freeView IP 800 User’s Manual
LIST OF FIGURES
Figure 1-1: KVM Setup Program...................................................................................................................7
Figure 1-2: Remote Console.........................................................................................................................8
Figure 3-1: freeView IP 800 Usage Scenario..............................................................................................15
Figure 4-1: freeView IP 800 Setup Tool ......................................................................................................20
Figure 5-1: Encryption Key Length in Internet Explorer..............................................................................26
Figure 5-2: Login Screen.............................................................................................................................34
Figure 5-3: Main Page.................................................................................................................................35
Figure 5-4: Remote Console.......................................................................................................................36
Figure 5-5: Remote Console Control Bar....................................................................................................37
Figure 5-6: Remote Console Options Menu ...............................................................................................38
Figure 5-7: Remote Console Exclusive Mode.............................................................................................38
Figure 5-8: Remote Console Options Menu – Scaling ...............................................................................39
Figure 5-9: Remote Console Options Menu – Local Cursor.......................................................................40
Figure 5-10: Video Settings Panel ..............................................................................................................41
Figure 5-11: Soft Keyboard .........................................................................................................................42
Figure 5-12: Soft Keyboard Mapping..........................................................................................................42
Figure 5-13: Remote Console Confirmation Dialog....................................................................................43
Figure 5-14: Encoding.................................................................................................................................43
Figure 5-15: Status Line..............................................................................................................................44
Figure 5-16: Bandwidth Usage....................................................................................................................44
Figure 6-1: KVM Console............................................................................................................................45
Figure 6-2: Telnet Console..........................................................................................................................45
Figure 6-3: Set Password............................................................................................................................47
Figure 6-4: Set User....................................................................................................................................48
Figure 6-5: User Console Settings (Part 1).................................................................................................49
Figure 6-6: User Console Settings (Part 2).................................................................................................50
Figure 6-7: Keyboard and Mouse Settings .................................................................................................52
Figure 6-8: Video Settings...........................................................................................................................53
Figure 6-9: Network Settings.......................................................................................................................54
Figure 6-10: Dynamic DNS .........................................................................................................................55
Figure 6-11: Dynamic DNS Scenario..........................................................................................................56
Figure 6-12: Device Security.......................................................................................................................57
3