Professional Documents
Culture Documents
WINBee 5000VX
Powered By
User Guide
Copyright Notice
The information Contained in this document, the software and firmware
described in it are subject to change with out notice.
Trademark Acknowledgment.
HCL Peripherals,
299, Arcot Road, Vadapalani,
Chennai – 600 026
INDIA.
URL: http://www.hclperipherals.in
You have acquired a HCL PERIPHERALS computer device (the "Device") that includes
software developed by and/or licensed by HCL PERIPHERALS and its suppliers and licensors
("Suppliers"). Such software products, as well as associated media, printed materials and
"online" or electronic documentation ("Software") are protected by international intellectual
property laws and treaties. This is a legal agreement between you, the user and me, the party
identified as the owner of certain Software in the copyright statement therein ("me" or "I") for
which I am identified as the owner and there is no separate license agreement between you
and HCL Peripherals or me.
By opening or breaking the seal on the Software packet(s), installing or downloading the
Software, or any use of the Software that has been preloaded or is embedded in the Device,
on the Device or otherwise, constitutes your agreement to this EULA (or ratification of any
previous consent). If you do not agree to this End User License Agreement ("EULA"), do not
use the Device or copy the Software. Instead, promptly return all Software items (disks, written
materials, and packaging), and delete any preloaded or embedded Software.
You may use one copy of the Software on only on the Device and only on one Device at a
time. If you have a multiple copy license for the Software, you may use as many copies at any
time as you have license for. Use means loading the Software in temporary memory or
permanent storage on the Device. Installation on a network server is not allowed. You may
permanently transfer rights under this EULA only as part of a permanent sale or transfer of the
Device and only if the recipient agrees to this EULA. If the Software is an upgrade, any
transfer must include all prior versions of the Software. If you are a commercial customer of
HCL PERIPHERALS, you hereby grant me or an agent selected by me the right to perform an
audit of your use of the Software during normal business hours. You agree to cooperate with
me in such audit, and you agree to provide me with all records reasonably related to your use
of the Software. The audit will be limited to verification of your compliance with the terms of
this EULA.
The software is protected by Indian copyright laws and international treaties. You may make
one copy of the Software solely for backup or archival purpose or transfer it to a single hard
disk, provided you keep the original solely for backup or archival purposes. You may not rent
or lease the Software or copy the written materials accompanying the Software. You may not
reverse engineer, decompile or disassemble the Software, except and only to the extent such
activity is expressly permitted by applicable law notwithstanding this limitation. You may not
create derivative works or use the provided Software media on another computer or network,
or loan, rent, lease, or transfer them to another user except as permitted by this EULA. You
may not use the Software while engaging in any physical activity that requires constant
attention. Violation of any of the above provisions will immediately terminate this EULA.
The Device may contain software other than the standard Microsoft components. Generally,
each of these Software Packages is distributed under the terms of a separate and individual
license agreement. Licensing term of those components also extended as part of this
agreement. By agreeing this, you are agreeing the applicable License term of those software
packages also. Any violation by you of the applicable license terms shall immediately
terminate your license to use the Software. If you do not agree to comply with and be bound
by the terms of the applicable license agreements, do not install or otherwise use the relevant
Software Packages. If you wish to install these Software Packages on or for use by more
appliances than the number for which you have licenses, please contact HCL PERIPHERALS
the vendor of the program to inquire about purchasing additional licenses.
Except for the limited license granted herein, the Software and all related documentation and
materials, and all intellectual property rights contained therein, are and shall remain my sole
and exclusive property. All rights and licenses no expressly granted in this EULA are reserved
by me.
No Other Warranties: The non-HCL Peripherals portions of the Software are provided "AS-IS"
and with all faults. The Software is not fault tolerant. I DO NOT warrant that the functions of
the Software will meet your requirement or that operation of the Software will be uninterrupted.
Or error free. You assume responsibility for selecting the Software to achieve your intended
result and for the use and result obtained. No warranties related to the non-Microsoft portions
of the Software or the Devices originated from and are not binding on Microsoft.
(i) This EULA will terminate automatically upon notice from me to you if
(a) You fail to comply with any term(s) of this License;
(b) You attempt to transfer any or all of your rights under this EULA to another person
or entity in an unauthorized fashion;
(c) I send you a new EULA, which conditions your continued use of the Software upon
delivery thereof.
(ii) Termination of this EULA shall be without prejudice to any rights or liabilities accrued at
the date of the termination. Upon effectiveness of the termination, all rights and licenses of
you to use the Software hereunder shall terminate. Upon termination hereof, you shall
cease all use of the Software and destroy all copies of the Software and all associated
documentation in your possession or control.
(iii) All warranty disclaimers and export control provisions shall survive termination hereof.
