Manual

freeView IP 800 Users Manual
LIST OF FIGURES
Figure 1-1: KVM Setup Program................................................................................................................... 7
Figure 1-2: Remote Console.........................................................................................................................8
Figure 3-1: freeView IP 800 Usage Scenario.............................................................................................. 15
Figure 4-1: freeView IP 800 Setup Tool ...................................................................................................... 20
Figure 5-1: Encryption Key Length in Internet Explorer.............................................................................. 26
Figure 5-2: Login Screen............................................................................................................................. 34
Figure 5-3: Main Page................................................................................................................................. 35
Figure 5-4: Remote Console.......................................................................................................................36
Figure 5-5: Remote Console Control Bar.................................................................................................... 37
Figure 5-6: Remote Console Options Menu ............................................................................................... 38
Figure 5-7: Remote Console Exclusive Mode.............................................................................................38
Figure 5-8: Remote Console Options Menu – Scaling ...............................................................................39
Figure 5-9: Remote Console Options Menu – Local Cursor....................................................................... 40
Figure 5-10: Video Settings Panel ..............................................................................................................41
Figure 5-11: Soft Keyboard .........................................................................................................................42
Figure 5-12: Soft Keyboard Mapping ..........................................................................................................42
Figure 5-13: Remote Console Confirmation Dialog ....................................................................................43
Figure 5-14: Encoding................................................................................................................................. 43
Figure 5-15: Status Line .............................................................................................................................. 44
Figure 5-16: Bandwidth Usage....................................................................................................................44
Figure 6-1: KVM Console............................................................................................................................45
Figure 6-2: Telnet Console .......................................................................................................................... 45
Figure 6-3: Set Password............................................................................................................................47
Figure 6-4: Set User.................................................................................................................................... 48
Figure 6-5: User Console Settings (Part 1)................................................................................................. 49
Figure 6-6: User Console Settings (Part 2)................................................................................................. 50
Figure 6-7: Keyboard and Mouse Settings .................................................................................................52
Figure 6-8: Video Settings...........................................................................................................................53
Figure 6-9: Network Settings....................................................................................................................... 54
Figure 6-10: Dynamic DNS .........................................................................................................................55
Figure 6-11: Dynamic DNS Scenario .......................................................................................................... 56
Figure 6-12: Device Security.......................................................................................................................57
3