Dell Kvm 2321Ds Owners Manual User’s Guide

2014-11-13

: Dell Dell-Kvm-2321Ds-Owners-Manual-116360 dell-kvm-2321ds-owners-manual-116360 dell pdf

Open the PDF directly: View PDF PDF.
Page Count: 244

DownloadDell Dell-Kvm-2321Ds-Owners-Manual- User’s Guide  Dell-kvm-2321ds-owners-manual
Open PDF In BrowserView PDF
Dell™ Remote Console Switch
User’s Guide
Notes, Notices, and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
NOTICE: A NOTICE indicates either potential damage to hardware or loss of
data and tells you how to avoid the problem.
CAUTION: A CAUTION indicates a potential for property damage, personal
injury, or death.

___________________
Information in this document is subject to change without notice.
© 2010 Dell Inc. All rights reserved.

2161DS-2/4161DS/2321DS Remote Console Switch

Third Party Software. You acknowledge that the SOFTWARE PRODUCT may contain or be provided
with copyrighted software of Dell's suppliers as identified in associated documentation or other printed
or electronic materials (“Third Party Software”) which are obtained under a license from such
suppliers. Your use of any such Third Party Software shall be subject to and you agree to comply with
the applicable restrictions and other terms and conditions set forth in such documentation or materials
as set forth in any “Third-Party Licenses ReadMe” file or similar file located in the installation directory
for the SOFTWARE PRODUCT.
Any open source software is distributed in the hope that it will be useful, but is provided “as is” without
any expressed or implied warranty; including but not limited to the implied warranty of merchantablity
or fitness for a particular purpose. In no event shall Dell, the copyright holders, or the contributors be
liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but
not limited to, procurement of substitute goods or services; loss of use, data or profits; or business
interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort
(including negligence or otherwise) arising in any way out of the use of this software, even if advised
of the possibility of such damage.

Reproduction of these materials in any manner whatsoever without written permission of Dell Inc. is
strictly forbidden.

Trademarks used in this text: Avocent is a registered trademarks of Avocent Corporation. OSCAR is
a registered trademark of Avocent Corporation or its affiliates. Dell, OpenManage, and the DELL
logo are trademarks of Dell Inc.; Active Directory, DirectDraw, Internet Explorer, Microsoft, Win32,
Windows, Windows NT, Windows Server, and Windows Vista are either trademarks or registered
trademarks of Microsoft Corporation in the United States and/or other countries; Intel and Pentium
are registered trademarks of Intel Corporation; Red Hat and Red Hat Enterprise Linux are registered
trademarks of Red Hat, Inc.; SUSE is a registered trademark of Novell Inc. in the United States and
other countries; UNIX is a registered trademark of The Open Group in the United States and other
countries; Sun, Sun Microsystems, and the Sun logo are trademarks or registered trademarks of Sun
Microsystems, Inc. or its subsidiaries in the United States and other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.

590-1049-501A
October 2010
Model 2161DS-2/4161DS/2321DS Remote Console Switch

Safety and EMC Approvals and Markings

•

UL / cUL

•

CE - EU

•

N (Nemko)

•

GOST

•

C-Tick

•

NOM / NYCE

•

MIC (BCC)

•

SASO

•

GS

•

IRAM

•

FCC, ICES,

•

VCCI

•

SoNCAP

•

SABS

•

Bellis

•

FIS/ Kvalitet

•

Koncar

•

KUCAS

•

INSM

•

Ukrtest

•

STZ Z

Safety certifications and EMC certifications for this product are obtained under
one or more of the following designations: CMN (Certification Model
Number), MPN (Manufacturer’s Part Number) or Sales Level Model
designation. The designation that is referenced in the EMC and/or safety
reports and certificates is printed on the label applied to this product.
Please refer to the Dell Regulatory Technical Bulletin included with your Remote
Console Switch for more detailed EMC and EA text.

Contents

Safety Precautions .
General

. . . . . . . . . . . . . . . . . . .

xiii

. . . . . . . . . . . . . . . . . . . . . . .

xiii

Rack Mounting of Systems .
LAN Options.

1

. . . . . . . . . . . .

xv

. . . . . . . . . . . . . . . . . . . .

xvi

Product Overview

. . . . . . . . . . . . . . . . . .

Remote Console Switch Features and Benefits .

1

. . . . .

1

SIP Intelligent Module

. . . . . . . . . . . . . . . .

1

Multiplatform Support

. . . . . . . . . . . . . . . .

2

Interoperability with Avocent® IQ Module Intelligent Cabling 2
OSCAR Interface

. . . . . . . . . . . . . . . . . . .

On-board Web Interface

. . . . . . . . . . . . . . .

DSView® 3 Management Software Plug-in

2

. . . . .

2

. . . . . . . . . . . . . . . . . . . . .

3

. . . . . . . . . . . . . . . . . . . . . . .

3

Virtual Media
Security .

2

Encryption.

. . . . . . . . . . . . . . . . . . . . . .

Operation Modes .

3

. . . . . . . . . . . . . . . . . .

4

. . . . . . . . . . . . . . . . . . . . . . . . .

4

. . . . . . . . . . . . . . . . . . . . . . . . . . . .

5

Video

FLASH Upgradeable

. . . . . . . . . . . . . . . . .

Cascade (Tier) Expansion .

. . . . . . . . . . . . . .

5
5

Remote Console Switch Software Features and Benefits 5
Easy to Install and Configure .

. . . . . . . . . . . .

Powerful Customization Capabilities .

. . . . . . . .

Extensive Remote Console Switch Management
IPv4 and IPv6 Capabilities

6
6

. .

6

. . . . . . . . . . . . . .

6

Contents

v

LDAP

. . . . . . . . . . . . . . . . . . . . . . . . .

Interoperability with Avocent Products .

2

Installation .

. . . . . . .

. . . . . . . . . . . . . . . . . . . . . . .

9

. . . . .

Remote Console Switch Installation and Setup .

. . . .

10

. . . . . . . . . . . . . . . . . . .

10

Setting Up Your Network
Keyboards .

9

. . . . . . . . . . . . . .

11

. . . . . . . . . . . . . . . . . . . . .

11

. . .

11

. . . .

15

. . . . . . . . . . . . . . . . .

24

Rack Mounting Your Remote Console Switch Unit
Installing the Remote Console Switch Unit .
Video Optimization

. . . . . . . . . . . . . . . .

24

. . . . . . . . . . . . . . . . . .

24

Mouse Acceleration
Connecting a SIP

Adding a Cascade Switch.

. . . . . . . . . . . . .

Adding a PEM (Optional)

29

. . . . . . . . . . . . . .

30

Connecting to the Network

. . . . . . . . . . . . .

32

. . . .

32

. . . . . . . . . . . . . . . .

32

On-board Web Interface Installation and Setup.
Supported Browsers

26

. . . . . . . . .

Cascading with Legacy Switches.

Launching the On-board Web Interface

. . . . . .

32

Controlling Your System at the Analog Ports 35
Viewing and Selecting Ports and Devices

. . . . . . .

35

. . . . . . . . . . . . . . . . .

37

. . . . . . . . . . . . . . . . . . .

37

Selecting Devices .
Soft Switching .

Navigating the OSCAR Interface .

vi

7

Remote Console Switch Quick Setup Checklist

Getting Started

3

6

Contents

. . . . . . . . . . . .

38

Configuring OSCAR Interface Menus

. . . . . . . . . .

40

Changing the Display Behavior .

. . . . . . . . . .

41

. . . . . . . . . . . . . .

43

Setting Console Security

Controlling the Status Flag

. . . . . . . . . . . . .

Setting the Interface Language.
Assigning Device Types

. . . . . . . . . .

47

. . . . . . . . . . . . . .

47

Assigning Device Names .

. . . . . . . . . . . . .

Configuring Network Settings

50

. . . . . . . . . . . . .

52

. . . . . . . . . . . . . . . . .

52

Setting the Preemption Warning

. . . . . . . . . . . .

55

. . . . . . . . . . . . . .

56

. . . . . . . . . . . . . . . .

57

Running System Diagnostics
Broadcasting to Servers .

54

. . . . . . . . .

Displaying Configuration Information .

. . . . . . . . . . . . . . .

59

Power window

. . . . . . . . . . . . . . . . . . .

59

PDUs window .

. . . . . . . . . . . . . . . . . . .

60

Power Controlling Devices

PDU Settings window .
PDU Inlets window

. . . . . . . . . . . . . . .

60

. . . . . . . . . . . . . . . . .

61

PDU Outlets window

4

49

. . . . . . . . . . .

Displaying Version Information
Scanning Your System .

45

Using the Viewer

. . . . . . . . . . . . . . . .

62

. . . . . . . . . . . . . . . . . . .

65

Accessing Servers from the On-board Web Interface

.

65

. . . . . . .

66

. . . . . . . . . . . . .

67

. . . . . . . . . . . . . . . .

68

Interacting With the Server Being Viewed
Viewer Window Features .
Adjusting the Viewer

Adjusting the Viewer Resolution

. . . . . . . . . .

Contents

71

vii

Adjusting the Video Quality .

. . . . . . . . . . . .

Minimizing Remote Video Session Discoloration .

74

. . .

74

. . . . . . . . . . . . . . .

75

Improving Screen Background Color Display
Setting Mouse Scaling

Minimizing Mouse Trailing

. . . . . . . . . . . . .

Improving Mouse Performance .

. . . . . . . . . .

Viewing Multiple Servers Using the Scan Mode .
Scanning Your Servers

72

.

76
76

.

77

. . . . . . . . . . . . . . .

77

Thumbnail View Status Indicators

. . . . . . . . .

79

Navigating the Thumbnail Viewer

. . . . . . . . .

80

Using Macros to Send Keystrokes to the Server .

.

81

. . . . . . . . . . .

82

. . . . . . . . . . . . . . . . . .

83

. . . . . . . . . . . . . . . . . . . . . . .

84

Session Options - General Tab
Screen Capturing
Preemption .

Preemption of Remote User by a Remote Administrator 85
Preemption of a Local User/Remote Administrator by a Remote
Administrator . . . . . . . . . . . . . . . . . . . . 85
Connection Sharing .

5

Virtual Media

. . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . .

Common Virtual Media Terms

. . . . . . . . . . . . . .

Configuring Virtual Media Locally .

. . . . . . . . . . .

86

89
89
90

Enabling/Disabling Virtual Media Using the OSCAR Interface 90
Setting Virtual Media Options Using the OSCAR Interface 91
Configuring Virtual Media Remotely

. . . . . . . . . .

93

Enabling/Disabling Virtual Media Using the On-board Web
Interface . . . . . . . . . . . . . . . . . . . . . . 93
Setting Virtual Media Options Using the On-board Web Interface
95
Launching Virtual Media .

viii

Contents

. . . . . . . . . . . . . . . .

95

Virtual Floppy Drive .

. . . . . . . . . . . . . . . .

97

Virtual CD/DVD Drive

. . . . . . . . . . . . . . . .

98

Virtual Media Connection Status .

. . . . . . . . .

Reserving a Virtual Media Session .
Resetting the USB Bus

6

98

. . . . . . . .

99

. . . . . . . . . . . . . . .

99

Managing Your Remote Console Switch Using the
On-board Web Interface . . . . . . . . . . . . 101
Migrating Switches from the Remote Console Switch Software
101
Viewing and Configuring Remote Console Switch Parameters 102
. .

102

. . . . . . . . . . . . .

104

Changing Remote Console Switch Parameters
Setting Up User Accounts

. . . . . .

108

. . . . . . . . .

109

. . . . . . . . . .

111

Locking and Unlocking User Accounts .
Enabling and Configuring SNMP .
Enabling Individual SNMP Traps

Viewing and Resynchronizing Server Connections 112
Modifying a Server Name

. . . . . . . . . . . . .

113

Viewing and Configuring Tiered Switch Connections 114
Viewing the SIPs and IQ Modules

. . . . . . . . .

115

Viewing Remote Console Switch Version Information . 116
. . . . . . . . . . . . . . . . .

117

. . . . . . . . . . . . . . . . . .

120

SIPs Subcategory .
Upgrading Firmware .

Controlling User Status

. . . . . . . . . . . . . . . . .

123

Rebooting Your System

. . . . . . . . . . . . . . . . .

125

Managing Remote Console Switch Configuration Files 125
Managing User Databases

. . . . . . . . . . . . . . .

Installing a Web Certificate .

. . . . . . . . . . . . . .

Contents

126
128

ix

Managing PDUs

7

. . . . . . . . . . . . . . . . . . . .

129

Migrating Your Remote Console Switch 133
Accessing the AMP

. . . . . . . . . . . . . . . . . .

Upgrading Firmware Using the AMP

. . . . . . . . .

Upgrading Remote Console Switch Firmware

. .

133
134
134

Migrating Remote Console Switches to the On-board Web Interface
135
Using the Resync Wizard

8

. . . . . . . . . . . . . . .

LDAP Feature for the Remote Console Switch 139
Overview .

. . . . . . . . . . . . . . . . . . . . . . .

The Structure of Active Directory

. . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

140

. . . . . . . . . . . . . . . . . . . . .

141

Schema Extensions .

. . . . . . . . . . . . . . .

Standard Installation .

141

. .

142

. . . . . . . . . . . . . . . . .

143

Standard Schema versus Dell Extended Schema .

Configure the Override Admin Account
Configuring DNS Settings

. . . . . . . .

144

. . . . . . . . . . . . . . .

144

Configuring the Network Time Protocol Settings .

. .

145

Configuring the LDAP Authentication Parameters

. .

146

. . . . . . . . . . . . . . . . .

149

LDAP SSL Certificates

Contents

139
140

Object Classes
Attributes

139

. . . . . . . . . .

Domain Controller Computers

x

137

Enabling SSL on a Domain Controller
Login Timeout .

. . . . . . .

149

. . . . . . . . . . . . . . . . . . .

154

. . . . . . . . . . .

154

. . . . . . . . . . . . . . .

155

CA Certificate Information Display
Configuring Group Objects

Active Directory Object Overview for Standard Schema 158
Dell Extended Schema Active Directory Object Overview 159
Configuring Active Directory with Dell Schema Extensions to Access
Your RCS . . . . . . . . . . . . . . . . . . . . . . . . . 164
Extending the Active Directory Schema (Optional) 164
Installing the Dell Extension to the Active Directory Users and
Computers Snap-In (Optional) . . . . . . . . . . . 165
Adding Users and Privileges to Active Directory with Dell Schema
Extensions . . . . . . . . . . . . . . . . . . . . . . . . 166
Creating a SIP Object .

. . . . . . . . . . . . . . .

Creating a Privilege Object .

. . . . . . . . . . . .

166

. . . . . . . .

167

. . . . . . . . . .

168

Using Dell Association Objects Syntax .
Creating an Association Object.

166

Adding Objects to an Association Object
Console Redirection Access Security .

. . . . .

168

. . . . . . . . .

169

Using Active Directory to Log In to the Remote Console Switch 170
Target Device Naming Requirements for LDAP Implementation 170
Frequently Asked Questions .

. . . . . . . . . . . . . .

171

A Appendix A: Remote Console Switch Software

Contents

xi

Keyboard and Mouse Shortcuts
B Appendix B: TCP Ports .

. . . . . . . . .

175

. . . . . . . . . . . . .

179

C Appendix C: MIBs and SNMP Traps
MIB Groups

. . .

181

. . . . . . . . . . . . . . . . . . . .

182

Enterprise Traps .

. . . . . . . . . . . . . . . . .

D Appendix D: FLASH Upgrades

. . . . . . . .

Upgrading the Remote Console Switch .
Upgrading the SIP module firmware

xii

211

. . . . .

211

. . . . . . .

214

E

Appendix E: Technical Specifications .

F

Appendix F: Technical Support

Index

195

.

217

. . . . . . .

221

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

223

Contents

Safety Precautions
Use the following safety guidelines to help ensure your own personal safety
and to help protect your system and working environment from potential
damage.
CAUTION: The power supplies in your system may produce high voltages and
energy hazards, which can cause bodily harm. Only trained service technicians
are authorized to remove the covers and access any of the components inside the
system. This warning applies to Dell™ PowerEdge™ servers and Dell
PowerVault™ storage systems.
This document pertains only to the Dell 2161DS-2/4161DS/2321DS Console
Switch. You should also read and follow the additional safety instructions.
•

The Remote Console Switch Installation Guide included with your rack
solution that describes how to install your system into a rack.

•

The User’s Guide which provides information about setting up and
operating your rack mounted server system.

•

The appropriate Avocent installer/user guide for your product, if
applicable. Visit avocent.com/manuals for more information.

General
•

Observe and follow service markings.

•

Do not service any product except as explained in your system
documentation.

•

Opening or removing covers that are marked with the triangular symbol
with a lightning bolt may expose you to electrical shock.

•

Components inside these compartments should be serviced only by a
trained service technician.
–

This product contains no serviceable components. Do not attempt to
open.

xiii

•

If any of the following conditions occur, unplug the product from the
electrical outlet and replace the part or contact your trained service
provider:
–

The power cable, extension cable, or plug is damaged.

–

An object has fallen into the product.

–

The product has been exposed to water.

–

The product has been dropped or damaged.

–

The product does not operate correctly when you follow the operating
instructions.

•

Keep your system away from radiators and heat sources. Also, do not block
cooling vents.

•

Do not spill food or liquids on your system components, and never operate
the product in a wet environment. If the system gets wet, see the
appropriate section in your troubleshooting guide or contact your trained
service provider.

•

Use the product only with approved equipment.

•

Allow the product to cool before removing covers or touching internal
components.

•

Operate the product only from the type of external power source indicated
on the electrical ratings label. If you are not sure of the type of power
source required, consult your service provider or local power company.
NOTICE: To help avoid damaging your system, be sure the voltage selection switch
(if provided) on the power supply is set for the voltage that most closely matches
the AC power available in your location. Also be sure that your monitor and
attached devices are electrically rated to operate.

xiv

•

Be sure that your monitor and attached devices are electrically rated to
operate with the power available in your location.

•

Use only power cables provided with this product.

•

To help prevent electric shock, plug the system and peripheral power
cables into properly grounded electrical outlets. These cables are equipped
with three-prong plugs to help ensure proper grounding. Do not use
adapter plugs or remove the grounding prong from a cable.

•

Observe extension cable and power strip ratings. Make sure that the total
ampere rating of all products plugged into the power strip does not exceed
80 percent of the ampere ratings limit for the power strip.

•

To help protect your system from sudden, transient increases and
decreases in electrical power, use a surge suppressor, line conditioner, or
uninterruptible power supply (UPS).

•

Position system cables and power cables carefully. Route cables so that they
cannot be stepped on or tripped over. Be sure that nothing rests on any
cables.

•

Do not modify power cables or plugs. Consult a licensed electrician or your
power company for site modifications. Always follow your local/national
wiring rules.

Rack Mounting of Systems
•

Refer to the rack installation documentation accompanying the rack for
specific caution statements and procedures.

•

System rack kits are intended to be installed in a rack by trained service
technicians. If a non-Dell rack is utilized, be sure that the rack meets the
specifications of a Dell rack.

•

Elevated Ambient Temperature: If installed in a closed rack assembly, the
operation temperature of the rack environment may be greater than room
ambient. Use care not to exceed the rated maximum ambient temperature
of the unit.

•

Reduced Air Flow: Installation of the equipment in a rack should be such
that the amount of airflow required for safe operation of the equipment is
not compromised.

•

Mechanical Loading: Mounting of the equipment in the rack should be
such that a hazardous condition is not achieved due to uneven mechanical
loading.

•

Circuit Overloading: Consideration should be given to the connection of
the equipment to the supply circuit and the effect that overloading of
circuits might have on overcurrent protection and supply wiring. Consider
equipment nameplate ratings for maximum current.

xv

•

Reliable Earthing: Reliable earthing of rack mounted equipment should be
maintained. Pay particular attention to supply connections other than
direct connections to the branch circuit (for example, use of power strips).

LAN Options

xvi

•

Do not connect or use during a lightning storm. There may be a risk of
electrical shock from lightning.

•

Never connect or use in a wet environment.

1

Product Overview

The multiuser, Dell™ 2161DS-2/4161DS/2321DS Remote Console Switch
integrates Dell field-proven digital keyboard, video and mouse (KVM)
switching technology with advanced cable management, flexible access for up
to four simultaneous users, and a patented, next-generation user interface.
The Remote Console Switch features user-side USB and PS/2 ports that
support major device platforms.
Using powerful on-screen management through the AvocentTM brand
OSCARTM graphical user interface, Remote Console Switch Software, or onboard web interface provides easy system configuration and device selection.

Remote Console Switch Features and Benefits
SIP Intelligent Module
The Remote Console Switch also provides SIP intelligent module capability.
The SIP module with CAT 5 design dramatically reduces cable clutter, while
providing optimal resolution and video settings. The built-in memory of the
SIP module simplifies configuration by assigning and retaining unique device
names and Electronic ID (EID) numbers for each attached device. The SIP
module is powered directly from the device and provides Keep Alive
functionality even if the Remote Console Switch is not powered.
PS/2 and USB SIP modules are available allowing direct KVM connectivity to
devices. A USB2 virtual media SIP is also available. Each Remote Console
Switch has up to 32 Analog Rack Interface (ARI) ports for connecting SIP
modules.
Utilizing the SIP module, you can attach additional switches to expand your
Remote Console Switch system. This flexibility allows you to add capacity as
your data center grows.

Product Overview

1

Multiplatform Support
The Dell SIP modules available for use with the Remote Console Switch
support PS/2, USB and USB2 device environments. Using the OSCAR®
interface in conjunction with these modules allows you to switch easily
across platforms.

Interoperability with Avocent® IQ Module Intelligent Cabling
Avocent IQ module intelligent cable may also be used to connect devices to
the Remote Console Switch. PS/2, USB, Sun®, and serial cabling options are
available. For more information, please refer to the appropriate Avocent
installer/user guide for your product. Visit avocent.com/manuals for more
information.

OSCAR Interface
You can use the Avocent brand OSCAR interface to manage the Remote
Console Switch. The OSCAR interface features intuitive menus to configure
your switch system and select computers. Devices can be identified by a
name, EID, or port number, allowing you to assign unique device names.

On-board Web Interface
The on-board web interface provides similar management functions as the
Remote Console Switch Software, but does not require a software server or
any installation. The on-board web interface is launched directly from the
switch, and any servers connected to the Remote Console Switch are
automatically detected. You can use the on-board web interface to configure
Remote Console Switches from a web browser. Launch the Viewer from the
on-board web interface to establish KVM and virtual media sessions to target
devices. The on-board web interface also supports LDAP authentication,
which allows permissions for multiple Remote Console Switches to be managed
through a single interface.

DSView® 3 Management Software Plug-in
The Avocent DSView 3 management software is a secure, web browser-based,
centralized enterprise management solution that allows users to remotely
access, manage, monitor, and control target devices through managed
appliances. A session may be launched to a target device with a single point of
access.
2

Product Overview

You can manage and connect to multi-vendor servers and devices from within
the DSView 3 software. Include your Dell Remote Console Switch in the
DSView 3 software heterogeneous network environment with the DSView 3
software plug-in. Once a Remote Console Switch is added, you can use the
DSView 3 software for fault management, sessions management, firmware
upgrades, and more.

Virtual Media
Virtual media allows you to view, move, or copy data located on virtual media
to and from any server that is connected to the Remote Console Switch.
Manage remote systems more efficiently by allowing operating system
installation, operating system recovery, hard drive recovery or duplication,
BIOS updating, and server backup.
Virtual media can be connected directly to USB ports on the switch or the
server hosting the on-board web interface browser session. You can open a
virtual media session to a server from the Viewer. The Viewer can be opened
from either the on-board web interface or Remote Console Switch software.
NOTE: To open a virtual media session with a server, the server must first be
connected to a Remote Console Switch using a virtual media capable USB2 SIP
module.

Security
The OSCAR interface allows you to protect your system with a screen saver
password. The screen saver mode engages and access is prohibited until the
appropriate password is entered to reactivate the system. By typing Help in
the password dialog, you are directed to Dell Technical Support.
Recommended usage for the Remote Console Switch is in a datacenter
infrastructure protected by a firewall.

Encryption
The Remote Console Switch supports 128-bit SSL, as well as AES, DES, and
3DES encryption of keyboard/mouse, video, and virtual media sessions.

Product Overview

3

Operation Modes
The OSCAR interface provides convenient operation modes for easy system
administration of the Remote Console Switch. These modes (Broadcast,
Scan, Switch, and Share) allow you to manage your switching activities.
Chapter 3, "Controlling Your System at the Analog Ports" on page 35, explains
these modes in detail.

Video
The Remote Console Switch provides optimal resolution for analog VGA,
SVGA and XGA video. You can achieve resolutions of 1024 x 768, depending
on the length of cable separating your switch and servers.
Table 1-1. Maximum Resolution Refresh Rate Video Type

720 x 400 @ 70 Hz VGA
640 x 480 @ 60 Hz VGA
640 x 480 @ 72 Hz VESA
640 x 480 @ 75 Hz VESA
800 x 500 @ 60 Hz VESA
800 x 600 @ 56 Hz VESA
800 x 600 @ 60 Hz VESA
800 x 600 @ 70 Hz VESA
800 x 600 @ 75 Hz VESA
1024 x 640 @ 60 Hz VESA
1024 x 768 @ 60 Hz VESA
1024 x 768 @ 70 Hz VESA
1024 x 768 @ 75 Hz VESA
1280 x 800 @ 60 Hz VESA

4

Product Overview

FLASH Upgradeable
Upgrade your Remote Console Switch and SIP modules at any time to ensure
you are always running the most current firmware version available. Flash
Upgrades can be initiated through the OSCAR interface, on-board web
interface, or the Serial Console. The Remote Console Switch can be
configured to perform automatic firmware upgrades of SIP modules. See
"Appendix D: FLASH Upgrades" on page 211 for more information.

Cascade (Tier) Expansion
The Remote Console Switch features allow you to cascade additional Dell
Console Switches from each of the Analog Rack Interface (ARI) ports on the
switch. The cascaded switches are attached in the same manner as any device.
This additional tier of units allows you to attach up to 512 servers in one
system. See "Adding a Cascade Switch" on page 26.

Remote Console Switch Software Features and
Benefits
NOTE: For how to use the Remote Console Switch Software, see the Dell Remote
Console Switch Software User’s Guide or the help included with the software.
The Dell™ Remote Console Switch Software is a cross-platform management
application that allows you to view and control the Dell Remote Console
Switch and all attached servers. The cross-platform design ensures
compatibility with most popular operating systems and hardware platforms.
The Remote Console Switch Software provides secure switch-based
authentication, data transfers, and username/password storage. Each switch
handles authentication and access control individually for more decentralized
system control.
The Remote Console Switch Software utilizes Explorer-like navigation with
an intuitive split-screen interface, providing you with a single point of access
for your entire system. From here, you can manage your existing switches,
install a new switch, or launch a video session to a system server. Built-in
groupings such as Servers, Sites, and Folders provide an easy way to select the
units to view. Powerful search and sort capabilities allow you to easily find any
unit.
Product Overview

5

Easy to Install and Configure
The Remote Console Switch Software is designed for easy installation and
operation. Auto-discovery of managed switches enables you to install new
units in minutes. Wizard-based installation and online help simplify initial
system configuration. The intuitive graphical interface makes managing and
updating switches simple and straightforward.

Powerful Customization Capabilities
Tailor the Remote Console Switch Software to fit your specific system needs.
Take advantage of built-in groups or create your own. Customize unit and
field names, and icons for maximum flexibility and convenience. Using
names that are meaningful to you makes it easy to quickly find any system
unit.

Extensive Remote Console Switch Management
The Remote Console Switch Software allows you to add and manage multiple
switches in one system. Once a new switch is installed, you can configure
switch parameters, control and preempt user video sessions, and execute
numerous control functions, such as rebooting and upgrading your switch.
The Remote Console Switch Software is designed to be compatible with the
Dell OpenManage™ IT Assistant Event Viewer, allowing system
administrators to consolidate system event reports.

IPv4 and IPv6 Capabilities
The Remote Console Switch is compatible with systems using either of the
currently used Internet Protocol Versions, IPv4 and IPv6. You can change the
network settings and choose either IPv4 or IPv6 mode via the serial port,
OSCAR interface, or on-board web interface.

LDAP
The Dell Remote Console Switch Software allows permissions for multiple
Remote Console Switches to be managed through a single interface rather
than individually on each Remote Console Switch. For increased security and
efficiency, the LDAP feature eliminates the need to update access
permissions in individual Remote Console Switches by drawing permissions
from a single network-wide authentication source.

6

Product Overview

The Dell Remote Console Switches can authenticate using the standard
Active Directory schema, or the Dell Extended Schema in order to maximize
compatibility with all of your Dell hardware.

Interoperability with Avocent Products
The Remote Console Switch Software can also be used to manage some
Avocent brand switches allowing increased flexibility in the management of
systems.
In addition, the Remote Console Switch Software includes support for
Avocent brand IQ Modules, expanding the range of server types that can be
managed. The addition of support for Avocent brand IQ modules means that
the following connections are now supported:
•

PS/2 modules (Dell and Avocent modules available)

•

USB modules (Dell and Avocent modules available)

•

Serial modules (Avocent modules available)

•

Sun modules (Avocent modules available)

•

PS2M modules (Avocent modules available)

NOTE: Dell SIPs are not supported on directly connected Avocent brand switches.

Product Overview

7

8

Product Overview

2

Installation

The Remote Console Switch system includes the Remote Console Switch,
the Remote Console Switch Software, and the on-board web interface. You
may choose to use either the Remote Console Switch Software or the onboard web interface to manage your system. The on-board web interface
manages a single Remote Console Switch and its connections, while the
Remote Console Switch Software can manage multiple switches and their
connections.
If you plan to use the on-board web interface, you do not need to install the
Remote Console Switch Software. If you have previously used the Remote
Console Switch Software, you can migrate the database to the on-board web
interface. See "Migrating Remote Console Switches to the On-board Web
Interface" on page 135.
NOTE: Please ensure that all your Remote Console Switches have been upgraded to
their most recent version of firmware. For information on upgrading a Remote
Console Switch through the on-board web interface, please see "Upgrading
Firmware" on page 120.

Remote Console Switch Quick Setup Checklist
To set up the Remote Console Switch (see the "Remote Console Switch
Installation and Setup" on page 10:
1 Adjust mouse acceleration on each server to Slow or None.
2 Install the Remote Console Switch hardware, and connect a Server
Interface Pod (SIP) or an Avocent brand IQ module to each server or tiered
switch. Connect each SIP or IQ module to the Remote Console Switch
with CAT 5 cabling and connect the keyboard, monitor, and mouse
connectors to the Analog Port of the Remote Console Switch.
3 Connect a terminal to the configuration (serial) port on the back panel of
the Remote Console Switch and set up network configuration (set network
speed and address type). The IP address can be set here or from the
Remote Console Switch Software. Dell recommends using a static IP
address for ease of configuration.

Installation

9

4 Using the local port configuration, input all server names via the OSCAR
interface.
To set up the Remote Console Switch Software, see the Dell Remote Console
Switch Software User’s Guide or the help included with the software.

Remote Console Switch Installation and Setup
The Remote Console Switch system uses Ethernet networking infrastructure
and TCP/IP protocol to transmit keyboard, video, and mouse information
between operators and connected computers. Although 10BaseT Ethernet or
Gigabit may be used, Dell recommends a dedicated, switched 100BaseT
network.