(iV) Demo package applications will be allowed to execute up to limited period only, and
application execution will be terminated/uninstalled from thin client after the limited period
automatically.
(V) Any malfunction and not workable condition of the Device due to the installation and
uninstallation of any software component supplied directly or indirectly by any medium shall
not comes under the warranty. HCL PERIPHERALS and Microsoft shall not give guarantee
for the device on any aspect of the work and environment related support.
GENERAL:
This EULA is governed by the laws of the Indian government. Each provision of this EULA is
severable. If a provision is found to be unenforceable, this finding does not affect the
enforceability of the remaining provision, terms, or conditions of this EULA. This EULA is
binding on successors and assigns. I agree and you agree to waive, to the maximum extent
permitted by law, any right to a jury trial with respect to the Software.
You acknowledge that you have read this EULA and agree that it is the complete and
exclusive statement of the agreement between the parties, and that this EULA supersedes all
prior proposals and understandings, oral and written, relating to the subject matter of this
EULA. This EULA shall not be modified or rescinded except in a written instrument signed by
you and me. The terms and conditions of any present or future documents submitted by you
which conflict with, or in any way purport to amend this EULA, are specifically objected to by
me and shall be of no force or effect.
Any other term not with standing, you understand and agree that except for software where it
is expressly identified as the copyright owner, HCL Peripherals has made no representations,
warranties or conditions hereunder and that it has no liability or obligation whatsoever related
to the Software.
Note on JAVA Support. The device software may contain support for programs written in Java.
Java technology is not fault tolerant and is not designed, manufactured, or intended for use or
resale as on-line control equipment in hazardous environments requiring fail-safe
performance, such as in the operation of nuclear facilities, aircraft navigation or
communication systems, air traffic control, direct life support machines, or weapons systems,
in which the failure of java technology could lead directly to death, personal injury, or severe
physical or environmental damage.
The following special terms are in addition to the terms set forth above and shall apply to the
Microsoft portion of the Software:
Limited Use of Particular SOFTWARE Services: Provided that the DEVICE continues to
comply with the terms of the "Restricted Functionality" paragraph below, without limiting the
number of computers or other electronic devices that might connect to the DEVICE to access
or utilize other software or SOFTWARE services on the DEVICE, you may permit a maximum
of ten (10) computers or other electronic devices to connect to the DEVICE to utilize the
services of the SOFTWARE for (a) file and print services, (b) Internet information services,
and/or (c) remote access (including connection sharing). The ten (10) connection maximum
includes any indirect connections made through "multiplexing" or other software or hardware
which pools or aggregates connections.
If you use the DEVICE to access or utilize the services of functionality of Microsoft Windows
Server products (such as Microsoft Windows NT Server 4.0 (all editions) or Microsoft Windows
2000 Server (all editions) or Microsoft Windows 2003 Server (all editions)), or use the DEVICE
to permit workstation or computing devices to access or utilize the services or functionality of
Microsoft Windows Server products, you may be required to obtain a Client Access License
for the Device and/or each such workstation or computing device. Please refer to the End-
User License Agreement for your Microsoft Windows Server product for additional information.
Restricted Deployment: The SOFTWARE is not designed or intended for use or resale in
hazardous environments requiring fail-safe performance, such as in the operation of nuclear
facilities, aircraft navigation or communication systems, air traffic control, or other devices or
systems in which a malfunction of the SOFTWARE would result in foreseeable risk of injury or
death to the operator of the device or system, or to others.
Restricted Functionality: You are licensed to use the SOFTWARE to provide only the limited
functionality (specific tasks or processes) for which the DEVICE has been designed and
marketed by HCL PERIPHERALS. This license specifically prohibits any other use of the
SOFTWARE, or inclusion of additional software programs or functions, on the DEVICE.
Subject to the terms of the "Limited Use of Particular Services" paragraph above, you may use
the SOFTWARE on the DEVICE to interact with other computers or electronic devices.
Maximum Number of Processors: The SOFTWARE may not be used by more than two (2)
processors at any one time on the DEVICE.
Remote Boot Feature: Your DEVICE may be enabled with a Remote Boot feature which
includes Remote Boot Installation Services tool. You may use the Remote Boot Installation
Services tool only to deploy the SOFTWARE to one or more Devices on which you are
licensed to run the SOFTWARE (i.e. Devices to which the appropriate Certificate of
Authenticity is affixed). Please refer to the DEVICE documentation, if provided with your
DEVICE, or contact HCL PERIPHERALS for additional information.
