Gebruiksaanwijzing /service van het product KX2-864 van de fabrikant Raritan Engineering
Ga naar pagina of 321
Copyright © 2009 Raritan, Inc. DKX2-v2.1.8-0J-E April 2009 255-62-4023-00 Dominion KX II (KX2-832 and KX2-864) User Guide Release 2.1.8.
This document contains propri etary information that is protected by copyright. All right s reserved. No part of this document may be photocopied, rep rod uced, or translated into another language without express prior written con sent of Raritan, Inc.
iii Contents Chapter 1 Introduction 1 Dominion KX II Help............................................................................................................ ........... 1 Related Docu mentation ................................................
Contents iv Video Pro perties ............................................................................................................... . 63 Mouse Options...........................................................................................
Contents v Changing a Password ................................................................................................................ 119 Chapter 7 Device Management 120 Network Settings ......................................................
Contents vi Upgradi ng CIMs ................................................................................................................. ........ 196 Upgrading Firmware .............................................................................
Contents vii Dominion KX II Local Co nsole Interface .................................................................................... 222 Security and Au thentication ................................................................................
Contents viii Setting the Registry to Permit Wri te Operations to the Schema ............................................... 255 Creating a New Attribute .................................................................................................
Contents ix Appendix D FAQs 275 General Questions .............................................................................................................. ....... 276 Remote Access ................................................................
1 In This Chapter Dominion KX II Help .................................................................................. 1 What's New in the Help ............................................................................. 2 Dominion KX II Overview.
Chapter 1: Introduction 2 What's New in the Help The following information has been ad ded based on enhancement s and changes to the equipment and/o r user d ocumentation. • Information on the new Extended Lo cal port feature on the KX2-83 2 and KX2-864 has been added to the help .
Chapter 1: Introduction 3 Dominion KX II Overview The Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser.
Chapter 1: Introduction 4.
Chapter 1: Introduction 5 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Power strip Dominion KX II Local access Note: KX2-832 and KX2-864 also use an Extended Local port.
Chapter 1: Introduction 6 Product Photos Dominion KX II KX2-832.
Chapter 1: Introduction 7 KX2-864.
Chapter 1: Introduction 8 Product Features Hardware • Integrated KVM-over-IP remote acce s s • 1U or 2U rack-mountable (brackets in cluded) • Dual power supplies with failover; auto s witching p.
Chapter 1: Introduction 9 Software • Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs • Absolute Mouse Synchronization with D2CIM-V USB CIM and D2CIM-DVUSB CIMs • Plug-and-Play • Web-based a.
Chapter 1: Introduction 10 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) Dominion KX II Local Access Console Local User - an optional user console (consi sting.
Chapter 1: Introduction 11 Package Contents Each Dominion KX II ships as a fully-configured stan d-al one product in a standard 1U (2U for DKX2-864) 19" rackmount cha ssis.
12 In This Chapter Overview .................................................................................................. 12 Default Login Informat ion ........................................................................ 12 Getting St arted .
Chapter 2: Installation and Configuration 13 Default Value Important: For backup and busines s continuity purposes, it is strongly recommended that y ou create a backup administrator user name and password and keep that inform ation in a secure location.
Chapter 2: Installation and Configuration 14 Mouse Settings The Dominion KX II operates in several mouse modes: • Absolute Mouse Mode ™ (D2CIM-VUSB only) • Intelligent Mouse Mode (do not use an .
Chapter 2: Installation and Configuration 15 Windows XP®/Windo w s 2003® To configure KVM target serv ers running Microsoft Windows XP/2003: 1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab.
Chapter 2: Installation and Configuration 16 Note: For KVM target servers running Wind ows 2000 or XP, you may wish to create a user name that will be used only for remote connections through the Dominion KX II.
Chapter 2: Installation and Configuration 17 Animate controls and elem ents in side windows Animate windows when mi nimizi ng and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 3.
Chapter 2: Installation and Configuration 18 Note: Once connected to the target server, in many Li nux graphical environments, the <Ctrl > <Alt> <+> com mand will change the video resolution, scrolling through all avail able resolutions that remain enabled in the XF86Config or /etc/X11/xorg.
Chapter 2: Installation and Configuration 19 3. Save the file. 4. Reboot the system in order for the changes to take effect. Linux Settings (Red Ha t 4) Note: The following settings are optim ized for Standa rd Mouse mode only. To configure KVM target serv ers running Linux (graphical user interface): 1.
Chapter 2: Installation and Configuration 20 SUSE Linux 10.1 Settings Note: Do not attempt to synchroni ze the mouse at the SUSE login prompt. You must be connected to the target serve r to synchroni ze the mouse cursors. To configure the mouse settings: 1.
Chapter 2: Installation and Configuration 21 Tip: If you do not want to be prompted upon log out, follow the se procedures instead. To make your settings permanent in Linux (no prom pt): 1. Choose Desktop > Control Cente r > System > Sessions.
Chapter 2: Installation and Configuration 22 3. KVM target servers running the Solaris operating system must output VGA video (H-and-V sync, not composite sync). To change your Sun video card output from comp osite sync to the nondefault VGA output: 1.
Chapter 2: Installation and Configuration 23 Video Settings (POST) Sun systems have two different resoluti on setting s: a POST resolution and a GUI resolution. Run these comm ands from the command line. Note: 1024x768x75 is used as an exam ple here; substitute the resolution and refresh rate you are using.
Chapter 2: Installation and Configuration 24 4. Use the sliders to set the Mouse acceleration to 1.0 and Threshold to 1.0. 5. Click OK. To configure the video: 1. From the Launcher, select Application M anag er. 2. Select System_Admin. 3. Choose Smit > Devices > Gra phic Display s > S e le ct the Display Resolution and Refresh Rate.
Chapter 2: Installation and Configuration 25 To take advantage of th e Dominion KX II: The firewall must allow inbound communication on: Web-access cap abilities Port 443 - standard TCP port for HTTPS communication Automatic redirection of HTTP requests to HTTPS (so the more common “http://xxx.
Chapter 2: Installation and Configuration 26 A. AC Po w er To connect the power supply : 1. Attach the included AC power cord to the Domi nion KX II and plug into an AC power outlet. 2. For dual power failover protection, attach the se con d included AC power cord and plug it into a different powe r so urce than the first power cord.
Chapter 2: Installation and Configuration 27 Enable Automatic Failover on the Network Configuration page. Note: Use both network ports only if you want to use one as a failo ver port. D. Local Access Port (Local PC) For convenient access to target server s while at the rack, use the Dominion KX II Local Access port.
Chapter 2: Installation and Configuration 28 E. Target Server Ports The Dominion KX II uses standard UTP cablin g (Ca t5/5e/6) to connect to each target server. To connect a target serv er to th e Dominion KX II: 1. Use the appropriate Computer Interfa ce Module (CIM ).
Chapter 2: Installation and Configuration 29 2. Once the unit has booted, the Dominion KX II Local Console is visible on the monitor attached to the Dominion KX II local port. Type the default username (admin) and pa sswo rd (rarita n) and click Login.
Chapter 2: Installation and Configuration 30 DHCP - Dynamic Host Configuration Pro tocol is used by networked computers (clients) to obtai n unique IP addresses and other parameters from a DHCP server. With this option, network parameter s ar e as sign ed by the DHCP server.
Chapter 2: Installation and Configuration 31 a. Primary DNS Server IP Address b. Secondary DNS Server IP Address 7. When finished, click OK. Your Do minion KX II device is now network accessible. See LAN Interface Settings (on page 123) for information in configuring this se ction of the Networ k Settings pa ge.
Chapter 2: Installation and Configuration 32 Naming Target Servers To name the target serv ers: 1. Connect all of the target serv ers if you have not already done so. See Step 3: Connect the Equipment (on page 25 ) for a description of conn ectin g the equipme nt.
Chapter 2: Installation and Configuration 33 Character Description Character Description % Percent sign @ At sign & Ampersand [ Left bracket ( Left parenthesis Backward slash ) Right parenthesis ] Right bracket * Asterisk ^ Caret + Plus sign _ Underscore , Comma ` Grave accent - Dash { Left brace .
Chapter 2: Installation and Configuration 34 Note: If either of these checkboxes is selected and po we r input is not actually connected, the power LED at the front of the devi ce turns red. To disable power supply autodetectio n for the power supply not in use: 1.
Chapter 2: Installation and Configuration 35 Note on Microsoft Active Directory Microsoft Active Directory uses t he LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the Dominion KX II.
