Wyse Technology R90L manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Wyse Technology R90L. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Wyse Technology R90L o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Wyse Technology R90L se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Wyse Technology R90L, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones Wyse Technology R90L debe contener:
- información acerca de las especificaciones técnicas del dispositivo Wyse Technology R90L
- nombre de fabricante y año de fabricación del dispositivo Wyse Technology R90L
- condiciones de uso, configuración y mantenimiento del dispositivo Wyse Technology R90L
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Wyse Technology R90L no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Wyse Technology R90L y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Wyse Technology en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Wyse Technology R90L, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Wyse Technology R90L, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Wyse Technology R90L. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    Administrators Guide Wyse ® Thin Client s, Based on Microsoft ® Windows ® XP Embedded Products: R90LE, R90L, X90Le, X90L, X90e, X90, C90LE, V90LE, V90L, S90 Issue: 081309 PN: 883808-01 Rev . L[...]

  • Página 2

    Copyright Notices © 2009, Wyse T echnology Inc. All rights reserved. This manual and the software and firmware described in it are copyrighted. Y ou may not reproduce, transmit, transcribe, store in a retrieval system, or translate into any language or compute r language, in any form or by any means, electronic, mechanical, magnet ic, optica l, ch[...]

  • Página 3

    Regulatory Complian ce for Thin Client s Basic EMC and Safety Requirements Wyse thin clients are compliant with the regulatory requirements in the regions listed below . U.S.A. - FCC Part 15 (class B) Canada - CAN/CSA-C22 No. 60950 Europe - EN 55022 (class B), EN 61000-3-2 (class A), EN 6100 0-3-3, EN 90650-1:2000+ALL Canadian DOC Notices Class A -[...]

  • Página 4

    Model Rx0LE Thin Client, Product R90LE For use with External Power Supply Model 0335A1965 or certified equivalent m odel supplied by the manufacturer , output rated 19Vdc, 3.42A. Model SX0 Thin Clien t, Product S90 For use with External Power Supply Model DSA-0421S- 12 3 30, or certified equivalent model supplied by the manufacturer , output rated [...]

  • Página 5

    Content s Summary of Revisions ix 1 Introduction 1 About this Guide 1 Organization of this Guide 1 Finding the Inform ation Y ou Need in this Guide 2 Wyse T echnical Support 2 Related Online Resources Available at Wyse 2 Wyse Online Community 2 2 Est ablishing a Server Environment 3 Setting-Up Access to the Enterprise Servers 3 Understanding How to[...]

  • Página 6

    vi Contents Accessing the Extended Fea tures of the Administrator Control Panel 23 Accessing and Using the Admini strative T ools 24 Configuring Component Services 24 Viewing Event s 25 Managing Services 25 Managing Users 26 Configuring WinVNC Current User Proper ties 26 Setting Configuration S trings with Custom Fields 27 Configuring Dual Monitor [...]

  • Página 7

    Contents vii Using Windows Server Update Se rvices (WSUS) on a Thin Client 59 Configuring the Thin Client for WSUS 59 Automatic Software Updates on Wyse Thin Clients Using WSUS 60 Using WSUS on the Wyse Th in Client in S tandalone Mode 60 T roubleshooting WSUS in S tandalone Mode 61 Windows Update Log File Examples 62 Configuring WSUS for Automati [...]

  • Página 8

    viii Contents This page intentionally blank.[...]

  • Página 9

    Summary of Revisions Wyse T echnology Inc. 883808-01 Rev . L The following changes were made to this document since revision K: Wyse T echnology Inc. 883808-01 Rev . K The following changes were made to this document since revision J: Reference Description Model Cx0, Product C90LE New model an d product in formation ad ded to "Dev ice Power Su[...]

  • Página 10

    x Summary of Revisions "Accessing Thin Client BIOS Settings" Addition of new section to provide instructio ns on accessing the BIOS settings of a thin client. Updated figures and workflow All figures and workflow instructions have been upd ated to include and describe the new user in terface. Reference Description[...]