Security Updates: Content providers are using the digital rights management technology
("Microsoft DRM") contained in this SOFTWARE to protect the integrity of their content
("Secure Content") so that their intellectual property, including copyright, in such content is not
misappropriated. Owners of such Secure Content ("Secure Content Owners") may, from time
to time, request MS, Microsoft Corporation, or their subsidiaries to provide security related
updates to the Microsoft DRM components of the SOFTWARE ("Security Updates") that may
affect your ability to copy, display, and/or play Secure Content through Microsoft software or
third-party applications that utilize Microsoft DRM. You therefore agree that, if you elect to
download a license from the Internet which enables your use of Secure Content, MS,
Microsoft Corporation, or their subsidiaries may, in conjunction with such license, also
download onto your DEVICE such Security Updates that a Secure Content Owner has
requested that MS, Microsoft Corporation, or their subsidiaries distribute. MS, Microsoft
Corporation, or their subsidiaries will not retrieve any personally identifiable information,
or any other information, from your DEVICE by downloading such Security Updates.
Consent to Use of Data: You agree that MS, Microsoft Corporation, and their affiliates may
collect and use technical information
gathered in any manner as part of product support services related to the SOFTWARE. MS,
Microsoft Corporation, and their affiliates
may use this information solely to improve their products or to provide customized services or
technologies to you. MS, Microsoft
Corporation, and their affiliates may disclose this information to others, but not in a form that
personally identifies you.
Internet Gaming/Update Features: If the SOFTWARE provides, and you choose to utilize, the
Internet gaming or update features
within the SOFTWARE, it is necessary to use certain computer system, hardware, and
software information to implement the features.
By using these features, you explicitly authorize MS, Microsoft Corporation, and/or their
designated agent to use this information
solely to improve their products or to provide customized services or technologies to you. MS
or Microsoft Corporation may disclose
this information to others, but not in a form that personally identifies you.
Internet-Based Services Components: The SOFTWARE may contain components that enable
and facilitate the use of certain Internet-based services. You acknowledge and agree that MS,
Microsoft Corporation, or their affiliates may automatically check the version of the
SOFTWARE and/or its components that you are utilizing and may provide upgrades or
supplements to the SOFTWARE that may be automatically downloaded to your Device.
Links to Third-Party Sites: The SOFTWARE may provide you with the ability to link to third-
party sites through the use of the SOFTWARE. The third-party sites are not under the control
of MS, Microsoft Corporation, or their affiliates. Neither MS nor Microsoft Corporation nor their
affiliates are responsible for (i) the contents of any third-party sites, any links contained in
third-party sites, or any changes or updates to third-party sites, or (ii) web casting or any other
form of transmission received from any third-party sites. If the SOFTWARE provides links to
third-party sites, those links are provided to you only as a convenience, and the inclusion of
any link does not imply an endorsement of the third-party by MS, Microsoft Corporation, or
their affiliates.
If MS, Microsoft Corporation, or their affiliates make available Supplemental Components, and
no other EULA terms are provided, then the terms of this EULA shall apply, except that the
MS, Microsoft Corporation, or affiliate entity providing the Supplemental Component(s) shall
be the licensor of the Supplemental Component(s).
HCL PERIPHERALS, MS, Microsoft Corporation, and their affiliates reserve the right to
discontinue any Internet-based services provided to you or made available to you through the
use of the SOFTWARE.
This EULA does not grant you any rights to use the Windows Media Format Software
Development Kit ("WMFSDK") components contained in the SOFTWARE to develop a
software application that uses Windows Media technology.
If you wish to use the WMFSDK to develop such an application, visit the following link
http://msdn.microsoft.com/workshop/imedia/windowsmedia/sdk/wmsdk.asp, accept a separate
license for the WMFSDK, download the appropriate WMFSDK, and install it on your system.
FCC NOTICE:
This device has been tested and found to comply with the limits of the FCC
Rules. These limits are designed to provide reasonable protection against
harmful interference in a residential installation. This device generates, uses,
and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio
communications.
3. Connect the device into an outlet on a circuit different from that to which the
receiver is connected.
Caution
Changes or modifications not expressly approved by the manufacturer could
void the user’s authority, which is granted by the Federal Communications
Commission, to operate this computer.
Use Conditions
This part complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) this device may not cause harmful interference,
and (2) this device must accept any interference received, including
interference that may cause undesired operation.
2. Unplug this product from the wall outlet before cleaning. Do not use liquid
cleaners or aerosol cleaners. Use a damp cloth for cleaning.
4. Do not place this product on an unstable cart, stand, or table. The product
may fall, causing serious damage to the product.
5. Slots and openings in the cabinet and the back or bottom are provided for
ventilation to ensure reliable operation of the product and to protect it from
over-heating, these openings must not be blocked or covered. Placing the
product on a bed, sofa, rug, or other similar surface should never block the
openings. This product should never be placed near or over a radiator or heat
register, or in a built-in installation unless proper ventilation is provided.
6. This product should be operated from the type of power indicated on the
marking label. If you are not sure of the type of power available, consult your
dealer or local power company.
7. Do not allow anything to rest on the power cord. Do not locate this product
where persons will walk on the cord.
