Windows-Based Terminal

Windows-Based Terminal
Windows-Based Terminal
User guide
Trademarks
ICA 3 is a registered trademark and MetaFrame is a registered trademark of Citrix Systems Inc.
Microsoft and Windows are registered trademarks of Microsoft Corporation.
All other products are both trademarks and/or registered trademarks of their respective companies.
The Energy Star emblem does not represent endorsement of any product or service.
Detail(s) of the product are subject to change without prior notices.
FCC Statement
This equipment has been tested and found to comply with the limits for either Class A or Class B digital
devices, as a result of Part15 of the Federal Communications Commission (FCC) Rules. These limits are
designed to provide reasonable protection against harmful interference in a residential installation. This
equipment generates, uses, and may possibly radiate radio frequency energy and, if not installed and used
in accordance with the instructions, may cause harmful interference to radio communications. On the
contrary, there is no guarantee that hazardous interference will not occur in a particular/standardized
method of installation. If this equipment does cause harmful interference to radio or television reception,
which can be determined by turning the equipment off and on, the user is encouraged to try to correcting
the interference by one or more of the following measures:
§
Reorient or relocate the receiving antenna.
§
Increase the separation between the equipment and the receiver.
§
Connect the equipment into an outlet on a circuit different from what the receiver is connected to.
§
Consult the dealer or an experienced radio/TV technician for help.
CAUTION
Danger of explosion if battery is incorrectly embedded. Replace only with the same type of battery
recommended by the manufacturer. Dispose used batteries according to the manufacturer’s instructions.
2
CONTENTS
1. License Agreement.................................................................................................................. 7
2. Product Overview ................................................................................................................. 14
3. Introduction of main User Interface...................................................................................... 15
3.1.
Desktop ..................................................................................................................... 15
3.1.1.
Items on Desktop .......................................................................................... 15
3.1.2.
Properties ...................................................................................................... 16
3.2.
Start Menu................................................................................................................. 21
3.2.1.
3.2.2.
3.2.3.
3.2.4.
Administrator/User mode.............................................................................. 22
Programs ....................................................................................................... 24
Connections................................................................................................... 26
Settings.......................................................................................................... 27
3.2.4.1.
3.2.4.2.
3.2.4.3.
Control Panel ................................................................................................ 28
Network and Dial-up Connections................................................................ 29
Taskbar and Start Menu ................................................................................ 51
3.2.5.
Startup ........................................................................................................... 52
3.2.6.
Shutdown ...................................................................................................... 54
3.3.
Taskbar ...................................................................................................................... 54
3.3.1.
Task Manager................................................................................................ 54
3.3.2.
Properties ...................................................................................................... 55
3.3.3.
Network Information .................................................................................... 56

Wireless LAN Card Information....................................................................... 57
3.3.4.
4.
Date/Time Properties .................................................................................... 60
3.3.5.
Software Keyboard Input Panel .................................................................... 61
Connections Management..................................................................................................... 62
4.1.
Creating New Connections ....................................................................................... 63
4.1.1.
Choosing a Connection Protocol .................................................................. 64
4.2.
RDP Connection ....................................................................................................... 64
4.2.1.
General Tab ................................................................................................... 65
4.2.2.
4.2.3.
4.2.4.
Display Tab ................................................................................................... 66
Local Resource Tab....................................................................................... 67
Programs Tab ................................................................................................ 69
4.2.5.
Experience Tab.............................................................................................. 70
4.3.
ICA Connection ........................................................................................................ 72
4.3.1.
Creating a New ICA Connection Entry ........................................................ 72
4.3.2.
Connecting to a Citrix Server ....................................................................... 77
4.3.3.
Changing a Connection Entry....................................................................... 77

To change the properties of a connection entry ................................................ 77
3
4.4.



Specifying an Application to Run after Connecting to a Citrix Server............. 78
Specifying Logon Information.......................................................................... 79
Changing the Window Properties ..................................................................... 80



Setting Connection Entry Options .................................................................... 81
Changing the Title of the Connection Entry ..................................................... 82
Configuring Firewall Settings........................................................................... 83
Microsoft Internet Explorer Connection ................................................................... 84
4.4.1.
To Make a New Microsoft Internet Explorer Connection ............................ 84
5.
4.4.2.
To Start a Microsoft Internet Explorer Connection ...................................... 90
4.5.
TERMTEK Terminal Emulation............................................................................... 91
4.6.
Microsoft VNC Viewer ............................................................................................. 93
Advacned Function for Connections .................................................................................... 96
6.
5.1.
Multiple Auto Start-Up ............................................................................................. 96
5.2.
Multiple Auto Reconnect .......................................................................................... 98
Control Panel ........................................................................................................................ 99
6.1.
6.2.
Keyboard................................................................................................................... 99
Owner........................................................................................................................ 99
6.2.1.
Identification ............................................................................................... 100
6.2.2.
Notes ........................................................................................................... 100
6.2.3.
Network ID ................................................................................................. 100
6.3.
System..................................................................................................................... 101
6.3.1.
General........................................................................................................ 101
6.3.2.
Memory....................................................................................................... 101
6.3.3.
Device Name............................................................................................... 102
6.3.4.
Copyrights................................................................................................... 102
6.3.5.
Network Information .................................................................................. 102
6.4.
Display .................................................................................................................... 103
6.4.1.
Display ........................................................................................................ 103
6.4.2.
Screensaver ................................................................................................. 104
6.4.3.
6.4.4.
Background ................................................................................................. 104
Appearance ................................................................................................. 104
6.5.
6.6.
6.7.
Mouse...................................................................................................................... 105
Sounds..................................................................................................................... 105
Add/Remove Programs........................................................................................... 106
6.7.1.
Add Programs ............................................................................................. 106
6.7.2.
Remove Programs....................................................................................... 107
6.8.
6.9.
Date/Time................................................................................................................ 108
Certificates .............................................................................................................. 108
4
6.10.
System Info ......................................................................................................... 109
6.10.1. General........................................................................................................ 109
6.10.2. Component.................................................................................................. 109
6.11. Citrix ICA Configure ...............................................................................................110
6.11.1. Global ICA Settings .....................................................................................110

Configuring Hotkeys........................................................................................111

Configuring Global Preferences ......................................................................112


Server Location................................................................................................112
Firewall Settings ..............................................................................................113
6.11.2. NFuse Temporary Connection .....................................................................115
6.11.3. ICA Device Setting ......................................................................................115
6.12.
Regional Settings .................................................................................................116
6.12.1. Regional Settings .........................................................................................116

Number ............................................................................................................116



Currency...........................................................................................................117
Time .................................................................................................................117
Date ..................................................................................................................117
6.12.2.
6.12.3.
6.13.
6.14.
6.15.
User Interface Language ..............................................................................118
Input Language ............................................................................................118
Storage Manager ..................................................................................................118
USB Manager.......................................................................................................119
FTP Update ..........................................................................................................119
6.15.1. Update ......................................................................................................... 120
6.15.2. Back-up ....................................................................................................... 120
6.16.
Ping ..................................................................................................................... 121
6.17.
Thin Printer ......................................................................................................... 122
6.18.
Input Panel .......................................................................................................... 123
6.19.
LPD ..................................................................................................................... 123
6.19.1. Setup for LPD ............................................................................................. 124
6.19.2.
6.19.3.
Add a remote printer ................................................................................... 126
LPD Printing ............................................................................................... 130
6.20.
RM Agent Configuration .................................................................................... 130
6.20.1. RM Agent Configure................................................................................... 131
6.20.2. Authentication............................................................................................. 131
6.21.
Touch Panel Settings........................................................................................... 133
6.22.
Win VNC Server ................................................................................................. 134
6.23.
6.24.
Terminal Service Client License ......................................................................... 134
Printer.................................................................................................................. 135
5
6.24.1.
Select the Printer Port ................................................................................. 136
6.24.2. Select the Printer Model.............................................................................. 137
6.24.3. User Defined ............................................................................................... 140
6.24.4. Finish the Setup Wizard .............................................................................. 143
6.25.
Wireless............................................................................................................... 144
7.
8.
User Security Control ......................................................................................................... 145
7.1.
Administrator Mode and User Mode ...................................................................... 145
7.2.
User Security Control tool ...................................................................................... 148
7.2.1.
User Security Option................................................................................... 148
7.2.2.
User Security Password .............................................................................. 150
7.2.3.
User Mode Control ..................................................................................... 151
WBT Mode ......................................................................................................................... 152
8.1.
Thin Client Setup Wizard........................................................................................ 152
8.1.1.
Welcome...................................................................................................... 152
8.1.2.
Network Configuration ............................................................................... 152
8.1.3.
Control Panel .............................................................................................. 153
8.1.4.
Finish........................................................................................................... 153
8.2.
Remote Desktop Connection .................................................................................. 154
8.2.1.
Connections................................................................................................. 154
8.2.2.
Configure .................................................................................................... 155
8.3.
Thin Client Property Sheets .................................................................................... 155
6
1. License Agreement
ONE SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE USING
THIS EQUIPMENT. THIS EQUIPEMENT CONTAINS SOFTWARE IN A NON-VOLATILE FORMAT AND
CERTAIN OTHER INTELLECTUAL PROPERTY (HEREAFTER “FIRMWARE”). BY USING THIS
EQUIPMENT YOU AGREE AND IS BINDED TO THE FOLLOWING TERMS.
Grant
One may use the Firmware in or in conjunction with the Equipment as provide. One may transfer
ownership of the Equipment, including but not limited to the right to use the Firmware to another party so
long as that party agrees to accept these terms and conditions.
ONE MAY NOT USE, COPY, MODIFY, TRANSLATE OR TRANSFER THE FIRMWARE, OR
MODIFICATION THEREOF, IN WHOLE OR IN PART, EXCEPT AS EXPRESSLY PROVIDED FOR IN
THIS LICENSE. YOU MAY NOT DECOMPILE, REVERSE ENGINEER AND/OR OTHERWISE DECODE
OR ALTER THE SOFTWARE CONTAINED IN THE FIRMWARE.
Limited Software Warranty and Disclaimer
The company warrants the product for a period of ninety (90) days from the date of shipment, the Firmware
will, under normal use, be free from defects in materials and workmanship in the Erasable Programmable
Read Only Memory (EPROM), or similar storage device. The foregoing warranty shall not apply to any
Firmware that has been used in violation of this Agreement. During this limited warranty period the
company will provide support by phone to the best of our efforts. We may, in addition to the above, replace
any defective Firmware with a functionally equivalent product. The foregoing shall be your exclusive
remedy for any breach of warranty hereunder. You assume responsibility for choosing the Equipment
containing the Firmware to acquire your intended results, and for the installation, use and results obtained
from the Equipment and Firmware.
