Dell Kvm 2162Ds Users Manual Dell™ Remote Console Switch Hardware User's Guide
2014-11-13
: Dell Dell-Kvm-2162Ds-Users-Manual-116358 dell-kvm-2162ds-users-manual-116358 dell pdf
Open the PDF directly: View PDF
.
Page Count: 188
| Download | |
| Open PDF In Browser | View PDF |
Dell™ Remote Console Switch User's Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, and PowerEdge are trademarks of Dell Inc.; Avocent is a trademark or registered trademark of Avocent Corporation or its affiliates in the U.S. and other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. 590-1021-501B July 2012 Model 1082DS/2162DS/4322DS Remote Console Switch Contents Product Overview 1 Features and Benefits Reduce Cable Bulk KVM Switching Capabilities Multiplatform Support True Serial Capabilities Local and Remote User Interfaces Virtual Media and Smart Card-capable Switches On-board Web Interface Access the Switch Using a Standard TCP/IP Network Encryption Video Flash Upgradeable Tier Expansion Avocent Management Software Plug-in FIPS cryptographic module 1 2 2 2 3 3 3 4 4 4 4 5 5 5 5 Sample Configuration 7 Safety Precautions 8 General 9 LAN Options Installation 10 13 RCS Quick Setup 13 Getting Started Setting up Your Network 15 16 Rack Mounting the RCS Rack Mounting Safety Considerations Installing the Dell ReadyRails™ System 16 16 17 Contentsxxx | xxxi Installing the RCS 22 Connecting the RCS Hardware Connecting a SIP Adding a Tiered Switch Cascading with Legacy Switches Adding a PEM (Optional) 25 29 31 34 36 Configuring the Remote Console Switch Setting up the Built-in Web Server Connecting to the OBWI Through a Firewall 38 38 38 Verifying the Connections Rear Panel Ethernet Connection LEDs Rear Panel Power Status LEDs 41 41 41 Adjusting Mouse Settings on Target Devices 42 Local and Remote Configuration 43 Local User Interface (UI) Filtering 43 44 OBWI 45 Using the User Interfaces 47 Launching a Session 49 Scan Mode 50 Viewing System Information 51 RCS Tools Rebooting the RCS Upgrading RCS Firmware Saving and Restoring RCS Configurations and RCS User Databases 52 52 52 Network Settings 55 DNS Settings 56 Contentsxxx | xxxii 53 NTP Settings 57 SNMP Settings 57 Auditing Event Settings 58 Setting Event Destinations 58 Ports - Configuring SIPs Upgrading SIPs 59 59 Power Device Settings Associated Target Servers and Power Outlets Grouping Power Outlets Default Outlet Names Assigning an Outlet Name Local Session Page on the Local Port 60 61 63 64 65 69 Local Port UI Settings 70 Modem Settings 71 Setup Settings - Port Security 72 Sessions Configuring General Sessions Configuring KVM Sessions Configuring Local Virtual Media Sessions Configuring Serial Sessions 72 72 73 73 77 Setting Up User Accounts Managing Local Accounts Access Levels Avocent Management Software Device IP Addresses 77 77 77 79 LDAP 79 Override Admin 79 Active Sessions Closing a Session 80 80 Contentsxxx | xxxiii The Video Viewer Window Changing the Toolbar 81 83 Launching a Session Session Time-out 84 84 Window Size 85 Adjusting the View 85 Refreshing the Image 87 Video Settings Additional Video Adjustment Target Video Settings Automatic Video Adjustment Video Test Pattern Vendor-specific Video Settings 87 87 89 89 90 90 Color Settings Adjusting Color Depth Contrast and Brightness 90 90 91 Noise Settings Detection Thresholds 91 91 Mouse Settings Adjusting Mouse Options Cursor Type Mouse Scaling Mouse Alignment and Synchronization 92 92 92 95 95 Virtual Media Requirements Sharing and Preemption Considerations Virtual Media Dialog Box Opening a Virtual Media Session Closing a Virtual Media Session 96 96 97 97 98 101 Smart Cards 102 Contentsxxx | xxxiv Keyboard Pass-through 103 Macros 104 Saving the View 104 Closing a Session 104 LDAP Feature for the RCS 105 The Structure of Active Directory Domain Controller Computers Object Classes Attributes Schema Extensions 105 105 106 107 107 Standard Schema versus Dell Extended Schema 108 Standard Installation 109 Configure the Override Admin Account 110 Configuring DNS Settings 110 Configuring the Network Time Protocol (NTP) Settings 112 Configuring the LDAP Authentication Parameters 112 Enabling LDAP Authentication 112 Entering Authentication Parameters - Operational Modes 115 Entering Extension Options - Active Directory LDAP 116 Entering Authentication Parameters - Standard LDAP 116 Entering Authentication Parameters - Custom IP Port Assignments 117 Completing LDAP Configuration 118 Secondary LDAP Settings - Standard Configuration 119 Setting up the RCS for performing Standard LDAP queries 119 Search Configuration Settings 120 Query Mode Selection Settings 121 Group Configuration Parameters 122 Secondary LDAP Settings - Active Directory Configuration124 Contentsxxx | xxxv LDAP SSL Certificates Enabling SSL on a Domain Controller Login Timeout 127 128 132 CA Certificate Information Display 133 Configuring Group Objects 134 Active Directory Object Overview for Standard Schema 137 Dell Extended Schema Active Directory Object Overview 139 Configuring Active Directory with Dell Schema Extensions to Access Your RCS 143 Extending the Active Directory Schema (Optional) 143 Installing the Dell Extension to the Active Directory Users and Computers Snap-In (Optional) 144 Opening the Active Directory Users and Computers SnapIn 145 Adding Users and Privileges to Active Directory with Dell Schema Extensions Creating a SIP Object Creating a Privilege Object 145 145 146 Using Dell Association Objects Syntax Creating an Association Object Adding Objects to an Association Object 147 148 148 Console Redirection Access Security 149 Using Active Directory to Log In to the RCS 150 Target Device Naming Requirements for LDAP Implementation 151 Frequently Asked Questions 152 Appendix A: Terminal Operations 155 Console Boot Menu Options 155 Console Main Menu Options 156 Contentsxxx | xxxvi Appendix B: Using SIPs 157 ACS Console Server Port Pinouts 157 Cisco Port Pinouts 158 Appendix C: MIB and SNMP Traps 159 Appendix D: Cable Pinouts Information 165 Modem Pinouts 165 Console/Setup Pinouts 166 Appendix E: UTP Cabling 167 UTP Copper Cabling 167 Wiring Standards 167 Cabling Installation, Maintenance, and Safety Tips 168 Appendix F: Sun Advanced Key Emulation 171 Appendix G: Technical Specifications 173 Appendix H: Technical Support 177 Contentsxxx | xxxvii Contentsxxx | xxxviii 1 Product Overview The Dell 1082DS/2162DS/4322DS Remote Console Switch (RCS) digital keyboard, video and mouse (KVM) over IP and serial console switches combine analog and digital technology to provide flexible, centralized control of data center servers, and to facilitate the operations, activation, and maintenance of remote branch offices where trained operators may be unavailable. The IP-based RCS gives you flexible target device management control and secure remote access from anywhere at anytime through the RCS software or on-board web interface (OBWI). Features and Benefits The RCS provides enterprise customers with the following features and options: • significant reduction of cable volume • Virtual Media (VM) capabilites, configurable for analog (local) or digital (remote) connectivity • smart card/Common Access Card (CAC) capability • true serial capability through Secure Shell (SSH) and Telnet • enhanced video resolution support, up to 1600 x 1200 or 1680 x 1050 (widescreen) native from target to remote • optional dual power models for redundancy • optional support for managing intelligent power devices • dual independent local port video paths (dedicated to ACI) Product Overviewxxx | xxx1 • dual stack IPv4 (DHCP) and IPv6 (DHCPv6 and stateless autoconfiguration) for simultaneous access • accessibility to target devices across 10/100/1000BaseT LAN ports. • a MODEM port that supports V.34, V.90 or V.92-compatible modems that may be used to access the switch when an Ethernet connection is not available • FIPS support Reduce Cable Bulk With server densities continually increasing, cable bulk remains a major concern for network administrators. The RCS significantly reduces KVM cable volume in the rack by utilizing the innovative Server Interface Pod (SIP) modules and single, industry-standard Unshielded Twisted Pair (UTP) cabling. This allows a higher server density while providing greater airflow and cooling capacity. KVM Switching Capabilities The RCS supports SIPs that are powered directly from the target device and provide Keep Alive functionality when the switch is not powered. The SIPs with CAT 5 design dramatically reduce cable clutter while providing optimal resolution and video settings. The built-in memory of the SIPs simplifies configuration by assigning and retaining unique device names and Electronic ID (EID) numbers for each attached device. PS/2 and USB SIPs are available allowing direct KVM connectivity to devices. The USB2+CAC SIP is also available. The RCS is offered with 8, 16, or 32 Analog Rack Interface (ARI) ports for connecting SIPs. Utilizing the SIP, you can attach additional switches to expand your RCS system. This flexibility allows you to add capacity as your data center grows. Multiplatform Support The Dell SIPs are available for use with the RCS to support PS/2, USB, USB2, and USB2+CAC device environments. Using the OBWI in conjunction with these modules allows you to switch easily across platforms. 2xxx | Product Overviewxxx Interoperability with Avocent® IQ Module Intelligent Cabling may also be used to connect devices to the RCS. PS/2, USB, Sun®, and serial module options are available. For more information, please refer to the appropriate Avocent installer/user guide for your product or visit avocent.com/manuals for more information.. True Serial Capabilities The RCS supports SIPs that provide true serial capabilities through Telnet. With a SIP, you can launch an SSH session or launch a serial viewer from the OBWI to connect to serial targets that are connected to an RCS. Local and Remote User Interfaces You can use the local user interface (local UI) by connecting directly to the local port to manage the RCS. You can also use the remote OBWI to manage your switch. The OBWI is web browser based and is launched directly from the switch, and any devices connected to the switch are automatically detected. Virtual Media and Smart Card-capable Switches The RCS allows you to view, move, or copy data located on virtual media to and from any target device. You can manage remote systems more efficiently by allowing operating system installation, operating system recovery, hard drive recovery or duplication, BIOS updating, and target device backup. The RCS also allows you to use smart cards in conjunction with your switch system. Smart cards are pocket-sized cards that store and process information. Smart cards such as the CAC can be used to store identification and authentication to enable access to computers, networks, and secure rooms or buildings. Virtual media and a smart card reader can be connected directly to the USB ports on the switch. In addition, virtual media and smart card readers may be connected to any remote workstation that is running the remote OBWI, Dell RCS software, or Avocent management software and is connected to the switch using an Ethernet connection. Product Overviewxxx | xxx3 NOTE: To open a virtual media or smart card session with a target device, you must first connect the target device to a switch using a SIP. On-board Web Interface The OBWI provides similar management functions as the RCS software, but does not require a software server or any installation. The OBWI is launched directly from the switch, and any servers connected to the RCS are automatically detected. You can use the OBWI to configure the RCS from a web browser. Launch the Viewer from the OBWI to establish KVM and virtual media sessions to target devices. The OBWI also supports LDAP authentication, which allows permissions for multiple RCSs to be managed through a single interface. Access the Switch Using a Standard TCP/IP Network The switch provides agentless remote control and access. No special software or drivers are required on the attached servers or client. NOTE: The client connects to the switch using an Internet browser. You can access the switch and all attached systems via Ethernet or using a V.34, V.90, or V.92 modem from a client. The clients can be located anywhere a valid network connection exists. Encryption The RCS supports 128-bit SSL(ARCFOUR), as well as AES, DES, and 3DES encryption of keyboard/mouse, video, and virtual media sessions. Video The RCS provides optimal resolution for analog VGA, SVGA, and XGA video. You can achieve resolutions up to 1600 x 1200 or 1680 x 1050 (widescreen), depending on the length of cable separating your switch and servers. 4xxx | Product Overviewxxx Flash Upgradeable Upgrade your RCS and SIPs at any time to ensure you are always running the most current firmware version available. Flash Upgrades can be initiated through the OBWI or the serial console. The RCS can be configured to perform automatic firmware upgrades of SIPs. See "Upgrading RCS Firmware" on page 52 for more information. Tier Expansion The RCS features allow you to tier additional Dell RCSs from each of the Analog Rack Interface (ARI) port on the switch. The tiered switches are attached in the same manner as any device. This additional tier of units allows you to attach up to 1024 servers in one system. See "Adding a Tiered Switch" on page 31. Avocent Management Software Plug-in Avocent management software may be used with the switch to allow IT administrators to remotely access, monitor, and control target devices on multiple platforms through a single, web-based user interface. For more information, see the Technical Bulletin for the Avocent management software. FIPS cryptographic module The RCS switches support FIPS 140-2 Level 1 cryptographic security requirements. The FIPS mode of operation can be enabled or disabled via the OBWI or local port and executed after a reboot. When FIPS is enabled, a reboot of the switch requires approximately two additional minutes to complete a FIPS mode integrity check. Also, when FIPS is enabled, if the keyboard, mouse or video encryption is set to 128-bit SSL (ARCFOUR) or DES, the encryption level is automatically changed to the encryption level AES. NOTE: The FIPS mode of operation is initially disabled and must be enabled to operate. NOTE: The Setup port factory default setting will automatically disable the FIPS module. Product Overviewxxx | xxx5 NOTE: The FIPS mode can be changed via the DSView software plug-in. RCS switches use an embedded FIPS 140-2 validated cryptographic module (Certificate #1051) running on a Linux PPC platform per FIPS 140-2 Implementation Guidance section G.5 guidelines. The FIPS mode can be enabled/disabled via the OBWI, Local Port, or DSView plug-in. A reboot is required to enable or disable FIPS mode. A firmware upgrade to this version or setting the state to the default state (Setup Port menu) will disable FIPS mode. In FIPS mode, encryption ciphers are restricted to AES or 3DES. When FIPS is enabled, if the Keyboard/Mouse or Video encryption is set to 128-bit SSL or DES, the encryption level is automatically changed to AES. With FIPS enabled, these files are saved (or restored) using a FIPS compatible algorithm, AES. When FIPS is disabled, the User Database and Appliance Configuration files saved from or restored to the appliance as external files are encrypted (or decrypted) using DES. This is true even when the user does not fill in the Password parameter in the Save (or Load) dialog on the OBWI, in which case a default OEM password is used for encryption or decryption. One result of enabling the FIPS module is to render previously saved User Database and Appliance Configuration files incompatible. In this case, you may temporarily disable the FIPS module, reboot the appliance, restore the previously saved database or configuration file, re-enable the FIPS module, reboot, and then save the file externally again while the FIPS module is enabled. The new saved external file will be compatible with the appliance as long as the appliance is running with FIPS mode enabled. The opposite situation is also true, in that database and configuration files saved with FIPS module enabled are not compatible for restoring to an appliance without the FIPS module enabled or an appliance with older firmware not supporting the FIPS module. 6xxx | Product Overviewxxx Sample Configuration Figure 1.1: Example RCS Configuration Table 1.1: Descriptions for Figure 1.1 Product Overviewxxx | xxx7 Number Description Number Description 1 UTP connection 6 Telephone network 2 KVM connection to the RCS 7 Ethernet 3 Remote IP connection 8 Avocent Management Software Server 4 RCS 9 Analog User (local UI) 10 Digital user (computer with Internet browser for a remote OBWI or Dell RCS software) 5 Modem Safety Precautions Use the following safety guidelines to help ensure your own personal safety and to help protect your system and working environment from potential damage. CAUTION: The power supplies in your system may produce high voltages and energy hazards, which can cause bodily harm. Only trained service technicians are authorized to remove the covers and access any of the components inside the system. This warning applies to Dell™ Remote Console Switch, Dell™ PowerEdge™ servers, and Dell PowerVault™ storage systems. This document pertains only to the Dell 1082DS/2162DS/4322DS Remote Console Switch. You should also read and follow the additional safety instructions. • Dell Remote Console Switch User's Guide • Dell Safety Sheet 8xxx | Product Overviewxxx • Dell RTF Regulatory Tech Bulletin General • Observe and follow service markings. • Do not service any product except as explained in your system documentation. • Opening or removing covers that are marked with the triangular symbol with a lightning bolt may expose you to electrical shock. • Components inside these compartments should be serviced only by a trained service technician. • This product contains no serviceable components. Do not attempt to open. If any of the following conditions occur, unplug the product from the electrical outlet and replace the part or contact your trained service provider: - The power cable, extension cable, or plug is damaged. - An object has fallen into the product. - The product has been exposed to water. - The product has been dropped or damaged. - The product does not operate correctly when you follow the operating instructions. • Keep your system away from radiators and heat sources. Also, do not block cooling vents. • Do not spill food or liquids on your system components, and never operate the product in a wet environment. If the system gets wet, see the appropriate section in your troubleshooting guide or contact your trained service provider. • Use the product only with approved equipment. • Allow the product to cool before removing covers or touching internal components. Product Overviewxxx | xxx9 • Operate the product only from the type of external power source indicated on the electrical ratings label. If you are not sure of the type of power source required, consult your service provider or local power company. NOTE: To help avoid damaging your system, be sure the voltage selection switch (if provided) on the power supply is set for the voltage that most closely matches the AC power available in your location. Also be sure that your monitor and attached devices are electrically rated to operate. • Be sure that your monitor and attached devices are electrically rated to operate with the power available in your location. • Use only power cables provided with this product. • To help prevent electric shock, plug the system and peripheral power cables into properly grounded electrical outlets. These cables are equipped with three-prong plugs to help ensure proper grounding. Do not use adaptor plugs or remove the grounding prong from a cable. • Observe extension cable and power strip ratings. Make sure that the total ampere rating of all products plugged into the power strip does not exceed 80 percent of the ampere ratings limit for the power strip. • To help protect your system from sudden, transient increases and decreases in electrical power, use a surge suppressor, line conditioner, or uninterruptible power supply (UPS). • Position system cables and power cables carefully. Route cables so that they cannot be stepped on or tripped over. Be sure that nothing rests on any cables. • Do not modify power cables or plugs. Consult a licensed electrician or your power company for site modifications. Always follow your local/national wiring rules. LAN Options • Do not connect or use during a lightning storm. There may be a risk of electrical shock from lightning. 10xxx | Product Overviewxxx • Never connect or use in a wet environment. Product Overviewxxx | xxx11 12xxx | Product Overviewxxx 2 Installation The RCS transmits KVM and serial information between operators and target devices connected to the switch over a network using either an Ethernet or modem connection. The RCS uses TCP/IP for communication over Ethernet. For the best system performance, use a dedicated, switched 100BaseT or 1000BaseT network. You can also use 10BaseT Ethernet. The RCS uses the Point-to-Point Protocol (PPP) for communication over a V.34, V.90, or V.92 modem. You can perform KVM and serial switching tasks by using the OBWI or the Avocent management software. For more information on the Avocent management software, visit http://www.avocent.com. The RCS box includes the RCS, RCS software, and the OBWI. You may choose to use either the RCS software or the OBWI to manage your system. The OBWI manages a single RCS and its connections, while the RCS software can manage multiple switches and their connections. If you plan to use only the OBWI, you do not need to install the RCS software. NOTE: The RCS software can be used to manage some switches. For more information, please refer to the appropriate installer/user guide for your product. NOTE: Please ensure that all your RCSs have been upgraded to their most recent version of Firmware. For information on upgrading an RCS through the OBWI, refer to "RCS Tools" on page 52. RCS Quick Setup The following is a quick setup list. To begin by mounting the RCS in a rack and for detailed installation instructions, see "Getting Started" on page 15. Installationxxx | xxx13 1 Adjust mouse acceleration on each server to Slow or None. 2 Install the RCS hardware, and connect a Server Interface Pod (SIP) or Avocent® IQ module to each server or tiered switch. Connect each SIP or Avocent IQ module to the RCS with CAT 5 cabling and connect the keyboard, monitor, and mouse connectors to the analog port of the RCS. 3 Connect the local port peripherals to the appropriate ports on the back panel of the RCS and set up the network configuration. The IP address can be set here or from the RCS software. Dell recommends using a static IP address for ease of configuration. 4 Using the local port, input all server names using the OBWI interface. To set up the RCS software (see the RCS Software User's Guide): 1 Install the RCS software on each client workstation. 2 From one client workstation, launch the RCS software. 3 Click the New RCS task button to add the new switch to the RCS software database. If you configured the IP address as described above, select Yes, the product already has an IP address, otherwise select No, the product does not have an IP address. RCS software will find the RCS and all SIPs connected to it and display the names in the Explorer. NOTE: In addition to adding and managing Dell RCSs using the RCS software, you can add and manage some Avocent switches. 4 Set properties and group servers as desired into locations, sites, or folders through the Explorer. 5 Create user accounts through the OBWI. See "Setting Up User Accounts" on page 77 for more information. 6 Once one client workstation is set up, select File - Database - Save to save a copy of the database with all the settings. 7 From the second client workstation, click File - Database - Load and browse to find the file you have saved. Select the file and click Load. 14xxx | Installationxxx 8 If the local user adds, deletes, or renames any SIPs after you have loaded this file, you can resynchronize your local switch by selecting the RCS and clicking Resync. To control a connected server, select it in the Explorer and click the Connect Video task button to launch a server session in the Viewer. 