8. If an extension cord is used with this product, make sure that the total
Ampere rating of the equipment plugged into the extension cord does not
exceed the extension cord Ampere rating. Also, make sure that the total rating
of all products plugged into the wall outlet does not exceed the fuse rating.
9. Never push objects of any kind into this product through cabinet slots as
they may touch dangerous voltage points or short out parts that could result in
a fire or electric shock. Never spill liquid of any kind on the product.
11. Unplug this product from the wall outlet and refer servicing to qualified
service personnel under the following conditions:
d. If the product does not operate normally when the operating instructions
are followed. Adjust only those controls that are covered by the operating
instructions since improper adjustment of other controls may result in damage
and will often require extensive work by a qualified technician to restore the
product to normal condition.
e. If the product has been dropped or the cabinet has been damaged.
12. Use only the proper type of power supply cord set (provided in your
accessories box) for this unit. It should be a detachable type: UL listed/CSA
certified, type SPT-2, rated 10A 250V minimum, ISI approved, VDE approved
or its equivalent. Maximum length is 5 feet.
Table of Contents
1 INTRODUCTION TO WINBEE .....................................................................................................13
2 TERMINAL INSTALLATION........................................................................................................15
CHAPTER 1
1 Introduction to WINBee
Package based installation feature is now available with WINBee 5000 thin client.
This feature provides option to install and uninstall any application in the HCL’s
Package form for WINBee 5000. These packages can be installed from local HCL
Add/Remove Programs and through BeeControl Enterprise Management remote
administration tool. This feature support installation and un installation of any HCL
packages for WINBee 5000 in the firmware at any point of time (Provided enough free
space is available in local disk).
* Optional Features
CHAPTER 2
2 Terminal installation
The following items are provided with the WINBee5000 terminal:
1. Power cord
2. User's Manual CD
3. Mouse
4. Mouse Pad
5. External Speaker (Optional)
2.1 Unpacking
The terminal is shipped in a single carton, with mouse and mouse pad.
1. Inspect the shipping carton for any damage. If you find any damage to the
equipment, please inform the customer engineer as soon as possible.
2. First place the carton with the arrow printed on the packing box pointing
upwards. Cut the nylon strap using a knife.
3. Open the top covers of the packing box. Lift the equipment along with the
thermo Cole buffers out of the packing box by holding the display unit with
both the hands and place it on a flat surface.
Save the shipping carton and the packing materials so that it can be reused for packing.
Repack the terminal (terminal box, and the mouse) in the original shipping cartons.
If the original packing materials are unfit for use or not available, repack the terminal
as follows:
Obtain a strong cardboard shipping carton having inside dimensions at least six inches
more than the terminal dimensions.
Cushion the unit on all sides by tightly packing foam like materials between the carton
and the unit.
Follow the above steps for packing the display unit, terminal box, keyboard and the
mouse.
Suggestions and Precautions, while selecting a site for installing the terminal.
Connector Description
NETWORK 10 / 100 Base-T LAN connector
COM1 Serial Ports for COM Mapping and PPP
Connection
PRINTER Local printing and client printer mapping.
VIDEO Monitor interface.
KEYBOARD Keyboard interface.
MOUSE Mouse interface.
]
Key Board (PS/2) Mouse (PS/2)
VGA Port
USB Ports
MIC Audio In
Mouse (PS/2)
Before connecting the cables, ensure that the cables are of the correct lengths. Before
applying power to the terminal ensure the following:
1. Place the keyboard in front of the display unit and connect the keyboard cable
to the socket marked KB on the rear side of the terminal box.
2. Connect the mouse to the MOUSE connector.
3. Connect the video signal cable from the monitor to the 15 pins D type female
connector marked VIDEO at the rear side of the terminal box.
4. Secure the cable firmly by tightening the screws available in the video signal
cable.
5. If you will be using a network connection, connect a 10/100 Base – T twisted
pair network cable to the network connector. Depending on your configuration
needs, connect a printer to the parallel port and/or connect a modem/server
(incase of PPP) serial cable to the serial ports as appropriate.
CAUTION: Do not force the connectors into the socket. If any resistance is
encountered, ensure that the connector is oriented correctly to the socket.
Please refer to the User's Manual of the Monitor supplied along with this Product
for Monitor related controls and adjustments.
CHAPTER 3
The Citrix server communicates with WINBee 5000 over a standard TCP/IP network
connection and supports most types of network connection including Local Area
Networks, Wide Area Networks and communication over the Internet.
The ICA protocol has been specially designed for transmitting Windows graphical
display data, keyboard and mouse input, over a network connection. On average it
consumes only 20 K baud of bandwidth, and so achieves impressive performance even
over low-bandwidth connections such as dial-up connections.
