user is in its own group, not affiliated with other real groups. Individual groups can be identified by the “@” in the Group Name. The individual group allows a user account to have the same rights as a group.
  • Page 65 Chapter 3: KX III Administration Relationship Between Users and Groups Users belong to a group and groups have privileges. Organizing the various users of your KX III into groups saves time by allowing you to manage permissions for all users in a group at once, instead of managing permissions on a user-by-user basis.
  • Page 66 Chapter 3: KX III Administration 6. Click OK. Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the permissions of all users, including their own. Carefully consider granting these permissions. Permission Description Device Access Allows users and user groups with this While Under CC- permission to directly access the KX III.
  • Page 67 Chapter 3: KX III Administration Permission Description When a device is accessed directly while it is under CC-SG management, access and connection activity is logged on the KX III. User authentication is performed based on KX III authentication settings. Note: The Admin user group has this permission by default.
  • Page 68 Chapter 3: KX III Administration Setting Port Permissions For each server port, you can specify the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setting for all permissions is Deny. Port access option Description...
  • Page 69 Chapter 3: KX III Administration If you are using a tiered configuration in which a base KX III device is used to access multiple other tiered devices, the tiered device enforces individual port control levels. See Configuring and Enabling Tiering (on page 137) for more information on tiering.
  • Page 70 Chapter 3: KX III Administration 2. Type the ending IP address in the Ending IP field. 3. Choose the action from the available options:  Accept - IP addresses set to Accept are allowed access to the KX III device. ...
  • Page 71 Chapter 3: KX III Administration Tip: The rule numbers allow you to have more control over the order in which the rules are created. Modifying an Existing User Group Note: All permissions are enabled for the Admin group and cannot be changed.
  • Page 72: Users

    Chapter 3: KX III Administration Users Users must be granted user names and passwords to gain access to the KX III. This information is used to authenticate users attempting to access your KX III. Up to 254 users can be created for each user group. If you are using a tiered configuration in which a base KX III device is used to access multiple other tiered devices, users will need permission to access the base device and permissions to access each individual...
  • Page 73 Chapter 3: KX III Administration View the KX III Users List The User List page displays a list of all users including their user name, full name, and user group. The list can be sorted on any of the columns by clicking on the column name.
  • Page 74 Chapter 3: KX III Administration  Username - username for user logins and target connections  Access From - IP address of client PC accessing the KX III  Status - current Active or Inactive status of the connection To view users by port: ...
  • Page 75: Authentication Settings

    Chapter 3: KX III Administration Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management > User List. 2. Locate the user from among those listed on the User List page. 3.
  • Page 76 Chapter 3: KX III Administration 5. If you choose RADIUS, read the section entitled Implementing RADIUS Remote Authentication for information about completing the fields in the RADIUS section of the Authentication Settings page. 6. Click OK to save. To return to factory defaults: ...
  • Page 77 LDAP database you want to begin searching for user information. Up to 64 characters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com. Consult your authentication server administrator for the appropriate values to enter into these fields.
  • Page 78 Chapter 3: KX III Administration 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the Secret Phrase field and again in the Confirm Secret Phrase field (up to 128 characters).
  • Page 79 Chapter 3: KX III Administration 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only used when the Enable Secure LDAP checkbox is selected. 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certificate file to validate the certificate provided by the server.
  • Page 80 KX III policies and user group privileges that are applied locally to AD user groups. IMPORTANT: If you are an existing Raritan, Inc. customer, and have already configured the Active Directory server by changing the AD...
  • Page 81 Chapter 3: KX III Administration 4. From the KX III, enable and configure your AD server properly. See Implementing LDAP/LDAPS Remote Authentication (on page 64). Important Notes  Group Name is case sensitive.  The KX III provides the following default groups that cannot be changed or deleted: Admin and <Unknown>.
  • Page 82 Chapter 3: KX III Administration The timeout is the length of time the KX III waits for a response from the RADIUS server before sending another authentication request. 9. The default number of retries is 3 Retries. This is the number of times the KX III will send an authentication request to the RADIUS server.
  • Page 83 Chapter 3: KX III Administration  CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PAP.
  • Page 84  RADIUS Attribute: Filter-ID  Attribute Type: String  Attribute Value: Raritan:G{KVM_Admin} (where KVM_Admin is group name created locally on Dominion KVM Switch). Case sensitive.  Configure Session Conditions (Date and Time) (Required) - Policy Elements > Session Conditions > Date and Time ...
  • Page 85 Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
  • Page 86 Chapter 3: KX III Administration Attribute Data Log out Accounting-Request(4) Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-Port (5) Always 0. NAS-IP-Address (4) The IP address for the KX III. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting.
  • Page 87 Chapter 3: KX III Administration User Authentication Process Remote authentication follows the process specified in the flowchart below:...
  • Page 88: Changing A Password

    Chapter 3: KX III Administration Changing a Password To change your KX III password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
  • Page 89: Device Management

    Chapter 3: KX III Administration Device Management Network Settings Use the Basic Network Settings page to customize the network configuration for your KX III. Specifically: Assign the KX III a Device Name (on page 29) Configure the IPv4 Settings (on page 29) Configure the IPv6 Settings (on page 31) Configure the DNS Settings...
  • Page 90 Chapter 3: KX III Administration...
  • Page 91 Chapter 3: KX III Administration To change the network configuration: 1. Choose Device Settings > Network. The Network Settings page opens. 2. Update the Network Basic Settings. See Network Basic Settings (on page 79). 3. Update the LAN Interface Settings. See LAN Interface Settings page 85).
  • Page 92 Chapter 3: KX III Administration Configure the IPv4 Settings In the IPv4 section, enter or select the appropriate IPv4-specific network settings. Enter the IP Address, if needed. The default IP address is 192.168.0.192. Enter the Subnet Mask. The default subnet mask is 255.255.255.0. Set up your IP Auto Configuration by selecting - None or DHCP...
  • Page 93 Chapter 3: KX III Administration None - for a static IP. Default selection. Recommended option. If None is selected, you must manually specify the network parameters by entering the Default Gateway. Leaving the selection set to None -  Lets you set the network parameters since KX III is part of your network infrastructure and you most likely do not want its IP address to change frequently.
  • Page 94 Chapter 3: KX III Administration Configure the IPv6 Settings If using IPv6, enter or select the appropriate IPv6-specific network settings in the IPv6 section. Select the IPv6 checkbox to activate the fields in the section and enable IPv6 on the device. Select an IP Auto Configuration option - None or Router Discovery.
  • Page 95 Chapter 3: KX III Administration None - for a static IP. Default selection. Recommended option. If None is selected, you must manually specify -  Global/Unique IP Address - this is the IP address assigned to KX III  Prefix Length - this is the number of bits used in the IPv6 address ...
  • Page 96 Chapter 3: KX III Administration Select "Obtain DNS Server Address Automatically" if DHCP is selected. The DNS information is then provided by the DHCP server that is used. When finished, click OK. Your KX III device is now network accessible. Enter the following information if the "Use the Following DNS Server Addresses"...
  • Page 97: Lan Interface Settings

    Chapter 3: KX III Administration LAN Interface Settings Choose Device Settings > Network to open the Network Settings page. This is where LAN network settings are configured. The current parameter settings are identified in the Current LAN Interface Parameters section of the page. Update the LAN settings as needed.
  • Page 98 Chapter 3: KX III Administration Step Choose the LAN Interface Speed & Duplex from the following options:  Autodetect (default option)  10 Mbps/Half - Both KX III device LEDs blink  10 Mbps/Full - Both KX III device LEDs blink ...
  • Page 99 To do this, it uses a second network port if the active network port fails. Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends that you either not monitor the port or only monitor the port after a failover occurs.
  • Page 100: Reset Network Settings To Factory Defaults

    Chapter 3: KX III Administration Step Change the Bandwidth Limit, if needed. The default is No Limit. This sets the maximum amount of bandwidth that can be consumed by the KX III device (for all sessions). Note: Lower bandwidth may result in slower performance. Click OK to apply the setting.
  • Page 101: Configuring Ports