9 Adjust the resolution (select View - Scaling) and quality (select View Color) of the server video in the Viewer. Getting Started The following items are supplied with the Remote Console Switch. Before installing your RCS, locate the necessary items for proper installation. • Remote Console Switch • Jumper Cord(s) • 0U Mounting Bracket • 1U Mounting Bracket Hardware Kit (two additional rails that are premounted to the RCS are included in the kit assembly) • Cable and Adaptors for SETUP and MODEM • Remote Console Switch System User's Guide on CD • Dell Safety Sheet • Dell RTF Regulatory Tech Bulletin Additional Items Needed: • One Dell SIP or Avocent IQ module per attached device • One CAT 5 patch cable per attached device (up to 45 meters) Optional Items: • V.34, V.90, Or V.92-compatible Modem and cables • Power Control Device(s) • Port Expansion Module (PEM) Installationxxx | xxx15 NOTE: You cannot open a virtual media session or a CAC session if the server is connected via a PEM. Setting up Your Network The switch uses IP addresses to uniquely identify the switch and the target devices. The RCS supports both Dynamic Host Configuration Protocol (DHCP) and static IP addressing. Make sure that an IP address is reserved for each switch and that each IP address remains static while the switch is connected to the network. Keyboards A USB keyboard and mouse may be connected to the analog port of the RCS. NOTE: The RCS also supports the use of multiple keyboards and multiple mice on the analog port. The use of more than one input device simultaneously, however, may produce unpredictable results. Rack Mounting the RCS You may either place the RCS on the rack shelf or mount the switch directly into a 19" wide, EIA-310-E compliant rack (four-post, two-post, or threaded methods). The Dell ReadyRails™ system is provided for 1U front-rack, 1U rearrack, and two-post installations. The ReadyRails system includes two separately packaged rail assemblies and two rails that are shipped attached to the sides of the RCS. In addition, one mounting bracket is provided for 0U configurations, and one blanking panel is provided for rear-rack installations. WARNING: This is a condensed reference. Read the safety instructions in your Safety, Environmental, and Regulatory Information booklet before you begin. NOTE: The illustrations in this document are not intended to represent a specific switch. Rack Mounting Safety Considerations • Rack Loading: Overloading or uneven loading of racks may result in shelf or rack failure, causing damage to equipment and possible personal injury. 16xxx | Installationxxx Stabilize racks in a permanent location before loading begins. Mount components beginning at the bottom of the rack, then work to the top. Do not exceed your rack load rating. • Power considerations: Connect only to the power source specified on the unit. When multiple electrical components are installed in a rack, ensure that the total component power ratings do not exceed circuit capabilities. Overloaded power sources and extension cords present fire and shock hazards. • Elevated ambient temperature: If installed in a closed rack assembly, the operating temperature of the rack environment may be greater than room ambient. Use care not to exceed the 50°C maximum ambient temperature of the switch. • Reduced air flow: Install the equipment in the rack so that the amount of airflow required for safe operation of the equipment is not compromised. • Reliable earthing: Maintain reliable earthing of rack-mounted equipment. Pay particular attention to supply connections other than direct connections to the branch circuit (for example, use of power strips). • Product should not be mounted with the rear panel facing in the downward position. Installing the Dell ReadyRails™ System The ReadyRails system is provided to easily configure your rack for installation of your RCS. The ReadyRails system can be installed using the 1U tool-less method or one of three possible 1U tooled methods (two-post flush mount, twopost center mount, or four-post threaded). 1U Tool-less Configuration (Four-post Square Hole or Unthreaded Round Hole) 1 With the ReadyRails flange ears facing outward, place one rail between the left and right vertical posts. Align and seat the rear flange rail pegs in the rear vertical post flange. In Figure 2.1, item 1 and its extractions illustrate how the pegs appear in both the square and unthreaded round holes. Installationxxx | xxx17 Figure 2.1: 1U Tool-less Configuration 2 Align and seat the front flange pegs in the holes on the front side of the vertical post (item 2). 3 Repeat this procedure for the second rail. 4 To remove each rail, pull on the latch release button on each flange ear (item 3) and unseat each rail. Two-post Flush-mount Configuration 1 For this configuration, the castings must be removed from the front side of each ReadyRails assembly (Figure 2.2, item 1). Use a Torx™ driver to remove the two screws from each front flange ear (on the device side of the rail) and remove each casting. Retain castings for future rack requirements. It is not necessary to remove the rear flange castings. Figure 2.2: Two-post Flush-mount Configuration 18xxx | Installationxxx 2 Attach one rail to the front post flange with two user-supplied screws (item 2). 3 Slide the plunger bracket forward against the vertical post and secure the plunger bracket to the post flange with two user-supplied screws (item 3). 4 Repeat this procedure for the second rail. Installationxxx | xxx19 Two-post Center-mount Configuration 1 Slide the plunger bracket rearward until it clicks into place and secure the bracket to the front post flange with two user-supplied screws (Figure 2.3, item 1). Figure 2.3: Two-post Center-mount Configuration 2 Slide the back bracket towards the post and secure it to the post flange with two user-supplied screws (item 2). 3 Repeat this procedure for the second rail. Four-post Threaded Configuration 1 For this configuration, the flange ear castings must be removed from each end of the ReadyRails assemblies. Use a Torx™ driver to remove the two 20xxx | Installationxxx screws from each flange ear and remove each casting (Figure 2.4, item 1). Retain castings for future rack requirements. 2 For each rail, attach the front and rear flanges to the post flanges with two user-supplied screws at each end (item 2). Figure 2.4: Four-post Threaded Configuration Installationxxx | xxx21 Installing the RCS The switch may be mounted in the 1U rear-rack, 1U front-rack, 1U two-post (flush and center), and 0U configurations. The following are examples of 1U rearrack, 1U front-rack, and 0U configurations. For 1U two-post (flush and center) configurations, you can slide the switch into the rails in the same manner as the four-post configurations. 1U Rear-rack Installation 1 Insert the ends of the rails that are attached to the switch into the ReadyRails assembly and push the switch into the rack (Figure 2.5, item 1). Figure 2.5: 1U Rear-rack Installation 22xxx | Installationxxx 2 Secure each switch rail with the thumbscrew (item 2). 3 (Optional) Assemble the blanking panel to the rails on the front side of the rack and tighten the thumbscrews (item 3). To remove the switch from the rack: 1 Unscrew the thumbscrews and pull the switch assembly out of the rack until the travel stops are reached. The travel stop position is intended to provide the opportunity to reposition the rail grip; it is not intended for service. 2 Locate the blue tabs on the sides of the switch rails (item 4). 3 Push the tabs inward and continue pulling the assembly until the switch rails are clear of the ReadyRails assemblies. 1U Front-rack Installation Before installation, the rails that are attached to the switch must be reconfigured. 1 On each switch rail, lift the tab under the front standoff and slide the rail forward as you lift the rail from the switch (Figure 2.6, item 1). Figure 2.6: Rotating the Switch Rails Installationxxx | xxx23 2 Rotate each rail 180° (item 2) and then reassemble each rail to the switch (item 3). 3 Refer to the 1U rear-rack instructions to insert and remove the switch assembly from the ReadyRails system. NOTE: No blanking panel is required for this configuration. 0U RCS Installation 1 Align and assemble the 0U mounting bracket to the switch rails (Figure 2.7, item 1). Tighten the thumbscrews (item 2). 2 Insert the mounting bracket hooks into the rack holes and push down until the blue button pops out and locks the bracket into place. Figure 2.7: 0U Installation 24xxx | Installationxxx To remove the switch assembly, press the blue button (item 3) to unseat the bracket and then lift the assembly from the posts. Connecting the RCS Hardware The following diagram illustrates one possible configuration for your RCS hardware. Figure 2.8: Basic RCS Configuration Installationxxx | xxx25 Table 2.1: Basic RCS Configuration Descriptions Number Description Number Description 1 Jumper cord 7 External virtual media 2 Analog user 8 Power control device 26xxx | Installationxxx Number Description Number Description 3 Modem 9 SIPs 4 Telephone network 10 Target devices 5 Network 11 RCS (32-port model shown) 6 Digital user To connect and turn on your switch: CAUTION: To reduce the risk of electric shock or damage to your equipment, do not disable the jumper cord grounding plug. The grounding plug is an important safety feature. Plug the jumper cord into a grounded (earthed) outlet that is easily accessible at all times. Disconnect the power from the unit by unplugging the jumper cord from either the power source or the unit. NOTE: If the building has 3-phase AV power, ensure that the computer and monitor are on the same phase to avoid potential phase-related video and/or keyboard problems. NOTE: The maximum supported cable length from switch to device is 30 meters. • Do not disable the power grounding plug. The grounding plug is an important safety feature. • Connect the jumper cord into a grounded (earthed) outlet that is easily accessible at all times. • Disconnect the power from the product by unplugging the jumper cord from either the power source or the product. • The AC inlet is the main disconnect for removing power to this product. For products that have more than one AC inlet, to remove power completely, all AC line cords must be disconnected. Installationxxx | xxx27 • This product has no user serviceable parts inside the product enclosure. Do not open or remove product cover. 1 Connect your VGA monitor and USB keyboard and mouse cables to the appropriately labeled ports. 2 Connect one end of a UTP cable (4-pair, up to 150 ft/45 m) to an available numbered port. Connect the other end to an RJ-45 connector of a SIP. 3 Connect a SIP to the appropriate port on the back of a target device. Repeat steps 2 and 3 for all target devices you want to connect. NOTE: When connecting to a Sun Microsystems target device, you must use a multi-sync monitor in the local port to accommodate Sun computers that support both VGA and sync-on-green or composite sync. 4 Connect a user-supplied UTP cable from the Ethernet network to a LAN port on the back of the RCS. Network users will access the RCS through this port. Plugging the redundant LAN ports to separate Ethernet switches provides additional redundancy in the event one Ethernet switch fails. 5 (Optional) The switch may also be accessed using an ITU V.92, V.90, or V.24-compatible modem. Connect one end of an RJ-45 cable to the MODEM port on the switch. Connect the other end to the supplied RJ-45 to DB-9 (male) adaptor, which then connects to the appropriate port on the back of the modem. NOTE: Using a modem connection instead of a LAN connection will limit the performance capability of your switch. 6 (Optional) Connect a supported PDU to the RCS by connecting one end of a CAT 5 cable to the PDU1 port on the switch. Connect the other end to the PDU. Connect the power cords from the target devices to the PDU. Connect the PDU to a power source. Repeat this procedure for the PDU2 port to connect a second PDU, if desired. 7 Turn on each target device, then locate the jumper cord(s) that came with the switch. Connect one end to the power socket on the rear of the switch. Connect the other end into an appropriate power source. If using an RCS equipped with dual power, use the second jumper cord to connect to the 28xxx | Installationxxx second power socket on the rear of the RCS, and plug the other end into a different power source. NOTE: Plug the redundant power supplies into separate branch circuits to provide additional redundancy in the event one external AC power source should go away. 8 (Optional) Connect the virtual media devices or smart card readers to any of the USB ports on the switch. NOTE: For all virtual media sessions, you must use a USB2 or USB2+CAC SIP. Connecting a SIP To connect a SIP to each server: 1 Locate the SIPs for your RCS. 2 If you are using a PS/2 SIP connection, attach the color-coded ends of the SIP cable to the appropriate keyboard, monitor, and mouse ports on the first server you will be connecting to this RCS. If you are using a USB connection, attach the plug from the SIP to the USB port on the first server you will be connecting to this RCS. 3 To the RJ-45 connector on the SIP, attach one end of the CAT 5 cabling that will run from your SIP to the RCS. See Figure 2.9. 4 Connect the other end of the CAT 5 cable to the desired Avocent Rack Interface (ARI) port on the back of your RCS. 5 Repeat steps 2-4 for all servers you wish to attach. NOTE: Power down the RCS before servicing. Always disconnect the jumper cord from the power source. NOTE: In addition to Dell SIPs, the RCS may also be connected to devices using Avocent IQ modules, including Sun and Serial IQ modules. Figure 2.9: SIP Connection Installationxxx | xxx29 Table 2.2: Descriptions for Figure 2.9 Number Description 1 CAT 5 2 USB Connection 3 VGA Connection To connect a SIP to a serial device using a UTP connector: 1 Connect the SIP RJ-45 connector to the serial device. -or- 30xxx | Installationxxx Connect the SIP to an RJ-45 to 9-pin female adaptor. Connect the adaptor to the serial port of the serial device. 2 Connect one end of a UTP cable (4-pair, up to 150 ft/45 m) into an available numbered port on the rear of the switch. Connect the other end into the RJ-45 connector of the SIP. 3 Connect a USB-to-barrel power cord to the power connector on your SIP. Connect the USB connector on the USB-to-barrel power cord into any available USB port on the serial target device. Adding a Tiered Switch NOTE: The RCS does not support the EL80-DT. NOTE: The M1000e Modular Enclosure is supported in a tiered configuration. Attach one end of a CAT5 cable to target port on RCS switch. Attach the other end to the Analog Console Interface (ACI) compatible RJ45 port on the iKVM module on the back of the M1000e chassis.Firmware upgrades to the components of the M1000e Modular Enclosure are not possible via this tiered configuration. You can tier up to two levels of switches, enabling users to connect to up to 1024 servers. In a tiered system, each target port on the main switch will connect to the ACI port on each tiered switch. Each tiered switch can then be connected to a device with a SIP or Avocent IQ module. To tier multiple switches: 1 Attach one end of a UTP cable to a target port on the switch. 2 Connect the other end of the UTP cable to the ACI port on the back of your tiered switch. 3 Connect the devices to your tiered switch. 4 Repeat these steps for all the tiered switches you wish to attach to your system. NOTE: The system will automatically “merge” the two switches. All switches connected to the tiered switch will display on the main switch list in the local UI. Installationxxx | xxx31 NOTE: The switch supports one tiered switch per target port of the main switch. You cannot attach a switch to the tiered switch. NOTE: When cascading with an RCS, an 8-port or 16-port analog console switch is not supported as the primary unit in a tiered configuration. The RCS must be the primary unit. 32xxx | Installationxxx Figure 2.10: Tiering the RCS With a UTP Analog Switch Table 2.3: Descriptions for Figure 2.10 Number Description 1 Local User 2 ARI Connection 3 UTP Connection 4 ACI Connection Installationxxx | xxx33 Cascading with Legacy Switches To add a legacy switch (optional): 1 Mount the switch into your rack. Locate a UTP cable to connect your RCS to the legacy switch. 2 Attach one end of the UTP cabling to the ARI port on the Console Switch. 3 Connect the other end of the UTP cable to a PS/2 SIP. 4 Connect the SIP to your legacy switch according to the switch manufacturer's recommendations. 5 Repeat steps 1-4 for all the legacy switches you wish to attach to your switch. NOTE: The RCS supports only one switch per ARI port. You cannot cascade another switch under this first switch. NOTE: When cascading with an RCS, an 8-port or 16-port analog console switch is not supported as the primary unit. The RCS must be the primary unit. 34xxx | Installationxxx Figure 2.11: Cascading Legacy Switches Table 2.4: Descriptions for Figure 2.11 Number Description 1 Local User 2 ARI Connection Installationxxx | xxx35 Number Description 3 PS2 Connection 4 Target Connection Adding a PEM (Optional) A Port Expansion Module (PEM) allows you to expand each ARI port to accommodate up to eight devices instead of one. See the following figure and figure description table. NOTE: The PEM operates passively. Therefore, once a user accesses a device attached to a PEM, any subsequent users attempting to access any of the devices attached to that PEM will be blocked. NOTE: The use of VM or CAC SIPs behind a PEM is not supported. NOTE: True Serial SIP does not work behind PEM. To add a PEM (optional): 1 Mount the PEM into your rack. Using up to nine UTP cables, one connects your RCS to the PEM, and the other eight connect the PEM to the SIP attached to each device. 2 Attach one end of the UTP cabling that will run between your PEM and the RCS to the RJ-45 connector slightly separated from the other connectors on the PEM. Connect the remaining end of the UTP cable to the desired ARI port on the back of your RCS. 3 To one of the eight RJ-45 connectors grouped on the back of the PEM, attach the UTP cabling that will run between your PEM and each device’s SIP. 4 Connect the other end of the UTP cable to the first SIP. 5 Repeat steps 3-4 for all devices you wish to attach. Figure 2.12: RCS Configuration With a PEM 36xxx | Installationxxx Table 2.5: Descriptions for Figure 2.12 Number Description 1 ARI Port 2 UTP 3 PEM 4 SIP or Avocent IQ Module 5 Server Installationxxx | xxx37 Configuring the Remote Console Switch Once all physical connections have been made, you will need to configure the switch for use in the overall switch system. This can be accomplished in two ways. To configure the switch using Avocent management software, see the applicable Avocent Installer/User Guide for detailed instructions. To configure the switch using the local UI: See "Network Settings" on page 55 for detailed instructions on using the local UI to configure initial network setup. Setting up the Built-in Web Server You can access the switch using the embedded web server that handles most day-to-day switch tasks. Before using the web server to access the switch, first specify an IP address through the SETUP port on the back panel of the switch or local UI. See Chapter 3 for detailed instructions on using the switch user interface. Connecting to the OBWI Through a Firewall For switch installations that use the OBWI for access, the following ports must be opened in a firewall if outside access is desired. Table 2.6: OBWI Ports With a Firewall Port Number Function TCP 22 Used for SSH for serial sessions to a SIP. TCP 23 Used for Telnet (when Telnet is enabled). TCP 80 Used for the initial downloading of the Video Viewer. The RCS Admin can change this value. 38xxx | Installationxxx Port Number Function TCP 443 Used by the web browser interface for managing the switch and launching KVM sessions. The RCS Admin can change this value. TCP 2068 Transmission of KVM session data (mouse & keyboard) or transmission of video on switches. TCP/UDP 3211 Discovery. TCP 389 (Optional) Used by LDAP Directory Services; standard access port TCP 636 (Optional) Used by LDAP Directory Services; Secure/SSL port TCP 3268 (Optional) Used by Microsoft Active Directory Services; standard access port TCP 3269 (Optional) Used by Microsoft Active Directory Services; Secure/SSL access port The following figure and table provide a typical configuration, where the user’s computer is located outside of the firewall and the switch resides inside the firewall. Figure 2.13: Typical RCS Firewall Configuration Installationxxx | xxx39 Table 2.7: Descriptions for Figure 2.13 Number Description 1 RCS 2 Firewall 3 User’s computer 4 Firewall forwards HTTP requests and KVM traffic to the switch 5 User browses to firewall’s external IP address To configure the firewall: To access the switch from outside a firewall, configure your firewall to forward ports 22, 23 (if telnet is enabled), 80, 443, 2068, and 3211 from its external interface to the KVM switch through the firewall’s internal interface. Consult the manual for your firewall for specific port forwarding instructions. NOTE: Ports 80 and 443 can be reconfigured by an administrator. 40xxx | Installationxxx For information on launching the OBWI, see "OBWI" on page 45. Verifying the Connections Rear Panel Ethernet Connection LEDs On the RCS, the rear panel features two LEDs indicating the Ethernet LAN1 connection status and two LEDs indicating the Ethernet LAN2 connection status. • The green LEDs illuminate when a valid connection to the network is established and blink when there is activity on the port. • The bi-color LEDs may illuminate either green or amber. • They illuminate green when the communication speed is 1000M. • They illuminate amber when the communication speed is 100M. • They are not illuminated when the communication speed is 10M. Rear Panel Power Status LEDs The rear panel of each RCS has one for each power supply. There are two Power LEDs for dual power models (16-port and 32-port) and only one LED for the 8port model. The LED(s) illuminate green when the switch is turned on and operating normally. • The LED is off if the power supply does not have power or has failed. • The LED illuminates when the unit is ready. • The LED blinks when the switch is booting or an upgrade is in progress. • The LED blinks "SOS" if a fault condition occurs, such as power supply failure, elevated ambient temperature, or fan failure. The LED will continue to blink "SOS" as long as the failure persists. The switch prevents a serial break from the attached device if the module loses power. However, a user can generate a serial break with the attached device by pressing Serial Break on the serial session viewer. Installationxxx | xxx41 Adjusting Mouse Settings on Target Devices Before a computer connected to the switch can be used for remote user control, you must set the target mouse speed and turn off acceleration. For machines running Microsoft® Windows® (Windows NT®, 2000, XP, Server 2003), use the default PS/2 mouse driver. To ensure that the local mouse movement and remote cursor display remain in sync, mouse acceleration must be set to “none” for all user accounts accessing a remote system through a KVM switch. Mouse acceleration must also be set to “none” on every remote system. Special cursors should not be used and cursor visibility options, such as pointer trails, Ctrl key cursor location animations, cursor shadowing, and cursor hiding, should also be turned off. NOTE: If you are not able to disable mouse acceleration from within a Windows operating system, or if you do not wish to adjust the settings of all your target devices, you may use the Tools - Single Cursor Mode command available in the Video Viewer window. This command places the Video Viewer window into an “invisible mouse” mode, which allows you to manually toggle control between the mouse pointer on the target system being viewed and the mouse pointer on the client computer. 42xxx | Installationxxx 3 Local and Remote Configuration The RCS comes equipped with two “point-and-click” interfaces: a local user interface (local UI) and a remote OBWI. Using the configuration options provided by these interfaces, you can tailor the switch to your specific application, control any attached devices, and handle all basic KVM or serial switch needs. NOTE: The local UI and remote OBWI are almost identical. Unless specified, all information in this chapter applies to both interfaces. From either interface, you can launch two different kinds of sessions: • The Video Viewer window allows you to control the keyboard, monitor, and mouse functions of individual target devices connected to the switch in real time. You may also use predefined global macros to perform actions within the Video Viewer window. For instructions on how to use the Video Viewer, see Chapter 4. • The serial viewer window allows you to manage individual serial target devices either by using commands or scripts. Local User Interface (UI) The switch includes a local port on the back. This port enables you to connect a keyboard, monitor and mouse directly to the switch and use the local UI. You can choose any of the following keystrokes to be configured to open the local UI or to switch between the local UI and an active session:, , , and . The defaults are and . To launch the local UI: 1 Connect your monitor, keyboard and mouse cables to the switch. For more information, see "Connecting the RCS Hardware" on page 25. 2 Press any of the enabled keystrokes to launch the local UI. 3 If local UI authentication has been enabled, enter your username and password. NOTE: If the switch has been added to an Avocent management software server, then the Avocent management software server will be accessed to authenticate the user. If the switch has not been added to an Avocent management software server, or if the Avocent management software server cannot be reached, then the switch local user database will be accessed to authenticate the user. The default local username is Admin, and there is no password. Usernames in the local user database are case-sensitive. Attached target devices in the Local Port User Interface can be viewed and managed from two individual screens that are selected from the left navigational toolbar. For less than 20 targets, the Target List-Basic screen is recommended for navigation. For more than 20 attached target devices, the Target List-Full screen provides additional navigation tools. At the Target List-Full screen you can navigate by entering the page number, using the page navigation buttons, or using the filter. Either the Basic or Full screens can be set as the default screen for selecting target devices. Filtering You may filter the list of target devices by providing a text string that will be used to retrieve matching items. Filtering can provide a shorter, more exact list of items. When filtering is performed, the Name column is searched for the specified text string. The search is not case sensitive. When filtering, you may use an asterisk (*) before or after text strings as a wildcard. For example, typing emailserver* and clicking Filter will display items with emailserver at the beginning (such as emailserver, emailserverbackup). 