The key features of the ICA protocol that help to achieve the high performance are:
• Intelligent command and object-specific compression
• Intelligent caching of Windows objects including bitmaps, brushes, glyphs, and
pointers
• Run length encoding
More information about the ICA protocol is available from the Citrix World Wide
Web page at http://www.citrix.com/.
CHAPTER 4
Once the terminal is powered on, the WINBee 5000 will boot and show the login
screen for the user. There will be two users by default in the client. The default users
are
1. admin
2. user
The admin user is having privilege of administrator to that thin client. By default the
password for the “admin” user is “hclpd”. We strongly recommend the system
admin/System in-charge to change the default password and set their own password.
The admin will have the privileges to administrate the WINBee 5000VX thin client.
The admin can create new users, configure the Desktop, Network and other options.
To login to the client, click on the user name. A password text box will appear,
beneath the name of the user.
NOTE:
By default all the modification made in the client will be saved to RAM, Once you
reboot the client all the modifications that you have made to the client will be
vanished. If you want to save all the modifications to client then you have to use the
option “Commit Changes” available under “Start->All Programs->HCL System tools”
menu. This option will be executed by the “admin” user only. For security purposes
this “Commit Changes” program is protected with authentication option.
Once you execute this option it will show following screen to user
Figure 4.1
It screen has the following options such as Change Password, Commit Changes and
Close.
Figure 4.2
In this screen you have to provide the Old Password, New Password and the
Confirmation of New Password. Once you change the password, you have to do
Commit Changes to save the password permanently.
Commit Changes is the option is to save all the modification that you have made to the
client from the system initialization. So take enough care before you use this option.
Once you execute this operation it will asks for the authentication password to do the
“Commit changes” operation.
Figure 4.3
After the execution of the commit changes the system will restart to save the
modification.
Note:
It is better to restart the client, then do the do the modification/settings that required to
save permanently and execute commit changes operation to save the modifications.
When the user gets logged in, the desktop User Interface of Windows XP Embedded
will appear as shown in Figure 4.4.
Figure 4.4
Click the Start Button present in the Left Bottom of the screen. Now a set of options
will appear prompting you select the list of programs and utilities from it. The utilities
and their Paths are described below.
CHAPTER 5
STARTÎCONTROL PANEL. Now the figure as shown in Figure 5.0 will appear.
Figure 5.0
Figure 5.1
To setup the DPMS options, Open the Display Control Panel (See Section 5.1.1 and
Figure 5.1). Choose the Screen Saver Tab window shown in Figure 5.1. In the
Screen Saver Tab, Click the Power Button. Now the window as shown in figure 5.5
will appear.
Figure 5.5
In the Turn off Monitor option, Choose the number of seconds/minutes after staying
without any keyboard/Mouse Movements, the Monitor has to be Turned off.
Figure 5.6
Figure 5.7
Select the Type of Printer you want to install, Local or a Network Printer. (See Figure
5.8) and click NEXT.
Figure 5.8
Select the Port in which the Printer is plugged. (See Figure 5.9) and then Click
NEXT.
Figure 5.9
Select the Printer from the given set of printer list provided as shown in Figure 5.10.
and then click NEXT.
Figure 5.10
In the next page (Figure 5.11), choose YES if you wanted to print a test page and then
choose NEXT.
Figure 5.11
Now the Add Printer Wizard will ask for the location of Printer Drivers. Now Click
Browser button. Place the CDROM that is present along with this pack into a PC and
share the CDROM Drive from the PC. Now enter the Location of Printer Drivers (i.e.,
\\cdrom\drivers). Now your printer will get installed and displayed in the Printers and
Faxes Folder.
Figure 5.12
STEP 1:
Plug the External MODEM into the COM Port of WINBee. Switch it on the Power
supply of the MODEM.
STEP 2:
Figure 5.14
Now Click the Add.. Button. Now the Figure as shown in the figure 5.15 appears.
Figure 5.15
Do not check the Don’t Detect my modem; I will select it from a list option. (Figure
5.15)
Figure 5.16
A Welcome to the Found New Hardware Wizard (Figure 5.16) informing you that
an External MODEM has been created will appear in the Screen.
Figure 5.17
In the Next Dialog Box (figure 5.17), Choose Don’t Search, I will choose the driver
to install.
Figure 5.18
In the Next Dialog Box (figure 5.18), choose the Hardware Type as MODEM.
In the Add Hardware Wizard Dialog Box (figure 5.18), Choose the Modem Type as
Standard Modem.
Figure 5.19
Click Next.
Now a wizard informing you that the Modem has been successfully installed will be
appear (Figure 5.20). Now your Modem is ready to use for Dial Up Networking.
Figure 5.20
Choose the Modem which has to checked. Click Properties. (Figure 5.21)
Figure 5.21
In the Properties option, Click Diagnostics (Figure 5.22) . Choose Query Modem
Button. Now the Modem will be queried for its presence.