  • Página 11

    1 Introduction Wyse ® thin clients running Micro so f t ® Windows ® XP Embe dded provide access to applications, files, and network resources made available on machin es hosting Citrix™ ICA and Microsof t™ RDP session services. The th in client s conta in a full featured Internet Explorer browser and th in client em ulation software, Ericom [...]

  • Página 12

    2 Chapter 1 Chapter 4, "Getting to Know the Extended Features," cont ains information on the extended fe atures of Wyse thin clients ru nning Microsof t Wind ows XP Embed ded tha t are not found in standard Wind ows XP . Chapter 5, "Administrative Utilit ies and Settings," provides general informati on about the utilities and se[...]

  • Página 13

    2 Est ablishing a Server Environment This chapter cont ains information on the network architecture and enterprise server environment needed to provide network and session services for Wyse thin clients running Microsoft Windows XP Emb edded. It also in cludes information to help you address important conside ra tions when configuring access to the[...]

  • Página 14

    4 Chapter 2 • PPTP VPN - PPTP (Point-to-Point T unneling Prot ocol) is a ne twork protocol that enables the secure transfer of data be tween a re mote client (in this case the thin client) and an enter prise server environment by creating a virtual private network (VPN) across TCP/IP-based data networks such as the Intern et. It provides a passwo[...]

  • Página 15

    Establishing a Server Environment 5 T a ble 1 DH CP Options Option Description Notes 1 Subnet Mask Required. 3 Router Optional but recom m e nd ed . It is not requir ed unless the thin client must interact with servers on a different su bnet. 6 Domain Name Server (DNS) Optional bu t re com m e nd ed . 12 Hostname Optional. 15 Domain Name Optiona l [...]

  • Página 16

    6 Chapter 2 Using FTP File Servers Windows XP Embedded WFR2 includes an FTP Upgrade utility that c an be used to upgrade the XP Embedded thin clie nt with Addons which are in Microsoft .msi form. This utility allows you to automatica lly or manually upgra de a thin client by downloading MSI packages from a specified FTP server . The MSI p ackages a[...]

  • Página 17

    Establishing a Server Environment 7 Using DNS Thin clients accept valid DNS na mes registered on a DNS server available to the enterprise intranet. The th in client will quer y a DNS server on the network for name to IP resolution. In most cases DNS is not requir ed but may be used to allow host s to be accessed by their registered DNS names rather[...]

  • Página 18

    8 Chapter 2 Configuring ICA Session Services Before you use the inform a tio n in th is sect ion to c onfigure your ICA session services, be sure you have read "Underst anding Session Services." ICA session service s can be made availab le on the network using e ither Windows 2000 or 2003 Server with T erminal Services and one of the foll[...]

  • Página 19

    Establishing a Server Environment 9 Using VMware V iew Manger Services VMware ® View Manager is a desktop man agement solution that enables system administrators to provision desktops and c ontrol user access. Client software securely connects user s to centralized virtual desktop s, back-end physical sy stems, or terminal servers. Note Informatio[...]

  • Página 20

    10 Chapter 2 This page intentionally blank.[...]

  • Página 21

    3 Getting S t arted This chapter provides informatio n to help you quickly get started using your thin client. It describes basic thin client function s and provid es instructions on s ett ing up the thin client for you and your users. What Happens When Y ou T urn on Y our Thin Client What you see, initially , when you turn on or re boot a thin cli[...]

  • Página 22

    12 Chapter 3 Automatic Logon Automatic logon to a User d esktop is enabled on th e thin client by default. If you want to log on as a dif f erent user while Auto Logon is enabled, log off the current desktop while holding down the SHIFT key to display the Log On to W indows dialog box and use your credentials to logon. An administrator can log on a[...]

  • Página 23

    Getting Started 13 2. After logging on to the thin client, disa ble the Fi le Based Write Filter b y double-clicking the FBWF Disable icon on the desktop (this will di sable the filter and reboot the system). 3. If automatic logon to a User desktop is enabl ed on the thin client, you mu st log off the User desktop and lo g on as an administrator (l[...]