44xxx | Local and Remote Configurationxxx OBWI The switch OBWI is a remote, web browser based user interface. For details on setting up your system, see "Connecting the RCS Hardware" on page 25. The following table lists the operating systems and browsers that are supported by the OBWI. Make sure that you are using the latest version of your Web browser. Table 3.1: Operating Systems Supported by the OBWI Browser Microsoft ®Internet Explorer version 6.0 SP1 and later Firefox version 2.0 and later Microsoft Windows 2000 Workstation or Server with Service Pack 2 Yes Yes Microsoft Windows Server® 2003 Standard, Enterprise, or Web Edition Yes Yes Microsoft Windows Server® 2008 Standard, Enterprise, or Web Edition Yes Yes Windows XP Professional with Service Pack 3 Yes Yes Windows Vista® Business with Service Pack 1 Yes Yes Operating System Local and Remote Configurationxxx | xxx45 Browser Microsoft ®Internet Explorer version 6.0 SP1 and later Firefox version 2.0 and later Red Hat Enterprise Linux® 4 and 5 Standard, Enterprise or Web Edition (Smart card may not be supported by the operating system) No Yes Sun Solaris® 9 and 10 (Smart card may not be supported by the operating system) No Yes Novell SUSE Linux Enterprise 10 and 11 (Smart card may not be supported by the operating system) No Yes Ubuntu 8 Workstation (Smart card may not be supported by the operating system) No Yes Operating System To log in to the switch OBWI: 1 Launch a web browser. 2 In the address field of the browser, enter the IP address or host name assigned to the switch you wish to access. Use https://xxx.xx.xx.xx or https://hostname as the format. NOTE: If using IPv6 mode, you must include square brackets around the IP address. Use https://[ : , for example, jsmith:router. 3 Enter the password for the RCS user. NOTE: The Telnet feature default is disabled. To enable Telnet support, refer to "Configuring Serial Sessions" on page 77. To switch to the active session from the local UI (local users only): 1 From the side navigation bar, select Local Session. 2 Select the Resume Active Session checkbox. The Video Viewer window will appear. Scan Mode In Scan mode, the switch scans multiple target devices. The scanning order is determined by placement of the target device in the list. You can also configure the amount of time before the scan moves to the next target device in the sequence. NOTE: The Scan button is disabled if you are connected via modem. To add target devices to the Scan list: 1 From the side navigation bar, select Unit View - Target List to open the Target Devices screen. 2 Select the checkboxes next to the names of the target devices you wish to scan. 3 Click Scan. To configure Scan Time: 1 From the side navigation bar, select Ports - Local Port UI to open the Local Port UI Settings screen. 2 Under the Scan Mode heading, enter an amount of time in seconds (from 3255) in the Scan Time field. 50xxx | Local and Remote Configurationxxx 3 Click Save. Viewing System Information You can view switch and target device information from the following screens in the user interface. Table 3.3: System Information Category Select This: To View This: RCS Unit View - RCS Tools RCS name and type, and the RCS tools (Maintenance, Diagnostics, Certificates and Trap MIB) Unit View - RCS Files RCS Configuration, User Database, and Target Device Unit View - RCS Properties - Identity Part Number, Serial Number, and EID Unit View - RCS Properties - Location Site, Department, and Location Unit View - RCS Settings - Versions Current Application and Boot versions List of connected target devices, as well as the Name, Type, Status, and Action of each device Target Device Unit View - Target List Click on a target device to view the following additional information: Name, Type, EID, available session option, and the connection path Local and Remote Configurationxxx | xxx51 RCS Tools From the Tools - Maintenance - Overview screen, you can view the appliance name and type. You can also perform basic appliance tasks. Rebooting the RCS To reboot the RCS: 1 From the side navigation bar, select the Unit View - RCS - Tools Maintenance - Overview tab to open the Unit Maintenance screen. 2 Click Reboot. 3 A dialog box appears, warning you that all active sessions will be disconnected. Click OK. NOTE: If you are using the local UI, the screen will be blank while the switch reboots. If you are using the remote OBWI, a message will appear to let you know that the interface is waiting on the appliance to complete the reboot. Upgrading RCS Firmware You can update your RCS with the latest firmware available. After the Flash memory is reprogrammed with the upgrade, the switch performs a soft reset, which terminates all SIP sessions. A target device experiencing a SIP firmware update may not display, or may display as disconnected. The target device will appear normally when the Flash update is completed. Attention: Disconnecting a SIP during a firmware update or cycling power to the target device will render the module inoperable and require the SIP to be returned to the factory for repair. To upgrade the switch firmware: 1 From the side navigation bar, select the Unit View - RCS - Tools Maintenance - Upgrade tab to open the Upgrade RCS Firmware window. 2 Click Upgrade to open the Upgrade Appliance Firmware. 52xxx | Local and Remote Configurationxxx 3 Select one of the following methods from which to load the firmware file: Filesystem, TFTP, FTP, or HTTP. NOTE: The Filesystem option is only available on the remote OBWI. 4 If you selected Filesystem, select Browse to specify the location of the firmware upgrade file. -orIf you selected TFTP, enter the Server IP Address and Firmware File you wish to load. -orIf you selected FTP or HTTP, enter the Server IP Address and Firmware File you wish to load, as well as the User Name and User Password. 5 Click Upgrade. Saving and Restoring RCS Configurations and RCS User Databases You may save the switch configuration to a file. The configuration file will contain information about the managed appliance. You may also save the local user database on the switch. After saving either file, you may also restore a previously saved configuration file or local user database file to the switch. To save a managed appliance configuration or user database of a managed appliance: 1 From the side navigation bar, click the Unit View - RCS - Files tab. 2 Click either the RCS Configuration tab or the User Database tab, then click the Save tab. 3 Select the file save method: Filesystem, TFTP, FTP, or HTTP PUT. 4 If you selected TFTP, enter the Server IP Address and Firmware Filename you wish to load. -or- Local and Remote Configurationxxx | xxx53 If you selected FTP or HTTP, enter the Server IP Address, Username, User Password, and Firmware Filename you wish to load. 5 Enter an encryption password if you wish to encrypt the data before download. 6 Click Download. The Save As dialog box will open. 7 Navigate to the desired location and enter a name for the file. Click Save. To restore a managed appliance configuration or user database of a managed appliance: 1 From the side navigation bar, click the Unit View - RCS - Files tab. 2 Click either the RCS Configuration tab or the User Database tab, then click the Restore tab. 3 Select the file save method: Filesystem, TFTP, FTP, or HTTP. 4 If you selected Filesystem, select Browse to specify the location of the firmware upgrade file. -orIf you selected TFTP, enter the Server IP Address and Firmware Filename you wish to load. -orIf you selected FTP or HTTP, enter the Server IP Address, User Name, User Password, and Firmware Filename you wish to load. 5 Click Browse. Navigate to the desired location and select the file name. Click Upload. 6 Enter the decryption password if the original file was encrypted. 7 After the success screen appears, reboot the managed appliance to enable the restored configuration. See "Rebooting the RCS" on page 52. To recover from a Flash update failure: If after a Flash procedure, the RCS does not boot into the new firmware version, you may use the following steps to revert to the previous firmware version. 54xxx | Local and Remote Configurationxxx 1 Connect a serial cable to the SETUP port on the rear panel of the RCS. 2 Run a terminal program on the PC connected to the Setup port. The serial port settings should be: 9600 baud, 8 data bits, 1 stop bit, no parity, and no flow control. 3 Turn on the RCS. 4 In the terminal program, when the prompt "Hit any key to stop autoboot" appears, press any key. A menu will be displayed. 5 Enter <1> (Boot Alternate) and press . The RCS will automatically reboot to the previous firmware version. 6 After the RCS reboots, you can attempt the Flash upgrade. Network Settings NOTE: Only switch administrators can make changes to the network dialog box settings. Other users will have view only access. From the side navigation bar, click Network to display the General, IPv4, and IPv6 tabs. To configure general network settings: 1 Click the Network tab, then click the General tab to display the RCS General Network Settings screen. 2 Select one of the following options from the LAN Speed drop-down menu: Auto-Detect, 10 Mbps Half Duplex, 10 Mbps Full Duplex, 100 Mbps Half Duplex, 100 Mbps Full Duplex, or 1 Gbps Full Duplex. NOTE: You must reboot if you change the Ethernet mode. 3 Select either Enabled or Disabled in the ICMP Ping Reply drop-down menu. 4 Verify or modify the HTTP or HTTPS ports. The settings will default to HTTP 80 and HTTPS 443. 5 Click Save. Local and Remote Configurationxxx | xxx55 To configure IPv4 network settings: 1 Click the IPv4 tab to display the IPv4 Settings screen. 2 Click to fill or clear the Enable IPv4 checkbox. 3 Enter the desired information in the Address, Subnet, and Gateway fields. IPv4 addresses are entered as the xxx.xxx.xxx.xxx dot notation. 4 Select either Enabled or Disabled from the DHCP drop-down menu. NOTE: If you enable DHCP, any information that you enter in the Address, Subnet, and Gateway fields will be ignored. 5 Click Save. To configure IPv6 network settings: 1 Click the IPv6 tab to display the IPv6 Settings screen. 2 Click to fill or clear the Enable IPv6 checkbox. 3 Enter the desired information in the Address, Subnet, and Prefix Length fields. IPv6 addresses are entered as the FD00:172:12:0:0:0:0:33 or abbreviated FD00:172:12::33 hex notation. 4 Select either Enabled or Disabled from the DHCP drop-down menu NOTE: If you enable DHCPv6, any information that you enter in the Address, Gateway, and Prefix length fields will be ignored. 5 Click Save. DNS Settings You can choose to either manually assign the DNS server or to use the addresses obtained using DHCP or DHCPv6. To manually configure DNS settings: 1 From the side navigation bar, select DNS to display the RCS DNS Settings screen. 2 Select Manual, DHCP (if IPv4 is enabled) or DHCPv6 (if IPv6 is enabled). 56xxx | Local and Remote Configurationxxx 3 If you selected Manual, enter the DNS Server numbers in the Primary, Secondary, and Tertiary fields. 4 Click Save. NTP Settings The switch must have access to the current time to verify that certificates have not expired. You can configure the switch to request time updates from the NTP. Refer to Configuring the Network Time Protocol (NTP) Settings in Chapter 5. SNMP Settings SNMP is a protocol used to communicate management information between network management applications and the switch. Other SNMP managers can communicate with your switch by accessing MIB-II. When you open the SNMP screen, the OBWI will retrieve the SNMP parameters from the unit. From the SNMP screen, you can enter system information and community strings. You may also designate which stations can manage the switch as well as receive SNMP traps from the switch. If you select Enable SNMP, the unit will respond to SNMP requests over UDP port 161. To configure general SNMP settings: 1 Click SNMP to open the SNMP screen. 2 Click to enable the Enable SNMP checkbox to allow the switch to respond to SNMP requests over UDP port 161. 3 Enter the system’s fully qualified domain name in the Name field, as well as a node contact person in the Contact field. 4 Enter the Read, Write, and Trap community names. These specify the community strings that must be used in SNMP actions. The Read and Write strings only apply to SNMP over UDP port 161 and act as passwords Local and Remote Configurationxxx | xxx57 that protect access to the switch. The values can be up to 64 characters in length. These fields may not be left blank. 5 Type the address of up to four management workstations that are allowed to manage this switch in the Allowable Managers fields. Alternatively, you may leave these fields blank to allow any station to manage the RCS. 6 Click Save. Auditing Event Settings An event is a notification sent by the switch to a management station indicating that something has occurred that may require further attention. To enable individual events: 1 Click Auditing to open the Events screen. 2 Specify the events that will generate notifications by clicking the appropriate checkboxes in the list. -orSelect or clear the checkbox next to Event Name to select or deselect the entire list. 3 Click Save. Setting Event Destinations You can configure audit events to be sent to SNMP trap destinations and Syslog servers. The events enabled on the Events screen are sent to all the servers listed on the Event Destination screen. 1 Click Auditing and the Destinations tab to open the Event Destinations screen. 2 Type the address of up to four management workstations to which this switch will send events in the SNMP Trap Destination fields, as well as up to four Syslog servers. 58xxx | Local and Remote Configurationxxx 3 Click Save. Ports - Configuring SIPs From the switch, you can display a list of the attached SIPs, as well as the following information about each SIP: EID (electronic ID), Port, Status, Application, Interface Type, and USB Speed. You can click on one of the SIPs to view the following additional information: Switch Type, Boot Version, Application Version, Hardware Version, FPGA Version, Version Available, and Upgrade Status. You can also perform the following tasks: delete offline SIPs, upgrade the SIP firmware, set the USB speed, or decommission the cables. To delete offline SIPs: 1 From the side navigation bar, click Ports - SIPs to open the SIP screen. 2 Click Delete Offline. Upgrading SIPs The SIP Flash upgrade feature allows RCS Administrators to update the SIP with the latest firmware available. This update can be performed using the switch user interface or Avocent management software. After the Flash memory is reprogrammed with the upgrade, the switch performs a soft reset, which terminates all SIP sessions. A target device experiencing a SIP firmware update may or may not display as disconnected. The target device will appear normally when the Flash update is completed. If the RCS is configured to Auto-Upgrade SIPs, the SIPs will automatically update when the switch is updated. To update your switch firmware, see "RCS Tools" on page 52 or the Avocent management software Online Help. If issues occur during the normal upgrade process, SIPs may also be force-upgraded when needed. NOTE: Check http://www.dell.com for firmware upgrade files. Local and Remote Configurationxxx | xxx59 To change the SIP Auto-Upgrade feature: 1 From the side navigation bar, click Ports - SIPs to open the SIPs screen. 2 Select the checkbox(es) next to the SIP(s) that you wish to upgrade and click Enable Auto-Upgrade. Attention: Disconnecting a SIP during a firmware update or cycling power to the target device will render the module inoperable and require the SIP to be returned to the factory for repair. To upgrade the SIP firmware: 1 From the side navigation bar, click Ports - SIPs to open the SIPs screen. 2 Select the checkbox(es) next to the SIP(s) that you wish to modify. 3 Select Choose an operation and select Upgrade. 4 If the settings are correct, click Upgrade. To set the USB Speed: NOTE: This section only applies to the USB2 SIP. 1 From the side navigation bar, click Ports - SIPs to open the SIPs screen. 2 Select the checkbox(es) next to the SIP(s) that you wish to modify. 3 Select Choose an operation and select either Set USB 1.1 Speed or Set USB 2.0 Speed. Power Device Settings NOTE: You must have Administrator privileges to change power control device settings. NOTE: Refer to www.dellkvm.com for a list of supported PDUs. From the RCS Power Devices screen, you can view a list of connected power devices, as well as the following information about each power device: Name, Port, Status, Version, Model, Buzzer, Alarm, and Temperature. You can also select a power device, then select Settings to view the following details about 60xxx | Local and Remote Configurationxxx that power device: Name, Description, Status, Version, Sockets, Vendor Name, Model, and Input Feeds. If a target device is connected to a power control device outlet, you can turn on, turn off or cycle (turn off, then turn on) the target device. To turn on, turn off or power cycle a target device: 1 From the side navigation bar, click Ports - Power Devices to open the Power Devices screen. 2 Click the name of the unit you wish to configure and select Outlet List. 3 Select the checkbox to the left of the outlet(s) that you wish to configure. 4 Click On, Off, or Cycle, as desired. To delete offline power devices: 1 From the side navigation bar, click Ports - Power Devices to open the Power Devices screen. 2 Click Delete Offline. To change the minimum on time, off time or wake up state: 1 From the side navigation bar, click Ports - Power Devices to open the Power Devices screen. 2 Click the name of the unit you wish to configure and select Outlets. 3 Click the outlet name that you wish to modify. 4 Use the drop-down windows to alter the desired settings and click Save. Associated Target Servers and Power Outlets In the OBWI Target List page, power control actions are selectable for a target with linked outlets. Selecting the Ports - Power Devices tabs, and then clicking on a device name will display the Device Settings, Device Firmware Upgrade, and Outlet List tabs. Click the Outlet List tab to display the outlets linked with a target device. Local and Remote Configurationxxx | xxx61 In the following figure, the target device named Server2 has linked power outlets. Clicking on the drop-down menu arrow in the Action column shows the additional power actions available. Figure 3.2: Target List In the following figure, the target Unit Overview page for Server2 shows the Wall Outlet Power, where outlet 1 and outlet 9 from PDU 1 are linked to Server2. Figure 3.3: Target Overview Server2 62xxx | Local and Remote Configurationxxx Grouping Power Outlets The outlets can be linked or associated with the target server for easier control. To group outlets (or outlets to servers), the first device to be named must use the Manual name field. The second and subsequent devices must use the Link to Target Device menu, and then select the target name for the first device from the drop down list. Power actions performed on the Target List page are applied to all applicable outlets. Power control actions for specific power outlets of a target may be performed on the Unit Overview page. In the following figure, the target named Group2 is composed of power outlets 4 and 5 from PDU 1. To group sockets 4 and 5: 1 Select outlet 4 to display the Power Devices Outlet Settings page. 2 Select Manual and enter Group2. 3 Click Save. Local and Remote Configurationxxx | xxx63 4 Select outlet 5 to display the Power Devices Outlet Settings page. 5 Select Link to Target Device, select Group2 from the drop down menu. 6 Click Save. After returning to the Outlet List, outlets 4 and 5 will have the same name. Figure 3.4: Target Overview for Group2 Default Outlet Names On the Power Devices page, the checkbox “Assign Default Names to Outlets” controls whether or not power outlets are given default names for a power device, as shown in the following figure. Only power outlets with names are listed on the Target page. Default assigned power outlet names may be removed by clearing the "Assign Default Names to Outlets" checkbox and saving. Power outlets without names are assigned default names by turning on “Assign Default Names to Outlets” and saving. Figure 3.5: RCS Power Devices Page 64xxx | Local and Remote Configurationxxx Assigning an Outlet Name On the Power Device Outlet Settings page, three options are available for assigning the name of a outlet as shown in the following figure. The options are Manual Name assignment, Link to Target Device and Do Not Display as Target Device. Figure 3.6: Power Device Outlet Settings Page Local and Remote Configurationxxx | xxx65 • The Manual Name assignment gives a unique name to an outlet. The name must be unique for all the SIPs and power outlet names. An attempt to specify a manual name which is not unique will result in an error and the name will not be saved. • The Link to Target List assignment links the outlet to another target name (either an outlet or SIP) for power control of the named target. When an outlet is linked to a SIP target name, typically the outlet physically provides power to the server attached to the SIP. • The Do Not Display as Target Device option gives the outlet a blank name, which prevents it from being displayed on the Target List page. This option may be used for spare outlets to remove them from the Target List page. Access Control Inheritance When a power outlet name is changed by linking it to a target, the outlet inherits the access control already configured for that target name. When a SIP is added, if the name retrieved from the SIP matches the name of an existing 66xxx | Local and Remote Configurationxxx target, the new SIP inherits the access control from that target. When a target device is renamed, all the SIPs and outlets of that target are renamed, and they carry forward the access control previously configured for the old target name. Renaming of a Target Device On the Target List - Overview page, the name for that target may be changed to any unique target name. The name must be unique for the set of all targets, including SIPs and power outlets. When a target is renamed, all outlets linked to that target are also given the new target name. Prioritized Status of Target Devices On the Target List page, a target with linked power outlets controls multiple devices. The Status value displayed for a target is chosen as the highest priority of all the status values of the devices. The following table shows the possible status values in priority order (highest to lowest) and the applicable target device types. Table 3.4: Target Status Values Status Value Applicable for: Status Description SIP Power Outlet In Use x N/A A session is active Path Blocked x N/A Path to Target is in use by another session Upgrading x N/A SIP is being upgraded Turning On N/A x One or more outlets are turning on Turning Off N/A x One or more outlets are turning off Local and Remote Configurationxxx | xxx67 Status Value Applicable for: Status Description SIP Power Outlet No Power x N/A No power detected on SIP Partial Power N/A x Target has outlets in both on and off states Locked-Off N/A x One or more outlets are locked on Turned Off N/A x One or more outlets are turned off Locked-On N/A x One or more outlets are locked off Idle x N/A No session active; SIP has power Turned On N/A x Outlets are turned on When a target device has multiple power outlets linked by name and they do not have a common power state, the RCS may consider the Locked-Off outlet status as Off, and the Locked-On outlet status as On. The following table lists the resulting Status values for combinations of two outlet status values. Table 3.5: Multiple Outlet Status Values and Displayed Status Outlet 1 Status Outlet 2 Status Resulting Status Off Off Off Off On Partial Power On On Powered On 68xxx | Local and Remote Configurationxxx Outlet 1 Status Outlet 2 Status Resulting Status Locked-On On Powered On Locked-On Locked-On Locked-On Locked-On Off Partial Power Locked-Off On Partial Power Locked-Off Locked-Off Locked-Off Locked-Off Off Powered Off Locked-On Locked-Off Partial Power Local Session Page on the Local Port On the local port's Local Session page, when the target of the active session has power outlets linked, three power controls are displayed on the page under the Active session. The following figure illustrates the power controls displayed for an active local port session for a target named Server2. Figure 3.7: Local Session Page With Power Controls Local and Remote Configurationxxx | xxx69 Local Port UI Settings To change how the local UI is invoked: 1 From the side navigation bar, select Ports - Local Port UI to open the Local Port UI Settings screen. 