Chapter 2: Installation and Configuration 36 3. Type the layout code desired (for exam ple, 31 for the Japanese keyboard). 4. Press Enter. 5. Shut down the device and power on once again. The DCIM -SUSB performs a reset (p ower cy cle). 6. Verify that the characters are correct.
37 In This Chapter Interfaces ................................................................................................. 37 Virtual KVM Client .
Chapter 3: Working with Target Servers 38 Dominion KX II Local Console Interface When you are located at the server rack, the Domi nion KX II provides standard KVM management and admini stration via the Domi nion KX II Local Console.
Chapter 3: Working with Target Servers 39 from the Dominion device's IP address to launch the Dominion KX II Remote Console. Depending on your browser and se cu rity settings, you may see various security and certificate warnin gs. It is necessary to accept these warnings to launch the Do minion KX II Remote Co nsole.
Chapter 3: Working with Target Servers 40 6. See Virtual KVM Client (on page 51) for information on the Dominion KX II functions available via the Remote Co nsol e.
Chapter 3: Working with Target Servers 41 Port Access Page After successfully logging on to the Dominion KX II Remote Consol e, the Port Access page appears. This page lists all of the Dominion KX II ports, the connected KVM target serve r s, and their status and availability.
Chapter 3: Working with Target Servers 42 Availability - The Availability can be Idle, Connected, Busy, or Unavailable. Blade servers will have an availability of either shared or exclusive when a connection to that blade i s in pla ce. 2. Click View by Port or View by Group to switch between views.
Chapter 3: Working with Target Servers 43 Port Ac tion Menu When you click a P o rt Name in the Port A ccess list, the Port Action menu appears. Choose the desi red men u option for that port to execute it.
Chapter 3: Working with Target Servers 44 Managing Favorites A Favorites feature is provided so you can organize and quickly a ccess the devices you use frequently.
Chapter 3: Working with Target Servers 45 Note: Both IPv4 and IPv6 addresses are supported. Manage Favorite s Page To open the Manage Favorites page: • Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: To: Favorites List Manage your list of favorite devices.
Chapter 3: Working with Target Servers 46 Discovering Devices on the Local Subnet This option discovers the device s on you r local subnet, which is the subnet where the Dominio n KX II Remo te Console is running. These devices can be accessed directly from this pag e or you can add them to your list of favorites.
Chapter 3: Working with Target Servers 47 Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the rem ote con sole subnet. To access a discovered dev ice: • Click the device name or IP addre s s for that device.
Chapter 3: Working with Target Servers 48 To discover devices on the dev ice subnet: 1. Choose Manage > Discover Device s - Dominion KX II Subnet. The Discover Devices - Dominion KX II Subnet page appears. 2. Click Refresh. The list of devices on the local subnet is refreshed.
Chapter 3: Working with Target Servers 49 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate Dominion KX II device. 2. Click the Edit button. The Edit page appears.
Chapter 3: Working with Target Servers 50 Logging Out To quit the Dominion KX II Remote Console: • Click Logout in the upper ri ght -h and corner of the page.
Chapter 3: Working with Target Servers 51 Note: Depending on your browser and brow ser security settings, you may see various se curity and certificate check and wa rning messages. It is necessary to accept the opt ions in ord er to ope n MPC. Note: If you are using FireFox 3.
Chapter 3: Working with Target Servers 52 VKC Toolbar and Shortcut Key s Button Button Name Description Connectio n Properties Opens the Modify Connection Properties dialog from which you can manually adjust bandwidth options (su ch a s connection speed, color depth, and so forth).
Chapter 3: Working with Target Servers 53 Button Button Name Description Send Ctrl+Alt+D el Sends a Ctrl+Alt+Del hot key combination to the target server. Same as choosing Keyboard > Send Ctrl+Alt+D el. Single Cursor Mode Starts Single Cursor mode in whi ch the local mouse pointer no lon ger a ppears onscreen.
Chapter 3: Working with Target Servers 54 3. Choose Switch From in the Port Action menu. The Virtual KVM Client window switches to the new target server you sele cted. Power Controlling a Target Server Note: These features are availa ble onl y when you have m ade power associations.
Chapter 3: Working with Target Servers 55 Disconnecting KVM Target Serv ers Note: This item is not available on the Dom inion KX II Local Console. The only way to disconnect from the sw it ched ta rget in the Local Console is to use the hot key. To disconnect a target serv er: 1.
Chapter 3: Working with Target Servers 56 Connection Properties The Dominion KX II dynamic video compression al gorithm s maintain KVM console usability under varyi ng bandwidth constraints. The Dominion KX II devices optimize KVM output not only for LAN use, but also for WAN use.
Chapter 3: Working with Target Servers 57 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) Note that these settings are an optimizat ion for sp ecific conditions rather than an exact speed.
Chapter 3: Working with Target Servers 58 Connection Information To obtain information about your Virtual KVM Client connection: • Choose Connection > Co n nection Info. The Connection Info window opens. The following information is displayed about the current con nection: • Device Name - The name of the Dominion KX II device.
Chapter 3: Working with Target Servers 59 Building a Key board Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialo g appears. 2. Click Add. The Add Keyboard Macro dialog appea rs. 3. Type a name for the macro in the Keyboard Macro Name field.
Chapter 3: Working with Target Servers 60 8. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Key board Macro s dialog appears and lists the new keyboard macro.
Chapter 3: Working with Target Servers 61 9. Click Close to close the Keyboard Macros dialo g. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assign ed to the macro.
Chapter 3: Working with Target Servers 62 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboa rd Macro s dialog appears.
Chapter 3: Working with Target Servers 63 Video Properties Refresh Scr een The Refresh Screen command force s a refre sh of the video screen. Video settings can be refreshed automatically in seve ral ways: • The Refresh Screen command force s a refresh of the video screen.
Chapter 3: Working with Target Servers 64 Video Settings Use the Video Settings command to manually adjust the video settings. To change the video settings: 1. Choose Video > Video Settings o r cli ck the Video Settings button in the toolbar to open the Video Settings dialog.
Chapter 3: Working with Target Servers 65 j. Phase - Phase values ran ge from 0 to 31 and will wrap around. Stop at the phase value that produces the best video image for the active target server. k. Horizontal Offset - Controls the horizontal positioni ng of the target server display on your monitor.
Chapter 3: Working with Target Servers 66 Note: Some Sun background screens, su ch as screens with very dark borders, may not center precisely on ce rtain Sun servers. Use a different background or place a lighter colored ico n in the upper left corner of the screen.
Chapter 3: Working with Target Servers 67 3. Click Save to save the screenshot. Mouse Options When controlling a target server, the Do minion KX II Remote Co nsole displays two mouse cursors: one bel onging to your client workstation and the other belonging to the target server.
Chapter 3: Working with Target Servers 68 Mouse Pointer Sy nchronization When remotely viewing a target serve r that uses a mouse, you will see two mouse cursors: one belonging to y our remote cli ent workstation and the other belonging to the target server.
Chapter 3: Working with Target Servers 69 Additional Notes for In telligent Mouse Mode • Be sure that there are no icons or applications in the upper left section of the sc reen since that is whe re the synchronization routin e takes place. • Do not use an animated mouse.
Chapter 3: Working with Target Servers 70 Intelligent Mouse Mode In Intelligent Mouse mode, the Dominion KX II device can detect the target mouse settings and synchroni ze the mouse cursors accordingly, allowing mouse accelerati on on the target.
Chapter 3: Working with Target Servers 71 Please note that mouse configuratio ns will vary on different target operating systems. Consult your OS guideline s for furt her details. Also note that intelligent mouse synchr onization doe s not work with UNIX targets.
Chapter 3: Working with Target Servers 72 To exit single mouse mode: 1. Press Ctrl+Alt+O on your key board to exit single mo use mode. VKC Virtual Media See the chapter on Virtual Media for co mplete inform ation about setting up and using virtual media.
Chapter 3: Working with Target Servers 73 5. Exit Single Cursor Mode - Hotkey. When you enter si ngle cursor mode, only the target server mouse cu rsor is visible. This is the hot key used to exit single cursor mode and brin g back the client mouse cursor.
Chapter 3: Working with Target Servers 74 View Options View Toolbar You can use the Virtual KVM client wi th or without the toolbar di spl ay. To toggle the display of the toolbar (on and off): • Choose View > View Toolbar. Scaling Scaling your target window allows y ou to view the entire contents of the target server window.
Chapter 3: Working with Target Servers 75 Help Options About Raritan Virtual KVM Client This menu command provides versi on information about the Virtual KVM Client, in case you require assistance from Raritan T echnical Support. To obtain version information: • Choose Help > About Raritan Virtual KVM Client.
