Wyse Technology C90LE manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Wyse Technology C90LE. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Wyse Technology C90LE ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Wyse Technology C90LE décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Wyse Technology C90LE devrait contenir:
- informations sur les caractéristiques techniques du dispositif Wyse Technology C90LE
- nom du fabricant et année de fabrication Wyse Technology C90LE
- instructions d'utilisation, de réglage et d’entretien de l'équipement Wyse Technology C90LE
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Wyse Technology C90LE ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Wyse Technology C90LE et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Wyse Technology en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Wyse Technology C90LE, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Wyse Technology C90LE, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Wyse Technology C90LE. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    Administrators Guide Wyse ® Thin Client s, Based on Microsoft ® Windows ® XP Embedded Products: R90LE, R90L, X90Le, X90L, X90e, X90, C90LE, V90LE, V90L, S90 Issue: 081309 PN: 883808-01 Rev . L[...]

  • Page 2

    Copyright Notices © 2009, Wyse T echnology Inc. All rights reserved. This manual and the software and firmware described in it are copyrighted. Y ou may not reproduce, transmit, transcribe, store in a retrieval system, or translate into any language or compute r language, in any form or by any means, electronic, mechanical, magnet ic, optica l, ch[...]

  • Page 3

    Regulatory Complian ce for Thin Client s Basic EMC and Safety Requirements Wyse thin clients are compliant with the regulatory requirements in the regions listed below . U.S.A. - FCC Part 15 (class B) Canada - CAN/CSA-C22 No. 60950 Europe - EN 55022 (class B), EN 61000-3-2 (class A), EN 6100 0-3-3, EN 90650-1:2000+ALL Canadian DOC Notices Class A -[...]

  • Page 4

    Model Rx0LE Thin Client, Product R90LE For use with External Power Supply Model 0335A1965 or certified equivalent m odel supplied by the manufacturer , output rated 19Vdc, 3.42A. Model SX0 Thin Clien t, Product S90 For use with External Power Supply Model DSA-0421S- 12 3 30, or certified equivalent model supplied by the manufacturer , output rated [...]

  • Page 5

    Content s Summary of Revisions ix 1 Introduction 1 About this Guide 1 Organization of this Guide 1 Finding the Inform ation Y ou Need in this Guide 2 Wyse T echnical Support 2 Related Online Resources Available at Wyse 2 Wyse Online Community 2 2 Est ablishing a Server Environment 3 Setting-Up Access to the Enterprise Servers 3 Understanding How to[...]

  • Page 6

    vi Contents Accessing the Extended Fea tures of the Administrator Control Panel 23 Accessing and Using the Admini strative T ools 24 Configuring Component Services 24 Viewing Event s 25 Managing Services 25 Managing Users 26 Configuring WinVNC Current User Proper ties 26 Setting Configuration S trings with Custom Fields 27 Configuring Dual Monitor [...]

  • Page 7

    Contents vii Using Windows Server Update Se rvices (WSUS) on a Thin Client 59 Configuring the Thin Client for WSUS 59 Automatic Software Updates on Wyse Thin Clients Using WSUS 60 Using WSUS on the Wyse Th in Client in S tandalone Mode 60 T roubleshooting WSUS in S tandalone Mode 61 Windows Update Log File Examples 62 Configuring WSUS for Automati [...]

  • Page 8

    viii Contents This page intentionally blank.[...]

  • Page 9

    Summary of Revisions Wyse T echnology Inc. 883808-01 Rev . L The following changes were made to this document since revision K: Wyse T echnology Inc. 883808-01 Rev . K The following changes were made to this document since revision J: Reference Description Model Cx0, Product C90LE New model an d product in formation ad ded to "Dev ice Power Su[...]

  • Page 10

    x Summary of Revisions "Accessing Thin Client BIOS Settings" Addition of new section to provide instructio ns on accessing the BIOS settings of a thin client. Updated figures and workflow All figures and workflow instructions have been upd ated to include and describe the new user in terface. Reference Description[...]