Getting Started
Before installing your Remote Console Switch, refer to the list below to
ensure you have all items that shipped with the Remote Console Switch, as
well as other items necessary for proper installation.
Supplied with the Remote Console Switch:
•

Remote Console Switch unit

•

Local country power cord

•

0U mounting bracket

•

1U mounting bracket

•

1U mounting bracket hardware kit

•

Serial cable

•

Cat5 cable

•

Remote Console Switch System User's Guide on CD

•

Installation Instructions

•

Safety booklet

•

Regulatory booklet

Additional items needed:
•

One Dell SIP or IQ module per attached device

•

One CAT 5 patch cable per attached device (up to 30 meters)

Optional items:
10

Installation

•

Front Access Panel

•

Port Expansion Module (PEM)
NOTE: A virtual media session cannot be opened to a server that is connected to a

PEM.

Setting Up Your Network
The Remote Console Switch system uses IP addresses to uniquely identify
the Remote Console Switch units and the computers running Remote
Console Switch Software. The Remote Console Switch supports DHCP and
static IP addressing. (If you are connecting your remote software to the
previous 2161DS, you will need to use BootP instead of DHCP).
NOTE: For how to use the Remote Console Switch Software, see the Dell Remote
Console Switch Software User’s Guide or the help included with the software.

Keyboards
USB or PS/2 type keyboards may be connected to the Analog Port of the
Remote Console Switch.
NOTE: The Remote Console Switch also supports the use of multiple keyboards
and multiple mice on the Analog Port. The use of more than one input device
simultaneously, however, may produce unpredictable results.

Rack Mounting Your Remote Console Switch Unit
Obtain a Switch Mounting Bracket Kit (0U or 1U) to rack-mount your
Remote Console Switch unit. Before installing the Remote Console Switch
and other components in the rack, stabilize the rack in a permanent location.
Start rack mounting your equipment at the bottom of the rack, then work to
the top. Avoid uneven loading or overloading of racks.
CAUTION: Before installing systems in a rack, install front and side stabilizers on
stand-alone racks or the front stabilizer on racks joined to other racks. Failure to
install stabilizers accordingly before installing systems in a rack could cause the
rack to tip over, potentially resulting in bodily injury under certain circumstances.
Therefore, always install the stabilizer(s) before installing components in the
rack.
To install the 0U switch mounting bracket (shipped as default):

Installation

11

1 Line up the holes of the mounting brackets with the screw holes in the
switch.
2 Fasten the mounting bracket to the switch using the button head socket
cap screws on each side.
3 Mount the switch assembly to the rack by inserting the three mounting
hooks on one side of the bracket into square holes in the vertical rack.
4 Press down until the blue push button pops out and clicks.
Figure 2-1. OU Mounting Bracket Installation

To install the 2161DS-2/4161DS Remote Console Switch 1U four point
switch mounting bracket:
1 Remove the screws on each side of the 1U four-point switch and set
them aside to attach to the front 1U bracket pieces later.
2 Line up the vent holes in the “long side” of the kit’s front brackets with
the vent holes in the switch.
NOTE: The switch vent holes must not be covered by the bracket, which will occur
if installed on the wrong side of the switch.
12

Installation

3 Line up the screw holes in the bracket with the screw holes in the switch.
4 With a Phillips screwdriver, fasten the front mounting brackets to the
switch using two screws on each side.
5 Attach four cage nuts or clip nuts to the rack mounting flange of the
rack cabinet’s front so that the nut is positioned on the inside of the
rack.
6 Mount the switch assembly to the rack cabinet by matching the holes in
the “short side” of each bracket to an appropriate set of matching holes
on your rack cabinet. Next, insert the combination hex head screws
through the slots in the bracket, then the holes in the mounting rail, and
then into the cage nuts or clip nuts.
7 Attach four cage nuts or clip nuts to the rack mounting flange of the
rack cabinet back so that the nut is positioned on the inside of the rack.
8 Slide the rear brackets into the channel of the front brackets adjusting
them to fit the rack depth.
9 Mount the rear bracket to the rack cabinet by matching the holes in the
“short side” of each bracket to an appropriate set of matching holes on
your rack cabinet, ensuring the switch is level within the rack.
10 Insert the combination hex head screws through the slots in the bracket
and the holes in the mounting rail, then into the cage nuts or clip nuts.

Installation

13

Figure 2-2.

2161DS-2/4161DS Remote Console Switch 1U Mounting Bracket Installation

To install the 2321DS Remote Console Switch mounting bracket:
1 Remove the three truss head screws from the right side of the switch
chassis, and position and attach the right mounting bracket to the right
side of the switch chassis with three of the flat head screws provided.
NOTE: The switch vent holes must not be covered by the bracket, which will occur
if installed on the wrong side of the switch.
2 Repeat the procedure for the left side of the switch chassis.
3 Install a push nut to one end of the cable support rod. Position the
extensions with their slotted mounting flanges facing in opposing
directions.
4 Select a position hole on the lower side of the slide extensions. Slide the
support rod through the selected hole and the hole on the opposite
extension.
5 Install the remaining push nut on the other end of the cable support rod.
6 Slide the extension assembly into the switch chassis/bracket assembly as
shown in the illustration. Be sure to orient the extension assembly so that
the cable support rod is in the lower row of extension holes.

14

Installation

7 Place the complete switch chassis/bracket assembly into a level rack
position and install the appropriate hardware into each of the four bracket
corners (hardware not provided).
Figure 2-3. 2321DS Remote Console Switch Mounting Bracket Installation

Installing the Remote Console Switch Unit
The diagram below illustrates one possible configuration for your Remote
Console Switch appliance. Follow the detailed set of procedures following
Figure 2-4 to successfully install your Remote Console Switch unit.

Installation

15

Figure 2-4. Basic Remote Console Switch Configuration

2

1

7
4
3

6

5

8

Table 2-1. Basic Remote Console Switch Configuration Descriptions
Number

Description

Number Description

1

Power Cord

6

Servers 2-16

2

Analog User

7

ARI Port

3

Digital User

8

SIP or IQ Module

4

Network

9

Server 1

5

USB Devices

16

Installation

9

CAUTION: To reduce the risk of electric shock or damage to your equipment, do
not disable the power cord grounding plug. The grounding plug is an important
safety feature. Plug the power cord into a grounded (earthed) outlet that is easily
accessible at all times. Disconnect the power from the unit by unplugging the
power cord from either the electrical outlet or the unit.
NOTE: If the building has 3-phase AV power, ensure that the computer and monitor
are on the same phase to avoid potential phase-related video and/or keyboard
problems.
NOTE: The maximum supported cable length from switch to device is 30 meters.
To install the Remote Console Switch hardware:
NOTE: The default username is “Admin.” There is no default password.
1 Connect a terminal or PC running the terminal emulation software to
the configuration port on the back panel of the Remote Console Switch
using the supplied serial cable. The terminal should be set to 9600 baud,
8 bits, 1 stop bit, no parity, and no flow control.
2 Plug the supplied power cord into the back of the Remote Console
Switch unit and then into an appropriate power source.
3 When the power is switched on, the Power indicator on the rear of the
unit will blink for 30 seconds while performing a self-test. Press the
 key to access the main menu.

Installation

17

Figure 2-5. Main Menu

To configure the Remote Console Switch hardware:
1 You will see the Main menu with eleven options. Select option 1,
Network Configuration.

18

Installation

Figure 2-6. Network Configuration Menu

2 Select option 1 to set your network speed. Once you enter your
selection, you will be returned to the Network Configuration menu.
3 Select option 2 to open the IP Configuration menu.
4 Type the appropriate number to select one of the following types of IP
addresses: 1: None, 2: IPv4 Static, 3: IPv4 Dynamic, 4: IPv6 Static, or 5:
IPv6 Dynamic.
Dell recommends using a static IP address for ease of configuration.
5 Select options 3-5 from the Terminal Applications menu, in turn, to
finish configuring your Remote Console Switch for IP address, Netmask,
and Default Gateway.
6 Once this is completed, type Ø to return to the main menu.
NOTE: Network configuration can also be performed. See "Controlling Your System
at the Analog Ports" on page 35.
To configure the HTTP and HTTPS ports:
1 You will see the Main menu with eleven options. Select option 10, Set
Web Interface Ports to open the Web Interface Port Configuration
Menu.

Installation

19

Figure 2-7. Web Interface Port Configuration Menu

2 Select option 1 to set the port numbers. Type the port numbers you wish
to use for the HTTP port and the HTTPS port.
Figure 2-8. Web Interface Port Configuration Menu - Set Ports Option

3 If the values are correct for your network, type  and press the
 key.
NOTE: You will need to reboot the Remote Console Switch to use these port
numbers.

20

Installation

NOTE: If you change the port numbers in the Remote Console Switch, you will also
need to change them in the Remote Console Switch Software (see "Switch Network
Properties" in the Dell Remote Console Switch Software User’s Guide or the help
included with the software) or the web interface (see "Launching the On-board Web
Interface" on page 32).
To input and install a web certificate:
1 You will see the Main menu with eleven options. Select option 11, Input
Web Server Certificate, to open the Input Web Server Certificate
Menu.
Figure 2-9. Web Server Certificate Input Menu

2 Select option 1, User Input.

Installation

21

Figure 2-10.

User Input Menu

3 Either press the  key to accept the default options, or enter the
appropriate text in the following fields:
a

Public Key Length: the number of bits you want the certificate to be.

b

Common Name: your name. (Since this is your root certificate, use an
appropriate name such as, "Company_Name Certificate Authority.")

c

Organizational Unit (optional): organization unit name (marketing,
for example)..

d

Organization Name: the exact legal unabbreviated name of your
organization.

e

Locality Name: the city where your organization is located.

f

State or Province Name: the unabbreviated state or province where
your organization is located.

g

Country Name: the two-letter ISO abbreviation for your country.

h

Email Address: the email address for the CA to contact.

i

Validity Term: number of days the certificate is valid.

4 Press the  key. Wait for the Web Server to restart before
continuing.
To import and install a web certificate:

22

Installation

1 You will see the Main menu with eleven options. Select option 11, Input
Web Server Certificate, to open the Input Web Server Certificate
Menu.
2 Select option 2, Import Cert. Then download a company certificate file
(*.pem). Wait for the Web Server to restart before continuing.
To export a web certificate:
1 You will see the Main menu with eleven options. Select option 11, Input
Web Server Certificate, to open the Input Web Server Certificate
Menu.
2 Select option 3, Export Cert, to output the current certificate to the serial
console. The format must be similar to the following text:
"-----BEGIN CERTIFICATE----MIIDJzCCApCgAwIBAgIBADANBgkqhkiG9w0BAQQFADBxMQswC
QYDVQQGEwJVUzEQ
............. Text removed from example
........................
3omoTQuBURERxg3vrwEzLqCUanQmw5BQJAVC6LT/DP7DNz/xi
pZoI+ZyaTgQEdR0
R0x0yYSaYETpMY53NMAVlCxETVkvkI2F/f+1sn+9Ik7GWBuPp
LbTmYfMoQ==
-----END CERTIFICATE---------BEGIN RSA PRIVATE KEY----MIICXAIBAAKBgQDI6KTaqoPfZhK7Wdd+Dzx03IVQlBqp+Vslt
n34YMDdpJ8mfqND
............. Text removed from example
........................
b6KA7VfijVhIt3lKcYsCQEhOjqh07hI5OLmSHt3l1krGZTX+A
Cy1dlceZRkJDkyA
HqTleb5fx/i1Hu5ex99qQP9FSOP5fVsmVSRDkk2ites=
-----END RSA PRIVATE KEY-----"
To return to the factory defaults:
1 You will see the Main menu with eleven options. Select option 11, Input
Web Server Certificate, to open the Input Web Server Certificate
Menu.
2 Select option 4, Restore Defaults, to replace the current certificate with
the factory defaults.
Installation

23

Video Optimization
To ensure optimal video quality, configure the Remote Console Switch with
the same settings as the network switch. For example, if the Remote Console
Switch is set to Auto-Negotiate, then the network switch must be set to AutoNegotiate in both speed and duplex. For example, if the Remote Console
Switch is set to 100MB - full duplex, then the network switch must be set to
100MB - full duplex.
Once you have made these changes, you may need to refresh/flush the
Address Resolution Protocol (ARP) tables in the network before you establish
a new connection with the Remote Console Switch, especially if the Remote
Console Switch has been in use within the hour preceding these changes.
To refresh the ARP table, do one of the following:
Wait approximately 10 minutes for the ARP tables to rebuild automatically.
-orClear the ARP table entry in a video session viewer workstation and ping the
appliance at its IP address. This can be done from a DOS window.
a

Type ARP -d 1.2.3.4
(where 1.2.3.4 is the IP address of the Remote Console Switch).

b

Type PING 1.2.3.4

If the PING is successful, the Remote Console Switch is ready for operation.

Mouse Acceleration
NOTE: Dell highly recommends that all Microsoft® Windows® systems attached to
the Remote Console Switch use the default Windows® PS/2 or USB mouse driver.
If you are experiencing slow mouse response during a remote video session,
deactivate mouse acceleration in the operating system of the target device
and set mouse speed to 50%.

Connecting a SIP
To connect a SIP to each server:
1 Locate the SIPs for your Remote Console Switch unit.
2 If you are using a PS/2 SIP connection, attach the SIP’s color-coded ends
to the appropriate keyboard, monitor, and mouse ports on the first server
you will be connecting to this Remote Console Switch. If you are using a
24

Installation

USB connection, attach the SIP’s plug to the USB port on the first
server you will be connecting to this Remote Console Switch unit
(Figure 2-11).
3 To the RJ-45 connector on the SIP, attach one end of the CAT 5 cabling
that will run from your SIP to the Remote Console Switch unit
(Figure 2-11).
4 Connect the other end of the CAT 5 cable to the desired ARI port on
the back of your Remote Console Switch unit.
5 Repeat steps 2-4 for all servers you wish to attach.
NOTE: Power down the Remote Console Switch unit before servicing. Always
disconnect the power cord from the wall outlet.
NOTE: In addition to Dell SIPs, the Remote Console Switch may also be connected
to devices using IQ modules, including Sun and Serial IQ modules.

Installation

25

Figure 2-11.

Connecting a SIP

1
2

3

Table 2-2. Connecting a SIP Descriptions
Number

Description

1

CAT 5

2

USB Connection

3

PS/2 Connection

Adding a Cascade Switch
To add a cascade switch (optional):
NOTE: The Remote Console Switch does not support the EL80-DT.
1 Mount the switch into your rack. Locate a CAT 5 cable to connect your
Remote Console Switch unit to the cascade switch (Figure 2-13).

26

Installation

2 Attach one end of the CAT 5 cabling to the ARI port on the Console
Switch.
3 Connect the other end of the CAT 5 cable to the ACI port on the back
of your cascade switch.
4 Connect the devices to your cascaded switch according to the switch
manufacturer's recommendations.
5 Repeat steps 1-4 for all the cascade switches you wish to attach to your
Remote Console Switch system.

Installation

27

Figure 2-12.

Remote Console Switch With a Cat 5 Analog Switch

1

2

3

Table 2-3. Remote Console Switch With a Cat 5 Analog Switch Descriptions
Number

Description

1

Local User

2

CAT 5

3

ACI Port

NOTE: The Remote Console Switch supports only 1 switch per ARI port. You cannot
cascade another switch under this first switch.

28

Installation

NOTE: When cascading with a Remote Console Switch, an 8-port or 16-port analog
console switch is not supported as the primary unit in a cascaded configuration.
The Remote Console Switch must be the primary unit.

Cascading with Legacy Switches
To add a legacy switch (optional):
1 Mount the switch into your rack. Locate a CAT 5 cable to connect your
Remote Console Switch unit to the legacy switch (Figure 2-13).
2 Attach one end of the CAT 5 cabling to the ARI port on the Console
Switch.
3 Connect the other end of the CAT 5 cable to a Dell SIP or IQ module.
4 Connect the SIP or IQ module to your legacy switch according to the
switch manufacturer's recommendations.
5 Repeat steps 1-4 for all the legacy switches you wish to attach to your
Remote Console Switch system.
NOTE: The Remote Console Switch supports only 1 switch per ARI port. You cannot
cascade another switch under this first switch.
NOTE: When cascading with a Remote Console Switch, an 8-port or 16-port analog
console switch is not supported as the primary unit. The Remote Console Switch
must be the primary unit.

Installation

29

Figure 2-13.
Switches

Remote Console Switch Cascading Configuration With Legacy Console

Adding a PEM (Optional)
A Port Expansion Module (PEM) allows you to expand each ARI port to
accommodate up to eight devices instead of one.
NOTE: The PEM operates passively. Therefore, once a user accesses a device
attached to a PEM, any subsequent users attempting to access any of the devices
attached to that PEM will be blocked.
NOTE: A virtual media session cannot be opened to a server that is connected to a

PEM.

To add a PEM (optional):

30

Installation

1 Mount the PEM into your rack. Using up to nine CAT 5 cables, one
connects your Remote Console Switch unit to the PEM, and the other
eight connect the PEM to the SIP attached to each device.
2 Attach one end of the CAT 5 cabling that will run between your PEM
and the Remote Console Switch unit to the RJ-45 connector slightly
separated from the other connectors on the PEM. Connect the
remaining end of the CAT 5 cable to the desired ARI port on the back of
your Remote Console Switch unit.
3 To one of the eight RJ-45 connectors grouped on the back of the PEM,
attach the CAT 5 cabling that will run between your PEM and each
device’s SIP.
4 Connect the other end of the CAT 5 cable to the first of the SIPs.
5 Repeat steps 3-4 for all devices you wish to attach.
Figure 2-14. Remote Console Switch Configuration With a PEM
Analog User

2

1
3

4

5

Installation

31

Table 2-4. Remote Console Switch Configuration With a PEM Descriptions
Number

Description

1

ARI Port

2

CAT 5e

3

PEM

4

SIP or IQ Module

5

Server

Connecting to the Network
To connect the network and power up your Remote Console Switch:
1 Connect your network cable to the LAN port on the rear of the Remote
Console Switch to your network.
NOTE: If you are using a 2321DS Remote Console Switch, you will have two

redundant LAN ports. If the first LAN port fails, the second one will take over.

2 Power up all attached systems in any order.
3 Attach your monitor and keyboard and mouse cable connectors to the
appropriate ports on the back of your Remote Console Switch unit.

On-board Web Interface Installation and Setup
Once you have installed a new Remote Console Switch, you can use the onboard web interface to configure unit parameters and launch video sessions.

Supported Browsers
The on-board web interface supports the following browsers:
•

Microsoft Internet Explorer® version 6.x SP1 or later

•

Firefox version 2.0 or later

Launching the On-board Web Interface
To launch the on-board web interface:

32

Installation

1 Open a web browser and type the IP address of the Remote Console
Switch. You can set the IP address of the switch using the OSCAR
interface or the serial port; see "Controlling Your System at the Analog
Ports" on page 35 for more information.
NOTE: If you changed the default HTTP/HTTPS ports in the serial console and are

using an IPv4 address, use this IP address format: "https://:",
where "port#" is the number you changed the port number to in the serial console. If
you are using an IPv6 address, use this format: "https://[]:",
where "port#" is the number you changed the port number to in the serial console. If
you are using an IPv6 address, you must enclose the address in square brackets.

2 The login window opens. Type your username and password and click OK.
3 The on-board web interface opens and displays the Connections tab.
NOTE: The Remote Console Switch will attempt to detect if Java is already installed
on your PC. If it is not, in order to use the on-board web interface, you will need to
install it. You may also need to associate the JNLP file with Java WebStart.

NOTE: Using the on-board web interface requires using Java Runtime Environment
(JRE) version 1.6.0_2 or higher.

NOTE: Once you have logged in to the on-board web interface, you will not have to
log in again when launching new sessions unless you have logged out or your
session has exceed the inactivity timeout specified by the administrator.

Installation

33

34

Installation

Controlling Your System at the
Analog Ports

3

The Remote Console Switch features user-side keyboard and mouse ports
that allow you to connect a USB or PS/2 keyboard and mouse for direct analog
access. The Remote Console Switch uses the powerful OSCAR interface,
which uses intuitive menus to configure your system and select computers.

Viewing and Selecting Ports and Devices
Use the OSCAR interface Main dialog box to view, configure, and control
devices in the Remote Console Switch system. View your devices by name,
port, or by the unique Electronic ID number (EID) embedded in each SIP
module.
The Port column indicates the ARI port to which a device is connected. If you
cascade a switch from the main Remote Console Switch, creating another
tier, the port numbering displays the ARI port first, then the switch port to
which the device is connected. For example, in Figure 3-1, devices 06-01, 0602, 06-03, and 06-04 are connected to switches. The port numbering displays
the ARI port first, then the switch port to which the device is connected. If
you cascade a switch from a Port Expansion Module (PEM), you will also see
multiple devices that show up on a single port.
To access the Main dialog box:
Press  to launch the OSCAR interface. The Main dialog box
displays.

Controlling Your System at the Analog Ports

35

Figure 3-1. Example of a Main Dialog Box

NOTE: You can also press the , , or  keys twice within one
second to launch the OSCAR interface. You can use this key sequence in any
place you see  throughout this chapter.

Viewing the Status of Your Switch
The status of the devices in your system is indicated in the right columns of
the Main dialog box. Table 3-1 describes the status symbols.
Table 3-1. OSCAR Interface Status Symbols
Symbol

Description
SIP is online.
SIP is offline or is not operating properly.
Connected switch is online.
Connected switch is offline or is not operating properly.
SIP is unavailable.
(green letter) Indicates which user channel is currently
connected to a SIP.

36

Controlling Your System at the Analog Ports

Table 3-1.

OSCAR Interface Status Symbols

Symbol

Description
(black letter) Indicates a blocked path. For instance, in
Figure 3-1, user C is viewing Forester, but is blocking access to
Acton, Barrett, and Edie, which are connected to the same
ARI port.
(blue letter) Indicates a virtual media connection.

Selecting Devices
Use the Main dialog box to select devices. When you select a device, the
appliance reconfigures the keyboard and mouse to the proper settings for that
device.
To select devices:
Double-click the device name, EID, or port number.
-orIf the display order of your device list is by port (Port button is depressed),
type the port number and press .
-orIf the display order of your device list is by name or EID number (Name or
EID button is depressed), type the first few characters of the name of the
device or the EID number to establish it as unique and press .
NOTE: You can connect to the selected device by pressing .
To select the previous device:
Press  and then . This key combination toggles
between the previous and current connections.
To disconnect the user from a device:
Press  and then  or click Disconnect in the OSCAR
interface. This leaves the user in a free state, with no device selected. The
status flag on your desktop displays Free.

Soft Switching
Soft switching is the ability to switch devices using a hot key sequence. You
can soft switch to a device by pressing  and then typing the

Controlling Your System at the Analog Ports

37

first few characters of its name or number. If you have set a Screen Delay
Time and you press the key sequences before that time has elapsed, the
OSCAR interface will not display.
To set a screen delay time:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Menu. The Menu dialog box displays.
3 For Screen Delay Time, type the number of seconds of delay desired
before the Main dialog box is displayed after you press .
4 Click OK.
To soft switch to a device:
1 To select a device, press . If the display order of your device
list is by port (Port button is depressed), type the port number and press
.
-orIf the display order of your device list is by name or EID number (Name or
EID button is depressed), type the first few characters of the name of the
device or the EID number to establish it as unique and press .
2 To switch back to the previous device, press  then
.

Navigating the OSCAR Interface
Table 3-2 describes how to navigate the OSCAR interface using the keyboard
and mouse.
NOTE: You can also press the , , or  keys twice within one
second to launch the OSCAR interface. You can use this key sequence in any
place you see  throughout this chapter.

38

Controlling Your System at the Analog Ports

Table 3-2.

OSCAR Interface Navigation Basics

This Keystroke

Does This

,
Ctrl-Ctrl, ShiftShift and/or AltAlt

The OSCAR interface activation sequence. By default,  and Ctrl-Ctrl are set as the OSCAR interface
activation options. Shift-Shift and Alt-Alt must be set within
OSCAR interface before use.



Press  twice to send the 
keystroke to the currently selected device.

F1

Opens the Help screen for the current dialog box.

Escape

Closes the current dialog box without saving changes and returns
to the previous one. In the Main dialog box, it closes the
OSCAR interface and returns to the status flag. In a message
box, it closes the pop-up box and returns to the current dialog
box.

Alt+Hotkey

Opens dialog boxes, selects or checks options, and executes
actions when used with underlined letters.

Alt+X

Closes the current dialog box and returns to the previous one.

Alt+O

Selects the OK button, then returns to the previous dialog box.

Click, Enter

In a text box, selects the text for editing and enables the left-and
right-arrow keys to move the cursor. Press  to select the
entire field contents.

Enter

Completes a switch in the Main dialog box and exits the
OSCAR interface.

,
Backspace

Toggles back to previous selection.

,
Alt+0

Immediately disengages a user from a server; no server is
selected. Status flag displays Free. (This only applies to the 0
on the keyboard and not the keypad.)

,
Pause

Immediately turns on screen saver mode and prevents access to
that specific console, if it is password protected.

Up/Down Arrows

Moves the cursor from line to line in lists.

Right/Left Arrows Moves the cursor within the column when editing a text box.

Controlling Your System at the Analog Ports

39

Table 3-2. OSCAR Interface Navigation Basics (continued)
This Keystroke

Does This

Page Up/Page
Down

Pages up and down through Name and Port lists and Help pages.

Home/End

Moves the cursor to the top or bottom of a list.

Delete

Deletes current selection in the scan list or characters in a text
box.

Numbers

Type from the keyboard or keypad.

Configuring OSCAR Interface Menus
You can configure your Remote Console Switch from the Setup menu within
the OSCAR interface. Select the Names button when initially setting up your
appliance to identify devices by unique names. Select the other setup features
to manage routine tasks for your devices from the OSCAR interface menu.
See Table 3-3.
Table 3-3. Setup Features to Manage Routine Tasks for Your devices
Feature

Purpose

Menu

Change the device listing between numerically by port or EID
number and alphabetically by name. Change the Screen Delay
Time before the OSCAR interface displays after pressing
.

Security

Set passwords to restrict device access. Enable the screen saver.

Flag

Change display, timing, color, or location of the status flag.

Language

Choose the language display.

Devices

Identify the appropriate number of ports on an attached
cascaded switch.

Names

Identify devices by unique names.

Keyboard

Choose your keyboard country code.

Broadcast

Set up to simultaneously control multiple devices through
keyboard and
mouse actions.

40

Controlling Your System at the Analog Ports

Table 3-3.

Setup Features to Manage Routine Tasks for Your devices (continued)

Feature

Purpose

Scan

Set up a custom scan pattern for up to 100 devices.

Switch

Choose the switch mode and the share mode time-out.

Network

Choose your network speed, transmission mode, and
configuration.

VMedia

Set the behavior of the appliance during a virtual media session.

PDUs (For 2321DS View which PDUs are connected to your system.
Remote Console
Switch only.)

To access the Setup menu:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup. The Setup dialog box displays.
Figure 3-2. Setup Dialog Box

Changing the Display Behavior
Use the Menu dialog box to change the display order of devices, set a Screen
Delay Time for the OSCAR interface, and change the OSCAR interface
launch sequence. The display order setting alters how devices display in
several screens including the Main, Devices, and Broadcast dialog boxes.
Controlling Your System at the Analog Ports

41

To access the Menu dialog box:
1 Click Setup - Menu in the Main dialog box. The Menu dialog box
displays.
Figure 3-3. Menu Dialog Box

2 , Ctrl-Ctrl, Alt-Alt, and Shift-Shift are selectable to
launch the OSCAR interface. One or all of the above keyboard
combinations can be selected at a time. If only one keyboard combination
is selected, it cannot be de-selected until a second one is chosen.
To choose the default display order of devices:
1 Select Name to display devices alphabetically by name.
or
Select EID to display devices numerically by EID number.
or
Select Port to display devices numerically by port number.
2 Click OK.
To set a Screen Delay Time for the OSCAR interface:
1 Type in the number of seconds (0 to 9) to delay the OSCAR interface display
after you press . Enter 0 to launch the OSCAR interface
without delay.
2 Click OK.

42

Controlling Your System at the Analog Ports

By setting a Screen Delay Time, you can complete a soft switch without
displaying the OSCAR interface. To perform a soft switch, see "Soft
Switching" on page 37 in this chapter.

Setting Console Security
The OSCAR interface enables you to set security on your analog port console.
You can establish a screen saver mode that engages after your console remains
unused for a specified Inactivity Time. After it is engaged, your console
remains locked until you press any key or move the mouse. You must type in
your password to continue.
Use the Security dialog box to lock your console with password protection, set
or change your password, and enable the screen saver.
To access the Security dialog box:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Security. The Security dialog box displays.
Figure 3-4. Security Dialog Box

NOTE: If the New and Repeat fields contain six asterisks, a password has already
been established.
To set or change the password:
NOTE: If you lose or forget your password, please contact Dell Technical Support.
See Appendix F: Technical Support for contact information.

Controlling Your System at the Analog Ports

43

1 Click in the New text box.
2 Type the new password in the New text box. Passwords must contain both
alpha and numeric characters, are case sensitive, and may be up to 12
characters long. Legal characters are: A to Z, a to z, 0 to 9, and hyphen.
3 In the Repeat box, type the password again.
4 Click OK to change only your password, and then close the dialog box.
To password protect your console:
1 Set your password as described in the previous procedure.
2 Select Enable Screen Saver.
3 Type the number of minutes for Inactivity Time (from 1 to 99) to delay
activation of password protection and the screen saver feature.
4 For Mode, select Energy if your monitor is ENERGY STAR® compliant;
otherwise select Screen.
CAUTION: Monitor damage can result from the use of Energy mode with
monitors not compliant with Energy Star®.
5 (Optional) Click Test to activate the screen saver test, which lasts 10
seconds then returns you to the Security dialog box.
6 Click OK.
To log in to your console:
1 Press any key or move the mouse.
2 The Password dialog box displays. Type your password, then click OK.
3 The Main dialog box displays if the password was entered properly.
To remove password protection from your console:
1 From the Main dialog box, click Setup - Security.
2 In the Security dialog box, click in the New box. Leave the box blank. Press
.
3 Click in the Repeat box. Leave the box blank.
4 Click OK to eliminate your password.
To enable the screen saver mode with no password protection:

44

Controlling Your System at the Analog Ports

1 If your console does not require a password to gain access to the Security
dialog box, proceed to step 2.
or
If your console is password protected, see the previous procedure, then go
to step 2.
2 Select Enable Screen Saver.
3 Type the number of minutes for Inactivity Time (from 1 to 99) to delay
activation of the
screen saver.
4 Choose Energy if your monitor is ENERGY STAR® compliant; otherwise
select Screen.
CAUTION: Monitor damage can result from the use of Energy mode with
monitors not compliant with Energy Star®.
5 (Optional) Click Test to activate the screen saver test, which lasts 10
seconds then returns you to the Security dialog box.
6 Click OK.
NOTE: Activation of the screen saver mode disconnects the user from a device; no
device is selected. The status flag displays the status “Free.”
To exit the screen saver mode:
Press any key or move your mouse. The Main dialog box displays and any
previous device connection is restored after the password is validated by the
appliance.
To turn off the screen saver:
1 In the Security dialog box, clear Enable Screen Saver.
2 Click OK.
To immediately turn on the screen saver:
Press , then press .