2 Under the Invoke Local Port UI heading, select the checkbox next to one or more of the listed methods. 3 Click Save. You can turn on or turn off local port user interface authentication and choose a user access level. If you turn on local port user interface authentication, you will be required to log in to use the interface. You can also select the keyboard language for the local port, scan mode time, enable/disable the local port password and select a user preemption level. The 70xxx | Local and Remote Configurationxxx preemption level of users determines whether they may disconnect another user’s serial or KVM session with a target device. Preemption levels range from 1 - 4, with 4 being the highest level. For example, a user with a preemption level of 4 may preempt other level 4 users, as well as those with a level 1, 2, or 3 setting. To change the Local Port User Authentication (Administrator only): 1 From the side navigation bar, select Ports - Local Port UI to open the Local Port UI Settings screen. 2 Select or deselect the Disable Local Port User Authentication checkbox. 3 If Disable Local Port User Authentication is checked, select one of the following options from the User Access Level drop-down menu: User, User Administrator, or RCS Administrator. 4 Click Save. Modem Settings From the RCS Modem Settings screen, you can configure several modem settings, as well as view the following modem settings: Local Address, Remote Address, Subnet Mask, and Gateway. For information on connecting your switch to a modem, see "Connecting the RCS Hardware" on page 25. To configure modem settings: 1 From the side navigation bar, select Ports - Modem to open the Modem Settings screen. 2 Either enable or disable the Modem sessions can preempt digital sessions checkbox. 3 Select an Authentication Timeout time from 30 to 300 seconds, and an Inactivity Timeout time from 1 to 60 minutes. 4 Select Save. Local and Remote Configurationxxx | xxx71 Setup Settings - Port Security From the serial setup port, you can change the appliance network configuration, enable debug information, and reset the appliance. To enable a password to restrict access the serial setup port: 1 From the side navigation bar, select RCS Settings - Ports - Setup to display the Setup Port Settings page. 2 Click to enable the Enable Setup Port Security box. 3 Enter and confirm your password. 4 Click Save. Sessions From the Active Sessions screen, you can view a list of active sessions and the following information about each session: Target Device, Owner, Remote Host, Duration, and Type. Configuring General Sessions To configure general session settings: 1 From the side navigation bar, select Sessions - General. The General Session Settings screen appears. 2 Select or deselect the Enable Inactivity Timeout checkbox. 3 In the Inactivity Timeout field, enter the amount of inactive time you want to pass before the session closes (from 1 to 90 minutes). 4 In the Login Timeout field, enter the amount of inactive time you want to pass before you must log in again (from 21 to 120 seconds). 5 Select or deselect the Enable Preemption Timeout checkbox. 72xxx | Local and Remote Configurationxxx 6 In the Preemption Timeout field, enter the amount of time (from 1 to 120 seconds) that a prompt will be displayed to inform you that your session is going to be preempted. 7 Select the applicable session sharing options (Enabled, Automatic, Exclusive, or Stealth). 8 Select the Input Control Timeout from 1 to 50, with 1 representing one tenth of a second. 9 Click Save. Configuring KVM Sessions To configure KVM session settings: 1 From the side navigation bar, select Sessions - KVM. The KVM Session Settings screen appears. 2 Select an encryption level for keyboard and mouse signals (128-bit SSL (ARCFOUR), DES, 3DES, or AES) and for video signals (128-bit SSL (ARCFOUR), DES, 3DES, AES, or None). 3 Select a language from the Keyboard drop-down menu. 4 If your hardware includes the USB2+CAC SIP, select the video resolution. 5 Click Save. Configuring Local Virtual Media Sessions To set virtual media options: 1 From the side navigation bar, select Sessions - Virtual Media to open the Virtual Media Session Settings screen. 2 Either enable or disable the Virtual Media locked to KVM Sessions checkbox. 3 Either enable or disable the Allow Reserved Sessions checkbox. 4 Select one of the following options from the Virtual Media Access Mode from the drop-down menu: Read-Only or Read-Write. Local and Remote Configurationxxx | xxx73 5 Select one of the Encryption Levels that you wish to be supported. 6 Click Save. 7 Select the checkbox next to each SIP for which you want to enable virtual media and click Enable VM. -orSelect the checkbox next to each SIP for which you want to disable virtual media and click Disable VM. Virtual Media Options You can determine the behavior of the switch during a virtual media session using the options provided in the Virtual Media Session Settings screen. Table 3.4 outlines the options that can be set for virtual media sessions. For information about using virtual media in a KVM session, see "Virtual Media" on page 96. Table 3.6: Virtual Media Session Settings Setting Description Session Settings: Virtual Media locked to KVM Session The locking option specifies whether a virtual media session is locked to the KVM session on the target device. When locking is enabled (default) and the KVM session is closed, the virtual media session will also be closed. When locking is disabled and the KVM session is closed, the virtual media session will remain active. 74xxx | Local and Remote Configurationxxx Setting Description Session Settings: Allow Reserved Sessions Ensures that a virtual media connection can only be accessed with your username and that no other user can create a KVM connection to that target device. When the associated KVM session is disconnected, the virtual media session may be disconnected according to the Locked setting in the Virtual Media dialog box. Drive Mappings: Virtual Media Access Mode You may set the access mode for mapped drives to read-only or read-write. When the access mode is read-only, the user will not be able to write data to the mapped drive on the client server. When the access mode is read-write, the user will be able to read and write data from/to the mapped drive. If the mapped drive is readonly by design (for example, a CD-ROM drive, DVD-ROM drive or ISO images), the configured read-write access mode will be ignored. Setting the read-only mode can be helpful when a readwrite drive such as a mass storage device or a USB removable media is mapped, and you wish to prevent the user from writing data to it. You can have one DVD drive and one mass storage device mapped concurrently. A CD drive, DVD drive, or ISO disk image file is mapped as a virtual CD/DVD drive. Encryption Level You may configure encryption levels for virtual media sessions. The choices are: None (default), 128-bit SSL (ARCFOUR), DES, 3DES, and AES. Local and Remote Configurationxxx | xxx75 Setting Description Virtual Media Access per SIP:Enable VM/Disable VM The Virtual Media Access per the SIP section lists all virtual media SIPs. The list includes details about each cable, including the option to enable or disable virtual media for each cable. Local Users Local users can also determine the behavior of virtual media from the Local Session screen. In addition to connecting and disconnecting a virtual media session, you can configure the settings in the following table. Table 3.7: Local Virtual Media Session Settings Setting CD ROM/ DVD ROM Description Allows virtual media sessions to the first detected CD-ROM or DVD-ROM (read-only) drives. Enable this checkbox to establish a virtual media CD-ROM or DVD-ROM connection to a target device. Disable to end a virtual media CD-ROM or DVDROM connection to a target device. Mass Storage Allows virtual media sessions to the first detected mass storage drive. Enable this checkbox to establish a virtual media mass storage connection to a target device. Disable to end a virtual media mass storage connection to a target device. Reserved Ensures that a virtual media connection can only be accessed with your username and that no other user can create a KVM connection to that target device. 76xxx | Local and Remote Configurationxxx Configuring Serial Sessions To configure serial session settings: 1 From the side navigation bar, click Sessions - Serial to display the Serial Session Settings screen. 2 Either enable or disable the Telnet Access Enabled checkbox. 3 Click Save. Setting Up User Accounts Managing Local Accounts The switch OBWI provides local and login security through administratordefined user accounts. By selecting User Accounts on the side navigation bar, administrators may add and delete users, define user preemption, and access levels and change passwords. Access Levels When a user account is added, the user may be assigned to any of the following access levels: RCS Administrators, User Administrators, and Users. Table 3.8: Allowed Operations by Access Level Operation RCS Administrator User Administrator Users Configure interface system-level settings Yes No No Configure access rights Yes Yes No Add, change and delete user accounts Yes, for all access levels Yes, for Users and User Administrators only No Local and Remote Configurationxxx | xxx77 Operation RCS Administrator User Administrator Users Change your own password Yes Yes Yes Access target device Yes, all target devices Yes, all target devices Yes, if allowed To add a new user account (User Administrator or RCS Administrator only): 1 On the side navigation bar, select User Accounts - Local User Accounts to open the Local User Accounts screen. 2 Click the Add button. 3 Enter the name and password of the new user in the blanks provided. 4 Select the access level for the new user. 5 Select any of the available target devices that you wish to assign to the user account and click Add. NOTE: User Administrators and RCS Administrators can access all target devices. 6 Click Save. To delete a user account (User Administrator or RCS Administrator only): 1 On the side navigation bar, select User Accounts - Local Accounts to open the Local User Accounts screen. 2 Click the checkbox to the left of each account that you wish to delete, then click Delete. To edit a user account (Administrator or active user only): 1 On the side navigation bar, select User Accounts - Local Accounts. The Local User Accounts screen is displayed. 2 Click the name of the user you wish to edit. The user profile will appear. 78xxx | Local and Remote Configurationxxx 3 Fill out the user information on the screen, then click Save. Avocent Management Software Device IP Addresses You can contact and register an unmanaged switch with an Avocent management software server by specifying the IP address of the management software server. To configure the server IP address: 1 On the side navigation bar, select User Accounts - Avocent. The Avocent Management Software Settings screen is displayed. 2 Enter the server IP addresses that you want to contact. Up to four addresses are allowed. 3 Use the scroll bar to select the desired retry interval. 4 To disassociate an RCS that has been registered with the server, click the Disassociate button. 5 Click Save. LDAP The Dell 1082DS/2162DS/4322D RCS can authenticate and authorize users via a local database or by an external scalable distributed directory service using the Dell RCS software or OBWI with LDAP (Lightweight Directory Assistance Protocol) support. Refer to the LDAP section for additional information on configuring and using LDAP on the RCS. Override Admin Should a network failure occur, an account is provided that may be used regardless of the unit’s ability to authenticate against an LDAP server. Refer to Configure the Override Admin Account in Chapter 5. Local and Remote Configurationxxx | xxx79 Active Sessions From the Active Sessions screen, you can view a list of active sessions and the following information about each session: Target Device, Owner, Remote Host, Duration, and Type. Closing a Session To close a session: 1 From the side navigation bar, select Active Sessions to display the RCS Active Sessions screen. 2 Click the checkbox next to the desired target device(s). 3 Click Disconnect. NOTE: If there is an associated locked virtual media session, it will be disconnected. To close a session (local users only): 1 From the side navigation bar, select Local Session. 2 Select the Disconnect Active Session checkbox. 80xxx | Local and Remote Configurationxxx 4 The Video Viewer Window The Video Viewer is used to conduct a KVM session with the target devices attached to an switch using the OBWI. When you connect to a device using the Video Viewer, the target device desktop appears in a separate window containing both the local and the target device cursors. The switch OBWI software uses a Java-based program to display the Video Viewer window. The switch OBWI automatically downloads and installs the Video Viewer the first time it is opened. NOTE: Java 1.6.0_11 or later is required to launch a session. NOTE: The switch OBWI does not install the Java Resource Engine (JRE). The JRE is available as a free download from http://www.sun.com. NOTE: The switch OBWI uses system memory to store and display images within Video Viewer windows. Each opened Video Viewer window requires additional system memory. An 8-bit color setting on the client server requires 1.4 MB of memory per Video Viewer window, a 16-bit color setting requires 2.4 MB and a 32-bit color setting requires 6.8 MB. If you attempt to open more Video Viewer windows than your system memory allows (usually four), you will receive an out-of-memory error and the requested Video Viewer window will not open. If the device you are attempting to access is currently being viewed by another user, you will be prompted to preempt the other user if your preemption level is equal to or greater than the other user's preemption level. An RCS Administrator can also disconnect an active user via the Active Session page. For more information, see "Active Sessions" on page 80. Figure 4.1: Video Viewer Window (normal window mode) The Video Viewer Windowxxx | xxx81 Table 4.1: Video Viewer Descriptions NumbeDescription r 1 Title Bar: Displays the name of the target device being viewed. When in Full Screen mode, the title bar disappears and the target device name appears between the menu and toolbar. 2 Thumbtack icon: Locks the display of the menu and toolbar so that it is visible at all times. 82xxx | The Video Viewer Windowxxx NumbeDescription r 3 Menu and toolbar: Enables you to access many of the features in the Video Viewer window. The menu and toolbar is in a show/hide state if the thumbtack has not been used. Place your cursor over the toolbar to display the menu and toolbar. Up to ten commands and/or macro group buttons can be displayed on the toolbar. By default, the Single Cursor Mode, Refresh, Automatic Video Adjust and Align Local Cursor buttons appear on the toolbar. For more information, see "Changing the Toolbar" on page 83 and "Macros" on page 104. 4 Macro buttons: Commonly used keyboard sequences that can be sent to the target device. 5 Connection Status Indicator: Indicates the status of the user that is connected to the RCS for this server. The modes are exclusive, basic active connection, primary active sharing, secondary active sharing, passive sharing, stealth, and scanning. 6 Smart Card Status Indicators: Indicate whether or not a smart card is in the smart card reader. The Video Viewer screen smart card icon is greyed out and indicates that the smart card option is unavailable or disabled. The icon is green if the smart card is mapped. 7 Display area: Accesses the server desktop. 8 Frame: Resizes the Video Viewer window by clicking and holding on the frame. Changing the Toolbar You can choose the amount of elapsed time before the toolbar hides in the Video Viewer window when it is in show/hide state (that is, not locked in place by the thumbtack). To specify a toolbar hide time: 1 Select Tools - Session Options from the Video Viewer window menu. The Video Viewer Windowxxx | xxx83 -orClick the Session Options button. The Session Options dialog box appears. 2 Click the Toolbar tab. 3 Use the arrow keys to specify the number of elapsed seconds prior to hiding the toolbar. 4 Click OK to save your changes and close the dialog box. Launching a Session NOTE: When using a non-proxied connection, video performance over a slower network connection may be less than optimal. Since certain color settings (such as Grayscale) use less network bandwidth than others (such as Best Color), changing the color settings can increase video performance. For optimal video performance over a slower network connection, use a color setting such as Grayscale/Best Compression or Low Color/High Compression. See "Adjusting the View" on page 85 for more information. NOTE: If a user connects to a target device with a higher screen resolution than the local computer, the Video Viewer window will display a portion of the target device screen, with scroll bars for viewing the remainder of the screen. The user may view the entire screen by adjusting the resolution on the target device, the local computer or both. To launch a KVM session from the switch Explorer window: 1 Click on a device listed on the Target List screen to open the unit overview window. 2 Click the KVM Session link to open the Video Viewer in a new window. Session Time-out A remote session can time-out when no activity occurs in a Session window for a specified time. The session time-out value can be configured in the RCS KVM Session Settings window. The specified time-out value will be used the next time the switch OBWI is accessed. 84xxx | The Video Viewer Windowxxx To enable, disable, or configure the session time-out: 1 In the side menu, select Unit View - RCS - RCS Settings - Sessions General. 2 Select the desired setting for the Enable Activity Timeout box. 3 If necessary, select the time limit for the inactivity time-out. 4 Click Save. Window Size NOTE: The View - Scaling command is not available if the Video Viewer window is in Full Screen mode or to non-primary users of a shared session. When the switch OBWI is used for the first time, any open Video Viewer windows display at a resolution of 1024 x 768 until the user changes the value. Each Video Viewer window can be set to a different resolution. The switch OBWI automatically adjusts the display if the window size changes during a session as long as autoscaling is enabled. If the target device resolution changes any time during a session, the display adjusts automatically. To change the Video Viewer window resolution: 1 Select the View - Scaling command. 2 Select the desired resolution. Adjusting the View Using menus or task buttons in the Video Viewer window, you can do the following: • Align the mouse cursors. • Refresh the screen. The Video Viewer Windowxxx | xxx85 • • • Enable or disable Full Screen mode. When Full Screen mode is enabled, the image adjusts to fit the desktop up to a size of 1600 x 1200 or 1680 x 1050 (widescreen). If the desktop has a higher resolution, the following occurs: • The full-screen image is centered in the desktop, and the areas surrounding the Video Viewer window are black. • The menu and toolbar are locked so that they are visible at all times. Enable automatic, full or manual scaling of the session image: • With full scaling, the desktop window remains fixed and the device image scales to fit the window. • With automatic scaling, the desktop window is sized to match the resolution of the target device being viewed. • With manual scaling, a drop-down menu of supported image scaling resolutions is displayed. Change the color depth of the session image. To align the mouse cursors: Click the Align Local Cursor button in the Video Viewer window toolbar. The local cursor should align with the cursor on the remote device. NOTE: If cursors drift out of alignment, turn off mouse acceleration in the attached device. To refresh the screen, click the Refresh Image button in the Video Viewer window, or select View - Refresh from the Video Viewer window menu. The digitized video image is completely regenerated. To enable Full Screen mode, click the Maximize button, or select View - Full Screen from the Video Viewer window menu. The desktop window disappears and only the accessed device desktop is visible. The screen resizes up to a maximum of 1600 x 1200 or 1680 x 1050 (widescreen). If the desktop has a higher resolution, then a black background surrounds the full screen image. The floating toolbar appears. 86xxx | The Video Viewer Windowxxx To disable Full Screen mode, click the Full Screen Mode button on the floating toolbar to return to the desktop window. To enable full scaling, select View - Scaling from the Video Viewer window menu and select Full Scale. The device image scales automatically to the resolution of the target device being viewed. To enable manual scaling, select View - Scaling from the Video Viewer window menu. Choose the dimension to scale the window. The available manual scaling sizes will vary according to your system. Refreshing the Image Clicking the Refresh Image button in the Manual Video Adjust dialog box completely regenerates the digitized video image. NOTE: You can also select View - Refresh from the Video Viewer window menu to refresh the image. Video Settings Additional Video Adjustment Generally, the Video Viewer window automatic adjustment features optimize the video for the best possible view. However, users can fine-tune the video with the help of Dell Technical Support by selecting the Tools - Manual Video Adjust command in the Video Viewer window menu or clicking the Manual Video Adjust button. This displays the Manual Video Adjust dialog box. Video adjustment is a per target setting. Users can also verify the level of packets per second required to support a static screen by observing the packet rate located in the lower left-hand corner of the dialog box. To manually adjust the video quality of the window: NOTE: The following video adjustments should be made only with the help of Dell Technical Support. The Video Viewer Windowxxx | xxx87 1 Select Tools - Manual Video Adjust from the Video Viewer window menu. -orClick the Manual Video Adjustbutton. The Manual Video Adjust dialog box appears. Figure 4.2: Manual Video Adjust Dialog Box Table 4.2: Descriptions for Figure 4.2 Number Description Number Description 1 Image Capture Width 9 Automatic Video Adjustment 2 Pixel Sampling/Fine Adjust 10 Refresh Image 3 Image Capture Horizontal Position 11 Adjustment bar 88xxx | The Video Viewer Windowxxx Number Description Number Description 4 Image Capture Vertical Position 12 Video Test Pattern 5 Contrast 13 Help 6 Brightness 14 Performance Monitor 7 Noise Threshold 15 Close button 8 Priority Threshold 2 Click the icon corresponding to the feature you wish to adjust. 3 Move the Contrast slider bar and then fine-tune the setting by clicking the Min (-) or Max (+) buttons to adjust the parameter for each icon pressed. The adjustments display immediately in the Video Viewer window. 4 When finished, click Close to exit the Manual Video Adjust dialog box. Target Video Settings The Image Capture Width, Pixel Sampling/Fine Adjust, Image Capture Horizontal Position and Image Capture Vertical Position adjustments affect how the target video is captured and digitized. They are seldom changed. The image capture parameters are automatically changed by the Automatic Adjustment function. A special image is required on the target in order to make accurate adjustments independently. Automatic Video Adjustment In most cases, you do not need to alter the Video Settings from the default settings. The system automatically adjusts and uses the optimal video parameters. The switch OBWI performs best when the video parameters are set such that no (0) video packets are transmitted for a static screen. The Video Viewer Windowxxx | xxx89 You can easily adjust your video parameters to ideal settings by clicking on the Auto Adjust Video button in the Manual Video Adjust dialog box. NOTE: You can also select Tools - Automatic Video Adjust from the Video Viewer window menu or click the Automatic Video Adjust toolbar icon to automatically adjust the video. Video Test Pattern Clicking the Video Test Pattern button in the Manual Video Adjust dialog box toggles a display of a video test pattern. Click the Video Test Pattern button again to toggle back to a normal video image. Vendor-specific Video Settings Video settings vary significantly among manufacturers. Dell maintains an online database of optimized video settings for various video cards, particularly Sunspecific ones. This information can be obtained from the Dell online knowledge base or by calling Dell technical support. Color Settings Adjusting Color Depth The Dambrackas Video Compression® (DVC) algorithm enables users to adjust the number of viewable colors in a remote session window. You can choose to display more colors for the best fidelity or fewer colors to reduce the volume of data transferred on the network. Video Viewer windows can be viewed using the Best Color Available (slower updates), Best Compression (fastest updates), a combination of Best Color and Best Compression or in Grayscale. You can specify the color depths of individual ports and channels by selecting the View Color command in a remote session window. These settings are saved individually per channel. 