Users Guide

d. Open the Troubleshooting window, and click Export Logs on the General tab. The log file is stored in the root
folder of the USB drivesystem_log_201910107_125610.tgz.
e. Extract the tgz file. The log files are available at ./compat/linux/var/usbdump/.
4. Click the Ping tab, and do the following:
a. Enter the IP address, DNS-registered hostname, or WINS-registered hostname of the target device.
b. Click Start.
The data area displays the ping response messages. The ping command sends one echo request per second, calculates
round-trip times and packet loss statistics, and displays a brief summary upon completing the calculation. If the host is
operational and on the network, it responds to the echo request. By default, echo requests are sent until interrupted by
clicking Stop.
NOTE: Not all network equipment responds to ping packets. This is attributed to Denial-of-Service (DoS) attacks.
Lack of response does not necessarily indicate that the target of the ping is unusable for other purposes.
5. Click the Trace Route tab, and do the following:
a. Enter the IP address, DNS-registered hostname, or WINS-registered hostname of the target.
b. Click Start.
The data area displays round-trip response time and identifying information for each device in the path.
The tracert utility traces the path from your thin client to a network host. The host parameter is either a valid hostname or
an IP address. The tracert utility sends out a packet of information three times to each device (routers and computers) in
the path. The round-trip response time and the identifier information are displayed in the message box.
6. Click the Telnet tab, and do the following:
a. Click Telnet.
b. Enter the hostname.
c. Enter a port number.
d. Select a color theme.
e. Click Connect to connect to a remote host or device.
7. Click the Network tab, and view detailed information related to your network connection.
Click the Diagnostics button to run a diagnostic test on your network connection.
Click the Export log button to export the network logs to the target device.
8. Click OK to save your settings.
Code or product integrity
ThinOS enables you to update system packages and install third-party applications on the ThinOS client. All firmware and
application packages that are deployed to ThinOS are Dell-signed packages.
You can download the required packages from www.dell.com/support, and deploy the packages to ThinOS using either Wyse
Management Suite or the local Admin Policy Tool. Each package that is deployed using Wyse Management Suite or Admin Policy
Tool is checked for a valid signature by the ThinOS device. ThinOS discards the package if:
The package does not have a valid signature.
The package has a fake signature.
The package is altered.
Contacting Dell
Prerequisites
NOTE:
If you do not have an active internet connection, you can find contact information on your purchase invoice, packing
slip, bill, or Dell product catalog.
About this task
Dell provides several online and telephone-based support and service options. Availability varies by country and product, and
some services may not be available in your area. To contact Dell sales, technical support, or customer service issues:
Product and subsystem security
15