  • Página 24

    14 Chapter 3 Underst anding th e User Desktop The default User desktop icons include Citrix Pro gram Neighborhood, and Remote Desktop Connection (st andard and S pan). The Star t menu includes Internet Explorer , Control Panel, and Prin te r an d Faxes. The All Programs menu includes Citrix Program Neighborhood, Client Information, Internet Explore[...]

  • Página 25

    Getting Started 15 Underst anding the Administrator Desktop The default Administrator de sktop icons in clude Citrix Program Neighb orhood, Remote Desktop Connection (st andard and S pan), File Based W rite Filter Disable, and File Based Write Filter Enable.The Sta r t menu includes Internet Exp l orer , My Computer , My Network Places, Control Pan[...]

  • Página 26

    16 Chapter 3 Logging Off, Shutting Down, and Rest arting Use the Shut Down menu to log of f, shut down, restart, or place the thin client in st and by (all options are available to use by clicking S tart | Shut Down ) . Y ou can also log off or shut down the thin client using the W indows Security windo w (opened by using CTRL+AL T +DEL key combina[...]

  • Página 27

    4 Getting to Know the Extended Features This chapter contain s information on the extended features of Wyse thin clients r unning Microsoft Windows XP Emb edded that are not found in standar d Windows XP . Configuring and Using Peripherals Depending on the port s available on the thin client, the thin client can provide services through a USB port,[...]

  • Página 28

    18 Chapter 4 Managing Connections with Citrix Program Neighborhood Cirtix Program Neighb or hood is available to Users and Administrators. Use the Cir tix Program Neighborhood application (available by clicking Citrix Program Neighborhood in the All Programs menu or doub le-clicking the Citrix Program Neighborho od desktop icon) to manage connectio[...]

  • Página 29

    Getting to K now the Ex tended Feat ures 19 Browsing the Internet with Internet Explorer Microsoft Inte rnet Explorer 7 is availabl e to Users and Administrator s. The browser (available by clicking Internet Explo rer in the All Programs menu) has Inter ne t op tio n settings that have been preselected at the fact ory to limit writing to flash memo[...]

  • Página 30

    20 Chapter 4 Using the Odyssey Client Manager If purchased and installed, the Odyssey Clie nt Manager is ava ilable to Users and Administrators. Clicking St art | All Programs | Funk Software | Odyssey Client | Odyssey Client M anager (or double-clicking the Odyssey Client Manager icon in the Control Panel or system tray of the Administrator taskba[...]

  • Página 31

    Getting to K now the Ex tended Feat ures 21 Use the TEC window and the Connect dialog b ox (available by clicking Ericom-PowerT erm T ermina l Emulation | PowerT erm T erminal Emulation in the All Programs menu) to configure your connection info rmation. For complete instructions on insta lling a nd using Ericom – PowerT erm® TEC, refer to the E[...]

  • Página 32

    22 Chapter 4 Using VMware V iew Client to Connect to a Virtual Desktop VMware View Client is avai lable to Users and Administrators. Use the VMware Vi ew Client dialog box (availa b le by clicking VMware | VMware View Client in the All Programs menu—click >> to open the extend ed menu of the dialog box) to connect to a virtual desktop. Figu[...]

  • Página 33

    Getting to K now the Ex tended Feat ures 23 Accessing the Extended Features of the Administrator Control Panel This section provides an overview of the ex tended features found in the Administra tor Control Panel (options are available to use by clicking Start | Control Panel ). This section includes information on: • "Accessing and Using th[...]

  • Página 34

    24 Chapter 4 Accessing and Using th e Administrative T ools Double-clicking the Administrative T ools icon in the Control Panel op ens the Administrative T ools window . Figure 12 Administrative T ools Administrative T ools are available for: • "Configuring Compone nt Services" • "Viewing Event s" • "Managing Services[...]