  • Page 11

    1 Introduction Wyse ® thin clients running Micro so f t ® Windows ® XP Embe dded provide access to applications, files, and network resources made available on machin es hosting Citrix™ ICA and Microsof t™ RDP session services. The th in client s conta in a full featured Internet Explorer browser and th in client em ulation software, Ericom [...]

  • Page 12

    2 Chapter 1 Chapter 4, "Getting to Know the Extended Features," cont ains information on the extended fe atures of Wyse thin clients ru nning Microsof t Wind ows XP Embed ded tha t are not found in standard Wind ows XP . Chapter 5, "Administrative Utilit ies and Settings," provides general informati on about the utilities and se[...]

  • Page 13

    2 Est ablishing a Server Environment This chapter cont ains information on the network architecture and enterprise server environment needed to provide network and session services for Wyse thin clients running Microsoft Windows XP Emb edded. It also in cludes information to help you address important conside ra tions when configuring access to the[...]

  • Page 14

    4 Chapter 2 • PPTP VPN - PPTP (Point-to-Point T unneling Prot ocol) is a ne twork protocol that enables the secure transfer of data be tween a re mote client (in this case the thin client) and an enter prise server environment by creating a virtual private network (VPN) across TCP/IP-based data networks such as the Intern et. It provides a passwo[...]

  • Page 15

    Establishing a Server Environment 5 T a ble 1 DH CP Options Option Description Notes 1 Subnet Mask Required. 3 Router Optional but recom m e nd ed . It is not requir ed unless the thin client must interact with servers on a different su bnet. 6 Domain Name Server (DNS) Optional bu t re com m e nd ed . 12 Hostname Optional. 15 Domain Name Optiona l [...]

  • Page 16

    6 Chapter 2 Using FTP File Servers Windows XP Embedded WFR2 includes an FTP Upgrade utility that c an be used to upgrade the XP Embedded thin clie nt with Addons which are in Microsoft .msi form. This utility allows you to automatica lly or manually upgra de a thin client by downloading MSI packages from a specified FTP server . The MSI p ackages a[...]

  • Page 17

    Establishing a Server Environment 7 Using DNS Thin clients accept valid DNS na mes registered on a DNS server available to the enterprise intranet. The th in client will quer y a DNS server on the network for name to IP resolution. In most cases DNS is not requir ed but may be used to allow host s to be accessed by their registered DNS names rather[...]

  • Page 18

    8 Chapter 2 Configuring ICA Session Services Before you use the inform a tio n in th is sect ion to c onfigure your ICA session services, be sure you have read "Underst anding Session Services." ICA session service s can be made availab le on the network using e ither Windows 2000 or 2003 Server with T erminal Services and one of the foll[...]

  • Page 19

    Establishing a Server Environment 9 Using VMware V iew Manger Services VMware ® View Manager is a desktop man agement solution that enables system administrators to provision desktops and c ontrol user access. Client software securely connects user s to centralized virtual desktop s, back-end physical sy stems, or terminal servers. Note Informatio[...]

  • Page 20

    10 Chapter 2 This page intentionally blank.[...]

  • Page 21

    3 Getting S t arted This chapter provides informatio n to help you quickly get started using your thin client. It describes basic thin client function s and provid es instructions on s ett ing up the thin client for you and your users. What Happens When Y ou T urn on Y our Thin Client What you see, initially , when you turn on or re boot a thin cli[...]

  • Page 22

    12 Chapter 3 Automatic Logon Automatic logon to a User d esktop is enabled on th e thin client by default. If you want to log on as a dif f erent user while Auto Logon is enabled, log off the current desktop while holding down the SHIFT key to display the Log On to W indows dialog box and use your credentials to logon. An administrator can log on a[...]

  • Page 23

    Getting Started 13 2. After logging on to the thin client, disa ble the Fi le Based Write Filter b y double-clicking the FBWF Disable icon on the desktop (this will di sable the filter and reboot the system). 3. If automatic logon to a User desktop is enabl ed on the thin client, you mu st log off the User desktop and lo g on as an administrator (l[...]

