Raritan Dominion KX II Server KX2-432 manuals
Dominion KX II Server KX2-432
Table of contents
- user guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Chapter 1 Introduction
- Dominion KX II Overview
- Virtual Media
- Product Features
- Software
- Terminology
- Package Contents
- Organization of Information
- Related Documentation
- Chapter 2 Getting Started
- Supported Browsers
- Supported Operating Systems and CIMs (Target Servers)
- D2CIM-USB G2 Note
- Chapter 3 Installation and Configuration
- Step 1: Configure Target Servers
- Desktop Background
- Windows XP / Windows 2003 Settings
- Windows 2000 Settings
- Linux Settings (Red Hat 9)
- Linux Settings (Red Hat 4)
- SUSE Linux 10.1 Settings
- Make Linux Settings Permanent
- Figure 6: Solaris Mouse Configuration
- IBM AIX 5.3 Settings
- Make UNIX Settings Permanent
- Change the Keyboard Layout Code (Sun Targets)
- Step 4: Connect the Equipment
- Network Ports
- Target Server Ports
- Changing the Default Password
- Assigning an IP Address
- Naming Target Servers
- Specifying Power Supply Auto-detection
- Note to CC-SG Users
- Authentication vs. Authorization
- Users, Groups, and Access Permissions
- Relationship between Users and Groups
- Chapter 4 Connecting to the Dominion KX II
- KX II Local Console: KX II Devices
- Dominion KX II Remote Console: Dominion KX II Devices
- Multi-Platform Client (MPC): KX I and Dominion KX II Devices
- Raritan Remote Client (RRC): KX I Devices Only
- Launching the Dominion KX II
- Dominion KX II Console Layout
- Logging Out
- Managing Favorites
- Manage Favorites Menu
- Favorites List
- Figure 16: Edit (Favorite Information)
- Discover Devices - Local Subnet
- Discover Devices - KX Subnet
- Add New Favorite
- Chapter 5 Accessing Target Servers
- Port Access
- Connecting to a Target Server
- Port Action Menu
- Switching between Target Servers
- Power Controlling a Target Server
- Power Off a Target Server
- Chapter 6 Virtual KVM Client
- Overview
- Options
- Mouse Pointer Synchronization
- Mouse Synchronization Tips
- Connection Menu
- Connection Info
- Exit
- Keyboard Menu
- Creating a Keyboard Macro
- Figure 30: Keyboard Macro Example
- Running a Keyboard Macro
- Video Menu
- Calibrate Color
- Figure 32: Video Settings
- Mouse Menu
- Single Mouse Cursor
- Standard
- Tools Menu
- View Menu
- Help Menu
- Chapter 7 Virtual Media
- Figure 35: Virtual Media Connection
- Prerequisites for Using Virtual Media
- Using Virtual Media
- Opening a KVM Session
- Connecting to Virtual Media
- Conditions when Read-Write is not Available
- Disconnecting Virtual Media
- File Server Setup (File Server ISO Images Only)
- Chapter 8 User Management
- User List
- Add New User
- Modify Existing User
- User Group List
- Add New User Group
- Figure 43: Group
- Setting Permissions
- Setting Port Permissions
- Figure 44: Group-based IP Access Control List
- Figure 45: IP ACL Example
- Modify Existing User Group
- Set Permissions for Individual Group
- Change Password
- Authentication Settings
- Figure 48: Authentication Settings
- Implementing LDAP Remote Authentication
- Returning User Group Information from Active Directory Server
- Implementing RADIUS Remote Authentication
- Returning User Group Information via RADIUS
- RADIUS Communication Exchange Specifications
- Chapter 9 Device Management
- Network Settings
- Network Basic Settings
- Network Miscellaneous Settings
- LAN Interface Settings
- Date/Time Settings
- Event Management
- Event Management - Settings
- Syslog Configuration
- Event Management - Destinations
- SNMP Agent Configuration
- Power Supply Setup
- Port Configuration
- Power Control
- Name the Power Strip (Port Page for Power Strips)
- Associate Target Servers to Outlets (Port Page)
- Note for D2CIM-VUSB CIM Usage
- Chapter 10 Security Settings
- Security Settings
- Login Limitations
- Strong Passwords
- User Blocking
- Encryption & Share
- Figure 69: Security Settings (Encryption Mode Warning Message)
- Checking Your Browser for AES Encryption
- Figure 70: IP Access Control
- Chapter 11 Maintenance
- Audit Log
- Device Information
- Backup and Restore
- CIM Upgrade
- Firmware Upgrade
- Figure 76: Firmware Upgrade Review
- Upgrade Report
- Figure 79: Reboot
- Chapter 12 Diagnostics
- Network Interface
- Network Statistics
- Figure 83: Network Statistics (interfaces)
- Ping Host
- Trace Route to Host
- KX Diagnostics
- Figure 87: KX Diagnostics
- Figure 89: File Download
- Chapter 13 KX II Local Console
- Physical Connections
- Starting the KX II Local Console
- Security and Authentication
- Accessing Target Servers
- Hotkeys
- Local Port Administration
- Factory Reset (KX II Local Console Only)
- Chapter 14 CC Unmanage
- Removing Dominion KX II from CC-SG Management
- Figure 99: Device Removed from CC Management
- Appendix A Specifications
- Physical Specifications
- Electrical Specifications
- Remote Connection
- TCP and UDP Ports Used
- Target Server Connection Distance and Video Resolution
- Appendix B Updating the LDAP Schema
- Setting the Registry to Permit Write Operations to the Schema
- Adding Attributes to the Class
- Figure 102: Adding the Attributes
- Updating the Schema Cache
- Figure 105: ADSI Edit (CN=Users)
- Figure 106: Administrator Properties (attribute editor)
- Figure 107: User Properties
