Screen #3 is a secure keys screen that will display after the network information has been entered.

Figure 8. Secure Key calculation

This screen uses mouse movements and keyboard inputs to create random data. This unpredictable information is then combined with several other factors to develop the basis of the encryption keys that are used to establish secure remote links.

With every mouse move and key press the single dash will move across the progression bar (unless the same key is pressed repeatedly). Periodically, a new star character will be added to the bar as the random data are accepted as part of the new encryption key. When the bar is full, the final encryption keys for your Vista Remote 2 will be created – this process takes roughly 30 to 40 seconds.

Once the secure key has been calculated, the Vista Remote 2 will restart and present a standard logon screen as shown below. Logon to the unit with the correct Username and password.

Figure 9. Standard Logon screen

Vista Remote 2 Installation and Operations Manual

11

 

 

 

Page 17
Image 17
Rose electronic MAN-VR2 manual Secure Key calculation