Controlling the Status Flag
The status flag displays on your desktop and shows the name or EID number
of the selected device or the status of the selected port. Use the Flag dialog
box to configure the status flag to display by device name or EID number, or
to change the status flag color, opacity, display time, and location on the
desktop.
Controlling Your System at the Analog Ports

45

To access the Flag dialog box:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Flag. The Flag dialog box displays.
Figure 3-5. Flag Dialog Box

To determine how the status flag is displayed:
1 Select Name or EID to determine what information will be displayed.
2 Select Displayed to show the status flag.
3 (Optional) Select Timed to display the status flag for only five seconds
after switching.
4 Select a status flag color in Display Color.
5 In Display Mode, select Opaque for a solid color status flag or select
Transparent to see the desktop through the status flag.
6 To position the status flag on the desktop:

46

a

Click Set Position to gain access to the Set Position Flag screen.

b

Click on the title bar and drag to the desired location.
-orUse the left and right arrows to nudge the status flag to the desired
location and press .

c

Right-click to return to the Flag dialog box.

Controlling Your System at the Analog Ports

NOTE: Changes made to the status flag position are not saved until you click OK in
the Flag dialog box.
7 Click OK to save settings.
or
Click X to exit without saving changes.

Setting the Interface Language
You can change the OSCAR interface to any one of 4 supported languages by
selecting your chosen language in the Language dialog box.
To change the OSCAR interface language:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Language. The Language dialog box displays.
Figure 3-6. Language Dialog Box

3 Click to select the language you want the OSCAR interface to appear in.
4 Click OK to accept the change you have made and return to the Setup
dialog box. The Setup dialog box displays in the language you have
selected.

Assigning Device Types
The Remote Console Switch automatically discovers cascaded KVM
switches, but you need to specify the number of ports on the cascaded switch
through the Devices dialog box. An Sw-8 or Sw-24 in the Type category for
Controlling Your System at the Analog Ports

47

the cascaded switch is visible on screen. When you select from the list, the
Modify button is enabled, allowing you to assign it the appropriate number of
ports.
NOTE: The Modify button is available only if a configurable switch is selected.
To access the Server dialog box:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Devices. The Devices dialog box displays.
Figure 3-7. Devices Dialog Box

When the Remote Console Switch discovers a cascaded switch, the port
numbering changes to accommodate each device under that switch. For
example, if the switch is connected to ARI port 6, the switch port is listed as
06 and each device under it is numbered sequentially 06-01, 06-02 and so on.
NOTE: Changes made in the Device Modify dialog box are not saved until you click
OK in the Devices dialog box.
To assign a device type:
1 In the Devices dialog box, select the desired port number.
2 Click Modify. The Device Modify dialog box displays.

48

Controlling Your System at the Analog Ports

Figure 3-8. Device Modify Dialog Box

3 Choose or enter the number of ports supported by your cascaded switch
and click OK.
4 Repeat steps 1 to 3 for each port requiring a device type to be assigned.
5 Click OK in the Devices dialog box to save settings.

Assigning Device Names
Use the Names dialog box to identify individual devices by name rather than
by port number. The Names list is always sorted by port order. Names are stored
in the SIP module, so even if you move the SIP/server to another ARI port, the
name and configuration is recognized by the switch.
NOTE: If a device is turned off, the respective SIP module does not appear in the
Names list.
To access the Names dialog box:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Names. The Names dialog box displays.
NOTE: If the server list changes, the mouse cursor turns into an hourglass as the
list is automatically updated. No mouse or keyboard input is accepted until the list
update is complete.
NOTE: If a SIP module is not assigned a name, the EID is used as the default name.
To assign names to devices:

Controlling Your System at the Analog Ports

49

1 In the Names dialog box, select a device name or port number and click
Modify. The Name Modify dialog box displays.
2 Type a name in the New Name box. Names of devices may be up to 15
characters long. Legal characters include: A to Z, a to z, 0 to 9, space and
hyphen.
3 Click OK to transfer the new name to the Names dialog box. Your
selection is not saved until you click OK in the Names dialog box.
4 Repeat steps 1 to 3 for each device in the system.
5 Click OK in the Names dialog box to save your changes.
or
Click X or press  to close the dialog box without saving changes.

Configuring Network Settings
You can change the network settings for your Remote Console Switch via the
serial port or from the Network dialog box.
From the Network dialog box, you can choose either IPv4 (default) or IPv6
mode. You will be able to change the following network settings: IP Address,
Netmask (when using IPv4 mode) or Prefix Length (when using IPv6 mode),
and Gateway. You will also be able to choose a Network Speed, a
Transmission Mode, and whether to assign a Static (default) IP address or,
when appropriate, a Dynamic IP address to the Remote Console Switch.

50

Controlling Your System at the Analog Ports

Figure 3-9. Network (IPv4 Mode) Dialog Box

Figure 3-10. Network (IPv6 Mode) Dialog Box

Once you have made changes to the network settings, click OK. The Remote
Console Switch will reboot.

Configuring Virtual Media Settings
For how to configure virtual media settings, see "Virtual Media" on page 89.

Controlling Your System at the Analog Ports

51

Displaying Version Information
The OSCAR interface enables you to display the versions of the Remote
Console Switch and the SIP module firmware. For optimum performance,
keep your firmware current. For more information, see "Appendix D: FLASH
Upgrades" on page 211.
To display version information:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Commands - Display Versions. The Version dialog box displays. The
top half of the box lists the subsystem versions in the appliance.
Figure 3-11.

Version Dialog Box

3 Click the SIP button to view individual SIP module version
information.The SIP Select dialog box displays.
4 Select a SIP module to view and click the Version button. The SIP Version
dialog box displays.
5 Click X to close the SIP Version dialog box.

Scanning Your System
In scan mode, the appliance automatically scans from port to port (device to
device). You can scan up to 100 devices, specifying which devices to scan, and
the number of seconds that each device displays. The scanning order is
52

Controlling Your System at the Analog Ports

determined by placement of the device in the list. The list is always shown in
scanning order. You can, however, choose to display the device name or EID
number by pressing the appropriate button.
To add devices to the scan list:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Scan. The Scan dialog box displays.
Figure 3-12. Scan Dialog Box

3 The dialog box contains a list of all devices attached to your appliance.
Click the checkbox next to the devices you wish to scan.
or
Double-click on a device name or port.
or
Press  and the number of the device you wish to scan. You can select
up to 16 devices from the entire list.
4 In the Time box, type the number of seconds (from 3 to 99) of desired
time before the scan moves to the next device in the sequence.
5 Click OK.
To remove a device from the scan list:

Controlling Your System at the Analog Ports

53

1 In the Scan dialog box, select the device to be removed.
or
Double-click on the device name or port.
or
Click the Clear button to remove all devices from the scan list.
2 Click OK.
To start the scan mode:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Commands. The Commands dialog box displays.
3 Select Scan Enable in the Commands dialog box.
4 Click X to close the Commands dialog box.
NOTE: If the Add/Remove button is clicked when a device is highlighted, the check
box corresponding to the highlighted device toggles state.
To cancel scan mode:
1 Select a device if the OSCAR interface is open.
or
Move the mouse or press any key on the keyboard if the OSCAR interface
is not open. Scanning stops at the currently selected device.
or
Press . The Main dialog box will appear.
2 Click Commands. The Commands dialog box displays.
3 Clear Scan Enable.

Setting the Preemption Warning
Administrators and users with equal or higher access rights than current user
can preempt (disconnect) KVM sessions and take control of the target device.
You can choose whether or not to warn the first user that the session will be
preempted and specify how long the appliance will wait for the first user to
respond to the warning.
To view or change the preemption warning settings, complete the following
steps:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
54

Controlling Your System at the Analog Ports

2 Click Setup > Preempt.
3 Enter a number of seconds in the Timeout Seconds field.
•

If you enter a value of 0 to 4 seconds, the first user will not be warned
before the session is preempted.

•

If you enter a value of 5 to 120 seconds, the first user will be warned
and will be allowed to continue using the target device for up to the
amount of time in the Timeout Seconds field. The session will be
preempted when the user clicks OK, or when the specified time
elapses.

Figure 3-13. Preempt Dialog Box

4 Click OK to save the settings.

Displaying Configuration Information
You can view the configuration of your Remote Console Switch from the
Configuration dialog box. This dialog box provides you with quick access to
the settings you have entered and allows you to add additional features by
clicking the License Key button and typing the license key for any additional
features.
NOTE: If there are no features that require a license in the firmware, the button is
grayed out.
To view system configuration:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Configuration. The Configuration dialog box is displayed.

Controlling Your System at the Analog Ports

55

3 Click License Key to add a license key and enable a new feature or click X
to close the Configuration dialog box and return to the Setup dialog box.

Running System Diagnostics
You can validate the integrity of your system through the Run Diagnostics
command. This command checks the main board functional subsystems
(memory, communications, switch control, and the video channels) for each
system controller. When you select the Run Diagnostics option, you receive a
warning indicating that all users (remote and local) will be disconnected.
Click OK to confirm and begin the test.
The Diagnostics dialog box displays. The top section of the dialog box
displays the hardware tests. The bottom portion divides the tested SIP
modules into three categories: On-line, Offline, or Suspect.
NOTE: A SIP module may appear to be offline while it is being upgraded.
Figure 3-14.

Diagnostics Dialog Box

As each test is finished, a pass (green circle) or fail (red x) symbol displays to
the left of each item as that test finishes. The following table details each of
the tests.
Table 3-4. Diagnostic Test Details
Test

Description

Firmware CRCs

Reports on the condition of the switch firmware file

56

Controlling Your System at the Analog Ports

Table 3-4.

Diagnostic Test Details

Test

Description

Remote User Video

Reports on whether a digital video channels are installed but
not working

LAN Connection

Indicates whether LAN connection is active and whether
traffic has been seen since the last run of diagnostics.

On-line SIP modules

Indicates the total number of currently connected and
powered SIP modules

Offline SIP modules

Indicates the number of SIP modules that were connected
successfully in the past and are turned off

Suspect SIP modules

Indicates the number of SIP modules that were detected, but
are either unavailable for connection or dropped packets
during the ping tests

To run diagnostic tests:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Commands - Run Diagnostics. A warning message displays
indicating that all users will be disconnected.
3 Click OK to begin diagnostics.
or
Click X or press  to exit the dialog box without running a
diagnostic test.
4 All users are disconnected and the Diagnostics dialog box displays.
5 As each test is finished, a pass (green circle) or fail (red x) symbol displays.
The test is complete when the last test’s symbol displays.

Broadcasting to Servers
The analog user can simultaneously control more than one server in a system
to ensure that all selected servers receive identical input. You can choose to
broadcast keystrokes and/or mouse movements independently.
NOTE: You can broadcast up to 16 devices at a time, one device per ARI port.

Controlling Your System at the Analog Ports

57

NOTE: Broadcasting Keystrokes - The keyboard state must be identical for all
devices receiving a broadcast to interpret keystrokes identically. Specifically, the
 and  modes must be the same on all keyboards. While the
appliance attempts to send keystrokes to the selected devices simultaneously,
some devices may inhibit and thereby delay the transmission.
NOTE: Broadcasting Mouse Movements - For the mouse to work accurately, all
systems must have identical mouse drivers, desktops (such as identically placed
icons), and video resolutions. In addition, the mouse must be in exactly the same
place on all screens. Because these conditions are extremely difficult to achieve,
broadcasting mouse activity to multiple systems may have unpredictable results.
To access the Broadcast dialog box:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - Broadcast. The Broadcast dialog box displays.
Figure 3-15.

Broadcast Dialog Box

To broadcast to selected devices:
1 From the Broadcast dialog box, select the mouse and/or keyboard
checkboxes for the devices that are to receive the broadcast commands.
or
Press the up-arrow or down-arrow keys to move the cursor to the target
device. Then press  to select the keyboard checkbox and/or
 to select the mouse checkbox. Repeat for additional devices.
58

Controlling Your System at the Analog Ports

2 Click OK to save the settings and return to the Setup dialog box. Click X
or press  to return to the Main dialog box.
3 Click Commands. The Commands dialog box displays.
4 Click the Broadcast Enable checkbox to activate broadcasting. The
Broadcast Enable Confirm/Deny dialog box displays.
5 Click OK to enable the broadcast. Click X or press  to cancel
and return to the Commands dialog box.
6 If broadcasting is enabled, type the information and/or perform the mouse
movements that you would like to broadcast from the user station. Only
devices in the list are accessible.
NOTE: Any other user is disabled when broadcast mode is enabled.
To turn broadcasting off:
From the Commands dialog box, clear the Broadcast Enable checkbox.

Power Controlling Devices
You can control supported PDUs through the OSCAR interface.
NOTE: This feature is only available on the 2321DS Remote Console Switch.

Power window
Through the Power window, you can view which outlets control which devices
and whether the outlet is on or off. You can also turn on, turn off or cycle
power to a selected device. The status of each outlet is indicated by one or
more status symbols in the right column. The following table describes the
status symbols.
Table 3-5.
Symbol

Power Window Status Symbols
Description
Outlet is on.
Outlet is off.
Outlet is waiting to go on.

Controlling Your System at the Analog Ports

59

Symbol

Description
Outlet is waiting to go off.

To turn on, turn off or cycle power to a device:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Commands - Power.
3 Select the device you wish to control.
NOTE: Multiple devices may be selected.
4 Click On, Off, or Cycle, as appropriate.

PDUs window
Through the PDUs window, you can view which PDUs are connected to your
system. The status of each PDU is indicated by one or more status symbol in
the right column. The following table describes the status symbols.
Table 3-6. PDUs Window Status Symbols
Symbol
Description
Outlet is online.
Outlet is offline.
Outlet is overloaded.

To view connected PDUs:
Open the PDUs window. The window contains a listing of all PDUs attached
to your system.

PDU Settings window
From the PDUs window, you can view the PDU Settings window, which
allows you to view and modify PDU parameters.
To view/modify PDU settings:
60

Controlling Your System at the Analog Ports

1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - PDUs.
3 Complete one of the following steps:
Select a PDU name, then click Settings to open the PDU Settings window.
-orSelect a PDU name, then press  to open the PDU Settings
window.
-orDouble-click on the PDU name to open the PDU Settings window.
4 Complete any of the following steps:
a

In the Name field, enter the PDU name.

b

In the Cycle Delay field, enter the number of seconds you want the
Remote Console Switch to wait between turning off and turning on.

5 Click OK.

PDU Inlets window
From the Inlets window, you can view and modify inlet parameters.
NOTE: You can only modify inlet parameters on a PDU that is currently online.
To view/modify PDU Inlet settings:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - PDUs.
3 Complete one of the following steps:
Select a PDU name, then click Settings to open the PDU Settings window.
-orSelect a PDU name, then press  to open the PDU Settings
window.
-orDouble-click on the PDU name to open the PDU Settings window.
Controlling Your System at the Analog Ports

61

4 Click Inlets.
5 Enter an integer in the Minimum Amps or Maximum Amps fields.
6 Click OK.

PDU Outlets window
From the Outlets window, you can select an outlet and open the Outlet
Settings window to set outlet-specific parameters.
NOTE: You can only modify outlet parameters on a PDU that is currently online.
To view/modify PDU Outlet settings:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - PDUs.
3 Complete one of the following steps:
Select a PDU name, then click Settings to open the PDU Settings window.
-orSelect a PDU name, then press  to open the PDU Settings
window.
-orDouble-click on the PDU name to open the PDU Settings window.
4 Click Outlets.
5 Complete one of the following steps:
Select an outlet, then click Settings to open the Outlet Settings window.
-orSelect an outlet, then press  to open the Outlet Settings window.
-orDouble-click an outlet to open the Outlet Settings window.
6 Select the outlet you wish to modify.
7 Complete any of the following steps:
a

62

In the Name field, enter the Outlet name.
Controlling Your System at the Analog Ports

b

In the Power-On Interval field, enter the number of seconds you want
the Remote Console Switch to wait between turning off and turning
on.

NOTE: The Power-On Interval must be an integer between 0 and 7200.
8 Click OK.

Controlling Your System at the Analog Ports

63

64

Controlling Your System at the Analog Ports

4

Using the Viewer

You can connect to a server in the Remote Console Switch system using the
Viewer. The Viewer allows you full keyboard, monitor and mouse control over
a server.
You can also scan through a customized list of servers by enabling individual
servers to appear in the Thumbnail Viewer. This view contains a series of
thumbnail frames, each containing a small, scaled, non-interactive version of
a server's screen image. For more information, see "Viewing Multiple Servers
Using the Scan Mode" on page 77.
You can launch the Viewer from the Remote Console Switch Software or the
on-board web interface. This chapter describes how to use the Viewer from
the on-board web interface. For how to use the Viewer from the Remote
Console Switch Software, see the Dell Remote Console Switch Software
User’s Guide or the help included with the software.

Accessing Servers from the On-board Web
Interface
The Connections tab in the on-board web interface allows you to view the
connected servers and their status. You may click on a server name to launch the
Viewer.
For how to launch the on-board web interface, see "Launching the On-board
Web Interface" on page 32.
Table 4-1.
Symbol

On-board Web Interface Server Status Symbols
Description
Server is online
Server is offline
Server is unavailable

Using the Viewer

65

Figure 4-1. On-board Web Interface - Connections Tab

Interacting With the Server Being Viewed
Once you have connected to a server, you will see the desktop window of the
server on your screen. This opens in a separate window. You will see two
cursors, the local cursor and the server’s cursor. You may need to align these if
they do not move together or adjust the video if they seem to jump about.
From this window, you will be able to access all the normal functions of this
server as if you were sitting right in front of it. You may also perform Viewerspecific tasks such as sending special macro commands to the server.
NOTE: If you are experiencing slow mouse response during a remote video
session, deactivate mouse acceleration in the operating system of the target device
and set mouse speed to 50%.

66

Using the Viewer

Viewer Window Features
Figure 4-2. Viewer Window

A

Menu bar: Access many of the features in the Viewer.

B

Accessed server desktop: Interact with your server through this
window.

Viewer Menu bar
Figure 4-3. Viewer Menu Bar

A

Thumbtack: Click to lock the menu bar in place. This prevents the
menu bar from hiding once you have moved the mouse cursor away
from the menu bar.

B

Menu Options: The menus provides access to functions available
through the Viewer.

C

Toolbar Buttons: You may add up to 10 buttons to the tool bar.
These buttons allow you to provide easy access to defined functions
Using the Viewer

67

and keyboard macros. By default, the Align Local Cursor, Refresh
Image, and Single Cursor Mode buttons are displayed.
D

Connection Status Indicator: The connection status indicator
indicates how the user is connected to the appliance for this server.
For more information see "Connection Sharing" on page 86.
Connection Status Indicator

Sharing Mode
Exclusive Mode

Active Connection
(normal, non-sharing,
non-exclusive session)
Active Sharing (Primary User)
Active Sharing (Secondary User)
Passive Sharing

Stealth Mode

Adjusting the Viewer
You can adjust the Viewer settings to match your requirements. This includes
adjustment of the video resolution, toolbar settings, and keyboard macro
settings.
Adjusting the Viewer Toolbar

You may add up to 10 buttons to the toolbar. These buttons allow you to
provide easy access to defined function and keyboard macros. By default, the
Align Local Cursor, Refresh Image, and Single Cursor Mode buttons are
displayed.
To add buttons to the toolbar:

68

Using the Viewer

1 From the Tools menu in the Viewer, choose Session Options. The Session
Options toolbar is displayed.
2 Click the Toolbar tab.
3 Click to select the items you want to add to the Viewer toolbar.
4 Click OK to accept the changes and return to the Viewer main window.
Figure 4-4. Session Options Dialog Box - Toolbar Tab

Setting the Toolbar Hide Delay Time

Unless the Thumbtack button has been clicked, the toolbar will disappear
when you remove the mouse cursor. You can change the interval between the
removal of the mouse cursor and the disappearance of the toolbar by
adjusting the Toolbar Hide Delay time.
To change the Toolbar Hide Delay time:
1 From the Tools menu in the Viewer, choose Session Options. The Session
Options toolbar is displayed.
2 Click the Toolbar tab.
3 In the Toolbar Hide Delay field, type the number of seconds for which you
want the toolbar to display, after the mouse cursor is removed.
- or -

Using the Viewer

69

Using the Up and Down button, click to increase or decrease the number
of seconds for which you want the toolbar to display, after the mouse
cursor is removed.
4 Click OK to accept the change you have made and return to the Viewer
main window.
Expanding and Refreshing Your Viewer

By default, there are three buttons that display on the Viewer toolbar that
allow you to adjust the Viewer display. The first button allows you to set the
Viewer to Single Cursor Mode. This allows you to use the mouse in the
Viewer as if it was the mouse on the server. When the Viewer is set to Single
Cursor mode the local cursor is not displayed.
NOTE: Single Cursor mode operates on Windows platforms only.
The second button allows you to align the mouse cursors, and the third allows
you to refresh the video.
Figure 4-5. Viewer Toolbar- Display Adjustment Buttons

To set the Viewer to Single Cursor mode:
In the Viewer toolbar, click the Single Cursor Mode button.
To align the mouse cursors:
Click the Align Local Cursor button on the Viewer toolbar. The local cursor
will align with the cursor on the remote server.
To refresh the screen:
Click the Refresh Image button on the Viewer toolbar.
-orFrom the Viewer menu, select View - Refresh. The digitized video image will
be completely regenerated.
To enter full screen mode:
Click the Maximize button in the top right-hand corner of the Viewer.
-orFrom the Viewer menu, select View - Full Screen. The desktop window will
70

Using the Viewer

disappear and only the accessed server desktop will be visible. The screen will
be resized up to a maximum of 1024x768. If the desktop has a higher
resolution, then a black background will surround the full screen image. The
floating toolbar will appear.
To exit full screen mode:
Press  to exit full screen mode and return to the desktop window.

Adjusting the Viewer Resolution
If Auto Scale is enabled, the display automatically adjusts when the Viewer
window size changes during a session. When you access a channel using
sharing, the display adjusts to match the input resolution selected by the
primary user of that channel. This prevents the primary user's display from
being affected. If the resolution changes any time during a session, the display
is adjusted automatically.
When Full Scale is selected, the Viewer adjusts to the screen resolution of
the server and sets the screen size accordingly, up to a maximum resolution of
1024 x 768.
To adjust the size of the Viewer window:
From the menu bar, select View - Scaling - Auto Scale to allow the server
image to be scaled automatically.
or
From the menu bar, select View - Scaling - Full Scale
or
Select a screen resolution from the Scaling sub-menu.
Figure 4-6. Viewer Scaling

Using the Viewer

71

Adjusting the Video Quality
The Viewer offers both automatic and manual video adjustment capability.
Generally, the Automatic Video Adjustment will optimize the video for the
best possible view. However, you may wish to alter the video for your specific
needs. Use the slider bar for large adjustments and the Plus (+) and Minus () buttons are designed for fine-tuning adjustments. For more information on
manual video adjustment, please see Figure 4-7
Adjusting Color Depth

NOTE: The Color command may only be used by the primary user. The command is
not available to non-primary users who are sharing the session.
NOTE: If Background Refresh is enabled from the Session Options dialog, the color
depth will be set automatically to Best Color Available and cannot be changed.
The Color sub-menu allows you to set the color depths at which the digital
image can be compressed. The Remote Console Switches support the
Dambrackas Video Compression (DVC) algorithm, which enables users to
adjust the number of viewable colors in a remote session window. You may
choose to display more colors for the best fidelity, or fewer colors to reduce
the volume of data transferred on the network.
The Viewer window can be viewed using the Best Color Available (slower
updates), Best Compression (fastest updates), a combination of Best Color
and Best Compression, or in Grayscale.
The color depths of individual ports and channels can be specified by
selecting the View - Color command in a Remote Session window. These
settings are saved individually per port and channel.
To set the color depth:
From the View menu, choose Color and select a color depth from the Color
sub-menu.
To manually adjust the video quality of the Viewer window:
1 From the Viewer menu, select Tools - Manual Video Adjust. The Manual
Video Adjust dialog box appears.
2 Click the icon for the feature you wish to adjust.
3 Move the slider bar or click the Minus (-) or Plus (+) buttons to adjust
the parameter for each icon pressed. The adjustments will display
immediately in the Viewer window.
72

Using the Viewer

4 When finished, click Close to exit the Manual Video Adjust dialog box.
Manual Video Adjust Dialog Box Options
Figure 4-7. Manual Video Adjust Dialog Box

A

Image Capture Width

B

Pixel Sampling Fine Adjust

C

Image Capture Horizontal Position

D

Image Capture Vertical Position

E

Contrast

F

Brightness

G

Noise Threshold

H

Priority Threshold

I

Automatic Video Adjustment

J

Refresh Image

K

Adjustment bar

L

Video Test Pattern

M Performance Monitor
N

Close box

Using the Viewer

73

Minimizing Remote Video Session Discoloration
When establishing remote video sessions, pixel discolorations may occur due
to network conditions. This condition occurs most often with a solid color
background. This condition is minimized by using a black background. If a
color background is used, a small number of pixels on the screen will be
discolored or white.
To minimize remote video pixel discoloration:
1 From the Viewer menu, select Tools - Manual Video Adjust. The Manual
Video Adjust dialog box appears.
2 Choose contrast or brightness.
3 Incrementally, adjust the contrast and brightness until the image quality
improves.
4 A noise threshold setting is also available under Tools - Manual Video
Adjust for fine incremental adjustments.
NOTE: Reducing the noise threshold to zero causes constant video refresh, high
network usage, and a flickering video. Dell recommends that the noise threshold be
set to the highest level that allows efficient system performance, while still being
able to recover pixel colors over which the mouse cursor travels.
NOTE: When adjusting the noise threshold, use the slider bar for large adjustments
and the Plus (+) and Minus (-) buttons at the ends of the slider bar for fine-tuning.

Improving Screen Background Color Display
You may experience inconsistent color display when viewing target servers
where photographic images or color-intense gradient backgrounds have been
selected. We recommend that you select a solid color display background via
the operating system for optimal display quality and performance.
Adjusting the Mouse

The Viewer allows you to select between five different mouse cursor options,
set up mouse scaling, and resynchronize your mouse should it no longer track
properly. Dell recommends turning off the local cursor by setting the Local
Cursor option to None. This will leave only one cursor on the screen, the
remote cursor, and will simplify navigation.

74

Using the Viewer

Figure 4-8. Viewer Mouse Session Options dialog box

Setting Mouse Scaling
You can choose between three preset mouse scaling options or set your own
custom scaling. The three preset settings are: Default (1:1), High (2:1), or
Low (1:2). In a 1:1 scaling ratio, every mouse movement on the desktop
window will send an equivalent mouse movement to the server. In a 2:1
scaling, the same mouse movement will send a 2X mouse movement. In a 1:2
scaling, the value will be 1/2X.
To set custom mouse scaling:
1 From the Viewer menu, select Tools - Session Options. The Session
Options dialog box appears.
2 Click the Mouse tab.
3 Click the Custom radio button. The X and Y fields become enabled.
4 Type the mouse scaling values you wish in the X and Y fields. For every
mouse input, the mouse movements are multiplied by the respective X
and Y scaling factors. Valid input ranges are 0.25 to 3.00.

Using the Viewer

75

Minimizing Mouse Trailing
During a remote video session, as the mouse moves on the screen, some pixels
will remain discolored. This condition is referred to as mouse trailing, and is
due to varying levels of network and other noise in different environments. To
minimize mouse trailing, you may need to reduce the Noise Threshold in the
Manual Video Adjust dialog box.
To reduce the Noise Threshold:
1 From the Viewer menu, select Tools - Manual Video Adjust. The Manual
Video Adjust dialog box appears.
2 Click the Noise Adjust Threshold icon for the feature you wish to adjust.
3 Using the mouse, move the slider bar to the center of the scale, and then
down to zero.
4 Use the Plus (+) and Minus (-) buttons at the end of the slider bar to
fine-adjust the noise threshold to just above zero.
NOTE: Leaving the noise threshold at zero triggers constant video refresh,
resulting in high network usage and a flickering video. It is recommended that the
noise threshold be set at the highest level that allows efficient system performance,
while still being able to recover pixel colors that the mouse cursor travels over.
NOTE: When adjusting the noise threshold, the slider bar is used for large
adjustments and the Plus (+) and Minus (-) buttons at either end of the slider bar for
fine-tuning.

Improving Mouse Performance
If you are experiencing slow mouse response or if the mouse pointers get out
of sync during a remote video session, you may want to deactivate the mouse
acceleration in the operating system of the target server.
Microsoft Windows:
•

Turn off mouse acceleration

•

Adjust mouse speed to the exact midpoint of the slider bar.
NOTE: See the documentation included with your Windows operating system for
specific instructions.

Red Hat Linux:
1 Select the Mouse settings from the Desktop Controls.

76

Using the Viewer

2 Set Acceleration to 1.0.
3 Apply the changes and use the Align Local Cursor/Mouse button in the
Viewer to resynchronize the mouse.

Viewing Multiple Servers Using the Scan Mode
The Viewer allows you to simultaneously view multiple servers through the
Thumbnail Viewer of the Scan mode. This view contains a series of
thumbnail frames, each containing a small, scaled, non-interactive version of
a server's screen image. The server name displays below each thumbnail as
well as the status indicator.

Scanning Your Servers
Using the Thumbnail Viewer, you can set up a scan sequence of up to 16
servers to monitor your servers. The scan mode moves from one thumbnail
image to the next, logging into a server and displaying an updated server
image for a user-specified length of time (View Time Per Server), before
logging out of that server and moving on to the next thumbnail image. You
can also specify a scan delay between thumbnails (Time Between Servers).
During the delay, you will see the last thumbnail image for all servers in the
scan sequence, though you won't be logged into any servers.
An indicator light at the bottom of each frame displays the status of the
server. The default thumbnail size is based on the number of servers in the
scan list.

Using the Viewer

77

Figure 4-9. Viewer - Thumbnail Viewer

Scan mode is a lower priority than an active connection. If you have an
interactive session with a server, that server will be skipped in the scan
sequence and the scan mode will proceed to the next server. No login error
messages will appear. Once the interactive session is closed, then the
thumbnail will be included in the scan sequence again. If another user has an
active connection to a server, the server will be skipped and a red “X” will be
displayed in the indicator light below the frame.
The Remote Console Switch Software can scan connected servers on multiple
Remote Console Switches, while the on-board web interface can only scan
connected servers on a single Remote Console Switch.
NOTE: For how to use the Remote Console Switch Software, see the Dell Remote
Console Switch Software User’s Guide or the help included with the software.

78

Using the Viewer

Accessing Scan Mode from the On-board Web Interface
Figure 4-10. On-board Web Interface - Scanning Servers

To access Scan mode in the on-board web interface:
1 In the on-board web interface, click the Connections tab.
2 Select the check boxes next to the servers you want to scan.
3 Click Scan.

Thumbnail View Status Indicators
The green LED indicates that a server is currently being scanned. The red X
indicates that the last scan of the server was not successful. The scan may
have failed due to a credential or path failure (the server path on the Remote
Console Switch was not available), or because of some other reason. When
the mouse pointer is placed on the red X a tool tip appears and indicates the
reason for the failure.
Setting up your Scanning Preferences

To set scan preferences:
Using the Viewer

79

1 From the Thumbnail Viewer, select Options - Preferences. The Preferences
dialog box appears.
2 Enter the time each thumbnail will be active during the scan (10 to 60
seconds) in the View Time Per Server box.
3 Enter the length of time the scan stops between each server (5 to 60
seconds) in the Time Between Servers box.
4 Click OK.