  • Página 35

    Getting to K now the Ex tended Feat ures 25 Viewing Event s Double-clicking the Event Viewer icon opens the Event Viewer window . This tool displays monitoring and troubleshooting messages from Windows and other prog rams. Figure 14 Event Viewer Managing Services Double-clicking the Services icon open s the Services window . This window lists the s[...]

  • Página 36

    26 Chapter 4 Managing Users Double-clicking the User Manager icon opens the Local Users and Group s window . This tool allows adminis tra to rs to manage users and groups. For det ailed information on the User Manager , refer to "Managing Users and Groups with User Manager ." Figure 16 Local Users and Group s Configuring WinVNC Current Us[...]

  • Página 37

    Getting to K now the Ex tended Feat ures 27 troubleshooting purposes. Fo r information on VNC user settings, refer to "Using WinVNC to Shadow a Thin Client." Note Hovering the mouse poin ter over th e VNC icon on the taskbar show s the current IP address of the thin client. Setting Configuration Strings with Custom Fields Double-clicking [...]

  • Página 38

    28 Chapter 4 Configuring Dual Monitor Display ( For Dual-Monitor Cap able Thin Client s Only ) Y ou can use the Settings t ab of the Dis play Properties dialog bo x (double- click the Display icon in the Control Panel , and then click the Settings tab) to configure the dual monitor settings as described in the Microsof t documentation at: http://ww[...]

  • Página 39

    Getting to K now the Ex tended Feat ures 29 Configuring T ouchscreens If the ELO T ouchscreen option is inst alled on the thin client, double-clicking the ELO T ouchscreen icon in the User or Administrator Control Pane l allows you to calibrate and customize the settings for a touchscr een monito r that is connected to (or integrated with) a thin c[...]

  • Página 40

    30 Chapter 4 Setting Ramdisk Size Ramdisk is volatile memory sp ace used for tempor ary data sto rage. It is the Z drive shown in the My Computer window . It can also be used for temporary storage of other dat a according to adm inist rator discretio n (se e "Saving File s an d Usin g Loca l Drive s") . The following items ar e stored on [...]

  • Página 41

    Getting to K now the Ex tended Feat ures 31 Selecting Regional and Language Options Double-clicking the Regional and Language Options icon in the Control Pa nel opens the Regional and Language Opt ions dialog box. Use this dialog b ox to select your keyboard language. The following keyb oard languages are supported: Note A language appropriate keyb[...]

  • Página 42

    32 Chapter 4 Configuring WDM Properties Double-clicking the WDM icon in the Control Pa nel opens the WDM Properties dialog box. Use this dialog box to configure th e WDM settings. Figure 22 WDM Properties Use the following guidelines: 1. Enter the IP address or hostname of the WDM Server . 2. Enter the port to use. 3. Click OK . For information on [...]

  • Página 43

    Getting to K now the Ex tended Feat ures 33 Configuring Wireless Local Area Network (LAN) Settings If Wyse USB 802 .1 1b hardware is installe d on the thin clien t, double-clicking th e W ireless LAN Settings icon in the Co ntrol Panel allows you to configure wireless LAN settings (such as the wireless network ID, and so on). Note The Wireless LAN [...]

  • Página 44

    34 Chapter 4 2. Open the Network Connect ions dialog box ( St art | Control Panel | Ne twork Connections ) to view the available network connections. 3. Right-click Wireless Network Connection an d select Properties to open the Wireless Net work Connection Properties dialog box. Figure 25 Wireless Network Connection Propert ie s 4. Select the Wirel[...]

  • Página 45

    Getting to K now the Ex tended Feat ures 35 3. Click the Association tab. 4. Enter the Network name (SSID). 5. Select the WP A2 option for Network Authentication. 6. Select the AES option for Dat a encryption. 7. Click the Authentication tab. 8. Select the Enable IEEE 802.1x authenti cation for this network check box. 9. Select the Smart Card or ot[...]