  • Page 24

    14 Chapter 3 Underst anding th e User Desktop The default User desktop icons include Citrix Pro gram Neighborhood, and Remote Desktop Connection (st andard and S pan). The Star t menu includes Internet Explorer , Control Panel, and Prin te r an d Faxes. The All Programs menu includes Citrix Program Neighborhood, Client Information, Internet Explore[...]

  • Page 25

    Getting Started 15 Underst anding the Administrator Desktop The default Administrator de sktop icons in clude Citrix Program Neighb orhood, Remote Desktop Connection (st andard and S pan), File Based W rite Filter Disable, and File Based Write Filter Enable.The Sta r t menu includes Internet Exp l orer , My Computer , My Network Places, Control Pan[...]

  • Page 26

    16 Chapter 3 Logging Off, Shutting Down, and Rest arting Use the Shut Down menu to log of f, shut down, restart, or place the thin client in st and by (all options are available to use by clicking S tart | Shut Down ) . Y ou can also log off or shut down the thin client using the W indows Security windo w (opened by using CTRL+AL T +DEL key combina[...]

  • Page 27

    4 Getting to Know the Extended Features This chapter contain s information on the extended features of Wyse thin clients r unning Microsoft Windows XP Emb edded that are not found in standar d Windows XP . Configuring and Using Peripherals Depending on the port s available on the thin client, the thin client can provide services through a USB port,[...]

  • Page 28

    18 Chapter 4 Managing Connections with Citrix Program Neighborhood Cirtix Program Neighb or hood is available to Users and Administrators. Use the Cir tix Program Neighborhood application (available by clicking Citrix Program Neighborhood in the All Programs menu or doub le-clicking the Citrix Program Neighborho od desktop icon) to manage connectio[...]

  • Page 29

    Getting to K now the Ex tended Feat ures 19 Browsing the Internet with Internet Explorer Microsoft Inte rnet Explorer 7 is availabl e to Users and Administrator s. The browser (available by clicking Internet Explo rer in the All Programs menu) has Inter ne t op tio n settings that have been preselected at the fact ory to limit writing to flash memo[...]

  • Page 30

    20 Chapter 4 Using the Odyssey Client Manager If purchased and installed, the Odyssey Clie nt Manager is ava ilable to Users and Administrators. Clicking St art | All Programs | Funk Software | Odyssey Client | Odyssey Client M anager (or double-clicking the Odyssey Client Manager icon in the Control Panel or system tray of the Administrator taskba[...]

  • Page 31

    Getting to K now the Ex tended Feat ures 21 Use the TEC window and the Connect dialog b ox (available by clicking Ericom-PowerT erm T ermina l Emulation | PowerT erm T erminal Emulation in the All Programs menu) to configure your connection info rmation. For complete instructions on insta lling a nd using Ericom – PowerT erm® TEC, refer to the E[...]

  • Page 32

    22 Chapter 4 Using VMware V iew Client to Connect to a Virtual Desktop VMware View Client is avai lable to Users and Administrators. Use the VMware Vi ew Client dialog box (availa b le by clicking VMware | VMware View Client in the All Programs menu—click >> to open the extend ed menu of the dialog box) to connect to a virtual desktop. Figu[...]

  • Page 33

    Getting to K now the Ex tended Feat ures 23 Accessing the Extended Features of the Administrator Control Panel This section provides an overview of the ex tended features found in the Administra tor Control Panel (options are available to use by clicking Start | Control Panel ). This section includes information on: • "Accessing and Using th[...]

  • Page 34

    24 Chapter 4 Accessing and Using th e Administrative T ools Double-clicking the Administrative T ools icon in the Control Panel op ens the Administrative T ools window . Figure 12 Administrative T ools Administrative T ools are available for: • "Configuring Compone nt Services" • "Viewing Event s" • "Managing Services[...]