Navigating the Thumbnail Viewer
When you highlight an individual thumbnail frame and select the
Thumbnail menu, you can launch an interactive session to that server, add
that server to the scan sequence or set the login credentials for that server.
The Options menu allows you to access scanning preferences as well as pause
the scan and set the thumbnail size for all servers.
To launch a server Video session:
1 Select a server thumbnail.
2 From the Thumbnail Viewer, select Thumbnail - [server name] - View
Interactive Session.
-orRight-click a server thumbnail and select View Interactive Session. That
server's video will be launched in an interactive Viewer window.
To enable or disable a server in the scan sequence:
1 Select a server thumbnail.
2 From the Thumbnail Viewer, select Thumbnail - [server name] - Enable.
-orRight-click a server thumbnail and select Enable. That server will be
included/excluded in the server thumbnail scan sequence.
NOTE: The Enable menu item state can be toggled from checked (enabled) to
unchecked (disabled) each time it is selected.
NOTE: If a server is being accessed by a user, the Enable menu will be disabled for
that server thumbnail.
To pause or restart a scan sequence:

80

Using the Viewer

From the Thumbnail Viewer, select Options - Pause Scan. The scan sequence
will pause at the current thumbnail if the Thumbnail Viewer has a scan in
progress or will restart the scan if currently paused.
To change the thumbnail size:
1 From the Thumbnail Viewer, select Options - Thumbnail Size.
2 Select the desired thumbnail size from the menu.

Using Macros to Send Keystrokes to the Server
The Macros menu in the Viewer allows you an easy way to send multiple
keystrokes to the server. The Viewer provides a list of default keystroke
selections for Microsoft Windows systems, Linux Systems and Sun systems.
To choose which system you are using:
Click the Macro menu in the Viewer. Select Display on Menu, and select
Windows, Linux or Sun.
To send keystrokes to the server:
Click the Macro menu in the Viewer and choose the name of the macro
containing the keystrokes you wish to send to the server. Figure 4-11,
Figure 4-12 and Figure 5-15 show the default macros.
Figure 4-11. Viewer Macro Menu Expanded - Windows Option

Using the Viewer

81

Figure 4-12.

Viewer Macro Menu Expanded - Linux Option

Figure 4-13.

Viewer Macro Menu Expanded - Sun Option

Session Options - General Tab
The General tab in the Session Options dialog box allows you to control the
Keyboard Passthrough option in non-full screen mode, the Menu Activation
Keystroke, and the Background Refresh selection.

82

Using the Viewer

The Keyboard Pass-through check box allows you to specify whether
Keyboard Pass-through mode is enabled, or not. The Keyboard Pass-through
option is not selected by default.
Figure 4-14. Session Options - General Tab

The Menu Activation Keystroke list allows you to select a keystroke that
activates the toolbar.
The Background Refresh check box allows you to specify whether background
refreshing occurs. When this option is selected the Viewer is sent a constant
stream of data from the device whether or not a change has occurred on the
device.
To change session options:
1 From the Tools menu in the Viewer, choose Session Options. The Session
Options toolbar is displayed.
2 Click the General tab.
3 Modify the session options as desired.
4 Click OK.

Screen Capturing
The Viewer allows you to capture the contents of the screen and to save it to a
file or to copy it to the clipboard.
Using the Viewer

83

To capture a screen as a file:
1 In the Viewer, choose File - Capture to File. The Save dialog is displayed.
2 Browse to the location where you want to save the file.
3 In the File Name field, type a file name and click Save.
To copy a screen to the clipboard:
In the Viewer, choose File - Capture to Clipboard. The image is saved to the
clipboard and can be pasted into a document or image editing application.
NOTE: The Capture to Clipboard function is not available in Linux.

Preemption
Preemption provides a means for users with sufficient privilege to take control
of a server from another user with lesser or equal privilege.
NOTE: All users sharing the connection that is being preempted will be warned,
but only the primary user will be able to reject the preemption (if allowed).
Table 4-2 outlines the preemption scenarios and detailed scenarios in which
preemption requests can be rejected. For information about preemption and
reserved or locked virtual media sessions, see "Virtual Media" on page 89.
Table 4-2. Preemption Scenarios
Current User

Preempted by

Preemption can be rejected

Remote User

Local User

No

Remote User

Remote Administrator

No

Remote User

Remote Console Switch No
Administrator

Remote Console Switch
Administrator

Local User

Remote Console Switch
Administrator

Remote Console Switch Yes
Administrator

Remote Administrator

Local User

No

Remote Administrator

Remote Administrator

Yes

Remote Administrator

Remote Console Switch No
Administrator

84

Using the Viewer

Yes

Table 4-2.

Preemption Scenarios

Current User

Preempted by

Preemption can be rejected

Local User

Remote Administrator

Yes

Local User

Remote Console Switch Yes
Administrator

Preemption of Remote User by a Remote Administrator
If a remote administrator attempts to access a server that is being accessed by
a remote user, a message appears asking that the administrator wait while the
user is informed that they will be preempted. The remote user cannot reject
the preemption request and will be disconnected. The time period given
before disconnection is defined by the Video session preemption timeout
setting in the Session dialog box. For information, see "Viewing and
Configuring Remote Console Switch Parameters" on page 102.
NOTE: No time period will be displayed in cases where the server being viewed is
attached to an Avocent brand switch.

Preemption of a Local User/Remote Administrator by a Remote
Administrator
If an administrator attempts to access a server that is being accessed by the
local user or by another remote administrator with equal privileges, the
currently connected user can accept or reject the preemption request. A
message appears asking the connected local user or remote administrator
whether they want to accept the preemption request. If the preemption
request is rejected a message appears informing the remote administrator that
their request has been rejected and that they cannot access the server.
NOTE: If the server being viewed is attached to an Avocent brand switch, the user
is not given the option to accept or reject preemption.
NOTE: In scenarios where a preemption request can be rejected, the Session
Preemption Request dialog box will appear. This dialog allows you to accept the
preemption request by clicking the Accept button or to reject the preemption
request by clicking the Reject button or by closing the dialog box.

Using the Viewer

85

Connection Sharing
Connection sharing allows multiple users to interact with a target device at
the same time. When you are a primary user, you may be notified by a dialog
box that another user would like to share your connection. You may select Yes
to accept sharing, No to reject sharing, or click the Passive Share box to allow
the new user to share without having any control over the connection.
When you attempt to open a Video session with a device that is already being
viewed by another user, you are notified that the device is already being
viewed. Depending on the configuration of sharing settings, you may be
offered the option to share or preempt the video session. You may also be
offered the option to open a stealth Video session.
NOTE: Stealth video sessions are passive Video sessions, where the primary user
is not aware of the presence of the secondary user. The ability to open a stealth
video session is governed by the privilege of the user. If a user can preempt another
user, they can also open a Stealth Video session.
Access to the device is governed by the nature of the current user’s
connection to the device. There are two types of Video session users: a
Primary user and up to 11 simultaneous Secondary users (a single 2161DS-2
or 4161DS appliance supports up to 12 simultaneous sessions across all
attached servers). Only the Primary user can accept or reject preemption
requests for all users sharing a connection. The Primary user also maintains
control of video parameters and the display resolution of the Video session.
Secondary users may be either Active users who have the ability to input
mouse and keyboard data, or Passive users who may not input mouse and
keyboard data.
If Automatic Sharing is enabled on the Remote Console Switch, Secondary
Users do not need the permission of the Primary User to join the session.
If a Primary user leaves the session then the oldest Secondary user with Active
user privileges will become the Primary user. If there are no Secondary users
with Active user privileges sharing the session when the Primary user leaves
the session, then the session will be closed.
For more information about configuring connection sharing, see "Viewing and
Configuring Remote Console Switch Parameters" on page 102.

86

Using the Viewer

Exclusive Mode

Exclusive Mode allows you to have exclusive control of a Video session.
When in Exclusive Mode, no other user can share the session (except in
Stealth mode). If other users are sharing the session when you select
Exclusive Mode, you are warned that selecting Exclusive Mode will cause the
other users to become disconnected from the session.
NOTE: Only the Primary user can request an Exclusive session. If other users are
sharing at the time Exclusive Mode is requested, they are disconnected, regardless
of the Primary users access level.
To open a Video session in Exclusive mode:
In the Viewer, choose Tools - Exclusive Mode.

Using the Viewer

87

88

Using the Viewer

5

Virtual Media

Virtual media allows you to view, move, or copy data located on virtual media
to and from any server. You can manage remote systems more efficiently by
allowing operating system installation, operating system recovery, hard drive
recovery or duplication, BIOS updating, and server backup. Virtual media can
be connected directly to the appliance using USB ports located on the
appliance. Virtual media can also be accessed remotely. You can use virtual
media support to connect USB media devices to the appliance and make
those devices available to any connected appliance.
Any user operating a KVM session can access any media device that is
mapped to that target device. To avoid the security risk of unauthorized user
access, you can lock a virtual media session to a KVM session.
To change the media in a virtual media device, you must first unmap the
virtual media device. You can then insert the new media and remap the
virtual media device. The media will be available in the new virtual media
session.
NOTE: To use virtual media on a given server, a USB2 SIP or Avocent brand PS2M
or USB2IQ module must be used to connect that server to the KVM switch.
NOTE: A virtual media session cannot be opened to a server that is connected to a

PEM.

This chapter describes how to configure and launch virtual media from the
OSCAR interface and the on-board web interface. Virtual media is also
available from the Remote Console Switch Software. For how to use the
Remote Console Switch Software, see the Dell Remote Console Switch
User’s Guide or the help included with the software.

Common Virtual Media Terms
•

Virtual media - A USB media device that can be attached to the appliance
and made available to any target device that is connected to the appliance

•

Virtual media session - Two USB connections through a single cable.
These connections are visible to the computer as a USB CD drive, USB
DVD drive or a USB mass storage device.
Virtual Media

89

•

Local media - Virtual media sessions that use devices attached directly to
the USB port of an appliance.

•

Remote media - Virtual media sessions that use devices attached directly
to the client computer.

•

Locked - A virtual media session that is associated with a specified KVM
session. If the KVM session is closed, the virtual media session will end.
(For example, if the KVM session is preempted, closed by a user, or
stopped when the screen saver starts, the appliance will close the
associated virtual media session). However, closing a locked virtual media
session will not close the corresponding KVM session.

•

Reserved - A virtual media session that can only be accessed or closed by a
specified user name or an administrator. If both Locked and Reserved are
selected, the session will be reserved.

Configuring Virtual Media Locally
The local port administrator (which is anyone that has access to the local user
port) will be able to enable or disable virtual media on any server connected
to a USB2 SIP. This control will be maintained in the appliance after a power
cycle.

Enabling/Disabling Virtual Media Using the OSCAR Interface
Local administrators can enable or disable virtual media on any server on a
per SIP basis. This control is also maintained in the appliance after a power
cycle.
The VMedia Setup dialog box displays the name of each virtual media SIP, as
well as a checkbox that controls whether virtual media is enabled or disabled
for that individual SIP. If a virtual media session is currently active, the user
letter will be displayed in blue to the right of the checkbox.
NOTE: Before disabling virtual media on a server, the local user must first
disconnect any active virtual media sessions via the Commands - User Status
screen.

90

Virtual Media

Figure 5-1. VMedia Setup Dialog Box

To enable/disable virtual media:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Click Setup - VMedia.
3 Select the appropriate checkbox to enable virtual media for that SIP.
or
Deselect the appropriate checkbox to disable virtual media for that SIP.
4

Click OK to accept the options you have selected and return to the
Setup dialog box.

Setting Virtual Media Options Using the OSCAR Interface
You can determine the behavior of the appliance during a virtual media
session using the options provided in the Virtual Media dialog box. Table 5-1
outlines the options that can be set for virtual media sessions.

Virtual Media

91

Figure 5-2. Virtual Media Dialog Box

Table 5-1. OSCAR Interface Virtual Media Options
Function

Purpose

Locked

Synchronizes the KVM and virtual media sessions so that when a
user disconnects a KVM connection, the virtual media connection
to that server is also disconnected. A local user attempting to switch
to a different server is also disconnected.

Reserve

Ensures that a virtual media connection can only be accessed with
your username and that no other user can create a KVM connection
to that server. When the associated KVM session is disconnected,
the virtual media session may be disconnected according to the
Locked setting in the Virtual Media dialog box.

CD ROM

Allows virtual media sessions to the first detected CD-ROM drive.
Enable this checkbox to establish a virtual media CD-ROM
connection to a server. Disable to end a virtual media CD-ROM
connection to a server.

DVD ROM

Allows virtual media sessions to the first detected DVD-ROM drive.
Enable this checkbox to establish a virtual media DVD-ROM
connection to a server. Disable to end a virtual media DVD-ROM
connection to a server. Only DVD-ROM data is supported by virtual
media. Playback of DVD movies over virtual media is not supported.

92

Virtual Media

Table 5-1.

OSCAR Interface Virtual Media Options (continued)

Function

Purpose

Mass Storage

Allows virtual media sessions to the first detected mass storage
drive. Enable this checkbox to establish a virtual media mass storage
connection to a server. Disable to end a virtual media mass storage
connection to a server.

Write Access

Allows a target server to write data to the virtual media during a
virtual media session. Read access is always allowed during a virtual
media session.

To set virtual media options using the OSCAR interface:
1 Press  to launch the OSCAR interface. The Main dialog
box appears.
2 Connect a virtual media device to the USB port on the switch.
3 Click VMedia.
4 Click the appropriate checkbox to enable or disable each of the options.
For information about each individual setting, see Table 5-1.
5 Click OK to accept the options you have selected and return to the Main
dialog box.

Configuring Virtual Media Remotely
Virtual media can also be configured using the on-board web interface. The
on-board web interface includes options similar to those in the OSCAR
interface. Users can enable or disable virtual media on any server on a per SIP
basis. This control is also maintained in the appliance after a power cycle.

Enabling/Disabling Virtual Media Using the On-board Web Interface
The on-board web interface virtual media configuration screen displays the
EID, name, and connection path of each virtual media SIP, as well as a check
box that controls whether virtual media is enabled or disabled for that
individual SIP.

Virtual Media

93

Figure 5-3. Virtual Media Window - On-board Web Interface

To enable/disable virtual media:
1 Click the Configure tab, then click Remote Console Switch - Virtual
Media.
2 Select the appropriate checkbox to enable virtual media for that SIP.
or
Deselect the appropriate checkbox to disable virtual media for that SIP.
3

94

Click Save.

Virtual Media

Setting Virtual Media Options Using the On-board Web Interface
You can determine the behavior of the appliance during a virtual media
session using the options provided in the on-board web interface virtual
media configuration screen. Table 5-2 outlines the options that can be set for
virtual media sessions.
Table 5-2.

On-board Web Interface Virtual Media Options

Function

Purpose

Lock to KVM
Session

Synchronizes the KVM and virtual media sessions so that when a
user disconnects a KVM connection, the virtual media
connection to that server is also disconnected. A local user
attempting to switch to a different server is also disconnected.

Allow Reserved
Sessions

Ensures that a virtual media connection can only be accessed with
your username and that no other user can create a KVM
connection to that server.

Read-Only Access Prevents a target server from writing data to the virtual media
drive during the virtual media session.
Encryption Levels Allows the user to chose which of the SSL encryptions (128-bit,
DES, 3DES, or AES) will be supported in the virtual media
session.

To set virtual media options using the on-board web interface:
1 Click the Configure tab, then click Remote Console Switch - Virtual
Media.
2 Click the appropriate checkbox to enable or disable each of the options.
For information about each individual setting, see Table 5-2.
3 Click Save.

Launching Virtual Media
Virtual media is launched remotely from the appliance using the Viewer. The
virtual media client will allow a user to map a local drive to a virtual drive on
the target server.
To launch virtual media:
1 Launch the Viewer from the on-board web interface. (See "Using the
Viewer" on page 65 for more information.)
Virtual Media

95

2 Select Tools - Virtual Media.
Figure 5-4. Dell Virtual Media Client Showing No Connection

Figure 5-5. Dell Virtual Media Client Showing Two Connections

96

Virtual Media

There are two devices available for mapping on the target server: a
floppy/flash drive or a CD/DVD drive. The virtual media client allows one of
each to be mapped at a time. Alternatively, the virtual media client will also
allow a floppy image (*.img) file or a CD image (*.iso) file to be mapped to a
virtual device.
The virtual media interface consists of three main areas: the Floppy Drive
section, the CD/DVD section, and the Status section. If the virtual media
session is locked to a KVM session, there will be a locked icon at the top right
of the virtual media client screen.

Virtual Floppy Drive
The floppy drive section allows a user to select which drive to map to the
virtual floppy. It includes radio buttons for selecting the type of device
(Floppy, Removable, or Floppy image), as well as a browse button used for
selecting the *.img image file. Only one device in the floppy drive section can
be connected at one time.
The user has the option of prohibiting the target server from writing data
back to the local drive by selecting the Read Only checkbox. If the
administrator has configured all devices to be read only, this box will be
checked and grayed out.
To connect a floppy device to the virtual media drive:
1 Select either Floppy or Removable Disk.
2 (Optional) Select Read Only.
3 Click Connect Floppy.
To connect a floppy image file to the virtual media drive:
1 Select Floppy image.
2 Click Browse and select the desired image *.img file.
NOTE: Image files are always read only.
3 Click Connect Floppy.
To disconnect any device or image file from the virtual media device:
Click Disconnect Floppy.

Virtual Media

97

Virtual CD/DVD Drive
The CD/DVD drive section allows a user to select which drive to map to the
virtual CD/DVD. It includes radio buttons for selecting the type of device
(CD/DVD or ISO image), as well as a browse button used for selecting the
*.iso image file. Only one device in the CD/DVD drive section can be
connected at one time.
To connect a CD/DVD device to the virtual media drive:
1 Select Compact Disk.
2 (Optional) Select Read Only.
3 Click Connect CD/DVD.
To connect a CD/DVD image file to the virtual media drive:
1 Select ISO image.
2 Click Browse and select the desired image *.iso file.
NOTE: Image files are always read only.
3 Click Connect CD/DVD.
To disconnect any device or image file from the virtual media device:
Click Disconnect CD/DVD.

Virtual Media Connection Status
The status section displays specific information about the virtual media
connections. If there is no current connection, the columns will read “No
connection” or “n/a” as applicable.
If there is a current connection, the status section displays the following
information:

98

•

Target Drive - the virtual device connected to the target server

•

Connected To - the name of the local drive connected to the virtual device

•

Read Bytes - the number of bytes read by the target server from the local
device

•

Write Bytes - the number of bytes written to the local device by the target
server

Virtual Media

Reserving a Virtual Media Session
If you want to continue a virtual media session after the KVM session is
closed, you can reserve the virtual media session. If the virtual media session
is reserved, it will remain active when the associated KVM session is closed. In
addition, the virtual media session can only be accessed by the user to which
it is reserved.
To reserve a virtual media session:
Select the Reserve checkbox.

Resetting the USB Bus
The USB reset feature resets every USB device on the target device, including
the mouse and keyboard. It should only be used when the target device is not
responding.
To reset the USB bus:
Select USB Reset.

Virtual Media

99

100

Virtual Media

Managing Your Remote Console
Switch Using the On-board Web
Interface

6

Once you have installed a new Remote Console Switch, you have the ability
to view and configure unit parameters, determine who has access and control
rights, view and control currently active video sessions, and execute a variety
of control functions such as rebooting and upgrading your Remote Console
Switch from the on-board web interface. The on-board web interface has four
tabs: Connections, Configure, Status, and Tools.
For how to launch the on-board web interface, see "Launching the On-board
Web Interface" on page 32. For information about the Connections tab, see
"Accessing Servers from the On-board Web Interface" on page 65.
NOTE: The on-board web interface is not supported on 2161DS Remote Console
Switches so switches of this model cannot be migrated. Use the Remote Console
Switch Software to manage 2161DS Remote Console Switches; see the Dell Remote
Console Switch Software User’s Guide or help for more information. All other
Remote Console Switches support the on-board web interface and may be
migrated. See "Migrating Remote Console Switches to the On-board Web Interface"
on page 135 for more information.

Migrating Switches from the Remote Console Switch Software
If you have an existing installation of Remote Console Switches that supports
the on-board web interface, you can migrate the switches from the Remote
Console Switch Software to the on-board web interface. To do so, following
the procedures in "Upgrading Firmware" on page 120, "Migrating Remote
Console Switches to the On-board Web Interface" on page 135, and "Using
the Resync Wizard" on page 137.
NOTICE: Once you migrate a Remote Console Switch, you will manage switches
using the on-board web interface instead of the Remote Console Switch Software
AMP. However, you can still use the Remote Console Switch Software to modify

Managing Your Remote Console Switch Using the On-board Web Interface

101

server properties, manage the local database, organize your system, and connect
to KVM sessions. See the Dell Remote Console Switch Software User’s Guide for
more information.

Viewing and Configuring Remote Console Switch
Parameters
The Configure tab allows you to display a list of categories covering a wide
range of parameters for your Remote Console Switch. When a category is
selected from the list, the parameters associated with the category will be read
from the unit. You will then be able to modify those parameters and send the
changes securely back to the Remote Console Switch.

Changing Remote Console Switch Parameters
The Remote Console Switch category allows you to view the product type,
and serial number for the Remote Console Switch.
From the Network sub-category, you can choose either IPv4 (default) or IPv6
mode. You will be able to change the following network settings: IP Address,
Subnet Mask (when using IPv4 mode) or Prefix Length (when using IPv6
mode), and Gateway. You will also be able to choose a LAN Speed, specify up
to three IP addresses for DNS servers, and choose whether to assign a Static
(default) IP address or, when appropriate, a Dynamic IP address to the
Remote Console Switch.
NOTE: After changing Network settings, the Reboot Required button will be
displayed on all pages, indicating that the switch must be rebooted before the
changes will take effect. Click the button to reboot the switch.
The Sessions sub-category allows you to apply controls to your video sessions.
By enabling the Video session timeout option, you allow the Remote Console
Switch to close an inactive video session after a specified number of minutes.
The Video session preemption timeout option allows you to specify the time
(5 - 120 seconds) for which a preemption warning message appears before a
video session is preempted. For more information about preemption, see
"Preemption" on page 84. If this option is not enabled, preemption occurs
without warning.

102

Managing Your Remote Console Switch Using the On-board Web Interface

The Encryption Levels option allows you to specify the type of encryption to
be used for video, keyboard, and mouse sessions. You can select multiple
methods when a new client connection is requested. The Remote Console
Switch negotiates for the highest enabled encryption method.
The Connection Sharing options indicate which sharing options are enabled.
Enable Share Mode, Automatic Sharing, Exclusive Connections, and
Stealth Connections all appear checked when the particular option is
enabled. Automatic Sharing, Exclusive Connections and Stealth
Connections are enabled only when Enabled Share Mode is selected. For
more information, see "Connection Sharing" on page 86.
The Input Control Timeout option controls the time period allowed for
between inputs from an active session before another session gains control.
The values range from 1-5 seconds and the option is only available if Share
Mode is selected.
The Login Timeout option specifies the time period allowed for an LDAP
server to respond to a log in request. The default time is 30 seconds, but some
WANs may require a longer time period.
By enabling the Inactivity Timeout option, you may specify the time period
allowed for an inactive on-board web interface session to remain open. If the
specified time elapses without the user navigating to another web page or
making changes, the session will close and return to the Log In window.
NOTE: Changes you make to session parameters affect future connection requests
only, and not existing connections.

Managing Your Remote Console Switch Using the On-board Web Interface

103

Figure 6-1. Remote Console Switch Sessions Window

Setting Up User Accounts
When you select the Users category, the on-board web interface will retrieve
and display a list of usernames and current access levels from the Remote
Console Switch. You can add, modify, or delete users in this listing. You can
assign three access levels: User, User Administrator, and Remote Console
Switch Administrator. The User Administrator and Remote Console Switch
Administrator access levels allows you to assign individual server access rights
to a user.
Table 6-1. User Access Level Rights
Operations

Remote Console
User
User
Switch Administrator Administrator

Preemption

All

104

Equal and
lesser

No

Managing Your Remote Console Switch Using the On-board Web Interface

Table 6-1.

User Access Level Rights

Operations

Remote Console
User
User
Switch Administrator Administrator

Configure network & global Yes
settings (security mode,
time-out, Simple Network
Management Protocol
(SNMP))

No

No

Reboot

Yes

No

No

FLASH upgrade

Yes

No

No

Administer User Accounts

Yes

Yes

No

Monitor server status

Yes

Yes

No

Target Device Access

Yes

Yes

Assigned by
Admin

NOTE: Preemptions listed in Table 6-1 only apply to remote clients. They do not
apply to users accessing the server locally.

Users can become locked out by the Security Lock-out feature if they try to
enter an invalid password five consecutive times. You can configure Security
Lock-out settings as well as unlock any user through the Users category.
NOTE: A User Administrator cannot add or change a Remote Console Switch
Administrator account.

Managing Your Remote Console Switch Using the On-board Web Interface

105

Figure 6-2. Users Window

To add or modify a user:
1 Click the Configure tab in the on-board web interface, then click the
Users category in the left column.
2 Click the Add User button on the right side of the window to add a new
user.
-orClick a user name in the Users column to modify an existing user.
The Add/Modify User window appears.
Figure 6-3. Add User Window

106

Managing Your Remote Console Switch Using the On-board Web Interface

3 Type the username and password you wish to assign to the user and then
verify the password by typing it in the Verify Password field. The password
must be 5-16 characters and contain alphabetical characters of mixed case
and at least one number.
4 Select the appropriate access level you wish for this user from the dropdown list. If you select the User option, the Set User Access Rights button
becomes active.
a

Click the Set User Access Rights button to select individual servers for
that user. The User Access Rights window appears.

Figure 6-4. User Access Rights Window

b

To allow the user access to a server, select the check box next to the
server name. Alternatively, you may select the first check box to enable
access on all servers.

c

To prevent the user from accessing a server, clear the check box next to
the server name.

d

Click Save.

Managing Your Remote Console Switch Using the On-board Web Interface

107

5 Click Save to save the settings and return to the main on-board web
interface window.
To change the user password:
1 Click the Configure tab in the on-board web interface, then click the
Users category in the left column.
2 Click a user name in the Users column to modify an existing user. The
Add/Modify User window appears.
3 Type the password for that user in the Password box and then repeat the
password in the Verify Password box. The password must be 5-16
characters and contain alphabetical characters of mixed case and at least
one number.
4 Click Save to return to the on-board web interface.
To delete a user:
1 Click the Configure tab in the on-board web interface, then click the
Users category in the left column.
2 Select the check box next to the user name you wish to delete.
3 Click the Delete button on the left side of the window. A confirmation
window appears.
4 Click Yes to confirm the deletion.
-orClick No to exit the window without deleting the user.

Locking and Unlocking User Accounts
If a user enters an invalid password five consecutive times, the Security LockOut feature, if enabled, will temporarily disable that account. If a user
attempts to log in again, an appropriate error message is displayed.
NOTE: All accounts (User, User Administrator, and Remote Console Switch
Administrator) are subject to this lock-out policy.

A Remote Console Switch Administrator can specify the number of hours (1
to 99) that accounts will remain locked. When Enable Lock-outs is
unchecked, the security lock-out feature will be disabled and no users will be
locked out.

108

Managing Your Remote Console Switch Using the On-board Web Interface

If an account becomes locked, it will remain locked until the duration time
has elapsed, the Remote Console Switch is power-cycled, or an Administrator
unlocks the account. A User Administrator may unlock only user accounts,
whereas a Remote Console Switch Administrator may unlock any type of
account.
To unlock an account:
1 Click the Configure tab in the on-board web interface, then click the
Users category in the left column.
2 Select the check box next to the user name you wish to unlock.
3 Click the Unlock button. The lock icon next to the username will
disappear.
To specify the length of time a user account remains locked:
1 Click the Configure tab in the on-board web interface, then click the
Users category in the left column.
2 Click to enable the Enable Lock-outs check box.
3 Type the number of hours that a user will be locked out (1 to 99).
NOTE: Only Remote Console Switch Administrators may specify lock-out
parameters.
To disable the Security Lockout feature:
1 Click the Configure tab in the on-board web interface, then click the
Users category in the left column.
2 Clear the Enable Lock-outs check box. The Duration field is disabled.
NOTE: Disabling Security Lock-Out will have no affect on users that are already
locked out.

Enabling and Configuring SNMP
SNMP is a protocol used to communicate management information between
network management applications and Remote Console Switches. Other
SNMP managers can communicate with your Remote Console Switch by
accessing MIB-II and the public portion of the enterprise MIB. When you
select the SNMP category, the on-board web interface will retrieve the SNMP
parameters from the unit.

Managing Your Remote Console Switch Using the On-board Web Interface

109

In the SNMP category, you can enter system information and community
strings. You may also designate which stations can manage the Remote
Console Switch as well as receive SNMP traps from the switch. For more
information on traps, see "Enabling Individual SNMP Traps" on page 111 in
this chapter. If you check Enable SNMP, the unit will respond to SNMP
requests over UDP port 161.
NOTE: The on-board web interface does not use standard SNMP to control
switches and therefore does not use UDP port 161. The on-board web interface
uses a secure, proprietary protocol to communicate with the Remote Console
Switches over a different network port.
Figure 6-5. SNMP Configuration Window

To configure general SNMP settings:
1 Click the Configure tab in the on-board web interface, then click the
SNMP category in the left column.
2 Click to enable the Enable SNMP check box to allow the Remote Console
Switch to respond to SNMP requests over UDP port 161.
3 Type the system’s fully qualified domain name in the Name field, as well as
a node contact person in the System section.

110

Managing Your Remote Console Switch Using the On-board Web Interface

4 Type the Read, Write, and Trap community names. These specify the
community strings that must be used in SNMP actions. The Read and
Write strings only apply to SNMP over UDP port 161 and act as passwords
that protect access to the Remote Console Switch. The values can be up to
64 characters in length. These fields may not be left blank.
5 Type the address of up to four management workstations that are allowed
to manage this Remote Console Switch in the Allowable Managers fields.
Alternatively, you may leave these fields blank to allow any station to
manage the Remote Console Switch.
6 Type the address of up to four management workstations to which this
Remote Console Switch will send traps in the Trap Destination fields.
7 Click Save to save the settings and close the window.
-orClick Restore to cancel the changes and exit the window. The last saved
settings will be restored.
NOTE: After changing SNMP settings, the Reboot Required button will be
displayed on all pages, indicating that the switch must be rebooted before the
changes will take effect. Click the button to reboot the switch.

Enabling Individual SNMP Traps
An SNMP trap is a notification sent by the Remote Console Switch to a
management station indicating that an event has occurred in the Remote
Console Switch that may require further attention. The Dell OpenManageTM
IT Assistant software is the event manager. You can specify what SNMP traps
are sent to the management stations by simply clicking the appropriate check
boxes in the list. Alternatively, you can select or clear the check box next to
Enabled Traps to easily select or deselect the entire list.

Managing Your Remote Console Switch Using the On-board Web Interface

111

Figure 6-6. SNMP Traps Window

Viewing and Resynchronizing Server Connections
The Servers category retrieves and displays the servers that exist in the onboard web interface database as well as information on how the servers are
connected to the selected Remote Console Switch.
The Path column displays the current server connection. This can be to either
a SIP or a tiered switch. If connected to a SIP, the SIP’s ARI port is displayed.
If connected to a tiered switch, the switch channel is also displayed. Clicking
on a Server Name displays a dialog that allows you to change the name of the
server.
NOTE: The Reboot Required button will only appear if reboot is required.

112

Managing Your Remote Console Switch Using the On-board Web Interface

Figure 6-7. Servers Window

Modifying a Server Name
You can use the on-board web interface to rename a server from a remote
workstation rather than from the OSCAR interface of the Remote Console
Switch.
To modify a device name:
1 In the Server category, click the name of the server whose name you wish
to change. The Modify Server Name window appears.
Figure 6-8. Modify Server Name Window

Managing Your Remote Console Switch Using the On-board Web Interface

113

2 Type the name you want to assign to the server. Names must be 1-15
characters, include alphabetical characters, and may not include spaces or
special characters with the exception of hyphens.
3 Click Save. The name you have supplied is updated in both the Remote
Console Switch and local client database.