90xxx | The Video Viewer Windowxxx Contrast and Brightness If the image in the Video Viewer window is too dark or too light, select Tools Automatic Video Adjust or click the Automatic Video Adjust button. This command is also available in the Video Adjustments dialog box. In most cases, this corrects video issues. When clicking Auto Adjust several times does not set the contrast and brightness as desired, adjusting the contrast and brightness manually can help. Increase the brightness. Do not go more than 10 increments before moving the contrast. Generally, the contrast should be moved very little. Noise Settings Detection Thresholds In some cases, noise in the video transmission keeps the packets/sec count up, which is indicated by small dots changing in the area of the cursor when it is moved. Varying the threshold values may result in “quieter” screens and can improve cursor tracking. You can modify Noise Threshold and Priority Threshold values if you are using standard video compression. You can restore default threshold values by clicking Auto Adjust Video. NOTE: Leaving the noise threshold at zero triggers constant video refresh, resulting in high network usage and a flickering video. It is recommended that the noise threshold be set at the highest level that allows efficient system performance, while still being able to recover pixel colors that the mouse cursor travels over. NOTE: When adjusting the noise threshold, the slider bar is used for large adjustments and the Plus (+) and Minus (-) buttons at either end of the slider bar are used for fine-tuning. See "Adjusting the View" on page 85 for information about changing the color depth. The Video Viewer Windowxxx | xxx91 Mouse Settings Adjusting Mouse Options The Video Viewer window mouse options affect cursor type, Cursor mode, scaling, alignment and resetting. Mouse settings are device-specific; that is, they may be set differently for each device. NOTE: If the device does not support the ability to disconnect and reconnect the mouse (almost all newer PCs do), then the mouse will become disabled and the device will have to be rebooted. Cursor Type The Video Viewer window offers five appearance choices for the local mouse cursor. You can also choose no cursor or the default cursor. In Single Cursor mode, the display of the local (second) cursor in the Video Viewer window turns off and only the target device mouse pointer is visible. The only mouse movements that appear are those of the target device remote cursor. Use Single Cursor mode when there is no need for a local cursor. Figure 4.3: Video Viewer Window With Local and Remote Cursors Displayed 92xxx | The Video Viewer Windowxxx Table 4.3: Descriptions for Figure 4.3 Number Description 1 Remote Cursor 2 Local Cursor The Cursor mode status of the Video Viewer window displays in the title bar, including the keystroke that will exit Single Cursor mode. You can define the keystroke that will exit Single Cursor mode in the Session Options dialog box. NOTE: When using a device that captures keystrokes before they reach the client server, you should avoid using those keys to restore the mouse pointer. The Video Viewer Windowxxx | xxx93 To enter Single Cursor mode, select Tools - Single Cursor Mode from the Video Viewer window menu, or click the Single Cursor Mode button. The local cursor does not appear and all movements are relative to the target device. To select a key for exiting Single Cursor mode: 1 Select Tools - Session Options from the Video Viewer window menu. -orClick the Session Options button. The Session Options dialog box appears. 2 Click the Mouse tab. 3 Select a terminating keystroke from the drop-down menu in the Single Cursor mode area. 4 Click Save to save settings. When you enable Single Cursor mode, you can press the specified key to return to Regular Desktop mode. To exit Single Cursor mode, press the key on the keyboard that is identified in the title bar. To change the mouse cursor setting: 1 Select Tools - Session Options from the Video Viewer window menu. -orClick the Session Options button. The Session Options dialog box appears. 2 Click the Mouse tab. 3 Select a mouse cursor type in the Local Cursor panel. 4 Click OK to save settings. 94xxx | The Video Viewer Windowxxx Mouse Scaling Some earlier versions of Linux did not support adjustable mouse accelerations. For installations that must support these earlier versions, you can choose among three pre-configured mouse scaling options or set your own custom scaling. The pre-configured settings are Default (1:1), High (2:1) or Low (1:2): • In a 1:1 scaling ratio, every mouse movement on the desktop window sends an equivalent mouse movement to the target device. • In a 2:1 scaling ratio, the same mouse movement sends a 2X mouse movement. • In a 1:2 scaling ratio, the value is 1/2X. To set mouse scaling: 1 Select Tools - Session Options from the Video Viewer window menu. -orClick the Session Options button. The Session Options dialog box appears. 2 Click the Mouse tab. 3 To use one of the pre-configured settings, check the appropriate radio button. -orTo set custom scaling: a. Click the Custom radio button to enable the X and Y fields. b. Type a scaling value in the X and Y fields. For every mouse input, the mouse movements are multiplied by the respective X and Y scaling factors. Valid input range is 0.25-3.00. Mouse Alignment and Synchronization Because the switch OBWI cannot get constant feedback from the mouse, there are times when the mouse on the switch may lose sync with the mouse on the The Video Viewer Windowxxx | xxx95 host system. If your mouse or keyboard no longer responds properly, you can align the mouse to reestablish proper tracking. Alignment causes the local cursor to align with the remote target device’s cursor. Resetting causes a simulation of a mouse and keyboard reconnect as if you had disconnected and reconnected them. To realign the mouse, click the Align Local Cursor button in the Video Viewer window toolbar. Virtual Media The virtual media feature allows the user on the client server to map a physical drive on that machine as a virtual drive on a target device. The client server may also add and map an ISO or floppy image file as a virtual drive on the target device. You may have one CD drive and one mass storage device mapped concurrently. • A CD/DVD drive, disk image file (such as an ISO or floppy image file) is mapped as a virtual CD/DVD-ROM drive. • A floppy drive, USB memory device or other media type is mapped as a virtual mass storage device. For information on configuring virtual media settings using the OBWI, see "Configuring Local Virtual Media Sessions" on page 73. Requirements The target device must support virtual media and be connected to the KVM switch with a USB2 or USB2+CAC SIP. The target device must be intrinsically able to use the types of USB2-compatible media that you virtually map. In other words, if the target device does not support a portable USB memory device, you cannot map that on the client server as a virtual media drive on the target device. 96xxx | The Video Viewer Windowxxx The user (or user group to which the user belongs) must have permission to establish virtual media sessions and/or reserved virtual media sessions to the target device. See "Setting Up User Accounts" on page 77. Only one virtual media session may be active to a target device at one time. Sharing and Preemption Considerations The KVM and virtual media sessions are separate; therefore, there are many options for sharing, reserving or preempting sessions. The Avocent management software has the flexibility to accommodate the system needs. For example, the KVM and virtual media sessions may be locked together. In this mode, when a KVM session is disconnected, so is the associated virtual media session. If the sessions are not locked together, the KVM session can be closed but the virtual media session will remain active. This could be desirable if a user is performing a time-intensive task using the virtual media session (such as an operating system load), and wants to establish a KVM session with a different target device to perform other functions while the operating system load progresses. Once a target device has an active virtual media session without an associated active KVM session, two situations can occur - the original user (User A) can reconnect or a different user (User B) can connect to that channel. You may set an option in the Virtual Media dialog box (Reserved) that allows only the User A to access that channel with a KVM session. If User B is allowed to access that session (the Reserved option is not enabled), User B could control the media that is being used in the virtual media session. By using the Reserved option in a tiered environment, only User A could access the lower switch and the KVM channel between the upper switch and lower switch would be reserved for User A. Virtual Media Dialog Box The Virtual Media dialog box allows you to manage the mapping and unmapping of virtual media. The dialog box displays all the physical drives on The Video Viewer Windowxxx | xxx97 the client server that can be mapped as virtual drives. You may also add ISO and floppy image files and then map them using the Virtual Media dialog box. After a device is mapped, the Virtual Media dialog box Details View displays information about the amount of data transferred and the time elapsed since the device was mapped. You may specify that the virtual media session is reserved. When a session is reserved, and the associated KVM session is closed, another user cannot launch a KVM session to that target device. If a session is not reserved, another KVM session may be launched. You may also reset the SIP from the Virtual Media dialog box. This action will reset every form of USB media on the target device. It should be used with caution and only when the target device is not responding. Opening a Virtual Media Session To launch a virtual media session: Select Tools - Virtual Media from the Video Viewer menu. The Virtual Media dialog box will appear. To make this a reserved session, click Details, then select the Reserved checkbox. Figure 4.4: Video Viewer Virtual Media Dialog Box 98xxx | The Video Viewer Windowxxx To map a virtual media drive: 1 Open a virtual media session from the Video Viewer menu by selecting Tools - Virtual Media. 2 To map a physical drive as a virtual media drive: a. In the Virtual Media dialog box, click the Mapped checkbox next to the drive(s) you wish to map. b. If you wish to limit the mapped drive to read-only access, click the Read Only checkbox next to the drive. If the virtual media session settings were previously configured so that all mapped drives must be read only, this checkbox will already be enabled and cannot be changed. You might wish to enable the Read Only checkbox if the session settings enabled read and write access, but you wished to limit a particular drive’s access to read only. 3 To add and map an ISO or floppy image as a virtual media drive: The Video Viewer Windowxxx | xxx99 a. In the Virtual Media dialog box, click Add Image. b. The common file dialog box will appear, with the directory containing disk image files (that is, those ending in .iso or .img) displayed. Select the desired ISO or floppy image file and click Open. -orIf the client server’s operating system supports drag-and-drop, select the desired ISO or floppy image file from the common file dialog box, and drag it onto the Virtual Media dialog box. c. The file’s header is checked to ensure it is correct. If it is, the common file dialog box will close and the chosen image file will appear in the Virtual Media dialog box, where it can be mapped by clicking the Mapped checkbox. d. Repeat steps a through c for any additional ISO or floppy images you wish to add. You may add any number of image files (up to the limits imposed by memory), but you may only have one virtual CD or DVD or virtual mass storage mapped concurrently. If you attempt to map too many drives (one CD or DVD and one mass storage device) or too many drives of a particular type (more than one CD or DVD or mass storage device), a message will be displayed. If you still wish to map a new drive, you must first unmap an existing mapped drive, then map the new drive. After a physical drive or image is mapped, it may be used on the target device. To unmap a virtual media drive: 1 In the Virtual Media dialog box, uncheck the Mapped checkbox next to the drive you wish to unmap. 2 You will be prompted to confirm. Confirm or cancel the unmapping. 3 Repeat for any additional virtual media drives you wish to unmap. To display virtual media drive details: In the Virtual Media dialog box, click Details. The dialog box expands to display the Details table. Each row indicates: 100xxx | The Video Viewer Windowxxx • Target Drive - Name used for the mapped drive, such as Virtual CD 1 or Virtual CD 2. • Mapped to - Identical to Drive information that appears in the Client View Drive column. • Read Bytes and Write Bytes - Amount of data transferred since the mapping. • Duration - Elapsed time since the drive was mapped. To close the Details view, click Details again. To reset all USB devices on the target device: NOTE: The USB reset feature resets every USB device on the target device, including the mouse and keyboard. It should only be used when the target device is not responding. 1 In the Virtual Media dialog box, click Details. 2 The Details View will appear. Click USB Reset. 3 A warning message will appear, indicating the possible effects of the reset. Confirm or cancel the reset. 4 To close the Details view, click Details again. Closing a Virtual Media Session To close the Virtual Media dialog box: 1 Click Exit. 2 If you have any mapped drives, a message is displayed, indicating that the drives will be unmapped. Confirm or cancel the operation. If a user attempts to disconnect a virtual media session or an active KVM session that has an associated locked virtual media session, a confirmation message is displayed, indicating that any virtual media mappings will be lost. The Video Viewer Windowxxx | xxx101 Smart Cards You can connect a smart card reader to an available USB port on the client server and access attached target devices on the switch system. You can then launch a KVM session to open the Video Viewer and map a smart card. NOTE: For all smart card readers, you must use a Dell USB2+CAC SIP or an Avocent VMC IQ module. The smart card status is indicated by the smart card icon at the far right of the Video Viewer toolbar. The following table describes the smart card status icons. Table 4.4: Smart Card Icons Icon Description A smart card is not in the smart card reader, or a smart card reader is not attached. A smart card is in the smart card reader but has not been mapped yet. A smart card is mapped (green icon). To map a smart card: 1 Open a KVM session to display the Video Viewer window menu. 2 Insert a smart card into the smart card reader attached to your client server. 3 Click Tools - Map Smart Card on the Video Viewer window menu. 4 If no smart card is mapped to the target device, the No Card Mapped option will have a dot beside it. Select your smart card, listed below this option, to map the smart card. To unmap a smart card, close out the KVM session by clicking X in the Video Viewer window menu, selecting Tools - No Card Mapped, and either removing 102xxx | The Video Viewer Windowxxx the smart card from the smart card reader or disconnecting the smart card reader from the client server. Keyboard Pass-through Keystrokes that a user enters when using a Video Viewer window may be interpreted in two ways, depending on the Screen mode of the Video Viewer window. • If a Video Viewer window is in Full Screen mode, all keystrokes and keyboard combinations except Ctrl-Alt-Del are sent to the remote target device being viewed. • If a Video Viewer window is in Regular Desktop mode, Keyboard Passthrough mode can be used to control whether the remote target device or local computer recognizes certain keystrokes or keystroke combinations. Keyboard pass-through must be specified using the Session Options dialog box. When enabled, keyboard pass-through sends all keystrokes and keystroke combinations except Ctrl-Alt-Del to the remote target device being viewed when the Video Viewer window is active. When the local desktop is active, keystrokes and keystroke combinations entered by the user affect the local computer. NOTE: The Ctrl-Alt-Del keyboard combination can be sent only to a remote target device by using a macro. NOTE: The Japanese keyboard ALT-Han/Zen keystroke combination is always sent to a remote target device regardless of the Screen mode or keyboard pass-through setting. To specify keyboard pass-through: 1 Select Tools - Session Options from the Video Viewer window menu. -orClick the Session Options button. The Session Options dialog box appears. 2 Click the General tab. The Video Viewer Windowxxx | xxx103 3 Select Pass-through all keystrokes in regular window mode. 4 Click OK to save setting. Macros The switch OBWI comes pre-configured with macros for the Windows, Linux, and Sun platforms. To send a macro, select Macros - from the Video Viewer window menu, or select the desired macro from the buttons available on the Video Viewer menu. Saving the View You can save the display of a Video Viewer either to a file or to the clipboard for pasting into a word processor or other program. To capture the Video Viewer window to a file: 1 Select File - Capture to File from the Video Viewer window menu. -orClick the Capture to File button. The Save As dialog box appears. 2 Enter a filename and choose a location to save the file. 3 Click Save to save the display to a file. To capture the Video Viewer window to your clipboard, select File - Capture to Clipboard from the Video Viewer window menu, or click the Capture to Clipboard button. The image data is saved to the clipboard. Closing a Session To close a Video Viewer window session: Select File - Exit from the Video Viewer window. 104xxx | The Video Viewer Windowxxx 5 LDAP Feature for the RCS LDAP is a protocol standard used for accessing and updating a directory using TCP/IP. The Dell RCS software and OBWI supports both standard and Dell extended schema, and offers strong security features including authentication, privacy, and integrity. NOTE: Windows 2008 Server is required to use LDAP in IPv6 mode. NOTE: Use of Microsoft Active Directory to recognize RCS users is supported on the Microsoft Windows® 2000 and Windows Server 2003 operating systems. The Structure of Active Directory An Active Directory (AD) deployment consists of a distributed database containing hierarchical structures of objects. Each object is associated with an object class that determines what kinds of data can be stored in that object. The hierarchical structures begin with objects that represent AD domains, deployed to form a hierarchy of domain names that can be represented in a tree diagram the same way DNS name spaces are usually depicted. Dell RCSs are designed to support a single tree of domains that are deployed in either a shallow or deep hierarchical name structure. Domain Controller Computers Associated with the Domain hierarchy is the corresponding hierarchy of Domain Controller computers where AD provides LDAP services. Each domain may have multiple peer Domain Controllers and may also be distributed across geographical sites. The suite of Dell RCSs is designed to support both of these LDAP Feature for the RCSxxx | xxx105 aspects of AD. DNS is used to determine the network coordinates of each Domain Controller so that the Dell RCSs can gracefully handle situations where some Domain Controllers are not available on the network. DNS SRV records are used for this purpose so the Dell RCSs always attempt to contact alternative Domain Controllers at the nearest site first, depending on the administrative settings configured in the SRV records. Object Classes Within each domain, there is another hierarchy of objects designed to store information about various entities and groupings of entities. Such entities are represented in AD by object classes used to define “containers” that help organize groupings of objects. Other object classes represent entities such as network users, computers, printers, or network services. Two types of container object classes are of special interest: Group and Organizational Unit (OU). These two object classes allow the AD Administrator to define groupings of entities for the purpose of simplifying the application of access controls and other administrative policies. For example, a domain may be configured to have an OU container named Engineering, which contains several Group objects named according to function, like Hardware, Software, and Support; each of the groups is configured with a membership list of User objects and perhaps Computer objects. Yet another level of hierarchy can be configured by nesting groups; a nesting is formed by including the name of a Group object in the membership of another Group object. It should be noted here that each AD Group object has an associated scope that is used to configure the types of nesting relationships it is allowed to have with other groups; for example, when scope is set to Universal, the group may participate in nesting that crosses domain boundaries but when scope is set to Local it may not participate in such nesting. Rules for nesting are available in the AD product documentation available from Microsoft. The suite of Dell RCSs is designed to support all nesting rules defined for AD. 106xxx | LDAP Feature for the RCSxxx Attributes There is one more hierarchy used in AD. Associated with each object class is a set of “attributes” used to store specific information about the entity that is being represented. For example, associated with the User object class is an attribute type named SAM ACCOUNT NAME and others such as FIRST NAME, SURNAME, PASSWORD, etc. The suite of Dell Remote Console Switches uses the SAM ACCOUNT NAME and PASSWORD attributes to authenticate a user (the formal AD names for these two attributes are sAMAccountName and unicodePWD, respectively). Schema Extensions AD is packaged with many object classes, including default containers for Computer and User objects as well as classes for OU containers and classes to represent computer and user entities. AD can be extended to include new object classes such as those provided by Dell to simplify the administration of access controls; such extensions are usually referred to as “schema extensions” and are at the heart of the Dell Extended Schema feature described in this document. These schema extensions provide customized object classes to represent Dell RCSs, access control information, and a type of container used to associate specific access control information with specific instances of Dell RCSs and Users. It is important to note that each attribute type and object class used in AD must have a globally unique identifier, known as an Object Identifier (OID). These unique identifiers are ultimately managed by internationally recognized authorities. For AD, the OID space is managed secondarily by Microsoft. Dell has obtained OIDs for the custom object classes and attribute types used in the Dell Extended Schema feature. The following is a summary of the OIDs Dell obtained: Dell extension is: dell Dell base OID is: 1.2.840.113556.1.8000.1280 RCS LinkID range is: 12070 to 12079 LDAP Feature for the RCSxxx | xxx107 The suite of Dell RCSs is also designed to function using only object classes present in the AD packaged classes; this option is known as the Standard Schema. Under this option, the Computer object class is used to represent Dell RCSs and standard Group objects are used to associate specific access control information with specific instances of Dell RCSs and Users. In this case, access control information is stored in a specific attribute type in the Group object. The hierarchical structures present in AD can complicate your ability to access information stored in the directory objects. To avoid potential delays associated with navigation of the hierarchies, the suite of Dell Remote Console Switches is designed to use an aspect of AD known as the Global Catalog (GC). The GC provides a “quick look-up” service by providing access to a subset of the data stored in the complete AD database and by “collapsing” all of the hierarchies and geographic distribution into a single relatively flat structure. The GC is queried using the same LDAP directory queries that work on the complete AD database. The AD product requires at least one of the Domain Controllers in an enterprise to also be configured to provide GC services and actual deployments of AD can have any or all of the Domain Controllers configured to provide GC services. The suite of Dell RCSs uses DNS to determine the network coordinates of each GC server so that the Dell RCSs can gracefully handle situations where some GC servers are not available on the network. DNS SRV records are used for this purpose so that the Dell RCSs always attempt to contact alternative GC servers at the “nearest” site first, depending on the administrative settings configured in the SRV records. Standard Schema versus Dell Extended Schema To provide the greatest flexibility in the multitude of customer environments, Dell provides a group of objects that can be configured by the user depending on the desired results. Dell has extended the schema to include an Association, Device, and Privilege object. The Association object is used to link together the users or groups with a specific set of privileges to one or more SIPs. The Device Object defines the individual RCSs within the Active Directory structure and 108xxx | LDAP Feature for the RCSxxx the privilege object is linked to device objects via association objects to assign usage permissions. This model provides an Administrator maximum flexibility over the different combinations of users, privileges, and SIPs on the Remote Console Switch without adding too much complexity. Before installing the Dell Schema Extensions, Administrators should read through the descriptions and instructions within this chapter to determine which schema is right for their particular installation. Altering a schema object will cause it to propagate through Active Directory so that once it is created, it cannot be deleted. It can only be deactivated. Because of this, the benefits of changing the schema should be carefully weighed before the effort is undertaken. The primary benefit gained by installing the Dell Schema Extensions is to eliminate confusion. When using the standard Active Directory schema, a Remote Console Switch most closely matches a computer device object and is configured as one. Since the RCS is not a computer, the schema functions will not all apply. Care will have to be taken to correctly configure an RCS that is designated in this manner. In addition, using the Dell Schema Extensions makes it easier to search on and identify switch devices. A switch that is configured using a computer device object will be searched on along with every computer device within the Active Directory structure. The RCS can authenticate equally well using either schema and no functionality is lost by using either method. Administrators are free to choose whichever method works within their particular installation. Instructions have been provided for installations with and without the Dell Schema extensions. Sections and instructions that pertain to only one schema set will be marked as such and may be ignored in installations where they are not used. Standard Installation Before a Dell RCS can use Active Directory for authentication: 1 Configure the Override Admin Account LDAP Feature for the RCSxxx | xxx109 2 Configure DNS Settings 3 Set the Network Time Protocol 4 Configure the Authentication Parameters 5 Configure Group Objects 6 Create and Download the CA Root certificate 7 Set the Login Timeout Configure the Override Admin Account Should a network failure occur, an account is provided that may be used regardless of the unit’s ability to authenticate against an LDAP server. Before configuring other settings, this account should be configured. To configure the Override Admin Account in the on-board web interface: 1 Click User Accounts, then click Override Admin. 