    Chapter 3: KX III Administration Configuring Ports Access the Port Configuration Page To access a port configuration: 1. Choose Device Settings > Port Configuration. The Port Configuration Page opens. This page is initially displayed in port number order, but can be sorted on any of the fields by clicking on the column heading.
  • Page 102 Chapter 3: KX III Administration Port Configuration Page The Port Configuration page displays a list of the KX III ports. When a port's status is down, Not Available is displayed as its status. A port may be down when the port's CIM is removed or powered down. Note: For blade chassis, the blade chassis name can be changed but its blade slot names cannot be changed.
  • Page 103 Chapter 3: KX III Administration Port Name If a KX III port has no CIM connected or is connected to a CIM with no name, a default port name of Dominion_KX3_Port# is assigned to the port. Dominion_KX3 is the device model and Port# is the number of the KX III physical port.
  • Page 104 Chapter 3: KX III Administration Port Type Port type includes:  DCIM - Dominion CIM  TierDevice - Tiered device  Not Available - No CIM connected  DVM-DP - Display Port CIM  DVM-HDMI - HDMI CIM  DVM-DVI - DVI CIM ...
  • Page 105 Chapter 3: KX III Administration 6. Click OK. Configuring KVM Switches The KX III also supports use of hot key sequences to switch between targets. In addition to using hot key sequences with standard servers, KVM switching is supported by blade chassis and in tiered configurations.
  • Page 106 Chapter 3: KX III Administration 7. In the KVM Switch Name field, enter the name you want to use to refer to this port connection. 8. Activate the targets that the KVM switch hot key sequence will be applied to. Indicate that the KVM switch ports have targets attached by selecting ‘Active’...
  • Page 107 URL. For example username=admin, where username is the username field. Password Field - Enter the password parameter that will be used in the URL. For example password=raritan, where password is the password field. 10. Click OK. To change the active status/deactivate a KVM switch port or URL: 1.
  • Page 108 Chapter 3: KX III Administration  Configure the CIM Settings (on page 96)  Configure the CIM Power Associations (on page 96)  Configure the CIM Target Settings (on page 96)  Apply Selected Profiles to Other CIMs (on page 97) ...
  • Page 109 Chapter 3: KX III Administration 3. For digital CIMs, to set the target's video resolution to match your monitor's native display resolution, select the resolution from the Display Native Resolution drop-down. For a complete list of supported video resolutions from the remote console, see KX III Supported Local Port DVI Resolutions page 356)
  • Page 110 The KX III allows you to connect rack PDUs (power strips) to KX III ports. KX III rack PDU configuration is done from the KX III Port Configuration page. Note: Raritan recommends no more than eight (8) rack PDUs (power strips) be connected to a KX III at once since performance may be affected.
  • Page 111 Note: PX rack PDUs (power strips) can be named in the PX as well as in the KX III. Once a Raritan remote rack PDU is connected to the KX III, it will appear on the Port Configuration page. Click on the power port name on that page to access it.
  • Page 112 Chapter 3: KX III Administration 3. Click OK.
  • Page 113 Port Access page. To use this feature, you will need:  Raritan remote rack PDU(s)  Power CIMs (D2CIM-PWR) Make a Power Association...
  • Page 114 Chapter 3: KX III Administration 4. Click OK. That rack PDU/outlet association is removed and a confirmation message is displayed. To remove a rack PDU association if the rack PDU has been removed from the target: 1. Click Device Settings > Port Configuration and then click on the active target.
  • Page 115 Chapter 3: KX III Administration 3. On the Port Configuration page, click on the name of the blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio button. The page will then display the necessary fields to configure a blade chassis.
  • Page 116 Chapter 3: KX III Administration  Username - Not applicable.  Password - Not applicable.  Port Number - The default port number for the blade chassis is 22. Not applicable. 7. Change the blade chassis name, if needed. 8. Check the Installed checkbox next to each slot that has a blade installed.
  • Page 117 Chapter 3: KX III Administration  URL - Enter the URL to the interface. Required  Username - Enter the username used to access the interface. Optional  Password - Enter the password used to access the interface. Optional Note: Leave the username and password fields blank for DRAC, ILO, and RSA web applications or the connection will fail.
  • Page 118 Chapter 3: KX III Administration  Tips for Adding a Web Browser Interface (on page 120) for tips on adding a web browser interface. 10. In the Target Settings section, select "640x480 or 720x400 Compensation" if you are experiencing display issues when the target is using this resolution.
  • Page 119 Chapter 3: KX III Administration 14. Select 'Use international keyboard for scan code set 3' if connecting to the target with a DCIM-PS2 and require the use of scan code set 3 with an international keyboard. 15. Click OK to save the configuration. Blade Chassis Configuration Options ®...
  • Page 120 Chapter 3: KX III Administration Manual and Auto-Discovery Blade Chassis Configuration Two modes of operation are provided for blade chassis: manual configuration and auto-discovery, depending on the blade chassis capabilities. Configure the mode by selecting Device Services > Port Configuration to open the Port page.
  • Page 121 Chapter 3: KX III Administration Hot Key Sequences to Access Blade Chassis The use of hot key sequences to switch KVM access to a blade chassis is supported. For blade chassis that allow users to select a hot key sequence, those options will be provided on the Port Configuration page.
  • Page 122 Chapter 3: KX III Administration Link to a Blade Chassis Interface - Blade Chassis Managed Links You are able to configure the connection to a blade chassis web browser interface if one is available. Configure links when adding a blade by selecting Device Services > Port Configuration, and entering the link information in the Blade Chassis Managed Links section of the page.
  • Page 123 Chapter 3: KX III Administration Managing Blade Chassis Blade chassis can be managed from the Virtual KVM Client (VKC), Active KVM Client (AKC), and CC-SG. Managing blade severs via VKC and AKC is the same as managing standard target servers. Virtual KVM Client (VKC) Help (on page 248), Active KVM Client...
  • Page 124 Chapter 3: KX III Administration To configure a Dell PowerEdge M1000e: ™ 1. If you selected Dell PowerEdge M1000e, auto-discovery is available. Configure the blade chassis as applicable. Prior to configuring a blade chassis that can be auto-discovered, it must be configured to enable SSH connections on the designated port number (see Device Services...
  • Page 125 Chapter 3: KX III Administration Click the Blade Chassis Managed Links icon to expand the section on the page. The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access to the URL links entered in this section of the page is governed by the blade chassis port permissions.
  • Page 126 Chapter 3: KX III Administration 10. Select the CIMs native, display resolution from the Display Native Resolution drop-down. This is the preferred resolution and timing mode of the digital CIM. Once a resolution is selected, it is applied to the CIM. If no selection is made, the default 1024x1280@60Hz resolution is used.
  • Page 127 Chapter 3: KX III Administration a. Active - To activate the link once it is configured, select the Active checkbox. Leave the checkbox deselected to keep the link inactive. Entering information into the link fields and saving can still be done even if Active is not selected. Once Active is selected, the URL field is required.
  • Page 128 Chapter 3: KX III Administration 3. On the Port Configuration page, click on the name of the blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio button. The page will then display the necessary fields to configure a blade chassis.
  • Page 129 Chapter 3: KX III Administration 5. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon to expand the section on the page.
  • Page 130 Chapter 3: KX III Administration 6. If applicable, define the USB profile for the blade chassis or select an existing USB profile. Click the USB Profiles Select USB Profiles for Port icon or the Apply Select Profiles to Other Ports icon expand these sections of the page.
  • Page 131 Chapter 3: KX III Administration a. Active - To activate the link once it is configured, select the Active checkbox. Leave the checkbox deselected to keep the link inactive. Entering information into the link fields and saving can still be done even if Active is not selected. Once Active is selected, the URL field is required.
  • Page 132 Chapter 3: KX III Administration Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web application associated with an RSA, DRAC or ILO Processor card.
  • Page 133 Chapter 3: KX III Administration HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KX III supports the aggregation of ports connected to certain types of blades into a group representing the blade chassis. Specifically, ™ ® ® ®...
  • Page 134 Chapter 3: KX III Administration 4. Select the Blade Server Group checkbox. If you want to designate that these ports are attached to blades housed in a blade chassis (for example, HP c3000 or Dell PowerEdge 1855), select the Blade Server Group checkbox. Note: This is especially important to CC-SG users who want HP blades to be organized on a chassis basis, although each blade has its own connection to a port on the KX III.
  • Page 135 Chapter 3: KX III Administration Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KX III and the corresponding profiles that should be selected per chassis model when configuring them in the KX III application. A list of these models can be selected on the Port Configuration page from the Blade Server Chassis Model drop-down, which appears when the Blade Chassis radio button is selected.
  • Page 136 Chapter 3: KX III Administration Blade chassis Connection method Recommended CIM(s)  DCIM-PS2 Generic If a D2CIM-VUSB or D2CIM-DVUSB is used when connecting to a blade-chassis configured  DCIM-USBG2 as Generic, you will be able to select the USB profiles from the Port Configuration page and the client's USB Profile menu.
  • Page 137 Chapter 3: KX III Administration Blade chassis Connection method Recommended CIM(s)  VGA monitors with DDC support. Source: Dell Chassis Management Controller, Firmware Version 1.0, User Guide  ® BladeSystem The HP c-Class Blade SUV Cable enables you DCIM-USBG2 c3000 to perform blade chassis administration, ...
  • Page 138 Note: Audio is disabled for all KVM switch targets. Required and Recommended Blade Chassis Configurations This table contains information on limitations and constraints that apply to configuring blade chassis to work with the KX III. Raritan recommends that all of the information below is followed. Blade chassis Required/recommended action ...
  • Page 139  Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM. iKVM may not work correctly if this is not done.  Configure the iKVM GUI Main menu to select target blades by Slot, not by Name. iKVM may not work correctly if this is not done.
  • Page 140  The SSH port configured on the blade chassis management module and the port number entered on the Port Configuration page must match.  Raritan KX III virtual media is supported only on IBM IBM KX3 Virtual ® BladeCenter Models H and E.
  • Page 141 Chapter 3: KX III Administration Blade chassis Sample URL format  Password: calvin  Password Field: TEXT_PASSWORD  ® http://192.168.84.217/private/welcome.ssi ® BladeCenter or H Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles for Port section of the Port page.
  • Page 142 Chapter 3: KX III Administration  Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appear in the Selected list. These are the profiles that can be used for the KVM target server connected to the port. To specify a preferred USB profile: 1.
  • Page 143 Chapter 3: KX III Administration Configuring KX III Local Port Settings Note: Some changes you make to the settings on the Local Port Settings page restart the browser you are working in. If a browser restart occurs when a setting is changed, it is noted in the steps provided here. To configure the local port settings: ...
  • Page 144 Chapter 3: KX III Administration Configure the Local Port Scan Mode Settings 1. If needed, configure the Local Port Scan Mode settings. These settings apply to Scan Settings feature, which is accessed from the Port page.  In the "Display Interval (10-255 sec):" field, specify the number of seconds you want the target that is in focus to display in the center of the Port Scan window.
  • Page 145 Local language input is not supported at this time for KX III Local Console functions. Note: If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Select the Local Port Hotkey 1.
  • Page 146 Chapter 3: KX III Administration Select the Local Port Connect Key 1. Select the Local Port Connect key. Use a connect key sequence to connect to a target and switch to another target. You can then use the hot key to disconnect from the target and return to the local port GUI.
  • Page 147: Device Services

    Chapter 3: KX III Administration b. Set the amount of time (in minutes) in which Power Save Mode will be initiated. Select the Local User Authentication 1. Choose the type of local user authentication.  Local/LDAP/RADIUS. This is the recommended option. ...
  • Page 148 Chapter 3: KX III Administration 3. Enter the SSH Port information. The standard SSH TCP port number is 22 but the port number can be changed to provide a higher level of security operations. 4. Click OK. HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX III.
  • Page 149 Chapter 3: KX III Administration Configuring and Enabling Tiering The tiering feature allows you to access KX III targets and PDUs through one base KX III device. Devices can be added and removed from a tiering configuration as needed up to a maximum of two tiered levels. When setting up the devices, you will use specific CIMS for specific configurations.
  • Page 150 Chapter 3: KX III Administration Unsupported and Limited Features on Tiered Targets The following features are not supported on tiered targets:  Blade chassis on tiered devices  Audio on tiered devices  Smart cards on tiered devices  Virtual media tiered devices ...
  • Page 151 Chapter 3: KX III Administration Steps KX III Base device KX III Tiered device CIM to connect the target server to KX III the Tiered device. Target server Base device Tier port to Tiered device Tier port connection:  Connect one end of a Cat5/5e/6 cable into a target server port on the KX III Base device.
  • Page 152 Chapter 3: KX III Administration In the Tier Secret field, enter the same secret word you entered for the base device on the Device Settings page. Click OK. Once devices are enabled and configured, they appear on the Port Access page. When the KX III is configured to function as a base device or tiered device, they will be displayed as: ...
  • Page 153 Chapter 3: KX III Administration Power Control from Tiered Devices You can power on and off targets that are a part of the tiered configuration. These targets are accessed from the Port Access page. If targets and outlets are associated, power control is available from the Port Access page.
  • Page 154 Chapter 3: KX III Administration Username and password are optional. If username and password are not provided, a login dialog will be displayed and, after being authenticated, the user will be directly connected to the target. The port may be a port number or port name. If you are using a port name, the name must be unique or an error is reported.
  • Page 155 Chapter 3: KX III Administration Username and password are optional. If username and password are not provided, a login dialog will be displayed and, after being authenticated, the user will be directly connected to the target. The port may be a port number or port name. If you are using a port name, the name must be unique or an error is reported.
  • Page 156 Chapter 3: KX III Administration Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Note: When operating in IPv4 and IPv6 dual stack mode with 'Enable ®...
  • Page 157 Chapter 3: KX III Administration ® 2. Launch Internet Explorer using the KX III IP address as the URL. A Certificate Error message will be displayed. 3. Select View Certificates. 4. On the General tab, click Install Certificate. The certificate is then installed in the Trusted Root Certification Authorities store.
  • Page 158 Chapter 3: KX III Administration 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option must be selected. Required 4. Complete the following fields for SNMP v1/v2c (if needed): a. Community - the device's community string b.
  • Page 159 Chapter 3: KX III Administration Configure SNMP traps on the Event Management - Settings page, which can be quickly accessed by clicking the SNMP Trap Configuration link. Configuring SNMP Traps (on page 156)for information on creating SNMP traps and List of KX III SNMP Traps (on page 159) for a list of available KX III SNMP traps.
  • Page 160 Chapter 3: KX III Administration 3. The Serial Line Speed of the modem is set to 115200. 4. Enter the initial modem string in the Modem Init String field. If the modem string is left blank, the following string is sent to the modem by default: ATZ OK AT OK.
  • Page 161 Chapter 3: KX III Administration Configure Settings to Access KX III via Modem through Direct Port Access...
  • Page 162 Chapter 3: KX III Administration In order to access KX III via a modem through direct port access, you must configure settings in:  The KX III remote console  ® On the client machine in the Java Control Panel and in your browser (Microsoft Internet Explorer and Firefox ®...
  • Page 163 Chapter 3: KX III Administration Steps For better modem performance, Raritan recommends deselecting the “Apply Encryption Mode to KVM and Virtual Media (Forced in FIPS 140-2 Mode)” setting if it is enabled on the Security Settings page (select Security > Security Settings). Optional Configure the following Java security settings on your client machine.
  • Page 164 Chapter 3: KX III Administration Steps ® Access the Java Control Panel from the Microsoft Windows Control Panel. In the Java Control Panel, open to the General tab. Click Settings. Select "Keep temporary files on my computer". Click OK. You can now close the Java Control Panel and Microsoft Control Panel. Configure the following browser settings on your client machine, depending on the browser you use.
  • Page 165 Chapter 3: KX III Administration Steps ® For Microsoft Internet Explorer , click Tools > Internet Options. The steps here follow Internet Explorer 9. Click on the General tab. Click Settings in the Browser History section to open the Windows Database Settings dialog. Click the "Caches and Databases"...
  • Page 166 Chapter 3: KX III Administration Steps ® For Firefox , click Tools > Options. Click on Privacy. Set the History to "Firefox will" to "Remember history". Click OK to apply the settings. Finally, you need to perform the following steps the first time you access each target server via the Virtual KVM Client (VKC) from KX III.
  • Page 167 Chapter 3: KX III Administration Steps In VKC, click Connection > Properties to open the Connection Properties dialog. Set the Video Mode to “Greyscale 2” so you use the least bandwidth. Click OK. It may be necessary to set the “Noise Filter” to greater than 2 if the modem connection is slow after you test it.
  • Page 168 Chapter 3: KX III Administration Note: If DHCP is selected for the Network Settings on the Network page, the NTP server IP address is automatically retrieved from the DHCP server by default. Manually enter the NTP server IP address by selecting the Override DHCP checkbox. 6.
  • Page 169 Chapter 3: KX III Administration 3. Select either or both SNMP v1/v2c Traps Enabled and SNMP Trap v3 Enabled. At least one option must be selected. Once selected, all related fields are enabled. Required 4. Complete the following fields for SNMP v1/v2c (if needed): a.
  • Page 170 Chapter 3: KX III Administration Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Management - Settings page. The events that are captured once an SNMP trap is configured are selected on the Event Management - Destination page.
  • Page 171 Chapter 3: KX III Administration Use the reset to factory defaults feature to remove the SNMP configuration and set the KX III to its original factory default. To reset to factory defaults:  Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possible for the KX III and the router that it is attached to fall out of synchronization when the KX III is rebooted, preventing the reboot completed SNMP trap from being logged.
  • Page 172 Chapter 3: KX III Administration Trap Name Description networkFailure An Ethernet interface of the product can no longer communicate over the network. networkParameterChanged A change has been made to the network parameters. passwordSettingsChanged Strong password settings have changed. portConnect A previously authenticated user has begun a KVM session.
  • Page 173 Chapter 3: KX III Administration Trap Name Description userForcedLogout A user was forcibly logged out by Admin userLogin A user has successfully logged into the KX III and has been authenticated. userLogout A user has successfully logged out of the KX III properly.
  • Page 174 Chapter 3: KX III Administration Note: If you have Read-Write privileges to the MIB file, use a MIB editor to make changes to the file. SysLog Configuration To configure the Syslog (enable Syslog forwarding): 1. Select Enable Syslog Forwarding to log the device's messages to a remote Syslog server.
  • Page 175 Chapter 3: KX III Administration Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps), or can be logged to the syslog or audit log. Use the Event Management - Destinations page to select the system events to track and where to send this information.
  • Page 176: Power Supply Setup