Figure 5.22
Figure 5.23
Right Click on the Local Area Connection Icon (Figure 5.23) Choose Properties.
Now choose the TCP/IP configuration as shown in Figure 5.24 and then click
Properties.
Figure 5.24
Enter the IP address, Subnet Mask and Gateway in this page. (Figure 5.25)
Figure 5.25
DNS and WINS options can be configured by clicking on Advanced button present in
the window.(Figure 5.26)
Figure 5.26
Right Click the Local Area Connection icon. Select Properties. See Figure 5.23.
In the figure 5.24, Select the Configure button. Now the window as shown in figure
5.27 appears.
Click Advanced Tab (Figure 5.27) and Select the Mode (Figure 5.28) you wanted to
use.
Figure 5.27
Figure 5.28
With User manager, users can be managed by the user with administrative privileges
of the Terminal.
Figure 5.29
Figure 5.30
Figure 5.31
Figure 5.32
People who do not have an account can use the guest account to log on to the
computer. Password-protected files, folders, or settings are not accessible to guest
users.
To Turn on the Guest User Account. Click the Guest User Account.
Figure 5.33
When you log off from the computer, the Guest user name will be found in the user
login screen.
Figure 5.34
Figure 5.35
Figure 5.36
Figure 5.37
Figure 5.38
Please see the below figure of Windows Firewall settings to get information about this. By
default this firewall will be on in the Thin client and we are recommending to use local firewall
for the Thin clients.
Refer Microsoft site for more information on the firewall settings on XP.
Figure 5.39
• To have more security, enable the “Don’t allow exceptions”. The Don't allow
exceptions setting blocks all unsolicited requests to connect to your computer,
including requests to programs or services selected on the Exceptions tab. Use
this setting when you need maximum protection for your computer, such as
when you connect to a public network in a hotel or airport, or when a
dangerous virus or worm is spreading over the Internet.
• When Don't allow exceptions is selected, the firewall also blocks unsolicited
requests to share files or printers, and discovery of network devices.
• When Don't allow exceptions is selected, you can still view most Web pages,
send and receive e-mail, or use an instant messaging program.
Note :
If Don’t allow exceptions is enabled then remote Management of Thin Client is not
possible.
Figure 5.40
Figure 5.41
Add programs you want outside source to be accessed. See Figure 5.42.
Figure 5.42
Figure 5.43
To Change to Default setting select Restore Default under Advanced tab. See
Figure 5.44.
Figure 5.44
Please refer Microsoft web site for more details on the Local Firewall Settings on
Windows XP.
5.10 ABOUT:
To check version and Default list of components installed with WINBee 5000VX
Figure 5.45
Select “Application Info” tab to know information about the NM Application and
QFE packages installed on the thin client. Click “Generate Report” button to
generate report about the NM Application and QFE package installed on thin client..
Figure 5.46
Figure 5.47
Option Purpose
Import Policy Set Import User Policy Template as
Security Policy for the selected
User.
Export Policy Set Export the user security policy
User as Policy Template.
Select the User Select User to configure policy
View Users Policy View user policy status
Generate Policy Report Generate report on user policy
for a user’s Log file
Print Users Policy Report Print report of selected user
policy.
Enable Enable restriction.
Disable Disable restriction.
To import policy set click FILE menu -> Import Policy Set. Select the policy set in
open dialog box and click “open” button. Refer Below Figure.
Figure 5.48
To Export Policy Set, Select FILE menu-> Export Policy Set option. Provide a
location to save policy in Save as dialog box and press “Save” button. Refer Below
Figure.
Figure 5.49
To change user, select “Select the Users” option in User Policy Menu. Uers Selection
dialog will be launched. Refer Below Figure.
Figure 5.50
To view user security policies status for a user select “View User Policy” option in
User Policy Menu. Refer Below Figure.
Figure 5.51
To generate report on user security policy for selected user, select “Generate Policy
Report” option in User Policy menu. Refer Below Figure.
Figure 5.51
To print report on user security policy for selected user, select “Print Users Policy
Report” option in User Policy menu and click print button. Refer Below Figure.
Figure 5.52
5.12 AUTOLOGON:
STARTÎALL PROGRAMSÎHCL SYSTEM TOOLSÎ AUTOLOGON
See Figure 5.53
Auto Logon Utility is used enable KIOSK Mode option. Using Auto Logon Utility
selected user can be automatically logon, to do the same admin user should enter user
name, password and check Enable Auto Logon option for the selected user. Below
user interface Figure 5.53 is used to configure automatically logon feature.
Figure 5.53
Option Purpose
User Name Name of user to be
automatically logon
Password Selected user password
Enable Auto Logon Enable /Disable auto logon
feature
NOTE:
HCL QFE Installer Utility is used to install HCL QFE package to update base
firmware and application package with QFE patches. This feature is only provided to
admin user.