2 Type the username and password you wish to assign to the user and then verify the password by typing it in the Verify Password field. 3 Click Save. NOTE: You must be logged in as admin for this option. Configuring DNS Settings Before the LDAP client can resolve names, at least one DNS server must be specified. The Network sub-category displays the name of the RCS and allows you to change the network settings including the IP address, Subnet Mask, Gateway, LAN speed and DHCP/BootP setting. The name displayed for the RCS will be the same as the name given in the System Name field in the SNMP category. 110xxx | LDAP Feature for the RCSxxx The Network sub-category allows the entry and maintenance of up to three DNS Servers. These DNS servers are used to resolve DNS names provided on the LDAP authentication panel. NOTE: At least one DNS server must be configured for the LDAP feature to work. Whenever a primary server is unavailable, the RCS software will automatically failover to backup DNS servers, as identified here. NOTE: You can also set DNS server addresses using the RCS’s serial administrative interface. For information about using the serial administrative interface, please consult your RCS documentation. To configure the DNS settings in the on-board web interface: 1 Click DNS to open the DNS Settings screen. 2 Specify the DNS mode, enter the Server addresses, and click Save. Figure 5.1: OBWI - DNS Settings LDAP Feature for the RCSxxx | xxx111 Configuring the Network Time Protocol (NTP) Settings The switch must have access to the current time to verify that certificates have not expired. You can configure the switch to request time updates from the NTP. To configure NTP settings in the on-board web interface: 1 Click NTP to open the NTP screen. 2 Click the Enable NTP box. 3 Enter the name of your network time source in the provided boxes. You may also set an hour interval to specify how often to request time updates. If the interval is set to 0, requests will only be made during RCS startup or when changes to the Global - NTP menu are made. 4 Click Save. Configuring the LDAP Authentication Parameters The Authentication panel allows RCS Administrators to configure the parameters required to access LDAP Directory Services. When access requests are received from users, the RCS can use LDAP protocols to send the username, password, and other information to the Directory Service in determining what authorization permissions the user has. NOTE: The terms for establishing LDAP configuration are, KVM User, KVM User Admin, and KVM Appliance Admin, They are equivalent to User, User Administrator and RCS Administrator, respectively. The access levels have not changed, but use the new terms as directed. Enabling LDAP Authentication The Operational Modes section on the LDAP Configuration Options screen allows you to choose the appropriate type of LDAP services to use for user 112xxx | LDAP Feature for the RCSxxx authentication. The available modes are: • Standard LDAP directory services (non-Microsoft) • Microsoft Active Directory services • Disable LDAP authentication If an alternate (non-LDAP) authentication method has already been selected for use, then LDAP authentication will automatically be disabled. It will be necessary to deselect this method to use LDAP Directory Services. To restore the ability to use LDAP authentication: 1 Under User Access, select the Avocent tab, see Figure 5.2. 2 Click Disassociate to deselect the use of the Avocent management authentication server. 3 Click Save. Figure 5.2: The Avocent Authentication Screen LDAP Feature for the RCSxxx | xxx113 NOTE: It is possible to externally sever the Avocent authentication association without performing these steps. Nonetheless, if an Avocent server association has been created for user authentication, it must be expressly removed via this procedure to permit LDAP authentication configuration to proceed. To enable LDAP Authentication: 1 Under User Access, select the LDAP tab, see Figure 5.3. Figure 5.3: The LDAP Configuration Options Screen 2 Select one of the available LDAP Authentication modes in the Operational Modes section. 3 Configuration options must be set to fully enable LDAP Authentication for use. Each of the options are detailed in this chapter. 4 Click Save. To disable LDAP authentication, select the Do Not Use LDAP option, and click Save. All other options on the screen will be disabled; no editing of these 114xxx | LDAP Feature for the RCSxxx other fields will be permitted. In addition, the additional configuration screens under both the Standard and Active Directory tabs will also be disabled. When LDAP Authentication is disabled, User Access will be adjudicated by either locally-defined user access lists or Avocent management software (see the section on User Access). When LDAP Authentication is enabled, locally-defined user access lists take precedence over requests to LDAP Directory Servers. User access requests with first check for RCS-defined users. If no match is found, then requests will be sent to LDAP Directory Servers, as configured. Entering Authentication Parameters - Operational Modes Access type LDAP Directory Servers may be setup to operate either in Open or Secure mode (using SSL - Secure Socket Layer encryption). The mode selected must match that of the host directory server. When selecting Secure/SSL mode, please also see the section entitled LDAP SSL Certificates for guidance on meeting the requirements for encrypted operations. User caching Whenever a successful user authentication is completed via LDAP, the RCS has the ability to retain the results obtained from the LDAP Directory Server for a selected period of time. If, during that time window, another access request is generated that normally would result in a repeat request of the Directory Server, such requests are handled locally on board the RCS. This results in a near instantaneous response that will allow the user to continue working with minimal delays. The three settings for this configuration option are disable, enable, and timeout period. LDAP Feature for the RCSxxx | xxx115 Disable - do not permit user caching, and always ask the LDAP Directory Server for guidance on the authentication status for every user, every time it is required. By default, User Caching is disabled. Enable - hold results of recent user authorization requests as determined by the LDAP Directory Server. When identical authorization requests are received within a pre-determined time period, use those prior results to service the new request. Timeout Period - establishes the duration of the time window. Values are recorded as minutes. Enter only the number in the box, or use the arrow controls. • Default timeout value: 15 minutes • Minimum timeout: 1 minute • Maximum timeout: 1,000 minutes NOTE: As with all configuration updates, you must click the Save to secure your changes. LDAP configuration changes are generally available to the RCS immediately, with no reboot required. Entering Extension Options - Active Directory LDAP When Active Directory mode is selected, administrators must determine if the Standard or Extended Schema will be employed. Additionally, administrators should declare whether the Microsoft Global Catalog option will be in use. Entering Authentication Parameters - Standard LDAP When using standard LDAP (not Microsoft Active Directory LDAP), direct entry of at least one relevant directory server address is required. Enter the addresses in the Primary Server and Secondary Server fields. The primary server entry is required. Server addresses may be entered in one of the following forms: • DNS address (example: myldapserver.com) • IPv4 address (example: 10.20.255.255) 116xxx | LDAP Feature for the RCSxxx • IPv6 address (example: fe80::200:f8af:fe20:76ce ) Entering Authentication Parameters - Custom IP Port Assignments This section permits changes to the industry-standard IP Port numbers conventionally used for LDAP. In most instances, there should be no need to change these values. However, if the administrator of the LDAP Directory Server you are using requires different port assignments, then those may be entered here. Depending on the exact configuration, LDAP can make use up to four different IP Ports, and as many as two as a time. Slots for each of these four are shown in the LDAP Configuration Options screen. Settings elsewhere on the same screen will be used to identify the ports that can be altered. The following chart defines conditions in which the available port slots are enabled and allowed to be edited. List of Port Slots that are enabled and may be customized Open Mode Secure/SSL Mode Not using Global Catalog Standard LDAP Message Port Standard LDAP Message Port Secure/SSL Mode Using Global Catalog Standard LDAP Message Port and Active Directory Global Catalog Port Standard LDAP Message Port Secure/SSLMode and Active Directory Global Catalog Port Secure/SSL Mode Table 5.1: Editing IP Port Assignments If at any time, the original industry-standard IP Port designations need to be restored, click on the 'Restore Default Port Settings' button. All four Port values will be returned to their original values, which are: Standard LDAP Message Port - 389 LDAP Feature for the RCSxxx | xxx117 Standard LDAP Message Port via SSL - 636 Active Directory via Global Catalog server - 3268 Active Directory via Global Catalog server/SSL - 3269 IP Port numbers are permitted to range from 1 to 65535. Failure to match up port numbers with those in use by the LDAP Directory Server will result in a failure to establish communications with that server. Completing LDAP Configuration For both Standard and Active Directory LDAP modes, additional parameters are required to insure proper connectivity to the LDAP Directory Servers. These parameters are discussed in the following sections. However, you should be aware that there are 'interlocks' established in the OBWI pages to assist the administrator by insuring that parameter updates are made on the appropriate page. For example, if you were to select the Active Directory LDAP tab, you might see the following display on your screen see Figure 5.4 Figure 5.4: Notification Message - LDAP Mode Not Enabled When this happens, it is an indication that the Active Directory mode has not been enabled or it was enabled, but not saved. You should return to the LDAP Options screen, select Active Directory LDAP, make note of the secondary parameters for this mode on that page, then click Save before returning to this screen. 118xxx | LDAP Feature for the RCSxxx There is an equivalent display for Standard LDAP mode that appears whenever that mode is not enabled. Secondary LDAP Settings - Standard Configuration As with LDAP Active Directory Configurations, Standard LDAP authentication, search, and query parameters are configured through the remote OBWI. Settings in this section are accessed from the User Access / LDAP / Standard tabs via the OBWI window shown here in Figure 5.5 Figure 5.5: Secondary LDAP Settings - Standard Configuration NOTE: While this section describes the setup parameters for connections being made to Standard LDAP Directory Servers, please also note that this section may also be used to establish connections to more generic versions of Active Directory services as well. Setting up the RCS for performing Standard LDAP queries NOTE: Before you can use any of the querying modes with Active Directory, you must update Active Directory so that the selected querying mode can assign the applicable authorization level for the user. LDAP Feature for the RCSxxx | xxx119 To set up group queries: 1 Log in to your LDAP Directory Server software with administrator privileges. 2 Create an organizational unit (OU) to be used as group container. 3 Create a computer object in with a name identical to the switching system name for querying appliances or identical to the attached target devices for querying target devices. The name must match exactly and is case-sensitive. 4 The appliance names and target device names used for group queries are stored in the appliance. The appliance name specified in the Appliance Overview screen of the remote OBWI and target device names must be comprised of any combination of upper-case and lower-case letters, digits, and hyphens, and must match the object names on the LDAP Server. 5 Create one or more groups under the group container organizational unit. 6 Add the usernames and the target device and appliance objects to the groups you created in step four (4). 7 Specify the value of an attribute used to implement the Access Control Attribute. Search Configuration Settings There are four settings that are required for successful LDAP connections. They are Search DN, Search Password, Search Base, and UID Mask. Search DN Search DN defines the administrator-level user that the target device uses to log into the directory service. Once the target device is authenticated, the directory service grants it access to the directory to perform the user authentication queries specified on the LDAP query page. Each search value must be separated by a comma. A typical entry might look like this: cn=Administrator,cn=Users,dc=MyDomainName,dc=com 120xxx | LDAP Feature for the RCSxxx Search password Search password is used if a password is required for search options. It authenticates the administrator or user specified in the Search DN field. Any printable ASCII characters are allowed. Search base Search Base defines a starting point from which all LDAP searches begin. The default values are dc=yourDomainName and dc=com. Each search component must be separated by a comma. For example, to define a search base for test.com, your values are dc=test, dc=com. UID mask UID mask specifies the search criteria for User ID searches of LDAP target devices. The format is =<%1>. The default value is sAMAccountName=%1, which corresponds to the default for Microsoft Active Directory services. Query Mode Selection Settings Configure the Query Mode parameters for the appliance and target device. The appliance is used to authenticate administrators and users attempting to access the console switch. The target device is used to authenticate users attempting to access attached target devices. There are three query modes available. They are basic, user attribute, and group attribute. Basic A username and password query for the user is sent to the directory service. Once authenticated as a valid user, the user is given access to the appliance and any attached target devices. User attribute A username, password, and Access Control Attribute query for the user is sent to the directory service. The Access Control Attribute is read from the user object LDAP Feature for the RCSxxx | xxx121 in Active Directory. If no values are found, the user is given no access to the appliance or target devices Group attribute A username, password, and group query sent to the directory service for an appliance and attached target devices when using Appliance query mode or for a selected target device when using Target Device query mode. If a group is found containing the user and appliance name, the user is given access to either the appliance or target devices when using Appliance query mode. If a group is found containing the user and target device IDs, the user is given access to the selected target device when using Target Device query mode. NOTE: Depending on the query mode selected, several of the configuration items on this screen may be enabled or disabled according to their applicability. Group Configuration Parameters There are several group configuration parameters available. Group container The group container specifies the OU created in Active Directory by the administrator as the location for group objects. Group objects can contain users, computers, contacts, and other groups, each assigned with a certain access level. Group container mask The group container mask defines the object type of the Group Container, normally an OU. The default value is ou=%1. Target device mask The target device mask defines a search filter for the target device. The default value is cn=%1. Access control attribute The access control attribute specifies the name of the attribute used when the query modes are set to User Attribute or Group Attribute. The default attribute 122xxx | LDAP Feature for the RCSxxx name is "info". Access control delimiters The LDAP Standards specify that the semi-colon character (;) is used to separate multiple properties within a single named attribute. Under normal circumstances, this need not be changed. For example, suppose we have a dryerase-board marker object in the LDAP Directory, and the attribute “Color” is used to identify colors that this marker might have. Color: red;blue;green;black;purple "Color" is the name of the attribute; the rest represents the attribute’s value – in this case a compound value. With compound values, the semi-colon is the delimiter used to mark the end of one component and the beginning of the next. In rare cases, an LDAP Administrator may need the semi-colon to be part of the value itself. In such instances, the Delimiter character has to be changed to something else. If so, use this field to specify all of the characters (at least one character is required; more than one is acceptable) that will identify how the Access Control Attribute should be divided up. For example, the delimiter field is set to #$; (three characters) Color: red#blue$green;black#purple These delimiters would find the same five value components as in the first example above. LDAP Administrators should make sure that any Access Control Delimiter characters defined do not appear as values for any attributes elsewhere for any purpose other than that of delimiter. As shown above, the Access Control Attribute (ACA) consists of a combination of a name and a value. By default, we search LDAP Directory entries that match up the user and the target device, looking for attributes named ‘info’. When found, the value of such attributes should tell us the user’s authorization level on that device. If the LDAP Services Administrator wishes to use an attribute other than info, it may be customized via the field indicated above. Because users may be members of several groups, and each group may have differing authorization levels to different devices, a running tally is kept of the LDAP Feature for the RCSxxx | xxx123 results. By LDAP standards, the final authorization level reported is the highest (most permissive) level found among all positive results found for the specific user and device under scrutiny. Secondary LDAP Settings - Active Directory Configuration Settings in this section are accessed from the User Access / LDAP / Active Directory tabs via the OBWI window shown here in Figure 5.6. Figure 5.6: Secondary LDAP Settings - Active Directory Configuration If you plan to install the Dell Extended Schema, enter only the RCS and Root Domains that will be used. If you elect not to use the Dell Extended Schema, the RCSs and access controlled SIPs in your installation will be configured as Computer Objects within Active Directory. To do this, you will first need to configure an Organizational Unit to hold group objects that relate users to access controlled RCSs and their attached SIPs. This can be a previously created OU, or one created specifically for this purpose but it must be unique among all OU objects in the Group Container domain. 