OTHER THAN WHAT THE STATEMENT ABOVE EXPRESSES LIMITED WARRANTIES, WE MAKE
AND YOU RECEIVE NO WARRANTIES ON THE FIRMWARE, EXPRESS, IMPLIED, OR STATUTORY,
OR IN ANY OTHER PROVISION OF THIS AGREEMENT OR COMMUNICATION WITH YOU, AND WE
DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND
FITNESS FOR ANY PARTICULAR PURPOSE. WE DO NOT WARRANT THAT THE FUNCTIONS
CONTAINED IN THE PRODUCT WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION
WILL BE UNINTERRUPTED OR ERROR FREE.
SOME STATES DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS.
CONSEQUENTLY, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. THIS WARRANTY GIVES
YOU YOUR SPECIFIC LEGAL RIGHTS BUT YOU MAY ALSO HAVE OTHER RIGHTS VARYING IN
ACCORDANCE TO THE STATE IN WHICH YOU LIVE IN.
7
Limit of Liability
UNDER NO CIRCUMSTANCES SHALL THE COMPANY BE LIABLE FOR THE LOSS OF DATA, COST
OF COVER, OR ANY OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES. THESE LIMITATIONS
WILL APPLY EVEN IF WE OR OUR RESELLERS HAVE BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY
LIMITED REMEDY PROVIDED HEREIN.
YOU AGREE THAT THESE ARE THE ONLY APPLICABLE TERMS OF AGREEMENT BETWEEN US
COVERING FIRMWARE AND THAT THEY SUPERSEDE ANY OTHER COMMUNICATIONS (ORAL OR
WRITTEN) BETWEEN US RELATING TO THE FIRMWARE.
U.S. Government Restricted Rights
The Firmware is provided with RESTRICTED RIGHTS. Use, duplication or disclosure by the Government
is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technological Data and
computer software clause at DFARS 252.227-7013 or in subparagraphs (c)(1) and (2) of the Commercial
Computer Software-Restricted Rights at 8 C.F.R. 52-227-19 as applicable.
8
EULA for Microsoft® Windows® CE Operating System for
Windows-based Terminal Devices Version 1.5
IMPORTANT—READ CAREFULLY
This End User License Agreement (EULA) is a legal agreement between you (either an individual or a single entity) and the
manufacturer (MANUFACTURER) of the special purpose computing device (SYSTEM) you acquired which includes certain
Microsoft software product(s) installed on the SYSTEM and/or included in the SYSTEM package (SOFTWARE). The
SOFTWARE includes computer software, the associated media, any printed materials, and any online or electronic
documentation. By installing, copying or otherwise using the SOFTWARE, you agree to be bound by the terms of this EULA.
If you do not agree to the terms of this EULA, MANUFACTURER and Microsoft Licensing, Inc. (MS) are unwilling to license
the SOFTWARE to you. In such event, you may not use or copy the SOFTWARE, and you should promptly contact
MANUFACTURER for instructions on return of the unused product(s) for a refund.
Software License
This SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and
treaties. This SOFTWARE is licensed, not sold
1.
Grant of License
SOFTWARE includes software already installed on the SYSTEM (SYSTEM SOFTWARE) and, if included in the SYSTEM package,
software contained on the CD-ROM disk and/or floppy disk(s) labeled "Desktop Software for Microsoft Windows CE" (DESKTOP
SOFTWARE). This EULA grants you the following rights to the SOFTWARE:
SYSTEM SOFTWARE
You may use the SYSTEM SOFTWARE only as installed in the SYSTEM.
DESKTOP SOFTWARE
DESKTOP SOFTWARE might not be included with your SYSTEM. If DESKTOP SOFTWARE is included with your SYSTEM, you
may install and use the component(s) of the DESKTOP SOFTWARE in accordance with the terms of the end user license agreement
provided with such component(s). In the absence of a separate end user license agreement for particular component(s) of the
DESKTOP SOFTWARE, you may install and use only one (1) copy of such component(s) on a single computer with which you use
the SYSTEM.
Server, Use of Windows CE Operating System for Windows-Based Terminal Devices with Microsoft Windows NT Server,
Terminal Server Edition
If the SOFTWARE is Windows CE operating system for Windows-Based Terminal devices, the following special provisions apply. In
order to use the SYSTEM in connection with Windows NT Terminal Server Edition, you must possess (1) a Client Access License for
Windows NT Server, Terminal Server Edition and (2) an end user license for Windows NT Workstation or an end user license
agreement for Windows NT Workstation for Windows-Based Terminal Devices (please refer to the end user license agreement for
Windows NT Server, Terminal Server Edition for additional information). MANUFACTURER may have included a Certificate of
9
Authenticity for Windows NT Workstation for Windows-Based Terminal Devices with the SYSTEM. In that case, this EULA constitutes
an end user license for the version of Windows NT Workstation for Windows-Based Terminal Devices indicated on such Certificate of
Authenticity.
Back-up Copy
If MANUFACTURER has not included a back-up copy of the SYSTEM SOFTWARE with the SYSTEM, you may make a single
back-up copy of the SYSTEM SOFTWARE. You may use the back-up copy solely for archival purposes.
2.
Description of Other Rights and Limitations
Speech/Handwriting Recognition
If the SYSTEM SOFTWARE includes speech and/or handwriting recognition component(s), you should understand that speech and
handwriting recognition are inherently statistical processes; that recognition errors are inherent in the processes; that it is your
responsibility to provide for handling such errors and to monitor the recognition processes and correct any errors. Neither
MANUFACTURER nor its suppliers shall be liable for any damages arising out of errors in the speech and handwriting recognition
processes.
Limitations on Reverse Engineering, Decompilation and Disassembly
You may not reverse engineer, de-compile, or disassemble the SYSTEM SOFTWARE, except and only to the extent that such activity
is expressly permitted by applicable law notwithstanding this limitation.
Single SYSTEM
The SYSTEM SOFTWARE is licensed with the SYSTEM as a single integrated product. The SYSTEM SOFTWARE installed in Read
Only Memory (ROM) of the SYSTEM may only be used as part of the SYSTEM.
Single EULA
The package for the SYSTEM SOFTWARE may contain multiple versions of this EULA, such as multiple translations and/or multiple
media versions (e.g., in the user documentation and in the software). Even if you receive multiple versions of the EULA, you are
licensed to use only one (1) copy of the SYSTEM SOFTWARE.
Rental
You may not rent or lease the SOFTWARE.
Software Transfer
You may permanently transfer all of your rights under this EULA only as part of a sale or transfer of the SYSTEM, provided you retain
no copies, you transfer all of the SOFTWARE (including all component parts, the media, any upgrades or backup copies, this EULA
and, if applicable, the Certificate(s) of Authenticity), and the recipient agrees to the terms of this EULA. If the SOFTWARE is an
upgrade, any transfer must include all prior versions of the SOFTWARE.
Termination
Without prejudice to any other rights, MANUFACTURER or MS may terminate this EULA if you fail to comply with the terms and
conditions of this EULA. In such event, you must destroy all copies of the SOFTWARE and all of its component parts.
10
3.
Upgrades
If the SYSTEM SOFTWARE and this EULA are provided separate from the SYSTEM by MANUFACTURER and the SYSTEM
SOFTWARE is on a ROM chip, CD ROM disk(s) or floppy disk(s), and labeled "For ROM Upgrade Purposes Only" ("ROM Upgrade"),
you may install one copy of the ROM Upgrade onto the SYSTEM as a replacement copy for the SYSTEM SOFTWARE originally
installed on the SYSTEM and use it in accordance with Section 1 of this EULA.
4.
Copyright
All title and copyrights in and to the SOFTWARE (including but not limited to any images, photographs, animations, video, audio,
music, text and "applets," incorporated into the SOFTWARE), the accompanying printed materials, and any copy of the SOFTWARE,
are owned by MS or its suppliers (including Microsoft Corporation). You may not copy the printed materials accompanying the
SOFTWARE. All rights not specifically granted under this EULA are reserved by MS and its suppliers (including Microsoft
Corporation).
5.
Product Support
Product support for the SOFTWARE is not provided by MS, its parent corporation, Microsoft Corporation, or their affiliates or
subsidiaries. For product support, please refer to MANUFACTURER’s support number provided in the documentation for the
SYSTEM. Should you have any questions concerning this EULA, or if you desire to contact MANUFACTURER for any other reason,
please refer to the address provided in the documentation for the SYSTEM.
6.
Export Restrictions
You agree that you will not export or re-export the SOFTWARE to any country, person, or entity subject to U.S. export restrictions.
You specifically agree not to export or re-export the SOFTWARE: (i) to any country to which the U.S. has embargoed or restricted the
export of goods or services, which as of March 1998 include, but are not necessarily limited to Cuba, Iran, Iraq, Libya, North Korea,
Sudan and Syria, or to any national of any such country, wherever located, who intends to transmit or transport the products back to
such country; (ii) to any person or entity who you know or have reason to know will utilize the SOFTWARE or portion thereof in the
design, development or production of nuclear, chemical or biological weapons; or (iii) to any person or entity who has been prohibited
from participating in U.S. export transactions by any federal agency of the U.S. government.
If the SOFTWARE is labeled "North America Only Version" above, on the Product Identification Card, or on the SOFTWARE
packaging or other written materials, then the following applies: The SOFTWARE is intended for distribution only in the United States,
its territories and possessions (including Puerto Rico, Guam, and U.S. Virgin Islands) and Canada. Export of the SOFTWARE from
the United States is regulated under "EI controls" of the Export Administration Regulations (EAR, 15 CFR 730-744) of the U.S.
Commerce Department, Bureau of Export Administration (BXA). A license is required to export the SOFTWARE outside the United
States or Canada. You agree that you will not directly or indirectly, export or re-export the SOFTWARE (or portions thereof) to any
country, other than Canada, or to any person or entity subject to U.S. export restrictions without first obtaining a Commerce
Department export license. You warrant and represent that neither the BXA nor any other U.S. federal agency has suspended,
revoked or denied your export privileges.
7.
Note on Java Support
11
The SYSTEM SOFTWARE may contain support for programs written in Java. Java technology is not fault tolerant and is not
designed, manufactured, or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe
performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life
support machines, or weapons systems, in which the failure of Java technology could lead directly to death, personal injury, or severe
physical or environmental damage.
8.
Limited Warranty
Limited Warranty
MANUFACTURER warrants that the SOFTWARE will perform substantially in accordance with the accompanying written materials
for a period of ninety (90) days from the date of receipt. Any implied warranties on the SOFTWARE are limited to ninety (90) days.
Some states/jurisdictions do not allow limitations on duration of an implied warranty, so the above limitation may not apply to you.
Customer Remedies
MANUFACTURER’S and its suppliers’ entire liability and your exclusive remedy shall be, at MANUFACTURER’S option, either (a)
return of the price paid, or (b) repair or replacement of the SOFTWARE that does not meet the above Limited Warranty and which is
returned to MANUFACTURER with a copy of your receipt. This Limited Warranty is void if failure of the SOFTWARE has resulted
from accident, abuse, or misapplication. Any replacement SOFTWARE will be warranted for the remainder of the original warranty
period or thirty (30) days, whichever is longer.