Viewing and Configuring Tiered Switch Connections
The Tiered Switches window lets you view the tiered switches in your system.
Clicking on a switch name displays a window that allows you to change the
Name or Number of Channels.
To configure a tiered switch connection:
1 Click the Configure tab in the on-board web interface, then click the
Tiered Switches sub-category in the left column.
2 Click the name of the switch you want to configure. The Modify Tiered
Switch window opens.
Figure 6-9. Modify Tiered Switch Window

3 Type the new name for the switch.
4 Type the number of channels, between 4-24, for the switch.
5 When you have finished configuring the switches, click Save to save the
new settings.
-orClick Cancel to exit without saving.

114

Managing Your Remote Console Switch Using the On-board Web Interface

Viewing the SIPs and IQ Modules
The Server - SIPs category lets you view the SIPs and IQ modules in your
system, their port, and Electronic ID number (EID) as well as their type and
connection device.
You can also view the SIP status. A green circle indicates that the SIP is
online. A yellow circle indicates the SIP is being upgraded and a red X
indicates that the SIP is offline. To clear offline SIPs click Clear Offline SIPs
and click OK when prompted. The Clear Offline SIPs button is only
available for Remote Console Switch Administrators.
NOTE: It is not possible to clear Offline SIPs or IQ modules that are attached to a
tiered analog Console Switch.
NOTE: This operation will clear all offline SIPs on the Remote Console Switch,
including those associated with any powered down Servers.
NOTE: User access rights will also be updated to remove the Servers associated
with the cleared offline SIPs.
The SIP Language drop-down menu allows you to set language and keyboard
parameters for all the Sun/USB SIPs of the whole Remote Console Switch.
The SIP Language drop-down menu is only available for Remote Console
Switch Administrators.
NOTE: Reboot Required button will only appear if reboot is required.

Managing Your Remote Console Switch Using the On-board Web Interface

115

Figure 6-10.

Servers - SIPs Window - 4161DS Console Switch

NOTE: The Remote Console Switch supports Avocent brand IQ modules as well as
Dell SIPs. Therefore, although Dell SIPs are available with PS/2 and USB
connections, the addition of IQ modules provides support for Sun and Serial
connections.
NOTE: To determine if an item identified as PS/2 or USB is a Dell SIP or an Avocent
brand IQ module, access the SIPs Versions panel. For more information see "SIPs
Subcategory" on page 117.

Viewing Remote Console Switch Version
Information
The Versions category displays versions of the Remote Console Switch,
FPGA, and ASIC firmware.
NOTE: Reboot Required button will only appear if reboot is required.

116

Managing Your Remote Console Switch Using the On-board Web Interface

Figure 6-11. Firmware Version Window

SIPs Subcategory
The SIPs sub-category allows you to view version information. Clicking on
the EID displays a window that allows you to upgrade the SIP firmware and to
reset the SIPs if connected to a tiered switch.
Selecting the Enable Auto-Upgrade for all SIPs check box causes all
subsequently connected SIPs to have their firmware upgraded to that
available on the Remote Console Switch. This guarantees that SIP firmware
is compatible with Remote Console Switch firmware.
For information about upgrading SIPs, see "Upgrading Firmware" on
page 120.
NOTE: Reboot Required button will only appear if reboot is required.

Managing Your Remote Console Switch Using the On-board Web Interface

117

Figure 6-12.

SIPs Firmware Version Window

To view version information for a SIP:
1 Click the Configure tab in the on-board web interface, then click the SIPs
subcategory from the Versions category in the left column.
2 Click the EID of the SIP for which you want to view the firmware version.

118

Managing Your Remote Console Switch Using the On-board Web Interface

Figure 6-13. SIP Version Window

On occasions when a tiered switch is not recognized by the Remote Console
Switch, it may be necessary to reset the SIP which connects the tiered switch
to the Remote Console Switch. This can be done using the Reset SIP button
in the SIPs subcategory.
NOTE: PS/2, USB, and USB2 SIPs are available. In addition the Remote Console
Switch is compatible with all IQ modules including Sun and serial IQ modules.
NOTE: The Reset SIPs button is only enabled when the SIP type is PS/2 and when a
firmware upgrade is not in progress.
NOTE: This procedure is only relevant where your Remote Console Switch system
involves a PS/2 SIP attached to a tiered switch. On these occasions, it may be
necessary to reset the SIP when the tiered switch is not recognized.
NOTE: If a reset is performed, when a Remote Console Switch is connected
directly to a server and not a Cascade Switch, the mouse/keyboard may fail to
respond. When this occurs, the target server requires a reboot.
To reset a SIP:
1 Click the Configure tab in the on-board web interface, then click the SIPs
subcategory from the Versions category in the left column.
2 Click the EID of the SIP you want to reset.

Managing Your Remote Console Switch Using the On-board Web Interface

119

3 Click Reset SIP. A message appears warning you that this function is
reserved for tiered switches and that resetting the SIP may result in the
need to reboot the server.
4 Click OK to continue.
-orClick Cancel to return to the SIPs subcategory.

Upgrading Firmware
You can upgrade the firmware for either the Remote Console Switch or the
SIPs. The SIPs can be upgraded individually or simultaneously. When an
upgrade is initiated, you will see a progress bar. As long as an upgrade is in
progress, you cannot initiate another.
The Enable Auto-Upgrade for All SIPs check box allows you to enable an
auto-upgrade for SIP firmware. You can override the auto-upgrade at any
stage using the Load Firmware button described in the next section.
NOTE: For the 2161DS-2, 4161DS, and 2321DS, you can upload new appliance
firmware using ASMP (if supported) or TFTP file transfer protocols. ASMP file
transfer allows you to select the firmware from a local file system. The 2161DS TFTP
file transfer allows you to specify the TFTP server address and the name of the
firmware file.
To upgrade Remote Console Switch firmware:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Upgrade Remote Console Switch Firmware button.
3 The Upgrade Remote Console Switch Firmware window appears. Select
TFTP Server or FTP Server as the source, and type the TFTP or FTP
server IP address where the firmware is located as well as the filename and
directory location.
or
Click File System and browse to the location on your file system where the
FLASH file is located. Click Open.

120

Managing Your Remote Console Switch Using the On-board Web Interface

Figure 6-14. Upgrade Switch Firmware Window

4 Click the Upgrade button. The Upgrade button dims and a progress
message and progress bar appears.
5 When the upgrade is complete, the Remote Console Switch will reboot.
NOTICE: Do not power down the Remote Console Switch while it is upgrading.
You can upgrade firmware for all SIPs of a given type.
To simultaneously upgrade multiple SIPs:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Upgrade SIP Firmware button. The Upgrade SIP Firmware
window appears.
3 Click the check box in front of each type (PS/2,USB, USB2, Serial, or Sun)
of SIP you wish to upgrade.
NOTE: A disabled check box indicates that all SIPs of that type are running the
correct firmware, or that no SIP of that type exists in the system.

Managing Your Remote Console Switch Using the On-board Web Interface

121

Figure 6-15.

Upgrade SIP Firmware Window

4 Click Upgrade. The Upgrade button dims. The Last Status column will
display either In Progress or Succeeded, depending on the status of each
SIP upgrade. A firmware upgrade currently in progress message displays
until all of the selected SIP types are upgraded.
5 When complete, a message appears prompting you to confirm the upgrade
completion. Once confirmed, the Upgrade button is again enabled.
6 Click Close to exit the Upgrade Firmware window.
To upgrade SIP firmware individually:
1 Click the Configure tab in the on-board web interface.
2 Select the SIPs sub-category under Versions in the left column.
3 Click the EID of the SIP for which you wish to view firmware information.
The SIP Version window opens.

122

Managing Your Remote Console Switch Using the On-board Web Interface

Figure 6-16. SIP Version Window

4 Compare the current information to the Firmware Available field to see
the firmware upgrade available for the SIP. (You can load firmware even if
the current and available versions are the same. In some cases, you can
downgrade the SIP to an older, compatible version.)
5 Click the Load Firmware button.
6 The firmware upgrade begins. During the upgrade, a progress message is
displayed below the Firmware Available box and the Load Firmware
button will dim. When the upgrade is finished, a message appears
indicating that the upgrade was successful.
7 Repeat steps 2-6 for each individual SIP you wish to upgrade.
8 When finished, click OK.

Controlling User Status
You may view and disconnect the current active user connections using the
Status tab in the on-board web interface. You can view the session type, the
server name, or SIP to which they are connected and their system address. In
addition to disconnecting a user session, the on-board web interface also
allows one user to take control of a server currently being used by another
user. For more information, see "Preemption" on page 84.

Managing Your Remote Console Switch Using the On-board Web Interface

123

Figure 6-17.

User Status Window

To disconnect a user session:
1 Click the Status tab in the on-board web interface. A list of users and their
connection information appears.
2 Click the check box for one or more users that you wish to disconnect.
3 Click the Disconnect Session button. A message appears prompting you
to confirm the disconnect command.
4 Click OK to disconnect the user.
-orClick Cancel to exit without completing the disconnect command.
NOTE: The appropriate level of access is required to disconnect a user. If you do
not have permission to disconnect a user, the check box next to that user will be
disabled.

124

Managing Your Remote Console Switch Using the On-board Web Interface

Rebooting Your System
You can reboot the Remote Console Switch through the Tools tab in the onboard web interface. When clicked, Reboot Remote Console Switch will
broadcast a disconnect message to any active users, then log out the current
user and immediately reboot the Remote Console Switch.
To reboot your system:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Reboot button. A message prompting you to confirm this reboot
appears.
3 Click OK to reboot.
-orClick Cancel to cancel the reboot.

Managing Remote Console Switch Configuration
Files
Configuration files contain all of the settings for a Remote Console Switch.
This includes appliance settings, SNMP settings, LDAP settings, and NTP
settings. You may save your configuration file and, should you ever need to
replace your Remote Console Switch, you can restore the configuration file to
the new switch and avoid manually configuring it.
NOTE: User account information is stored in the user database, not in the
configuration file. For more information, see "Managing User Databases" on
page 126.
To read and save a configuration file from a Remote Console Switch:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Save Remote Console Switch Configuration button. The Save
Remote Console Switch Configuration window appears.
3 (Optional) Enter a password in the Password field, then repeat the
password in the Verify Password field. This password is requested when
you restore this database to a Remote Console Switch. Click OK.

Managing Your Remote Console Switch Using the On-board Web Interface

125

NOTE: You may leave the password field blank if you do not want to require a
password for accessing the configuration file.
4 Click Browse and navigate to a location to save the Configuration file. The
location appears in the Save To field.
5 Click Save.
6 The configuration file is read from the Remote Console Switch and saved
to the desired location. A progress window displays.
7 When complete, a message appears prompting you to confirm the read
completion. Click OK to return to the main window.
To restore a configuration file to a Remote Console Switch:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Restore Remote Console Switch Configuration button. The
Restore Remote Console Switch Configuration window box appears.
3 Click Browse and navigate to the location where you stored the saved
configuration file. The file name and location appears in the File name
field.
4 Click Restore. The Enter Password window opens.
5 (Optional) Enter the password you created when the configuration
database was saved. Click OK. The configuration file is written to the
Remote Console Switch. A progress window displays.
NOTE: You may leave the password field blank if you do not did not create a
password for the configuration file.
6 When complete, a message appears prompting you to confirm the write
completion. Click OK to return to the main window.

Managing User Databases
User database files contain all user accounts assigned in a Remote Console
Switch. You can save your user account database file and use it to configure
users on multiple Remote Console Switches by writing the user account file
to the new switch.
NOTE: The user account file is encrypted and you will be prompted to create a
password when you save the file. You will need to re-type this password when you
write the file to a new unit.

126

Managing Your Remote Console Switch Using the On-board Web Interface

To save a user database from a Remote Console Switch:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Save Remote Console Switch User Database button. The Save
Remote Console Switch User Database window appears.
3 Click Browse and navigate to a location to save the user database file. The
location appears in the Save To field.
4 Click Save. The Enter Password window opens.
5 Enter a password in the Password field, then repeat the password in the
Verify Password field. This password is requested when you restore this
database to a Remote Console Switch. Click OK. The user database file is
read from the Remote Console Switch and saved to a location. A progress
window displays.
6 When complete, a message appears prompting you to confirm the read
completion. Once confirmed, the Save Remote Console Switch User
Database window will close and you are returned to the Tools window.
To restore a user database file to a Remote Console Switch:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Restore Remote Console Switch User Database button. The
Restore Remote Console Switch User Database window appears.
3 Click Browse and navigate to the location where you stored the saved user
database file. The file name and location appears in the File name field.
4 Click Restore. The Enter Password window opens.
5 Enter the password you created when the user database was saved. Click
OK. The user database file is written to the Remote Console Switch. A
progress window displays.
6 When complete, a message appears prompting you to confirm the write
completion. Once confirmed, the Restore User Database File window will
close and you are returned to the Tools window.

Managing Your Remote Console Switch Using the On-board Web Interface

127

Installing a Web Certificate
A web certificate allows you to enter the on-board web interface on a web
browser without having to acknowledge the Remote Console Switch as a
trusted web server each time you access the on-board web interface. Using the
Install Web Certificate window, you can create a self-signed openssl
certificate.
To install a web certificate:
1 Click the Tools tab in the on-board web interface. The Tools window
appears.
2 Click the Install Web Server Certificate button. The Install Web Server
Certificate window appears.
Figure 6-18.

Install Web Server Certificate Window

3 Select Fields, and enter the following fields:

128

a

Public Key Length: the number of bits you want the certificate to be.

b

Common Name: your name. (Since this is your root certificate, use an
appropriate name such as, "Company_Name Certificate Authority.")

c

Organizational Unit (optional): organization unit name (marketing,
for example).

Managing Your Remote Console Switch Using the On-board Web Interface

d

Organization Name: the exact legal unabbreviated name of your
organization.

e

Locality Name: the city where your organization is located.

f

State or Province Name: the unabbreviated state or province where
your organization is located.

g

Country Name: the two-letter ISO abbreviation for your country.

h

Email Address: the email address for the CA to contact.

i

Validity Term: number of days the certificate is valid.

-orSelect File, and download a company certificate file (*.pem).
4 Select Install. Close the web browser, then relaunch the on-board web
interface again for the same IP address.
NOTE: If importing a company certificate file, it may take up to 30 seconds for the
on-board web interface to relaunch.
5 When prompted, click to view the certificate and follow the instructions
to import the certificate into the Root Certificate Authority folder. After
the certificate is stored, the user should not see the certificate warning.

Managing PDUs
You can control supported PDUs through the on-board web interface.
Chaining of up to nine PDUs per Remote Console Switch PDU port is
supported. PDU support allows the user to turn on, turn off and cycle any
server or device connected to the PDU.
NOTE: This feature is only available on the 2321DS Remote Console Switch.
NOTE: Refer to dell.avocent.com for a list of supported PDUs.
To configure a PDU:
1 Click the Configure tab in the on-board web interface, then click the
PDUs category in the left column for a list of PDUs.
2 Click on the PDU you wish to access. The PDU settings window opens.

Managing Your Remote Console Switch Using the On-board Web Interface

129

3 In the PDU settings box, change the PDU name, set the cycle delay time,
enable or disable the current protection, enable or disable the audible
alarm and set the minimum amps and maximum amps in the Inlet
Parameters field.
To configure a device connected to a PDU:
1 Click the Configure tab in the on-board web interface, then click the
PDUs category in the left column for a list of PDUs.
2 Click on the PDU you wish to access. The PDU Settings window opens.
3 Click the Outlet Settings button at the bottom of the PDU Settings
window for a list of devices connected to the PDU. The Outlet Settings
window opens.
4 To modify an outlet name, complete the following steps:
a

In the Name column, click on the link for the outlet you wish to
change. The Modify Power Outlet Name window opens.

b

If the device is a server, click Server, then select the name by clicking
on the appropriate entry in the Server Name column of the table
-orIf the device is not a server, click Other Device, then enter the
appropriate text in the Name text box.

c

Click Save, then click Close to return to the Outlet Settings window.

5 To modify the power-on interval, enter the value in seconds in the text box
in the Power-On Interval column for the outlet being configured.
6 Click Save, then click Close to return to the PDUs window.
To power-control a device connected to a PDU:
1 Click the Configure tab in the on-board web interface, then click the
Outlets subcategory located under PDUs in the left column for a list of
available outlets.
NOTE: An outlet only appears in this list if a name has been associated with it.
2 Check the box next to the outlet(s) you wish to configure.
3 Click the On button to turn on the selected outlet(s).
- or Click the Off button to turn off the selected outlet(s).
130

Managing Your Remote Console Switch Using the On-board Web Interface

- or Click the Cycle button to reboot the selected outlet(s).
4 Click Save.

Managing Your Remote Console Switch Using the On-board Web Interface

131

132

Managing Your Remote Console Switch Using the On-board Web Interface

Migrating Your Remote Console
Switch

7

If you have an existing installation of Remote Console Switches and are using
the Remote Console Switch Software Appliance Management Panel (AMP),
follow the procedures in this chapter to migrate the switches from the
Remote Console Switch Software to the on-board web interface.
NOTE: The on-board web interface is not supported on 2161DS Remote Console
Switches so switches of this model cannot be migrated. Use the Remote Console
Switch Software to manage 2161DS Remote Console Switches; see the Dell Remote
Console Switch Software User’s Guide or help for more information.

Accessing the AMP
You will start from the Remote Console Switch Software AMP to to migrate
the Remote Console Switch to the on-board web interface.
To access the AMP:
1 Click the Remote Console Switches tab in the Explorer.
2 Double-click a Remote Console Switch from the Unit Selector pane.
-orSelect a Remote Console Switch from the Unit Selector pane, and then
click the Manage Remote Console Switch task button.
-orRight-click a Remote Console Switch in the Unit Selector pane. A pop-up
menu appears. Select Manage Remote Console Switch.
-orClick a Remote Console Switch in the Unit Selector pane and press
. A password prompt appears.
NOTE: If there is a Configure Remote Console Switch task button, rather than a
Manage Remote Console Switch task buton, that Remote Console Switch has
already been migrated to the on-board web interface.
3 Type your username and password and click OK. The AMP dialog box
appears.
Migrating Your Remote Console Switch

133

Upgrading Firmware Using the AMP
Before starting the migration process (see "Migrating Remote Console
Switches to the On-board Web Interface" on page 135), use the AMP to
upgrade the firmware to a version that supports the on-board web interface.
The SIPs can be upgraded individually or simultaneously. When an upgrade is
initiated, you will see a progress bar. As long as an upgrade is in progress, you
cannot initiate another.
NOTE: For the 2161DS-2, 4161DS, and 2321DS, you can upload new appliance
firmware using ASMP (if supported), FTP or TFTP file transfer protocols. ASMP file
transfer allows you to select the firmware from a local file system. The 2161DS
supports the TFTP file transfer which allows you to specify the TFTP server address
and the name of the firmware file.

Upgrading Remote Console Switch Firmware
To upgrade Remote Console Switch firmware:
1 Click the Tools tab in the AMP. The Tools dialog box appears.
2 Click the Upgrade Remote Console Switch Firmware button.
If you have made changes in the Settings panel of the AMP, but have not
yet applied them before starting an upgrade, a warning message prompts
you to confirm the upgrade because the upgrade process requires an
appliance reboot. If you do not apply the pending changes, they will be
discarded before upgrading the firmware.
To apply those changes before the upgrade:

134

a

Click No to cancel the appliance firmware upgrade.

b

Click Apply.

c

Click the Upgrade Remote Console Switch Firmware button.
-orTo discard those changes before the upgrade, click Yes.

d

The Firmware Upgrade dialog box appears. Select TFTP Server as the
source, and type the Trivial File Transfer Protocol (TFTP) server IP
address where the firmware is located as well as the filename and
directory location.
or

Migrating Your Remote Console Switch

Click File System and browse to the location on your file system where
the FLASH file is located. Click Open.
3 Click the Upgrade button. The Upgrade button dims and a progress
message appears.
4 When the upgrade is complete, a message prompting you to confirm a
reboot appears. The new firmware will not be used until the switch
reboots. Click Yes to reboot the Remote Console Switch. The Upgrade
Firmware dialog box will display a progress message including a message
that the reboot is complete.
-orClick No to reboot at a later time. You will need to reboot in order to use
the new firmware.
NOTE: When upgrading the Remote Console Switch firmware to a version that
supports the on-board web interface, it is recommend not to exit the AMP until the
reboot is complete. Otherwise, you must open the AMP after the reboot is complete
before the switch will be available in the Migration Wizard.
5 Click Close to exit the Upgrade Firmware window.
NOTICE: Do not power down the Remote Console Switch while it is upgrading.

Migrating Remote Console Switches to the Onboard Web Interface
After you have upgraded the firmware of a Remote Console Switch to a
version that supports the on-board web interface, the switch will be available
in the Migration Wizard. Complete the Migration Wizard to be able to
launch Viewer sessions and manage switches directly from the on-board web
interface.
NOTICE: Once you migrate a Remote Console Switch, you will not be able to use
the Remote Console Switch Software AMP. Use the on-board web interface
instead.
To migrate Remote Console Switches:
1 Select Tools - Migrate in the Explorer. The Migration Wizard welcome
page opens. Click Next.

Migrating Your Remote Console Switch

135

2 All switches that qualify for migration will appear in the Available Remote
Console Switches list. Select the switch you wish to migrate and click the
> button to move the switch to the Remote Console Switches to migrate
list.
NOTE: If the Remote Console Switch you want to migrate is not available in the
Migration Wizard, you may have exited the AMP before the firmware upgrade was
complete. Close the Migration Wizard, then open the AMP to allow the upgraded
firmware version to be detected. When you open the Migration Wizard again, the
Remote Console Switch will be available.
3 Click Next.
4 It is recommend to use the Remote Console Switch information stored in
the local database when migrating switches. To do so, select the check box
on the Use Local Database Information window.
-orIf you do not wish to use local database information, clear the check box.
5 Type the HTTP and HTTPS port numbers in the HTTP Port and HTTPS
Port fields, respectively, if the port numbers were changed for the Remote
Console Switch in the serial console. For more information on changing
the port numbers in the serial console, see "To configure the HTTP and
HTTPS ports:" on page 19.
NOTE: If you chose to add multiple Remote Console Switches, any that do not use
the HTTP and HTTPS ports you specify will fail migration. You can migrate them by
running the Migration Wizard again and specifying the correct ports for those
Remote Console Switches.
6 Click Next.
7 If the migration was successful, the Completing the Migration Wizard
window will open.
-orIf the migration was not successful, the Migration Wizard was
unsuccessful window will open.
8 Click Finish to exit the wizard.
The Remote Console Switch will no longer be available in the Remote
Console Switch Software. You may now manage the switch using the onboard web interface; see "Managing Your Remote Console Switch Using the
On-board Web Interface" on page 101.
136

Migrating Your Remote Console Switch

Using the Resync Wizard
Complete the Resync Wizard to synchronize the local database and the
Remote Console Switch database.
NOTE: The Resync button is only available for switches with firmware supporting
the on-board web interface.
To launch the Resync Wizard:
1 Click the Remote Console Switches tab in the Explorer.
2 Select a Remote Console Switch from the Unit Selector pane, and then
click the Resync task button.
-orRight-click a Remote Console Switch in the Unit Selector pane. A pop-up
menu appears. Select Resync.
3 The Resync Wizard will open.
4 Click Next.
5 To include offline servers in the database, select the Include Offline
Servers check box.
-orIf you do not wish to include offline servers in the database, clear the
Include Offline Servers check box
6 To overwrite server names in the local database, select the Replace
Database names with the names from the Remote Console Switch check
box.
-orTo retain server names in the local database, clear the Replace Database
names with the names from the Remote Console Switch check box.
7 Click Next. The Polling Remote Console Switch window opens.
8 Then Detected Changes window opens and lists changes made to the
database.
9 Click Finish.

Migrating Your Remote Console Switch

137

138

Migrating Your Remote Console Switch

LDAP Feature for the Remote
Console Switch

8

Overview
The Dell 2161DS, 2161DS-2, 4161DS, and 2321DS suite of Remote Console
Switches can authenticate and authorize users via a local database or by an
external scalable distributed directory service using the the Dell Remote
Console Switch Software or on-board web interface with LDAP (Lightweight
Directory Assistance Protocol) support. LDAP is a protocol standard used for
accessing and updating a directory using TCP/IP. The Dell Remote Console
Switch Software and on-board web interface supports both standard and Dell
extended schema, and offers strong security features including
authentication, privacy, and integrity.
NOTE: Windows 2008 Server is required to use LDAP in IPv6 mode.
NOTE: Only Microsoft Active Directory® is supported by the Remote Console
Switches.
NOTE: Using Active Directory to recognize Remote Console Switch users is
supported on the Microsoft Windows® 2000 and Windows Server 2003 operating
systems.

The Structure of Active Directory
An Active Directory (AD) deployment consists of a distributed database
containing hierarchical structures of objects. Each object is associated with an
object class that determines what kinds of data can be stored in that object.
The hierarchical structures begin with objects that represent AD domains,
deployed to form a hierarchy of domain names that can be represented in a
tree diagram the same way DNS name spaces are usually depicted. The suite
of Dell Remote Console Switches is designed to support a single tree of
domains that are deployed in either a shallow or deep hierarchical name
structure.

LDAP Feature for the Remote Console Switch

139

Domain Controller Computers
Associated with the Domain hierarchy is the corresponding hierarchy of
Domain Controller computers where AD provides LDAP services. Each
domain may have multiple peer Domain Controllers and may also be
distributed across geographical sites. The suite of Dell Remote Console
Switches is designed to support both of these aspects of AD. DNS is used to
determine the network coordinates of each Domain Controller so that the
Dell Remote Console Switches can gracefully handle situations where some
Domain Controllers are not available on the network. DNS SRV records are
used for this purpose so the Dell Remote Console Switches always attempt to
contact alternative Domain Controllers at the “nearest” site first, depending
on the administrative settings configured in the SRV records.

Object Classes
Within each domain, there is another hierarchy of objects designed to store
information about various entities and groupings of entities. Such entities are
represented in AD by object classes used to define “containers” that help
organize groupings of objects. Other object classes represent entities such as
network users, computers, printers, or network services. Two types of
container object classes are of special interest: Group and Organizational Unit
(OU). These two object classes allow the AD administrator to define
groupings of entities for the purpose of simplifying the application of access
controls and other administrative policies. For example, a domain may be
configured to have an OU container named “Engineering” which contains
several Group objects named according to function, like “Hardware,”
“Software,” and “Support;” each of the groups is configured with a
membership list of User objects and perhaps Computer objects. Yet another
level of hierarchy can be configured by “nesting” groups; a nesting is formed
by including the name of a Group object in the membership of another
Group object. It should be noted here that each AD Group object has an
associated “scope” that is used to configure the types of nesting relationships
it is allowed to have with other groups; for example, when scope is set to
“Universal,” the group may participate in nesting that crosses domain
boundaries but when scope is set to “Local” it may not participate in such
nesting. Rules for nesting are available in the AD product documentation
available from Microsoft. The suite of Dell Remote Console Switches is
designed to support all nesting rules defined for AD.

140

LDAP Feature for the Remote Console Switch

Attributes
There is one more hierarchy used in AD. Associated with each object class is a
set of “attributes” used to store specific information about the entity that is
being represented. For example, associated with the User object class is an
attribute type named SAM ACCOUNT NAME and others such as FIRST
NAME, SURNAME, PASSWORD, etc. The suite of Dell Remote Console
Switches uses the SAM ACCOUNT NAME and PASSWORD attributes to
authenticate a user (the formal AD names for these two attributes are
sAMAccountName and unicodePWD, respectively).

Schema Extensions
AD is packaged with many object classes, including default containers for
Computer and User objects as well as classes for OU containers and classes to
represent computer and user entities. AD can be extended to include new
object classes such as those provided by Dell to simplify the administration of
access controls; such extensions are usually referred to as “schema extensions”
and are at the heart of the Dell Extended Schema feature described in this
document. These schema extensions provide customized object classes to
represent Dell Remote Console Switches, access control information, and a
type of container used to associate specific access control information with
specific instances of Dell Remote Console Switches and Users. It is important
to note that each attribute type and object class used in AD must have a
globally unique identifier, known as an Object Identifier (OID). These
unique identifiers are ultimately managed by internationally recognized
authorities. For AD, the OID space is managed secondarily by Microsoft. Dell
has obtained OIDs for the custom object classes and attribute types used in
the Dell Extended Schema feature. The following is a summary of the OIDs
Dell obtained:
Dell extension is: dell
Dell base OID is: 1.2.840.113556.1.8000.1280
RCS LinkID range is: 12070 to 12079
The suite of Dell Remote Console Switches is also designed to function using
only object classes present in the AD packaged classes; this option is known as
the Standard Schema. Under this option, the Computer object class is used
to represent Dell Remote Console Switches and standard Group objects are
LDAP Feature for the Remote Console Switch

141

used to associate specific access control information with specific instances of
Dell Remote Console Switches and Users. In this case, access control
information is stored in a specific attribute type in the Group object.
The hierarchical structures present in AD can complicate your ability to access
information stored in the directory objects. To avoid potential delays
associated with navigation of the hierarchies, the suite of Dell Remote Console
Switches is designed to use an aspect of AD known as the Global Catalog (GC).
The GC provides a “quick look-up” service by providing access to a subset of
the data stored in the complete AD database and by “collapsing” all of the
hierarchies and geographic distribution into a single relatively flat structure.
The GC is queried using the same LDAP directory queries that work on the
complete AD database. The AD product requires at least one of the Domain
Controllers in an enterprise to also be configured to provide GC services and
actual deployments of AD can have any or all of the Domain Controllers
configured to provide GC services. The suite of Dell Remote Console Switches
uses DNS to determine the network coordinates of each GC server so that the
Dell Remote Console Switches can gracefully handle situations where some
GC servers are not available on the network. DNS SRV records are used for this
purpose so that the Dell Remote Console Switches always attempt to contact
alternative GC servers at the “nearest” site first, depending on the
administrative settings configured in the SRV records.

Standard Schema versus Dell Extended Schema
To provide the greatest flexibility in the multitude of customer environments,
Dell provides a group of objects that can be configured by the user depending
on the desired results. Dell has extended the schema to include an
Association, Device, and Privilege object. The Association object is used to
link together the users or groups with a specific set of privileges to one or more
SIPs. The Device Object defines the individual Remote Console Switches
within the Active Directory structure and the privilege object is linked to
device objects via association objects to assign usage permissions.
This model provides an Administrator maximum flexibility over the different
combinations of users, privileges, and SIPs on the Remote Console Switch
without adding too much complexity.
Before installing the Dell Schema Extensions, Administrators should read
through the descriptions and instructions within this chapter to determine
which schema is right for their particular installation. Altering a schema
142

LDAP Feature for the Remote Console Switch

object will cause it to propagate through Active Directory so that once it is
created, it cannot be deleted. It can only be deactivated. Because of this, the
benefits of changing the schema should be carefully weighed before the effort
is undertaken.
The primary benefit gained by installing the Dell Schema Extensions is to
eliminate confusion. When using the standard Active Directory schema, a
Remote Console Switch most closely matches a computer device object and
is configured as one. Since the Remote Console Switch is not a computer, the
schema functions will not all apply. Care will have to be taken to correctly
configure a Remote Console Switch that is designated in this manner.
In addition, using the Dell Schema Extensions makes it easier to search on
and identify switch devices. A switch that is configured using a computer
device object will be searched on along with every computer device within the
Active Directory structure.
The Remote Console Switch can authenticate equally well using either
schema and no functionality is lost by using either method. Administrators
are free to choose whichever method works within their particular
installation. Instructions have been provided for installations with and
without the Dell Schema extensions. Sections and instructions that pertain
to only one schema set will be marked as such and may be ignored in
installations where they are not used.