124xxx | LDAP Feature for the RCSxxx Next, choose an attribute within the LDAP directory to be used to contain discretionary access control information. This should be a previously unused attribute that is capable of storing a string value. (The default is the “info” attribute of the Group Object.) Finally, you will need to enter the location for the Group Container, the Group Container Domain and the Access Control Attribute in the blanks provided in the Global - Authentication window. For more detailed descriptions of the Authentication panel fields, see Table 5.2. To access the Authentication panel in the OBWI: Click User Accounts, then click LDAP. Figure 5.7: OBWI - Authentication Panel Local/LDAP and Parameters Table 5.2: Authentication Panel Field Descriptions LDAP Feature for the RCSxxx | xxx125 Field Authentication Settings Description Users can choose to use LDAP authentication by clicking the box shown. The user may still log in with the Override admin account if the LDAP servers are inaccessible. Schema Radio Button to indicate which Active Directory (AD) object classes are used to store information related to authorization. For the default Standard schema, Microsoft Active Directory objects are used. When using the Extended schema, the extra Dell object classes are added. RCS Domain The RCS Domain field contains the name of the Active Directory Domain chosen to hold all objects that represent RCSs and SIPs. Root Domain The uppermost domain within the Active Directory Forest. This field, available when the standard schema is selected, contains part of the Distinguished Name of an Organizational Unit (OU) object in Active Directory. The OU is used to hold group objects that relate users to access controlled Remote Console Switches and their attached SIPs. Group Container (Standard schema set only) For example, suppose the Distinguished Name of the chosen OU is: ou=KVM-AccessControls,dc=MyCom,dc=com. In this case, the Group Container field should be set to “KVMAccessControls.” The name entered into the Group Container field must be unique among all OU objects in the Group Container domain. You may choose to use a previously created OU for the Group Container, or create one specifically for this purpose. The default Group Container is KVM. 126xxx | LDAP Feature for the RCSxxx Field Description Group Container Domain (Standard schema set only) This field, available when the Standard schema is selected, is the DNS name of the Active Directory domain where the group container resides. The value of this field specifies which attribute in the LDAP directory is to be used to contain discretionary access control information and is only enabled when Standard Schema is selected. Access Control Attribute (Standard schema set only) The Access Control Attribute is chosen from among the attributes in the LDAP directory object representing the group whose membership includes both the user and the RCS or attached computer that you are trying to access. When using the Standard schema, it is necessary for Group objects in the Group Container to have an attribute that is chosen to contain the permission level associated with the Group. The Access Control Attribute field, available when the Standard schema is selected, contains the name of the chosen attribute. The chosen attribute must be capable of storing a character string value; for example, the default attribute is “info” which is an attribute accessible via the Active Directory Users and Computers (ADUC) snap-in. Using ADUC, the value of the info attribute is set by accessing the “Notes” property of the Group object. LDAP SSL Certificates All LDAP protocol exchanges (between an RCS and Active Directory servers) are secured by SSL. When the LDAP protocol is being protected by SSL, it is LDAP Feature for the RCSxxx | xxx127 referred to as LDAPS (Lightweight Directory Access Protocol over SSL). Each LDAPS connection begins with a protocol handshake that triggers a security certificate transmission from the responding Active Directory server to the RCS. Once received, the RCS is responsible for verifying the certificate. In order to verify the certificate, the RCS must be configured with a copy of the root Certification Authority's (CA) certificate. Before this can be done, the certificate must first be generated. Enabling SSL on a Domain Controller If you plan to use Microsoft Enterprise Root CA to automatically assign all your domain controllers SSL certificate, you must perform the following steps to enable SSL on each domain controller if you have not previously done so. 1 2 3 Install a Microsoft Enterprise Root CA on a Domain Controller. a. Select Start - Control Panel - Add or Remove Programs. b. Select Add/Remove Windows Components. c. In the Windows Components Wizard, select the Certificate Services checkbox. d. Select Enterprise root CA as CA Type and click Next. e. Enter Common name for this CA, click Next, and click Finish. Enable SSL on each of your domain controllers by installing the SSL certificate for each controller. a. Click Start - Administrative Tools - Domain Security Policy. b. Expand the Public Key Policies folder, right-click Automatic Certificate Request Settings and click Automatic Certificate Request. c. In the Automatic Certificate Request Setup Wizard, click Next and select Domain Controller. Click Next and click Finish. A certificate/private key file can be created using openssl using Linux. Openssl can be downloaded from openssl.org. Any instructions below with text in <> is 128xxx | LDAP Feature for the RCSxxx where a user would need to set a value based on the criteria at the end of that line. NOTE: Any instructions below with text in is where a user would need to set a value based on the criteria at the end of that line. To create a certificate to import: 1 From the Linux command prompt, type openssl and press . The user should be at the OpenSSL prompt. OpenSSL> genrsa -out privatekey.pem <512> Generating RSA private key, 512 bit long modulus ..........++++++++++++ .....++++++++++++ e is 65537 (0x10001) OpenSSL> req -new -key privatekey.pem -x509 -out certificate.pembatch-days <365> 2 Enter the information that will be incorporated into your certificate request in the Distinguished Name or DN. There may be a default value for some fields. If you wish, you may type '.' to leave a field blank. ----Country Name (2 letter code) [GB]: State or Province Name (full name) [Berkshire]: Locality Name (eg, city) [Newbury]: Organization Name (eg, company) [My Company Ltd]: Organizational Unit Name (eg, section) []: Common Name (eg, your name or your server's hostname) []: Email Address []: OpenSSL> quit LDAP Feature for the RCSxxx | xxx129 3 From the Linux command prompt, type cat certificate.pem privatekey.pem > webserver.pem, then convert the file from UNIX linefeed to DOS carriage return/linefeed by typing unix2dos webserver.pem. To export the CA certificate: 1 Within the Windows operating system, to open the Certificate Authority management tool, click Start - All Programs - Administrative Tools Certificate Authority. 2 You may view properties of the certificate authority by right clicking on the authority in the tree view and selecting Properties. The CA Properties dialog box will open. 3 Click the General tab and the View Certificate button to open the Certificate dialog box. 4 Click the Details tab then the Copy To File button. The Certificate Export Wizard will open. 5 Click Next to begin using the wizard. 6 On the Export File Format screen select the Base-64 encoded X.509 (.CER) radio button and press the Next button. 7 On the File To Export screen enter or browse to a filename and path for the exported certificate. Press the Next button. 8 Press the Finish button. The resulting certificate file is properly formatted and readable by OpenSSL. In general, it will be necessary to upload the CA certificate only once; however, it will have to be uploaded again if the certificate is revoked, if it expires, or if “Restore Factory Defaults” is selected from the serial console menu. NOTE: The instructions above are written for a Microsoft Root CA certificate. For other CAs, please check with the CA vendor. NOTE: The Network Time Protocol (NTP) must be enabled for LDAPS to function. 130xxx | LDAP Feature for the RCSxxx Figure 5.8: OBWI - LDAP Certificate After clicking Update, the following window displays. Figure 5.9: OBWI - Update LDAP Certificate You can browse to a certificate and open it. Once the certificate is open and its contents are displayed, the user can then send the certificate to the RCS. LDAP Feature for the RCSxxx | xxx131 Login Timeout In cases where there is a large enough directory tree to cause LDAP authentication to perform slowly, the Sessions window includes a Login Timeout function with a default timeout of 30 seconds. The login timeout is the time from which the user presses the OK button on the Login dialog box until there is no response from the RCS. The RCS will also use this value to determine the timeout on a LDAP request for authentication. To specify the login timeout in the on-board web interface: 1 Click Sessions to open the General Session Settings screen. 2 Specify the number of seconds in the Login Timeout menu. 3 Click Save. Figure 5.10: OBWI - Login Timeout NOTE: The Login Timeout is distinct from the User Login Caching feature. The latter works after a login is completed by caching authorization results for a period of time, eliminating repeated LDAP communications requests. 132xxx | LDAP Feature for the RCSxxx CA Certificate Information Display The RCS can only display complete CA Certificate Information in this window when the public key length is less than or equal to 2048 bits. When the key is greater than 2048 bits, the subject, issuer, and validity period data in this window will be incomplete.1 The following display is an example of the CA certificate information: 1 From the Client, download CA certificate into the RCS. 2 From the serial console Main Menu, type option 8 to display the LDAP CA Certificate. The RCS will display the following types of information: Begin CA certificate information display subject= /DC=msft/DC=ldaptest/CN=MyCertificate issuer= /DC=msft/DC=ldaptest/CN=MyCertificate notBefore=Dec 7 20:09:56 2005 GMT notAfter=Dec 7 20:18:34 2010 GMT serial=7BA146C0221A08B447B989292074329F MD5 Fingerprint= CB:6D:70:30:31:E5:1B:C0:90:BB:DB:32:B2:C9:D1:5A End CA certificate information display Perform the steps in the following instructions for enabling the installation of RCS software on Microsoft Windows Server 2003 platforms: 1 Select the Start menu. 2 Right-click on My Computer and select Properties. 3 Select the Advanced tab. 4 Click the Performance Settings button. 5 Select the Data Execution Prevention tab. LDAP Feature for the RCSxxx | xxx133 6 Select the radio button for Turn on DEP for essential Windows programs and services only 7 Click OK. 8 Click OK again on the System Properties dialog box. Configuring Group Objects Access control is applied to a specific Active Directory user account by including that user in the membership of a Group in the Group Container. The Group membership must also contain the objects representing the RCS(s) and the SIP(s) the user is allowed to access. The level of access granted is determined by the value of a specific attribute in the Group object (Standard Schema) or Association Object (Extended Schema). There are three permission levels available. In increasing order of access they are KVM User, KVM User Admin, and the most powerful level, KVM Appliance Admin. NOTE: If the KVM User access level is not being used, SIP objects will not need configuration as both administrator permissions have access to all SIPs by default. 134xxx | LDAP Feature for the RCSxxx Operation KVM Appliance Admin KVM User Admin KVM User Preemption Allowed to preempt another KVM Appliance Admin or a KVM User Admin. Permission must be configured for each target device by including the TD in the appropriate Group object in the Directory. Allowed to preempt another User Admin. Permission must be configured for each target device by including the target device in the appropriate Group object in the Directory. No Configure network parameters and global settings Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. No No Restart Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. No No LDAP Feature for the RCSxxx | xxx135 Operation KVM Appliance Admin KVM User Admin KVM User FLASH Upgrade Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. No No Administer user accounts Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. No Configure port settings Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. No No 136xxx | LDAP Feature for the RCSxxx Operation Target Device Access KVM Appliance Admin Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. KVM User Admin KVM User Yes – Permission must be configured for each RCS by including the RCS in the appropriate Group object in the Directory. Yes, if configured by Administrator. Permission must be configured for each target device by including the TD in the appropriate Group object in the Directory. Table 5.3: Allowed Operations by Access Level An AD user account must be configured to receive RCS Administrator (KVM Appliance Admin)permission before that account will be allowed to modify any of the fields in the Authentication Panel. In particular, only an RCS Administrator is allowed to modify the Authentication Settings. Active Directory Object Overview for Standard Schema For each of the physical RCSs on the network that you want to integrate with Active Directory for Authentication and Authorization, you must create at least one Computer Object to represent it. You will also need to create a computer object for each SIP attached to the RCS that will be controlled using the KVM User privilege level. Computer objects representing SIPs are not required for the Administrator level groups. Users in the KVM User Group will only have access to SIPs that are also in the KVM User Group. Users with Administrator privileges will have access to all SIPs by default. To set up the Group Objects for an RCS: LDAP Feature for the RCSxxx | xxx137 1 If you have not already, create the Organizational Unit that will contain the Group Objects related to your switch installation. 2 Within this Organizational Unit, create three group objects to represent user privilege levels. One for KVM Appliance Administrators, KVM User Administrators and KVM Users, respectively. 3 Using the MSADUC tool, open the KVM Appliance Administrator Group Object and select the Notes property. Type the access level ("KVM Appliance Admin") for that group in the Notes field and save. Repeat this step for the other two Group Objects using their respective names. NOTE: The single syntax for all access control attribute values is: "[ ] < privilege level> [ ]" Where: := "KVM User" or "KVM User Admin" or "KVM Appliance Admin" ::= one or more of any of the following: or or or or is any string of alphanumeric characters and may be the null (i.e., empty) string. Square brackets indicate optional items; for example, the following template indicates an optional string and delimiter followed by a required privilege level: "[ ] < privilege level1>". 4 Create a computer object to represent the RCS. 5 Create a computer object for each SIP attached to a server to be access restricted at the KVM User privilege level. 6 Add the computer object that represents the switch to the appropriate group objects. 7 Add user objects to the appropriate group object for their access level. 8 Add the computer objects for the access controlled SIPs to the KVM User Group. 138xxx | LDAP Feature for the RCSxxx Dell Extended Schema Active Directory Object Overview For each of the physical RCSs on the network that you want to integrate with Active Directory for Authentication and Authorization, you must create at least one RCS Device Object to represent the physical switch and one Association Object. The Association object is used to link together the users or groups with a specific set of privileges to one or more SIPs. This model provides an Administrator maximum flexibility over the different combinations of users, RCS privileges, and SIPs on the Remote Console Switch without adding too much complexity The RCS Device Object is the link to the RCS for querying Active Directory for authentication and authorization. When a RCS is added to the network, the Administrator must configure the RCS and its device object with its Active Directory name so that users can perform authentication and authorization with Active Directory. The Administrator will also need to add the Remote Console Switch to at least one Association Object in order for users to authenticate. You can create as many Association Objects as you want, and each Association Object can be linked to as many users, groups of users, or RCS Device Objects as desired. The users and RCS Device Objects can be members of any domain in the enterprise. However, each Association Object may be linked (or, may link users, groups of users, or RCS Device Objects) to only one Privilege Object. A Privilege Object allows an Administrator to control which users have what kind of privileges on specific SIPs. The following figure illustrates that the Association Object provides the connection that is needed for all of the Authentication and Authorization. Figure 5.11: Typical Setup for Active Directory Objects LDAP Feature for the RCSxxx | xxx139 You can create as many or as few association objects as you want or need. However, you must create at least one Association Object, and you must have one RCS Device Object for each RCS on the network that you want to integrate with Active Directory for Authentication and Authorization. The Association Object allows for as many or as few users and/or groups as well as RCS Device Objects. However, the Association Object only has one Privilege Object per Association Object. The Association Object connects the users who have privileges on the RCSs. In addition, you can set up Active Directory objects in a single domain or in multiple domains. For example, you have two RCSs (RCS1 and RCS2) and three existing Active Directory users (User1, User2, and User3). You want to give User1 and User2 an Administrator privilege to both RCSs and give User3 a login privilege to the RCS2. The following figure illustrates how to set up the Active Directory objects in this scenario. Figure 5.12: Setting Up Active Directory Objects in a Single Domain 140xxx | LDAP Feature for the RCSxxx To set up the objects for the single domain scenario, perform the following tasks: 1 Create two Association Objects. 2 Create two RCS Device Objects, RCS1 and RCS2, to represent the two RCSs. 3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (Administrator) and Priv2 has login privileges. 4 Group User1 and User2 into Group1. 5 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege Objects in AO1, and RCS1 and RCS2 as RCS Devices in AO1. 6 Add User3 as Members in Association Object 2 (AO2), Priv2 as Privilege Objects in AO2, and RCS2 as RCS Devices in AO2. See “Adding RCS Users and Privileges to Active Directory with Dell Schema Extensions” for detailed instructions. LDAP Feature for the RCSxxx | xxx141 The following figure illustrates how you can set up the Active Directory Objects in multiple domains. In this scenario, you have two RCSs (RCS1 and RCS2) and three existing Active Directory users (User1, User2, and User3). User1 is in Domain1, and User2 and User3 are in Domain2. You want to give User1 and User2 an administrator privilege to both RCSs and give User3 a login privilege to the RCS2. Figure 5.13: Setting Up Active Directory Objects in Multiple Domains To set up the objects for the multiple domain scenario, perform the following tasks: 1 Ensure that the domain forest function is in Native or Windows 2003 mode. 2 Create two Association Objects, AO1 (of Universal scope) and AO2, in any domain. The figure shows the objects in Domain2. 3 Create two RCS Device Objects, RCS1 and RCS2, to represent the two RCSs. 142xxx | LDAP Feature for the RCSxxx 4 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (Administrator) and Priv2 has login privileges. 5 Group User1 and User2 into Group1. The group scope of Group1 must be Universal. 6 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege Objects in AO1, and RCS1, RCS2 as RCS Devices in AO1. 7 Add User3 as a Member in Association Object 2 (AO2), Priv2 as Privilege Objects in AO2, and RCS2 as RCS Devices in AO2. Configuring Active Directory with Dell Schema Extensions to Access Your RCS Before you can use Active Directory to access your RCS, you must configure the Active Directory software and the Remote Console Switch by performing the following steps in their numbered order: 1 Extend the Active Directory schema. 2 Extend the Active Directory Users and Computers Snap-in. 3 Add RCS users and their privileges to Active Directory. Extending the Active Directory Schema (Optional) Extending your Active Directory schema will add a Dell organizational unit, schema classes and attributes, and example privileges and association objects to the Active Directory schema. NOTE: Before you extend the schema, you must have Schema Admin privileges on the Schema Master Flexible Single Master Operation (FSMO) Role Owner of the domain forest. You can extend your schema using two different methods. You can use the Dell Schema Extender utility or you can use the LDIF script file. NOTE: The Dell organizational unit will not be added if you use the LDIF script file. LDAP Feature for the RCSxxx | xxx143 The LDIF files and Dell Schema Extender can be obtained at dell.com/support. To use the LDIF files, see the instructions in the readme that is in the LDIF files directory. To use the Dell Schema Extender to extend the Active Directory Schema, perform the steps in “Using the Dell Schema Extender.” You can copy and run the Schema Extender or LDIF files from any location. Using the Dell Schema Extender NOTE: The Dell Schema Extender uses the SchemaExtenderOem.ini file. To ensure that the Dell Schema Extender utility functions properly, do not modify the name of this file. 1 Click Next on the Welcome screen. 2 Read the warning and click Next again. 3 Either select Use Current Log In Credentials or enter a user name and password with schema administrator rights. 4 Click Next to run the Dell Schema Extender. 5 Click Finish. Installing the Dell Extension to the Active Directory Users and Computers Snap-In (Optional) When you extend the schema in Active Directory, you must also extend the Active Directory Users and Computers snap-in so that the administrator can manage RCS devices, Users and User Groups, RCS Associations, and SIP Privileges. The Dell Extension to the Active Directory User’s and Computers Snap-In is an option that can be installed when you install your systems management software using the Dell Systems Management Consoles CD. See the Dell OpenManage Software Quick Installation Guide for further instructions on installing systems management software. NOTE: You must install the Administrator Pack on each system that is managing the Active Directory RCS Objects. The installation is described in the following section, “Opening the Active Directory Users and Computers Snap-In.” If you do not install the Administrator Pack, then you cannot view the Dell SIP Object in the container. 144xxx | LDAP Feature for the RCSxxx NOTE: For more information about the Active Directory Users and Computers snap-in, see your Microsoft documentation. Opening the Active Directory Users and Computers Snap-In To open the Active Directory Users and Computers snap-in, perform the following steps: If you are on the domain controller, click Start -Admin Tools - Active Directory Users and Computers - or If you are not on the domain controller, you must have the appropriate Microsoft Administrator Pack installed on your local system. To install this Administrator Pack, click Start - Run, type and press . This opens the Microsoft Management Console (MMC). 1 Click File (or Console on systems running Windows 2000) in the Console 1 window. 2 Click Add/Remove Snap-in. 3 Select the Active Directory Users and Computers snap-in and click Add 4 Click Close and click OK. Adding Users and Privileges to Active Directory with Dell Schema Extensions The Dell-extended Active Directory Users and Computers snap-in allows you to add RCS users and privileges by creating SIP, Association, and Privilege objects. To add each type of object, perform the steps in each subsections. Creating a SIP Object 1 In the MMC Console Root window, right-click a container. 2 Select New - Dell SIP Object. This opens the New Object window. LDAP Feature for the RCSxxx | xxx145 3 Type a name for the new object. This name must match the RCS name that you will type in step 4 of "Configuring the Remote Console Switch" on page 38. 4 Select SIP Device Object. 5 Click OK. Creating a Privilege Object Privilege Objects must be created in the same domain as the Association Object to which it is associated. 1 In the Console Root (MMC) window, right-click a container. 2 Select New - Dell SIP Object to open the New Object window. 3 Type a name for the new object. 4 Select Privilege Object. 5 Click OK. 6 Right-click the privilege object that you created, and select Properties. 7 Click the RCS Privileges tab and select the RCS privileges that you want the user to have. 146xxx | LDAP Feature for the RCSxxx Using Dell Association Objects Syntax Using the Dell Association Objects syntax, object types default to User and Group in the Dell LDAP Schema. In the Dell Extended Schema, Dell has added unique Object IDs for four new object classes: • KVM RCS Objects • KVM SIP Objects • Privilege Objects • Association Objects Each of these new object classes is defined in terms of various combinations (hierarchies) of default Active Directory classes, together with Dell unique attribute types. Each of the Dell unique attribute types is defined in terms of a default Active Directory attribute syntax. The default Microsoft Active Directory object classes used include User and Group. The User class generally denotes Active Directory objects that contain information about single entities. The Group class represents containers used for nesting and contain information about collections of objects. Each KVM RCS Object represents an individual Remote Console Switch within Active Directory. Since these are single entities, in the LDAP default language they are User objects rather than Group objects. Each Privilege Object defines a distinct composite set of privileges. Each set is treated as a discrete entity, therefore it is a User object rather than a Group object. An Association Object contains a collection of information about the privileges granted to specific user accounts with respect to a specific RCS(s) and/or specific SIP(s). User accounts in an RCS Object may be specified in terms of any combination of the following: • Individual account • Active Directory security group of user accounts LDAP Feature for the RCSxxx | xxx147 • Multiple Active Directory security groups of user accounts Similarly, for the RCSs and/or SIPs in an Association Object and because the Association Object has the ability to use security groups in the same way, it is defined as a group object itself. Creating an Association Object The Association Object is derived from a Group and must contain a Group Type. The Association Scope specifies the Security Group Type for the Association Object. When you create an Association Object, you must choose the Association Scope that applies to the type of objects you intend to add. Selecting Universal, for example, means that association objects are only available when the Active Directory Domain is functioning in Native Mode or above. To create an association object: 1 In the Console Root (MMC) window, right-click a container. 2 Select New - Dell SIP Object to open the New Object window. 3 Type a name for the new object. 4 Select Association Object. 5 Select the scope for the Association Object. 6 Click OK. Adding Objects to an Association Object By using the Association Object Properties window, you can associate users or user groups, privilege objects, and SIP devices or SIP device groups. NOTE: When using Windows 2000 mode or higher, you must use Universal Groups to span domains with your users or SIP objects. You can add groups of Users and SIP devices. Creating Dell-related groups is done the same way you create other groups. To add users or User Groups: 148xxx | LDAP Feature for the RCSxxx 1 Right-click the Association Object and select Properties. 