Figure 5.54
Option Purpose
Add New QFE To install QFE package.
Show Updates To list QFE packages installed
on thin client.
Select “Add New QFE” option to install QFE package on thin client. See below
figure.
Figure 5.56
Select “Browse” button to locate QFE package. Network driver mapping dialog
should launch after browse button click.
Figure 5.57
To browse local folder selects “Browse local folder” option. To map a network drives
select “Browse network shared folder” option. After locate the package select the
QFE package and click “Install” button or “double click” QFE package to start
installation. See below figure.
Figure 5.58
After installation completed, installation status of QFE package will be changed to
“Already Installed” as shown in below figure.
Figure 5.59
Note:
This QFE Installer requires HCL System Tools Package version 1.0 or above.
Using Windows Function Key Macro an application can be launched in a single key
press with Windows Key combination.
Figure 5.60
User can map an application to a hot key using below figure 5.61
Figure 5.61
Option Purpose
Add Map an application with
available hot key
Remove Remove selected mapped
application form windows
macro utility list.
Figure 5.62
Option Purpose
Add New Programs To install/upgrade an
application
Remove Programs Remove selected application
from the WINBee firmware.
Figure 5.63
Click Next Button, Select the Package from CD ROM or USB Disk on Key and follow
the wizard. See Figure 5.64.
Figure 5.64
Press Next button to continue. Select I Agree the Agreement to install the application.
See Figure 5.65
Figure 5.65
Figure 5.66
After click finish button as shown in above button, HCL Add/Remove Programs utility
will start installing the selected application. After installation completed “Application
installed successfully” message will be posted as show in figure 5.67
Figure 5.67
Remove Programs:
Select an application to be uninstalled and click remove program option in HCL
Add/Remove Programs utility. See Figure 5.68.
Figure 5.68
Message box will be shown as below. Press Yes to uninstall and No to cancel. See
Figure 5.69
Figure 5.69
Figure 5.70
Figure 5.71
NOTE:
STARTÎCONTROL PANELÎBEECONTROL
Figure 5.72
Option Purpose
Enable Enable remote administration
support.
Disable Disable remote administration
support.
NOTE:
Figure 5.73
Option Purpose
Restrict the User’s to work in Enable/Disable the Time
time limitation restriction to the Users.
User Login Time Used to set the Login time of
the user
User Logout Time Used to set the Logout time of
the user
NOTE:
Do commit changes to save the settings. The restriction timing will work only
after enable the “Restrict the User’s to work in time limitation” option.
CHAPTER 6
Figure 6.0
Click Options (See Figure 6.0) to choose from a list of options present in RDP.
(Figure 6.1)
Figure 6.1
The following table lists down the options that can be configured in RDP.
Figure 6.2
Figure 6.3
Enter the name of the connection, the type of the protocol and IP address of the server
with which you would establish the connection and whether you opt to access a
particular published application or the entire desktop of the remote server. (Figure
6.4)
Figure 6.4
In the page that follows enter the type of Encryption Level that you would opt for the
Remote connection and move to the next page.
Enter the USERNAME, PASSWORD and DOMAIN details with which you would be
authenticated to logon to the remote server. (Figure 6.5)
Figure 6.5
Select the screen resolution and colors of the remote ICA Session. You have the option
to leave the default settings or else to go for the best available option that matches
your needs. (Figure 6.6)
Figure 6.6
Enter the name of the application and path of the directory present in the remote
server. Entering the name of the application and its path enables you to open the
application as soon as you logon to the remote server. (Figure 6.7)
Figure 6.7
Finally a window displaying that an ICA Connection has been set up successfully will
be displayed. (Figure 6.8). Click the Finish Button. Now the ICA connection gets
created successfully. (Figure 6.9).
Figure 6.8
Figure 6.9
To view the properties of a particular ICA Connection Profile (Figure 6.9), Select that
particular profile, and click Properties. (Figure 6.10).
Figure 6.10
The General ICA Settings can be set by clicking the Settings option present in the
Toolbar. (Figure 6.11)
Figure 6.11
The General options present in the ICA settings are tabulated below:
Now a message
Will appear.
Now you may be able to access Application published in the ICA server through
local Internet Explorer 6.0.
Start the NFuse service in the server. Type the URL of the Citrix Server. Now
the Citrix NFuse window will appear as shown below. (Figure 6.12) Enter
the user name, Password and domain fields and log in.
Figure 6.12
Now a set of applications published through Citrix Nfuse will get displayed. (Figure
6.13). Click on one of the listed applications and get access to that application from
the browser itself.
Figure 6.13
Enter your Connection name and phone number in appropriated fields. Click NEXT.