  • Page 35

    Getting to K now the Ex tended Feat ures 25 Viewing Event s Double-clicking the Event Viewer icon opens the Event Viewer window . This tool displays monitoring and troubleshooting messages from Windows and other prog rams. Figure 14 Event Viewer Managing Services Double-clicking the Services icon open s the Services window . This window lists the s[...]

  • Page 36

    26 Chapter 4 Managing Users Double-clicking the User Manager icon opens the Local Users and Group s window . This tool allows adminis tra to rs to manage users and groups. For det ailed information on the User Manager , refer to "Managing Users and Groups with User Manager ." Figure 16 Local Users and Group s Configuring WinVNC Current Us[...]

  • Page 37

    Getting to K now the Ex tended Feat ures 27 troubleshooting purposes. Fo r information on VNC user settings, refer to "Using WinVNC to Shadow a Thin Client." Note Hovering the mouse poin ter over th e VNC icon on the taskbar show s the current IP address of the thin client. Setting Configuration Strings with Custom Fields Double-clicking [...]

  • Page 38

    28 Chapter 4 Configuring Dual Monitor Display ( For Dual-Monitor Cap able Thin Client s Only ) Y ou can use the Settings t ab of the Dis play Properties dialog bo x (double- click the Display icon in the Control Panel , and then click the Settings tab) to configure the dual monitor settings as described in the Microsof t documentation at: http://ww[...]

  • Page 39

    Getting to K now the Ex tended Feat ures 29 Configuring T ouchscreens If the ELO T ouchscreen option is inst alled on the thin client, double-clicking the ELO T ouchscreen icon in the User or Administrator Control Pane l allows you to calibrate and customize the settings for a touchscr een monito r that is connected to (or integrated with) a thin c[...]

  • Page 40

    30 Chapter 4 Setting Ramdisk Size Ramdisk is volatile memory sp ace used for tempor ary data sto rage. It is the Z drive shown in the My Computer window . It can also be used for temporary storage of other dat a according to adm inist rator discretio n (se e "Saving File s an d Usin g Loca l Drive s") . The following items ar e stored on [...]

  • Page 41

    Getting to K now the Ex tended Feat ures 31 Selecting Regional and Language Options Double-clicking the Regional and Language Options icon in the Control Pa nel opens the Regional and Language Opt ions dialog box. Use this dialog b ox to select your keyboard language. The following keyb oard languages are supported: Note A language appropriate keyb[...]

  • Page 42

    32 Chapter 4 Configuring WDM Properties Double-clicking the WDM icon in the Control Pa nel opens the WDM Properties dialog box. Use this dialog box to configure th e WDM settings. Figure 22 WDM Properties Use the following guidelines: 1. Enter the IP address or hostname of the WDM Server . 2. Enter the port to use. 3. Click OK . For information on [...]

  • Page 43

    Getting to K now the Ex tended Feat ures 33 Configuring Wireless Local Area Network (LAN) Settings If Wyse USB 802 .1 1b hardware is installe d on the thin clien t, double-clicking th e W ireless LAN Settings icon in the Co ntrol Panel allows you to configure wireless LAN settings (such as the wireless network ID, and so on). Note The Wireless LAN [...]

  • Page 44

    34 Chapter 4 2. Open the Network Connect ions dialog box ( St art | Control Panel | Ne twork Connections ) to view the available network connections. 3. Right-click Wireless Network Connection an d select Properties to open the Wireless Net work Connection Properties dialog box. Figure 25 Wireless Network Connection Propert ie s 4. Select the Wirel[...]

  • Page 45

    Getting to K now the Ex tended Feat ures 35 3. Click the Association tab. 4. Enter the Network name (SSID). 5. Select the WP A2 option for Network Authentication. 6. Select the AES option for Dat a encryption. 7. Click the Authentication tab. 8. Select the Enable IEEE 802.1x authenti cation for this network check box. 9. Select the Smart Card or ot[...]