Standard Installation
Before a Dell Remote Console switch can use Active Directory for
authentication:
1 Configure the Override Admin Account
2 Configure DNS Settings
3 Set the Network Time Protocol
4 Configure the Authentication Parameters
5 Configure Group Objects
6 Create and Download the CA Root certificate
7 Set the Login Timeout

LDAP Feature for the Remote Console Switch

143

Configure the Override Admin Account
Should a network failure occur, an account is provided that may be used
regardless of the unit’s ability to authenticate against an LDAP server. Before
configuring other settings, this account should be configured.
NOTE: You must be logged in as Admin with no password to perform this operation.
To configure the Override Admin Account in the on-board web interface:
1 Click the Configure tab, then click Users - Override Admin.
2 Type the username and password you wish to assign to the user and then
verify the password by typing it in the Verify Password field.
3 Click Save.

Configuring DNS Settings
Before the LDAP client can resolve names, at least one DNS server must be
specified.
The Network sub-category displays the name of the Remote Console Switch
and allows you to change the network settings including the IP address,
Subnet Mask, Gateway, LAN speed and DHCP/BootP setting. The name
displayed for the Remote Console Switch will be the same as the name given
in the System Name field in the SNMP category.
The Network sub-category allows the entry and maintenance of up to three
DNS Servers. These DNS servers are used to resolve DNS names provided on
the LDAP authentication panel.
NOTE: At least one DNS server must be configured for the LDAP feature to work.
NOTE: You can also set DNS server addresses using the appliance’s serial
administrative interface. For information about using the serial administrative
interface, please consult your appliance documentation.
To configure the DNS settings in the on-board web interface:
1 Click the Configure tab, then click Remote Console Switch - Network.
2 Specify the DNS settings and click Save.

144

LDAP Feature for the Remote Console Switch

Figure 8-1. On-board Web Interface - Network Subcategory

Configuring the Network Time Protocol Settings
The switch must have access to the current time to verify that certificates
have not expired. You can configure the switch to request time updates from
the network time server (NTP).
To configure NTP settings in the on-board web interface:
1 Click the Configure tab, then click Remote Console Switch - NTP.
2 Click the Enable NTP box.
3 Enter the name of your network time source in the provided boxes. You
may also set an hour interval to specify how often to request time updates.
If the interval is set to 0, requests will only be made during appliance
startup or when changes to the Global - NTP menu are made.
4 Click Save.

LDAP Feature for the Remote Console Switch

145

Configuring the LDAP Authentication Parameters
The Authentication panel allow you to configure your authentication and
authorization configuration parameters. You can send the username,
password, and other information to the Remote Console Switch, which then
uses LDAP to retrieve data from the Directory Service in order to determine
what permissions the user has.

Enabling LDAP Authentication
The Authentication Settings field allows you to choose Local or LDAP
Authentication. Click the Use LDAP Authentication checkbox to
authenticate against the LDAP-enabled directory service.
Once LDAP is enabled, the RCS and Root Domains should be designated in
the provided fields.

Entering Authentication Parameters
If you plan to install the Dell Extended Schema, enter only the RCS and Root
Domains that will be used.
If you elect not to use the Dell Extended Schema, the RCS Switches and
access controlled SIPs in your installation will be configured as Computer
Objects within Active Directory. To do this, you will first need to configure an
Organizational Unit to hold group objects that relate users to access
controlled Remote Console Switches and their attached SIPs. This can be a
previously created OU, or one created specifically for this purpose but it must
be unique among all OU objects in the Group Container domain.
Next, choose an attribute within the LDAP directory to be used to contain
discretionary access control information. This should be a previously unused
attribute that is capable of storing a string value. (The default is the “info”
attribute of the Group Object.)
Finally, you will need to enter the location for the Group Container, the
Group Container Domain and the Access Control Attribute in the blanks
provided in the Global - Authentication window.
For more detailed descriptions of the Authentication panel fields, see Table
8-1.
To access the Authentication panel in the on-board web interface:
Click the Configure tab, then click Remote Console Switch - Authentication.
146

LDAP Feature for the Remote Console Switch

Figure 8-2. On-board Web Interface - Authentication Panel Local/LDAP and
Parameters

LDAP Feature for the Remote Console Switch

147

Table 8-1. Authentication Panel Field Descriptions
Field
Description
Authentication
Settings

Users can choose to use LDAP authentication by clicking the
box shown.
The user may still log in with the Override admin account if the
LDAP servers are inaccessible.

Schema

Radio Button to indicate which Active Directory (AD) object
classes are used to store information related to authorization. For
the default Standard schema, Microsoft Active Directory objects
are used. When using the Extended schema, the extra Dell
object classes are added.

RCS Domain

The RCS Domain field contains the name of the Active
Directory Domain chosen to hold all objects that represent
Remote Console Switches and SIPs.

Root Domain

The uppermost domain within the Active Directory Forest.

Group
Container

This field, available when the standard schema is selected,
contains part of the Distinguished Name of an Organizational
Unit (OU) object in Active Directory. The OU is used to hold
(Standard
schema set only) group objects that relate users to access controlled Remote
Console Switches and their attached SIPs.
For example, suppose the Distinguished Name of the chosen OU
is: ou=KVM-AccessControls,dc=MyCom,dc=com. In this case,
the Group Container field should be set to “KVMAccessControls.” The name entered into the Group Container
field must be unique among all OU objects in the Group
Container domain. You may choose to use a previously created
OU for the Group Container, or create one specifically for this
purpose.
The default Group Container is KVM.
Group
This field, available when the Standard schema is selected, is the
Container
DNS name of the Active Directory domain where the group
Domain
container resides.
(Standard
schema set only)

148

LDAP Feature for the Remote Console Switch

Access Control
Attribute
(Standard
schema set only)

The value of this field specifies which attribute in the LDAP
directory is to be used to contain discretionary access control
information and is only enabled when Standard Schema is
selected.
The Access Control Attribute is chosen from among the
attributes in the LDAP directory object representing the group
whose membership includes both the user and the appliance or
attached computer that you are trying to access.
When using the Standard schema, it is necessary for Group
objects in the Group Container to have an attribute that is
chosen to contain the permission level associated with the
Group. The Access Control Attribute field, available when the
Standard schema is selected, contains the name of the chosen
attribute. The chosen attribute must be capable of storing a
character string value; for example, the default attribute is “info”
which is an attribute accessible via the Active Directory Users
and Computers (ADUC) snap-in. Using ADUC, the value of the
info attribute is set by accessing the “Notes” property of the
Group object.

LDAP SSL Certificates
All LDAP protocol exchanges (between a Remote Console Switch and Active
Directory servers) are secured by SSL. When the LDAP protocol is being
protected by SSL, it is referred to as LDAPS (Lightweight Directory Access
Protocol over SSL). Each LDAPS connection begins with a protocol
handshake that triggers a security certificate transmission from the
responding Active Directory server to the Remote Console Switch. Once
received, the Remote Console Switch is responsible for verifying the
certificate. In order to verify the certificate, the appliance must be configured
with a copy of the root Certification Authority's (CA) certificate. Before this
can be done, the certificate must first be generated.

Enabling SSL on a Domain Controller
If you plan to use Microsoft Enterprise Root CA to automatically assign all
your domain controllers SSL certificate, you must perform the following steps
to enable SSL on each domain controller if you have not previously done so.
1 Install a Microsoft Enterprise Root CA on a Domain Controller.

LDAP Feature for the Remote Console Switch

149

a

Select Start - Control Panel - Add or Remove Programs.

b

Select Add/Remove Windows Components.

c

In the Windows Components Wizard, select the Certificate Services
check box.

d

Select Enterprise root CA as CA Type and click Next.

e

Enter Common name for this CA, click Next, and click Finish.

2 Enable SSL on each of your domain controllers by installing the SSL
certificate for each controller.
a

Click Start - Administrative Tools - Domain Security Policy.

b

Expand the Public Key Policies folder, right-click Automatic
Certificate Request Settings and click Automatic Certificate
Request.

c

In the Automatic Certificate Request Setup Wizard, click Next and
select Domain Controller.

3 Click Next and click Finish.
A certificate/private key file can be created using openssl using Linux.
Openssl can be downloaded from openssl.org. Any instructions below with
text in <> is where a user would need to set a value based on the criteria at
the end of that line.
To create a certificate to import:
1 From the Linux command prompt, type openssl and hit Enter. The user
should be at the OpenSSL prompt.
OpenSSL> genrsa -out privatekey.pem <512>
Generating RSA private key, 512 bit long modulus
..........++++++++++++
.....++++++++++++
e is 65537 (0x10001)
OpenSSL> req -new -key privatekey.pem -x509 -out certificate.pem-batch
-days <365>

150

LDAP Feature for the Remote Console Switch

2 Enter the information that will be incorporated into your certificate
request in the Distinguished Name or DN. There may be a default value
for some fields. If you wish, you may type '.' to leave a field blank.
----Country Name (2 letter code) [GB]:
State or Province Name (full name) [Berkshire]:
Locality Name (eg, city) [Newbury]:
Organization Name (eg, company) [My Company Ltd]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []:
Email Address []:
OpenSSL> quit
3 From the Linux command prompt, type 'cat certificate.pem
privatekey.pem > webserver.pem', then convert the file from UNIX
linefeed to DOS carriage return/linefeed by typing 'unix2dos
webserver.pem'.
To export the CA certificate:
1 Within the Windows operating system, open the Certificate Authority
management tool:
Start - All Programs - Administrative Tools - Certificate Authority.
2 You may view properties of the certificate authority by right clicking on the
authority in the tree view and selecting Properties. The CA Properties
dialog box will open.
3 Click the General tab and the View Certificate button to open the
Certificate dialog box.
4 Click the Details tab then the Copy To File button. The Certificate
Export Wizard will open.
5 Click Next to begin using the wizard.
6 On the Export File Format screen select the Base-64 encoded X.509
(.CER) radio button and press the Next button.

LDAP Feature for the Remote Console Switch

151

7 On the File To Export screen enter or browse to a filename and path for
the exported certificate. Press the Next button.
8 Press the Finish button.
The resulting certificate file is properly formatted and readable by OpenSSL.
In general, it will be necessary to upload the CA certificate only once;
however, it will have to be uploaded again if the certificate is revoked, if it
expires, or if “Restore Factory Defaults” is selected from the serial console
menu.
NOTE: The instructions above are written for a Microsoft Root CA certificate. For
other CAs, please check with the CA vendor.
NOTE: The Network Time Protocol (NTP) must be enabled for LDAPS to function.
Figure 8-3. On-board Web Interface - Send Security Certificate

After sending the Security Certificate, the following window displays.

152

LDAP Feature for the Remote Console Switch

Figure 8-4. On-board Web Interface - Send Certificate

Button

Description

Browse

Browse to a certificate file by opening a File Chooser dialog and
allowing a user to choose a certificate file.

View Certificate

Displays the current Remote Console Switch certificate.

Send

Sends the certificate to the Remote Console Switch.

Cancel

Closes the dialog.

You can browse to a certificate and open it. Once the certificate is open and
its contents are displayed, the user can then send the certificate to the
appliance.
Field

Description

File

Path and name of the certificate file opened with the browse
(File Chooser) button.

Subject

Subject of the opened certificate.

Issuer

Person or entity that issued the certificate.

Validity Period

Period that the certificate is valid for.

Serial Number

Serial number of the certificate.

SHA-1 Thumbprint SHA-1 Thumbprint derived from the certificate.
MD5 Thumbprint

MD5 Thumbprint derived from the certificate.

LDAP Feature for the Remote Console Switch

153

Login Timeout
In cases where there is a large enough directory tree to cause LDAP
authentication to perform slowly, the Sessions window includes a Login
Timeout function with a default timeout of 30 seconds. The login timeout is
the time from which the user presses the OK button on the Login dialog box
until there is no response from the appliance. The appliance will also use this
value to determine the timeout on a LDAP request for authentication.
To specify the login timeout in the on-board web interface:
1 Click the Configure tab, then click Remote Console Switch - Sessions.
2 Specify the number of seconds in the Login Timeout menu.
3 Click Save.
Figure 8-5. On-board Web Interface - Login Timeout

CA Certificate Information Display
The Remote Console Switch can only display complete CA Certificate
Information in this window when the public key length is less than or equal to
2048 bits. When the key is greater than 2048 bits, the subject, issuer, and
validity period data in this window will be incomplete.
154

LDAP Feature for the Remote Console Switch

The following display is an example of the CA certificate information:
1 From the Client, download CA certificate into the appliance.
2 From the serial console Main Menu, type option 8 to display the LDAP CA
Certificate.
The appliance will display the following types of information:
Begin CA certificate information display
subject= /DC=msft/DC=ldaptest/CN=MyCertificate
issuer= /DC=msft/DC=ldaptest/CN=MyCertificate
notBefore=Dec 7 20:09:56 2005 GMT
notAfter=Dec 7 20:18:34 2010 GMT
serial=7BA146C0221A08B447B989292074329F
MD5 Fingerprint=
CB:6D:70:30:31:E5:1B:C0:90:BB:DB:32:B2:C9:D1:5A
End CA certificate information display
Perform the steps in the following instructions for enabling the installation of
RCS Software on Microsoft Windows Server 2003 platforms:
1 Select the Start menu.
2 Right-click on My Computer and select Properties.
3 Select the Advanced tab.
4 Click the Performance Settings button.
5 Select the Data Execution Prevention tab.
6 Select the radio button for Turn on DEP for essential Windows programs
and services only
7 Click OK.
8 Click OK again on the System Properties dialog box.

Configuring Group Objects
Access control is applied to a specific Active Directory user account by
including that user in the membership of a Group in the Group Container.
The Group membership must also contain the objects representing the
Remote Console Switch(es) and the SIP(s) the user is allowed to access. The
level of access granted is determined by the value of a specific attribute in the
Group object (Standard Schema) or Association Object (Extended Schema).
LDAP Feature for the Remote Console Switch

155

There are three permission levels available. In increasing order of access they
are, “KVM User”, “KVM User Admin” and, the most powerful level, “KVM
Appliance Admin.”
NOTE: If the KVM User access level is not being used, SIP objects will not need
configuration as both Administrator permissions have access to all SIPs by default.

156

LDAP Feature for the Remote Console Switch

Table 8-2.
Operation

LDAP (Group Attribute Authorization)
KVM Appliance
Admin

KVM User Admin

KVM User

Preemption

Allowed to preempt
another Appliance
Admin or a User Admin.
Permission must be
configured for each
target device by
including the TD in the
appropriate Group
object in the Directory.

Allowed to preempt another
User Admin. Permission
must be configured for each
target device by including
the target device in the
appropriate Group object in
the Directory.

No

Configure
network
parameters
and global
settings

Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.

No

No

Restart

Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.

No

No

FLASH
Upgrade

Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.

No

No

Administer
user
accounts

Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.

Yes – Permission must be
configured for each
appliance by including the
appliance in the appropriate
Group object in the
Directory.

No

LDAP Feature for the Remote Console Switch

157

Configure
port settings

Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.

Yes – Permission must be
configured for each
appliance by including the
appliance in the appropriate
Group object in the
Directory.

No

Target
Device
Access

Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.

Yes – Permission must be
configured for each
appliance by including the
appliance in the appropriate
Group object in the
Directory.

Yes, if
configured by
Administrator
Permission
must be
configured for
each target
device by
including the
TD in the
appropriate
Group object
in the
Directory.

An AD user account must be configured to receive appliance administrator
permission before that account will be allowed to modify any of the fields in
the Authentication Panel. In particular, only an appliance administrator is
allowed to modify the Authentication Settings.

Active Directory Object Overview for Standard Schema
For each of the physical Remote Console Switches on the network that you
want to integrate with Active Directory for Authentication and
Authorization, you must create at least one Computer Object to represent it.
You will also need to create a computer object for each SIP attached to the
RCS that will be controlled using the “KVM User” privilege level. Computer
objects representing SIPs are not required for the Administrator level groups.
Users in the KVM User Group will only have access to SIPs that are also in the
KVM User Group. Users with Administrator privileges will have access to all
SIPs by default.
To set up the Group Objects for a Remote Console Switch:
1 If you have not already, create the Organizational Unit that will contain
the Group Objects related to your switch installation.

158

LDAP Feature for the Remote Console Switch

2 Within this Organizational Unit, create three group objects to represent
user privilege levels. One for KVM Appliance Administrators, KVM User
Administrators and KVM Users respectively.
3 Using the MSADUC tool, open the KVM Appliance Administrator Group
Object and select the Notes property. Type the access level (“KVM
Appliance Admin”) for that group in the Notes field and save. Repeat this
step for the other two Group Objects using their respective names.
NOTE: The single syntax for all access control attribute values is:
"[ ] < privilege level> [ ]"
Where:  := "KVM User" or "KVM User Admin" or "KVM Appliance
Admin"
 ::= one or more of any of the following:  or  or 
or  or 
 is any string of alphanumeric characters and may be the null
(i.e., empty) string.
Square brackets indicate optional items; for example, the following template
indicates an optional string and delimiter followed by a required privilege level:
"[ ] < privilege level1>".

4 Create a computer object to represent the Remote Console Switch.
5 Create a computer object for each SIP attached to a server to be access
restricted at the KVM User privilege level.
6 Add the computer object that represents the switch to the appropriate
group objects.
7 Add user objects to the appropriate group object for their access level.
8 Add the computer objects for the access controlled SIPs to the KVM User
Group.

Dell Extended Schema Active Directory Object Overview
For each of the physical Remote Console Switches on the network that you
want to integrate with Active Directory for Authentication and
Authorization, you must create at least one RCS Device Object to represent
LDAP Feature for the Remote Console Switch

159

the physical switch and one Association Object. The Association object is
used to link together the users or groups with a specific set of privileges to one
or more SIPs. This model provides an Administrator maximum flexibility over
the different combinations of users, RCS privileges, and SIPs on the Remote
Console Switch without adding too much complexity.
The RCS Device Object is the link to the Remote Console Switch for
querying Active Directory for authentication and authorization. When a
Remote Console Switch is added to the network, the Administrator must
configure the Remote Console Switch and its device object with its Active
Directory name so that users can perform authentication and authorization
with Active Directory. The Administrator will also need to add the Remote
Console Switch to at least one Association Object in order for users to
authenticate.
You can create as many Association Objects as you want, and each Association
Object can be linked to as many users, groups of users, or RCS Device
Objects as desired. The users and RCS Device Objects can be members of
any domain in the enterprise.
However, each Association Object may be linked (or, may link users, groups of
users, or RCS Device Objects) to only one Privilege Object. A Privilege
Object allows an Administrator to control which users have what kind of
privileges on specific SIPs.
Figure 8-6 illustrates that the Association Object provides the connection
that is needed for all of the Authentication and Authorization.

160

LDAP Feature for the Remote Console Switch

Figure 8-6. Typical Setup for Active Directory Objects

Association Object

User(s) Group(s)

Privilege Object

RCS Device Object(s)

RCS Privilege Object

You can create as many or as few association objects as you want or need.
However, you must create at least one Association Object, and you must have
one RCS Device Object for each Remote Console Switch on the network that
you want to integrate with Active Directory for Authentication and
Authorization. The Association Object allows for as many or as few users
and/or groups as well as RCS Device Objects. However, the Association Object
only has one Privilege Object per Association Object. The Association Object
connects the “Users” who have “Privileges” on the RCSs.
In addition, you can set up Active Directory objects in a single domain or in
multiple domains. For example, you have two Remote Console Switches
(RCS1 and RCS2) and three existing Active Directory users (user1, user2, and
user3). You want to give user1 and user2 an administrator privilege to both
Remote Console Switches and give user3 a login privilege to the RCS2.
Figure 8-7 shows how you set up the Active Directory objects in this scenario.

LDAP Feature for the Remote Console Switch

161

Figure 8-7. Setting Up Active Directory Objects in a Single Domain

AO1

Group1

User1

User2

AO2

Prvi1

User3

Priv2

RCS1

RCS2

To set up the objects for the single domain scenario, perform the following
tasks:
1 Create two Association Objects.
2 Create two RCS Device Objects, RCS1 and RCS2, to represent the two
Remote Console Switches.
3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all
privileges (administrator) and Priv2 has login privileges.
4 Group user1 and user2 into Group1.
5 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege
Objects in AO1, and RCS1 and RCS2 as RCS Devices in AO1.
6 Add user3 as Members in Association Object 2 (AO2), Priv2 as Privilege
Objects in AO2, and RCS2 as RCS Devices in AO2.
See “Adding Remote Console Switch Users and Privileges to Active Directory
with Dell Schema Extensions” for detailed instructions.
Figure 8-8 shows how you can set up the Active Directory Objects in multiple
domains. In this scenario, you have two Remote Console Switches (RCS1 and
RCS2) and three existing Active Directory users (user1, user2, and user3).
162

LDAP Feature for the Remote Console Switch

User1 is in Domain1, and user2 and user 3 are in Domain2. You want to give
user1 and user 2 an administrator privilege to both Remote Console Switches
and give user3 a login privilege to the RCS2.
Figure 8-8. Setting Up Active Directory Objects in Multiple Domains
Domain 1

Domain 2

AO1

Group1

User1

User2

AO2

Priv1

User3

Priv2

RCS1

RCS2

To set up the objects for the multiple domain scenario, perform the following
tasks:
1 Ensure that the domain forest function is in Native or Windows 2003
mode.
2 Create two Association Objects, AO1 (of Universal scope) and AO2, in any
domain. The figure shows the objects in Domain2.
3 Create two RCS Device Objects, RCS1 and RCS2, to represent the two
Remote Console Switches.
4 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all
privileges (administrator) and Priv2 has login privileges.
5 Group user1 and user2 into Group1. The group scope of Group1 must be
Universal.
6 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege
Objects in AO1, and RCS1, RCS2 as RCS Devices in AO1.

LDAP Feature for the Remote Console Switch

163

7 Add user3 as a Member in Association Object 2 (AO2), Priv2 as Privilege
Objects in AO2, and RCS2 as RCS Devices in AO2.

Configuring Active Directory with Dell Schema
Extensions to Access Your RCS
Before you can use Active Directory to access your Remote Console Switch,
you must configure the Active Directory software and the Remote Console
Switch by performing the following steps in their numbered order:
1 Extend the Active Directory schema.
2 Extend the Active Directory Users and Computers Snap-in.
3 Add RCS users and their privileges to Active Directory.

Extending the Active Directory Schema (Optional)
Extending your Active Directory schema will add a Dell organizational unit,
schema classes and attributes, and example privileges and association objects
to the Active Directory schema.
NOTE: Before you extend the schema, you must have Schema Admin privileges on
the Schema Master Flexible Single Master Operation (FSMO) Role Owner of the
domain forest.
You can extend your schema using two different methods. You can use the
Dell Schema Extender utility or you can use the LDIF script file.
NOTE: The Dell organizational unit will not be added if you use the LDIF script file.
The LDIF files and Dell Schema Extender can be obtained at
dell.com/support.
To use the LDIF files, see the instructions in the readme that is in the LDIF
files directory. To use the Dell Schema Extender to extend the Active
Directory Schema, perform the steps in “Using the Dell Schema Extender.”
You can copy and run the Schema Extender or LDIF files from any location.
Using the Dell Schema Extender
NOTE: The Dell Schema Extender uses the SchemaExtenderOem.ini file. To ensure
that the Dell Schema Extender utility functions properly, do not modify the name of
this file.
1 Click Next on the Welcome screen.
164

LDAP Feature for the Remote Console Switch

2 Read the warning and click Next again.
3 Either select Use Current Log In Credentials or enter a user name and
password with schema administrator rights.
4 Click Next to run the Dell Schema Extender.
5 Click Finish.

Installing the Dell Extension to the Active Directory Users and
Computers Snap-In (Optional)
When you extend the schema in Active Directory, you must also extend the
Active Directory Users and Computers snap-in so that the administrator can
manage Remote Console Switch devices, Users and User Groups, Remote
Console Switch Associations, and SIP Privileges. The Dell Extension to the
Active Directory User’s and Computers Snap-In is an option that can be
installed when you install your systems management software using the Dell
Systems Management Consoles CD. See the Dell OpenManage Software
Quick Installation Guide for further instructions on installing systems
management software.
NOTE: You must install the Administrator Pack on each system that is managing
the Active Directory Remote Console Switch Objects. The installation is described
in the following section, “Opening the Active Directory Users and Computers SnapIn.” If you do not install the Administrator Pack, then you cannot view the Dell SIP
Object in the container.
NOTE: For more information about the Active Directory Users and Computers
snap-in, see your Microsoft documentation.
Opening the Active Directory Users and Computers Snap-In

To open the Active Directory Users and Computers snap-in, perform the
following steps:
If you are on the domain controller, click Start -Admin Tools - Active
Directory Users and Computers. If you are not on the domain controller, you
must have the appropriate Microsoft Administrator Pack installed on your
local system. To install this Administrator Pack, click Start - Run, type MMC
and press Enter. This opens the Microsoft Management Console (MMC).
1 Click File (or Console on systems running Windows 2000) in the Console
1 window.

LDAP Feature for the Remote Console Switch

165

2 Click Add/Remove Snap-in.
3 Select the Active Directory Users and Computers snap-in and click Add.
4 Click Close and click OK.

Adding Users and Privileges to Active Directory
with Dell Schema Extensions
The Dell-extended Active Directory Users and Computers snap-in allows you
to add Remote Console Switch users and privileges by creating SIP,
Association, and Privilege objects. To add each type of object, perform the
steps in each subsections.

Creating a SIP Object
1 In the MMC Console Root window, right-click a container.
2 Select New - Dell SIP Object. This opens the New Object window.
3 Type a name for the new object. This name must match the Remote
Console Switch Name that you will type in step 4 of “Configuring the
Remote Console Switch.”
4 Select SIP Device Object.
5 Click OK.

Creating a Privilege Object
Privilege Objects must be created in the same domain as the Association
Object to which it is associated.
1 In the Console Root (MMC) window, right-click a container.
2 Select New - Dell SIP Object to open the New Object window.
3 Type a name for the new object.
4 Select Privilege Object.
5 Click OK.
6 Right-click the privilege object that you created, and select Properties.
7 Click the RCS Privileges tab and select the Remote Console Switch
privileges that you want the user to have.

166

LDAP Feature for the Remote Console Switch

Using Dell Association Objects Syntax
Using the Dell Association Objects syntax, object types default to User and
Group in the Dell LDAP Schema. In the Dell Extended Schema, Dell has
added unique Object IDs for four new object classes:
•

KVM Appliance Objects

•

KVM SIP Objects

•

Privilege Objects

•

Association Objects

Each of these new object classes is defined in terms of various combinations
(hierarchies) of default Active Directory classes, together with Dell unique
attribute types. Each of the Dell unique attribute types is defined in terms of
a default Active Directory attribute syntax.
The default Microsoft Active Directory object classes used include User and
Group. The User class generally denotes Active Directory objects that contain
information about single entities. The Group class represents containers used
for nesting and contain information about collections of objects.
Each KVM Appliance Object represents an individual Remote Console
Switch within Active Directory. Since these are single entities, in the LDAP
default language they are User objects rather than Group objects.
Each Privilege Object defines a distinct composite set of privileges. Each set
is treated as a discrete entity, therefore it is a User object rather than a Group
object.
An Association Object contains a collection of information about the
privileges granted to a specific user accounts with respect to a specific
appliance (or appliances) and/or specific SIP (or SIPs). User accounts in an
Appliance Object may be specified in terms of any combination of the
following:
•

Individual account

•

Active Directory security group of user accounts

•

Multiple Active Directory security groups of user accounts

Similarly, for the appliances and/or SIPs in an Association Object and because
the Association Object has the ability to use security groups in the same way,
it is defined as a group object itself.

LDAP Feature for the Remote Console Switch

167

Creating an Association Object
The Association Object is derived from a Group and must contain a Group
Type. The Association Scope specifies the Security Group Type for the
Association Object. When you create an Association Object, you must choose
the Association Scope that applies to the type of objects you intend to add.
Selecting Universal, for example, means that association objects are only
available when the Active Directory Domain is functioning in Native Mode or
above.
To create an association object:
1 In the Console Root (MMC) window, right-click a container.
2 Select New - Dell SIP Object to open the New Object window.
3 Type a name for the new object.
4 Select Association Object.
5 Select the scope for the Association Object.
6 Click OK.

Adding Objects to an Association Object
By using the Association Object Properties window, you can associate users or
user groups, privilege objects, and SIP devices or SIP device groups.
NOTE: When using Windows 2000 mode or higher, you must use Universal Groups
to span domains with your users or SIP objects.
You can add groups of Users and SIP devices. Creating Dell-related groups is
done the same way you create other groups.
To add users or User Groups:
1 Right-click the Association Object and select Properties.
2 Select the Users tab and click Add.
3 Type the user or User Group name and click OK.
Click the Privilege Object tab to add the privilege object to the association
that defines the user’s or user group’s privileges when authenticating to a SIP
device.
NOTE: You can add only one privilege object to an association object.
To add a privilege:

168

LDAP Feature for the Remote Console Switch

1 Select the Privileges Object tab and click Add.
2 Type the Privilege Object name and click OK.
Click the Products tab to add one or more SIP devices to the association. The
associated devices specify the SIP devices connected to the network that are
available for the defined users or user groups.
NOTE: You can add multiple SIP devices to an association object.
To add SIP devices or SIP device groups:
1 Select the Products tab and click Add.
2 Type the SIP device or SIP device group name and click OK.
3 In the Properties window, click Apply and then OK.

Console Redirection Access Security
In any Remote Console Switch installation, any user privilege allows the user
to launch the on-board web interface. The on-board web interface
functionality for that user is limited by the User Privilege level established in
the Remote Console Switch. LDAP with Dell Extended Schema adds an
extra level of security to appliance management by allowing administrators to
limit a user's access to the on-board web interface.
Authorization to use the on-board web interface is defined by whether User
Privilege level is or is not configured in the KVM Appliance Privileges tab of
the Dell Privilege Object (DPO). The Console Redirection Access checkbox
in the KVM SIP Privileges tab of the DPO provides the means for a user who
cannot view the on-board web interface to launch Video Viewer sessions to a
subset of SIPs through the RCS Client. This authorization is controlled by a
combination of the configuration parameters set in the DPO and the SIP
Objects contained in the Dell Association Object (DAO).
If you do not wish a user to have authorization to access the on-board web
interface, but you do wish them to be able to launch viewer sessions from the
RCS Client, perform the following steps:
1 Create a Dell SIP object for each SIP that the User(s) is (are) allowed to
access.
2 Create an Active Directory User account for each of the users to be
controlled.

LDAP Feature for the Remote Console Switch

169

3 Create a DPO. Do not check any of the three boxes on the “KVM
Appliance Privileges” tab. Check the Console Redirection Access box on
the “KVM SIP Privileges” tab.
NOTE: If you check any of the KVM Appliance Privileges check boxes and you check the
Console Redirection Access box, the normal User Privileges associated with the
privilege level checked in the KVM Appliance Privileges box will take precedence
over the Console Redirection Access checkbox, and the user will still be able to
view the AMP.

4 Create a DAO.
5 Open the properties dialog for the DAO created in step 4.
a

Add all the user accounts created in step 2.

b

Add the DPO created in step 3.

c

Add the SIP objects created in step 1.

