Administrator Guide

File Servers/Path, Username and Password —Enter the IP address or host name of the file server that provides the system
software and update images. The address can be supplied through DHCP, if DHCP is used.
a) File Servers/Path — Allows maximum of 127 characters for file server, and maximum of 127 characters for root path. The data
specifies part of the path to be used when the server is accessed.
File server supports failover list. A failover list consists of one or more file server pairs specified in the order of preference. You can
provide multiple file servers separated by either a semicolon or colon. The list must not exceed 127 characters. When connecting to
a file server, the client attempts to connect to each pair in an order until it finds a working file server pair.
b) Username—Enter the username to log in to the file server. Use maximum of 31 characters.
c) Password—Enter the password to log in to the file server. Use maximum of 31 characters.
3. Click OK to save the settings.
Configure the Wyse Device Agent settings
Use this tab to configure the Wyse Management Suite settings. ThinOS supports all the Wyse Management Suite Group Policy settings.
Dell Wyse Device Agent (WDA) has been enhanced to support the following three types of customer security environments:
Highly secured environment—Administrators must log in to each device, and use the USB device or File Server to import the
server certificate. The server certificate is retained in the device until you reset the device to factory default settings. The device is
secured and is not susceptible to a rouge DHCP or DNS server for a new device discovery. Administrators can use either CA-signed or
self-signed server certificates.
Secured environment—Administrators can configure the server certificate fingerprint as a DNS_Text record or a DHCP_Scope
option. If WDA detects the DNS_Text record or the DHCP_Scope option, the server certificate fingerprint is distributed over the
network and added locally to the device. When the device is reimaged, the server certificate fingerprint is removed from the device.
Administrators can use either CA-signed or self-signed server certificates.
Normal environment—You can use either CA-signed or self-signed server certificates for device discovery. The device must
establish a connection with CA for certificate validation. This applies when there is no option of DNS_Text record or DHCP_Scope but
the server certificate is CA-signed. If the certificate is a self-signed certificate, you must accept the certificate security warning
message.
To configure the Wyse Management Suite settings, do the following:
NOTE:
Ensure that you do not disable the on-board NIC. If the on-board NIC is disabled, the Wyse Management Suite
server cannot identify the device.
1. From the desktop menu, click System Setup, and then click Central Configuration.
The Central Configuration dialog box is displayed.
2. Click WDA, and use the following guidelines:
56
Configuring connectivity