    Chapter 3: KX III Administration Power Supply Setup The KX III provides dual power supplies, and can automatically detect and provide notification regarding the status of these power supplies. Use the Power Supply Setup page to specify whether you are using one or both of the power supplies.
  • Page 177 Chapter 3: KX III Administration Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the unit turns red. To turn off the automatic detection:  Deselect the checkbox for the appropriate power supply. To reset to factory defaults: ...
  • Page 178: Connect And Disconnect Scripts

    Chapter 3: KX III Administration Connect and Disconnect Scripts The KX III provides the ability to execute key macro scripts when connecting to or disconnecting from a target. You can create and edit your own scripts on the Connection Script page to perform additional actions when connecting to or disconnecting from targets.
  • Page 179 Chapter 3: KX III Administration 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Select All or clicking on the checkbox to the left of each target to apply the script to only select targets.
  • Page 180 Chapter 3: KX III Administration For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to the Script box. Next, select Letters from the Key Set drop-down and add a letter key to the script. 8.
  • Page 181 Chapter 3: KX III Administration...
  • Page 182 Chapter 3: KX III Administration Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connection Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to modify and click Modify. The page is then in Edit mode. 3.
  • Page 183: Port Group Management

    Chapter 3: KX III Administration 5. Click Import. The Configuration Scripts page opens and the imported scripts are displayed. To export a disconnect script: 1. Click Device Settings > Configuration Scripts. The Configuration Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to export and click Export.
  • Page 184 Chapter 3: KX III Administration Creating Port Groups The KX III supports the aggregation of multiple ports into a single port group. Port groups consist solely of ports configured as standard KVM ports. A port may only be a member of a single group. Ports that are available to be included in a port group are displayed in the Select Port for Group >...
  • Page 185 Chapter 3: KX III Administration Creating a Dual Video Port Group The dual video port groups feature allows you to group two video ports into one group. Use this feature when you need to connect to a server with two video cards/ports, and you want to access both ports from the same remote client at the same time.
  • Page 186: Changing The Default Gui Language Setting

    Chapter 3: KX III Administration Note: If a port is already a part of blade server port group, another dual video port group, or 'standard' port group, the port is not an option since ports can only belong to a single port group at a time. 3.
  • Page 187: Security Management

    From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security. Raritan web server certificates are self-signed.
  • Page 188 Chapter 3: KX III Administration To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can specify restrictions for single login, password aging, and the logging out idle users. Limitation Description Enable single login When selected, only one login per user name is limitation allowed at any time.
  • Page 189 Chapter 3: KX III Administration Limitation Description Enter the number of days after which a password change is required. The default is 60 days. Log out idle users, Select the "Log off idle users" checkbox to After (1-365 automatically disconnect users after the amount minutes) of time you specify in the "After (1-365 minutes)"...
  • Page 190 Chapter 3: KX III Administration Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KX III local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
  • Page 191 Chapter 3: KX III Administration User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option.
  • Page 192 Chapter 3: KX III Administration Option Description Users are denied access to the system for the Timer Lockout specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will be locked out.
  • Page 193 Chapter 3: KX III Administration Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX III Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX III from your browser.
  • Page 194 Chapter 3: KX III Administration Encryption mode Description AES-128 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. 128 is the key length. When AES-128 is specified, be certain that your browser supports it, otherwise you will not be able to connect.
  • Page 195 Reset (default) defaults. Enable Local Admin Resets the local administrator password only. Password Reset The password is reset to raritan. Disable All Local No reset action is taken. Resets Note: When using the P2CIM-AUSBDUAL or P2CIM-APS2DUAL to attach a target to two KX IIIs, if Private access to the targets is required, both KVM switches must have Private set as their PC Share Mode.
  • Page 196 Chapter 3: KX III Administration Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be required. The KX III uses an embedded FIPS 140-2-validated cryptographic module running on a Linux ® platform per FIPS 140-2 Implementation Guidance section G.5 guidelines.
  • Page 197: Configuring Ip Access Control

    Chapter 3: KX III Administration FIPS 140-2 Support Requirements The KX III supports the use of FIPS 140-2 approved encryption algorithms. This allows an SSL server and client to successfully negotiate the cipher suite used for the encrypted session when a client is configured for FIPS 140-2 only mode.
  • Page 198 Chapter 3: KX III Administration creating an IP Access Control list, 127.0.0.1 should not be within the range of IP addresses that are blocked or you will not have access to the KX III local port. To use IP access control: 1.
  • Page 199: Ssl Certificates

    Chapter 3: KX III Administration 3. Choose the Policy from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule #. To delete a rule: 1. Specify the rule # you want to delete. 2.
  • Page 200 Chapter 3: KX III Administration When a self-signed certificate is created, the KX III date and time are used to calculate the validity period. If the KX III date and time are not accurate, the certificate's valid from - to date range may be incorrect, causing certificate validation to fail.
  • Page 201 Chapter 3: KX III Administration  To generate self-signed certificate, do the following: a. Select the Create a Self-Signed Certificate checkbox if you need to generate a self-signed certificate. When you select this option, the KX III generates the certificate based on your entries, and acts as the signing certificate authority.
  • Page 202: Security Banner

    Chapter 3: KX III Administration Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed certificate is not matched with the private key used to generate the original CSR, the certificate will not be useful.
  • Page 203 Chapter 3: KX III Administration 5. Edit the information in the Restricted Services Banner Message text box. Up to 6000 characters can be entered or uploaded from a text file. To do this, do one of the following: a. Edit the text by manually typing in the text box. Click OK. b.
  • Page 204: Maintenance

    Chapter 3: KX III Administration Maintenance Audit Log A log is created of the KX III system events. The audit log can contain up to approximately 2K worth of data before it starts overwriting the oldest entries. To avoid losing audit log data, export the data to a syslog server or SNMP manager.
  • Page 205: Device Information

    Device Information The Device Information page provides detailed information about your KX III device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX III and CIMs: ...
  • Page 206: Creating A Kx Iii Backup And Restore File

    Chapter 3: KX III Administration  D2CIM-DVUSB-DVI  D2CIM-DVUSB-HDMI  D2CIM-DVUSB Note: Only the numeric portion of the serial numbers are displayed for the DCIM-USB, DCIM-PS2 and DCIM-USB G2 CIMs. For example, XXX1234567 is displayed. The serial number prefix GN is displayed for CIMs that have field configured serial numbers.
  • Page 207 Chapter 3: KX III Administration Create a Backup File Note: Backups are always complete system backups. Restores can be complete or partial depending on your selection. ® If you are using Internet Explorer 7 or later, to back up your KX III: 1.
  • Page 208 Chapter 3: KX III Administration Restore Your KX III Using a Restore File WARNING: Exercise caution when restoring your KX III to an earlier version. Usernames and password in place at the time of the backup will be restored. If you do not remember the old administrative usernames and passwords, you will be locked out of the KX III.
  • Page 209: Applying Kx Ii Appliance Setting To A Kx Iii Using A Backup/Restore File

    Chapter 3: KX III Administration  User and Group Restore - This option includes only user and group information. This option does not restore the certificate and the private key files. Use this option to quickly set up users on a different KX III. ...
  • Page 210: Usb Profile Management

    Raritan tech support. These profiles are designed to address the needs of your target server’s configuration, in the event that the set of standard profiles does not already address them. Raritan tech support will provide the custom profile and work with you to verify the solution for your target server’s specific needs.
  • Page 211: Upgrading Cims

    Chapter 3: KX III Administration Note: If an error or warning is displayed during the upload process (for example. overwriting an existing custom profile), you may continue with the upload by clicking Upload or cancel it by clicking on Cancel. To delete a custom profile to your KX III: 1.
  • Page 212: Upgrading The Kx Iii Firmware

    - doing so will likely result in damage to the unit or CIMs. To upgrade your KX III unit: 1. Locate the appropriate Raritan firmware distribution file (*.RFP) on Raritan website http://www.raritan.com on the Firmware Upgrades web page.
  • Page 213: Upgrade History

    Chapter 3: KX III Administration Note: At this point, connected users are logged out, and new login attempts are blocked. 6. Click Upgrade. Please wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the unit reboots (1 beep sounds to signal that the reboot has completed).
  • Page 214 Chapter 3: KX III Administration To reboot your KX III: 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot.
  • Page 215: Stopping Cc-Sg Management

    Chapter 3: KX III Administration Stopping CC-SG Management While the KX III is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC-SG management. If you are managing the KX III through CC-SG and connectivity between CC-SG and the KX III is lost after the specified timeout interval (typically 10 minutes), you are able to end the CC-SG management session from the KX III console.
  • Page 216: Diagnostics

    Chapter 3: KX III Administration 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed. Diagnostics Network Interface Page The KX III provides information about the status of your network interface. To view information about your network interface: ...
  • Page 217 Chapter 3: KX III Administration  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one displayed here.
  • Page 218: Ping Host Page

    Chapter 3: KX III Administration  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field. Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network.
  • Page 219: Trace Route To Host Page

    Chapter 3: KX III Administration 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232 characters in length. 3. Click Ping. The results of the ping are displayed in the Result field. Trace Route to Host Page Trace route is a network tool used to determine the route taken to the provided hostname or IP address.
  • Page 220: Device Diagnostics

    Chapter 3: KX III Administration Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. Device diagnostics downloads the diagnostics information from the KX III to the client machine. Two operations can be performed on this page: ...
  • Page 221: Kx Iii Local Console - Kx Iii Administration Functions

    Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support. KX III Local Console - KX III Administration Functions The KX III provides at-the-rack access and administration via its local port.
  • Page 222: Security And Authentication

    Chapter 3: KX III Administration Security and Authentication In order to use the KX III Local Console, you must first authenticate with a valid username and password. The KX III provides a fully-integrated authentication and security scheme, whether your access is via the network or the local port. In either case, the KX III allows access only to those servers to which a user has access permissions.
  • Page 223 Local language input is not supported at this time for KX III Local Console functions. Note: If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Select the Local Port Hotkey 1.
  • Page 224 Chapter 3: KX III Administration Hot key: Take this action: Double Click Scroll Lock Press Scroll Lock key twice quickly Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key Press the left Alt key twice quickly Double Click Left Shift key...
  • Page 225 Chapter 3: KX III Administration The connect key works for both standard servers and blade chassis. Configure the Power Save Feature (Optional) 1. If you would like to use the power save feature: a. Select the Power Save Mode checkbox. b.
  • Page 226: Command Line Interface (Cli)

    Chapter 3: KX III Administration This option is recommended for secure environments only. Command Line Interface (CLI) Overview The Command Line Interface(CLI) can be used to configure the KX III network interface and perform diagnostic functions provided you have the appropriate permissions to do so. The following figures describe an overview of the CLI commands.
  • Page 227: Accessing The Kx Iii Using Cli

    Chapter 3: KX III Administration Accessing the KX III Using CLI Access the KX III by using one of the following methods:  SSH (Secure Shell) via IP connection A number of SSH clients are available and can be obtained from the following locations: ...
  • Page 228: Logging In

    Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default password: raritan The welcome message displays. You are now logged on as an administrator. After reviewing the following...
  • Page 229 Chapter 3: KX III Administration CLI Syntax -Tips and Shortcuts Tips  Commands are listed in alphabetical order.  Commands are not case sensitive.  Parameter names are single word without underscore.  Commands without arguments default to show current settings for the command.
  • Page 230: Initial Configuration Using Cli

    1. Reset the administrator password. All KX III devices are shipped with the same default password. Therefore, to avoid security breaches it is imperative that you change the admin password from raritan to one customized for the administrators who will manage the KX III device.
  • Page 231: Cli Prompts

    Chapter 3: KX III Administration The KX III now has the basic configuration and can be accessed remotely via SSH, GUI, or locally using the local serial port. The administrator needs to configure the users and groups, services, security, and serial ports to which the serial targets are attached to the KX III.
  • Page 232: Administering The Kx Iii Console Server Configuration Commands

    Chapter 3: KX III Administration  Enter admin > config > network. Command Description help Display overview of commands. history Display the current session's command line history. interface Set/get network parameters. ipv6_interface Set/get IPv6 network parameters. logout Logout of the current CLI session. name Device name configuration.
  • Page 233 Chapter 3: KX III Administration Commands Description ipv6 Set/get IPv6 network parameters. Interface Command The Interface command is used to configure the KX III network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters ipauto <none|dhcp>...
  • Page 234: Dual Video Port Groups

    Chapter 3: KX III Administration Name Command The name command is used to configure the network name. The syntax of the name is: name [devicename <devicename>] [hostname <hostname>] Device name configuration devicename <devicename> Device Name hostname <hostname> Preferred host name (DHCP only) Name Command Example The following command sets the network name:...
  • Page 235: Recommendations For Dual Port Video

     Client PC’s primary and secondary displays  Raritan device’s dual video port group configuration  Target server’s primary and secondary displays Only the following Client Launch Settings will be applied to dual port video displays: ...
  • Page 236: Cims Required For Dual Video Support

    Linux Intelligent and Linux users may experience Standard Mouse display and mouse movement Modes issues using single mouse mode. Raritan recommends Linux users do not use Single Mouse mode. ® operating Single Mouse Mode For Mac targets with multiple system monitors, use a standard mouse in Single-Cursor mode.
  • Page 237: Permissions And Dual Video Port Group Access

    Chapter 3: KX III Administration  Other - Enable Single Mouse Cursor setting will NOT be applied  Other - Enable Scale Video setting will be applied  Other - Pin Menu Toolbar setting will be applied  Dragging and moving items between windows on the primary and secondary target requires a release and press of the mouse button as the item is moved from one window to the other.
  • Page 238: Example Dual Port Video Group Configuration

    Chapter 3: KX III Administration Example Dual Port Video Group Configuration The following is a general example. Your configuration may vary in the type of CIMs used, the port you designate as the primary port, the ports you are connecting to and so on. In this example, we are using: ...
  • Page 239: Dual Port Video Configuration Steps

    Chapter 3: KX III Administration Diagram key Connection from the target's primary (first) video port to the KX III Connection from the target's secondary (second) video port to the KX III IP connection between the KX III and remote client Target server - configure the display settings and launch the dual port video group Display settings are the same on the remote client and...
  • Page 240 USB cables to available USB ports on the target. 3. Connect each CIM to the Raritan device using a CAT5/6 cable. 4. If you have not already done so: a. Connect the Raritan device to an AC power source using the provided power cable b.
  • Page 241 Chapter 3: KX III Administration Step 3: Configure the Mouse Mode and Ports Once you have connected the target server to the Raritan device through the target server video ports, it detects the connection and displays the ports on the Port Configuration page.
  • Page 242: Raritan Client Navigation When Using Dual Video Port Groups

    For example, if you are using extended desktop mode, the port windows can be moved between monitors. Raritan Client Navigation when Using Dual Video Port Groups When using full screen mode in the clients, switch between ports by: ...
  • Page 243: Updating The Ldap Schema

    Chapter 3: KX III Administration Direct Port Access and Dual Port Video Groups Direct port access allows users to bypass having to use the device's Login dialog and Port Access page. This feature also provides the ability to enter a username and password directly to proceed to the target, if the username and password is not contained in the URL.
  • Page 244 Chapter 3: KX III Administration From LDAP/LDAPS When an LDAP/LDAPS authentication is successful, the KX III determines the permissions for a given user based on the permissions of the user's group. Your remote LDAP server can provide these user group names by returning an attribute named as follows: rciusergroup attribute type: string...
  • Page 245: Setting The Registry To Permit Write Operations To The Schema

    Chapter 3: KX III Administration Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: ®...
  • Page 246: Adding Attributes To The Class

    Chapter 3: KX III Administration 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
  • Page 247 Chapter 3: KX III Administration 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
  • Page 248: Updating The Schema Cache

    Chapter 3: KX III Administration 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: ®...
  • Page 249 Chapter 3: KX III Administration 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain. 5. In the left pane of the window, select the CN=Users folder.
  • Page 250 Chapter 3: KX III Administration 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties. 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list.
  • Page 251: Chapter 4 Virtual Media

    Chapter 4 Virtual Media In This Chapter Overview ....................239 Prerequisites for Using Virtual Media ............ 240 Mounting Local Drives ................241 Supported Tasks Via Virtual Media ............241 Supported Virtual Media Types ............. 242 Supported Virtual Media Operating Systems ........242 Number of Supported Virtual Media Drives ...........
  • Page 252: Prerequisites For Using Virtual Media

    Chapter 4: Virtual Media Prerequisites for Using Virtual Media KX III Virtual Media Prerequisites  For users requiring access to virtual media, the KX III permissions must be set to allow access to the relevant ports, as well as virtual media access (VM Access port permission) for those ports.
  • Page 253: Mounting Local Drives

    Chapter 4: Virtual Media Mounting Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives. Notes on Mounting Local Drives ®...
  • Page 254: Supported Virtual Media Types

    USB mass storage devices  PC hard drives  ISO images (disk images) ISO9660 is the standard supported by Raritan. However, other ISO standards can be used.  Digital audio devices* Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations: ...
  • Page 255: Number Of Supported Virtual Media Drives

    Chapter 4: Virtual Media Number of Supported Virtual Media Drives With the virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session.
  • Page 256: Mounting Cd-Rom/Dvd-Rom/Iso Images

    You can access the media just like any other drive. Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1.
  • Page 257: Virtual Media In A Windows Xp Environment

    Chapter 4: Virtual Media 4. For remote ISO images on a file server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Image from the drop-down list. The file servers and image paths available are those that you configured using the File Server Setup page.
  • Page 258: Virtual Media In A Linux Environment

    Chapter 4: Virtual Media Virtual Media in a Linux Environment Active System Partitions You cannot mount active system partitions from a Linux client. Linux Ext3/4 drive partitions need to be unmounted via umount /dev/<device label> prior to a making a virtual media connection. Drive Partitions The following drive partition limitations exist across operating systems: ...
  • Page 259: Virtual Media File Server Setup (File Server Iso Images Only)

    This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. Note: SMB/CIFS support is required on the file server. Use the Remote Console File Server Setup page to designate the files server(s) and image paths that you want to access using virtual media.
  • Page 260: Chapter 5 Virtual Kvm Client (Vkc) Help

    Chapter 5 Virtual KVM Client (VKC) Help In This Chapter Overview ....................249 Recommended Minimum Virtual KVM Client (VKC) Requirements ..249 Virtual KVM Client Java Requirements - KX III ........250 Proxy Server Configuration for Use with Virtual KVM Client (VKC) and Active KVM Client (AKC) ...............
  • Page 261: In This Chapter Overview

    IMPORTANT: Refreshing your browser closes the Virtual KVM Client connection, so exercise caution. Recommended Minimum Virtual KVM Client (VKC) Requirements Raritan recommends the Virtual KVM Client (VKC) machines meet the following minimum requirements for use with KX III.  Client machine with either a - ...
  • Page 262: Virtual Kvm Client Java Requirements - Kx Iii

    Chapter 5: Virtual KVM Client (VKC) Help Virtual KVM Client Java Requirements - KX III ™ Java 1.7 is required to use the Java-based Virtual KVM Client (VKC). Proxy Server Configuration for Use with Virtual KVM Client (VKC) and Active KVM Client (AKC) When the use of a Proxy Server is required, a SOCKS proxy must also be provided and configured on the remote client PC.
  • Page 263: Connect To A Target From Virtual Kvm Client (Vkc) Or Active Kvm Client (Akc)

    Chapter 5: Virtual KVM Client (VKC) Help Connect to a Target from Virtual KVM Client (VKC) or Active KVM Client (AKC) Once you have logged on to the KX III Remote Console, access target servers via the Virtual KVM Client (VKC) or Active KVM Client (AKC). To connect to an available server: 1.
  • Page 264: Configuring Connection Properties

    Chapter 5: Virtual KVM Client (VKC) Help Configuring Connection Properties Access Connection Properties To access connection properties: Click Connection > Properties, or click the Connection... icon to open the Connection Properties dialog. About Connection Properties The Virtual KVM Client (VKC) and Active KVM Client (AKC) support connection property management.
  • Page 265: Default Connection Property Settings - Optimized For Best Performance

    Chapter 5: Virtual KVM Client (VKC) Help Default Connection Property Settings - Optimized for Best Performance KX III comes configured to provide optimal performance for the majority of video streaming conditions. Default connection settings are:  Optimized for: Text Readability - video modes are designed to maximize text readability.
  • Page 266: Optimize For: Selections

    Chapter 5: Virtual KVM Client (VKC) Help Optimize for: Selections Text Readability When Text Readability is selected, all video modes are designed to provide high-quality, readable text. This setting is ideal when working with computer GUIs, such as when performing server administration and so on. When working in full color video modes, a slight contrast boost is provided, and text is sharper.
  • Page 267: Noise Filter

    Chapter 5: Virtual KVM Client (VKC) Help In general, moving the slider to the left results in higher quality at the cost of higher bandwidth and, in some cases, lower frame rate. Moving the slider to the right enables stronger compression, reducing the bandwidth per frame, but video quality is reduced.
  • Page 268: Connection Information

    Horizontal Resolution - The target server horizontal resolution.  Vertical Resolution - The target server vertical resolution.  Refresh Rate - Refresh rate of the target server.  Protocol Version - Raritan communications protocol version. Access and Copy Connection Information...
  • Page 269: Usb Profiles

    Chapter 5: Virtual KVM Client (VKC) Help Steps Click Connection > Info... to open the Connection Info dialog. Click Copy to Clipboard. Paste the information in a file of your choosing. USB Profiles Set a USB profile for a target server from the Virtual KVM Client (VKC) by clicking USB Profile in the menu, then selecting from the menu choices.
  • Page 270: Keyboard

    Chapter 5: Virtual KVM Client (VKC) Help Keyboard Send Ctrl+Alt+Del Macro Due to its frequent use, a Ctrl+Alt+Delete macro is preprogrammed. Selecting Keyboard > Send Ctrl+Alt+Del, or clicking on the Ctrl+Alt+Delete button in the toolbar sends this key sequence to the server or to the KVM switch to which you are currently connected.
  • Page 271: Keyboard Macros

    Chapter 5: Virtual KVM Client (VKC) Help 4. Click OK. Keyboard Macros Keyboard macros ensure that keystroke combinations intended for the target server are sent to and interpreted only by the target server. Otherwise, they might be interpreted by the computer on which the Virtual KVM Client (VKC) is running (your client PC).
  • Page 272: Import Macros

    Chapter 5: Virtual KVM Client (VKC) Help a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step and then click the up or down arrow buttons to reorder them as needed.
  • Page 273: Export Macros

    Chapter 5: Virtual KVM Client (VKC) Help  Click Yes to replace the existing macro with the imported version.  Click Yes to All to replace the currently selected and any other duplicate macros that are found.  Click No to keep the original macro and proceed to the next macro ...
  • Page 274: Video Properties

    Chapter 5: Virtual KVM Client (VKC) Help 4. Select the folder to save the macro file to, enter a name for the file and click Save. If the macro already exists, you receive an alert message. 5. Select Yes to overwrite the existing macro or No to close the alert without overwriting the macro.
  • Page 275: Calibrating Color

    Chapter 5: Virtual KVM Client (VKC) Help Calibrating Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The color settings are on a target server-basis. Note: The Calibrate Color command applies to the current connection only.
  • Page 276 Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor.
  • Page 277: Screenshot From Target Command (Target Screenshot)

    Chapter 5: Virtual KVM Client (VKC) Help Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
  • Page 278: Mouse Options