No Other Warranties
EXCEPT AS EXPRESSLY PROVIDED IN THE LIMITED WARRANTY SECTION ABOVE, THE SOFTWARE IS PROVIDED TO THE
END USER "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, WARRANTIES OF NON- INFRINGEMENT, MERCHANTABILITY, AND/OR FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK OF THE QUALITY AND THE PERFORMANCEOF THE SOFTWARE IS WITH YOU.
PERFORMANCE OF THE SOFTWARE IS WITH YOU.
No Liability for Consequential Damages
MANUFACTURER OR MANUFACTURER’S SUPPLIERS, INCLUDING MS AND ITS SUPPLIERS, SHALL NOT BE HELD TO
ANY LIABILITY FOR ANY DAMAGES SUFFERED OR INCURRED BY THE END USER (INCLUDING, BUT NOT LIMITED TO,
GENERAL, SPECIAL, CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING DAMAGES FOR LOSS OF BUSINESS
PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION AND THE LIKE), ARISING FROM OR IN
CONNECTION WITH THE DELIVERY, USE OR PERFORMANCE OF THE SOFTWARE.
If you acquired this EULA in the United States, this EULA is governed by the laws of the State of Washington.
If you acquired this EULA in Canada, this EULA is governed by the laws of the Province of Ontario, Canada. Each of the parties
hereto irrevocably attorns to the jurisdiction of the courts of the Province of Ontario and further agrees to commence any litigation
which may arise hereunder in the courts located in the Judicial District of York, Province of Ontario.
If this EULA was acquired outside the United States, then local law may apply.
Should you have any questions concerning this EULA, please contact the MANUFACTURER of your SYSTEM.
12
U.S. GOVERNMENT RESTRICTED RIGHTS
The SOFTWARE and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software—Restricted Rights at 48 CFR 52.227- 19, as
applicable. MANUFACTURER is Microsoft Corporation/One Microsoft Way/Redmond, WA 98052-6399
13
2. Product Overview
Windows Embedded CE is a componentized, real-time operating system for a wide range of small footprint
devices.
Before using CE6.0…
1. Get the device and Boot loader ready
2. The differences between CE5.0and CE6.0
More device drivers now are supported by CE6.0
More complete and friendly user interfaces are being supported in CE6.0
a. Hot Key supported. The CE6.0 adds more Hot Keys supported than CE5.0 i.e. ALT + F12 (user
mode switching), ALT+F2 (Control Panel), ALT+S (Shutdown)…etc.
b. Background & Appearance change. User can now change the background from files, or set
another kind of appearance depending on the need(s).
c.
USB storage Data Editor. CE6.0 supports USB Storage device read/write function in Start Menu \
Programs \ My USB Storage Device.
d. USB Manager. USB Manager provides the user to set the USB storage device read/write access
control.
e. System Info. System Info v1.0 adds a new page called Component that lists the version of each
component, And the General page adds an item display the firmware name.
User Access and Security Control
a. Administrator/User Mode switch. The function supports the user mode switching to provide two
modes for user to set. There are security controlled and access controlled mode.
b. User Security Control. User Security Control is an important new function as it provides the
system manager to Set the access control of this thin client for user mode or administrator mode,
It makes the thin client more complete and safe in personal security.
Add/Remove Component
a. Add/Remove is a new function; it supports the user to install the application or driver one wants
to use, User can also uninstall them by using the application.
Image Update/Back-up
a. The CE5.0 OS could be upgraded to CE6.0 by using FTP Update.
b. The CE6.0 has only been installed to TK-3550, TK-3750, TK-3770 and TK-5770.
14
3. Introduction of main User Interface
3.1. Desktop
Boot the device
When you push the power button to start the thin client, the device is started with BIOS first; the boot
logo will be shown. When bios initial is completed, it will then set entry CE desktop mode. CE6.0 is based
on XP-like Desktop mode, and adds our special functional items on it to help the user use more
efficiently.
Figure 1 Desktop
3.1.1. Items on Desktop
Left-Click on the Desktop will show the menu of Desktop Configuration.
Arrange Icons By
User can select the arrangement mode of shortcuts; Name/Size/Date/Auto Arrange can arrange the
shortcuts.
Refresh
Refresh arrangement of shortcut on Desktop.
15
Properties
User can open the Display Configuration page, and can set the display settings.
Add Connections
User can open the Add Connections page; can add the connections on desktop.
3.1.2. Properties
Alternative Display Settings
The monitor supports several kinds of resolutions. If you want to test the resolution, choose the desired
resolution from the list box and click Test. And you can set the display from VGA or DVI, (Note: Only
TK-3770 has supported VGA/DVI mode)
Figure 2 Desktop Area and Refresh Frequency
16
Figure 3 If the screen image tests OK, the monitor will support the selected resolution.
Figure 4 The system will notify user “did you see the test image properly”.
17
Figure 5 The Device will reboot itself to make the display settings changed actively.
Screensaver
Check the “Enable Screen Saver” box and you can configure your desired way to enable the screen saver
for this WBT. There are three options to choose: Screen Saver, Turn Off Monitor and Turn Off WBT. You
can leave this WBT to activate the function automatically according to the time you set. Or you can check
the “Enable Ctrl + Alt + L Turn ON/OFF screen saver” box to manually activate/deactivate any one of the
left three energy savers you check by pressing the hot-keys: “Ctrl+Alt+L”. There is one hidden option of
“Enable Property Password” to gain more security protection. To have this option available to you, you
have to click “Control Panel” tab then double click on Security tab. User can set On Resume, Password
Protect to obtain more security.
18
Figure 6 On Resume, Password Protect
Figure 7 Password Protect
19
Background
Background allows user to change the background with graphic files. User can also set the background to
Tile image on background.
Figure 8 Background
Appearance
User can set the appearance by changing Scheme.
20
Figure 9 Appearance
3.2. Start Menu
Start Menu is a set of all functions; it supports the user to set the client. It has included these main items:
Administrator/User mode, Programs, Connections, Settings, Start Up, User Switched And
Shutdown.
21
Figure 10 Start Menu
3.2.1. Administrator/User mode
It is shown according to which user access mode you set. User can press User Switches or ALT+F12 to
switch between two modes.
Entry of a set of password is necessary to switch from user to Administrator. The default password of the
system is 0000. Please take note that password is unnecessary when switching from Administrator mode
to user mode.
22
Figure 11 Switch to User Mode
Figure 12 Switch to Administrator Mode
23
3.2.2. Programs
The system provides the user to use the application embedded such as Media Player/Internet
Explorer/My Storage Device. It also provides the user to use the application installed by Add/Remove.
Figure 13 Programs
Microsoft Internet Explorer
This application allows user to connect to the Internet directly via embedded Internet Explorer. Refer to
section 4.7 for the Internet applications.
Microsoft Media Player
This application allows user to play media files and set options for your WBT. Refer to section 4.8 for Media
Player.
(1) Windows Media Buffering: select the buffer time ranging from 1seconds <-> 5 seconds
(2) Volume: You can adjust as well as muting the volume when playing the media
(3) Playback: Select Play Once when you want to play the media once. Select Repeat Forever
when you want the media to replay repeatedly.
(4) ZOOM: If the Enable Full Screen option is enable .You can see the media being played in full
screen mode. You can also select various window sizes when the media begins to play. Press
ALT + ENTER or ESC to switch between full mode and general mode.
24
(5) Play Default Media Files: You may select upcoming files to play. The Play lists means the
recent media which be played. The Favorites option displays the media files that you added to
my favorites. If you want to type a media file name and path by yourself, you can select Edit
Define.
Figure 14 Media Player
To start this application simply double clicks on it. If your settings are correctly set up, then things should
run smoothly.
My Storage Device
User can edit the USB storage device installed with this tool.
25
Figure 15 My Storage Device
3.2.3. Connections
User can open the Add Connections page by clicking Add Connections.
26
Figure 16 Add Connections
Added connections will be listed on this item and the desktop.
Figure 17 Connections
3.2.4. Settings
It provides user to set the terminal properties by Control Panel, Network and Dial-up Connections and
Taskbar and Start Menu.
27
Figure 18 Settings
3.2.4.1. Control Panel
The Control Panel properties sheet allows you configure your terminal’s function. User can set it to
display by Expand mode or a new window.
28
Figure 19 Control Panel
3.2.4.2. Network and Dial-up Connections
Network Configuration
The Network and Dial-up Connections properties sheet allows you to set up a method for SNMP upgrades.
Invoke this properties sheet by clicking on the Network and Dial-up Connections tab in the Settings menu.
The following figure shows the Network and Dial-up Connections properties sheet. If you have a DHCP
server (Dynamic Host Configuration Protocol), then click on Obtain an IP address from a DHCP server to
automatically obtain an IP address. Or you may specify an IP address by yourself. You can also type a
Name for the Terminal.
Network attached device must contain a unique network identifier. If the network is using TCP/IP as a
communication protocol, these identifiers are called IP addresses. The following series of screens will
allow you to choose between two different methods of assigning the IP addresses.
Use the IP information supplied by DHCP
If your network provides DHCP service and would want it to provide the terminals’ IP information, leave the
first option selected. The terminal can get its IP address through a DHCP service by default. The DHCP will
automatically assign an IP address that is drawn from a pool of available IP addresses, when a terminal
unit is powered on and a request is broadcast over the network.
29
Figure 20 Obtain an IP address via DHCP
Note: If your network does not provide a DHCP service but you get the screen shown above, make sure
the terminal unit is properly connected to the network, and then restart it by turning the power off and then
on.
Specify a static IP address
If the method you selected on the prior screen was to enter a static IP address, the below screen will
appear. You will be required to enter the following information onto the screen.
IP address
Required for identifying this unit to the network. The format will follow the standard addressing format.
Subnet Mask Required for designating which network the IP address is a part of.
Gateway
Optional address which identifies the machine through which a subnet communicates with another
network.
30
Figure 21 Specify an IP Address
Enable/Disable Name Resolution Services
The screen shown below will appear only if you choose the Static IP Addressing method. The DHCP
method will provide this information when using a name resolution service.
Terminal servers typically support both DNS (Domain Naming Service) and WINS (Windows Internet
Naming Service) name resolution services. This screen allows the terminal unit to use one or both of these
resolution services. To enable DNS, WINS, or both, check the corresponding box. In the text boxes, enter
the following information as appropriate for DNS, WINS, or both, check the corresponding box. In the text
boxes, enter the following information as appropriate for each. Click Next.
31
Figure 22
Make a new type connection
Choose the connection type by clicking on the radio button. It will decide which connection you want to
connect with a server. Three options are available here:
1.
Choose Dial-Up Connection radio button if you desire to connect with the server through the
modem
2.
select Direct Connection radio button to connect with the server through serial port RS 232
3.
select Virtual Private Network (PPTP or L2TP) radio button to build a VPN connection.
Here we choose “Dial-Up Connection”; Or select PPP over Ethernet to build a PPPoE connection, then
click on Next.