  • Página 46

    36 Chapter 4 Figure 28 Wireless Network Connection - EAP-TLS 3. Select the connection you cr eated in step 4 (the Ne twork name (SSID)), and then click Connect . A wireless connection shou ld now be est ablished. Configuring Wireless Thin Clie nt s for PEAP-MS-CHAP v2 1. Right-click Wireless Network Connection an d select Properties to open the Wir[...]

  • Página 47

    Getting to K now the Ex tended Feat ures 37 Figure 30 Protected EAP Properties - PEAP-MS-CHAP v2 11 . Clear the V alidate server certificate chec k box. 12. Select the Enable Fast Recon nec t check box. 13. Click Configure to open the EAP MSCHAPv2 Properties dialog box. Figure 31 EAP MSCHAPv2 Properties - PEAP-MS-CHAP v2 14. Clear the Automatically[...]

  • Página 48

    38 Chapter 4 Figure 32 Enter Credentials - PEAP-MS-CHAP v2 19. Enter the User name, Password and Domain nam e, and then click OK . A wireless connection shou ld now be est ablished. Preserving Wireless Connections Windows XP Embedded WFR2 includes a tool called Regpersistence.e xe whic h is designed to configure wireless access in W rite Filter Ena[...]

  • Página 49

    Getting to K now the Ex tended Feat ures 39 Note PEAP is available as an authentication method for 802.1 1 wireless clients, but it is not supported for virtual private network (VPN) client s or other remote access client s. Therefore, you can configure PEAP as the authentication method for a remote access policy only when you are using Internet Au[...]

  • Página 50

    40 Chapter 4 This page intentionally blank.[...]

  • Página 51

    5 Administrative Utilities and Settings This chapter provides general informatio n about the utilities and settings available for administr ativ e us e. It includes information on: • “Using the File Based Write Filter (FBWF)” • "Understanding the NetXClean Utility" • "Saving Files and Using Local Drives" • "Mapp[...]

  • Página 52

    42 Chapter 5 Caution Contents of the File Based Write Filter cache should never be flushed if it is eighty-perc ent or more full. The Adm ini strator should periodically check the status of the cache a nd rest art the thin client if the cache is more than eighty percent full. Note A T erminal Services Client Access License (TSCAL) is always preserv[...]

  • Página 53

    Administrative Ut ilities and Settings 43 Disabling the machine acc ount passwor d change on the thin client T o disable the machine account password change on the thin client: 1. S tart the Re gistry Editor by clicking Start | Ru n , entering regedit in th e Open text box, and then clicking OK . 2. Locate and click the following registry subkey: H[...]

  • Página 54

    44 Chapter 5 Running File Based Write Fi lter Command Line Options There are several co mmand lines you can use to control the File Based W rite Filter (command line argume nts cannot be combined). Caution Administrators should use NT file security to prevent undesired usag e of these comma nd s. Use the following guidelines fo r the command line o[...]

  • Página 55

    Administrative Ut ilities and Settings 45 Enabling and Disabling the File Based Write Filter Using the Desktop Icons For convenience, the File Based Write Filter Enable and Disable icons a re present on the Administrator desktop. Use these icons to enab le or disable the File Based Write Filter . • File Based Write Filter Enable Icon - Double-cli[...]

  • Página 56

    46 Chapter 5 • RAM used by FBWF - Shows the amount of RAM used (in Kilobytes and Percentage) that is currently bein g used by t he File Based Write Filter . If Current Stat us is Disabled, RAM Used by FBWF is always zero (0). • Enable FBWF - Allows you to enable the File Based Write Filte r and prompts you to restart the thin client. If you do [...]

  • Página 57

    Administrative Ut ilities and Settings 47 Underst anding the NetXClean Utility NetXClean keep s extraneous information from being stored in fla sh memory . NetXClean is a service th at runs in t he backgrou nd. NetXCle an clean-up is triggere d by either a service startup or a user log-off. It performs the cle an- up invisibly and no user input is [...]