Using Active Directory to Log In to the Remote
Console Switch
You can use Active Directory to log in to the Remote Console Switch through
the Remote Console Switch Software or on-board web interface.
The login syntax is consistent for all three methods:
 or \ or /
(where username is an ASCII string of 1–256 bytes). No white space and no
special characters (such as \, /, or @) are allowed in either the username or the
domain name.
NOTE: You cannot specify NetBIOS domain names, such as Americas, since those
names cannot be resolved.
NOTE: If a domain name is not included, the local database in the Remote Console
Switch will be used to authenticate the user.

Target Device Naming Requirements for LDAP
Implementation
If you experience the following error:

170

LDAP Feature for the Remote Console Switch

Login Failure. Reason: Access cannot be granted due to
Authentication Server errors
Please verify that the SIP object was created in the Active Directory and its
name exactly matches the name assigned to that SIP via the OSCAR
interface at the console switch.
The Dell Standard Schema and the Dell Extended Schema use specific object
classes in the Microsoft Windows Active Directory to represent SIPs. The
Microsoft standard naming conventions for these object classes prohibit the
use of special characters or spaces. If you intend to use LDAP in a deployed
environment where target device names in SIPs currently include spaces or
special characters, you will need to rename them without spaces or special
characters.
Renaming a target device in a SIP should be done through the on-board web
interface or OSCAR interface at the console switch and then resynchronized
through the Remote Console Switch Software. Instructions for renaming a
target device in a SIP can be found in "Assigning Device Names" on page 49.
It is important to note that while OSCAR interface will allow you to enter
spaces into the names assigned to the SIPs, Active Directory does not. You
must name SIP objects according to the Microsoft Active Directory rules.

Frequently Asked Questions
Table 8-3 lists frequently asked questions and answers.

Table 8-3.

Using the RCS with Active Directory: FAQ

Can I log into the Remote Console
Switch using Active Directory across
multiple forests?

The RCS Active Directory query
algorithm only supports a single tree
in a single forest.

LDAP Feature for the Remote Console Switch

171

172

Does the login to the Remote Console
Switch using Active Directory work in
mixed mode (that is, the domain
controllers in the forest run different
operating systems, such as Microsoft
Windows NT® 4.0, Windows 2000, or
Windows Server 2003)?

Yes. In mixed mode, all objects used
by the Remote Console Switch
querying process (among user, SIP
Device Object, and Association
Object) have to be in the same
domain.

Does using the Remote Console Switch
with Active Directory support multiple
domain environments?

Yes. The domain forest function level
must be in Native mode or Windows
2003 mode. In addition, the groups
among Association Object, Remote
Console Switch user objects, and SIP
Device Objects (including Association
Object) must be universal groups.

Can these Dell-extended objects (Dell
Association Object, Dell Remote
Console Switch Device, and Dell
Privilege Object) be in different
domains?

The Association Object and the
Privilege Object must be in the same
domain. The Dell-extended Active
Directory Users and Computers snapin forces you to create these two
objects in the same domain. Other
objects can be in different domains.

Are there any restrictions on Domain
Controller SSL configuration?

Yes. All Active Directory servers’ SSL
certificates in the forest must be
signed by the same root CA since
Remote Console Switch only allows
uploading one trusted CA SSL
certificate.

The Dell-extended Active Directory
Users and Computers snap-in checks
the mode and limits users in order to
create objects across domains if in
mixed mode.

LDAP Feature for the Remote Console Switch

What can I do if I cannot log
into the Remote Console
Switch using Active Directory
authentication? How do I
troubleshoot the issue?

Troubleshoot as follows:
•

If no domain name is specified, the
local database is used. To login when
AD authentication isn't working, use
the default local admin account.

•

Ensure that you have checked the
Enable Active Directory check box
(Remote Console Switch Software) or
the Use LDAP Authentication check
box (on-board web interface) on the
Remote Console Switch Active
Directory configuration page.

•

Ensure that the DNS setting is correct
on the Remote Console Switch
Networking configuration page.

•

Ensure Network Time Protocol is
enabled on at least one server specified
on the NTP panel.

•

Ensure that you have uploaded the
Active Directory certificate from your
Active Directory root CA to the
Remote Console Switch.

•

Check the Domain Controller SSL
certificates to ensure that they have not
expired.

•

Ensure that your “Remote Console
Switch Name”, “Root Domain Name”,
and “Remote Console Switch Domain
Name” match your Active Directory
environment configuration.

•

Ensure that you use the correct user
domain name during a login and not
the NetBIOS name.

LDAP Feature for the Remote Console Switch

173

174

LDAP Feature for the Remote Console Switch

Appendix A: Remote Console
Switch Software Keyboard and
Mouse Shortcuts
Table B.1:

A

Divider Pane Keyboard and Mouse Shortcuts

Operation

Description

F6

Navigates between the split-screens and gives focus to the last
element that had focus.

F8

Gives focus to the divider.

Left or Up Arrow Moves the divider left if the divider has the focus.
Right or Down
Arrow

Moves the divider right if the divider has the focus.

Home

Gives the right pane of the split-screen all of the area (left pane
disappears) if the divider has the focus.

End

Gives the left pane of the split-screen all of the area (right pane
disappears) if the divider has the focus.

Click + Mouse
Drag

Moves the divider left or right.

Table B.2:

Tree View Control Keyboard and Mouse Shortcuts

Operation

Description

Mouse SingleClick

Deselects the existing selection and selects the node the mouse
pointer is over.

Mouse DoubleClick

Toggles the expand/collapse state of an expandable node (a node
that has children). Does nothing on a leaf node (a node that does
not have children).

Up Arrow

Deselects the existing selection and selects the next node above
the current focus point.

Appendix A: Remote Console Switch Software Keyboard and Mouse Shortcuts

175

Table B.2:

Tree View Control Keyboard and Mouse Shortcuts

Operation

Description

Down Arrow

Deselects the existing selection and selects the next node below
the current focus point.

Spacebar

Alternately selects/deselects the node that currently has the focus.

Enter

Alternately collapses/expands the node that has focus. Only applies
to nodes that have children. Does nothing if the node does not
have children.

Home

Deselects the existing selection and selects the root node.

End

Deselects the existing selection and selects the last node displayed
in the tree.

Table B.3:

Keyboard and Mouse Operations for the Unit List

Operation

Description

Enter or Return Launches the default action for the selected unit.
Up Arrow

Deselects current selection and moves selection up one row.

Down Arrow

Deselects current selection and moves selection down one row.

Page Up

Deselects current selection and scrolls up one page then selects the
first item on the page.

Page Down

Deselects current selection and scrolls down one page then selects
the last item on the page.

Delete

Performs the Delete function. Works the same as the Edit>Delete menu function.
Please see that section for more information.

Ctrl + Home

Moves the focus and the selection to the first row in the table.

Ctrl + End

Moves the focus and the selection to the last row in the table.

Shift + Up
Arrow

Extends selection up one row.

Shift + Down
Arrow

Extends selection down one row.

Shift + Page Up Extends selection up one page.

176

Appendix A: Remote Console Switch Software Keyboard and Mouse Shortcuts

Table B.3:

Keyboard and Mouse Operations for the Unit List

Operation

Description

Shift + Page
Down

Extends selection down one page.

Shift + Mouse
Click

Deselects any existing selection and selects the range of rows
between the current focus point and the row the mouse pointer is
over when the mouse is clicked.

Ctrl + Mouse
Click

Toggles the selection state of the row the mouse pointer is over
without affecting the selection state of any other row.

Mouse doubleclick

Launches the default action for the selected unit.

Appendix A: Remote Console Switch Software Keyboard and Mouse Shortcuts

177

178

Appendix A: Remote Console Switch Software Keyboard and Mouse Shortcuts

Appendix B: TCP Ports

B

The following table lists the functions performed by the Remote Console
Switch and which ports are used.
Table B-1.

Ports Used

Port

Function

TCP 80/443

Default HTTP/HTTPS.

TCP 2068/8192

Video Viewer video, keyboard, mouse, user authentication, and
virtual media.

TCP/UDP 3211 Discovery, AMP user authentication.
TCP 3871

Plug-in support.

NOTE: Most data on ports 2068 and 3211 is encrypted using the Secure Socket
Layer (SSL) protocol.
Figure C-1. TCP Port Communication

NOTE: The TCP/IP ports are fixed and cannot be altered.

Appendix B: TCP Ports

179

180

Appendix B: TCP Ports

C

Appendix C: MIBs and SNMP Traps

This appendix provides formatted information drawn from the Management
Information Bases (MIBs) written for Dell 2161DS-2/4161DS/2321DS
Remote Console Switches. Sections in this guide follow MIB groups and
provide explanation and definitions for the terms used to define MIB objects.
You can access MIB-11 and MIB databases while using IPv4 or IPv6 and can add
IPv4 or IPv6-specific traps.
MIB is a virtual database of managed objects contained within the SNMP
agent. It is a collection of objects that defines the properties of the managed
devices.
The Remote Console Switch MIB definitions use the structure described in
the following Request For Comments (RFCs).
•

RFC-1155-SMI
Describes the common structures and identification scheme for the
definition of management information for use with TCP/IP-based
Internets.

•

RFC-1212
Describes the format for producing concise and descriptive MIB
modules.

•

RFC-1213-MIB
Describes the Internet standard MIB-II for use with network
management protocols in TCP/IP-based internetworks.

•

RFC-1215
Describes the SNMP standardized traps and provides a means for
defining enterprise-specific traps.

The private Remote Console Switch MIB is represented by the object
identifier 1.3.6.1.4.1.10418.3, which include the subtrees dsProducts (1),
dsManagement (2), dsOEM (3), and SNMP Traps as shown in Figure C-1.

Appendix C: MIBs and SNMP Traps

181

Figure C-1. Dell Remote Console Switch MIB Structure

MIB Groups
Product ID Group (dsProductID) 1.3.6.1.4.1.10418.3.3.1.1

Product ID group objects are shown in Table C-1. The primary purpose of the
Product ID group is for management station to uniquely identify the
manufacturer, model, product version and firmware version of the Remote
Console Switch. Product ID group object types may be useful for inventory
purposes, or for automatically detecting incompatibilities or version
mismatches between various hardware and software components on a system.

182

Appendix C: MIBs and SNMP Traps

Table C-1. Product IP Group Objects
Object Type
Description

OID

dsProductIDDisplayName Product name in UTF8.

1.3.6.1.4.1.10418.3.3.1.1.1

dsProductIDVendor

1.3.6.1.4.1.10418.3.3.1.1.3

Product vendor name in
UTF8.

ProductIDProductVersion Global product version in
UTF8.

1.3.6.1.4.1.10418.3.3.1.1.4

dsProductIDDModuleF
WVersion

1.3.6.1.4.1.10418.3.3.1.1.5

The D module firmware
version string in UTF8.

dsProductIDMainboardF The main board firmware
WVersion
version string in UTF8.

1.3.6.1.4.1.10418.3.3.1.1.6

dsProductIDStatus

1.3.6.1.4.1.10418.3.3.1.1.7

Reports the operating state
of the product based on a
mapping of the private
MIB variable
dsServerStatus as follows:

dsProductIDStatus
ok (3) the product is
operational.

dsServerStatus
ready (1)
startupInProgress (2)
subsystemUpgrading (3)

unknown (2) the product is
starting up and is not
operational.
non-critical (4) the product
is upgrading its flash and is
not operational.

kdbMseSubsystemFailure
(4)

non-recoverable (6) a
subsystem failure has
occurred. The product is not
videoSubsystemFailure (5) fully operational.
non-recoverable (6) a
subsystem failure has
occurred. The product is not
fully operational.
dsProductIDDescription

Product description in
UTF8.

1.3.6.1.4.1.10418.3.3.1.1.2

Appendix C: MIBs and SNMP Traps

183

Object Type

Description

OID

dsProductIDVendor

Product vendor name in
UTF8.

1.3.6.1.4.1.10418.3.3.1.1.3

ProductIDProductVersion Global product version in
UTF8.

1.3.6.1.4.1.10418.3.3.1.1.4

dsProductIDDModuleF
WVersion

1.3.6.1.4.1.10418.3.3.1.1.5

The D module firmware
version string in UTF8.

dsProductIDMainboardF The main board firmware
WVersion
version string in UTF8.
dsProductIDStatus

1.3.6.1.4.1.10418.3.3.1.1.6

Reports the operating state 1.3.6.1.4.1.10418.3.3.1.1.7
of the product based on a
mapping of the private
MIB variable
dsServerStatus as follows:
dsProductIDStatus
dsServerStatus ready (1)

ok (3) the product is
operational.

startupInProgress (2)
subsystemUpgrading (3)
kdbMseSubsystemFailure
(4)

unknown (2) the product is
starting up and is not
operational.
non-critical (4) the product
is upgrading its flash and is
not operational.

videoSubsystemFailure (5) non-recoverable (6) a
subsystem failure has
occurred. The product is not
fully operational.
non-recoverable (6) a
subsystem failure has
occurred. The product is not
fully operational.

184

Appendix C: MIBs and SNMP Traps

SIP Group (dsSIP) 1.3.6.1.4.1.10418.3.3.1.2

SIP group objects are shown in Table C-2. The SIP group objects are
structured in a table format and contain information on SIPs connected to
the Remote Console Switch, such as SIP’s boot, application and hardware
version.

Appendix C: MIBs and SNMP Traps

185

Table C-2. SIP Group Objects
Object Type
Description

OID

dsSipTable

Table containing SIPs 1.3.6.1.4.1.10418.3.3.1.2.1
information.

dsSipTableEntry

An entry in the SIP
table.

dsSipTableIndex

A unique index
1.3.6.1.4.1.10418.3.3.1.2.1.1.1
representing an entry
into the SIP table.

dsSipTableInputPort

An input port
1.3.6.1.4.1.10418.3.3.1.2.1.1.2
number. Designates
the port to which the
SIP is connected.

dsSipTableEID

The EID of the SIP.

1.3.6.1.4.1.10418.3.3.1.2.1.1

1.3.6.1.4.1.10418.3.3.1.2.1.1.3

dsSipTableBootImageVersion The SIP's boot image 1.3.6.1.4.1.10418.3.3.1.2.1.1.4
version in UTF8.
dsSipTableAppImageVersion The SIP's application 1.3.6.1.4.1.10418.3.3.1.2.1.1.5
image version in
UTF8.
dsSipTableHardwareVersion

The SIP's hardware
version in UTF8.

1.3.6.1.4.1.10418.3.3.1.2.1.1.6

dsSipTableStatus

The status of the SIP. 1.3.6.1.4.1.10418.3.3.1.2.1.1.7

SNMP Trap Object Group

This section describes the variables sent to Dell 2161DS-2/4161DS Remote
Console Switches. It provides additional information about a trap or an alert
generated by an event on the RCS. The following objects are for generation of
traps. The objects are sent in traps and are not accessible in any other way.
User Name
Variable
Name

dsTrapObjectUserName

OID

1.3.6.1.4.1.10418.3.2.6.1

186

Appendix C: MIBs and SNMP Traps

User Name
Description

This object is sent in a trap to identify the name of the user for which
the trap condition occurred. If the trap condition occurred as a result
of activity on the local port (OSD), then the value of this object will
be the following string: local port.

Syntax

UTF8String (SIZE (3.16))

Target User Name
Variable Name

dsTrapObjectTargetUserName

OID

1.3.6.1.4.1.10418.3.2.6.2

Description

This object is sent in a trap to identify the name of the target user
for which a trap condition occurred.

Syntax

UTF8String (SIZE (3.16))

Image Type
Variable Name

dsTrapObjectImageType

OID

1.3.6.1.4.1.10418.3.2.6.3

Description

This object is sent in a trap to identify the type of software image
for which the trap condition occurred.

Syntax

UTF8String (SIZE (0.64))

New Image Version
Variable Name

dsTrapObjectImageNewVersion

OID

1.3.6.1.4.1.10418.3.2.6.4

Description

UTF8String (SIZE (0.32))

Syntax

This object is sent in a trap to identify the version of the new
software image for which the Remote Console Switch is being
upgraded.

Current Image Version
Variable Name

dsTrapObjectImageCurrentVersion

Appendix C: MIBs and SNMP Traps

187

Current Image Version
OID

1.3.6.1.4.1.10418.3.2.6.5

Description

This object is sent in a trap to identify the version of the
software image that the Remote Console Switch is currently
running.

Syntax

UTF8String (SIZE (0.32))

Image Upgrade Results
Variable Name

dsTrapObjectImageUpgradeResults

OID

1.3.6.1.4.1.10418.3.2.6.6

Description

This object is sent in a trap to report the results of an FTP,
TFTP, or ASMP image upgrade.

Syntax

UTF8String (SIZE (0.64))

Session Identifier
Variable Name

dsTrapObjectSessionIdentifier

OID

1.3.6.1.4.1.10418.3.2.6.7

Description

This object is sent in a trap to identify the session for which the
trap condition occurred. The value will be the name of a server if
the server name is known, otherwise the value will be the
connection path to a server.
If the value is a connection path it will have the following
format: SIP s:Channel c
Where s is the ID of the SIP, and c is the tiered switch channel
number
(0 if there is no switch in the path).

Syntax

UTF8String (SIZE (0.32))

SIP Identification
Variable Name

dsTrapObjectSipId

OID

1.3.6.1.4.1.10418.3.2.6.8

188

Appendix C: MIBs and SNMP Traps

SIP Identification
Description

This object is sent in a trap to identify the SIP for which the
trap condition occurred.

Syntax

UTF8String (SIZE (0.32))

Tiered Switch Identification
Variable Name

dsTrapObjectTieredSwitchName

OID

1.3.6.1.4.1.10418.3.2.6.9

Description

This object is sent in a trap to identify the tiered switch
for which the trap condition occurred.

Syntax

Syntax UTF8String (SIZE (0.15))

Tiered Switch Old
Identification
Variable Name

dsTrapObjectOldTieredSwitchName

OID

1.3.6.1.4.1.10418.3.2.6.10

Description

This object is sent in a trap to identify the old name of a tiered
switch whose name was changed.

Syntax

UTF8String (SIZE (0.15))

Server Identification
Variable Name

dsTrapObjectServerName

OID

1.3.6.1.4.1.10418.3.2.6.11

Description

This object is sent in a trap to identify the server for which the
trap condition occurred.

Syntax

UTF8String (SIZE (0.15))

Server’s Old
Identification
Variable Name

dsTrapObjectOldServerName

OID

1.3.6.1.4.1.10418.3.2.6.12
Appendix C: MIBs and SNMP Traps

189

Server’s Old
Identification
Description

This object is sent in a trap to identify the old name of a server
whose name was changed.

Syntax

UTF8String (SIZE (0.15))

Filename
Identification
Variable Name

dsTrapObjectFileName

OID

1.3.6.1.4.1.10418.3.2.6.13

Description

This object is sent in a trap to identify the name of a file for which
the trap condition occurred.

Syntax

DisplayString (SIZE (0.12))

Firmware Condition
Variable Name

dsTrapObjectFirmwareCondition

OID

1.3.6.1.4.1.10418.3.2.6.14

Description

This trap message contains data for application specific
diagnostics. It is designed in provision for diagnostic help for
installation-specific problems. It would require the operator to
install firmware provided to isolate their particular problems,
and to enable the trap to report conditions.
The contents will be a Dell Application Message Packet with
the address, size, and command header removed. The
parameters of the message will depend on the specific problem
the firmware is designed to detect and report.

Syntax

OCTET STRING (SIZE (0.64))

Device
Identification
Variable Name

dsTrapObjectDeviceId

OID

1.3.6.1.4.1.10418.3.2.6.15

190

Appendix C: MIBs and SNMP Traps

Device
Identification
Description

This object is sent in a trap to identify the device for which the
trap condition occurred.

Syntax

UTF8String (SIZE (0.32))

Warning/Alarm
Condition
Variable Name

dsTrapObjectAlarmCondition

OID

1.3.6.1.4.1.10418.3.2.6.16

Description

This object is sent in a trap to identify Warning/Alarm activity for
the device on which the trap condition occurred.
Alarm sets the alarm, OK indicates the condition has cleared up.

Syntax

SyntaxINTEGER {alarm(1),ok(2)}

Warning/Alarm
Explanation
Variable Name

dsTrapObjectAlarmDescription

OID

1.3.6.1.4.1.10418.3.2.6.17

Description

This object is sent in a trap to explain the warning or alarm
condition for which the trap condition occurred. This is intended
for display or logging.

Syntax

UTF8String (SIZE (0.64))

User Account Lock Reason
Variable Name

dsTrapObjectLockReason

OID

1.3.6.1.4.1.10418.3.2.6.18

Description

This object is sent in a trap to explain the reason for
which a user account has been locked.

Syntax

UTF8String (SIZE (0.64))

Appendix C: MIBs and SNMP Traps

191

User Account Unlocked Reason
Variable Name

dsTrapObjectUnlockReason

OID

1.3.6.1.4.1.10418.3.2.6.19

Description

This object is sent in a trap to explain the reason for
which a user account has been unlocked.

Syntax

UTF8String (SIZE (0.64))

IP Address
Variable Name dsTrapObjectIPAddress
OID

1.3.6.1.4.1.10418.3.2.6.20

Description

This object is sent in a trap to identify the IP address for which a trap
condition occurred.

Syntax

UTF8String (SIZE (0.256))

SIP Image Upgrade Result
Variable Name dsTrapObjectSipImageUpgradeResult
OID

1.3.6.1.4.1.10418.3.2.6.21

Description

This object is sent in a trap to report the result of an SIP image
upgrade.

Syntax

SyntaxINTEGER {
sipUpgradeNoFirmwareImage(1), -- No firmware image present
sipUpgradeLostContact(2),

-- Lost communication with the SIP

sipUpgradeFailedRestart(3),
upgrade

-- The SIP did not restart after

sipUpgradeFailedVerify(4),
Version
sipUpgradeSuccess(9999)
}

192

Appendix C: MIBs and SNMP Traps

-- The SIP failed to upgrade to correct
-- Success

Type of SIP Image
Variable Name dsTrapTrapObjectTypeOfImage
OID

1.3.6.1.4.1.10418.3.2.6.22

Description

This object is sent in a trap to report the type of software image for
which the trap condition occurred.

Syntax

SyntaxINTEGER {boot(1),app(2)}

Virtual Media Drive Access Mode
Variable Name dsTrapObjectVirtualMediaDriveAccessMode
OID

1.3.6.1.4.1.10418.3.2.6.23

Description

This object is sent in a trap to report the access mode associated
with a remote virtual drive for which the trap condition occurred.

Syntax

SyntaxINTEGER {readonly(1),readwrite(2)}

Virtual Media Drive Type
Variable Name dsTrapObjectVirtualMediaDriveType
OID

1.3.6.1.4.1.10418.3.2.6.24

Description

This object is sent in a trap to report the type associated with a
remote virtual drive for which the trap condition occurred.

Syntax

SyntaxINTEGER
{floppy_memorykey(1),cd_dvd_rom(2),generic(3)}

Image Upgrade Result Code
Variable Name

dsTrapObjectImageUpgradeResultsCode

OID

1.3.6.1.4.1.10418.3.2.6.25

Description

This object is sent in a trap to report the results of a
FTP, TFTP or ASMP image upgrade.

Appendix C: MIBs and SNMP Traps

193

Image Upgrade Result Code (continued)
Syntax

SyntaxINTEGER {
imageUpgradeTftpNoSocket(1),
Socket

-- TFTP No

imageUpgradeTftpConnectFailure(2), -- TFTP
server TFTP connect failed
imageUpgradeTftpRequestDenied(3), -- TFTP
server request denied
imageUpgradeTftpBadPacket(4),
non-data packet received

-- TFTP err -

imageUpgradeTftpOOS(5),
many packets out of sequence

-- TFTP err - too

imageUpgradeTftpTooBig(6),
transferred data exceeds file size

-- TFTP err -

imageUpgradeTftpTimeout(7),
-- TFTP err timeout during transfer, retries exceeded
imageUpgradeAlreadyInProgress(8), -- Update
already in progress
imageUpgradeCannotStart(9),
did not start

-- Update thread

imageUpgradeMemoryError(10),
memory allocation error

-- Update

imageUpgradeTftpProtocolError(11), -- TFTP
protocol error occurred could not complete transfer
imageUpgradeBadType(12),
-- The Image type
does not match the region (BOOT or APP) to update
imageUpgradeInvalidAppDowngrade(13), -- Invalid
downgrade version
imageUpgradeChecksumError(14),
Error
imageUpgradeFlashError(15),
imageUpgradeInternalError(16),
imageUpgradeFileNotFound(17),
found

194

Appendix C: MIBs and SNMP Traps

-- Checksum
-- Flash Error
-- Internal error
-- File not

Image Upgrade Result Code (continued)
Syntax (continued)

imageUpgradeBadHeader(18),
header

-- Invalid image

imageUpgradeIncompatibleHeader(19), -- Header is
not compatible
imageUpgradeTftpXferFail(20),
failed

-- TFTP transfer

imageUpgradeTftpSvrNoResponse(21), -- No
response from TFTP server
imageUpgradeNetworkUnreachable(22), -- Network
unreachable
imageUpgradeSuccess(9999)

-- Success

}

Enterprise Traps
SNMP traps enable an agent to notify the management station of significant
system events. To enable an SNMP management application to interpret
system events through SNMP traps, the management application needs to
know the names and types of objects in the Remote Console Switch. This is
made possible by the MIB modules, which contain variables that can be set or
read to provide information on the RCS.
This section describes the traps that are generated by the Dell 2161DS2/4161DS SNMP agent. The enterprise-specific traps described in Table C-3
belong to the MIB enterprise identified by OID 1.3.6.1.4.1.10418.3.2.6, and
are sent with the trap variables documented in "SNMP Trap Object Group"
on page 186.

Appendix C: MIBs and SNMP Traps

195

Table C-3. Enterprise Specific Traps
Trap Trap Message
Severity
ID

Description

1

The Remote
Informational The Remote Console Switch is in the process
Console Switch
of rebooting.
is rebooting.
The name of the user who initiated the
Command
reboot is contained in
issued by user:
dsTrapObjectUserName.
%s.

2

User logged into Informational A user logged into the Remote Console
the Remote
Switch.
Console Switch.
The name of the user who logged in is
User: %s.
contained in dsTrapObjectUserName.

3

User logged out Informational A user logged out of the Remote Console
of the Remote
Switch.
Console Switch.
The name of the user who logged out is
User: %s.
contained in dsTrapObjectUserName.

4

Video session
started. User:
%s. Server: %s.

Informational A video session has started.
The name of the user who is connected to the
session is contained in
dsTrapObjectUserName.
The session identifier is contained in
dsTrapObjectSessionIdentifier.

5

Video session
stopped. User:
%s. Server: %s

Informational A video session has stopped.
The name of the user who was connected to
the session is contained in
dsTrapObjectUserName.
The session identifier is contained in
dsTrapObjectSessionIdentifier.

196

Appendix C: MIBs and SNMP Traps

Trap Trap Message
ID
6

Severity

Description

Video session
Informational A video session has been terminated by
terminated.
another user.
Command
The name of the user who terminated the
issued by user:
session is contained in
%s. Terminated
dsTrapObjectUserName.
user: %s. Server:
The name of the user who was terminated
%s.
from the session is contained in
dsTrapObjectTargetUserName.
The session identifier is contained in
dsTrapObjectSessionIdentifier.

7

Viewing started Informational A user on the local port has started viewing a
on the local port.
server.
Server: %s.
The session identifier is contained in
dsTrapObjectSessionIdentifier.

8

Viewing stopped Informational A user on the local port has stopped viewing a
on the local port.
server.
Server: %s.
The session identifier is contained in
dsTrapObjectSessionIdentifier.

9

FTP, TFTP, or
Informational The Remote Console Switch has started an
ASMP image
FTP, TFTP, or ASMP upgrade of an image.
upgrade started.
The name of the user who initiated the FTP,
Command
TFTP, or ASMP image upgrade is contained
issued by user:
in dsTrapObjectUserName.
%s. Image type:
The type of image that is being upgraded is
%s. New version:
contained in dsTrapObjectImageType.
%s. Current
version: %s
The version of the image that the Remote
Console Switch is upgrading to is contained
in dsTrapObjectImageNewVersion.
The version of the image that the Remote
Console Switch is currently running is
contained in
dsTrapObjectImageCurrentVersion.

Appendix C: MIBs and SNMP Traps

197

Trap Trap Message
ID

Severity

Description

10

Result text: %s.
Results code:
%d.

Informational The result of an FTP, TFTP, or ASMP image
upgrade.

11

New user added Informational A new user has been added to the local user
to local user
database.
database.
The name of the user who added the new
Command
user is contained in dsTrapObjectUserName.
issued by user:
The name of the new user is contained in
%s. New user:
dsTrapObjectTargetUserName.
%s.

12

User deleted
from local user
database.
Command
issued by user:
%s. Deleted
user: %s.

Informational A user has been deleted from the local user
database.
The name of the user who deleted the user is
contained in dsTrapObjectUserName.
The name of the user who was deleted is
contained in dsTrapObjectTargetUserName.

13

User modified in Informational A user was modified.
local user
The name of the user who modified the user
database.
is contained in dsTrapObjectUserName.
Command
The name of the user who was modified is
issued by user:
contained in dsTrapObjectTargetUserName.
%s. Modified
user: %s.

14

User
Informational A user failed to authenticate with the Remote
authentication
Console Switch.
failed with the
The name of the user who failed to
Remote Console
authenticate is contained in
Switch. User: %s.
dsTrapObjectUserName.

15

SIP added. SIP
ID: %s.

Informational An SIP was added.

SIP removed.
SIP ID: %s.

Informational An SIP was removed.

16

198

The ID of the SIP which was added is
contained in dsTrapObjectSipId.
The ID of the SIP which was removed is
contained in dsTrapObjectSipId.

Appendix C: MIBs and SNMP Traps

Trap Trap Message
ID

Severity

Description

17

Server name
Informational The name of a server has changed.
changed. Old
The previous name of the server is contained
name: %s. New
in dsTrapObjectOldServerName.
name: %s.
The new name of the server is contained in
Attached to SIP:
dsTrapObjectServerName.
%s.
The ID of the SIP the server is attached to is
contained in dsTrapObjectSipId.

18

Tiered switch
Informational A tiered switch was added.
added. Tiered
The name of the switch which was added is
switch name: %s.
contained in
Attached to SIP:
dsTrapObjectTieredSwitchName.
%s.
The ID of the SIP the switch was added to is
contained in dsTrapObjectSipId.

19

Tiered switch
Informational A tiered switch was removed.
removed. Tiered
The name of the switch which was removed is
switch name: %s.
contained in
Was attached to
dsTrapObjectTieredSwitchName.
SIP: %s.
The ID of the SIP the switch was attached to
is contained in dsTrapObjectSipId.

20

Informational The name of a tiered switch has changed.
Tiered switch
name changed.
The previous name of the tiered switch is
Old name: %s.
contained in
New name: %s.
dsTrapObjectOldTieredSwitchName.
Attached to SIP:
The new name of the tiered switch is
%s.
contained in
dsTrapObjectTieredSwitchName.
The ID of the SIP the switch is attached to is
contained in dsTrapObjectSipId.

Appendix C: MIBs and SNMP Traps

199

Trap Trap Message
ID

Severity

Description

21

Configuration
Informational The Remote Console Switch has loaded a
file loaded in the
configuration file.
Remote Console
The name of the user who commanded the
Switch.
Remote Console Switch to load the
Command
configuration file is contained in
issued by user:
dsTrapObjectUserName.
%s. Name of file
The name of the file that was loaded is
loaded: %s.
contained in dsTrapObjectFileName.