32
Figure 23 Make New Connection
Make New Dial-Up Connection
The Make New Dial-Up Connection dialog should now appear. Select the serial connection for the current
COM port being used for the connection. Then click on Configure…
33
Figure 24
Device Properties
Port Setting
The Device Properties dialog should now display. Select the Port Settings tab and set the connection
preferences (Baud Rate, Data Bits, Parity, Stop Bits, Flow Control) to match the host.
Figure 25
Call Options
Select the Call Options tab. Select “Wait for dial tone before dialing” and deselect the rest of the options.
Click “OK” when finished.
34
Figure 26
TCP/IP Settings
From the Make New Dial-Up Connection dialog click on the TCP/IP Settings button. In the TCP/IP Settings
dialog select the General tab. Check the Use server assigned IP address, Use software compression and
Use IP header compression.
35
Figure 27
Name Servers
Now select the Name Servers tab. Select Use server assigned addresses. When finished, click OK. Set
Primary and Second DNS, Primary and Second WINS if you decline to use Server-assigned address.
36
Figure 28
Auto Connect when WBT starts
If it is enabled, the connection will connect automatically when booting.
37
Figure 29
Security SettingFrom the Make New Dial-Up Connection dialog click on the Security Settings button.
Use the Security properties sheet to access security features if desired.
Figure 30
Country, Area code and Telephone
Below the Country, Area code and Telephone number must be inputted correctly in the blank area for
Dial-Up Connection. Click “Finish” to end this dialog.
Dial-Up Connection
38
Figure 31
To start PPP Dial-Up Connection
In Connection Manager dialog box click Connections tag and select the RAS connection you would like to
connect to. The following figures will appear. You will have to enter the User Name, Password and Domain
to log onto the connection.
39
Figure 32
In this dialog you can click on “Dial Properties…” to configure the Dialing Properties shown as below:
Figure 33
40
You can click on “New…” to add a new location that you would like to dial from. The figure shows as below.
To delete the newly added location, simply click on “Remove”.
Figure 34
The “Dialing Patterns…” dialog allows you configure the settings shown as below.
41
Figure 35
Once everything is correctly set up, click on Connect on Dial-up Connection dialog. The target and host
should now be connected. You should see connection icons in the status bars of your host and target.
Once the PPP Dial-Up is connected successfully, press the Hot-keys “Ctrl +Alt + End “ to return to the
“Terminal Connection Manager ” then double click on RDP or ICA for connection.
Direct Connection
Make a New Direct Connection
In the Make New Connection dialog select Direct Connection radio button. Then click on “Next”.
Direct Connection
42
Figure 36
The Make New Direct Connection dialog should now appear. Select the serial connection for the current
COM port being used for the connection. Then click on “Configure” and click on “TCP /IP Setting” .The
setting of “Configure” and “TCP/IP Setting” are the same as stated in the Make New Dial-Up Connection
above.
43
Figure 37
Click on “Finish” once the “Configure”, “TCP /IP Settings” and “Security Settings” have been completed.
You will now be sent back to the Configure entry of Terminal Connection Manager.
To Start Direct Connection
In Connection Manager dialog box, click Connections tag and select the RAS connection you would like to
connect to. Take a look at the figure shown below.
44
Figure 38
The target and host should now be connected. You should see connection icons in the status bars of your
host and target. Once the Direct Connection is connected successfully, press the Hot-keys “Ctrl +Alt +
End” to return to the “Terminal Connection Manager” and double click on RDP or ICA for connection.
Virtual Private Network Connection
Make a New Virtual Private Network Connection
In the Make New Connection dialog select “Virtual Private Network
click on “Next”.
45
(PPTP / L2TP)” radio button. Then
Figure 39 (PPTP)
Figure 40 (L2TP)
46
The Make New Virtual Private Network Connection dialog should now appear. Type in the Host name or IP
address you wish to connect to. Then click on “TCP /IP Setting” .The TCP/IP Setting is the same as stated
in the Make New Dial-Up Connection above. Upon completion, click on “Finish” to go back to the Configure
entry of Terminal Connection Manager.
.
Figure 41
To start Virtual Private Network Connection
In Connections entry of Terminal Connection Manager select the RAS connection you would like to
connect to. The target and host should now be connected. You should see the connection icons in the
status bars of your host and target. Once the Virtual Private Network Connection is connected successfully,
press the Hot-keys “Ctrl +Alt + End “ to return to the “Terminal Connection Manager” and double click on
RDP or ICA for connection.
47
Figure 42
PPP over Ethernet Connection (PPPoE)
Make a PPP over Ethernet Connection
In the Make New Connection dialog select “PPP over Ethernet Connection” radio button. Then click on
“Next”.
48
Figure 43
The Make New PPP over Ethernet Connection dialog should now appear. Type in the Host name or IP
address you wish to connect to. Then click on “TCP /IP Setting” .The TCP/IP Setting is the same as stated
in the Make New Dial-Up Connection above. Upon completion, click on “Finish” to return to the Configure
entry of Terminal Connection Manager.
49
Figure 44
To start a PPP over Ethernet Connection
In Connections entry of Terminal Connection Manager select the RAS connection you would like to
connect to. The target and host should now be connected. You should see connection icons in the status
bars of your host and target. Once the PPP over Ethernet Connection is connected successfully, press the
Hot-keys “Ctrl +Alt + End“ to return to the “Terminal Connection Manager” then double click on RDP or ICA
for connection.
50
Figure 45
3.2.4.3. Taskbar and Start Menu
User can select and set properties.
Always on Top
Set the Taskbar on Top.
Auto hide
Set the Taskbar on hidden mode.
Show Clock
Show the clock on Taskbar or not.
Expand Control Panel
Expand Control Panel can set the items of Control Panel listed on Start Menu.
51
Figure 46
3.2.5. Startup
Startup item provides the user to add the connections that are added by Add Connections or Network
and Dial-up connections to auto run when the WBT boots.
52
Figure 47 Auto Startup Manager
The connections are set to auto start, will be added to this dialog list and menu list.
Figure 48 Auto Startup
53
3.2.6. Shutdown
Press Alt + S or select the item Shutdown will show this dialog. User can select Reboot to re-start the
terminal or select Shutdown to turn the system off.
Figure 49 Shutdown
3.3. Taskbar
User can right click on the mouse on Task Bar and select the properties to set.
3.3.1. Task Manager
Task Manager is a utility, which provides a quick overview of what applications is currently executing. User
can right click on the mouse on Task Bar to select the Task manager option.
54
Figure 50
3.3.2. Properties
User can right click on the mouse on Task Bar to select the Properties and open Taskbar and Start Menu
Properties.
55
Figure 51
3.3.3. Network Information
User can right Double-click on the mouse on Task Bar to select the Network device to open Network
dialog.
56
Figure 52
Wireless LAN Card Information
User can see this dialog box displayed when insert a wireless LAN card, and it will list the AP that has been
detect.
57
Figure 53
Double-Click the AP user want to connect; user can enter the WEP (Wireless network key) to pass the
authentication, And user also can set the EAP type here.
58
Figure 54
If user connects the AP normally, the connecting AP has been active.
Figure 55
And then user can see the IP info in IP Information or Renew an IP if using a DHCP.
59
Figure 56
3.3.4. Date/Time Properties
User can right Double-click on the mouse on Task Bar to select the Clock to open Date/Time Properties
dialog.
60
Figure 57
3.3.5. Software Keyboard Input Panel
User can right click the mouse on Task Bar to select the Software keyboard to show input panel dialog.
User can select normal/Large keyboard to use, or even hide it by using this dialog.
Figure 58
61
4. Connections Management
Connections are designed to help user manage your terminal's protocol connections. The dialog box
displays after the user select the item Add Connection on Start Menu, or left-click on desktop and select
the item Add Connection (Alt + A).
Figure 59 Open the dialog by Start Menu
62
Figure 60 Open the dialog by left-clicking the desktop
4.1. Creating New Connections
The New Connection dialog box is used to create new network connections. This dialog box is invoked by:
Clicking on the Configure tab in the Terminal Connection Manager dialog box. Clicking on Add
command button on the Configure properties sheet. The following figure shows the New Connection
dialog box.
63
Figure 61 New Connection Dialog Box
4.1.1. Choosing a Connection Protocol
Use the scroll list shown in the dialog box above to select the type of connection protocol you desire. When
you choose from the list above, you are deciding which connection protocol you would want to use to
connect to a server. Five options are available:
Microsoft Remote Desktop Client
RDP (Remote Desktop Protocol) protocol, through which connects to a WBT (Windows-Based
Terminal) server. Refer to section 4.4 for RDP Connections.
Citrix ICA Client
ICA (Independent Computing Architecture) protocol, through which connects to an ICA
(Winframe/Metaframe) server. Refer to section 4.5 for ICA Connections.
Microsoft Internet Explorer
Connects to the Internet directly via embedded Internet Explorer. This function doesn’t appear in all
WBTs. Please make sure your WBT contains embedded IE and has at least 64MB RAM. Refer to
section 4.7 for the Internet applications.
Terminal Emulation/ IBM Terminal Emulation
Connects to multiple terminal or IBM-related emulation applications.
VNC viewer
Connects to the device which VNC server is enabled.
4.2. RDP Connection
To create a new RDP connection, use the Add Connection dialog. Enter the Name for the new
connection and input the IP Address or DNS Name to connect to the server. Click on the Save command
button to finish. The new connection will be added to the Connections list in Start Menu. Click on the “X”
icon on the top right of this dialog box or Cancel to quit the setting at any time.
64
Figure 62 Add new RDP connection dialog
Figure 63 Click on the Options command button to go to the Options dialog box.
4.2.1. General Tab
Change the Name and IP Address or DNS Name for the connection. If you want to logon automatically,
enable Automatic Logon and input the Username, Password and Domain.
65
Figure 64
4.2.2. Display Tab
Change the Colors and Remote Desktop Size for RDP connection. If default the connection bar is
enabled, the connection bar will be showed on the Windows desktop. If it is disable. The connection bar
will be hided.
66
Figure 65
4.2.3. Local Resource Tab
Functions shown in local device.
Figure 66
Remote Computer sound
Choosing “Bring to this computer”. Could bring the sounds from the server to the client device.
67
Figure 67
Keyboard
Apply windows key combinations-user will allow the system hot key to activate on client or server.
Figure 68
Local devices
68
User can enable these options before connecting to server, if the devices are installed ready, User can use
them on server.
Figure 69
4.2.4. Programs Tab
Click on Desktop if you want the Windows NT desktop to display by default while connecting. Or click on
Application file name and type its name when you want to start this application while connecting. The
user can also specify a working directory when specify an application.
69
Figure 70
4.2.5. Experience Tab
The Experience properties sheet lets you configure the connection speed.
Figure 71
After finishing the setup, you can see the new connection shortcut shown on desktop and Start Menu.
70
Figure 72
Left-click the shortcut then click on Edit Connection if you want to edit the RDP. The screen will go back to
Select the Connection Name as shown on page 46, then follow the setup procedures again after selecting
the connection.