  • Página 58

    48 Chapter 5 Saving Files and Using Local Drives Administrators need to know the following information ab out local drives and saving files. Saving Files Thin clients use an em bedded operating system with a fix ed amount of flash memory . It is recommended that you save files you want to k eep on a ser ver r ather than on a thin client. Caution Be[...]

  • Página 59

    Administrative Ut ilities and Settings 49 Mapping Network Drives Users and ad ministrators can map netw ork drives. Ho wever , to retain the ma ppings after the thin client is restarted, you must comple te the following: • Select the Reconne ct a t logon check box. • Flush the files of the File Based Write Filter cache dur ing the current syste[...]

  • Página 60

    50 Chapter 5 Using Roaming Profiles Y ou can p articipa te in domains by writing roaming pr ofiles to the C drive. The profiles must be limited in size and will not be retained when the thin client is restarted. Note For success ful downloadin g and prop er functioning , there mu st be sufficient flash space available for roaming profiles. In some [...]

  • Página 61

    Administrative Ut ilities and Settings 51 Managing Users and Grou p s with User Manager The User Manager allows administrators to create new user accounts and configure user profiles. It also allows administrators to create new gro up s and determine group membership. By default, a new user is only a member of the Users group and is not locked down[...]

  • Página 62

    52 Chapter 5 Configuring User Profiles Only administrators can select the profile settings for a user . Caution Because of the limited size of th e fl ash memory , it is strongly recommended that other applications av ailable to new and ex isting users b e configured to prevent writing to the local file syst em. For the same re ason, it is also rec[...]

  • Página 63

    Administrative Ut ilities and Settings 53 Determining Group Membership Use the followin g guidelines (example of a dding a us er to the Adm inistrator gr oup): Caution Be sure to flush the files of the File Based W rite Filter cache during the current system sessio n in which an account is modified. 1. Log-in as an administra tor and open the User [...]

  • Página 64

    54 Chapter 5 This page intentionally blank.[...]

  • Página 65

    6 System Administration This chapter contains local and remote system administration information to he lp you perform the routine t asks needed to mainta in your W yse thin client environment. It includes: • "Using Wyse Device Manager Sof tware for Remote Administration" • "Accessing Thin Client BIOS Settings" • "Inst[...]

  • Página 66

    56 Chapter 6 Inst alling and Up grading Addons T o install or upgrade Addons, it is recommended that you use WDM (the thin client has a built-in WDM Ag ent for us e as descri bed in "Configuring WDM Properties"). Note For more informa tion on Wyse Device Manager softwar e refer to the Wyse Web site at: http://www .wyse.c om/products/soft [...]

  • Página 67

    System Administration 57 2. Depending on whether you select Manu al FTP Information or Use DHCP Server’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the path to the MSI p ackage that inst alls the Addon (the MSI package on the FTP server mu st be accom[...]

  • Página 68

    58 Chapter 6 2. Depending on whether you select Manu al FTP Information or Use DHCP Server’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the path to the MSI p ackage that inst alls the Addon (the MSI package on the FTP server mu st be accompanied by a [...]

  • Página 69

    System Administration 59 Uninst alling Addons Using the FTP Addon Installer Y ou can use the FTP Addon Inst aller dialog box to uninstall the thin client Addons th at have been installe d with the FTP Addons utility . Use the following guidelines: 1. Log-in as an administra tor and open the FTP Addo n Ins taller dialog box ( Star t | Control Panel [...]

  • Página 70

    60 Chapter 6 Automatic Sof tware Updates on W yse T hin Clients Using WSUS This section describes three ways to automati cally deploy software upd ates on thin clients using WSUS: • "Using WSUS on the Wyse Thin Client in S tandalone Mode " • "Configuring WSUS for Automatic Software Updates Using SMS" • "Using WSUS wit[...]

  • Página 71

    System Administration 61 T roubleshooting WSUS in St andalone Mode WSUS provides a log for trouble shooting issues related to software updates. This log is located on the thin clie nt, in the directory: C:windowswindows update log . This log displays all commun ications betwee n the client and the server. Y ou can use PERF MON to monitor memory a[...]