22

User database
Informational The Remote Console Switch has loaded a
file loaded in the
user database file.
Remote Console
The name of the user who commanded the
Switch.
Remote Console Switch to load the user
Command
database file is contained in
issued by user:
dsTrapObjectUserName.
%s. Name of file
The name of the file that was loaded is
loaded: %s.
contained in dsTrapObjectFileName.

23

Invalid
Informational The Remote Console Switch has detected an
connection
invalid connection.
detected. Device
This can include two SIP devices on a port
ID: %s.
where one or more have a legacy KVM
Switch, or some other illegal setup condition.
Information about the nature of the failure is
stored in the
dsTrapObjectFirmwareCondition object.

NOTE: This trap is deprecated and is no longer

sent.

200

Appendix C: MIBs and SNMP Traps

Trap Trap Message
ID
24

Severity

Description

Subsystem
Informational The Remote Console Switch has started a
Upgrade started.
Subsystem Upgrade.
Device ID: %s.
This can be a download from the DModule to
the main board, or an SIP or other subsystem
download from the main board.
Information about the subsystem being
updated is stored in the
dsTrapObjectFirmwareCondition object.

NOTE: This trap is deprecated and is no longer
sent.

25

Subsystem
restarting.
Device ID: %s.

Informational The Remote Console Switch has completed a
download and is restarting the subsystem
specified in the
dsTrapObjectFirmwareCondition object.

NOTE: This trap is deprecated and is no longer
sent.

26

Communication Major
problems in the
system
configuration.
Device ID: %s.

The Remote Console Switch has detected
communication problems in the system
configuration. This can be used to indicate
install problems that might result in
perceived problems with the switch.

27

Memory
problem.
Device ID: %s

The Remote Console Switch has detected a
memory problem, the nature of which has
been described in the
dsTrapObjectFirmwareCondition object.

28

Watchdog reset. Critical
Device ID: %s.

29

Special
Informational The Remote Console Switch has detected a
condition was
special condition to be trapped for
trapped. Device
diagnostics. The condition has been recorded
ID: %s.
is stored in the
dsTrapObjectFirmwareCondition object.

Critical

The Remote Console Switch has detected a
watchdog reset condition. This indicates a
catastrophic failure in the firmware/hardware
preventing normal operation of the Remote
Console Switch.

Appendix C: MIBs and SNMP Traps

201

Trap Trap Message
ID

Severity

Description

30

Subsystem
upgrade failed.
Device ID: %s.

Informational The Remote Console Switch has detected a
special condition resulting in a failed
subsystem update. The condition has been
recorded is stored in the
dsTrapObjectFirmwareCondition object.

31

Warning
Minor
condition.
Device ID: %s.
Alarm condition:
%d. Alarm
description: %s.

The Remote Console Switch has detected a
special condition to be trapped for warning
the operator. The condition indicates some
parameter outside of normal operation, such
as over temperature range. These are not
expected to result in unusual behavior, but
may be precursor to a subsequent urgent
condition.

32

Critical
Urgent
condition.
Device ID: %s.
Alarm condition:
%d. Alarm
description: %s.

The Remote Console Switch has detected a
special condition to be trapped for alerting
the operator. The condition indicates some
parameter outside of normal operation that is
expected to result in unpredictable system
behavior.

33

User account
Minor
has been locked.
Client IP
Address: %s.
Locked user: %s.
Reason: %s.

A user account has been locked.
The IP address of the client is contained in
dsTrapObjectIPAddress.
The name of the user who was locked is
contained in dsTrapObjectTargetUserName.
The reason for which the user account has
been locked is contained in
dsTrapObjectLockReason.

202

Appendix C: MIBs and SNMP Traps

Trap Trap Message
ID

Severity

Description

34

Minor

A user account has been unlocked.

User account
has been
unlocked.
Client IP
Address: %s.
Command
issued by user:
%s. Unlocked
user: %s. Reason:
%s.

The IP address of the client that originated
the unlock request is contained in
dsTrapObjectIPAddress.
When the user account is unlocked by an
appliance reboot or by the expiration of the
lockout period (as specified in the
dsTrapObjectUnlockReasonobject), the IP
address will be blank.
The name of the user who unlocked the user
is contained in dsTrapObjectUserName.
When the user account is unlocked by an
appliance reboot or by the expiration of the
lockout period (as specified in the
dsTrapObjectUnlockReason object), the
name of the user will be blank.
The name of the user who was unlocked is
contained in dsTrapObjectTargetUserName.
The reason for which the user account has
been unlocked is contained in
dsTrapObjectUnlockReason.

Appendix C: MIBs and SNMP Traps

203

Trap Trap Message
ID
35

Severity

Description

SIP image
Informational A software image upgrade has started on an
upgrade started.
SIP.
Command
The name of the user who initiated the SIP
issued by user:
upgrade is contained in
%s. Image type:
dsTrapObjectUserName.
%s. New version:
The type of software image being upgraded is
%s. Current
contained in dsTrapObjectSipTypeOfImage.
version: %s.
Server: %s. SIP
The software image version the SIP is
ID: %s.
upgrading to is contained in
dsTrapObjectImageNewVersion.
The software image version the SIP is
currently running is contained in
dsTrapObjectImageCurrentVersion.
The name of the server connected to the SIP
being upgraded is contained in
dsTrapObjectServerName.
The ID of the SIP being upgraded is
contained in dsTrapObjectSipId

204

Appendix C: MIBs and SNMP Traps

Trap Trap Message
ID
36

Severity

Description

SIP image
Informational The result of an SIP software image upgrade.
upgrade result.
The image upgrade result is contained in
Result: %d.
dsTrapObjectSipImageUpgradeResult.
Upgrade was
The name of the user who initiated the SIP
started by user:
upgrade is contained in
%s. Upgrade
dsTrapObjectUserName.
image type: %d.
Upgrade version:
The type of software image the upgrade result
%s. Running
is for contained in
version: %s.
dsTrapObjectTypeOfImage.
Server: %s. SIP
The software image version the SIP
ID: %s.
attempted to upgrade to, is contained in
dsTrapObjectImageNewVersion.
The software image version the SIP is running
is contained in
dsTrapObjectImageCurrentVersion.
If the software image upgrade was successful
then this version will match the version
reported in dsTrapObjectImageNewVersion.
The name of the server connected to the SIP
is contained in dsTrapObjectServerName.
The ID of the SIP the result is for is
contained in dsTrapObjectSipId.

37

SIP restarted.
Server: %s. SIP
ID: %s.

Informational An SIP has restarted
An SIP will restart after an SIP image upgrade
completes.
The name of the server connected to the SIP
is contained in dsTrapObjectServerName.
The ID of the SIP that restarted is for is
contained in dsTrapObjectSipId.

Appendix C: MIBs and SNMP Traps

205

Trap Trap Message
ID

Severity

38

Informational A remote Virtual Media session to a server has
started. A video session to the server must
have been established by the same user prior
to starting the VM session.

Remote virtual
media session
started. User:
%s. Server: %s.
SIP: %s.

Description

The name of the user who connected to the
VM session is contained in
dsTrapObjectUserName.
The name of the server the user connected to
is contained in dsTrapObjectServerName.
The ID of the SIP the video session is using is
contained in dsTrapObjectSipId.

39

Remote virtual
media session
stopped. User:
%s. Server: %s.

Informational A remote virtual media session to a server has
stopped.
The name of the user who was connected to
the VM session is contained in
dsTrapObjectUserName.
The name of the server the user was
connected to is contained in
dsAvrTrapObjectServerName.

40

Remote video
Informational A remote virtual media session has been
session
terminated or preempted by another user.
terminated.
The name of the user who terminated or
Command
preempted the VM session is contained in
issued by user:
dsTrapObjectUserName if available. An
%s. Terminated
empty string is reported if a user name is not
user: %s. Server:
available. A user name will not be available if
%s.
the remote session was terminated or
preempted from the OSCAR interface and
OSCAR interface authentication is disabled.
The name of the user who was terminated or
preempted from the VM session is contained
in dsTrapObjectTargetUserName.
The name of the server the user was
connected to contained in
dsTrapObjectServerName.

206

Appendix C: MIBs and SNMP Traps

Trap Trap Message
ID

Severity

41

Informational A user established a reserved remote virtual
media session.

Remote virtual
media session
has been
reserved. User:
%s. Server: %s.

Description

The name of the user who has established a
reserved virtual media session is contained in
dsTrapObjectUserName.
The name of the server the user was
connected to is contained in
dsTrapObjectServerName.

42

User has
Informational A user established a non-reserved remote
established a
virtual media session.
non-reserved
The name of the user who has established a
virtual media
non-reserved virtual media session is
session to server.
contained in dsTrapObjectUserName.
User: %s. Server:
The name of the server the user was
%s.
connected to is contained in
dsTrapObjectServerName.

43

Remote virtual Informational A remote virtual media drive has been
media drive has
mapped.
been mapped.
The name of the user who has established the
User: %s. Server:
virtual media session is contained in
%s Drive Type:
dsTrapObjectUserName.
%s. Drive Access
The name of the server the user was
Mode: %s.
connected to is contained in
dsTrapObjectServerName.
The type of drive that has been mapped is
contained in
dsTrapObjectVirtualMediaDriveType.
The access mode for the drive that has been
mapped is contained in
dsTrapObjectVirtualMediaDriveAccessMode.

Appendix C: MIBs and SNMP Traps

207

Trap Trap Message
ID
44

Severity

Description

Remote virtual Informational A remote virtual media drive has been
media drive has
unmapped.
been unmapped.
The name of the user who has established the
User: %s. Server:
virtual media session is contained in
%s Drive Type:
dsTrapObjectUserName.
%s. Drive Access
The name of the server the user was
Mode: %s.
connected to is contained in
dsTrapObjectServerName.
The type of drive that has been unmapped is
contained in
dsTrapObjectVirtualMediaDriveType.
The access mode for the drive that has been
unmapped is contained in
dsTrapObjectVirtualMediaDriveAccessMode.

45

Virtual Media
Informational A user on the local port has mapped a virtual
Drive Mapped
media drive to the server.
on the local port.
The session identifier is contained in
Server: %s.
dsKvmTrapObjectSessionIdentifier.
The type of drive that has been unmapped is
contained in
dsTrapObjectVirtualMediaDriveType.
The access mode for the drive that has been
unmapped is contained in
dsTrapObjectVirtualMediaDriveAccessMode

46

Virtual Media
Drive
Unmapped on
the local port.
Server: %s.

Informational A user on the local port has unmapped a
virtual media drive to the server.
The session identifier is contained in
dsTrapObjectSessionIdentifier.
The type of drive that has been unmapped is
contained in
dsTrapObjectVirtualMediaDriveType.
The access mode for the drive that has been
unmapped is contained in
dsTrapObjectVirtualMediaDriveAccessMode.

208

Appendix C: MIBs and SNMP Traps

Trap Trap Message
ID

Severity

47

Informational A local virtual media session has been
terminated or preempted by another user.

Local video
session
terminated.
Command
issued by user:
%s. Server: %s.

Description

The name of the user who terminated or
preempted the VM session is contained in
dsTrapObjectUserName if available. An
empty string is reported if a user name is not
available. A user name will not be available if
the remote session was terminated or
preempted from the OSCAR interface and
OSCAR authentication is disabled.
The name of the server the user was
connected to contained in
dsTrapObjectServerName.

48

Informational A local user has reserved a virtual media
Local virtual
session.
media session
has been
The name of the server the user was
reserved. Server:
connected to is contained in
%s.
dsTrapObjectServerName.

49

Local virtual
media session
has been
unreserved.
Server: %s.

50

Informational A user has unreserved a local virtual media
session.
The name of the server the user was
connected to is contained in
dsTrapObjectServerName.

Local Port Video Informational A local user video session has been
session
terminated by another user.
terminated.
The name of the user who terminated the
Command
session is contained in
issued by user:
dsTrapObjectUserName.
%s. Server: %s.
The session identifier is contained in
dsTrapObjectSessionIdentifier.

Appendix C: MIBs and SNMP Traps

209

Trap Trap Message
ID
51

210

Severity

Description

CA Certificate Informational The Remote Console Switch has loaded a CA
file loaded in the
Certificate file.
Remote Console
The name of the user who commanded the
Switch.
Remote Console Switch to load the CA
Command
Certificate file is contained in
issued by user:
dsTrapObjectUserName.
%s.

Appendix C: MIBs and SNMP Traps

Appendix D: FLASH Upgrades

D

Upgrading the Remote Console Switch
The Remote Console Switch FLASH upgrade feature allows you to update
your Remote Console Switch with the latest firmware available.
You can upgrade the switch firmware either through a serial console or
directly in the OSCAR interface or the on-board web interface.
NOTE: If the Enable SIP Autoupdate option is selected, all attached SIPs are
automatically upgraded when the firmware is upgraded. For information about
enabling and disabling the Enable SIP Autoupdate option, see "Upgrading the SIP
module firmware" on page 214.
Upgrade Firmware Using the On-board Web Interface

See "Upgrading Firmware" on page 120.
Upgrading Firmware Using a Serial Console

Items needed for the upgrade:
•

Server running serial terminal application

•

Available serial port (COM port) on the server

•

Serial cable

•

Firmware update

To upload a new FLASH file:
CAUTION: The Remote Console Switch begins the FLASH upgrade process. On
screen indicators display the upgrade process. When the upload is complete, the
switch resets and upgrades the internal sub-systems.
1 Connect a terminal or PC running terminal emulation software to the
configuration port on the back panel of the Remote Console Switch. The
terminal should be set to 9600 bps, 8 bits, 1 stop bit, no parity and no flow
control.
2 Connect the LAN port on the Remote Console Switch to an Ethernet hub
that is also connected to the PC being used as the TFTP or FTP server.

Appendix D: FLASH Upgrades

211

3 Launch both the server TFTP or FTP software and the terminal emulation
software.
4 Verify that the Remote Console Switch is turned on. After approximately
40 seconds, the Remote Console Switch sends a message, Dell Remote
Console Switch Ready ... Press any key to continue. Press any key to access
the main menu. The Remote Console Switch main menu appears.
5 Get the IP address of the TFTP or FTP server.
6 Assign the IP address in the Remote Console Switch, if needed:
a

In the HyperTerminal window, type 1 to select Network
Configuration.

b

Note the Remote Console Switch IP address. The first three numbers
must be the same as in the server IP address from step 5. The last
number must be different. If the Remote Console Switch IP address is
not correct, change it as follows: type 3 to select IP address, then enter
the correct address.

c

Type 0 to exit the Network Configuration menu. If you changed the
IP address, follow the directions on the screen.

7 From the main menu, type 2 to select Firmware Management. The current
version of your firmware displays in the Firmware Management screen.
8 From the Firmware Management menu, type 1 to select FLASH
Download (TFTP) or type 2 to select FLASH Download (FTP).
9 Type the IP address of the TFTP or FTP server and press .
10 Type the name of the FLASH file and press .
11 If using an FTP server, type the FTP server username and password and
press .
12 Confirm the TFTP or FTP download by typing y or yes and pressing
.
13 The Remote Console Switch verifies the file you downloaded is valid. You
are prompted to confirm the upgrade. Type y or yes and .
14 The Remote Console Switch will begin the FLASH upgrade process. On
screen indicators displays the upgrade process. When the upload is
complete, the Remote Console Switch resets and upgrades the internal
subsystems.

212

Appendix D: FLASH Upgrades

15 When the upgrade is complete, the startup message from step 4 appears
on the terminal screen.
Upgrading Remote Console Switch Firmware in the OSCAR interface

You can upgrade the Remote Console Switch firmware version directly from
the OSCAR interface. If using IPv4 mode, you may use either a TFTP server
or an FTP server. If using IPv6 mode, you must use an FTP server. To upgrade
the firmware, you need to know the IP address of the server, the filename of
the firmware FLASH file, and, if using an FTP server, the username and
password for the FTP server. You will also need to make sure that the file is in
the appropriate folder.
To upgrade the Remote Console Switch firmware:
1 Press . The Main dialog box displays.
2 Click Commands - Display Versions. The Versions dialog box displays.
3 Click Upgrade. The Download dialog box is displayed.
Figure D-1. Download Dialog Box

4 If you are in IPv4 mode and are using a TFTP server, select TFTP.
-orIf you are in IPv4 mode and are using an FTP server, select FTP.
NOTE: If you are in IPv6 mode, the FTP button will automatically be selected and
the TFTP button will be grayed out and may not be selected.

Appendix D: FLASH Upgrades

213

5 In the IP address field, type the IP address of the TFTP or FTP server
where the Remote Console Switch firmware FLASH file is located.
6 In the Filename field, type the directory path and filename of the firmware
FLASH file.
7 If you are using an FTP server, enter the username and password for the
FTP server in the Username and Password fields.
8 Click Download. The firmware upgrade proceeds.
9 A Warning window opens. Click OK. Once the firmware upgrade has
completed, the Remote Console Switch will automatically reboot.
Recovering From a Failed Flash Upgrade

NOTE: You may only recover from a failed Flash upgrade when using IPv4 mode.
NOTE: If the green power LED on the front and back panel of the Remote Console
Switch blinks continuously, the Remote Console Switch is in recovery mode.
To recover from a failed Flash upgrade:
1 Download the latest Flash firmware.
2 Save the Flash upgrade file to the appropriate directory on the TFTP
server.
3 Set up the TFTP server with the server IP address 10.0.0.3.
4 Rename the downloaded file CMN-xxxx.fl, where xxxx is the number on
the agency label on the underside of the Remote Console Switch, and
place it into the TFTP root directory of the TFTP server.
5 If the Remote Console Switch is not on, turn it on now. The recovery
process should start automatically.

Upgrading the SIP module firmware
The SIP modules can be upgraded individually or simultaneously.
To simultaneously upgrade multiple SIP modules:
1 Press . The Main dialog box displays.
2 Click Commands - SIP Status. The SIP Status dialog box displays.
NOTE: When the Enable SIP Autoupdate option is enabled in the SIP Status dialog
box, SIP firmware is automatically upgraded when the Remote Console Switch
firmware is upgraded or when a new SIP is discovered by the Remote Console
214

Appendix D: FLASH Upgrades

Switch after an firmware upgrade. SIPs that have already been discovered but
which are not attached to the Remote Console Switch during the firmware upgrade
must be upgraded manually.
Figure D-2. SIP Status Dialog Box

3 Click one or more types of modules to upgrade. Click Upgrade.
4 The SIP Upgrade dialog box displays. Click OK to initiate the upgrade
and return to the SIP Status dialog box.
To upgrade SIP module firmware individually:
1 Press . The Main dialog box will appear.
2 Click Commands - Display Versions. The Version dialog box displays.
Figure D-3. Version Dialog Box

Appendix D: FLASH Upgrades

215

3 Click SIP to view individual SIP module version information. The SIP
Select dialog box displays.
4 Select a SIP module to upgrade and click the Version button. The SIP
Version dialog box displays.
5 Click the Load Firmware button. The SIP Load dialog box displays.
6 Click OK to initiate the upgrade and return to the Status dialog box.
NOTE: During an upgrade, the SIP status indicator in the Main dialog box is yellow.
The SIP module is unavailable while an upgrade is in progress. When an upgrade is
initiated, any current connection to the server via the SIP module is terminated.
NOTE: If you wish to return a SIP to its factory settings, click SIP in the Version
dialog box. The SIP Version dialog box displays. Click Decommission and then OK to
restore factory defaults to the SIP.

216

Appendix D: FLASH Upgrades

Appendix E: Technical
Specifications
Table E-1.

E

2161DS-2/4161DS Remote Console Switch Product Specifications

Server Ports
Number

16

Types

Dell PS/2 and USB SIP modules. Avocent brand PS/2,
PS2M, USB, Sun and serial IQ modules.

Connectors

RJ-45

Sync Types

Separate horizontal and vertical

Plug and Play

DDC2B

Video Resolution

Analog Port Maximum 1280 x 800 @ 60Hz

Network Configuration Port
Number

1

Type

Serial RS-232

Connector

DB9 Female

Analog Port Sets
Number

1

Type

PS/2, USB, VGA and ACI

Connectors

PS/2 miniDIN, 15 pin D, RJ-45

Dimension
Dimensions
(H x W x D)

4.45 x 43.18 x 27.94 cm 1U form factor
(1.75 x 17.00 x 11.00 in.)

Weight

3.6 kg (8 lb) without cables

Heat Dissipation

92 BTU/Hr

Airflow

8 cfm

Power Consumption

12.5 W
Appendix E: Technical Specifications

217

Table E-1.

2161DS-2/4161DS Remote Console Switch Product Specifications

AC-input power

40 W maximum

AC-input voltage rating

100 to 240 VAC Autosensing

AC-input current rating

0.5 A

AC-input cable

18 AWG three-wire cable, with a three-lead IEC-320
receptacle on the power supply end and a country or
region dependent plug on the power resource end

AC-frequency

50/60 HZ

Temperature

0o to 50o Celsius (32o to 122o Fahrenheit) operating
-20o to 60o Celsius (-4o to 140o Fahrenheit)
nonoperating

Humidity

20 to 80% noncondensing operating
5 to 95% noncondensing nonoperating

Safety and EMC Approvals and Markings
UL / cUL, CE - EU, N (Nemko), GOST, C-Tick, NOM /
NYCE, MIC (BCC), SASO, TUV-GS, IRAM, FCC,
ICES, VCCI, SoNCAP, SABS, Bellis, FIS/ Kvalitet,
Koncar, CKT, INSM, Ukrtest, STZ

Table E-2.

2321DS Remote Console Switch Product Specifications

Remote Console Switch Product Specifications
Server Ports
Number

32

Types

Dell PS/2 and USB SIP modules. Avocent brand PS/2,
PS2M, USB, Sun and serial IQ modules.

Connectors

RJ-45

Sync Types

Separate horizontal and vertical

Plug and Play

DDC2B

Video Resolution

Analog Port Maximum 1280 x 800 @ 60 Hz

Network Configuration Port
Number

218

1

Appendix E: Technical Specifications

Table E-2.

2321DS Remote Console Switch Product Specifications

Remote Console Switch Product Specifications
Type

Serial RS-232

Connector

RJ-45

Analog Port Sets
Number

1

Type

PS/2, USB, VGA and ACI

Connectors

PS/2 miniDIN, 15 pin D, RJ-45

Serial Power Control (PDU) Port
Number

2

Type

RS-232 serial

Connector

8-pin modular (RJ45)

Dimension
Dimensions
(H x W x D)

4.37 x 43.18 x 35.62 cm 1U form factor
(1.72 x 17.00 x 14.025 in)

Weight

10 lbs (4.5 kg) without cables

Heat Dissipation

45.0 BTU/hr

Airflow

8 cfm

Power Consumption

13.2 W

AC-input power

40 W maximum

AC-input voltage rating

100 to 240 VAC Autosensing

AC-input current rating

1.25 A

AC-input cable

18 AWG three-wire cable, with a three-lead IEC-320
receptacle on the power supply end and a country or
region dependent plug on the power resource end

AC-frequency

50/60 HZ

Temperature

0o to 50o Celsius (32o to 122o Fahrenheit) operating
-20o to 60o Celsius (-4o to 140o Fahrenheit)
nonoperating

Humidity

20 to 80% noncondensing operating
5 to 95% noncondensing nonoperating
Appendix E: Technical Specifications

219

Table E-2.

2321DS Remote Console Switch Product Specifications

Remote Console Switch Product Specifications
Safety and EMC Approvals and Markings
UL / cUL, CE - EU, N (Nemko), GOST, C-Tick, NOM /
NYCE, MIC (BCC), SASO, GS, IRAM, FCC, ICES,
VCCI, SoNCAP, SABS, Bellis, FIS/ Kvalitet, Koncar,
KUCAS, INSM, Ukrtest, STZ

220

Appendix E: Technical Specifications

Appendix F: Technical Support

F

Our Technical Support staff is ready to assist you with any installation or
operating issues you encounter with your Dell product. If an issue should
develop, follow the steps below for the fastest possible service.
To resolve an issue:
1 Check the pertinent section of this manual to see if the issue can be
resolved by following the procedures outlined.
2 Check our web site at dell.com/support to search the knowledge base or
use the on-line service request.
3 Call the Dell Technical Support location nearest you.

Appendix F: Technical Support

221

222

Appendix F: Technical Support

Index
Numerics
2161DS-2 or 4161DS With a Cat
5 Analog Switch, 28
2161DS2/4161DS2 Console
Switch
Configuring, 18
Installing, 17
2161DS2/4161DS2 Console
Switch Unit
Installing, 15

A
Access Rights
using the on-board web
interface, 107
Active Directory
adding users and privileges with
Dell Schema Extensions, 166
configuring group objects
with, 155
configuring with Dell Schema
Extensions, 164
frequently asked questions, 171
installing, 143
logging in to the remote console
switch with, 170
structure of, 139
Address Resolution Protocol. See
ARP.

AMP
accessing, 133
migrating switches to the onboard web interface with, 135
Appliance Management Panel.
See AMP.
ARI, 1, 5, 25, 30, 35
ARP, 24

B
Broadcasting, 57
Browsers
supported by the on-board web
interface, 32

C
CA certificate, 149, 151, 154
Cascade switch, 26
CAT 5, 1
Clear Offline button
using the on-board web
interface, 115
Configuration files
using the on-board web interface
reading and saving, 125126

Index

223

Configuration information, 55

F

Connection sharing, 86

Firmware
upgrading using the AMP, 134
upgrading using the on-board web
interface, 120

Console security, 43

D
Database
using the on-board web interface
managing, 126
Dell Extended Schema
AD object overview, 159
comparing standard schema
with, 142
using Dell Association Objects
syntax, 167

FLASH upgrade
overview, 5
using a serial console, 211-212
using the OSCAR interface, 213

G
Group objects, 155

Dell Schema Extensions
adding remote console switch
users and privileges with, 166
configuring AD with, 164

I

Display behavior, 41

IQ module, 1, 7, 10

Installation and setup
of the on-board web interface, 32
of the Remote Console Switch, 10

DNS settings, 144
DSView 3 software, 2

Keep Alive functionality, 1

E
EID, 1-2
Encryption
using the on-board web
interface, 103
using virtual media, 95
Enterprise Traps, 195
Ethernet, 10
224

K

Index

Keyboard
shortcuts, 175
types, 11
Keystrokes
broadcasting, 57
using macros, 81

L
Language
setting using the on-board web
interface, 115
setting using the OSCAR
interface, 47
LDAP
authentication parameters, 146
overview, 6, 139
SSL certificates, 149

M
Macros, 81
Manage Remote Console Switch
task button
launching the AMP, 133
Management Information Bases.
See MIBs.
MIBs, 181
Mouse
acceleration, 9, 24
shortcuts, 175
using the Viewer
adjusting, 74
improving performance, 76
minimizing trailing, 76
setting the scaling, 75

configuring using the OSCAR
interface, 50
Network time protocol
settings, 145
Noise Adjust Threshold, 76

O
On-board web interface
migrating switches from the
Remote Console Switch
Software, 101
overview, 2
viewing and configuring Remote
Console Switch
parameters, 102
viewing version information, 116
OpenManage IT Assistant Event
Viewer
enabling SNMP traps using the
on-board web interface, 111
overview, 6
Operation modes, 4
OSCAR interface
configuring menus, 40
navigating, 38
overview, 2
Override admin account, 144

N

P

Network configuration, 9, 18

PEM, 11, 30

Network settings
Index

225

Port Expansion Module. See
PEM.

using the OSCAR interface, 52
using the Viewer, 78

Power indicator, 17

Screen capturing, 83

Preemption
using the on-board web
interface, 104
using the OSCAR interface, 54
using the Viewer, 84

Screen Delay Time, 42

Privileges, 166

R
Rack mounting, 11
Reboot system
using the on-board web
interface, 125
Remote Console Switch
basic configuration, 16
features and benefits, 1
viewing and configuring
parameters using the onboard web interface, 102
Remote Console Switch
Software
features and benefits, 5
setup, 10
Resync Wizard, 137

S
Scan mode
using the on-board web
interface, 79
226

Index

Screen saver, 45
Secure Socket Layer. See SSL
Security
overview, 3
setting using the OSCAR
interface, 43
Security Lock-Out feature
using the on-board web
interface, 105, 108
Server
using OSCAR
viewing/selecting, 35
using the on-board web interface
accessing, 65
using the OSCAR interface
assigning names, 49
broadcasting to, 58
disconnecting from, 37
selecting, 37-38
viewing the status of, 36
using the Viewer
interacting with, 66
scanning, 77
Set Position flag, 46
SIP
connecting to, 24
overview, 1
viewing
using the on-board web
interface, 115

SNMP
enterprise Traps, 195
MIBs, 181
traps, 111, 181
using the on-board web interface
configuring settings, 110
enabling/configuring, 109
Soft switching, 37
SSL certificates, 149
Status
of server using the Viewer, 79
of switch using the OSCAR
interface, 36
using the on-board web interface
of server, 65, 115
Status flag, 45
System diagnostics, 56

T

SIP, 117
viewing and configuring
connections, 114
Time Between Servers, 77, 80
Toolbar Hide Delay Time, 69
Trap Destination
using the on-board web
interface, 111

U
User accounts
using the on-board web interface
adding/modifying, 106
changing password, 108,
123
deleting, 108
locking/unlocking, 108
setting up, 104
using the OSCAR interface
setting the password, 43

TCP ports, 179
Technical specifications, 217
Technical support, 221
Terminal applications, 18-19, 21,
23
Thumbnail Viewer
navigating, 80
overview, 65
scanning servers, 77
viewing status indicators, 79
Tiered switch
using the on-board web interface
resetting a connected

V
Version information
viewing using the on-board web
interface, 116
viewing using the OSCAR
interface, 52
Video
adjusting using the Viewer, 72
overview, 4
Video Optimization, 24
View Time Per Server, 77, 80
Index

227

Viewer
adjusting, 68
adjusting resolution, 71
expanding and refreshing, 70
features of, 67
Virtual media
configuring using the on-board
web interface, 93
configuring using the OSCAR
interface, 90
launching using the Viewer, 95
overview, 3, 89

228

Index



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Page Mode                       : UseOutlines
Format                          : application/pdf
Creator                         : Dell Inc.
Title                           : User’s Guide
Subject                         : User's Guide
Description                     : User's Guide
Producer                        : Acrobat Distiller 8.2.0 (Windows); modified using iTextSharp 5.1.3 (c) 1T3XT BVBA
Keywords                        : esuprt_ser_stor_net#esuprt_poweredge#Dell KVM 2321DS#poweredge-2321ds#User's Guide
Create Date                     : 2010:10:25 08:27:18Z
Creator Tool                    : FrameMaker 8.0
Modify Date                     : 2012:10:25 19:20:44-05:00
Page Count                      : 244
Author                          : Dell Inc.
Productcode                     : poweredge-2321ds
Typecode                        : ug
Typedescription                 : User's Guide
Languagecodes                   : en-us
Sectioncode                     : 
Sectiondescription              : 
Publishdate                     : 2011-12-06 00:00:00
Expirydate                      : 9999-09-09 00:00:00
Manualurl                       : http://ftp.dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_poweredge/poweredge-2321ds_User's Guide_en-us.pdf
Readytocopy                     : false
Futureproductindication         : No
Categorypathforfutureproducts   : 
Businesskeywords                : 
Filesize                        : 3254
Creationdate                    : D:20101025082718Z
Moddate                         : D:20121018054237-05'00'
EXIF Metadata provided by EXIF.tools

Navigation menu