Establishing a Server Environment 21
8. (Wireless Networks Only) Click Wireless Setup to open the Wireless Setup dialog
box and use the following guidelines:
The on-board NIC is “favored” if a valid link is detected, and the USB wireless
will not be activated; otherwise, USB wireless becomes the system’s LAN, all
configured network settings apply to the wireless network, and the USB
wireless controls the NIC and functions such as the local Ethernet. Currently,
only the Action Tec USB wireless card is supported.
·Mode: Select either the Infrastructure or Ad Hoc option.
Infrastructure - Select Infrastructure for access point wireless networks in which
thin clients connect to access points as they move from place to place (for example,
from floor to floor) or require a new access point due to traffic congestion.
Ad Hoc - Select Ad Hoc for computer-to-computer wireless networks in which thin
clients connect to one another directly.
· SSID: Enter the name of the wireless network to which the thin client will connect
(32 characters maximum).
·Channel: Select a channel number from 1 to 14.
· Encryption: Select one of eight user-defined WEP/WPA keys.
· Algorithms: Select either Open or Shared Key for WEP encryption.
·Key: Depending on which WEP/WPA key you selected, use the following
None - Enter no characters.
WEP Key 1-4 - Enter 5 or 13 characters for the 64-bit or 128-bit encryption key, or
10 or 26 hex-decimal digits.
WPA_PSK or WPA2_PSK - Enter any value from 8 to 63 characters, or specify the
numbers as 128 hex-decimal digits.
WPA_Enterprise or WPA2_Enterprise - Enter no characters.
Configuring Session Services
Before you use the information in this section to configure your ICA and RDP session
services, be sure you understand and use the following guidelines:
General Guidelines - Be aware of the following:
The Thin-client session services are made available by servers hosting Citrix ICA
and Microsoft RDP software products.
A browser must be available through one of the session services to access any
on-line help documentation for users.
There can be more connections than desktop space to display them.
Connections can be defined in persistent memory (with a statement reading
enablelocal=yes in the wnos.ini file). These connections can be displayed as
desktop icons only in Stand-alone mode with a Non-privileged user.
Only the connections defined in an INI file and containing an icon= clause will be
displayed on the desktop (assuming there is adequate desktop space).
Connections can be displayed on the desktop without requiring a sign-on (when
you define these connections in a wnos.ini file or when the wnos.ini file does not
contain a SignOn=yes statement).
ICA Guidelines - Independent Computing Architecture (ICA) is a three-tier,
server-based computing technology that separates the logic of an application from its
user interface. The ICA client software installed on the thin client allows the user to
interact with the application GUI, while all of the application processes are executed on
Terms of Use | Privacy Policy | DMCA Policy
2006-2020 Rsmanuals.com