Getting Started

19

Use the following guidelines:

Server or Published Application - Select the type of connection to which the settings apply.

Connection Description - Enter the descriptive name that is to appear in the connection list (38 characters maximum).

Browser Servers IP - Enter a delimited (comma or semicolon) list of IP addresses or DNS-registered names of ICA servers that contains the master browsers list, or that could refer to another server that contains the list. The master browsers list is generated automatically by a browsing program on one of the ICA servers (selected by negotiation between servers). It is used to provide the information displayed in the Server Name or IP list box. No entry is needed if the list is on an ICA server in the same network segment as the thin client. No entry is necessary if the connection is to a server, or if the server name or IP contains the IP address of the server.

Host Name or Application Name (title depends on the Server or Published Application option selected) - You can enter a delimited (semicolon or comma separated) list of server hostnames or IP addresses, or you can select from the list of ICA servers or published applications (depending on Server or Published Application option selected) obtained from the ICA master browser (you can also use the browse button next to the list box to make the selection you want). If you enter a delimited list of servers, the thin client attempts to connect to the next server on the list if the previous server attempt failed. If you use the list and the selected connection fails, the thin client attempts to connect to the next one on the list.

Note

The Host Name may be resolved using one of three mechanisms: ICA master browser, DNS, or WINS. Master browser is the only mechanism that can resolve a published application (unless manual entry is made in DNS for the application). DNS uses the default domain name in the network control panel to attempt to construct an FQDN but will also try to resolve the name without using the default.

Encryption Level - Allows you to select the security level of communications between the thin client and the ICA server. Basic (the default option) is the lowest level of security. Basic allows faster communication between the device and the ICA server because it requires less processing than do the higher levels of encryption.

Caution

The encryption selection applies to the security of communications between the thin client and the ICA server only. It is independent of the security settings of individual applications on the ICA server. For example, most Web financial transactions require the thin client to use 128-bit encryption. However, transaction information could be exposed to a lower level of security if the thin client encryption is not also set to 128 bits.

Use HTTP for browsing - When selected, the thin client by default will use http when browsing.

Alternate address via firewall - When selected, the thin client will use an alternate IP address returned from the ICA master browser to get through firewalls. Used for the Windows log-on when the connection is activated.

Logging on area - Enter login username, password, and domain name. If these boxes are not populated, you can enter the information manually in the ICA server login screen when the connection is made. Use the following guidelines:

Login Username - 31 characters maximum.

Password - 19 characters maximum.

Domain Name - 31 characters maximum.

Page 25
Image 25
Wyse Technology 883681-08 Rev. E manual

1, 883681-08 Rev. E specifications

Wyse Technology has long been a leader in the field of cloud computing and virtualization, particularly with its impressive range of thin clients. Among its notable products is the Wyse 883681-08 Rev. E, a sophisticated thin client designed to meet the needs of organizations seeking efficient and scalable computing solutions.

The Wyse 883681-08 Rev. E is built on a robust architecture that includes advanced ARM processors, which ensure an optimal performance level while consuming minimal power. This feature is particularly valuable in environments that prioritize energy efficiency and cost-effectiveness. The device operates seamlessly with leading virtualization solutions such as Citrix, VMware, and Microsoft, making it a versatile option for businesses that rely on these platforms.

One of the standout features of the Wyse 883681-08 Rev. E is its lightweight and compact design. This allows for easier deployment across office environments while also maximizing desk space. The thin client is designed for quick and easy management, enabling IT teams to deploy software updates and security patches without requiring extensive on-site interventions. This ease of management is complemented by the device's impressive scalability; organizations can easily expand their infrastructure by adding more units as their workforce grows.

In terms of connectivity, the Wyse 883681-08 Rev. E supports multiple interfaces, including USB ports, Ethernet, and audio jacks. This ensures compatibility with a range of peripherals, allowing users to tailor their setups according to their unique needs. The device also features dual-display support, enabling users to enhance productivity by utilizing multiple monitors simultaneously.

Security is another focal point for the Wyse 883681-08 Rev. E. With features such as secure boot, encryption options, and smart card support, organizations can ensure that sensitive data remains protected at all times. This aligns with the increasing need for businesses to maintain robust security measures in an era where cyber threats are ubiquitous.

In conclusion, the Wyse Technology 883681-08 Rev. E thin client stands out as a highly efficient solution for organizations seeking to harness the power of virtualization. With its advanced technology, energy efficiency, comprehensive security features, and ease of management, it represents an ideal choice for businesses aiming to optimize their computing environments while also preparing for future growth.