  • Page 46

    36 Chapter 4 Figure 28 Wireless Network Connection - EAP-TLS 3. Select the connection you cr eated in step 4 (the Ne twork name (SSID)), and then click Connect . A wireless connection shou ld now be est ablished. Configuring Wireless Thin Clie nt s for PEAP-MS-CHAP v2 1. Right-click Wireless Network Connection an d select Properties to open the Wir[...]

  • Page 47

    Getting to K now the Ex tended Feat ures 37 Figure 30 Protected EAP Properties - PEAP-MS-CHAP v2 11 . Clear the V alidate server certificate chec k box. 12. Select the Enable Fast Recon nec t check box. 13. Click Configure to open the EAP MSCHAPv2 Properties dialog box. Figure 31 EAP MSCHAPv2 Properties - PEAP-MS-CHAP v2 14. Clear the Automatically[...]

  • Page 48

    38 Chapter 4 Figure 32 Enter Credentials - PEAP-MS-CHAP v2 19. Enter the User name, Password and Domain nam e, and then click OK . A wireless connection shou ld now be est ablished. Preserving Wireless Connections Windows XP Embedded WFR2 includes a tool called Regpersistence.e xe whic h is designed to configure wireless access in W rite Filter Ena[...]

  • Page 49

    Getting to K now the Ex tended Feat ures 39 Note PEAP is available as an authentication method for 802.1 1 wireless clients, but it is not supported for virtual private network (VPN) client s or other remote access client s. Therefore, you can configure PEAP as the authentication method for a remote access policy only when you are using Internet Au[...]

  • Page 50

    40 Chapter 4 This page intentionally blank.[...]

  • Page 51

    5 Administrative Utilities and Settings This chapter provides general informatio n about the utilities and settings available for administr ativ e us e. It includes information on: • “Using the File Based Write Filter (FBWF)” • "Understanding the NetXClean Utility" • "Saving Files and Using Local Drives" • "Mapp[...]

  • Page 52

    42 Chapter 5 Caution Contents of the File Based Write Filter cache should never be flushed if it is eighty-perc ent or more full. The Adm ini strator should periodically check the status of the cache a nd rest art the thin client if the cache is more than eighty percent full. Note A T erminal Services Client Access License (TSCAL) is always preserv[...]

  • Page 53

    Administrative Ut ilities and Settings 43 Disabling the machine acc ount passwor d change on the thin client T o disable the machine account password change on the thin client: 1. S tart the Re gistry Editor by clicking Start | Ru n , entering regedit in th e Open text box, and then clicking OK . 2. Locate and click the following registry subkey: H[...]

  • Page 54

    44 Chapter 5 Running File Based Write Fi lter Command Line Options There are several co mmand lines you can use to control the File Based W rite Filter (command line argume nts cannot be combined). Caution Administrators should use NT file security to prevent undesired usag e of these comma nd s. Use the following guidelines fo r the command line o[...]

  • Page 55

    Administrative Ut ilities and Settings 45 Enabling and Disabling the File Based Write Filter Using the Desktop Icons For convenience, the File Based Write Filter Enable and Disable icons a re present on the Administrator desktop. Use these icons to enab le or disable the File Based Write Filter . • File Based Write Filter Enable Icon - Double-cli[...]

  • Page 56

    46 Chapter 5 • RAM used by FBWF - Shows the amount of RAM used (in Kilobytes and Percentage) that is currently bein g used by t he File Based Write Filter . If Current Stat us is Disabled, RAM Used by FBWF is always zero (0). • Enable FBWF - Allows you to enable the File Based Write Filte r and prompts you to restart the thin client. If you do [...]

  • Page 57

    Administrative Ut ilities and Settings 47 Underst anding the NetXClean Utility NetXClean keep s extraneous information from being stored in fla sh memory . NetXClean is a service th at runs in t he backgrou nd. NetXCle an clean-up is triggere d by either a service startup or a user log-off. It performs the cle an- up invisibly and no user input is [...]