76 In This Chapter Overview .................................................................................................. 77 Prerequisites for Usi ng Virtual Medi a ...................................................... 79 File Server Setup (File Server ISO Im ages On ly) .
Chapter 4: Virtual Media 77 Overview Virtual media extends KVM capabilities by enabling K VM target servers to remotely access media from a client PC and networ k file se rvers. With this feature, media mounted on a client PC and network file servers is essentially "mounted virtually" by the ta rget server.
Chapter 4: Virtual Media 78.
Chapter 4: Virtual Media 79 Diagram key Desktop P C CD/DVD drive Dominion KX II USB mass storage device CIM PC hard drive Target server Remote file server (ISO images) Prerequisites for Using Virtual .
Chapter 4: Virtual Media 80 If you would prefer not to change Vista accou nt permissions, run Internet Explorer as an adm inist rator. To do this, click the Start Menu, locate IE, right-click it and sele ct Run as Administrator. Target Server • KVM target servers must support USB connected driv es.
Chapter 4: Virtual Media 81 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog. Note: You cannot access a remote ISO image via virtual m edia using an IPv6 address due to techni cal limitations of third-party software used by the KX2.
Chapter 4: Virtual Media 82 If you would prefer not to change Vista accou nt permissions, run Internet Explorer as an adm inist rator. To do this, click the Start Menu, locate IE, right-click it and sele ct Run as Administrator. Target Server • KVM target servers must support USB connected driv es.
Chapter 4: Virtual Media 83 Connecting to Virtual Media Local Drives This option mounts an entire drive, wh ich mean s the entire disk drive is mounted virtually onto the target serv er. Use this option for hard dri v es and external drives only. It does no t include network drives, CD-ROM, or DVD-ROM drives.
Chapter 4: Virtual Media 84 4. Click Connect. The media will be mounted on the ta rget server virtually. You can access the medi a ju st like any othe r drive. Conditions when Read/Write is Not Av ailable Virtual media Read/Write is not av ailable in the following situations: • For all hard drives.
Chapter 4: Virtual Media 85 b. Choose the drive from the Loc al CD/DVD Drive drop-down list. All available internal and external CD and DVD d rive names will be populated in the drop-down li st. c. Click Connect. 3. For ISO images: a. Choose the ISO Image option.
Chapter 4: Virtual Media 86 Disconnecting Virtual Media To disconnect the virtual media driv es: • For local drives, choose Vi rtual Medi a > Disconnect Drive. • For CD-ROM, DVD-ROM, and ISO images, ch oo se Virtual Media > Disconnect CD-ROM/ISO Image.
87 In This Chapter Overview .................................................................................................. 87 CIM Compat ib ility .................................................................................... 88 Available US B Profiles.
Chapter 5: USB Profiles 88 CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-V USB or D2CIM-DVUSB with updated firmware. A VM-CIM that has not ha d its firmware upgraded wil.
Chapter 5: USB Profiles 89 USB profile Description BIOS DellOptiplex Keyboard Only Dell Optiplex BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell Optiplex BIOS when using D2CIM-VUSB. When usi ng the new D2CIM-DVUSB, use 'G ene ric' profile.
Chapter 5: USB Profiles 90 USB profile Description BIOS DellPowerEdge Keyboard Only Dell PowerEdge BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB. When using the new D2CIM-DV USB, use 'Generic' profile.
Chapter 5: USB Profiles 91 USB profile Description BIOS Generic BIOS Generic Use this profile when Gene ric OS profile does not work on the BIOS. WARNING: USB enumeration will trigger whenever Virtual.
Chapter 5: USB Profiles 92 USB profile Description BIOS Lenovo ThinkPad T61 & X61 BIOS Lenovo ThinkPad T61 and X61 (boot from Virtual Media) Use this profile to boot the T61 and X61 series laptops from Virtual Media. Restrict ions: • USB bus speed limited to full-speed (12 MBit/s) BIOS Mac BIOS Mac Use this profile for Mac BIOS.
Chapter 5: USB Profiles 93 USB profile Description HP Proliant DL360/DL380 G4 (Windows 2003 Serve r Installation) HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server whe n installing Windows 2003 S erver without the help of HP SmartStart CD.
Chapter 5: USB Profiles 94 USB profile Description Supermicro Mainboard Phoenix (AwardBIOS) Supermicro Mainboard Phoenix AwardBIOS Use this profile for the Supermicro series mainboards with Phoenix AwardBIOS. Restrict ions: • Virtual CD-ROM and disk drives cannot be used simultane ously Suse 9.
Chapter 5: USB Profiles 95 USB profile Description Troubleshooting 3 Troubleshooting Profile 3 • Mass Storage first • Keyboard and Mouse (Type 2) • USB bus speed limited to full-speed (12 MBit/s.
96 In This Chapter User Groups ............................................................................................ 96 Users ..................................................................................................... 105 Authenticatio n Settings .
Chapter 6: User Management 97 User Group List User groups are use d with local an d remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user grou ps befo re creating individual users since, when you add a u se r, you must assign that user to an existing user group.
Chapter 6: User Management 98 The Group page is organized into the f ollowing categories: Group, Permissions, Port Permi ssi ons, and IP ACL. 2. Type a descriptive name for t he ne w use r group into the Group Name field (up to 30 characters). Set the permissions for the grou p.
Chapter 6: User Management 99 Note: Several administrative functions a r e available within MPC and from the Dominion KX II Local Console. These function s a re available only to members of the default Adm in group. Note: Both IPv4 and IPv6 addresses are supported.
Chapter 6: User Management 100.
Chapter 6: User Management 101 Setting Port Permissions For each server port, you can sp ecif y the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setti ng for all permission s is Deny.
Chapter 6: User Management 102 This feature limits access to the Dominion KX II device by users in the selected group to specific IP addres se s. This feature applies only to users belonging to a spe cif ic group, unlike the IP Access Control List feature that applies to all access a ttempts to the device, is processed first, and takes priority.
Chapter 6: User Management 103 2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule repl aces the original rule with the sam e rule numb er. To delete a rule: 1. Specify the rule number you want to delete.
Chapter 6: User Management 104 Permission Description Security SSL certificate, security settings (VM Share, PC-Share), IP ACL User Management User and group management, remote authentication (LDAP/LDAPS/RADIUS), login settings Setting Permissions for an I ndividual Group To set permissions for an indiv i dual user group: 1.
Chapter 6: User Management 105 Tip: To determine the users belonging to a particular gro up, sort the User List by User Group. 1. Choose a group from among those liste d by che cking the checkbox to the left of the Group Name. 2. Click Delete. 3. When prompted to confir m the deletion, click OK.
Chapter 6: User Management 106 Adding a New User It is a good idea to define user groups before creatin g Domi nion KX II users becaus e, when you add a user, you must assign that user to an existing user group. See Adding a New User Group (on page 97).
Chapter 6: User Management 107 5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK. Logging a User Off (Force Logoff) If you are an administrator, you are able to log out ano ther lo cally authenticated user who is logge d on to the Dominion KX II.
Chapter 6: User Management 108 Authentication Settings Authentication is the proc ess of verifying that a user i s who he says he is. Once a user is authenticated, t he user's group is used to determine his system and port permi ssions. The user's assig ned privileges determine what type of access is allo wed.
Chapter 6: User Management 109 Implementing LDAP/LDAPS Remote Aut hen tication Lightweight Directory Access Protoc ol (LDAP/LDAPS) is a networking protocol for querying and modifying directory servi c es running over TCP/IP. A client starts an LD AP session by connecting to an LDAP/LDAPS server (the default TCP port is 389).
Chapter 6: User Management 110 10. The default Secure LDAP Port is 636. Either u se the default po rt or specify another port. This field is enabled whe n the Enable Se cu re LDAP checkb ox is selected.
Chapter 6: User Management 111 15. Active Directory Domain. Type the nam e of the Active Directo ry Domain. For example, testradi us. com. Consult with your Active Directive Administrator for a specific domain name. Note: Both IPv4 and IPv6 addresses are supported.
Chapter 6: User Management 112 Returning User Group Information from Activ e Directory Server The Dominion KX II supports user authentication to A ctive Directo r y (AD) without requiring that users be defined locally on the Dominion KX II. This allows Active Directory us er accounts and password s to be maintained exclusively on the AD server.
Chapter 6: User Management 113 Implementing RADIUS Remote Auth entication Remote Authentication Dial-in Us er Service (RADIUS) is an AAA (authentication, authorization, and accounting) proto c ol for network access applications. To use the RADIUS authe ntication protocol: 1.
Chapter 6: User Management 114 CHAP - With CHAP, authentication can be re quested by the server at any time. CHAP prov ides more security than PAP.
