Rose electronic MAN-VR2 Switch User Manual


 
Vista Remote 2 Installation and Operations Manual
11
Screen #3 is a secure keys screen that will display after the network information has been
entered.
Figure 8. Secure Key calculation
This screen uses mouse movements and keyboard inputs to create random data. This
unpredictable information is then combined with several other factors to develop the basis of
the encryption keys that are used to establish secure remote links.
With every mouse move and key press the single dash will move across the progression bar
(unless the same key is pressed repeatedly). Periodically, a new star character will be added to
the bar as the random data are accepted as part of the new encryption key. When the bar is
full, the final encryption keys for your Vista Remote 2 will be created this process takes
roughly 30 to 40 seconds.
Once the secure key has been calculated, the Vista Remote 2 will restart and present a
standard logon screen as shown below. Logon to the unit with the correct Username and
password.
Figure 9. Standard Logon screen