71
Figure 73
4.3. ICA Connection
Use this application to create a Citrix ICA connection. Choose the Network Connection or Dial-In
Connection for the remote application.
4.3.1. Creating a New ICA Connection Entry
You can configure and run two types of ICA sessions: Citrix server connections and published applications.
1.
Citrix server connections allow you to remotely control a session on a Citrix server from your WBT.
Citrix server connections allow you to access the desktop of a specific Citrix server; you can run any
applications available on the desktop in any particular order.
2.
Published applications are specific applications set up by an administrator for remote users to run.
When connected, you are presented with the application itself.
Note: This procedure describes the simplest way to create a connection entry. When you follow these
steps, you set the essential items you need in order to connect to a Citrix server from your WBT. See
“Changing a Connection Entry” for more information about how to change the other properties for a
connection entry.
1.
To create a new connection entry
In the New Connection dialog box, click the list box and select Citrix ICA Client. Click OK. The Specify
Connection Type dialog box should now appear: Make sure your WBT is connected to the network
through the on-board RJ-45 connector or by a serial PPP connection to a Windows 95 or Windows NT
RAS server. Click on Next to continue. Skip to section 4.5.1.2.
72
Figure 74
Note: The ICA Windows-based Terminal does not support modem callback. When using modem callback,
the server hangs up on dial-in connections at logon and then dials a specified number to reconnect to the
user attempting to log on. Because Windows-based Terminal contains no mechanism to answer the return
call, the ICA Windows-based Terminal does not support modem callback for dial-in connections.
2.
The Select a Server or Published Application dialog appears:
Figure 75
3.
Click Server to connect to a server or Published Application to connect to a published application.
Click “Refresh”, then WBT to search for the available Citrix servers on the network. A message will
display as shown below:
Figure 76
Then the available Citrix server names will be displayed:
73
Figure 77
Select a Citrix server of your choice:
Figure 78
If your WBT is not on the same network as the Citrix server you would like to connect to, the server name will not
appear in the list (this would occur if you are on the other side of a router, across the Internet, or using RAS to connect
to a remote network containing Citrix servers). In this case, click Server Location and go to section 4.5.1.5.
74
Otherwise, scroll through the list and select the Citrix server or published application or type the name of the Citrix
server or published application in the edit field. Click next to continue, and go to section 4.5.1.5.
4.
The Server Location dialog box appears:
Figure 79
Remote Application Manager uses the information entered in the Server Location screen to help locate
the available Citrix servers and published applications. The default server location protocol is TCP
Browser and the default value entered in the Address field is Auto-Locate. Click Add and enter the IP
address or DNS name of any Citrix server on the remote network. Click OK, and then click Next to section
4.5.1.5. The following figures are shown in order of settings.
75
Figure 80
5.
The Select a Title for the ICA Connection page appears:
Figure 81
Enter a name for the connection entry. The name you choose is the name of the entry in the Current
Client Connections list and appears in the title bar of the ICA session window.
76
6.
Click “Done” to save the entry or “Cancel” to exit the new connection entry dialog box without saving
the entry. You can also click on “Next” to continue configuring other detail settings; the details will be
described in sections from 4.5.3.2 to 4.5.3.6. Once you have created a connection entry, the name
appears in the list of connections in Connection Manager.
4.3.2. Connecting to a Citrix Server
To start a previously defined connection
a.
In the Connection Manager dialog box, click the Connections tab.
b.
Select the desired connection name and click Connect.
If you specified a valid user name and password in the connection entry, you are logged in as that user. If
no user name and password are present in the entry or the information is incorrect, the server logon dialog
box will appear. Enter a valid user name and password for the Citrix server and click “OK” to log on.
Figure 82
4.3.3. Changing a Connection Entry
This section describes how to change the properties of an existing connection entry.
To change the properties of a connection entry
Left-click the name of the connection entry to make changes. Click Edit Connection to display the Edit
Connection Details dialog box.
77
Figure 83
Make the desired changes. Click OK to save your changes.
The Edit Connection Details dialog box contains the following tabs:
a. The Server tab (network connection entries only) allows user to set the server or published application
name to which it connects to. There is also a button that displays the Server Location dialog box
where you can set Business Recovery options, please refer to section 4.5.1.5 for more information.
b. The Dial-in tab (dial-in connection entries only) allows user to set the area code, country code, and
telephone number to dial. You can use the settings on this page in the same way as when you first set
up the connection entry, see “Creating a New Connection Entry” for more information.
c.
The Application tab allows user to specify an application to run after connecting to a Citrix server, see
section 4.5.3.2 “Specifying an Application to Run after Connecting to a Citrix Server” for more
information.
d. The Logon tab allows the user to input name, password, and domain to log onto the Citrix server
automatically, see section 4.5.3.3 “Specifying Logon Information” for more information.
e. The Window tab allows user to set the number of colors used for the ICA Client window, see section
4.5.3.4 “Changing the Window Properties” for more information.
f.
The Options Tab allows user to control the connection between the Citrix server and your WBT and
configure sound support, see section 4.5.3.5 “Setting Connection Entry Options” for more information.
g. The Title tab, where you can change the name of the connection, the name appears in the list in the
Connection Manager dialog box. See section 4.5.3.6 “
The Firewall Settings tab, where you can configure the client to use a SOCKS proxy and alternate
address re-mapping, see section 4.5.3.7 “Configuring Firewall Settings” for more information.
Specifying an Application to Run after Connecting to a Citrix Server
Use the Application tab to specify an application to run after connecting to a Citrix server. If you specify an
78
application, you will not see the Windows desktop when you connect and the connection is ended when
you exit the application.
Note: This tab does not apply to connection entries for published applications. Any value entered is
ignored.
In the Connection Manager dialog box, click Configure. Select the connection entry that you want to
change and click Edit. Click the Application tab.
Figure 84
In the Command Line box, specify the path and file name of the application to be run after connecting to
the Citrix server. For example, to launch Notepad automatically after connecting to the Citrix server, type:
C:\Wtsrv\Notepad.exe In the Working Directory box, specify the working directory to be used with the
application. If you use Notepad to work on documents in the C:\My Documents directory, type C:\My
Documents. Click OK to save your changes.
When you log on to the Citrix server, Notepad begins. In Notepad, if you select Open from the File menu,
the C:\My Documents directory will be displayed.
Specifying Logon Information
You can include the settings needed to log on to the Citrix server as part of the connection entry. This
saves time when connecting to the server but is less secure.
a. In the Connection Manager dialog box, click Configure.
79
b. Select the connection entry that you want to change and click Edit.
c. Click the Logon tab.
d. Type a valid user name, domain, and password. If you leave these fields blank, you will be prompted
for the necessary information until the appropriate values have been entered.
e. Click OK to save your changes.
Figure 85
Changing the Window Properties
Use the Window tab to change the number of colors used for ICA connections made using the connection
entry.
a. In the Connection Manager dialog box, click Configure.
b. Select the connection entry that you want to change and click Edit.
c.
Click the Window tab.
d. In the Window Colors box, set the number of window colors to 16, 256, Thousands or Millions.
e. Click OK to save your changes.
80
Figure 86
Setting Connection Entry Options
Use the Options tab to set specific options to the connection entry, such as data compression and sound
support.
a.
In the Connection Manager dialog box, click Configure.
b.
Select the connection entry that you want to change and click Edit.
c.
Click the Options tab.
d.
Click Compress Data Stream to reduce the amount of data transferred between the ICA Client
and the Citrix server. If your connection is bandwidth-limited, enabling compression will
increase efficiency. If your client device is on a high-speed LAN, you may not need compression.
If you have sufficient bandwidth, leave compression off to conserve processing power on the
Citrix server.
e.
The Cache feature is not supported in this ICA client version.
f.
Click Enable Sound to enable sound support. From the pull-down list, select one of the
following quality levels.
High. This value provides the greatest audio quality but should be used only when bandwidth
consumption is sufficient.
Medium. Using this value results in less bandwidth consumption than when using High.
Compression of sound data provides greater bandwidth efficiency but reduces sound quality
somewhat. This value is recommended for most LAN-based connections.
Low. This value offers the most efficient use of bandwidth but also decreases sound quality
severely. This value is recommended for low-bandwidth connections, including most modem
81
connections.
g.
Click OK to save your changes.
Figure 87
Changing the Title of the Connection Entry
By clicking on the Title tab you can change the title of this selected connection entry. Click OK to save your
changes.
82
Figure 88
Configuring Firewall Settings
If you are using a SOCKS proxy server to limit access to your Citrix servers, you must configure the ICA
Client to connect to Citrix servers through a SOCKS proxy server. You can configure a default SOCKS
proxy for all connections or use only a SOCKS proxy with a specific connection file. To do the former one
please refer to the section
To configure a SOCKS proxy server for a specific connection entry
a.
In the Connection Manager dialog box, click Configure.
b.
Select the connection entry that you want to change and click Edit.
c.
Click the Firewall Settings tab.
Figure 89
d.
Click Connect via SOCKS proxy.
e.
In the Address of proxy to use box, enter the SOCKS proxy server’s IP address.
f.
In the Port box, enter the proxy server's port number (if different from 1080).
g.
Click OK to save your changes.
Configuring Alternate Address Translation
If the ICA Client is outside a firewall that uses address re-mapping, you must configure the ICA Client in
order to use the alternate address returning by the master ICA Browser. This is necessary even if you are
not using a SOCKS proxy server.
83
Note: You must also use the ALTADDR utility to manually set the alternate address for each Citrix server,
See the Command Reference appendix of either the MetaFrame Administrator’s Guide or the WINFRAME
System Guide for more information.
Note: If you set alternative address translation for all connection entries, then it cannot be disabled for
specific connection entries.
To use alternative address translation for a specific connection entry
In the Connection Manager dialog box, click Configure. Select the connection entry that you want to
change and click Edit. Click the Firewall Settings tab. Click Use alternate address for firewall
connection. Click OK to save your changes.
Figure 90
4.4. Microsoft Internet Explorer Connection
This is an optional function for your WBT; check your vender for this support before your purchase. This
local browser connection will require more RAM utilization and powerful CPU to have better performance.
This WBT is equipped with a CPU of outstanding speed that offers you a local browser session you have
never experienced before.
4.4.1. To Make a New Microsoft Internet Explorer Connection
To make a new connection follow the steps below: choose Microsoft Internet Explorer. Then click on OK
84
to continue.
Figure 91
a. The following figure will now appear. Type a name and desired Start Page for this connection.
b. You can set the “Start the page in Kiosk mode” if you want to use base on full-screen page.
Figure 92
85
You can choose to connect with LAN on “dial up”.
Figure 93
a.
If you have a proxy server, you can enable it when accessing the Internet.
b.
Or you can by pass your proxy server when connecting to the local Internet.
Figure 94
86
This column is the security settings for the Internet.
Figure 95
You can customize the security level in this dialog box.
Figure 96
The privacy Internet setting can be set up in this dialog box.
87
Figure 97
In this dialog box, you can setup the advanced Internet setting.
