Product User Guide
Figures
iv
Figure 32: Redirecting a Local Drive...........................................................................................45
Figure 33: Redirecting an ISO Image .........................................................................................45
Figure 34: Remote Console Options Menu................................................................................46
Figure 35: Remote Console Options Menu: Scaling...................................................................47
Figure 36: Remote Console Options Menu: Mouse Handling.....................................................47
Figure 37: Remote Console Options Menu: Cursor....................................................................48
Figure 38: Chat Window .............................................................................................................48
Figure 39: Soft Keyboard............................................................................................................49
Figure 40: Soft Keyboard Mapping .............................................................................................50
Figure 41: Local Keyboard Language Menu...............................................................................50
Figure 42: Remote Console Confirmation Dialog .......................................................................51
Figure 43: Remote Console Options: Encoding Compression ...................................................51
Figure 44: Remote Console Options: Predefined Encoding Compression.................................52
Figure 45: Remote Console Options: Color Depth .....................................................................52
Figure 46: Status Line.................................................................................................................53
Figure 47: Remote Console Menu..............................................................................................54
Figure 48: Remote Power Display ..............................................................................................55
Figure 49: Floppy Disk Image.....................................................................................................56
Figure 50: Drive Redirection .......................................................................................................57
Figure 51: System Information....................................................................................................58
Figure 52: Chassis Control Page................................................................................................59
Figure 53: Sensor Status ............................................................................................................60
Figure 54: System Hardware Event Log .....................................................................................61
Figure 55: Changing Passwords.................................................................................................62
Figure 56: User Management Page............................................................................................63
Figure 57: Permissions Page......................................................................................................64
Figure 58: Remote Console Setting for Users ............................................................................65
Figure 59: User Console Setting, Part 2 .....................................................................................66
Figure 60: Keyboard / Mouse Configuration ...............................................................................68
Figure 61: Network Menu............................................................................................................69
Figure 62: Dynamic DNS Menu ..................................................................................................72
Figure 63: Dynamic DNS Scenario.............................................................................................72
Figure 64: Security Menu............................................................................................................74
Figure 65: Example of IP Access Control ...................................................................................76