Wyse Technology 883681-08 Rev. E manual

Page 25

Getting Started

19

Use the following guidelines:

Server or Published Application - Select the type of connection to which the settings apply.

Connection Description - Enter the descriptive name that is to appear in the connection list (38 characters maximum).

Browser Servers IP - Enter a delimited (comma or semicolon) list of IP addresses or DNS-registered names of ICA servers that contains the master browsers list, or that could refer to another server that contains the list. The master browsers list is generated automatically by a browsing program on one of the ICA servers (selected by negotiation between servers). It is used to provide the information displayed in the Server Name or IP list box. No entry is needed if the list is on an ICA server in the same network segment as the thin client. No entry is necessary if the connection is to a server, or if the server name or IP contains the IP address of the server.

Host Name or Application Name (title depends on the Server or Published Application option selected) - You can enter a delimited (semicolon or comma separated) list of server hostnames or IP addresses, or you can select from the list of ICA servers or published applications (depending on Server or Published Application option selected) obtained from the ICA master browser (you can also use the browse button next to the list box to make the selection you want). If you enter a delimited list of servers, the thin client attempts to connect to the next server on the list if the previous server attempt failed. If you use the list and the selected connection fails, the thin client attempts to connect to the next one on the list.

Note

The Host Name may be resolved using one of three mechanisms: ICA master browser, DNS, or WINS. Master browser is the only mechanism that can resolve a published application (unless manual entry is made in DNS for the application). DNS uses the default domain name in the network control panel to attempt to construct an FQDN but will also try to resolve the name without using the default.

Encryption Level - Allows you to select the security level of communications between the thin client and the ICA server. Basic (the default option) is the lowest level of security. Basic allows faster communication between the device and the ICA server because it requires less processing than do the higher levels of encryption.

Caution

The encryption selection applies to the security of communications between the thin client and the ICA server only. It is independent of the security settings of individual applications on the ICA server. For example, most Web financial transactions require the thin client to use 128-bit encryption. However, transaction information could be exposed to a lower level of security if the thin client encryption is not also set to 128 bits.

Use HTTP for browsing - When selected, the thin client by default will use http when browsing.

Alternate address via firewall - When selected, the thin client will use an alternate IP address returned from the ICA master browser to get through firewalls. Used for the Windows log-on when the connection is activated.

Logging on area - Enter login username, password, and domain name. If these boxes are not populated, you can enter the information manually in the ICA server login screen when the connection is made. Use the following guidelines:

Login Username - 31 characters maximum.

Password - 19 characters maximum.

Domain Name - 31 characters maximum.

Image 25
Contents Wyse Winterm 1 series, Based on Wyse Thin OS Users GuideCopyright Notices Thin Client Requirements Compliance This page intentionally blank Contents Using the Network Test Tools Using and Configuring Access ConnectionsAbout this Guide IntroductionWyse Technical Support Organization of this GuideRelated Online Resources Available at Wyse Accessing the Enterprise Servers Available What Happens When You Turn on Your Thin ClientGetting Started Chapter Signing-on Changing Your PasswordUnderstanding Your User Profile Assigned Privileges Knowing Your Assigned Privileges and User ModeUnderstanding System Lock-down User ModesLogging Off and Shutting Down About the Session Services You Will UseDesktop example Using the DesktopViewing System Information Understanding the Window Display Modes Using the System Setup Submenu Using the Shortcut Menu and Desktop MenuAccessing Available Applications Accessing System InformationAccessing the Dialup Manager Accessing the PPPoE ManagerAccessing the Pptp Manager Accessing the Network Test ToolsConnect Manager High-privileged user example Using the Connect ManagerAbout Configuring ICA and RDP Connections Connection Settings ICA Server option Configuring ICA ConnectionsPage Connection Settings ICA Options tab Connection Settings RDP Connection tab Configuring RDP ConnectionsConnection Settings RDP Options tab Console Select to set the RDP connection with Console mode This page intentionally blank Setting Up the Thin Client System Preference General tab Setting System PreferencesSystem Preference Advanced tab Network Setup General tab Configuring Network SettingsPage Network Setup Name Servers tab Network Setup Servers tab Network Setup Reconnect options Wireless Setup Setting Up Wireless AccessDisplay Setup Selecting Display SettingsHz default 75 Hz 85 Hz Configuring Serial CommunicationsPrinter Setup Ports tab Setting Up PrintersPage Printer Setup LPDs tab Printer Setup SMBs tab Setting Up Windows NT4 Servers Configuring LPD ServicesSetting Up Windows 2000/2003 Servers Configuring Touch ScreensThis page intentionally blank Using Ethernet Direct Access Using and Configuring Access ConnectionsUsing Wireless Direct Access PPPoE Manager Configuring PPPoE AccessDialup Manager Configuring Dialup Modem AccessDialup Property Dialup Status Pptp Manager Configuring Pptp VPN AccessPptp Property Pptp Status Using Ping Using the Network Test ToolsTrace Route Using Trace RouteFigures Page Tables

1, 883681-08 Rev. E specifications

Wyse Technology has long been a leader in the field of cloud computing and virtualization, particularly with its impressive range of thin clients. Among its notable products is the Wyse 883681-08 Rev. E, a sophisticated thin client designed to meet the needs of organizations seeking efficient and scalable computing solutions.

The Wyse 883681-08 Rev. E is built on a robust architecture that includes advanced ARM processors, which ensure an optimal performance level while consuming minimal power. This feature is particularly valuable in environments that prioritize energy efficiency and cost-effectiveness. The device operates seamlessly with leading virtualization solutions such as Citrix, VMware, and Microsoft, making it a versatile option for businesses that rely on these platforms.

One of the standout features of the Wyse 883681-08 Rev. E is its lightweight and compact design. This allows for easier deployment across office environments while also maximizing desk space. The thin client is designed for quick and easy management, enabling IT teams to deploy software updates and security patches without requiring extensive on-site interventions. This ease of management is complemented by the device's impressive scalability; organizations can easily expand their infrastructure by adding more units as their workforce grows.

In terms of connectivity, the Wyse 883681-08 Rev. E supports multiple interfaces, including USB ports, Ethernet, and audio jacks. This ensures compatibility with a range of peripherals, allowing users to tailor their setups according to their unique needs. The device also features dual-display support, enabling users to enhance productivity by utilizing multiple monitors simultaneously.

Security is another focal point for the Wyse 883681-08 Rev. E. With features such as secure boot, encryption options, and smart card support, organizations can ensure that sensitive data remains protected at all times. This aligns with the increasing need for businesses to maintain robust security measures in an era where cyber threats are ubiquitous.

In conclusion, the Wyse Technology 883681-08 Rev. E thin client stands out as a highly efficient solution for organizations seeking to harness the power of virtualization. With its advanced technology, energy efficiency, comprehensive security features, and ease of management, it represents an ideal choice for businesses aiming to optimize their computing environments while also preparing for future growth.