See Figures 6.14.
Figure 6.14
Figure: 6.15
Figure 6.16
Figure 6.17
Figure 6.18
Now a finish window will display. Click FINISH, see Figure 6.19
Figure 6.19
Figure 6.20
Now connect Dial-Up Connection window will ask you to enter the username and
Password. (Figure 6.21)
Figure 6.21
To Change the properties of your connection, Click Properties (From figure 6.21).
Now the window as shown below will appear.
Figure 6.22
Enter your Connection name and HOST IP in appropriated fields. Click NEXT.
See Figures 6.23.
Figure 6.23
Figure 6.24
Figure 6.25
Figure 6.26
Figure 6.27
Figure 6.28
Select NAME connection. VPN connection window will display. Figure 6.29
Figure 6.29
Enter User name and Password.
Clicks CONNECT.
Figure 6.30
Enter your Connection name and HOST IP in appropriated fields. Click NEXT.
See Figures 6.31.
Figure 6.31
Select CONNECTION TO THE INTERNET option and click NEXT. Figure 6.32
Figure 6.32
Figure 6.33
Select CONNECT USING A BROADBAND CONNECTION THAT REQUIRES A USER NAME
AND PASSWORD.
Figure 6.34
Figure 6.35
Enter user name, password and Confirm password in the respective place. Click
NEXT, Figure 6.36
Figure 6.36
Click FINISH Button in finish Window.
Figure 6.37
Figure 6.38
Name of the window Tab Options Present
General Service name
Using Acrobat Reader enables you to access Portable Document Files over the
network and from the Web. (Figure
6.38)
Figure 6.38
VNC Viewer is tool used to shadow the Desktop of a Remote Computer in the local
Desktop. To shadow a remote desktop, the VNC Server service must run in the remote
system and the password set for to shadow the remote desktop must known.
Figure 6.39
Figure 6.40
Enter the VNC Viewer password to shadow the remote client. (Figure 6.40).
Figure 6.35
Now the Remote desktop view of the remote computer will appear in the local desktop
as shown above. (Figure 6.41)
Figure 6.42
Set the password to enable only the authenticated users to shadow the desktop of the
Terminal. (Figure 6.42). Click OK or Apply. The Terminal can be shadowed
remotely.
Figure 6.43
To Make Serial Port Connection select connection type as Serial. See Figure 6.44
Figure 6.44
STARTÎINTERNET EXPLORER.
Figure 6.45
Figure 6.46
To open a media player over the network, Choose Open from the File Menu. (Figure
6.47).
Enter the Location of the media Player that is present in the network.
Figure 6.47
To access the Volume control, follow the below steps. (Figure 6.48)
Figure 6.48
To enable the Microphone, Choose properties from the Options Menu. Click
Microphone (Figure 6.49) from the volume controls and choose it. Then remove the
Tick mark present in the Mute Check box.
Figure 6.49
Plug the Microphone into the Microphone Port. Enable Microphone as detailed above.
(Section 6.11). Invoke the Sound recorder Utility.
Figure 6.50
Click the RECORD button (located at the Right end) present in the Toolbar. Now the
Audio will get recorded. The recorded file can be played again by clicking the PLAY
button (Middle Button).
Figure 6.51
Provide Login and session name and Click the Configure button in the bottom.
See Figure 6.51
The Configuration Dialog has the General tab, Advanced tab, Services tab,
Environment Tab and About tab.
Figure 6.52
Save the settings and give the password for login. Click the Login button. The
Connection will establish with the given server. See Figure 6.53
Figure 6.53
To access the Microsoft outlook express, follow the below steps. (Figure 6.53)
At the first time the configuration settings will appear. Enter the display
name and click the Next button . See figure 6.54
Figure 6.54
Give the e-mail ID .see figure 6.55 .Click the Next button
Figure 6.55
Give the incoming and outgoing mail server .see figure 6.56 . Click the
Next button.
Figure 6.56
Give the user name and password. See figure 6.57. Click the Next button.
Figure 6.57
Click the finish button . The Outlook Express will shown .See the figure 6.58
Figure 6.58
Appendix 1 - GLOSSARY
GLOSSARY
Scroll : As all the lines in the screen work area are filled with
Data, the screen is said to scroll when the first line disappears
and the display moves up one line to vacate the bottom line for
new data.
FEEDBACK FORM
We lay a lot of importance on your feedback and suggestions. These help us immensely in
making continuous improvements in our products and Specification, in turn enabling us to give
you products that satisfy your needs.
B (Average)
Your Profile
Name …………………………………………….………………………
Experience ..…………………………………………………………………...
Designation ...…………………………………………………………………..
Department …………………………………………………………………….
Company ....…………………………………………………………………..
Address ..…………………………………………………………………...
………………………………………………………………..…...
Signature …………………………………………………………………….