  • Página 72

    62 Chapter 6 Windows Up date Log File Examples The examples below illustrate the lo g files for selected activities. Service S tartup 2005-06-01 18:30:03 992 810 Service ************* 2005-06-01 18:30:03 992 810 Service ** START ** Service: Service startup 2005-06-01 18:30:03 992 810 Service ********* The Windows Up date agent searc hes for availab[...]

  • Página 73

    System Administration 63 Configuring WSUS for Automati c Sof tware Up dates Using SMS Y ou can configure WSUS to use the SMS se rver to perform automatic sof tware updates in either a W orkgroup environment or using Active Directory . Prerequisite s Before any software up dates can be deployed via WSUS, you must: • Install SMS 2003 or SMS 2007 on[...]

  • Página 74

    64 Chapter 6 Using WSUS with WDM Y ou can use WDM to deploy the scr ipt that dis ables the W rite Filter , a nd then configure the thin client to contact the WSUS serve r for software upd ates. Prerequisite s Before any software up dates can be deployed via WSUS, you must: • Install and configu re WDM on the server • Install WSUS Serve r v . 2.[...]

  • Página 75

    System Administration 65 Figure 38 WSUS 3.0 Management Console 4. When the software update s ar e co mple te, use WDM to schedule th e scr ipt that enables the Write Filter to run on the thin client. T roubleshooting WSUS with WDM Y ou can use the steps describe d in the “T roubleshooting WSUS in S tandalone Mode” section to troubleshoot the is[...]

  • Página 76

    66 Chapter 6 close the DOS window that is present durin g the process; the DOS window will close automatically . Event: The System Settings Change messag e may appear shortly after the first b oot, depending on the specific hardware configur ation of the thin client. • The New Hardware Found message displays in the system tray (lower ri ght hand [...]

  • Página 77

    System Administration 67 Figure 40 WinVNC: Current User Properties Before a remote machine (o n which VNC Viewer is inst alled) can ac cess a thin client: • The IP address (or valid DNS name) of the thin client that is to be operated/mon itored must be known by the remo te administrator/user . T his IP address can be obtained from the Details are[...]

  • Página 78

    68 Chapter 6 2. (Optional) Y ou can configure advanced VNC co nnection options using the Connection Options dialog box. For example, if the network is slow , click Options to open the Connection Options dialog box, select the Restrict Pixels to 8- bit check box in the Display area (reduces color depth for bette r tr ansm issio n spee d), a nd then [...]

  • Página 79

    System Administration 69 3. In the VNC Server box of the Connection Details dialog box, enter the IP address or valid DNS name of the thin client that is to be operated/monitored followed by a colon and 0. For example: snoopy:0 or 132.237.16.238:0 4. Click OK to open the VNC Authentication dial og box. Figure 43 VNC Authentication 5. Enter the Sess[...]

  • Página 80

    70 Chapter 6 This page intentionally blank.[...]

  • Página 81

    Figures 1 User deskto p - example 14 2 Administrator desktop - example 15 3 Citrix Program Ne ighborhood 18 4 Internet Explorer 19 5 Remote Desktop Conne ction - expanded view example 19 6 Odyssey Client Manager 20 7 Ericom – PowerTer m® Session Manager 20 8 Ericom – PowerTer m® TEC and Connect 21 9 Neutron - exte nded view 21 10 VMware View [...]

  • Página 82

    72[...]

  • Página 83

    73 Ta b l e s 1 DHCP Options 5 2 WSUS Log Format 61 3 WSUS Component s 61[...]

  • Página 84

    Administrators Guide Wys e ® Thin Clients , Based on Microsof t ® Windows ® XP Embedded Issue: 0813 0 9 Written and publishe d by: Wyse T e chnology Inc., August 2009 Created using Fra m eM a ke r ® and Acrobat ®[...]