  • Page 58

    48 Chapter 5 Saving Files and Using Local Drives Administrators need to know the following information ab out local drives and saving files. Saving Files Thin clients use an em bedded operating system with a fix ed amount of flash memory . It is recommended that you save files you want to k eep on a ser ver r ather than on a thin client. Caution Be[...]

  • Page 59

    Administrative Ut ilities and Settings 49 Mapping Network Drives Users and ad ministrators can map netw ork drives. Ho wever , to retain the ma ppings after the thin client is restarted, you must comple te the following: • Select the Reconne ct a t logon check box. • Flush the files of the File Based Write Filter cache dur ing the current syste[...]

  • Page 60

    50 Chapter 5 Using Roaming Profiles Y ou can p articipa te in domains by writing roaming pr ofiles to the C drive. The profiles must be limited in size and will not be retained when the thin client is restarted. Note For success ful downloadin g and prop er functioning , there mu st be sufficient flash space available for roaming profiles. In some [...]

  • Page 61

    Administrative Ut ilities and Settings 51 Managing Users and Grou p s with User Manager The User Manager allows administrators to create new user accounts and configure user profiles. It also allows administrators to create new gro up s and determine group membership. By default, a new user is only a member of the Users group and is not locked down[...]

  • Page 62

    52 Chapter 5 Configuring User Profiles Only administrators can select the profile settings for a user . Caution Because of the limited size of th e fl ash memory , it is strongly recommended that other applications av ailable to new and ex isting users b e configured to prevent writing to the local file syst em. For the same re ason, it is also rec[...]

  • Page 63

    Administrative Ut ilities and Settings 53 Determining Group Membership Use the followin g guidelines (example of a dding a us er to the Adm inistrator gr oup): Caution Be sure to flush the files of the File Based W rite Filter cache during the current system sessio n in which an account is modified. 1. Log-in as an administra tor and open the User [...]

  • Page 64

    54 Chapter 5 This page intentionally blank.[...]

  • Page 65

    6 System Administration This chapter contains local and remote system administration information to he lp you perform the routine t asks needed to mainta in your W yse thin client environment. It includes: • "Using Wyse Device Manager Sof tware for Remote Administration" • "Accessing Thin Client BIOS Settings" • "Inst[...]

  • Page 66

    56 Chapter 6 Inst alling and Up grading Addons T o install or upgrade Addons, it is recommended that you use WDM (the thin client has a built-in WDM Ag ent for us e as descri bed in "Configuring WDM Properties"). Note For more informa tion on Wyse Device Manager softwar e refer to the Wyse Web site at: http://www .wyse.c om/products/soft [...]

  • Page 67

    System Administration 57 2. Depending on whether you select Manu al FTP Information or Use DHCP Server’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the path to the MSI p ackage that inst alls the Addon (the MSI package on the FTP server mu st be accom[...]

  • Page 68

    58 Chapter 6 2. Depending on whether you select Manu al FTP Information or Use DHCP Server’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the path to the MSI p ackage that inst alls the Addon (the MSI package on the FTP server mu st be accompanied by a [...]

  • Page 69

    System Administration 59 Uninst alling Addons Using the FTP Addon Installer Y ou can use the FTP Addon Inst aller dialog box to uninstall the thin client Addons th at have been installe d with the FTP Addons utility . Use the following guidelines: 1. Log-in as an administra tor and open the FTP Addo n Ins taller dialog box ( Star t | Control Panel [...]

  • Page 70

    60 Chapter 6 Automatic Sof tware Updates on W yse T hin Clients Using WSUS This section describes three ways to automati cally deploy software upd ates on thin clients using WSUS: • "Using WSUS on the Wyse Thin Client in S tandalone Mode " • "Configuring WSUS for Automatic Software Updates Using SMS" • "Using WSUS wit[...]

  • Page 71

    System Administration 61 T roubleshooting WSUS in St andalone Mode WSUS provides a log for trouble shooting issues related to software updates. This log is located on the thin clie nt, in the directory: C:windowswindows update log . This log displays all commun ications betwee n the client and the server. Y ou can use PERF MON to monitor memory a[...]