    Chapter 5: Virtual KVM Client (VKC) Help Mouse Options You can operate in either single mouse mode or dual mouse mode. When in a dual mouse mode, and provided the option is properly configured, the mouse cursors align. When controlling a target server, the Remote Console displays two mouse cursors - one belonging to your KX III client workstation, and the other belonging to the target server.
  • Page 279: Dual Mouse Modes

    Chapter 5: Virtual KVM Client (VKC) Help Dual Mouse Modes Absolute Mouse Synchronization In this mode, absolute coordinates are used to keep the client and target cursors in synch, even when the target mouse is set to a different acceleration or speed. This mode is supported on servers with USB ports and is the default mode for virtual media CIMs.
  • Page 280 To be sure to avoid any problems with this function, Raritan recommends you do not have file icons or folder icons in the upper left corner of your desktop.
  • Page 281 Chapter 5: Virtual KVM Client (VKC) Help Standard Mouse Mode Standard Mouse mode uses a standard mouse synchronization algorithm. The algorithm determines relative mouse positions on the client and target server. In order for the client and target mouse cursors to stay in synch, mouse acceleration must be disabled.
  • Page 282: Tool Options

    Chapter 5: Virtual KVM Client (VKC) Help Single Mouse Mode Single Mouse mode uses only the target server mouse cursor; the client mouse cursor no longer appears onscreen. Note: Single mouse mode does not work on Windows or Linux targets when the client is running on a Virtual Machine.
  • Page 283 Chapter 5: Virtual KVM Client (VKC) Help  Japanese  United Kingdom  Korean (Korea)  French (Belgium)  Norwegian (Norway)  Portuguese (Portugal)  Danish (Denmark)  Swedish (Sweden)  German (Switzerland)  Hungarian (Hungary)  Spanish (Spain)  Italian (Italy) ...
  • Page 284 Turkish Keyboards If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
  • Page 285: Client Launch Settings

    Chapter 5: Virtual KVM Client (VKC) Help Language Configuration method Japanese System Settings (Control Center) System Settings (Control Center) Korean System Settings (Control Center) Belgian Keyboard Indicator Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Keyboard Indicator Hungarian System Settings (Control Center) Spanish System Settings (Control Center) Italian...
  • Page 286 Chapter 5: Virtual KVM Client (VKC) Help b. Use 'Select From Detected Monitors' to select from a list of monitors that are currently detected by the application. If a previously selected monitor is no longer detected, 'Currently Selected Monitor Not Detected' is displayed. ...
  • Page 287: Configuring Port Scan Settings In Vkc And Akc

    Chapter 5: Virtual KVM Client (VKC) Help Configuring Port Scan Settings in VKC and AKC Configuring port scan options in VKC and AKC applies to scanning from the KX III Remote Console. To configure port scan options for the Local Console, see Configure Local Console Scan Settings (on page 326)
  • Page 288: Collecting A Diagnostic Snapshot Of The Target

    The "snapshot" function generate log files and image files from the target. It then bundles these files in a zip file that can be sent to Raritan Technical Support in order to help diagnose technical problems you may be encountering.
  • Page 289 Chapter 5: Virtual KVM Client (VKC) Help  Log.txt file: These are the client logs. Note that the logs are included even if you have not enabled information to be captured in them. VKC uses internal memory to capture the information in this case. Collect a Diagnostic Snapshot from the Virtual KVM Client (VKC) or Active KVM Client (AKC)
  • Page 290 Chapter 5: Virtual KVM Client (VKC) Help To capture a diagnostic snapshot: Steps Access a target via Virtual KVM Client (VKC) or Active KVM Client (AKC), and then click Tools > Collect a Diagnostic Snapshot. Several messages are displayed as the information is collected. You are prompted to save the zip file containing the diagnostic files.
  • Page 291: View Options

    Chapter 5: Virtual KVM Client (VKC) Help The zip file containing the diagnostic files that were collecting opens. View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off): ...
  • Page 292: Connect To Virtual Media

    Chapter 5: Virtual KVM Client (VKC) Help Full Screen Mode When you enter Full Screen mode, the target's full screen is displayed and acquires the same resolution as the target server. The hot key used for exiting this mode is specified in the Options dialog, Tool Options (on page 270).
  • Page 293: Smart Cards

    Chapter 5: Virtual KVM Client (VKC) Help Smart Cards Using the KX III, you are able to mount a smart card reader onto a target server to support smart card authentication and related applications. For a list of supported smart cards, smart card readers, and additional system requirements, see Smart Card Minimum System Requirements, CIMs and Supported/Unsupported Smart Card...
  • Page 294: Smart Card Reader Detected

    Chapter 5: Virtual KVM Client (VKC) Help Smart Card Reader Detected After a KVM session is established with a target server, a Smart Card menu and button are available in VKC and AKC. Once the Smart Card button is selected or Smart Card is selected from the menu, the smart card readers that are detected as attached to the remote client are displayed in a dialog.
  • Page 295: Update A Smart Card Reader

    Chapter 5: Virtual KVM Client (VKC) Help Update a Smart Card Reader To update the smart card in the Select Smart Card Reader dialog:  Click Refresh List if a new smart card reader has been attached to the client PC. Send Smart Card Remove and Reinsert Notifications To send smart card remove and reinsert notifications to the target:...
  • Page 296: Digital Audio

    Note: Audio CDs are not supported by virtual media so they do not work with the audio feature. Before you begin using the audio feature, Raritan recommends you review the audio related information documented in the following sections of Help: ...
  • Page 297: Digital Audio Vkc And Akc Icons

    Chapter 5: Virtual KVM Client (VKC) Help Digital Audio VKC and AKC Icons Audio Icon name Description icons Speaker These icons are located in status bar at the bottom of the client window. Green, blinking waves indicate an audio playback session is currently streaming. A black speaker icon is displayed when the session is muted.
  • Page 298: Recommendations For Audio Connections When Pc Share Mode Is Enabled

    Chapter 5: Virtual KVM Client (VKC) Help Recommendations for Audio Connections when PC Share Mode is Enabled If you are using the audio feature while running PC Share mode, audio playback and capture are interrupted if an additional audio device is connected to the target.
  • Page 299 Chapter 5: Virtual KVM Client (VKC) Help In practice, the bandwidth used when an audio device connects to a target is higher due to the keyboard and video data consumed when opening and using an audio application on the target. A general recommendation is to have at least a 1.5MB connection before running playback and capture.
  • Page 300: Saving Audio Settings

    Chapter 5: Virtual KVM Client (VKC) Help Saving Audio Settings Audio device settings are applied on a per KX III device basis. Once the audio devices settings are configured and saved on the KX III, the same settings are applied to it. ®...
  • Page 301: Connecting And Disconnecting From A Digital Audio Device

    Chapter 5: Virtual KVM Client (VKC) Help Operating System Audio Playback Support Review the table shown here to see which Raritan client works with audio playback/capture for each operating system: Operating system Audio playback and capture supported  Windows ®...
  • Page 302 Chapter 5: Virtual KVM Client (VKC) Help 6. Select the audio format for the playback device from the Format: drop-down. Note: Select the format that you wish to use based on the available network bandwidth. Formats with lower sampling rates consume less bandwidth and may tolerate more network congestion.
  • Page 303 Chapter 5: Virtual KVM Client (VKC) Help A Speaker icon is displayed in the status bar at the bottom of the client window. It is grayed out when no audio is being used. When the Speaker icon and Microphone icon are displayed in the status bar, the session is being captured as it is streamed.
  • Page 304: Adjusting Capture And Playback Buffer Size (Audio Settings)

    Chapter 5: Virtual KVM Client (VKC) Help Adjusting Capture and Playback Buffer Size (Audio Settings) Once an audio device is connected, the capture and playback buffer size can be adjusted as needed. This feature is useful for controlling the quality of the audio, which may be impacted by bandwidth limitations or network spikes.
  • Page 305: Remote Power Management Via Virtual Kvm Client (Vkc) Or Active Kvm Client (Akc)

    Version Information - Virtual KVM Client This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support. To obtain version information: 1. Choose Help > About Raritan Virtual KVM Client.
  • Page 306: In This Chapter Overview

    Virtual KVM Client (VKC) Help (on page 248). Recommended Minimum Active KVM Client (AKC) Requirements Raritan recommends the Active KVM Client (AKC) machines meet the following minimum requirements for use with KX III.  Client machine with either a - ...
  • Page 307: Akc Supported Microsoft .Net Framework

    .NET installed, you will receive a message instructing you to check the .NET version. ® Note: Raritan recommends Windows XP operating system users verify you have a working version of .NET 3.5 or 4.0 already installed before you launch AKC.
  • Page 308: Active Kvm Client (Akc)

    Windows Vista , Windows 7 and Windows 2008 server users should ensure that Protected Mode is not on when accessing the Raritan device. Enable AKC Download Server Certificate Validation If the Raritan device (or CC-SG) administrator has enabled the Enable AKC Download Server Certificate Validation option: ...
  • Page 309: Connect To A Target From Virtual Kvm Client (Vkc) Or Active Kvm Client (Akc)

    Chapter 6: Active KVM Client (AKC) Help ™ 2. Next, configure the proxy settings for the Java applets: a. Select Control Panel > Java. b. On the General tab, click Network Settings. The Network Settings dialog opens. c. Select "Use Proxy Server". d.
  • Page 310: Remotely Access Targets Using A Mobile Device

    Chapter 7 Mobile KVM Client (MKC) Help In This Chapter Remotely Access Targets Using a Mobile Device ........ 298 Connect to a Target Using the Mobile KVM Client ........ 299 Touch Mouse Functions ................ 299 Using the MKC Toolbar ................. 300 Display Mobile Device Keyboard ............
  • Page 311: Connect To A Target Using The Mobile Kvm Client

    Chapter 7: Mobile KVM Client (MKC) Help Connect to a Target Using the Mobile KVM Client Mobile access using the Mobile Access Client requires the use of CommandCenter Secure Gateway (CC-SG). Enable pop-ups in your mobile device browser before accessing Mobile KVM Client (MKC) or CC-SG Mobile Access Client.
  • Page 312: Using The Mkc Toolbar

    Chapter 7: Mobile KVM Client (MKC) Help Using the MKC Toolbar The MKC toolbar may not be completely visible at one time, depending on the resolution of your mobile device. To view the whole toolbar:  Touch and swipe to move the toolbar icons to the left and right, bringing different icons into view.
  • Page 313 Chapter 7: Mobile KVM Client (MKC) Help Touch and swipe the toolbar to the left, to view the F5 through F12 icons. Swipe the toolbar back to the right to return to the default view. On a mobile phone device, such as an iPhone, you will see fewer icons. Use the same touch-and-swipe motion left and right to view additional icons.
  • Page 314: Display Mobile Device Keyboard

    Chapter 7: Mobile KVM Client (MKC) Help Display Mobile Device Keyboard Toggle on and off the MKC keyboard to display or hide it. The keyboard is configured on the mobile device. For example, on iPad choose Settings > General > Keyboard > International Keyboards to see the available keyboards or to add a keyboard.
  • Page 315: Set Keyboard Type

    Chapter 7: Mobile KVM Client (MKC) Help Set Keyboard Type The default keyboard in MKC is US/International English. Select the language keyboard to match the language keyboard setting of the target you are accessing. This is required to provide the correct keyboard mapping in the target.
  • Page 316: Manage Mobile Client Keyboard Macros

    Chapter 7: Mobile KVM Client (MKC) Help Manage Mobile Client Keyboard Macros Each user must import their user-defined keyboard macros to make them available for use while connected to targets using the Mobile KVM Client (MKC). Export the file from Virtual KVM Client (VKC), then import it using the desktop Access Client.
  • Page 317: Absolute Mouse Mode

    Chapter 7: Mobile KVM Client (MKC) Help 2. Touch Mouse Mode, then touch Absolute, Intelligent, or Standard. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in synch, even when the target mouse is set to a different acceleration or speed.
  • Page 318: Sync Mouse In Intelligent Or Standard Mouse Mode

    Chapter 7: Mobile KVM Client (MKC) Help Sync Mouse in Intelligent or Standard Mouse Mode In Intelligent or Standard mouse mode, the Sync Mouse command forces realignment of the target server mouse pointer with the MKC mouse pointer. To sync mouse: 1.
  • Page 319: View Mkc Help

    Chapter 7: Mobile KVM Client (MKC) Help View MKC Help Descriptions of the touchscreen techniques can be accessed in MKC. To view MKC help:  Touch the Help icon (?) icon in the toolbar. The help opens.  Touch Mouse Functions (on page 299) to view this information.
  • Page 320: In This Chapter Overview