Figure 98
You can block the popup windows in the Popup dialog box.
88
Figure 99
Set the web sites that you allow popup windows.
Figure 100
You can also select the events you would want to block their Popup.
89
Figure 101
4.4.2. To Start a Microsoft Internet Explorer Connection
Double click this Web connection. If your network settings have been correctly set up then this should
work.
Figure 102
90
4.5. TERMTEK Terminal Emulation
User can add a connection ASCII ANSI Emulation or IBM Emulation with this application.
Figure 103
ASCII/ANSI Emulation settings Page
91
Figure 104
IBM Emulation settings Page
Figure 105
Finish the set up, the connection will now be added on desktop and the startup menu.
92
Figure 106
4.6. Microsoft VNC Viewer
Microsoft VNC Viewer provides user to add a connection of VNC, to connect to other server that enables
the VNC service.
Figure 107
Add Connection
93
Figure 108
Set the options of connections
Figure 109
The connection will be listed on the Start Menu as well as the desktop. To execute the connection, simply
click on it.
94
Figure 110
95
5. Advacned Function for Connections
This WBT provides some advanced function for all connections such as Multiple Auto Start-Up and
Multiple Auto Reconnect.
5.1. Multiple Auto Start-Up
Left-click the connection, then on Auto Start, and the following figure should appear:
Figure 111
Click on “Add” to add this connection in the list of Startup list. You can repeat this step to have multiple
Startups. Use “Up Sequence” and “Down Sequence” to set the priority of all connections. Before this
function works successfully, make sure that the user names and passwords for all selected connections
have been inputted correctly.
96
Figure 112
User can also manage the list by selecting Auto Start Manager on the Start Menu.
Figure 113
97
5.2. Multiple Auto Reconnect
In the same figure above you will also find an icon “Reconnect”. This icon allows user to set this WBT to
immediately and automatically reconnect the same session that you have logged off. This special function
can be optimized when the WBT is placed in a public area.
Figure 114
98
6. Control Panel
The Control Panel provides various tools and applications to configure the WBT. One can easily configure
the WBT with the Control Panel. The Control Panel can be found in “Settings” of the “Start Menu” or
quickly opened with the Hotkey “ALT + F2”.
6.1. Keyboard
Figure 115
The Keyboard properties sheet allows user to configure one’s terminal's keyboard. Invoke this properties
sheet by clicking on the Keyboard icon. The following figure shows the properties sheet.
Figure 116
6.2. Owner
The Owner properties sheet allows users save personal information on the WBT.
99
Figure 117
6.2.1. Identification
To protect users’ rights, Users can input their identification data before entering connection manager.
Enable ”display owner identification” when power is on, the information will show whenever the machine
is on.
Figure 118
6.2.2. Notes
User can input any sentences or words in the column. The input will show up if you enable ”Display owner
notes at power on”.
Figure 119
6.2.3. Network ID
Enter User name and Password when accessing the Network.
100
Figure 120
6.3. System
Figure 121
6.3.1. General
By clicking on the “General” icon, all the system information will be shown.
Figure 122
6.3.2. Memory
By clicking on the “Memory” icon, you can adjust the memory as to how you want the programs to run.
101
Figure 123
6.3.3. Device Name
By clicking on the “Device Name” icon, you can identify your Windows CE device to other computers.
Figure 124
6.3.4. Copyrights
By clicking on the “Copyrights” icon, the agreement information will appear.
Figure 125
6.3.5. Network Information
By clicking on the “Network Information” icon, all the existing network information will appear.
102
Figure 126
6.4. Display
Figure 127
6.4.1. Display
The Display properties sheet allows you configure the terminal's display screen. Invoke this properties
sheet by clicking on the Display tab in the Terminal Properties dialog box. The following figure shows the
properties sheet. You can also Test your display after selecting a Refresh Frequency, the new testing
mode will appear. The graphics adapter will be set to the new mode temporarily for about 5 seconds so
you can determine whether your display works properly.
And you can set the display from VGA or DVI, (Note: Only TK-3770 has supported VGA/DVI mode)
Figure 128
103
6.4.2. Screensaver
Check the “Enable Screen Saver” so that you can configure your own customized screensaver for this
WBT. There are three options to choose: Screen Saver, Turn Off Monitor and Turn Off WBT. You can leave
this WBT active and the function will automatically activate according to the time you set. Or you can check
the “Enable Ctrl + Alt + L Turn ON/OFF screen saver” option to manually activate/deactivate any of the
left three power savers you check by pressing on the hot-keys: “Ctrl + Alt + L” “On Resume, Password
Protect” to provide more protection.
Figure 129
6.4.3. Background
In the “Background”, users can change the Desktop background image.
Figure 130
6.4.4. Appearance
In the “Appearance”, Users can change the style of Appearance in the WBT.
104
Figure 131
6.5. Mouse
Figure 132
Click Mouse Properties if you want to configure your mouse’s setting to Right-Handed or Left-Handed, and the
Pointer Speed.
Figure 133
6.6. Sounds
The Sounds can be adjusted with the Volume of the sounds of the client machine. Enable sounds for the
events, application and notifications. Users can set the sounds of events with their preferred settings.
105
Figure 134
Figure 135
6.7. Add/Remove Programs
Figure 136
With the Add/Remove Programs, users can add programs that support windows CE packed in file type CAB, and
remove those programs installed by users.
6.7.1. Add Programs
Users can add programs that support windows CE packed in file type CAB.
106
Figure 137
Users can also get CAB file from FTP servers and then install.
Figure 138
6.7.2. Remove Programs
Users can uninstall unnecessary/unneeded programs as shown below.
Figure 139
107
6.8. Date/Time
Figure 140
User can set up his/her local time with the property shown below.
Figure 141
6.9. Certificates
Figure 142
Certificates are the most basic components of Microsoft PKI. The main purpose of this is to assure privacy. Users can
grant authorization to browse the web or to enter sever by getting certificates.
108
Figure 143
6.10. System Info
Figure 144
6.10.1. General
The General page describes all the general information about this WBT. The information may vary from what is shown
below.
Figure 145
6.10.2. Component
The Component page shows the important components and the current version of these components
included in the WBT firmware.
109
Figure 146
6.11. Citrix ICA Configure
This section describes how to change the settings that apply for all ICA connection entries based on this
WBT. It also describes how to change the default settings that are used when creating new ICA connection
entries. You may want to do this if you prefer using a particular setting; for example, a sound quality that is
different from the initial setting or a larger default window size.
Figure 147
6.11.1. Global ICA Settings
a.
The Default Hotkeys tab allows user to define custom key combinations for system hotkeys.
See “Configuring Hotkeys” for more information.
b.
The Preferences tab allows user to control the default window and settings used for new ICA
connection entries. See “Configuring Global Preferences” for more information.
c.
The Server Location tab allows user to configure network protocol and server location options.
See “Configuring Network Protocol and Server Location” later in this section for more
information.
d.
The Firewall Settings tab allows user to configure the client to use a SOCKS proxy, alternate
110
address re-mapping and SSL Relay address. See “Configuring Firewall Settings” for more
information about using the ICA Client with a Firewall.
The PNLite Settings tab allows user to configure the client to switch from Remote Access Manager Mode
to PNLite mode. In PNLite mode, a list of available published applications on the network will be published
on the ICA client. This means the user will not need to configure each connection entry manually. For more
information about PNLite, please refer to the PNLite Mode.
Configuring Hotkeys
This WBT provides users with hotkeys that can be used during ICA sessions to control various functions.
Some hotkeys control the behavior of the ICA Windows-based Terminal Client itself while others emulate
standard Windows hotkeys. When you want to use a Microsoft Windows key combination during a session,
use the mapped hotkey instead. The following table lists the default ICA Windows-based Terminal Client
hotkeys.
Default ICA WBT Client Hotkeys
Name
Default
Value
Description
Connection
Status
CTRL+6
Displays ICA Client connection status.
Close Session
CTRL+2
Disconnects the ICA Windows-based Terminal Client from the Citrix server and
closes the client window on the local desktop. Using this hotkey leaves the ICA
session running in a disconnected state on the Citrix server. If you do not want to
leave your session running in a disconnected state, log off instead.
Esc
CTRL+3
Alternately hides and displays the ICA session window.
CTRL-ALT-DEL
CTRL+4
Displays the Windows NT Security dialog box on the Citrix server.
CTRL-ESC
CTRL+5
On MetaFrame servers, the Windows Start menu is displayed. On WINFRAME
servers, this hotkey displays the Task List.
ALT-ESC
CTRL+7
This hotkey cycles the focus through the minimized icons and open windows of
applications run in your ICA session.
ALT-TAB
CTRL+8
This hotkey cycles through all applications in the ICA session. A pop-up box
appears and displays the programs as you cycle through them. The selected
application receives keyboard and mouse focus.
ALT-BACKTAB
CTRL+9
Like the ALT+TAB hotkey, this key sequence cycles through applications that have
been opened in the ICA session, but in the opposite direction. The chosen
application receives keyboard and mouse focus.
To Change the Default Hotkeys
a. Click on the icon of Global ICA Client Settings and the dialog box will appear as below.
b. On the Hotkeys page, use the lists of keys to customize the default hotkey key sequences.
c. Click OK to save your changes.
d. Make the desired changes.
e. Click OK to save your changes.
111
Configuring Global Preferences
The following settings are configured in the global Preferences tab:
Default Window Colors: In the Window Colors box, select 16,256, Thousands or Millions colors by
choosing the appropriate radio button. When using a low-bandwidth connection, 16-color mode may
provide better performance. This WBT can support up to Millions colors that is superior in
comparison to other WBTs in the market.
Serial Number. This is the serial number of your ICA Client software. This number is only
necessary when you are using the ICA Windows-based Terminal Client with a product such as
WINFRAME Host/Terminal, which requires each ICA Client to have a Citrix PC Client Pack serial
number. If a serial number is required, you must enter it exactly as it appears on the Serial Number
card. The serial number is not used when connecting to MetaFrame servers.
Client Name. This box allows you to set the name of your client device. Citrix servers use the client
name to uniquely identify resources (such as mapped printers) associated with a given client device.
The client name should be unique for each computer running a Citrix ICA Client. If you do not use
unique client names, device mapping and application publishing may not operate correctly.
To Change the Default Global Preferences for All ICA Connection Entry
a. Click the Preferences tab.
Figure 148
b. Make the desired changes.
c. Click OK to save your changes.
Server Location
This section explains how to:
a. Set the protocol the ICA clients uses
b. Control the way in which the ICA client locates Citrix servers
c. Configure a list of Citrix servers for Business Recovery
The network protocol settings allow user to control the way the ICA client searches for Citrix server and
how it communicates with them. Server location (server browsing) provides a method for a user at a
network-connected ICA Client to view a list of all Citrix servers on the network that have ICA connections
configured, and a list of all published applications. The way in which server location works depends on
which network protocol is configured:
TCP/IP – The client uses the UDP protocol to search for Citrix servers. The client communicates with
the Citrix server
using ICA protocol over TCP/IP. This is the default protocol.