2 Select the Users tab and click Add. 3 Type the user or User Group name and click OK. Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges when authenticating to a SIP device. NOTE: You can add only one privilege object to an association object. To add a privilege: 1 Select the Privileges Object tab and click Add. 2 Type the Privilege Object name and click OK. Click the Products tab to add one or more SIP devices to the association. The associated devices specify the SIP devices connected to the network that are available for the defined users or user groups. NOTE: You can add multiple SIP devices to an association object. To add SIP devices or SIP device groups: 1 Select the Products tab and click Add. 2 Type the SIP device or SIP device group name and click OK. 3 In the Properties window, click Apply and then OK. Console Redirection Access Security In any RCS installation, any user privilege allows the user to launch the on-board web interface. The on-board web interface functionality for that user is limited by the User Privilege level established in the RCS. LDAP with Dell Extended Schema adds an extra level of security to RCS management by allowing administrators to limit a user's access to the on-board web interface. Authorization to use the on-board web interface is defined by whether User Privilege level is or is not configured in the KVM RCS Privileges tab of the Dell Privilege Object (DPO). The Console Redirection Access checkbox in the KVM LDAP Feature for the RCSxxx | xxx149 SIP Privileges tab of the DPO provides the means for a user who cannot view the on-board web interface to launch Video Viewer sessions to a subset of SIPs through the RCS Client. This authorization is controlled by a combination of the configuration parameters set in the DPO and the SIP Objects contained in the Dell Association Object (DAO). If you do not wish a user to have authorization to access the on-board web interface, but you do wish them to be able to launch viewer sessions from the RCS Client, perform the following steps: 1 Create a Dell SIP object for each SIP that the User(s) is (are) allowed to access. 2 Create an Active Directory User account for each of the users to be controlled. 3 Create a DPO. Do not check any of the three boxes on the KVM RCS Privileges tab. Check the Console Redirection Access box on the KVM SIP Privileges tab. NOTE: If you check any of the KVM RCS Privileges checkboxes and you check the Console Redirection Access box, the normal User Privileges associated with the privilege level checked in the KVM RCS Privileges box will take precedence over the Console Redirection Access checkbox, and the user will still be able to view the AMP. 4 Create a DAO. 5 Open the properties dialog for the DAO created in step 4. a. Add all the user accounts created in step 2. b. Add the DPO created in step 3. c. Add the SIP objects created in step 1. Using Active Directory to Log In to the RCS You can use Active Directory to log in to the RCS through the RCS software or OBWI. The login syntax is consistent for all three methods: 150xxx | LDAP Feature for the RCSxxx or \ or / (where username is an ASCII string of 1–256 bytes). No white space and no special characters (such as \, /, or @) are allowed in either the username or the domain name. NOTE: You cannot specify NetBIOS domain names, such as Americas, since those names cannot be resolved. NOTE: If a domain name is not included, the local database in the Remote Console Switch will be used to authenticate the user. Target Device Naming Requirements for LDAP Implementation If you experience the following error: Login Failure. Reason: Access cannot be granted due to Authentication Server errors Please verify that the SIP object was created in the Active Directory and its name exactly matches the name assigned to that SIP via the OBWI at the console switch. The Dell Standard Schema and the Dell Extended Schema use specific object classes in the Microsoft Windows Active Directory to represent SIPs. The Microsoft standard naming conventions for these object classes prohibit the use of special characters or spaces. If you intend to use LDAP in a deployed environment where target device names in SIPs currently include spaces or special characters, you will need to rename them without spaces or special characters. Renaming a target device in a SIP should be done through the OBWI at the console switch and then resynchronized through the RCS software. It is important to note that while the OBWI will allow you to enter spaces into the names assigned to the SIPs, Active Directory does not. You must name SIP objects according to the Microsoft Active Directory rules. LDAP Feature for the RCSxxx | xxx151 Frequently Asked Questions The following table lists frequently asked questions and answers. Can I log into the Remote Console Switch using Active Directory across multiple forests? The RCS Active Directory query algorithm only supports a single tree in a single forest. Does the login to the Remote Console Switch using Active Directory work in mixed mode (that is, the domain controllers in the forest run different operating systems, such as Microsoft Windows NT® 4.0, Windows 2000, or Windows Server 2003)? Yes. In mixed mode, all objects used by the RCS querying process (among user, SIP Device Object, and Association Object) have to be in the same domain. The Dell-extended Active Directory Users and Computers snap-in checks the mode and limits users in order to create objects across domains if in mixed mode. Does using the RCS with Active Directory support multiple domain environments? Yes. The domain forest function level must be in Native mode or Windows 2003 mode. In addition, the groups among Association Object, Remote Console Switch user objects, and SIP Device Objects (including Association Object) must be universal groups. 152xxx | LDAP Feature for the RCSxxx Can these Dellextended objects (Dell Association Object, Dell Remote Console Switch Device, and Dell Privilege Object) be in different domains? The Association Object and the Privilege Object must be in the same domain. The Dell-extended Active Directory Users and Computers snap-in forces you to create these two objects in the same domain. Other objects can be in different domains. Are there any restrictions on Domain Controller SSL configuration? Yes. All Active Directory servers’ SSL certificates in the forest must be signed by the same root CA since RCS only allows uploading one trusted CA SSL certificate. LDAP Feature for the RCSxxx | xxx153 Troubleshoot as follows: • If no domain name is specified, the local database is used. To login when AD authentication isn't working, use the default local admin account. • Ensure that you have checked the Enable Active Directory checkbox (RCS Software) or the Use LDAP Authentication checkbox (on-board web interface) on the RCS Active Directory configuration page. What can I do if I cannot log into the RCS using Active Directory authentication? How do I troubleshoot the issue? • Ensure that the DNS setting is correct on the RCS Networking configuration page. • Ensure Network Time Protocol is enabled on at least one server specified on the NTP panel. • Ensure that you have uploaded the Active Directory certificate from your Active Directory root CA to the RCS. • Check the Domain Controller SSL certificates to ensure that they have not expired. • Ensure that your “Remote Console Switch Name”, “Root Domain Name”, and “RCS Domain Name” match your Active Directory environment configuration. • Ensure that you use the correct user domain name during a login and not the NetBIOS name. 154xxx | LDAP Feature for the RCSxxx A Appendix A: Terminal Operations Each RCS may be configured at the switch level through the Console menu interface accessed through the SETUP port. All terminal commands are accessed through a terminal or PC running terminal emulation software. NOTE: The preferred method is to make all configuration settings in the local UI. To connect a terminal to the switch: 1 Using the supplied RJ-45 to DB-9 (female) adaptor and flat RJ-45 cable, connect a terminal or a PC that is running terminal emulation software (such as HyperTerminal) to the SETUP port on the back panel of the switch. The terminal settings are 9600 bits per second (bps), 8 bits, 1 stop bit, no parity and no flow control. 2 Turn on each target device and then turn on the switch. When the switch completes initialization, the Console menu will display the following message: Press any key to continue. Console Boot Menu Options While the switch is turning on, you can press a key to view the boot menu. From this menu, you can choose one of four options. • Boot Normal • Boot Alternate Firmware • Reset Factory Defaults Appendix A: Terminal Operationsxxx | xxx155 • Full-Factory Reset Console Main Menu Options Once turned on, the main menu displays the product name and version. From this menu, you can choose one of four options. • Network configuration: This menu option allows you to configure the network setting of the RCS. • Debug messages: This menu option turns on console status messages. Because this can significantly reduce performance, you should only enable debug messages when instructed to do so by Dell Technical Support. When you are finished viewing the messages, press any key to exit this mode. • Reset RCS: This menu option allows you to execute a soft reset of the switch. • Exit: This menu selection will return you to the ready prompt. If the Console menu interface password is enabled, you must exit the Console main menu so that the next user will be prompted with the Username and Password login screen. Appendix A: Terminal Operationsxxx | xxx156 B Appendix B: Using SIPs An administrator can choose between the Avocent ACS console server and Cisco pinouts for each serial SIP port via the local user interface or the remote OBWI. ACS is the default. To change the pinout to Cisco mode: 1 Select Unit View - RCS - RCS Settings - Ports - SIPs. 2 Click on the desired SIP. 3 Select Settings - Pinout. NOTE: If the DB-9 adaptor is used, select the ACS console server pinouts. ACS Console Server Port Pinouts The following table lists the ACS console server serial port pinouts for the SIP. Table B.1: ACS Console Server Serial Port Pinouts Pin No. Signal Name Input/Output 1 RTS - Request to Send OUT 2 DTR - Data Terminal Ready OUT 3 TXD - Transmit Data OUT 4 GND - Signal Ground N/A 5 CTS - Clear to Send IN Appendix B: Using SIPsxxx | xxx157 Pin No. Signal Name Input/Output 6 RXD - Receive Data IN 7 DCD/DSR - Data Set Ready IN 8 N/C - Not Connected N/A Cisco Port Pinouts The following table lists the Cisco serial port pinouts for the SIPs. Table B.2: Cisco Serial Port Pinouts Pin No. Signal Name Input/Output 1 CTS - Clear to Send IN 2 DCD/DSR - Data Set Ready IN 3 RXD - Receive Data IN 4 GND - Signal Ground N/A 5 N/C - Not Connected N/A 6 TXD - Transmit Data OUT 7 DTR - Data Terminal Ready OUT 8 RTS - Request to Send OUT Appendix B: Using SIPsxxx | xxx158 C Appendix C: MIB and SNMP Traps The Dell RCS has the ability to send audit events to an SNMP Manager. The SNMP traps are defined in an SNMP Trap MIB. The Trap MIB file may be uploaded from the RCS using the Save Trap MIB function. The uploaded Trap MIB file may then be loaded into an SNMP Trap Receiver application. Audit events may also be directed to “syslog” destinations. The format of each syslog message is given in the corresponding “--#SUMMARY” comment of each trap defined in the Trap MIB file. This appendix describes the trap events which the RCS may generate. Although care has been taken to keep the information in this appendix up to date, the Trap MIB file will contain the most accurate trap information. An SNMP manager may access MIB-II objects of the RCS using the IPv4 or IPv6 protocols. By design, the enterprise specific MIB objects within the RCS cannot be accessed using SNMP. The RCS Trap definitions use the structure described in the following Request For Comments (RFCs). • RFC-1155-SMI Describes the common structures and identification scheme for the definition of management information for use with TCP/IP-based Internets. Appendix C: MIB and SNMP Trapsxxx | xxx159 • RFC-1212 Describes the format for producing concise and descriptive MIB modules. • RFC-1213-MIB Describes the Internet standard MIB-II for use with network management protocols in TCP/IP-based inter-networks. • RFC-1215 Describes the SNMP standardized traps and provides a means for defining enterprise-specific traps. The specific objects reported by each trap are defined in the Trap MIB file which is uploaded from the RCS. The following table is a list of the generated trap events. Table C.1: Generated Trap Events Trap Event Trap Number Reboot Started 1 User Login 2 User Logout 3 Target Session Started 4 Target Session Stopped 5 Target Session Terminated 6 traps 7 through 9 are deprecated 7-9 Image File Upgrade Started 10 Image File Upgrade Results 11 User Added 12 Appendix C: MIB and SNMP Trapsxxx | xxx160 Trap Event Trap Number User Deleted 13 User Modified 14 User Locked 15 User Unlocked 16 User Authentication Failure 17 SIP Added 18 SIP Removed 19 SIP Moved 20 Target Device Name Changed 21 Tiered Switch Added 22 Tiered Switch Removed 23 Tiered Switch Name Changed 24 Configuration File Loaded 25 User Database File Loaded 26 Ca Certificate Loaded 27 SIP Image Upgrade Started 28 SIP Image Upgrade Result 29 SIP Restarted 30 Virtual Media Session Started 31 Appendix C: MIB and SNMP Trapsxxx | xxx161 Trap Event Trap Number Virtual Media Session Stopped 32 Virtual Media Session Terminated 33 Virtual Media Session Reserved 34 Virtual Media Session Unreserved 35 Virtual Media Drive Mapped 36 Virtual Media Drive Unmapped 37 traps 38 through 44 are deprecated 38-44 Screen Resolution Changed 45 Aggregated Target Device Status Changed 46 Factory Defaults Set 47 Power Supply Failure 48 Power Supply Restored 49 Pdu Device Online 50 Pdu Device Offline 51 Pdu Socket On Command 52 Pdu Socket Off Command 53 Pdu Socket Reboot Command 54 Pdu Socket On Sense Fail 55 Pdu Socket Off Sense Fail 56 Appendix C: MIB and SNMP Trapsxxx | xxx162 Trap Event Trap Number Pdu Status Socket On 57 Pdu Status Socket Off 58 Pdu Port Name Changed 59 Pdu Socket Name Changed 60 Pdu Input Feed Total Load High 61 Pdu Input Feed Total Load Low 62 Pdu Device Name Changed 63 Pdu Input Feed Name Changed 64 Pdu Socket Lock Command 65 Pdu Socket Unlock Command 66 Pdu Status Socket Lock 67 Pdu Status Socket Unlock 68 Pdu Image File Upgrade Started 69 Pdu Image File Upgrade Result 70 Pdu Circuit Name Changed 71 Pdu Device Total Load High 72 Pdu Circuit Total Load High 73 Pdu Socket Total Load High 74 Fan Failure 75 Appendix C: MIB and SNMP Trapsxxx | xxx163 Trap Event Trap Number Temperature Range 76 Smart Card Inserted 77 Smart Card Removed 78 Appendix C: MIB and SNMP Trapsxxx | xxx164 D Appendix D: Cable Pinouts Information NOTE: All switches have the 8-pin modular jack for the modem and console/setup ports. Modem Pinouts The modem port pinouts and descriptions are provided in the following figure and table. Figure D.1: Modem Pinouts Table D.1: Modem Pinout Descriptions Pin Number Description Pin Number Description 1 Request to Send (RTS 5 Transmit Data (TXD) 2 Data Set Ready (DSR 6 Signal Ground (SG) Appendix D: Cable Pinouts Informationxxx | xxx165 Pin Number Description Pin Number Description 3 Data Carrier Detect (DCD) 7 Data Terminal Ready (DTR) 4 Receive Data (RXD 8 Clear to Send (CTS Console/Setup Pinouts The console/setup port pinouts and descriptions are provided in the following figure and table. Figure D.2: Console/Setup Pinouts Table D.2: Console/Setup Pinout Descriptions Pin Number Description Pin Number Description 1 No Connection 5 Transmit Data (TXD) 2 No Connection 6 Signal Ground (SG) 3 No Connection 7 No Connection 4 Receive Data (RXD) 8 No Connection Appendix D: Cable Pinouts Informationxxx | xxx166 E Appendix E: UTP Cabling This appendix discusses various aspects of connection media. The RCS system utilizes UTP cabling. The performance of an switch system depends on high quality connections. Poor quality or poorly installed or maintained cabling can diminish switch system performance. NOTE: This appendix is for information purposes only. Please consult with your local code officials and/or cabling consultants prior to any installation. UTP Copper Cabling The following are basic definitions for the three types of UTP cabling that the RCS supports. • CAT 5 (4-pair) high performance cable consists of twisted pair conductors, used primarily for data transmission. The twisting of the pairs gives this cable some immunity from the infiltration of unwanted interference. CAT 5 cable is generally used for networks running at 10 or 100 Mbps. • CAT 5E (enhanced) cable has the same characteristics as CAT 5, but is manufactured to somewhat more stringent standards. • CAT 6 cable is manufactured to tighter requirements than CAT 5E cable. CAT 6 has higher measured frequency ranges and significantly better performance requirements than CAT 5E cable at the same frequencies. Wiring Standards There are two supported wiring standards for 8-conductor (4-pair) RJ-45 terminated UTP cable: EIA/TIA 568A and B. These standards apply to Appendix E: UTP Cablingxxx | xxx167 installations utilizing UTP cable specifications. The RCS system supports either of these wiring standards. The following table describes the standards for each pin. Table E.1: UTP wiring standards Pin EIA/TIA 568A EIA/TIA 568B 1 white/green white/orange 2 green orange 3 white/orange white/green 4 blue blue 5 white/blue white/blue 6 orange green 7 white/brown white/brown 8 brown brown Cabling Installation, Maintenance, and Safety Tips The following is a list of important safety considerations that should be reviewed prior to installing or maintaining your cables: • Keep all UTP runs to a maximum of 30 feet each. • Maintain the twists of the pairs all the way to the point of termination, or no more than one-half inch untwisted. Do not skin off more than one inch of the jacket while terminating. Appendix E: UTP Cablingxxx | xxx168 • If bending the cable is necessary, make it gradual with no bend sharper than a one inch radius. Allowing the cable to be sharply bent or kinked can permanently damage the cable’s interior. • Dress the cables neatly with cable ties, using low to moderate pressure. Do not over tighten the ties. • Cross-connect cables where necessary, using rated punch blocks, patch panels, and components. Do not splice or bridge the cable at any point. • Keep the UTP cable as far away as possible from potential sources of EMI, such as electrical cables, transformers, and light fixtures. Do not tie the cables to electrical conduits or lay the cables on electrical fixtures. • Always test every installed segment with a cable tester. Toning alone is not an acceptable test. • Always install jacks so as to prevent dust and other contaminants from settling on the contacts. The contacts of the jack should face up on the flush mounted plates, or left/right/down on surface mount boxes. • Always leave extra slack on the cables, neatly coiled in the ceiling or nearest concealed location. Leave at least five feet at the work outlet side and 15 feet at the patch panel side. • Choose either 568A or 568B wiring standard before beginning. Wire all jacks and patch panels for the same wiring scheme. Do not mix 568A and 568B wiring in the same installation. • Always obey all local and national fire and building codes. Be sure to firestop all the cables that penetrate a firewall. Use plenum-rated cable where it is required. Appendix E: UTP Cablingxxx | xxx169 Appendix E: UTP Cablingxxx | xxx170 F Appendix F: Sun Advanced Key Emulation Certain keys on a standard Type 5 (US) Sun keyboard can be emulated by key press sequences on the local port USB keyboard. To enable Sun Advanced Key Emulation mode and use these keys, press and hold and then press the key. The Scroll Lock LED blinks. Use the indicated keys in the following table as you would use the advanced keys on a Sun keyboard. For example: For , press and hold and press , then . These key combinations will work with the Dell USB, USB2, and USB2+CAC SIPs and Avocent USB, USB2, and VMC IQ modules. With the exception of , these key combinations are not recognized by Microsoft Windows. Using performs a Windows key press. When finished, press and hold and then press the key to toggle Sun Advanced Key Emulation mode off. Table F.1: Sun Key Emulation Compose Application1 Compose keypad Power F11 Open F7 Appendix F: Sun Advanced Key Emulationxxx | xxx171 Help Num Lock Props F3 Front F5 Stop F1 Again F2 Undo F4 Cut F10 Copy F6 Paste F8 Find F9 Mute keypad / Vol.+ keypad + Vol.- keypad - Command (left)2 F12 Command (left)2 Win (GUI) left1 Command (right)2 Win (GUI) right 1 ENDNOTES: (1) Windows 95 104-key keyboard. (2) The Command key is the Sun Meta (diamond) key. Appendix F: Sun Advanced Key Emulationxxx | xxx172 G Appendix G: Technical Specifications Table G.1: RCS Technical Specifications 1082DS: 8 Number of ports 2162DS: 16 4322DS: 32 Type Dell PS/2, USB, USB2, USB2+CAC, and Serial SIPs. Avocent PS/2, PS2M, USB, Sun, USB2, VMC, and Serial modules. Connectors 8-pin modular (RJ-45) Sync types Separate horizontal and vertical Appendix G: Technical Specificationsxxx | xxx173 Input video resolution Standard 640 x 480 @ 60 Hz 800 x 600 @ 75 Hz 960 x 700 @ 75 Hz 1024 x 768 @ 75 Hz 1280 x 1024 @ 75 Hz 1600 x 1200 @ 60 Hz Widescreen 800 x 500 @ 60 Hz 1024 x 640 @ 60 Hz 1280 x 800 @ 60 Hz 1440 x 900 @ 60 Hz 1680 x 1050 @ 60 Hz Supported cabling 4-pair UTP, 45 meters maximum length Dimensions Form factor 1U or 0U rack mount Dimensions 1.72 x 17.00 x 9.20 (Height x Width x Depth) 1082DS: 6.6 lb (3.0 kg) Weight (without cables) 2162DS: 7.0 lb (3.2 kg) 4322DS: 7.6 lb (3.4 kg) SETUP port Number 1 Protocol RS-232 serial Connector 8-pin modular (RJ-45) Local port Appendix G: Technical Specificationsxxx | xxx174 Number/Type 1 VGA/4 USB Network connection Number 2 Protocol 10/100/1000 Ethernet Connector 8-pin modular (RJ-45) USB device port Number 4 Protocol USB 2.0 MODEM port Number 1 Protocol RS-232 serial Connectors 8-pin modular (RJ-45) PDU port Number 2 Protocol RS-232 serial Connector 8-pin modular (RJ-45) Power specifications 1082DS: 1 IEC C14 Connectors 2162DS: 2 IEC C14 4322DS: 2 IEC C14 Type Internal Appendix G: Technical Specificationsxxx | xxx175 Power 18W Heat dissipation 47 BTU/hr AC input range 100 - 240 VAC AC frequency 50/60 Hz auto-sensing AC input current rating 1.25 A AC input power (maximum) 40 W Ambient atmospheric condition ratings Temperature 32 to 122 degrees Fahrenheit (0 to 50 degrees Celsius) operating; -4 to 158 degrees Fahrenheit (-20 to 70 degrees Celsius) non-operating Humidity Operating: 20% to 80 % relative humidity (noncondensing Non-operating: 5% to 95% relative humidity, 38.7 degrees C maximum wet bulb temperature Safety and EMC Standards approvals and markings UL / cUL, CE - EU, N (Nemko), GOST, C-Tick, NOM / NYCE, MIC (KCC), SASO, TUV-GS, IRAM, FCC, ICES, VCCI, SoNCAP, SABS, Bellis, FIS/ Kvalitet, Koncar, INSM, Ukrtest, STZ, KUCAS Safety certifications and EMC certifications for this product are obtained under one or more of the following designations: CMN (Certification Model Number), MPN (Manufacturer’s Part Number), or Sales Level Model designation. The designation that is referenced in the EMC and/or safety reports and certificates are printed on the label applied to this product. Appendix G: Technical Specificationsxxx | xxx176 H Appendix H: Technical Support Our Technical Support staff is ready to assist you with any installation or operating issues you encounter with your Dell product. If an issue should develop, follow the steps below for the fastest possible service. To resolve an issue: 1 Check the pertinent section of this manual to see if the issue can be resolved by following the procedures outlined. 2 Check our web site at dell.com/support to search the knowledge base or use the on-line service request. 3 Call the Dell Technical Support location nearest you. Appendix H: Technical Supportxxx | xxx177 Appendix H: Technical Supportxxx | xxx178
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Language : en-us Format : application/pdf Creator : Dell Inc. Subject : User's Guide2 Description : User's Guide2 Title : Dell™ Remote Console Switch Hardware User's Guide Producer : MadCap Flare V8; modified using iTextSharp 5.1.3 (c) 1T3XT BVBA Keywords : esuprt_ser_stor_net#esuprt_poweredge#Dell KVM 2162DS#dell-kvm-2162ds#User's Guide2 Create Date : 2012:07:02 08:23:08-05:00 Modify Date : 2012:12:27 06:02:39-06:00 Page Mode : UseOutlines Page Count : 188 Author : Dell Inc. Productcode : dell-kvm-2162ds Typecode : ug2 Typedescription : User's Guide2 Languagecodes : en-us Sectioncode : Sectiondescription : Publishdate : 2012-12-27 00:00:00 Expirydate : 9999-09-09 00:00:00 Manualurl : http://ftp.dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_poweredge/dell-kvm-2162ds_User's Guide2_en-us.pdf Readytocopy : false Futureproductindication : No Categorypathforfutureproducts : Businesskeywords : Filesize : 5610 Creationdate : D:20120702082308-05'00' Moddate : D:20121227011807-06'00'EXIF Metadata provided by EXIF.tools