  • Page 72

    62 Chapter 6 Windows Up date Log File Examples The examples below illustrate the lo g files for selected activities. Service S tartup 2005-06-01 18:30:03 992 810 Service ************* 2005-06-01 18:30:03 992 810 Service ** START ** Service: Service startup 2005-06-01 18:30:03 992 810 Service ********* The Windows Up date agent searc hes for availab[...]

  • Page 73

    System Administration 63 Configuring WSUS for Automati c Sof tware Up dates Using SMS Y ou can configure WSUS to use the SMS se rver to perform automatic sof tware updates in either a W orkgroup environment or using Active Directory . Prerequisite s Before any software up dates can be deployed via WSUS, you must: • Install SMS 2003 or SMS 2007 on[...]

  • Page 74

    64 Chapter 6 Using WSUS with WDM Y ou can use WDM to deploy the scr ipt that dis ables the W rite Filter , a nd then configure the thin client to contact the WSUS serve r for software upd ates. Prerequisite s Before any software up dates can be deployed via WSUS, you must: • Install and configu re WDM on the server • Install WSUS Serve r v . 2.[...]

  • Page 75

    System Administration 65 Figure 38 WSUS 3.0 Management Console 4. When the software update s ar e co mple te, use WDM to schedule th e scr ipt that enables the Write Filter to run on the thin client. T roubleshooting WSUS with WDM Y ou can use the steps describe d in the “T roubleshooting WSUS in S tandalone Mode” section to troubleshoot the is[...]

  • Page 76

    66 Chapter 6 close the DOS window that is present durin g the process; the DOS window will close automatically . Event: The System Settings Change messag e may appear shortly after the first b oot, depending on the specific hardware configur ation of the thin client. • The New Hardware Found message displays in the system tray (lower ri ght hand [...]

  • Page 77

    System Administration 67 Figure 40 WinVNC: Current User Properties Before a remote machine (o n which VNC Viewer is inst alled) can ac cess a thin client: • The IP address (or valid DNS name) of the thin client that is to be operated/mon itored must be known by the remo te administrator/user . T his IP address can be obtained from the Details are[...]

  • Page 78

    68 Chapter 6 2. (Optional) Y ou can configure advanced VNC co nnection options using the Connection Options dialog box. For example, if the network is slow , click Options to open the Connection Options dialog box, select the Restrict Pixels to 8- bit check box in the Display area (reduces color depth for bette r tr ansm issio n spee d), a nd then [...]

  • Page 79

    System Administration 69 3. In the VNC Server box of the Connection Details dialog box, enter the IP address or valid DNS name of the thin client that is to be operated/monitored followed by a colon and 0. For example: snoopy:0 or 132.237.16.238:0 4. Click OK to open the VNC Authentication dial og box. Figure 43 VNC Authentication 5. Enter the Sess[...]

  • Page 80

    70 Chapter 6 This page intentionally blank.[...]

  • Page 81

    Figures 1 User deskto p - example 14 2 Administrator desktop - example 15 3 Citrix Program Ne ighborhood 18 4 Internet Explorer 19 5 Remote Desktop Conne ction - expanded view example 19 6 Odyssey Client Manager 20 7 Ericom – PowerTer m® Session Manager 20 8 Ericom – PowerTer m® TEC and Connect 21 9 Neutron - exte nded view 21 10 VMware View [...]

  • Page 82

    72[...]

  • Page 83

    73 Ta b l e s 1 DHCP Options 5 2 WSUS Log Format 61 3 WSUS Component s 61[...]

  • Page 84

    Administrators Guide Wys e ® Thin Clients , Based on Microsof t ® Windows ® XP Embedded Issue: 0813 0 9 Written and publishe d by: Wyse T e chnology Inc., August 2009 Created using Fra m eM a ke r ® and Acrobat ®[...]