Chapter 6: User Management 115 Returning User Group Information via RADIUS When a RADIUS authentication atte mpt succeeds, the Domi nion KX II determines the permission s for a given use r based on the permissions of the user's group.
Chapter 6: User Management 116 Attribute Data Log in Log out Accounting-Request(4) Acct-Status (40) Stop(2) - Stops the a ccounting NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-Port (5) Always 0. NAS-IP-Address (4) The IP address for the Dominion KX II.
Chapter 6: User Management 117 User Authentication Pro c ess When the device is configured to authe nticate and authorize local use rs from CC, the order in which the user credentials are validated fo.
Chapter 6: User Management 118 Remote authentication follows the pr ocess specified in the flowcha rt below:.
Chapter 6: User Management 119 Changing a Password To change your pass word: 1. Choose User Management > Ch ange Password. The Cha nge Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field.
120 In This Chapter Network Settings ................................................................................... 120 Device Se rvices ..................................................................................... 125 Modem Se ttings ...
Chapter 7: Device Management 121 Network Basi c Settings These procedures describe how to assign an IP address on the Netwo rk Settings page. For complete informatio n about all of the fields and the operation of this page, see Network Settings (on pag e 120).
Chapter 7: Device Management 122 e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when n o route rs are present. Read-Only f. Zone ID. This identifies the device with whi ch the address is associated.
Chapter 7: Device Management 123 See LAN Interface Settings (on page 123) for information in configuring this section of the Networ k Settings pa ge. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properl y set the network parameters, which results in network issues.
Chapter 7: Device Management 124 10 Mbps/Half - Both LEDs blink 10 Mbps/Full - Both LEDs blink 100 Mbps/Half - Yellow LE D blinks 100 Mbps/Full - Yellow LED blin ks 1000 Mbps/Full (gigabit) - Gre en LED blinks Half-duplex provides for communication in both directi ons, but only one direction at a time (not simultaneou sly).
Chapter 7: Device Management 125 128 Kilobit 5. Click OK to apply the LAN settings. Device Services 1. Choose Device Settings > Device Services. The Device Service Settings page appears. 2. Enter the Discovery Port. The Dominion KX II discovery occurs ov er a si ngle, configurable TCP Port.
Chapter 7: Device Management 126 4. Enter the initial modem string in the Modem Init String field. If the modem string is left blank, the following string is sent to the modem by default: ATZ OK AT OK. This information is used to config ure mo dem settings.
Chapter 7: Device Management 127 6. Click OK to commit your changes or click Reset to Defaults to retu rn the settings to their defaults. See Certified Modems (on page 245) for information on ce rtified modems that work with the Dominion KX II.
Chapter 7: Device Management 128 2. Choose your time zone from the Time Zone drop -down list. 3. To adjust for daylight savings ti me, check the "Adjust for daylight savings time" checkbox.
Chapter 7: Device Management 129 Event Management The Dominion KX II Event Management feature provides a set of screens for enabling and d isabli ng the distribution of system events to SNMP Managers, Syslog, and the audit log.
Chapter 7: Device Management 130 2. Type the IP Address/Host Name of your Syslog server in the IP Address field. 3. Click OK. To reset to factory defaults: • Click Reset To Defaults. Note: Both IPv4 and IPv6 addresses are supported. Note: IPv6 addresses ca nn ot exceed 80 characters in length for the host name.
Chapter 7: Device Management 131 Event Management - De stinations System events, if enabled, can g enerate SNMP notification events (traps), or can be logged to Syslog or A udit Log. Use the Event Management - Destinations page to sel ect the system events to track and where to send this information.
Chapter 7: Device Management 132 3. Click OK..
Chapter 7: Device Management 133 To reset to factory defaults: • Click Reset To Defaults. Warning: When usi ng SNMP traps ov er UDP, it is possible fo r the Dominion KX II and the router that it is attached to to fall out of synchronization when the Domi nion KX II is rebooted, preventing the reboot completed SNMP trap from being logged.
Chapter 7: Device Management 134 Trap Name Description ipConflictResolved An IP A ddress conflict was resolved. networkFailure An Ethernet interface of the product can no longer communicate over the net work. networkParameterChanged A change has been made to the network parameters.
Chapter 7: Device Management 135 Trap Name Description userModified A user account has be en modified. userPasswordChanged This event is tri ggered if the password of any user of the device is modified. userSessionTimeout A user with an active sessi on ha s experienced a session termination du e to timeout.
Chapter 7: Device Management 136 2. If you are plugging power input into power supply nu mber o ne (left-most power supply at the bac k of the unit), then select the Powerln1 Auto Detect option.
Chapter 7: Device Management 137 Configuring Ports The Port Configuration page displays a li st of the Dominion KX II ports. Ports connected to KVM target serv ers (b lades and standard serve rs) and power strips are displa yed in blue and can be edited.
Chapter 7: Device Management 138 Port Type Port type Description DCIM Dominion CIM Not Available No CIM connected PCIM Paragon CIM PowerStrip Power CIM VM Virtual Medi a CIM (D2CIM-VUSB and D2CIM-DVUSB) Blade Chassis Blade chassis and the bla des a ssociated with that chassis (displayed in a hierarchical order) 2.
Chapter 7: Device Management 139 Connecting a Power Strip To connect the power strip: 1. Connect the male RJ-45 of t he D2CIM-PWR to the female RJ-45 connector on the power stri p.
Chapter 7: Device Management 140 2. Connect the female RJ-45 conne c tor of the D2 CIM-P WR to any of the available female system port co nne ctors on the Dominion KX II using a straight through Cat5 cable. 3. Attach an AC power cord to the target server and an available power strip outlet.
Chapter 7: Device Management 141 Naming the Power Strip (Port Page for Power Strips) This Port page opens when you select a port from th e Port Configuration page that is connected to a Raritan rem ote power strip. The Type and the Name fields are prepopulated.
Chapter 7: Device Management 142 3. Click OK..
Chapter 7: Device Management 143 Manage KVM Target Servers A ssociated w ith Outlets (Port Page) This Port page opens when you select a port from th e Port Configuration page that is connected to a target serv er.
Chapter 7: Device Management 144 Removing Power Associations Do not physically remove a power strip from the Domi nion KX II without first removing the power strip association in Device Se ttings. When a target has been associated with a po we r strip and the target is removed from the Dominion KX II, the power association remains.
Chapter 7: Device Management 145 Configuring Blade Chassi s In addition to standard servers and power strips, the Dominio n KX II offers you the ability to control bl ade chassis that are plugged into a Dominion KX II port. Up to eight blade chassis can be managed through the Dominion KX II at a given time.
Chapter 7: Device Management 146 The Dominion KX II also supports use of hot key seq uences to switch KVM access to a blade chassis. For bl ad e chassis that allow use rs t o select a hot key sequence, those optio ns will be provided on the Port Configuration page.
Chapter 7: Device Management 147 If you move a blade chassis from one KX II port to another KX II port, interfaces that w ere added to the blade chas s is node in CC-SG will be lost in CC-SG.
Chapter 7: Device Management 148 Generic Blade Chassis Config u ratio n The Generic Blade Chassi s' sele ction provides only a manual configuration mode of operation.
Chapter 7: Device Management 149 The first URL link is intended for use to con ne ct to the blade chassis Administration Module GUI. Note: Access to the URL links enter ed in this section of the page is governed by the blade cha ssis po rt permissions.
Chapter 7: Device Management 150 3. On the Port Configuration p age, click on the name of the blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio bu tton. The pag e will then di splay the necessary fields to configure a blade chassis.
Chapter 7: Device Management 151 If operating in Auto-discovery mode, the Installed box will display the slots containing blad es d uring discovery. 5. In the Blade Chassis Managed Li nks section of the page, you are able to configure the conne ction to a blade chassis web browser interface if one is available.
Chapter 7: Device Management 152 b. Maximum Number of Slots - The default maximum number of slots available on the blade chas sis i s automatically entered. c. Administrative Module Primary IP Address/Ho st Name - Not applicable. d. Port Number - The default por t numbe r for the bla de chassis is 22.
Chapter 7: Device Management 153 e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be as sociated with the username and password entr ies. It is in these fields you should enter the field names for the u sername a nd pa ssword fields used on the login screen for the web application.
Chapter 7: Device Management 154 d. Port Number - The default por t numbe r for the bla de chassis is 22. Change the port numb er if appli cable. Required for auto-discovery mode e. Username - Enter the user name used to acce ss the blade chassis. Req uired for auto-discovery mode f.