    Chapter 8 KX III Remote Console In This Chapter Overview ....................308 Scanning Ports - Remote Console ............309 Changing a Password ................314 Managing Favorites ................315 Overview When you log in to the KX III via a network connection, you access the Remote Console.
  • Page 321: Scanning Ports - Remote Console

    Chapter 8: KX III Remote Console Scanning Ports - Remote Console Use the port scanning feature to search for selected targets and display them in individual thumbnails as part of a slide show. This feature allows you to monitor up to 32 targets at one time since you can view each target server individually as it is displayed during the slide show.
  • Page 322: Scanning Ports Slide Show - Remote Console

    Chapter 8: KX III Remote Console Scanning Ports Slide Show - Remote Console When you start a scan, the Port Scan window opens. As each target is found, it is displayed as a thumbnail in a slide show. The slide show scrolls through the target thumbnails based on the default interval of 10 seconds or according to the interval you specify.
  • Page 323: Target Status Indicators During Port Scanning - Remote Console

    Chapter 8: KX III Remote Console Target Status Indicators During Port Scanning - Remote Console The status of each target is indicated by green, yellow and red lights that are displayed below the target thumbnail. As the target is the focus of the rotation, the indicator is in the task bar also shows the status.
  • Page 324: Using Scan Port Options

    Chapter 8: KX III Remote Console Using Scan Port Options Following are options available to you while scanning targets. With the exception of the Expand/Collapse icon, all of these options are selected from the Options menu in the upper left of the Port Scan viewer. The options will return to their defaults when you close the window.
  • Page 325: Scan For Targets

    Chapter 8: KX III Remote Console Scan for Targets To scan for targets: 1. Click the Set Scan tab on the Port Access page. 2. Select the targets you want to include in the scan by selecting the checkbox to the left of each target, or select the checkbox at the top of the target column to select all targets.
  • Page 326: Changing A Password

    Chapter 8: KX III Remote Console Changing a Password To change your KX III password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
  • Page 327: Managing Favorites

    Chapter 8: KX III Remote Console Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: ...
  • Page 328: Enable Favorites

    Chapter 8: KX III Remote Console Enable Favorites  Click Enable in the Favorite Devices section of the left panel of the KX III interface. Once enabled, the Enable button becomes a Disable button.
  • Page 329: Access And Display Favorites

    Chapter 8: KX III Remote Console Access and Display Favorites To access a favorite KX III device:  Click the device name (listed beneath Favorite Devices). A new browser opens to that device. To display favorites by name:  Click Display by Name. To display favorites by IP Address: ...
  • Page 330: Discovering Devices On The Kx Iii Subnet

    This feature allows multiple KX III devices to interoperate and scale automatically. The KX III Remote Console automatically discovers the KX III devices, and any other Raritan device, in the subnet of the KX III. To discover devices on the device subnet: 1.
  • Page 331: In This Chapter Overview

    Chapter 9 KX III Local Console In This Chapter Overview ....................319 Accessing a Target Server ..............319 Local Console Video Resolutions ............320 Simultaneous Users ................320 Local Port Hot Keys and Connect Keys ..........320 Scanning Ports - Local Console ............323 Local Console Smart Card Access ............
  • Page 332: Local Console Video Resolutions

    Chapter 9: KX III Local Console Local Console Video Resolutions Once a monitor is connected to the KX III Local Console, KX III detects the native resolution of the monitor. This is typically the highest resolution supported by the monitor. As long as the monitor's native resolution is supported by the Local Console, KX III uses that resolution.
  • Page 333: Return To The Kx Iii Local Console From A Target Server - Default Hot Key

    Chapter 9: KX III Local Console Return to the KX III Local Console from a Target Server - Default Hot Key To return to the KX III Local Console from the target server:  Press the Scroll Lock hot key twice rapidly The video display switches from the target server interface to the KX III Local Console interface.
  • Page 334: Special Sun Key Combinations

    Chapter 9: KX III Local Console Standard servers Connect key action Key sequence example  Double Click Scroll Lock Special Sun Key Combinations Microsystems server’s special ™ The following key combinations for Sun keys operate on the local port. These special are available from the Keyboard menu when you connect to a Sun target server: Sun key Local port key combination...
  • Page 335: Scanning Ports - Local Console

    Chapter 9: KX III Local Console Scanning Ports - Local Console Use the port scanning feature to search for selected targets and display them in individual thumbnails as part of a slide show. This feature allows you to monitor up to 32 targets at one time since you can view each target server individually as it is displayed during the slide show.
  • Page 336: Scanning Port Slide Show - Local Console

    Chapter 9: KX III Local Console Scanning Port Slide Show - Local Console When you start a scan, the Port Scan window opens. As each target is found, it is displayed as a thumbnail in a slide show. The slide show scrolls through the target thumbnails based on the default interval of 10 seconds or according to the interval you specify.
  • Page 337 Chapter 9: KX III Local Console...
  • Page 338: Target Status Indicators During Port Scanning - Local Console

    Chapter 9: KX III Local Console Target Status Indicators During Port Scanning - Local Console In thumbnail view on the Local Console, the status of each target is indicated below the thumbnail on the page until it is the focus of the slide show view.
  • Page 339: Local Console Smart Card Access

    Chapter 9: KX III Local Console  Display Interval - changes the scan display interval.  Interval Between Ports - change interval between switching different port during scan. Scan for Targets - Local Console To scan for targets: 1. Click the Set Scan tab on the Port Access page. 2.
  • Page 340 Chapter 9: KX III Local Console 2. From the Local Console, click Tools. 3. Select the smart card reader from the Card Readers Detected list. Select None from the list if you do not want a smart card reader mounted. 4.
  • Page 341: Local Console Usb Profile Options

    Chapter 9: KX III Local Console Local Console USB Profile Options From the USB Profile Options section of the Tools page, you can choose from the available USB profiles. The ports that can be assigned profiles are displayed in the Port Name field and the profiles that are available for a port appear in the Select Profile To Use field after the port is selected.
  • Page 342: Kx Iii Local Console Factory Reset

    Chapter 9: KX III Local Console KX III Local Console Factory Reset Note: It is recommended that you save the audit log prior to performing a factory reset. The audit log is deleted when a factory reset is performed and the reset event is not logged in the audit log.
  • Page 343 Chapter 9: KX III Local Console 2. Use a pointed object to press and hold the Reset button. 3. While continuing to hold the Reset button, power the KX III device back on. 4. Continue holding the Reset button for 10 seconds.
  • Page 344: Functionality

    An extended local port extends the reach of the local port beyond the rack the KX II is located, for example to another KVM switch. This can be achieved by configuring a KX III to work with a Raritan Cat5 Reach DVI transmitter and receiver, which are then connected to a remote console or other device.
  • Page 345: Connect A Kx Iii And Cat5 Reach Dvi

    4. Connect the local console ports of the KVM switch to the transmitter. a. Plug one end of the Raritan-provided DVI cable into the DVI-I IN port on the transmitter, and the other end into the KVM switch's video port.
  • Page 346 Appendix A: Connecting a KX III and Cat5 Reach DVI - Provide Extended Local Port Functionality 5. Turn on the KVM switch. Tip: The local or remote console can be equipped with a KVM drawer instead of a set of keyboard, mouse and monitor. See the illustration below.
  • Page 347 Appendix A: Connecting a KX III and Cat5 Reach DVI - Provide Extended Local Port Functionality 5. Turn on both KVM switches. To increase the distance between any computer and a KVM switch: 1. Set up an optional local console with the transmitter. 2.
  • Page 348: Overview

    Appendix B Accessing a Paragon II from the KX In This Chapter Overview ....................336 Supported Paragon II CIMS and Configurations ........337 Connecting the Paragon II to the KX III ..........342 Overview Connect the Paragon II system to a KX III device that is managed by CC- SG so that Paragon II is accessible from CC-SG.
  • Page 349: Supported Paragon Ii Cims And Configurations

    Appendix B: Accessing a Paragon II from the KX III When you access the Paragon II system from KX III or CC-SG (if the KX III is managed by CC-SG), the Paragon II OSUI login screen appears for you to log in. In this integration, you can perform any OSUI functions implemented with current Paragon II firmware or any KX III function implemented with current KX III firmware except for the virtual media feature.
  • Page 350 Appendix B: Accessing a Paragon II from the KX III Paragon CIM Supports Does not support   Virtual media P2CIM-AUSBDUAL Servers with USB- or ™ USB-type  Smart cards keyboard and mouse  Absolute Mouse ports mode  Automatic skew ...
  • Page 351: Kx Iii-To-Kx Iii Paragon Cim Guidelines

    Appendix B: Accessing a Paragon II from the KX III KX III-to-KX III Paragon CIM Guidelines The following system configuration guidelines should be followed when you are using Paragon CIMs in a KX III-to-KX III configuration: Concurrent Access Both KX III KVM switches should be configured with the same policy for concurrent access to targets - both PC-Share or both Private.
  • Page 352: Kx Iii-To-Paragon Ii Guidelines

    Appendix B: Accessing a Paragon II from the KX III If a connection to the target is in place from the other KX III, the availability is checked when a connection is attempted. Access is denied or allowed consistent with the PC-Share policy in place for the KX III. Until that time, the availability is not be updated on the other KX III.
  • Page 353: Supported Connection Distances Between Paragon Ii And Kx Iii

    Appendix B: Accessing a Paragon II from the KX III Paragon II Mode description Supported? operation mode port can be selected and Timeout, which is configured controlled by more than on the Paragon II, is not one user, but only one supported.
  • Page 354: Connecting The Paragon Ii To The Kx Iii

    Appendix B: Accessing a Paragon II from the KX III Connecting the Paragon II to the KX III To connect the Paragon II system to a KX III: 1. Check whether the Paragon II user station that you want to connect to the KX III is implemented with version 4.6 firmware (or later).
  • Page 355: In This Chapter Overview

    Visualize the KX III in a Cabinet Elevation and on the Floor Map ..348 Managing the KX III Lifecycle ..............349 Overview ® Raritan's dcTrack is a complete Data Center Infrastructure Management (DCIM) solution that provides you with real-time information about your facilities, networks and IT.
  • Page 356: Locate Space In A Cabinet For The Kx Iii

    Appendix C: Managing KX III in dcTrack Locate Space in a Cabinet for the KX III Use dcTrack's Capacity Management functionality to locate space in a cabinet in your data center for the KX III. Search by:  Rack units - dcTrack looks for a cabinet with enough rack units open to accommodate the KX III...
  • Page 357: Add Kx Iii Devices To Dctrack

    Appendix C: Managing KX III in dcTrack  Make and model - dcTrack looks for a cabinet with enough available space in the cabinet based on the KX III's dimensions, connectors, and so on See Capacity Management - Locating and Reserving Cabinet Space for an Item in dcTrack Help.
  • Page 358: Import Kx Iii Devices Into Dctrack

    Import KX III Devices into dcTrack If you are adding a large number of KX IIIs, complete the 02_Items_- _All_Other_Classes_for_3.x.xls spreadsheet, which is provided by Raritan, with the KX III information, then import the spreadsheet into dcTrack ® using the Import Wizard.
  • Page 359: Build Data And Power Circuits For The Kx Iii

    Appendix C: Managing KX III in dcTrack Note that entire cabinets, along with the items in the cabinet and their connections and child devices, can also be cloned. So if you added a KX III to a cabinet and use the same cabinet configuration throughout your data center, you can clone the cabinet.
  • Page 360: Visualize The Kx Iii In A Cabinet Elevation And On The Floor Map

    Appendix C: Managing KX III in dcTrack Visualize the KX III in a Cabinet Elevation and on the Floor Map ® When you add the KX III to dcTrack , you place it in a cabinet. Provided the data center location the cabinet belongs to has a floor map associated with it, and the cabinet the KX III is housed in is linked to a cabinet object on the floor map, you can access the floor map from the KX III page in dcTrack.
  • Page 361: Managing The Kx Iii Lifecycle

    Appendix C: Managing KX III in dcTrack See Locate an Item on the Floor Map and Items List (Web Client) in dcTrack Help. You can also view the KX III in the cabinet elevation from the floor map. See Cabinet Elevations - Floor Map (Web Client) in dcTrack Help. Managing the KX III Lifecycle Once the KX III is installed, manage its lifecycle in your data center.
  • Page 362: Decommission A Kx Iii To Storage

    Appendix C: Managing KX III in dcTrack Decommission a KX III to Storage Submit a request to decommission the KX III to storage if you plan to temporarily move it to an off-site location. See Submit a Request to Decommission an Item to Storage in dcTrack Help.
  • Page 363: Appendix D Specifications