112
TCP/IP + HTTP – The client uses the HTTP protocol to locate Citrix servers. The client
communicates with the Citrix server using ICA protocol over TCP/IP. Select this option when using
the ICA Client over the Internet or via a firewall or proxy server.
SSL + HTTPS – The client uses the HTTPS protocol to search for a list of Citrix servers. The client
communicates with the Citrix server using ICA with SSL. SSL+HTTPS provides strong encryption of
ICA traffic and Citrix server authentication. Select this option when using the ICA Client over the
Internet or via a firewall or proxy server.
The TCP/IP+HTTP and SSL+HTTPS protocols can only be used with compatible Citrix servers.
Check the Citrix server administrator’s guide for more information.
When the CTP/IP or TCP/IP+HTTP protocols are selected, the ICA protocol can be encrypted
using SecureICA.
Business recovery provides consistent connections to published applications in the event of a master ICA
Browser server disruption. You can define up to three groups of Citrix servers to which you want to connect
to: a primary and two backups. Each group can contain from one to five servers.
When you build a new ICA connection, the ICA client in this WBT will automatically search for any Citrix
server on the network. The default setting is TCP browser but you can make desired change at this page. It
depends on what kind of protocol of your Citrix server. If you can’t find the server with this protocol, scroll
through the list and try other protocols. This will change the default protocol setting of ICA client when
searching for Citrix server location.
Figure 149
Firewall Settings
This is to configure a default SOCKS proxy server, if you would like to configure a SOCKS proxy server for
a specific ICA connection entry, please refer to the description mentioned earlier in section 4.5.3.
To Configure a Default SOCKS Proxy Server
a. Check Connect via SOCKS proxy.
b. In the Address of proxy to use box, enter the SOCKS proxy server’s IP address.
c.
In the Port box, enter the proxy server's port number (if different than 1080).
113
d. Click OK to save your changes.
Figure 150
a.
If you configure a default SOCKS proxy server, you must specify at least one server in the Server
Location tab for server and published application browsing to work.
Configuring Alternate Address Translation
If the ICA Client is outside a firewall that uses address re-mapping, you must configure the ICA Client to
use the alternate address returned by the master ICA Browser. This is necessary even if you are not using
a SOCKS proxy server.
b.
You must also use the ALTADDR utility to manually set the alternate address for each Citrix server,
See the Command Reference appendix of either the MetaFrame Administrator’s Guide or the
WINFRAME System Guide for more information.
c.
If you set alternate address translation for all connection entries, it cannot be disabled for specific
connection entries.
To Use Alternate Address Translation for All Connection Entries
a. Press F2 to enter the Terminal Properties page, click Apps tab and then click Global ICA Client
Settings icon.
b. Click the Firewall Settings tab.
c. Click Use alternate address for firewall connection.
d. Click OK to save your changes.
114
Figure 151
6.11.2. NFuse Temporary Connection
User can provide user to enable sessions of NFuse to switch if you set it to enable.
Figure 152
6.11.3. ICA Device Setting
User can set the device mapping on ICA Device setting
Figure 153
User can set the device that you use to map a number.
115
Figure 154
6.12. Regional Settings
Figure 155
6.12.1. Regional Settings
Set up the keyboard locale for the local device.
Figure 156
The following shows how the user can customize the Regional Settings
Number
Press the Customize the Number; Currency, Time and Date pages will appear. There are different ways to display
the numbers in the settings, however, it will only show according to what keyboard locale you have set up.
116
Figure 157
Currency
This currency model will also be displayed according to the locale you have set up.
Figure 158
Time
Time can be arranged in terms of hours, minutes and seconds.
Figure 159
Date
How you would like to show the date at the client side can be arranged here.
Figure 160
117
6.12.2. User Interface Language
Determine the language used for the menus, dialogs, and alerts.
Figure 161
6.12.3. Input Language
Set up the Input Language for the local device, and you can also select the input language you plan to use.
Figure 162
6.13. Storage Manager
Figure 163
If the machine is connected with any floppy or hard drives, it will show the storage information. User can also format or
do the partitions to this local storage device.
118
6.14. USB Manager
Figure 164
The USB Manager provides management of USB Storage Devices. One can see and enable or disable
the USB Storage Devices connected to the WBT. One can set up all USB Storage Devices as Read-only to
prevent losing of data.
Figure 165
6.15. FTP Update
Figure 166
119
The FTP Update allows the user to Update and Back-up the firmware, logo, register, and company
information with remote FTP servers.
Figure 167
6.15.1. Update
The Work-Mode Update allows you update new firmware, registers, logo, and company information. Key
in Server Name, File Name, User ID and Password and Click Start Update button, the update Status will
appear in the Status Window.
Note: All new FTP Update with version 3.0 cannot update the WBT with the update data provided for older
FTP versions. The FTP Update with version 3.0 updates the WBT with package file. The package file
consists of various firmware, logo, register, and company information data. One can generate a package
file with the Work-Mode Back-up provided by the FTP Update
6.15.2. Back-up
The Work-Mode Back-up allows you to back-up the firmware, register, logo, and company information in
the WBT. To use the back-up function, select the work-mode as Back-up, then press Start Backup
button. In default, the FTP Update will back-up firmware, registers, logo, and company information. If one
just wants to back-up certain components, press Option to select the components that one wants.
120
Figure 168
6.16. Ping
Figure 169
The Ping Test Settings sheet allows you ping the IP address to make sure it’s on the network. Invoke this setting by
clicking on the Ping icon of Terminal Properties dialog box. The following figure shows the Ping function tag, just type
in the IP address you want to ping and click OK.
121
Figure 170
6.17. Thin Printer
Figure 171
You can check “Enable ThinPrint” to use ThinPrint function in RDP or ICA.
Figure 172
122
6.18. Input Panel
Figure 173
The Input Panel allows users to switch current input method and configure the input methods.
Figure 174
6.19. LPD
Figure 175
This WBT with WIN CE 6.0 offers another way of letting through LPD protocol to send print jobs. LPD is a
built-in printing protocol based in the BSD type of UNIX. However, it is also available in most UNIX system.
With LPD, users can use UNIX machine for printing purposes or any machine that supports LPD protocol.
123
Figure 176
6.19.1. Setup for LPD
In this page, user can select the printers connecting to the WBT. Select one of the options and press “Start
LPD” then the LPD will be kept on stand-by mode. Users will not need to reboot the WBT.
Figure 177
User can press “Print Test Page” button to check if the printer has connected successfully. If connected
successfully the printer type name will appear on the screen. For example: the connected printer is
EPSON Stylus Photo 1270.
124
Figure 178
Click “OK” to process Test procedure and the WBT will notify user that “the test data has been sent to the
printer”.
Figure 179
Checking the printer then user can find the default characters printed as below.
125
LPD for CE 6.0 version 2.0
==========================================================
EPSON Stylus Photo 1270(shows the printer model name as user setup)
The quick brown fox jump over the lazy dog.
When the LPD stands by, users can press “Stop LPD” to stop it. If you need the LPD to start automatically
when the WBT boots up, click the “Auto-start LPD after the system boots up” and press “Save
Settings” or “OK”. When the WBT reboot next time, the LPD will start up automatically.
6.19.2. Add a remote printer
To add a remote printer, insert a block similar to the following in the /etc/printcap file.
For Example: Use the SCO UNIX x86
MyPrinter:\
:lp=:\
:rm=:MyPrinter:\
:rp=:MyPrinter:\:
sd=/usr/spool/lpd/MyPrinter:\
Note: MyPrinter maybe define in director as below
/etc/hosts
192.168.0.95
MyPrinter.
MyPrinter.DOMAIN.com
E.g. If it works on a BSD UNIX host and makes the directory /usr/ spool/ETPS1
available, then follow these three procedures:
chown daemon /usr/spool/MyPrinter
chmod 775 /usr/spool/MyPrinter
chgrp daemon /usr/spool/MyPrinter
For Example:
User can setup a printer name and execute a printing instruction using configure tool under the X-Window
as the figure shows below.
126
1.
Preform the printer configuration under KDE in Redhat 7.3 O.S. Then click “New” button.
Figure 180
2.
On the following screen, user will be asked to provide information for adding a new Printer Queue.
Click “Next” to process.
Figure 181
3.
In this “Set the Printer Queue Name and Type” page. Please select the “Unix Printer” which supports
LPD service. Then please enter your Queue Name. Click next when ready.
127
Figure 182
4.
the “Configure a Unix Print Queue” page will appears. User has to enter Server IP and Queue Name
to configure which Server and Queue will be user’s remote LPD server.
Figure 183
Note: Here the Server IP that’s defined to be the WBT IP.
User has to enter user’s WBT IP in the “Server” column.
5.
Please select a printer driver for user’s printer. Then click “Next”. For example here, it is using the
EPSON Stylus Photo 1270 printer.
128
Figure 184
6.
After completing the setting, the detail of the Queue the user creates will be on the list. Click “Finish”
to activate the setting.
Figure 185
7.
The new Printer Queue will now appear on the printer configure icon. User can click the “Test” button
to test it.
Figure 186
129
6.19.3. LPD Printing
Before you use LPD for printing, your Server needs to be installed completely with Setup for LPD in 3
setups for LPD. LPD protocol is built-in to most of the UNIX system. However, detailed implementation of
LPD differs among UNIX system. Please refer to your UNIX administration guide for reference. The
following illustrates printing command is shown under BSD system or System V version.
For BSD system: lpr -P <printer_name><filename>
For System V version: lp -d <printer_name><filename>
This command is to print selected files to the selected printer.
i.e.
lpr -MyPrinter /etc/hosts
(BSD version) or lp –d MyPrinter /etc/hosts
(System V version)
This is an example of printing the /etc/hosts file to the Terminal printer.
6.20. RM Agent Configuration
Figure 187
The most Humanized remote control utility, Remote Manage System (RM), provides a single-point
centralized administration of network resources and a simple and easy way to manage Windows-based
terminals. The RM Agent Configure provides settings and security protection related to the RM in the
WBT.
130
Figure 188
6.20.1. RM Agent Configure
Timeout
User can set the time waiting for RM request confirm.
RM Server
User can set the RM server configure to via DHCP or specific IP.
Figure 189
Remote Wake up Control
Can set the client wakes up on LAN by Remote Manager.
6.20.2. Authentication
When the RM attempts to control the client WBT, the RM needs to get the authorization of the client WBT.
131
This setting influences the authorization method. If “No Password” is selected, the RM can obtain the
authorization automatically and get control of the client WBT. If “Client Password” is selected, the RM will
need to input the password to get the authorization of the client WBT. If the RM does not provide the
correct password, it cannot get the control of the client WBT.
Figure 190
When the “Prompt local user to accept connection” is checked and the RM attempts to get
authorization of the client WBT, the client WBT will popup to ask users to whether Accept or Reject the
RM.
Figure 191
If users want to change the authorization passwords of the client WBT, the Configuration provides the
functionality. The password-setting dialog is shown below..