Chapter 7: Device Management 155 Note: Leave the username and pa ssword fields bla nk for DRAC, ILO, and RSA web applications or the connection will fail. e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be as sociated with the username and password entr ies.
Chapter 7: Device Management 156 4. In the Blade Chassis Managed Li nks section of the page, you are able to configure the conne ction to a blade chassis web browser interface if one is available. C lick the Blade Chassi s M anaged Links icon to expand the section on the page.
Chapter 7: Device Management 157 Tips for Adding a We b Browser Interface You can add a Web Browser Interface to create a co nne ction to a device with an embedded web se rver. A Web Browser interface can also be used to connect to any web appli cation, such as the web application associated with an RSA, DRAC or ILO Pro ce ssor card .
Chapter 7: Device Management 158 HP® Blade Chassis Configuration (Port Group Management) The Dominion KX II supports the aggregation of po rts connected to certain types of blades into a grou p representing the blade cha ssis.
Chapter 7: Device Management 159 3. Enter a Port Group Name. The port group nam e is not case sensitive and can contain up to 32 characters. 4. Select the Blade Server Group checkbo x .
Chapter 7: Device Management 160 To delete a port group: 1. Click on the Port Group Manageme nt page, select the checkbox of the port group you want to delete.
Chapter 7: Device Management 161 Supported CIMs for Blade Chassis The following CIMs are supported for bl ade chassis being manag ed through the Dominion KX II: • DCIM-PS2 • DCIM-USBG2 • D2CIM-VUSB • D2CIM-DVUSB Following is a table contain ing supported CIMs for each blade chassis model that the Dominion KX II supports.
Chapter 7: Device Management 162 Blade chassis Connection method Recommended CIM(s) Dell PowerEdge M1000e The KVM Switc h Module (iKVM) is Integrated with this chassis. The iKVM is compatible with the following peripherals: • USB keyboards, USB pointing devices • VGA monitors with DDC support.
Chapter 7: Device Management 163 Blade chassis Connection method Recommended CIM(s) IBM BladeCenter E The current model BladeCenter E chassis (8677-3Rx) ships standard with one Advanced Management Module.
Chapter 7: Device Management 164 Blade chassis Required/recommended action Dell PowerEdge M1000e • Disable the iKVM GUI screensa ver. An authorize dialog will appear, preventing iKVM from working correctly, if this is not done. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM.
Chapter 7: Device Management 165 Blade chassis Required/recommended action Dell PowerEdge 1855/1955 • Disable the iKVM GUI screensa ver. An Authorize dialog will appear if this is not done and will p reven t the iKVM from operating correctly. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM.
Chapter 7: Device Management 166 Blade Chassis Sample URL Formats This table contains sam pl e URL formats for blade chassis b eing configured in the Dominion KX II.
Chapter 7: Device Management 167 Configuring USB Profiles (Port Page) You choose the available USB profiles for a po rt in the Select USB Profiles for Port section of the Port page . The USB profiles chosen in the Port page become the profiles availa ble to the user in VKC when connecting to a KVM target server from the port.
Chapter 7: Device Management 168 Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appe ar in the Sele cted list. These are the profiles that can be use for the KVM target server con nected to the port. To specify a preferred USB profile : 1.
Chapter 7: Device Management 169 2. Click Remove. The selected profiles appe ar in the Available list. The se profiles are no longer available for a KVM target se rver co nnected to this port.
Chapter 7: Device Management 170 2. Select the checkbox next to the Standard Local Port to enable it. Deselect the checkbox to disa bl e it. By default, the Standard Local port is enabled but can be disa bled a s needed. 3. If you are using a KX2-832 or KX2-864 device, sele ct the che ckbox next to the Extended Local Port to enable it.
Chapter 7: Device Management 171 5. Choose the local port hotkey. The local port hot key is used to return to the Dominion KX II Local Console interface when a target serve r interface is being viewed.
Chapter 7: Device Management 172 None. There is no authentication for Local Con sole access. This option is recommended for secure environme nts only . Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is unde r CC-SG m anagement.
Chapter 7: Device Management 173 KX2-832 and KX2-864 Stan d ard and Extended Local Port Setting s The KX2-832 and KX2-864 provide s you with two loca l port options: the Standard Local port and the Extended Local port.
174 In This Chapter Overview ................................................................................................ 174 Turning Outlets On/Off and Cycling Power .
Chapter 8: Powerstrip Outlet Control 175 Initially, when you open the Powerstrip page, the powerstrip s that are currently connected to the Domi nion KX II are displ ayed in the Powerstrip drop-down. Additionally, in formation relating to the cu rrently selected powerstrip is displayed.
Chapter 8: Powerstrip Outlet Control 176 4. Click On. 5. Click OK to close the Power On confirmati on dialog. The outlet will be turned on and its state will be di spla yed as 'on'. To turn an outlet off: 1. Click Off. 2. Click OK on the Power Off dialog.
Chapter 8: Powerstrip Outlet Control 177 2. Click OK. The outlet will then cycl e (note that this may take a few seconds). 3. Once the cycling is complete t he dialog will open.
178 In This Chapter Security Settings .................................................................................... 178 Checking Your Browse r for AES Encr yption ......................................... 185 Configuring IP Acc ess Control ....
Chapter 9: Security Management 179 To reset back to defaults: • Click Reset to Defaults. Login Limitations Using login limitations, you can spe cify restrictions for single login, password aging, and the logging out idle use rs.
Chapter 9: Security Management 180 Limitation Description Enable password aging When selected, all use rs a r e required to change their passwords periodicall y based o n the number of days specified in Password Aging Interval field. This field is enabled and required when t he Enable Password Aging c heckbox is se lected.
Chapter 9: Security Management 181 Field Description Maximum length of strong password The default is 16, but can be up to 64 characte rs long. Enforce at least one lower case chara cter When checked, at least one lowe r case character is required in the password.
Chapter 9: Security Management 182 Option Description Timer Lock out Users are de nied a ccess to the system for the specified amount of time after exceeding the specified number of unsuccessful logi n attempts.
Chapter 9: Security Management 183 Encryption mode Description Auto This is the recommended option. The Dominion KX II autonegotiates to the highest level of encryption possible. RC4 Secures user names, passwords and KVM data, including video transmissions usin g the RSA RC4 encryption method.
Chapter 9: Security Management 184 Private - No PC share. This is the defau lt mode. Each target server can be accessed exclusively by only one user at a time. PC-Share - KVM target servers can b e a ccessed by up to eight users (administrator or n on -administrator) at one time.
Chapter 9: Security Management 185 Checking Your Browser for AES Encryption The Dominion KX II supports AES-25 6. If you do not know if your browser uses AES, check with the br owser manufacturer or navigate to the https://www.fortify.net/sslcheck.ht ml website using the browser with the encryption method you want to check.
Chapter 9: Security Management 186 3. Choose the Default Policy. This is the action taken for IP addresses that are not within the ranges you specify. Accept - IP addresses are allo wed access to the Dominion KX II device. Drop - IP addresses are denied access to the Domi ni on KX II device.
Chapter 9: Security Management 187 2. Click Delete. 3. You are prompted to conf irm the deletion. Click OK..
Chapter 9: Security Management 188 SSL Certificates The Dominion KX II uses the Secure Socket Layer (S SL) protocol for any encrypted network traffic between it self and a conn ected client. When establishing a connection, the Do minion KX II has to identify itself to a client using a cryptographic certificate.
Chapter 9: Security Management 189 2. Complete the following fields: a. Common name - The network n ame of the Dominion KX II once it is installed in the user's network (usually the fully qualified domain name). It is identical to the name that is used to acce ss the Dominion KX II with a web browser but without th e prefix “http://”.
Chapter 9: Security Management 190 To upload a CSR: 1. Upload the certificate to the Dominion K X II by clicki ng the Upload button. Note: The CSR and the private key file are a m atched set and should be treated accordingly.
191 In This Chapter Audit Log................................................................................................ 191 Device Info rmation ................................................................................. 192 Back up and Restore .
Chapter 10: Maintenance 192 Device Information The Device Information page provides detailed info rmation about your Dominion KX II device and the CIMs in use. This information is hel pful should you need to contact Raritan Technical Support. To view information about your Dominion KX II and CIMs: • Choose Maintenance > De vice Informati on.
Chapter 10: Maintenance 193 Backup and Restore From the Backup/Restore page, you ca n backu p and restore the settings and configuration for your Dominion KX II. In addition to using backup and restore for busin ess continuity purposes, you can use this feature as a time -saving mechani sm.
Chapter 10: Maintenance 194 To restore your Dominion KX II: WARNING: Exercise caution when re storing your Dominion KX II to an earlier version. Usernames a nd pa ssword in place at the time of the backup will be restored. If you do not remembe r the old administrative username s and pa sswords, you will be locked out of the Dominion KX II.
Chapter 10: Maintenance 195 USB Profile Management From the USB Profile Management page, you can up load custom profiles provided by Raritan tech support. These profiles are designed to address the needs of your target se rver’ s co nfigura tion, in the event that the set of standard profiles doe s not alrea dy address them.
Chapter 10: Maintenance 196 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so will terminate any Virtual Media sessio ns that we re in place.
Chapter 10: Maintenance 197 3. Click the Upgrade button. You are prompted to confi r m the upgrade. 4. Click OK to continue the upgr ade. Progress bars are displ ayed during the upgrade.
Chapter 10: Maintenance 198 6. Click Upload from the Firmwa re Upgrade page. Information ab out the upgrade and version numbers i s displayed for your confirmation (if you opted to review CIM information, that information is displayed as well): Note: At this point, connected users are logge d out, and new login attempts are blocked.
Chapter 10: Maintenance 199 For information about upgradi ng the device firmware using the Multi-Platform Client, see Upgr ading Device Firmware in the KVM and Serial Client Guide .
Chapter 10: Maintenance 200 users will be logged off. To reboot your Dominion KX II: 1. Choose Maintenance > Re boot. The Re boot page opens. 2. Click Reboot.
Chapter 10: Maintenance 201 Stopping CC-SG Management While the Dominion KX II is under CC-S G management, if you try to access the device dire ctly, you are not ifi ed that it the device is under CC-SG management.
Chapter 10: Maintenance 202 3. Click Yes to remove the device CC-SG manageme nt. Once CC-SG management has ended, a conf irmation will be displayed..
203 In This Chapter Network Interface Page ......................................................................... 203 Network Statis tics Page ......................................................................... 204 Ping Host Page ............
Chapter 11: Diagnostics 204 Network Statistics Page The Dominion KX II provides statisti cs about your network interface. To vie w stati stics about your net work interface: 1. Choose Diagnostics > Network Statistics. The Network Statistics page opens.
Chapter 11: Diagnostics 205 Interfaces - Produces a pa ge si mil ar to the one displayed here. Route - Produces a page simila r to the one displayed here.
Chapter 11: Diagnostics 206 Ping Host Page Ping is a network tool used to test whet her a p articular host or IP address is reach able across an IP network. Using th e Ping Host page, you can determine if a target server or another Domi nion KX II is accessible.
Chapter 11: Diagnostics 207 2. Type either the IP address or ho st name into the IP Address/Ho st Name field. Note: The host name cannot exceed 2 32 characters in length. 3. Choose the maximum hops from the drop-down li st (5 to 50 in increments of 5).
Chapter 11: Diagnostics 208 Device Diagnostics Note: This page is for use by Raritan Field Engin eers or wh en you are directed by Raritan Techni cal Support. Device diagnostics downlo ads the di agnostics information from the Dominion KX II to the client machine.
Chapter 11: Diagnostics 209 a. Click the Save to File button. The File Download dialog open s. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
210 In This Chapter Overview ................................................................................................ 210 Accessing the Domini on KX II Us ing CLI .............................................. 211 SSH Connection to the Dominion KX II .
Chapter 12: Command Line Interface (CLI) 211 Accessing the Dominion KX II Using CLI Access the Dominion KX II by us ing one of the following methods: • Telnet via IP connection • SSH (Secure Shell.
Chapter 12: Command Line Interface (CLI) 212 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX/Linux workstation and log in as the user admin, enter the following command: ssh -l admin 192.168.30.222 The Password prompt appears.
Chapter 12: Command Line Interface (CLI) 213 Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default pa ssword: raritan The welcome message displays. You are now logged on as an administrator.
Chapter 12: Command Line Interface (CLI) 214 Navigation of the CLI Before using the CLI, it is important to understand CL I navigation and syntax. There are also some keystro ke combin ation s that simplify CLI use. Completion of Commands The CLI supports the completion of parti ally-ente red commands.
Chapter 12: Command Line Interface (CLI) 215 Common Commands for All Command Line Interface Lev els Following are the commands that are available at all CLI levels. These commands also hel p navig ate through the CLI. Commands Description top Return to the top level of the CLI hierarchy, or the “username” prompt.
Chapter 12: Command Line Interface (CLI) 216 Setting Network Parameters Network parameters are configur ed u sing the interface command. admin > Config > Network > interface enable true i f lan1 ip 192.16.151.12 mask 255.255.255 gw 192.168.51.
Chapter 12: Command Line Interface (CLI) 217 Command Description history Display the current session's command line history. listports List accessible ports. logout Logout of the current CLI session. top Return to the root menu. userlist List active user sessions.
Chapter 12: Command Line Interface (CLI) 218 Administering the Dominion KX II Console Server Configuration Commands Note: CLI commands are the same for SSH, Telnet, and Lo cal Port access sessi ons. The Network command ca n be accessed in the Configuration menu for the Dominion KX II.
Chapter 12: Command Line Interface (CLI) 219 Interface Command The Interface command is used to confi gure the Dominion KX II network interface. The syntax of the interface command is: interface [ipau.
Chapter 12: Command Line Interface (CLI) 220 IPv6 Command Use the IPv6 command to set IPv6 network parameters and ret riev e existing IPv6 parameters..
221 In This Chapter Overview ................................................................................................ 221 Using the Dominion KX II Local Console .............................................. 221 Dominion KX II Local Co nsole Interface .
Chapter 13: Dominion KX II Local Console 222 Dominion KX II Local Console Interface When you are located at the server rack, the Domi nion KX II provides standard KVM management and admini stration via the Domi nion KX II Local Console.
Chapter 13: Dominion KX II Local Console 223 Available Resolutions The Dominion KX II Local Console provides the following re solutions to support va rious monitors : • 800x600 • 1024x768 • 1280x1024 Each of these resolutions supports a refresh rate of 60 Hz and 75Hz.
Chapter 13: Dominion KX II Local Console 224 Port Access Page (Local Console Server Display) After you login to the Dominion KX II Local Console, the Port Access page opens. This page lists all of the Do minion KX II port s, the connected KVM target servers, an d thei r status and availability.
Chapter 13: Dominion KX II Local Console 225 The KVM target servers are initially sorted by Port Nu mber. You can change the display to sort on any of the column s. Port Number - Numbe red f rom 1 to the total number of ports available for the Dominion KX II device.
Chapter 13: Dominion KX II Local Console 226 Hot Keys and Connect Keys Because the Dominion KX II Local Console interface i s co mpletely replaced by the interface for the targ et se rver you are accessing, a hot key is used to disconnect from a target and return to the local port GUI.
Chapter 13: Dominion KX II Local Console 227 Blade chassis Connect key action Key sequence example Disconnect from a target and return to the local port GUI Disconnect from target port 5, slot 11 and .
Chapter 13: Dominion KX II Local Console 228 Accessing a Target Server To access a target se rv er: 1. Click the Port Name of the tar get you want to access. The Port Action Menu is displayed. 2. Choose Connect from the Port Action m enu. The vide o display switches to the target server interface.
Chapter 13: Dominion KX II Local Console 229 Configuring Dominion KX II Local Console Local Port Settings From the Local Port Settings page, you can customi z e many settings for the Dominion KX II Lo.
Chapter 13: Dominion KX II Local Console 230 Hot key: Take this action: Double Click Scroll Lock Press Scroll Lock key twice quickly Double Cl ick Num Lock Press Num Lock key twice qu ickly Double Cl .
Chapter 13: Dominion KX II Local Console 231 Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is unde r CC-SG m anagement.
Chapter 13: Dominion KX II Local Console 232 Configuring Dominion KX II Local Po rt Settings from the Loc al Console The Standard Local port and the Extended Lo cal port can be configure d from the Remote Console on the Port Configu ration p age o r from the Local Console on the Local Port Settings pag e.
Chapter 13: Dominion KX II Local Console 233 Ping interval (seconds) Timeout (seconds) 1. Click Reset to continue. You w ill be prompted to confirm the factory reset because all network setti ngs will be permanently lost. 2. Click OK button proceed.
234 In This Chapter Physical Specifications .......................................................................... 234 Environmental Requirements ................................................................ 237 Computer Int erfac e Modules (CIMs) .
Appendix A: Specifications 235 Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) 9.
Appendix A: Specifications 236 Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) 11.
Appendix A: Specifications 237 Environmental Requirements Operating Temperature 0°C- 40°C (32°F - 104°F) Humidity 20% - 85% RH Altitude N/A Vibration 5-55-5 HZ, 0.
Appendix A: Specifications 238 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) UPC code DCIM-USB Dominion KX I & II Computer Interface Module [USB Port] 0.2 lbs 1.3" x 3.
Appendix A: Specifications 239 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) UPC code D2CIM-DVUSB Dominion KX II Computer Interface Module [Dual USB Port with Virtual Media] 0.23 lbs, 105 g 3.
Appendix A: Specifications 240 Supported Paragon CIMs Opera ting system and serial devices (where applicable) Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • P2CIM-PS2 • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.
Appendix A: Specifications 241 Supported Paragon CIMs Opera ting system and serial devices (where applicable) Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • UKVMPD • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.
Appendix A: Specifications 242 Supported Dominion KX I DCIMs Target server Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • DCIM-PS2 • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.
Appendix A: Specifications 243 Supported Dominion KX I DCIMs Target server Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • DCIM-USB G2 • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.
Appendix A: Specifications 244 Supported Dominion KX II D2CIMs Target server and remote power strips (where applicable) Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • D2CIM-VUSB • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • SUSE Linux Professional 9.
Appendix A: Specifications 245 Certified Modems • US Robotics 56K 5686E • ZOOM v90 • ZOOM v92 • US Robotics Sportster 56K • US Robotics Courie r 56K Devices Supported by the KX2-832 a nd KX2.
Appendix A: Specifications 246 Note: Due to the multiplicity of server manufa cturers and types, OS versions, video dri vers, and so fort h and the subjective nature of video quality, Raritan cannot guarantee perfor m ance a cross all distances in all environments.
Appendix A: Specifications 247 Resolutions 640x350 @85 Hz 800x600 @56 Hz 1024x768 @100 Hz 640x400 @56 Hz 800x600 @60 Hz 1152x864 @60 Hz 640x400 @84 Hz 800x600 @70 Hz 1152x864 @70 Hz 640x400 @85 Hz 800x600 @72 Hz 1152x864 @75 Hz 640x480 @60 Hz 800x600 @75 Hz 1152x864 @85 Hz 640x480 @66.
Appendix A: Specifications 248 Language Regions Keyboard lay out Chinese Traditional Hong Kong S. A. R., Republic of China (Taiwan) Chinese Traditional Chinese Simplified Mainland of the People’s Republic of China Chinese Simplified Korean South Kore a Dubeolsik Hangul Japanese Japan JIS Keyboard French France French (AZERTY) layout keyboard.
Appendix A: Specifications 249 Client OS Virtual media (VM) support on client SUSE Linux Professional 9.2 and 10 Yes. Locally held ISO image, Remote File Server mounting direct ly from Dominion KX II Fedora™ Core 5 and above Yes.
Appendix A: Specifications 250 Supported Browsers Dominion KX II supports the following browse rs: • Internet Explorer 6, 7 and 8 • Firefox 1.5, 2.
Appendix A: Specifications 251 Port Description HTTP, Port 80 All requests received by the Dominion KX II via HTTP (port 80) are automatically forwarded to HTTPS for complete security.
Appendix A: Specifications 252 Network Speed Settings Dominion KX II network speed setting Auto 1000/Full 100/Full 100/Half 10/Full 10/Half Auto Highest Available Speed 1000/Full Dominion KX II: 100/F.
Appendix A: Specifications 253 Functions; not recommen ded NOT supported by Ethernet spe cification; product will communicate, but collisions will occur Per Ethernet specification, these should be “.
254 Note: The procedures in this chapter sh o uld be attempted only by experienced use r s. In This Chapter Returning User Gr oup Inform ation ........................................................ 254 Setting the Registry to Permit Write Operations to the Schema .
Appendix B: Updating the LDAP Schema 255 Setting the Registry to Permit Wr ite Operations to the Schema To allow a domain controller to write to the schema, you mu st set a registry entry that permits schema up dates. To permit write operations to the sche ma: 1.
Appendix B: Updating the LDAP Schema 256 3. Click New and then choose Attribute. When the warni ng me ssage appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciuserg roup in the Common Name field. 5. Type rciuserg roup in the LDAP Display Name field.
Appendix B: Updating the LDAP Schema 257 2. Scroll to the user class in the right pane and rig ht-click it. 3. Choose Properties from the menu. The use r Pro perties dialog appears.
Appendix B: Updating the LDAP Schema 258 6. Choose rciusergroup from the Select Schema O bject list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1. Right-click Active Directory Schem a in the left pane of the window and select Reload the Schema.
Appendix B: Updating the LDAP Schema 259 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4.
Appendix B: Updating the LDAP Schema 260 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose prop er ties you want to adjust in the right pane.
Appendix B: Updating the LDAP Schema 261 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the Dominion KX II) in the Edit Attribute field.
262 In This Chapter Overview ................................................................................................ 262 Java Runtime Envi ronment (JRE) ......................................................... 262 IPv6 Suppor t Notes .......
Appendix C: Informational Notes 263 IPv6 Support Notes Java Java 1.5 supports IPv6 for the following: • Solaris 8 and higher • Linux kernel 2.1.2 and higher (RedHat 6.1 and highe r) Java 5.0 and above supports the IPv6 for the following: • Solaris 8 and higher • Linux kernel 2.
Appendix C: Informational Notes 264 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux Clients Only) The Virtual KVM Client and the Multi-Platform Clie nt (MPC) do not process the key combination of Alt Gr + 9 as the care t symbol (^) when using French keyboards with Linux clients.
Appendix C: Informational Notes 265 Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde symbol: Create a macro consisting of the following command s: • Press right Alt.
Appendix C: Informational Notes 266 Language Configuration method Norwegian Keyboard Indicator Swedish Keyboard Indicator Danish Keyboard Indicator Japanese System Settings (Control Center) Korean Sys.
Appendix C: Informational Notes 267 Macintosh Keyboard When a Macintosh is used as the clie nt, the following keys on the Mac keyboard are not captured by the Java Runtime Environment (JRE): • F9 .
Appendix C: Informational Notes 268 Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recomm ends using the following cable length s and video re solutions when you are con necting to Dell blade chassis from the Dominion KX II: Cable length Video resolution 50 ft.
Appendix C: Informational Notes 269 SUSE/VESA Video Modes The SuSE X.org configuration tool SaX2 gene rates video modes using modeline entries in the X.org conf iguration file. These video mod es do not correspond exactly with VESA video mode timing (even when a VESA monitor is selected).
Appendix C: Informational Notes 270 Help for Choosing USB Profiles When you are connected to a KVM target server in VKC, you can view information about USB profiles via the Help on USB P rofile s com mand on the USB Profile menu.
Appendix C: Informational Notes 271 USB profile help appears in the USB Profile Help win dow. For detailed information about specific USB profiles, see Availabl e USB Profiles (on page 88). Ra ritan provides a standar d sele ction of USB configuration profiles for a wide range of operating sy stem and BI OS level server implementations.
Appendix C: Informational Notes 272 CIMs Windows 3-Button Mouse on Linux Targets When using a 3-button mo use o n a Wi ndows client connecting to a Linux target, the left mouse button may get mapped to the center button of the Windows client 3-button mouse.
Appendix C: Informational Notes 273 Virtual Media Virtual Media Not Refreshed After Files Add ed After a virtual media drive has been mo unted, if you add a file(s) t o that drive, those files may not be immedi ately visible on the target server. Disconnect and then reconnect the virtu al media connection.
Appendix C: Informational Notes 274 Moving Between Ports of the Domini on KX II If you move a between ports of the same Domini on KX II and resume management within one minute, CC-SG may displ ay an error message. If you resume management, the display will be update d.
275 In This Chapter General Questions ................................................................................. 276 Remote Access ..................................................................................... 278 Universal Virt ual Media .
Appendix D: FAQs 276 General Questions What is the Dominion KX II? The Dominion KX II is a second generation digital KVM (keyb oard/video/ mouse) switch that enables one, two, four or ei ght IT administrators to access and control 8, 16, 32 or 64 servers ove r the ne twork with BIOS-level functionality.
Appendix D: FAQs 277 In general, customers can continue to use their existing switches f or many years. As their data centers expand, custome rs can purchase an d use the new Dominion KX II models.
Appendix D: FAQs 278 Remote Access How many users can remotely access servers on each Dominion KX II? The Dominion KX II models offer remot e con ne ctions for up to eight users per user channel to simultane ously access and control a unique target server.
Appendix D: FAQs 279 Speed Description Time 100Mbps Theoretical 100Mbit net wo rk speed 0.05 seconds 60Mbps Likely practical 100Mbit ne twork spee d 0.08 seconds 10Mbps Theoretical 10Mbit network speed .4 seconds 6Mbps Likely practical 10Mbit network speed .
Appendix D: FAQs 280 Universal Virtual Media What Dominion KX II models support virtual media? All of the Dominion KX II models support virtual media. It is available standalone and through Raritan's CommandCenter Secure Gateway, Raritan's centrali zed ma nagement unit.
Appendix D: FAQs 281 USB Profiles What is a USB profile? Certain servers require a specifi ca lly configured USB interface for USB based services such as virtual medi a. The USB Profile tailors the Dominion KX II’s USB interface to the server to accommodate these server spe cif ic ch aracterist ics.
Appendix D: FAQs 282 A BIOS profile has been tailored to match the requirem ents of a particular server’s BIOS that does not impleme nt the full USB specification. The profile enables use of keyboard, mouse, and virtual media at the BIOS level, overcoming th e restrictions or limitations of the BIOS.
Appendix D: FAQs 283 Ethernet and IP Networking Does the Dominion KX II offer dual gigabit Ethernet por ts to p rovide redundant fail-over? Yes. The Dominion KX II features dual gigabit Ethernet ports to provide redundant failover capabilities.
Appendix D: FAQs 284 Other factors include the server’s video resolutio n, networking speed and characteristics, client PC resources, an d video ca rd noise. The Dominion KX II has very sophistica t ed video pro cessing algorithms that optimize bandwidth and perfo rma nce for a variety of environments.
Appendix D: FAQs 285 User ta sk Default 1Mbit speed & 15 bit color 1Mbit speed & 8 bit color Close browser 100 - 150 KB/s 75 - 100 KB/s 30 - 60KB/s Open Start menu 75 - 100 KB/s 50 -75 KB/s 20.
Appendix D: FAQs 286 With the reduced bandwidt h settings, bandwidth is reduced si gnificantly for virtually all tasks. With the 15 bi t color setting, perceived performance is similar to the default parameters. Further, bandwidth reductio ns are possible with additional ch ange s in the settings.
Appendix D: FAQs 287 The connection speed a nd color depth settings can be tweaked to optimize performance for slower bandwi dth links. For example, in the Multi-Platform Client or the Virtual KVM Client, set the connection speed to 1.5Mb or 1Mb and the color depth to 8 bit.
Appendix D: FAQs 288 Only one. The Dominion KX II protects netwo rk se curity by only requiring access to a single TCP port to operate. This port is completely configurable for additional se curity. Note that, of course, to use the Dominion KX II's optional web b rowser capability, the standard HTTPS port 443 must also be open.
Appendix D: FAQs 289 When changing the IP addre ss of the Dominio n KX II or swapping in a new Dominion KX II, sufficient time must be allowed for its IP and MAC addresses to be known through out the L ayer 2 and Layer 3 networks.
Appendix D: FAQs 290 IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Prot ocol Version 6”. IPv6 is the “next generation” IP protocol which will repl ace the cu rrent IP Version 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses.
Appendix D: FAQs 291 The Dominion KX II’s default networking is set at the factory for IPv4 only. When you are ready to use IPv6, then follow the above instruction s to enable IPv6/IPv4 dual stack operation. Where can I get more information on IPv6? See www.
Appendix D: FAQs 292 Servers Does the Dominion KX II depend on a Windo ws server to operate? Absolutely not. Because users depend on the KVM infrastru cture to always be available in any scenario what.
Appendix D: FAQs 293 Blade Servers Can I connect blade servers to the Dominion KX II? Yes you can. The Dominion KX II supports popular blade serve r models from the leading blade serv er man ufacturers: HP, IBM and Dell.
Appendix D: FAQs 294 Are the Paragon Blade CIMs used? No, the Paragon II Blade CIM will not work with the Dominion KX II. Which CIM should I use? It depends on the type of KVM ports on the specifi c m ake and model of the blade server you are using. The following CIM s are supported: DCIM-PS2, DCIM-USBG2, D2CIM-VUSB and D2CIM-DV USB.
Appendix D: FAQs 295 I'm running VMware on some of my blade servers. Is this supported? Yes, with CC-SG you can display and access virtual machi nes running on blade servers. Is virtual media supported? We support VM on IBM BladeCenter Model H and E with the D2CI M - DVUSB.
Appendix D: FAQs 296 Installation Besides the devi ce itself, what do I need to order from Raritan to install the Dominion KX II? Each server that connects to the Domini on KX II requires a Dominion or Paragon Computer Interface Modul e (CIM), an adapter that connects directly to the keyboard, video, and mouse ports of th e server.
Appendix D: FAQs 297 Servers connected to the Dominion KX II do not require any softwa re agents to be installed, because the Dominion KX II connects di re ctly via hardware to servers' keyboa rd, video, and mouse ports.
Appendix D: FAQs 298 Local Port Can I access my serv ers directly from the rack? Yes. At the rack, the Dominion KX II functions just like a traditional KVM switch, allowing co ntrol of up to 64 servers using a si ngle keyboard, monitor, and mouse. When I am using the local port, do I prevent other users from accessing servers remotely ? No.
Appendix D: FAQs 299 If I use the local port to change the name of a connected serv er, does this change propagate to remote acce ss clients as well? Does it propagate to the optional Command Center unit? Yes.
Appendix D: FAQs 300 Extended Local Port (Dominion KX 2-832 and KX2-864 Models Only) What is the Extended Local port? The Dominion KX2-832 and KX2-864 feature an extended lo cal p ort.
Appendix D: FAQs 301 Power Control Does the Dominion KX II have a dual po w er optio n? All of the Dominion KX II models come equipped with dual AC inp uts and power supplies with auto matic fail-ove r. Should one of the power inputs or power supplies fail, t hen the Dominion KX II will automatically switch to the other.
Appendix D: FAQs 302 To take advantage of the Dominion KX II's integrated powe r control user interface, and more importantly, integrat ed se curity, use Raritan's Remote Power Control (R PC) power st rips. RPCs come in many outlet, connector, and amp variations.
Appendix D: FAQs 303 Computer Interface Modules (CIMs) Can I use Computer Interface Modules (CIMs) fro m Raritan 's analog matrix KVM switch, Paragon, with the Dominion KX II? Yes.
Appendix D: FAQs 304 Security What kind of encryption does the Dominion KX II use? The Dominion KX II uses industry-s tandard (and extremely secure ) RC4 or AES encryption, both in its SSL communications as well as its own data stream.
Appendix D: FAQs 305 The encryption level that is autonegotiated is depend ent on the browser in use. Manageability Can the Dominion KX II be remotely managed and configured via web br o wser ? Yes, the Dominion KX II can be completely configu re d remotely via web browser.
Appendix D: FAQs 306 Miscellaneous What is the Dominion KX II's default IP address? 192.168.0.192 What is the Dominion KX II's default user name and pass word? The Dominion KX II's default user name is admin and the default password is raritan [all lower case].
307 A A. AC Power • 26 Absolute Mouse Mode • 71 Access Telnet from a Windows PC • 212 Accessing a Target Server • 228 Accessing the Dominion KX II Using CL I • 211 Adding a New User • 106 .
Index 308 Disconnecting KVM Target Servers • 55 Disconnecting Virtual Media • 82, 86 Discovering Devices on the Dominion K X II Subnet • 47 Discovering Devices on the Local Subnet • 46 Dominio.
Index 309 Logging Out • 50 Login Limitations • 178, 179 M Macintosh Keyboard • 267 Maintenance • 191 Make Linux Settings Permanent • 20 Make UNIX Settings Permanent • 24 Manage Favorites P.
Index 310 Setting Network Parameters • 216 Setting Parameters • 215 Setting Permissions • 98, 103, 104 Setting Permissions for an Individual G roup • 104, 106 Setting Port Permissions • 101,.
Index 311 VKC Virtual Media • 72 VM-CIMs and DL360 USB Ports • 269 W What's New in the Help • 2 Windows 2000 Compo site USB Device Behavior for Virtual Media • 272 Windows 2000® Settings.
U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800-724- 809 0 or 732- 764- 8886 For CommandCenter NOC: Press 6, then Pr ess 1 For CommandCenter Secure Gateway : Press 6, then Press 2 Fax: 732-764-88 87 Email for CommandCenter NOC: tech-ccnoc@rarita n .
Een belangrijk punt na aankoop van elk apparaat Raritan Engineering KX2-864 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Raritan Engineering KX2-864 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Raritan Engineering KX2-864 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Raritan Engineering KX2-864 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Raritan Engineering KX2-864 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Raritan Engineering KX2-864 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Raritan Engineering KX2-864 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Raritan Engineering KX2-864 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.