    Appendix D Specifications In This Chapter Hardware ....................351 Software....................373 Hardware KX III Dimensions and Physical Specifications Dominion KX Description Power & Dimensions Weight Operating Humidity III model heat (WxDxH) temp dissipation  8 server DKX3-108 Dual Power 17.3" x 8.60lbs 0º...
  • Page 364 Appendix D: Specifications Dominion KX Description Power & Dimensions Weight Operating Humidity III model heat (WxDxH) temp dissipation 52 KCAL  1 local port for use at the rack  32 server DKX3-232 Dual Power 17.3" x 9.08lbs 0º - 45º C 0-85 % ports 110V/240V,...
  • Page 365 Appendix D: Specifications Dominion KX Description Power & Dimensions Weight Operating Humidity III model heat (WxDxH) temp dissipation port for use at the rack  32 server DKX3-832 Dual Power 17.3" x 9.96lbs 0º - 45º C 0-85 % ports 110V/240V, 13.15'' x 50-60Hz...
  • Page 366: Kx Iii Supported Target Server Video Resolutions

    Appendix D: Specifications KX III Supported Target Server Video Resolutions When using digital CIMs, you set the target's video resolution to match your monitor's native display resolution. The native display resolution is set when configuring ports for digital CIMs (see Configure the CIM Target Settings (on page 96)).
  • Page 367 Appendix D: Specifications  1152x864@60Hz  1152x864@70Hz  1152x864@75Hz  1152x864@85Hz  1152x870@75.1Hz  1280x720@60Hz  1280x960@60Hz  1280x960@85Hz  1280x1024@60Hz  1280x1024@75Hz  1280x1024@85Hz  1360x768@60Hz  1366x768@60Hz  1368x768@60Hz  1400x1050@60Hz  1440x900@60Hz  1600x1200@60Hz  1680x1050@60Hz  1920x1080@60Hz ...
  • Page 368: Kx Iii Supported Local Port Dvi Resolutions

    KX III. Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so on, as well as the subjective nature of video quality, Raritan cannot guarantee performance across all distances in all environments.
  • Page 369: Supported Computer Interface Module (Cims) Specifications

    Appendix D: Specifications Supported Computer Interface Module (CIMs) Specifications Digital CIMs support Display Data Channels (DDC) and Enhanced Extended Display Identification Data (E-EDID). Note: Both plugs must be plugged in for the HDMI and DVI CIMs. CIM model Description Dimensions Weight (WxDxH) ...
  • Page 370 Appendix D: Specifications CIM model Description Dimensions Weight (WxDxH)  1.7" x 3.5" x 0.8"  0.25lb D2CIM-DVUSB-DP Digital CIM that provides digital-to-analog conversion  43 x 90 x 19mm  0.11kg and support for:  BIOS virtual media  Smartcard/CAC ...
  • Page 371: Supported Digital Video Cims For Mac

    Appendix D: Specifications CIM model Description Dimensions Weight (WxDxH)  1.3" x 3.0" x 0.6"  0.20lb DCIM-PS2 CIM for PS2  33 x 76 x 15mm  0.09kg  1.3" x 3.0" x 0.6"  0.20lb DCIM-USBG2 CIM for USB and Sun USB ...
  • Page 372: Digital Cim Timing Modes

    Appendix D: Specifications If the Mac’s HDMI or DisplayPort video has a mini connector, a passive adapter cable may be required to connect to the full sized HDMI and DisplayPort plugs on the digital CIMs. Alternatively, use the Mac VGA adapter with the D2CIM-VUSB or D2CIM-DVUSB.
  • Page 373: Dvi Compatibility Mode

    Appendix D: Specifications Digital CIM Established Modes  720x400@70Hz IBM, VGA  640x480@60Hz IBM, VGA  ® 640x480@67Hz Apple Mac  640x480@72Hz VESA  640x480@75Hz VESA  800x600@56Hz VESA  800x600@60Hz VESA  800x600@72Hz VESA  800x600@75Hz VESA  832x624@75Hz Apple Mac II ...
  • Page 374: Supported Remote Connections

    Appendix D: Specifications Supported Remote Connections Remote connection Details Network 10BASE-T, 100BASE-T, and 1000BASE-T (Gigabit) Ethernet Protocols TCP/IP, UDP, SNTP, HTTP, HTTPS, RADIUS, LDAP/LDAPS Network Speed Settings KX III network speed setting Network Auto 1000/Full 100/Full 100/Half 10/Full 10/Half switch port Highest 1000/Full KX III:...
  • Page 375: Dell Chassis Cable Lengths And Video Resolutions

    KX III and LAN Switch to Autodetect (recommended), or set both to a fixed speed/duplex such as 100MB/s/Full. Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using the following cable lengths and video resolutions when you are connecting to Dell ®...
  • Page 376 Raritan device.  CCID Requirements If the Raritan D2CIM-DVUSB VM/CCID is not recognized as a smart card reader by your Linux target, you may need to update the CCID driver version to 1.3.8 or above and update the driver configuration file (Info.plist).
  • Page 377: Supported Smart Card Readers

    If you are using a Linux client, the following requirements must be met to use smart card readers with the Raritan device. Note: User login to client, on smart card insertion, may take longer when 1 or more KVM sessions are actively in place to targets. As the login process to these targets is also under way.
  • Page 378: Unsupported Smart Card Readers

    SCM Microsystems firmware v5.25. Unsupported Smart Card Readers This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, therefore they are unsupported. If a smart card reader does not appear in the supported smart card readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function with the device.
  • Page 379: Audio Playback And Capture Recommendations And Requirements

    Appendix D: Specifications Audio Playback and Capture Recommendations and Requirements Audio Level  Set the target audio level to a mid-range setting. ® For example, on a Windows client, set the audio to 50 or lower. This setting must be configured through the playback or capture audio device, not from the client audio device control.
  • Page 380: Number Of Supported Audio/Virtual Media And Smartcard Connections

    Appendix D: Specifications In practice, the bandwidth used when an audio device connects to a target is higher due to the keyboard and video data consumed when opening and using an audio application on the target. A general recommendation is to have at least a 1.5MB connection before running playback and capture.
  • Page 381: Certified Modems

    KX III Local Console functions. For more information about non-US keyboards, see Informational Notes (on page 377). Note: Raritan strongly recommends that you use system-config-keyboard to change languages if you are working in a Linux environment. Language Regions Keyboard layout...
  • Page 382: Mac Mini Bios Keystroke Commands

    Appendix D: Specifications Language Regions Keyboard layout Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian Slovenian Slovenia Slovenian Italian Italy Italian Spanish Spain and most Spanish Spanish speaking countries Portuguese Portugal Portuguese Mac Mini BIOS Keystroke Commands The following BIOS commands have been tested on Intel-based Mac ®...
  • Page 383: Using A Windows Keyboard To Access Mac Targets

    Appendix D: Specifications Keystroke Description Virtual Media CIM Dual Virtual Mac Lion Server Media CIM HDMI CIM button optical disc Press N during Start up from a startup compatible network server (NetBoot) Press T during Start up in Target Disk startup mode Press Shift during...
  • Page 384 KX III (Raritan KVM- This port is used to discover other Dominion devices and for over-IP) Protocol, communication between Raritan devices and systems, including CC- Configurable Port SG for devices that CC-SG management is available. 5000 By default, this is set to Port 5000, but you may configure it to use any TCP port not currently in use.
  • Page 385: Software

    Appendix D: Specifications Software Supported Operating Systems, Browsers and Java Versions Operating Systems Browsers Java ™ Windows 7 ® Home Premium SP1 64-bit Internet Explorer ® 10, 11 Java 1.7 up to update 60 ® Firefox 29.0.1, 30 Windows 7 Ultimate SP1 64-bit ®...
  • Page 386: Virtual Kvm Client (Vkc) And Active Kvm Client (Akc) Requirements

    Certain versions of Safari block Java for security reasons. Since Java is ® required to use KX III, Raritan recommends you use Firefox instead. Additionally, you may be required to navigate through a number of messages. Select 'Do Not Block' if these messages are displayed.
  • Page 387: Multi-Language Keyboard Jre Requirement

    Appendix D: Specifications Mode Operating system Browser  Windows Server 2003 ® Internet Explorer 6.0 SP1++, 9.0, 10.0 or 11.0  Firefox 1.06 - 3  ® Internet Explorer 9.0, Windows Vista 10.0 or 11.0  ® Windows 7 Internet Explorer 9.0, 10.0 or 11.0 ...
  • Page 388: Events Captured In The Audit Log And Syslog

    Appendix D: Specifications Events Captured in the Audit Log and Syslog Following is a list and description of the events that are captured by the KX III audit log and syslog:  Access Login - A user has logged in to the KX III ...
  • Page 389: In This Chapter Overview

    Help link in the KX III Remote Console interface. Note: Some topics in this section reference other multiple Raritan devices because various devices are impacted by the information. Java Runtime Environment (JRE) Notes...
  • Page 390: Java Not Loading Properly On Mac

    Appendix E: Informational Notes b. Click the View Applets button. The Java Applet Cache Viewer opens. c. Deselect the Enable Caching checkbox if it is already checked. d. Click OK. 4. To clear the Java cache: a. From the Temporary Files Settings dialog, click the Delete Files button.
  • Page 391: Ipv6 Support Notes

    Appendix E: Informational Notes IPv6 Support Notes Operating System IPv6 Support Notes Java ™ Java 1.7 supports IPv6 for the following:  ™ Solaris 10 (and later)  ® Linux kernel 2.1.2 (and later)/RedHat 6.1 (and later)  Solaris 10 (and later) ...
  • Page 392: Dual Stack Login Performance Issues

    Appendix E: Informational Notes Dual Stack Login Performance Issues If you are using the KX III in a dual stack configuration, it is important you configured the domain system (DNS) correctly in the KX III in order to avoid delays when logging in. Tips for Adding a Web Browser Interface (on page 120) for information on configuring your DNS in KX III.
  • Page 393: Windows 2000 Composite Usb Device Behavior For Virtual Media

    ® The Windows 2000 operating system does not support USB composite devices, like Raritan’s D2CIM-VUSB, in the same manner as non- composite USB devices. As a result, the “Safely Remove Hardware” system tray icon does not appear for drives mapped by the D2CIM-VUSB and a warning message may appear when disconnecting the device.
  • Page 394: Virtual Media Notes

    Appendix E: Informational Notes Target Server Video Picture Not Centered (Mouse Out of Synch) At certain resolutions when using an HDMI or DVI CIM with the KX III:  The video display may not be centered properly - black rectangles can be seen at the edges of the screen ...
  • Page 395: Virtual Media Via Vkc And Akc In A Windows Environment

    Appendix E: Informational Notes Virtual Media via VKC and AKC in a Windows Environment ® Windows XP operating system administrator and standard user ® privileges vary from those of the Windows Vista operating system and ® the Windows 7 operating system. When enabled in Vista or Windows 7, User Access Control (UAC) provides the lowest level of rights and privileges a user needs for an application.
  • Page 396: Virtual Media Not Refreshed After Files Added

    Appendix E: Informational Notes Virtual Media Support on Windows 7, Windows 2008 and Windows XP Targets Virtual media is not supported on a Windows 7, Windows 2008 or Windows XP target server when connecting via VKC and AKC from Windows 2008 or Windows 2012. Virtual Media Not Refreshed After Files Added After a virtual media drive has been mounted, if you add a file(s) to that drive, those files may not be immediately visible on the target server.
  • Page 397: Usb Port And Profile Notes

    Appendix E: Informational Notes 2. Restart the target. Virtual Media Connection Failures Using High Speed for Virtual Media Connections Under certain circumstances it may be necessary to select the "Use Full Speed for Virtual Media CIM" when a target has problems with "High Speed USB"...
  • Page 398 The USB Profile Menu selections are configurable via the Console Device Settings > Port Configuration page. Should none of the standard USB profiles provided by Raritan meet your target server requirements, Raritan Technical Support can work with you to arrive at a solution tailored for that target. Raritan recommends that you do the following: 1.
  • Page 399: Video Mode And Resolution Notes

    Appendix E: Informational Notes Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will need to change the USB profile for a target server. For example, you may need to change the connection speed to "Use Full Speed for Virtual Media CIM"...
  • Page 400: Black Stripe/Bar(S) Displayed On The Local Port

    2. If using a digital CIM, then change the Display Native Resolution on the Port Configuration page to another resolution, or 3. If using the HDMI CIM, use the DVI Compatibility Mode. Contact Raritan Technical Support for additional assistance. Sun Composite Synch Video ™...
  • Page 401: Keyboard Notes

    Appendix E: Informational Notes Keyboard Notes French Keyboard Caret Symbol (Linux Clients Only) The Virtual KVM Client (VKC) do not process the key combination of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux ®...
  • Page 402: Keyboard Language Preference (Fedora Linux Clients)

    Because the Sun on Linux ® has problems generating the correct KeyEvents for foreign-language keyboards configured using System Preferences, Raritan recommends that you configure foreign keyboards using the methods described in the following table. Language Configuration method US Intl Default...
  • Page 403: Macros Not Saving On Linux Target Servers

    Appendix E: Informational Notes Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using a Hungarian keyboard from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double Acute work only with JRE 1.6 (and later).
  • Page 404: Mouse Notes

    Appendix E: Informational Notes Mac Keyboard Keys Not Supported for Remote Access ® ® When a Mac is used as the client, the following keys on the Mac ™ ™ keyboard are not captured by the Java Runtime Environment (JRE ...
  • Page 405: Audio

    Features that May Interrupt an Audio Connection If you use any of the following features while connected to an audio device, your audio connection may be interrupted. Raritan recommends you do not use these features if you are connected to an audio device: ...
  • Page 406: Smart Card Notes

    “Version Unknown”. Moving Between Ports on a Device If you move a between ports on the same Raritan device and resume management within one minute, CC-SG may display an error message. If you resume management, the display will be updated.
  • Page 407: In This Chapter General Faqs

    Appendix F Frequently Asked Questions In This Chapter General FAQs ..................395 Remote Access ..................397 Universal Virtual Media ................400 Bandwidth and KVM-over-IP Performance ........... 402 IPv6 Networking ..................406 Servers ....................407 Blade Servers ..................408 Installation....................410 Local Port - KX IIII .................
  • Page 408 OS-independent; users can troubleshoot and reconfigure servers even when servers are down. At the rack, Dominion KX III provides the same functionality, convenience, and space and cost savings as traditional analog KVM switches. However, Dominion KX III also integrates the industry’s highest performing KVM-over-IP...
  • Page 409: Remote Access

    How large is the Dominion KX III? Dominion KX III is only 1U high (except the KX3-864 and KX3-464, which are 2U), fits in a standard 19" rack mount and is only 11.4" (29 cm) deep.
  • Page 410 "ports." The local port can the local port? access the same server using the PC-Share feature. In order to access Dominion KX III Because Dominion KX III is completely Web- accessible, it doesn’t require customers to from a client, what hardware,...
  • Page 411 Dominion KX access Dominion KX III is approximately 500KB III? How long does it take to in size. The following chart describes the time required to retrieve Dominion KX III’s applet at retrieve? different network speeds: 100Mbps Theoretical .05 seconds...
  • Page 412: Universal Virtual Media

    How do I access servers You can access servers at the rack or via connected to Dominion KX III if the modem. network ever becomes Dominion KX III offers a dedicated modem port unavailable? for attaching an external modem. Universal Virtual Media Question...
  • Page 413 Appendix F: Frequently Asked Questions Question Answer What is required for virtual media? A Dominion KX III virtual media CIM is required. There are two VGA-based CIMs: a D2CIM- VUSB or D2CIM-DVUSB. The D2CIM-VUSB has a single USB connector and is for customers who will use virtual media at the OS level.
  • Page 414: Bandwidth And Kvm-Over-Ip Performance

    Appendix F: Frequently Asked Questions Question Answer Why would I use a USB profile? USB profiles are most often required at the BIOS level where there may not be full support for the USB specification when accessing virtual media drives. However, profiles are sometimes used at the OS level, for example, for mouse synchronization for Mac and Linux servers.
  • Page 415 Appendix F: Frequently Asked Questions Question Answer How is bandwidth used in KVM- Dominion KX III offers totally new video over-IP systems? processing that provides flexible, high performance video, efficient use of bandwidth and anytime/anywhere access via LAN, WAN or Internet.
  • Page 416 Appendix F: Frequently Asked Questions Question Answer What factors affect bandwidth? There are many factors that determine how much bandwidth will be used. The primary factor, noted above, is the amount of change in the target server’s video display. This is dependent on the user’s task and actions.
  • Page 417 Appendix F: Frequently Asked Questions Question Answer How do I optimize performance KX III provides a variety of settings in our and bandwidth? remote clients for the user to optimize bandwidth and performance. The default settings will provide an at-the-rack level of performance in standard LAN/WAN environments with economical use of bandwidth.
  • Page 418: Ipv6 Networking

    Appendix F: Frequently Asked Questions Question Answer What is the maximum remote (over The Dominion KX III is the first and only KVM- IP) video resolution supported? over-IP switch to support full high definition (HD) remote video resolution – 1920x1080 at frame rates up to 30 frames per second with digital audio.
  • Page 419: Servers

    Windows server to operate? KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructure to fix problems), Dominion KX III is designed to be completely independent from any external server.
  • Page 420: Blade Servers

    What comes in the Dominion KX III The following is included: (1) Dominion KX III box? unit, (2) Quick Setup Guide, (3) standard 19" rack mount brackets, (4) user manual CD- ROM, (6) localized AC line cord and (7) warranty certificate and other documentation.
  • Page 421 With the Dominion KX III, you don’t have to use these hotkeys. Just click on the name of the blade server, and the Dominion KX III will automatically switch to that blade without the explicit use of the hotkey.
  • Page 422: Installation

    Synchronization is supported. Is blade access secure? Yes. Blade access uses all of the standard Dominion KX III security features such as 128- bit or 256-bit encryption. In addition, there are blade-specific security features such as per blade access permissions and hotkey-blocking that eliminates unauthorized access.
  • Page 423 How many servers can be Dominion KX III models range from 8, 16 or 32 connected to each Dominion KX III server ports in a 1U chassis, to 64 server ports in a 2U chassis.
  • Page 424: Local Port - Kx Iiii

    Raritan’s Dominion SX line of secure console servers. Dominion SX offers more serial functionality at a better price point than Dominion KX III. This SX is easy to use, configure and manage, and can be completely integrated with a Dominion series deployment.
  • Page 425: Extended Local Port

    This means that: If the Dominion KX III is configured to interact with an external RADIUS, LDAP or Active Directory ® server, users attempting to access the local port will authenticate against the same server.
  • Page 426: Dual Power Supplies

    50–60 Hz. If a power supply or input fails, will The Dominion KX III front panel LED will notify I be notified? the user of a power failure. An entry will also be sent to the audit log and displayed on the KX remote client user interface.
  • Page 427: Ethernet And Ip Networking

    These come in many outlet, connector and amp variations. Note that you should not connect the PM series of power strips to the Dominion KX III as these power strips do not provide outlet-level switching. How many PDUs can be...
  • Page 428 Appendix F: Frequently Asked Questions Question Answer Can I access Dominion Yes. Dominion KX III not only uses standard KX III over a wireless connection? Ethernet, but also very conservative bandwidth with very high quality video. Thus, if a wireless...
  • Page 429: Local Port Consolidation, Tiering And Cascading

    Ethernet auto-negotiation. On some networks, problem? 10/100 auto-negotiation does not work properly, and the Dominion KX III unit must be set to 100 Mb/full duplex or the appropriate choice for its network. Duplicate IP address. If the IP address of the...
  • Page 430 Question Answer How do I physically connect To physically connect multiple KX III devices multiple Dominion KX III devices together for consolidated local access, you can together into one solution? connect the Tiering ports of multiple "tiered" (or "cascaded") KX III switches to a "base" KX III using the Tiering port of the KX III.
  • Page 431: Computer Interface Modules (Cims)

    Appendix F: Frequently Asked Questions Question Answer Do I have to physically connect Multiple Dominion KX III units do not need to Dominion KX III devices together? be physically connected together. Instead, each Dominion KX III unit connects to the network, and they automatically work together as a single solution if deployed with Raritan’s...
  • Page 432: Security

    Dominion KX III, Paragon CIMs transmit video at a distance of up to 150 feet (46 m), the same as Dominion KX III CIMs – not at 1,000 feet (304 m), as they do when connected to Paragon.
  • Page 433 128-bit encryption, both in its SSL communications as well as its own data stream. Literally no data is transmitted between remote clients and Dominion KX III that is not completely secured by encryption. Does Dominion KX III support AES Yes. The Dominion KX III utilizes the Advanced encryption as recommended by Encryption Standard (AES) for added security.
  • Page 434: Smart Cards And Cac Authentication

    Appendix F: Frequently Asked Questions Question Answer Does Dominion KX III support Yes. The Dominion KX III has administrator- strong passwords? configurable, strong password checking to ensure that user-created passwords meet corporate and/or government standards and are resistant to brute force hacking.
  • Page 435: Manageability

    CommandCenter? CommandCenter. For the local port, connect a compatible smart card reader to the USB port of the Dominion KX III. Manageability Question Answer Can Dominion KX III be remotely Yes.
  • Page 436: Documentation And Support

    Appendix F: Frequently Asked Questions Question Answer Yes. In addition to Dominion KX III’s own Can Dominion KX III integrate with syslog? internal logging capabilities, Dominion KX III can send all logged events to a centralized syslog server. Yes. In addition to Dominion KX III’s own...
  • Page 437: Miscellaneous

    DisplayPort video standards are supported with the digital video CIMs. How long is the hardware warranty The Dominion KX III comes with a standard for the KX III? two-year warranty, which can be extended to 5 years of warranty coverage.
  • Page 438 In general, KX II customers can continue to How do I migrate from the use their existing switches for many years. As Dominion KX II to Dominion KX III? their data centers expand, customers can purchase and use the new KX III models.
  • Page 439: Index

    Index AKC Supported Operating Systems • 295 Allow Cookies • 295 Allow Pop-Ups • 9 A. AC Power • 25 Apple Mac Mouse Settings • 23 About Connection Properties • 252 Apply a Native Display Resolution to Other About the Cat5 Reach DVI • 332 CIMs •...
  • Page 440 Index Calibrating Color • 263 Configure the CIM Target Settings • 96, 354 Cannot Connect to Drives from Linux Clients • Configure the DNS Settings • 29, 31, 32, 33, 77, 79, 81, 83 Configure the IPv4 Settings • 29, 77, 79, 80 Cannot Write To/From a File from a Mac Client •...
  • Page 441 Index Connect to Virtual Media • 280 Direct Port Access URL Syntax for the Virtual KVM Client (VKC) • 141 Connecting a KX III and Cat5 Reach DVI - Provide Extended Local Port Functionality • Disable Java Caching and Clear the Java Cache •...
  • Page 442 Index Encryption & Share • 181, 185, 330 HP and Cisco UCS Blade Chassis Enter Intelligent Mouse Mode • 267 Configuration (Port Group Management) • Entering the Discovery Port • 136 121, 123, 171, 172 Ethernet and IP Networking • 415 HTTP and HTTPS Port Settings •...
  • Page 443 Index Keyboard Limitations • 272 Logging In • 215, 216 Keyboard Macros • 259 Logging In to the KX III • 17, 308 Keyboard Notes • 389 Logging Users Off the KX III (Force Logoff) • KX III Administration • 18 61, 62 KX III Device Photos and Features •...
  • Page 444 RADIUS Communication Exchange Specifications • 73 Network Speed Settings • 86, 362 Network Statistics Page • 204 Raritan Client Navigation when Using Dual Video Port Groups • 230 Noise Filter • 255 Rear Mount • 20 Note on Microsoft Active Directory • 38 Rebooting the KX III •...
  • Page 445 Index Returning User Group Information via RADIUS Setting the Registry to Permit Write • 73 Operations to the Schema • 233 Root User Permission Requirement • 246 Simultaneous Users • 320 Single Mouse Mode • 270 Single Mouse Mode when Connecting to a Target Under CC-SG Control •...
  • Page 446 Index Sun Solaris Mouse Settings • 24 Text Readability • 254 Supported Audio Device Formats • 284 Tiered KX III Connection Example • 138 Supported Blade Chassis Models • 102, 111, Tilde Symbol • 390 Tips for Adding a Web Browser Interface • 115, 123 Supported CIMs for Blade Chassis •...
  • Page 447 Index View Status Bar • 279 View the KX III Users List • 61 View Toolbar • 279 View Users by Port • 61 Viewing the KX III MIB • 145, 156, 161 Virtual KVM Client (VKC) and Active KVM Client (AKC) Requirements •...
  • Page 448: United Kingdom

    For CommandCenter Secure Gateway: Press 6, then Press 2 Phone: +31-10-2844040 Fax: 732-764-8887 Email: tech.europe@raritan.com Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m. GMT China Phone +44(0)20-7090-1390...

Table of Contents