- Appendix C Informational Notes
- Accent Symbol (Windows XP Clients only)
- Java Runtime Environment (JRE)
- Macintosh Keyboard
- Resolving Fedora Core Focus
- CIMs
- CC-SG
- Appendix D FAQs
- General Questions
- Remote Access
- Universal Virtual Media
- Ethernet and IP Networking
- Servers
- Installation
- Local Port
- Scalability
- Computer Interface Modules (CIMs)
- Security
- Manageability
- Miscellaneous
- Troubleshooting
- Index
- Table Of Contents
- Table Of Contents
- Table Of Contents
Dominion KX II Server KX2-432
Table of contents
- user guide
- fcc information
- safety guidelines
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Chapter 1: Introduction
- Virtual Media
- Product Photos
- Product Features
- Terminology
- User Guide
- Chapter 2: Getting Started
- Supported Operating Systems and CIMs (Target Servers)
- Chapter 3: Installation and Configuration
- Desktop Background
- windows 2000 settings
- make linux settings permanent
- Figure 6: Solaris Mouse Configuration
- make unix settings permanent
- Step 2 (Optional): Configure Keyboard Language
- Step 4: Connect the Equipment
- target server ports
- Step 5: Dominion KX II Initial Configuration
- Assigning an IP Address
- Naming Target Servers
- Note to CC-SG Users
- Remote Authentication
- Authentication vs. Authorization
- Users, Groups, and Access Permissions
- Chapter 4: Connecting to the Dominion KX II
- Multi-Platform Client (MPC) − KX I and KX II Devices
- Language Support
- Launching the KX II
- KX II Console Layout
- KX II Console Navigation
- KX II Console Menu Tree
- Managing Favorites
- Manage Favorites Menu
- Favorites List
- Figure 19: Edit (Favorite Information)
- Discover Devices – Local Subnet
- Discover Devices – KX Subnet
- Add New Favorite
- Chapter 5: Accessing Target Servers
- Port Action Menu
- Connecting to a Target Server
- Power Controlling a Target Server
- Chapter 6: Virtual KVM Client
- Options
- Mouse Pointer Synchronization
- Connection Menu
- Connection Info
- Keyboard Menu
- Figure 32: Add Keyboard Macro
- Figure 34: New Macro in Keyboard Menu
- Video Menu
- Video Settings
- Mouse Menu
- Standard
- Tools Menu
- View Menu
- Chapter 7: Virtual Media
- Prerequisites for Using Virtual Media
- Opening a KVM Session
- CD-ROM/DVD-ROM/ISO Images
- Disconnecting Virtual Media
- File Server Setup (File Server ISO Images Only)
- Chapter 8: User Management
- User List
- Add New User
- Modify Existing User
- User Group List
- Add New User Group
- Setting Permissions
- Group-based IP ACL (Access Control List)
- Figure 49: IP ACL Example
- Modify Existing User Group
- set permissions for individual group
- Change Password
- Authentication Settings
- Implementing LDAP Remote Authentication
- returning user group information from active directory server
- Implementing RADIUS Remote Authentication
- returning user group information via radius
- Chapter 9: Device Management
- Network Settings
- Network Basic Settings
- Network Miscellaneous Settings
- Date/Time Settings
- Event Management
- Figure 62: Syslog Configuration
- Event Management – Destinations
- SNMP Agent Configuration
- SNMP Trap Configuration
- Power Supply Setup
- Port Configuration
- Power Control
- Name the Power Strip (Port Page for Power Strips)
- Associate Target Servers to Outlets (Port Page)
- Figure 69: Port Page (Target Server Settings for D2CIM-VUSB)
- Chapter 10: Security Settings
- Security Settings
- Login Limitations
- User Blocking
- Encryption & Share
- checking your browser for aes encryption
- IP Access Control
- Chapter 11: Maintenance
- Audit Log
- Device Information
- Backup and Restore
- CIM Upgrade
- Firmware Upgrade
- Figure 83: Firmware Upgrade Review
- Upgrade Report
- Reboot
- Chapter 12: Diagnostics
- Network Interface
- Network Statistics
- Figure 92: Network Statistics (route)
- Ping Host
- Trace Route to Host
- KX Diagnostics
- Figure 96: Diagnostics Scripts
- Chapter 13: KX II Local Console
- Reset Button
- Starting the KX II Local Console
- Accessing Target Servers
- accessing a target server
- Local Port Administration
- Factory Reset (KX II Local Console Only)
- Chapter 14: CC Unmanage
- Figure 106: Confirm CC Unmanage
- Appendix A: Specifications
- Remote Connection
- TCP and UDP Ports Used
- Target Server Connection Distance and Video Resolution
- Appendix B: Updating the LDAP Schema
- Adding Attributes to the Class
- Updating the Schema Cache
- Figure 111: User Properties
- Appendix C: Informational Notes
- Java Runtime Environment (JRE)
- Mouse Pointer Synchronization (Fedora)
- CIMs
- Appendix D: FAQs
- Remote Access
- Universal Virtual Media
- Ethernet and IP Networking
- Servers
- Installation
- Local Port
- Scalability
- Computer Interface Modules (CIMs)
- Security
- Manageability
- Miscellaneous
- Troubleshooting
Related products
Dominion KX II Server KX2-232Dominion KX II Server KX2-416Dominion KX II Server KX2-132Dominion KX II KX2-432Dominion KX II Server KX2-216Dominion KX II KX2-132Dominion KX II KX2-232Dominion KX II KX2-416Dominion KX II KX2-464Dominion KX IIRaritan categories
Switch
Accessories
Server
Power distribution unit
Network Hardware
Toilets
LCD Drawer
Gateway
Personal Care Products
Marine Sanitation System
manualsdatabase
Your AI-powered manual search engine