132
Figure 192
6.21. Touch Panel Settings
The user can use the touch panel that’s supported in the Apps.
Figure 193
Press OK to Enable touch panel, and press Calibrate to alignment.
Figure 194
133
6.22. Win VNC Server
Figure 195
Enable “Enable VNC”, the WBT can be controlled in the Win VNC Server. The default password is
“password”.
Figure 196
6.23. Terminal Service Client License
In this Apps tab you can check and set TSCAL (Microsoft Terminal Service Client Access License).
Figure 197
When you receive a license from a server, the license info will appear in this dialog.
134
Figure 198
6.24. Printer
Figure 199
The terminal supports Local Print. If you want to connect this terminal with a Local Printer, then click OPEN.
If not, then click NEXT.
Local Printer Setup
After clicking OPEN you can see the Add Printer page then click OPEN again and you can see the Select
the printer Port page.
135
Figure 200
Figure 201
6.24.1. Select the Printer Port
Select one of the ports, LPT1, COM1 or COM2 port that you want to use to communicate with your local
printer. Or you can select Network to set a network printer. When you select the COM1 or COM2 .You can
also select the baud rate of COM1 or COM2 port.
Figure 202 Select the Printer Port
136
Figure 203 Select the Printer Port (For LPT1)
Figure 204 Select the Printer Port & BAUD RATE (For COM1 or COM2)
Figure 205 Select the Network Printer
6.24.2. Select the Printer Model
Select the manufacturer and model of your printer. If your printer name is not listed, check your printer
document and select the one that is closer. The printer will then appear on the dialog box of Printers
Properties on Terminal Properties after pressing [F2] as shown in chapter 6.5.
137
Select the Printer Model
User selects the manufacturer and model of your printer then click Next.
Figure 206
Name Your Printer for COM1, COM2, LPT1
User must supply a name for this printer then click Next.
Figure 207
Name Your Printer for Network
Enter the Network path of your printer
138
Figure 208
Configure Another Printer
The WBT will notify that “User has successfully configured the printer” And ask if user wants to configure
another printer. If no, click No and click Next. Or enable Yes to continue configure another printer. The
screen will go back to Select the Printer Port as shown on page 108, Then follow the setup procedures
again after selecting the printer port.
Figure 209
Finish
To apply the settings, click Finish after you have finished the Printer Setup Wizard.
139
Figure 210
After the printer setup finishes, the newly added printer model will be showed up.
Figure 211
6.24.3. User Defined
If your printer name is not listed, please enable” User Defined” to setup then click Next.
Figure 212
140
Note: User has to prior install the printer driver beforehand in server when performing the User Defined.
Enter your printer Model & Manufacture to setup then click Next.(Com1 , Com2, Lpt1)
Figure 213
Enter your printer Model & Manufacture to setup then click Next.(For Network Printer)
Figure 214
Note: The model name, which you type in the column, Should be identical to what you select from the
name list in the server
User must supply a name for this printer then click Next.
141
Figure 215
Set Default Printer. User can choose using this printer as the default printer or not. Click Next to process.
Figure 216
The WBT will notify that “User has successfully configured the printer” And ask if user want to configure
another printer. If no please select No and click Next. Or select Yes to continue configure another printer.
Figure 217
142
Then click Finish to apply the setting.
Figure 218
After the printer setup is completed then the newly added printer model will be showed up.
Figure 219
6.24.4. Finish the Setup Wizard
To review or change settings made on previous pages, click Back; to apply the settings, click Finish. To
change these settings after you have finished the Setup Wizard, press [F2] key to display the Terminal
Properties sheet.
143
Figure 220
6.25. Wireless
The Wireless pops up the wireless configuration page. Please read section 3.3.3 to get the detailed
contents.
144
7. User Security Control
Figure 221
In this WBT, we provide administrators with a new security control tool – “User Security Control.” The
User Security Control tool provides functionalities to setup and customize the security feature of the WBT.
Less time is spent for Administrators to setup and customize specified environments for users that use the
WBT in User Mode. The User Security Control can be launched from the Control Panel.
Figure 222
The following content of this chapter will describe the detail of User Security Control.
7.1. Administrator Mode and User Mode
In the WBT, two operation modes, Administrator Mode and User Mode, are available to support the User
Security Control. In the Administrator Mode, all components and functions are accessible. The
environment of a WBT user working in Administrator Mode is not limited. The User Security Control can
be launched in the Administrator Mode. The current operation mode is shown on the top of the Start Menu
as the figure illustrates below.
145
Figure 223
Figure 224
Users working with the WBT can switch their operation mode. But an only administrator that has the
password for the Administrator Mode can switch to and work in Administrator Mode. The passwords about
these two modes will be described in later sections. There are two methods to switch between these two
modes.
a. From Start Menu: The Item “User Switches” in the Start Menu switches current operation mode as
below.
Figure 225
b. Hotkey: The Hotkey “ALT+F12” can quickly switch current operation mode.
Switching current operation mode from Start Menu or by Hotkey will pop up a dialog to confirm the
switching. The dialog that switches from Administrator Mode to User Mode and from User Mode to
Administrator Mode differs. When switching from Administrator Mode to User Mode, the dialog will ask for
“Switch to user mode?”
146
Figure 226
Select Yes to activate user mode and No to deactivate
Figure 227
When switching from User Mode to Administrator Mode, the dialog will ask for the Administrator Mode
password. The default password for Administrator Mode is “0000.”
Figure 228
If users enter the correct password, Administrator Mode will be activated.
Figure 229
Otherwise, Administrators can setup the booting up Operation Mode. This will be described in later
section.
147
7.2. User Security Control tool
The User Security Control provides functionality to manage the security of the WBT. The User Security
Control can be launched from the Control Panel as shown below.
Figure 230
The following describes the details of the User Security Control tool.
7.2.1. User Security Option
The User Security Option provides functionality to setup the security of the system.
Figure 231
The functions and options of the User Security Option are as of the following:
Reset Default
The Reset Default function will reset the system to factory default settings. This function will clean all the
settings tuned by users. In most common cases, we do not suggest administrators to trigger this function
unless administrators want to reset the system.
148
When this function is triggered, a warning dialog will pop up to confirm the reset default.
Figure 232
Log on Screen At Power On
If users enable this option, the Log on Screen of the WBT will pop up to ask for password of the Mode that
users attempt to log on. The Log on Screen is as below:
Figure 233
When users enter the correct passwords for the operation mode that they attempt to log on, the WBT will
start with the operation mode they selected. If users have enabled the option “Display owner
identification” or “Display owner notes at power on” of the Control Panel Component - Owner, the Log
on Screen will show the information kept in Owner. The Log on Screen is shown below:
149
Figure 234
Boot up windows CE in Administrator Mode
When the WBT boots up, the WBT will automatically switch the operation mode to Administrator mode with
enabling this option.
Enable TKDiag
The Self-Test program will run on next boot-up of the WBT automatically when this option is enabled.
Shut down WBT after disconnecting all connections
When this option is enabled, the WBT will automatically shut down after all connections are disconnected.
One can imagine that users are using the WBT like a pc. When users log off from the servers, the WBT will
automatically shut down.
Enable Session Switch Hotkey Alt + Tab
In default, the Session Switch Program triggered by Hotkey Alt+Tab is disabled. When this option is
enabled, pressing hotkey Alt+Tab will pop up the Session Switch Program as well as the one provided by
windows XP.
7.2.2. User Security Password
The User Security Password provides the modification of passwords of Administrator and User Mode. The
default passwords for these two modes are “0000.”
150
Figure 235
7.2.3. User Mode Control
The User Mode Control provides assistance for administrators to define the security settings of User Mode.
An administrator can define a specific option.
Figure 236
151
8. WBT Mode
The Windows-Based Terminal (WBT) Mode is a type of shell that is targeted to the needs of a Windows
Embedded CE powered thin client. It provides only the Thin Client Setup Wizard, Remote Desktop
Connection, and the Thin Client Property Sheets.
8.1. Thin Client Setup Wizard
The wizard composites of 4 pages: the Welcome, Network Configuration, Control Panel, and Finish pages.
The following introduces these 4 pages.
8.1.1. Welcome
The Welcome page shows the Product ID. Figure 237 shows the screenshot of it. Clicking button “Next”
will step into next page.
Figure 237
8.1.2. Network Configuration
The Network Configuration page allows users to setup the network. Figure 238 shows the screenshot of it.
Please read section 3.2.4.2 to get the details of the network configuration.
152
Figure 238
8.1.3. Control Panel
The Control Panel page allows you configure your terminal’s function. Figure 239 shows the screenshot
of it. Please read section 3.2.4.1 to get the details of the control panel.
Figure 239
8.1.4. Finish
The Finish page shows you have successfully completed the setup wizard. Just click button “Finish” to exit
the wizard and then the Remote Desktop Connection will pop up.
153
Figure 240
8.2. Remote Desktop Connection
By the Connection Manager, users can easily connect to the remote desktop connection. Besides,
powerful management of remote desktop connection is supported. Figure 241 shows the screenshot of the
Connection Manager. The following will introduce the functions of the Connection Manager.
Figure 241
8.2.1. Connections
The connections list of the Connections page lists all the connections have been added.
Connect
If the users want to connect to certain remote desktop, all they get to do is that select a connection and
press button “Connect” or just double click on that connection. And the helper applications will lead users
to the remote desktop
154
End
Sometimes the user attempts to exit certain remote desktop, he just get to select the connection and
presses button “End”. And the remote desktop will finish.
Program
Now the program just includes Windows Media player and Go-Global. If you need them, just come here to
get them.
Shutdown
The user can select Reboot to re-start the terminal or select Shutdown to turn the system off. Besides, the
user can switch his operation mode by selecting “Switch Mode.”
8.2.2. Configure
Users can manage the connections here. Connections can be added, edited, and deleted here.
Besides, users can setup the automatically starting up connections. Please read chapter 4 to get
the detail.
Figure 242
8.3. Thin Client Property Sheets
The user can change the settings by using keyboard shortcuts or by pressing F2 to display the thin client
property sheets. The property sheets includes general information and control panel. The general
information sheet presents the system information. The control panel sheet allows the user to setup the
properties of the thin client. Please read section 3.2.4.1 to get the details of the control panel.
155
Appendix A. Function Hot-keys List
Hot-keys Functions
Ctrl+Alt+Up/Down Arrow
Use this function to switch between Active Connections.
Alt+Tab Arrow
Use this function to switch between Active Connections.
Ctrl+Alt+End:
Use this function to go back to the Terminal Connection Manager.
Ctrl+Alt+L:
Use this function to activate or deactivate the energy saver.
Alt+F2:
Use this function to open Control Panel.
Alt+A:
Use this function to open Add Connections.
Alt+S:
Use this function to open Shut Down Dialog.
Alt+F12:
Use this function to switch between User/Administrator modes.
Ctrl+Alt+R:
Use this function to open Reset Default Dialog just in Administrator mode.
156
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising