Workspace. User Guide (Administrators) Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD.

Size: px
Start display at page:

Download "Workspace. User Guide (Administrators) Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD."

Transcription

1 Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD.

2 Copyright Huawei Technologies Co., Ltd All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. i

3 Contents Contents 1 Introduction Concepts Workspace Software Client Thin Client Mobile Terminal Infrastructure Server AD Management Server Desktop Regions and AZs Project Application Scenarios Service Process and Function Overview Accessing and Using Workspace How to Access Workspace Workspace Packages Related Services User Permissions Getting Started Logging In to the Workspace Management Console Applying for the Workspace Service Purchasing Workspace Desktops Logging In to a Desktop Using an SC Logging In to a Desktop Using an SC (Using a Proxy for Internet Access) Logging In to a Desktop Using a Browser Logging In to a Desktop Using a TC Logging In to a Desktop Using a Mobile Terminal (Android) Logging In to a Desktop Using a Mobile Terminal (ios) Operation Guide (Administrators) Overview Managing Desktops Managing Users...32 Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. ii

4 Contents 3.4 Viewing User Login Records Managing Policies Restoring Infrastructure Server Data Changing the Internet Access Port Changing the Service Subnet Configuring Two-Factor Authentication Changing the Password of a Domain Administrator Monitoring Workspace Monitoring Metrics Setting Alarm Rules Viewing Monitoring Metrics Recording Workspace Operations Key Operations Recorded by CTS CTS Traces Canceling Workspace Operation Guide (End Users) Introduction to Workspace Introduction to Terminals Risky Operations Failure When Connecting to Desktops Dual-Screen Display Configuration HDPDeviceHelper Peripheral Assistant FAQs (Administrators) What Is Workspace? What Are the Features and Advantages of Workspace? What Is the Process of Using Workspace? What Are Workspace Packages? How Is Workspace Charged? Do I Need to Purchase TCs? How Do End Users Access the Internet? How Do I Install Applications on the Desktop? What Resources Do I Need to Prepare Before Applying for Workspace? What Should I Do If I Fail to Apply for Workspace? How Is Workspace Connected to Enterprise Intranets? How Do I Interconnect Workspace with Microsoft AD? What Should I Do If I Fail to Apply for Workspace by Interconnecting with Microsoft AD? How Do I Check the Network Status of Desktops? What Are the Network Requirements for Accessing the Desktop? FAQs (End Users) What Devices Can Be Used to Log In to Workspace? What Are the Precautions for Using Workspace? Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. iii

5 Contents 6.3 What OSs Can Run on Workspace? Can I Upgrade OSs by Myself? How Do I Install Applications on the Desktop? What Software Is Compatible with Workspace? How Does Workspace Manage Peripherals? Does Workspace Support Personalized Settings? Can Data in Workspace Be Saved for a Long Time? How Do I Use a Local Printer for Printing? How Do I Use a Network Printer for Printing? What Should I Do If the Desktop Cannot Be Connected? How Do I Log In to the Desktop for Maintenance Using VNC? What Should I Do If the Desktop Freezes When Using Workspace? How Do I Check the Network Status of Desktops? How Do I Change the Login Password? How Do I Change the Login Password (Mobile Client)? What Should I Do If I Forget the Password? What Should I Do If the Account Is Locked? Does Workspace Support Dual-Screen Display? What Should I Do If I Fail to Log In to the GPU Desktop Using an SC?...97 A Change History Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. iv

6 1 Introduction 1 Introduction 1.1 Concepts Workspace Concept Workspace is a cloud computing-based desktop service that outperforms personal computers (PCs) and the conventional Virtual Desktop Infrastructure (VDI) solution. Workspace provides the same configurations (including vcpus, GPUs, memory, and disks) as those of PCs and Windows OSs. Its familiarity ensures that you can use Workspace like using your own PCs. Different from the conventional local VDI solution, Workspace does not require high investment or a long deployment period. Workspace can automatically handle heavy deployment tasks and provide hosting services. Workspace supports access from multiple devices, including computers running Windows and Mac OSs, as well as ipads, iphones, and Android smart devices (For details, see Software Client, Thin Client, and Mobile Terminal). With Workspace, you can save and obtain files, and use applications anytime and anywhere, implementing mobile office. Procedure After you apply for Workspace, a secure and exclusive Workspace infrastructure server (For details, see AD Management Server) will be deployed and a dedicated elastic IP address used for accessing Workspace will be allocated to you. You can create an active directory (AD) domain (For details, see Infrastructure Server) on the cloud or use your local Microsoft AD domain when you apply for the Workspace service. With Workspace, you can effortlessly create and configure desktops (For details, see Desktop). Workspace provides packages of multiple types so that you can create desktops based on your requirements. After you apply for the Workspace service and desktops are successfully created, the system will notify the end users by . Principle Figure 1-1 illustrates basic principles of Workspace. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 1

7 1 Introduction Figure 1-1 Basic principles of Workspace Software Client Thin Client Mobile Terminal A software client (SC) runs on local PCs running Windows or Mac OSs and is used for logging in to and using Workspace. A thin client (TC) is a PC-standard-compliant computer that uses an embedded processor and small-sized flash memory and runs a simplified OS. It is used to access Workspace. The TC sends whatever entered by the mouse and keyboard to the backend server for processing and then the backend server returns the processing result to the display connecting to the TC. TCs of various models provide different performance, peripheral ports, and operation portals. The variety of TCs meets the requirements of different scenarios, such as common office, high security, and high-performance graphics design. A mobile terminal is a mobile device used for logging in to and using Workspace, including ipads, iphones, and Android smart devices Infrastructure Server An infrastructure server is automatically created when you apply for Workspace and runs components such as desktop management. Two infrastructure servers occupy two quotas, including two instances, eight cores, and 32 GB memory AD Management Server The active directory (AD) management server, an infrastructure component where the AD service is deployed, provides directory service functions for centralized organization management and network resource access. You can create an AD domain on the cloud or use your local Microsoft AD domain when you apply for the Workspace service. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 2

8 1 Introduction Desktop Regions and AZs Project A desktop is a virtual computer system where desktop agent software is installed and that can interact with desktop management components. Workspace deposits all desktops in the data center for unified management. End users can access the desktop by using SCs, browsers, TCs, or mobile terminals to obtain complete PClike user experience. A region is a geographic area where Workspace is located. Workspace services in the same region can communicate with each other over an intranet, but those in different regions cannot. HUAWEI CLOUD data centers are deployed worldwide in places such as North America, Europe, and Asia. Workspace is therefore available in different regions. For example, applications can be designed to meet user requirements in specific regions or comply with local laws or regulations. Each region contains many availability zones (AZs) where power and networks are physically isolated. AZs in the same region can communicate with each other over an intranet. Each AZ provides cost-effective and low-latency network connections that are unaffected by faults that may occur in other AZs. Using Workspace deployed in an independent AZ protects your applications against failures in a single place. Projects are used to group and isolate OpenStack resources (computing resources, storage resources, and network resources). A project can be a department or a project team. Multiple projects can be created for one account. 1.2 Application Scenarios Use of conventional PC desktops or the local VDI solution requires high investment and features difficult and complicated deployment and management. For Workspace, neither early investment nor continuous infrastructure management is required. You can apply for a complete set of cloud desktop computing services, such as computation and persistent storage, with certain fees, providing secure desktop experience with various access options for your users in simple and cost-effective ways. Workspace can be applied to mainstream industries including government and public utilities, telecommunications, energy, finance, transportation, medical care, education, broadcasting, media, and manufacturing. It is applicable to diversified scenarios, such as common office, security office, branch office, and public terminal (call center, business hall, and training classroom). Mobile office scenario Users can log in remotely to Workspace anytime and anywhere. Workspace is applicable for employees who are on business trips frequently and need to work in many locations. Short-term use scenario Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 3

9 1 Introduction Workspace and necessary application system services can be configured for short-term employees of enterprises. After the short-term employees leave, their services can be stopped. Security office automation (OA) scenario Workspace can provide enterprises with office solutions that comply with the enterprises' security standards. Permission to access physical devices can be controlled and data is not locally stored, thereby improving the security of enterprise data. Branch office scenario Workspace is applicable for employees who work in branches and external employees. They can log in to Workspace to access applications on the headquarters network. Data is not locally stored. High-definition (HD) graphics processing scenario Workspace provides 2D and 3D graphics processing capabilities for end users and supports multiple high-performance graphics software such as Computer Aided Design (CAD) and Geographic Information System (GIS), 3D game software, and omnimedia video editing software. Workspace can meet the high-performance graphics processing requirements of customers from multiple industries (including engineering, manufacturing, oil, automobile, medical care, game, and media). 1.3 Service Process and Function Overview Workspace provides two different operation pages for administrators and end users respectively. Administrators apply for the Workspace service, purchase desktops, manage desktops and users on the Workspace management console. End users log in to and use desktops on the web page. Figure 1-2 shows the processes for applying Workspace and purchasing a Workspace desktop. Figure 1-2 Operation process for administrators Figure 1-3 shows the process for logging in to and using a desktop. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 4

10 1 Introduction Figure 1-3 Operation process for end users Table 1-1 describes the functions provided by Workspace. Table 1-1 Function list Role Function Description Administrator End user Self-service service application Self-service desktop creation User login record query LiteAD authentication Customer AD diversification Policy management End user notification Windows 7 desktop experience Windows 10 desktop experience The administrator can apply for the Workspace service online in self-service mode. The administrator can create Workspace desktops online in self-service mode. User login information can be recorded, including login time and device types. The Linux-based AD can be used to implement username and password authentication. Existing Microsoft ADs of enterprises can be interconnected. The administrator can configure policies to manage devices such as printers and USB devices. The administrator can send notification s to new users who obtain desktops. The Windows 7 desktop experience based on the Windows Server 2008 R2 64-bit OS is provided. The Windows 10 desktop experience based on the Windows Server 2016 OS is provided. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 5

11 1 Introduction Role Function Description Multi-device access End users can access desktops by using PCs running Windows or Mac OSs and Android or ios mobile phones or tablets. 1.4 Accessing and Using Workspace How to Access Workspace HUAWEI CLOUD provides a web-based service management platform. Users can access Workspace by using a management console. For details about how to log in to the Workspace management console, see Logging In to the Workspace Management Console. You need to enable ports listed in Table 1-2 on the enterprise firewall so that end users can log in to the desktops properly. Table 1-2 Internet access ports Port Protocol Description 443 TCP Used by the end user to access the web login page TCP Used by the end user to access the desktop. NOTE By default, port 443 and port 8443 are used. If you want to change the ports, see Changing the Internet Access Port. Figure 1-4 shows how an end user accesses Workspace through a specified port. Figure 1-4 Accessing Workspace Workspace Packages Workspace Packages Workspace packages are resources that are packaged for leasing. Table 1-3 lists Workspace packages. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 6

12 1 Introduction Table 1-3 Workspace packages Package Type vcpu Memor y GPU System Disk Data Disk OS Economical 2 2 GB - 60 GB 100 GB Windows Standard 2 4 GB - 60 GB 100 GB Windows Advanced 4 8 GB - 60 GB 150 GB Windows Luxury 8 16 GB - 60 GB 200 GB Windows GPU A desktop GPU B desktop 4 8 GB M60-1Q (1 GB) 8 16 GB M60-2Q (2 GB) 80 GB 200 GB Windows 80 GB 200 GB Windows NOTICE When an order expires, a 7-day grace period is provided. Services in the grace period are still available. After the grace period elapses, a 15-day reservation period is provided. Resources in the reservation period are unavailable but retained. The resources are automatically deleted after the reservation period elapses and the order is not renewed. Charging Mode of AD Management Virtual Desktops Related Services For a normal order, AD management virtual desktops are not charged. If the administrator applies for the Workspace service but does not purchase desktops in more than 15 days, the AD management desktops will be reclaimed. The administrator must apply for Workspace again for subsequent use. ECS Elastic Cloud Server (ECS) is a computing server that consists of CPUs, memory, images, and Elastic Volume Service (EVS) disks, and supports on-demand allocation and elastic scaling. The Workspace service invokes ECS interfaces to create desktops. IMS Image Management Service (IMS) provides a simple and convenient self-service management function. In Workspace, desktops are created based on IMS. ELB Elastic Load Balance (ELB) is a service that automatically distributes access traffic to multiple ECSs to balance their service loads. It enables you to achieve greater levels of fault tolerance in your applications and expand application service capabilities. ELB is the access entry of Workspace from the Internet. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 7

13 1 Introduction VPC Virtual Private Cloud (VPC) provides virtual networks similar to conventional networks and advanced network services, such as elastic IP addresses, security groups, and virtual private networks (VPNs). The VPC service implements network isolation in logical mode and provides secure and isolated network environments for Workspace. DirectConnect Direct Connect (DirectConnect) is a service that allows you to establish a dedicated network connection from your data center to the cloud platform. With DirectConnect, potential network delays when Workspace is used are reduced, which provides a highperformance system to satisfy user experience. IAM Identity and Access Management (IAM) is a Web service. The administrator can apply this service to manage users and user rights. Only after an account is created through IAM can the administrator use related resources of Workspace. NAT gateway The NAT gateway provides the Network Address Translation (NAT) service for Workspace desktops in a VPC so that multiple Workspace desktops can share an EIP to access the Internet. Tag Management Service (TMS) Tag Management Service (TMS) is a visualized service for fast, unified tag management that enables you to control your resource permissions and billing across regions and services. Tags identify Workspace desktops so that the desktops can be categorized easily and searched quickly. CTS Cloud Trace Service (CTS) generates traces to enable you to get a history of operations performed on cloud service resources. The content of a trace includes operation requests sent using the management console or open APIs as well as the operation results. You can view all generated traces to query, audit, and backtrack performed operations. Cloud Eye User Permissions Cloud Eye is an open monitoring platform that helps you monitor the statuses of Workspace infrastructure servers in real time. Cloud Eye supports multiple alarm modes to ensure timely pre-warning and normal service running. HUAWEI CLOUD provides two types of user permissions by default: user management and resource management. User management refers to the management of users, user groups, and user group rights. Resource management refers to the control operations that can be performed by users on cloud service resources. For further details, see Permission Description. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 8

14 2 Getting Started 2 Getting Started 2.1 Logging In to the Workspace Management Console Scenario Procedure Log in to the Workspace management console. Step 1 Use the administrator account to log in to HUAWEI CLOUD. Step 2 Click in the upper-left corner of the management console and select Region and Project. Step 3 On the console home, locate Enterprise Application and select Workspace. The Workspace management console is displayed. ----End 2.2 Applying for the Workspace Service Scenario Prerequisites Apply for the Workspace service. After you apply for Workspace, a secure and exclusive Workspace infrastructure will be deployed and a dedicated elastic IP address used for accessing Workspace will be allocated to you. The AD is a necessary component used for managing users and desktops. You can create an AD on the cloud or use an existing AD. After you apply for the Workspace service, you can purchase Workspace desktops. When applying for Workspace, if the existing enterprise AD domain is used, refer to How Do I Interconnect Workspace with Microsoft AD? to enable related ports on the AD server and prepare the following data: Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 9

15 2 Getting Started Domain name Domain administrator's account and password Active domain controller IP address (Optional) Standby domain controller IP address Active DNS server IP address (Optional) Standby DNS server IP address Procedure Step 1 Step 2 Step 3 Log in to the Workspace management console. On the Dashboard page, click Click here to complete real-name authentication and complete real-name authentication as prompted. On the Dashboard page, click Apply for Workspace. The Apply for Workspace page is displayed. Step 4 Select an AZ based on actual conditions. NOTE An AZ is a physical region where resources use independent power supplies and networks. AZs are physically isolated but interconnected through an internal network, improving HA of applications. Step 5 Click View VPC to create a VPC and a subnet. For details about how to create a VPC, see the Virtual Private Cloud User Guide. NOTE You are advised to use 16-bit subnet gateways during VPC creation. After you apply for the Workspace service, do not modify the VPC configuration. Step 6 Click to refresh the drop-down list. Step 7 Configure the VPC. Select the VPC and Service Subnet created in Step 5 and enter Management Subnet. NOTE You can select multiple subnets to support more desktops. Use the subnet that is created in Step 5 and dedicated to Workspace. Do not use the subnet dedicated to other services. The service subnet is used by desktops to access applications and resources on ECSs or enterprises internets. The management subnet is used for internal communication among desktops. Step 8 Configure the AD domain. Check whether your enterprise has an AD domain. If yes, go to Step 10. If no, go to Step 9. Step 9 Create an AD domain. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 10

16 2 Getting Started Set the Domain Name, Domain Administrator Account, Domain Administrator Password, and Confirm Password parameters of the new AD domain. After an AD domain is created, go to Step 11. NOTE To ensure system security, you need to change the password periodically. You are advised to change the password every three months. Step 10 Connect to the existing domain. Set the Domain, Domain Administrator Account, Domain Administrator Password, Primary domain controller IP address, Backup domain controller IP address (optional), Active DNS IP address, and Standby DNS IP address (optional) parameters of the existing domain. NOTE When you use an existing AD domain, ensure that the related ports of the firewall are enabled. For details, see How Do I Interconnect Workspace with Microsoft AD?. Step 11 Specify the network access mode. By default, Internet access is selected. You can select multiple options. If the network quality does not meet requirements, you can select DirectConnect access. For details about the network quality requirements, see What Are the Network Requirements for Accessing the Desktop?. If GPU desktops are required, you must select DirectConnect access. NOTE The DirectConnect access mode provides the load balancing capability. Therefore, enterprises do not need to deploy third-party load balancers before access addresses. Step 12 Step 13 Step 14 Read the Huawei Workspace Service Agreement. Select I have read and agree to the Huawei Workspace Service Agreement. Click Apply Now. The Workspace service application is complete. NOTE ----End The application process takes about 40 minutes. The system creates WorkspaceManagerSecurityGroup and WorkspaceUserSecurityGroup security groups in the VPC during the application. WorkspaceManagerSecurityGroup is used for management components, and WorkspaceUserSecurityGroup is used for user desktops. By default, only virtual desktops in the WorkspaceUserSecurityGroup security group can access each other. If you want to access a virtual desktop in the security group from an external desktop, choose VPC > Security Groups to modify the configurations. 2.3 Purchasing Workspace Desktops Scenario Select and purchase related packages and assign desktops to end users after applying for the Workspace service. After the administrator creates desktops, end users will be informed by that Workspace desktops are provisioned. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 11

17 2 Getting Started Procedure Yearly/Monthly Step 1 Step 2 Log in to the Workspace management console. On the Overview or Desktop page, click Create Desktop. The Create Desktop page is displayed. Step 3 Step 4 Select Charging Mode to Yearly/Monthly. Select an AZ based on actual conditions. An availability zone (AZ) is a physical region where resources use independent power supplies and networks. AZs are physically isolated but interconnected through an internal network. If you create a desktop for the first time, you are advised to use the default value, that is, the optimal AZ recommended by the system. If you do not create a desktop for the first time, you are advised to create desktops in different AZs to improve application availability. Step 5 Step 6 Select the proper Specifications based on site requirements. Select the proper Image Type and OS based on site requirements. NOTE For details about the creation and maintenance of private images, see the Workspace Private Image Management Guide. The current version supports only private images with a 80 GB system disk. If the private images of the GPU type are required, select the GPU desktop package in Step 5. Step 7 Step 8 Check whether the user's existing AD domain is used in Workspace. If yes, go to Step 8. If no, go to Step 9. Set the OUs. Enter a maximum of 5 levels and separate levels from each other using a slash (/). Only letters, digits, spaces (not before or after a slash), and special characters including are allowed, for example, ab/cd/ef. Step 9 Step 10 Select a Service Subnet based on actual conditions. Add a tag based on actual conditions. For more information about tags, see the Tag Management Service User Guide. NOTE You can add a maximum of 10 tags to a desktop. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 12

18 2 Getting Started Table 2-1 Tag key and value requirements Parameter Key Value Requirement Cannot be left blank. Can contain a maximum of 36 characters. Can contain only the following character types: Uppercase letters Lowercase letters Numerals Special characters: hyphens (-) and underscores (_) Unicode characters The keys of a desktop must be different. Cannot be left blank. Can contain a maximum of 43 characters. Can contain only the following character types: Uppercase letters Lowercase letters Numerals Special characters: periods (.), hyphens (-), and underscores (_) Unicode characters Step 11 Assign desktops. You can manually add or batch import users. In a scenario where the existing AD domain is used, you need to create users on the AD server before assigning desktops. Manual input Set Username used for logging in to Workspace and used for receiving the notification . Select a user group from the drop-down list of User Group. You can grant different levels of access permission to users based on site requirements. The following describes the user group permission: Administrators: Administrator group. Administrators have complete access to the desktop and can make any desired changes except for forbidden operations. Users: Standard user group. Users in this group can use most software and change system settings that do not affect other users. NOTE You can click Add Desktop to add other desktops as required. A maximum of 10 desktops can be added each time. Each desktop belongs to one user only. Batch import. A maximum of 50 desktops can be added each time. Click Download Template. In the Excel template, enter values for columns A (Username), B ( ), and C (User Group) respectively. Save the settings and close the Excel template. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 13

19 2 Getting Started Upload the file. Step 12 Send notification s. By default, the system automatically sends notification s to users after desktops are subscribed. In a scenario where the existing AD domain is used, you can select or deselect Send Notification based on site requirements. Step 13 Step 14 Drag the slider to set Validity Period. Click Buy Now. The Confirm Order page is displayed. Step 15 Step 16 Step 17 Step 18 Check whether the values of Order Details and Price are correct. Read the Huawei Workspace Service Agreement. Select I have read and agree to the Huawei Workspace Service Agreement. Click Submit. The Pay page is displayed. Step 19 Step 20 You can pay for your order by using the following methods: Account balance payment Platform payment Online bank payment Transfer and remittance payment After you select a payment method and pay for your order, the Workspace service is purchased successfully. ----End Metered Step 1 Step 2 Log in to the Workspace management console. On the Overview or Desktop page, click Create Desktop. The Create Desktop page is displayed. Step 3 Step 4 Select Charging Mode to Metered. Select an AZ based on actual conditions. An availability zone (AZ) is a physical region where resources use independent power supplies and networks. AZs are physically isolated but interconnected through an internal network. If you create a desktop for the first time, you are advised to use the default value, that is, the optimal AZ recommended by the system. If you do not create a desktop for the first time, you are advised to create desktops in different AZs to improve application availability. Step 5 Step 6 Select the proper Specifications based on site requirements. Select the proper Image Type and OS based on site requirements. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 14

20 2 Getting Started NOTE For details about the creation and maintenance of private images, see the Workspace Private Image Management Guide. If the private images of the GPU type are required, select the GPU desktop package in Step 5. Step 7 Configure disks based on the actual requirements. Table 2-2 provides disk configuration details. Table 2-2 Disk configuration Category Description Disk Type Configuration Range (GB) System Disk Mandatory. Only one system disk can be configured based on the actual requirements. Common I/O: type of disks that use SATA storage. Ultra-high I/O: type of disks that use SSD storage. 80 to 32,768 Data Disk Optional. A maximum of 10 data disks can be configured based on the actual requirements. Common I/O: type of disks that use SATA storage. Ultra-high I/O: type of disks that use SSD storage. 100 to 32,768 Step 8 Step 9 Check whether the user's existing AD domain is used in Workspace. If yes, go to Step 9. If no, go to Step 10. Set the OUs. Enter a maximum of 5 levels and separate levels from each other using a slash (/). Only letters, digits, spaces (not before or after a slash), and special characters including are allowed, for example, ab/cd/ef. Step 10 Step 11 Select a Service Subnet based on actual conditions. Add a tag based on actual conditions. For more information about tags, see the Tag Management Service User Guide. NOTE You can add a maximum of 10 tags to a desktop. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 15

21 2 Getting Started Table 2-3 Tag key and value requirements Parameter Key Value Requirement Cannot be left blank. Can contain a maximum of 36 characters. Can contain only the following character types: Uppercase letters Lowercase letters Numerals Special characters: hyphens (-) and underscores (_) Unicode characters The keys of a desktop must be different. Cannot be left blank. Can contain a maximum of 43 characters. Can contain only the following character types: Uppercase letters Lowercase letters Numerals Special characters: periods (.), hyphens (-), and underscores (_) Unicode characters Step 12 Assign desktops. You can manually add or batch import users. In a scenario where the existing AD domain is used, you need to create users on the AD server before assigning desktops. Manual input Set Username used for logging in to Workspace and used for receiving the notification . Select a user group from the drop-down list of User Group. You can grant different levels of access permission to users based on site requirements. The following describes the user group permission: Administrators: Administrator group. Administrators have complete access to the desktop and can make any desired changes except for forbidden operations. Users: Standard user group. Users in this group can use most software and change system settings that do not affect other users. NOTE You can click Add Desktop to add other desktops as required. A maximum of 10 desktops can be added each time. Each desktop belongs to one user only. Batch import. A maximum of 50 desktops can be added each time. Click Download Template. In the Excel template, enter values for columns A (Username), B ( ), and C (User Group) respectively. Save the settings and close the Excel template. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 16

22 2 Getting Started Upload the file. Step 13 Send notification s. By default, the system automatically sends notification s to users after desktops are created. In a scenario where the existing AD domain is used, you can select or deselect Send Notification based on site requirements. Step 14 Click Create Desktop. The Confirm Specifications page is displayed. Step 15 Step 16 Check whether the value of Resource Details is correct. Click Submit. Desktops are created successfully. ----End 2.4 Logging In to a Desktop Using an SC Scenario Download, install, and configure an SC, and then log in to Workspace from the login address in the notification using the SC. Prerequisites NOTE When you access the Internet using a proxy, log in to your desktop by following the instructions in Logging In to a Desktop Using an SC (Using a Proxy for Internet Access). The procedure for logging into desktops in this section takes the Windows PC as an example. Operations for logging in to the SC on PCs running other operating systems are slightly different. Required software has been downloaded and installed. For details, see Table 2-4. Table 2-4 Software packages Software Package AccessClient.msi Description Applies to Windows PC How to Obtain AccessClient.msi Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 17

23 2 Getting Started Software Package AccessClient_x8 6lnx.run AccessClient_x6 4lnx.run Client_for_mac_ v1.6.xxxxx.dmg Description Applies to Linux PCs running the following operating systems: Red Hat bit Ubuntu bit Applies to Linux PCs running the following operating systems: Red Hat bit Ubuntu bit Applies to Mac PC How to Obtain AccessClient_x86lnx.run AccessClient_x64lnx.run Client_for_mac_v1.6.xxxxx.dmg Procedure Step 1 Step 2 After the cloud client software is installed, double-click the CloudClient icon on the desktop to start the SC. In the Address Manager window, click Add. In the Edit Server Info window that is displayed, set Server Name to a customized name and set Server Address to the address obtained from the notification . NOTE The Edit Server Info window is displayed automatically upon your first login to the desktop. Step 3 Click Ok to save the configuration information, as shown in Figure 2-1. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 18

24 2 Getting Started Figure 2-1 Edit server info Step 4 Step 5 Click Launch to go to the desktop login page. On the desktop login page, enter your domain account and password, and click Login to go to the desktop list page. Step 6 On the desktop list page, click to log in to the desktop, as shown in Figure 2-2. Figure 2-2 Desktop list ----End 2.5 Logging In to a Desktop Using an SC (Using a Proxy for Internet Access) Scenario Log in to a Workspace desktop using an SC when a proxy is used for Internet access. NOTE The procedure for logging into desktops in this section takes the Windows PC as an example. Operations for logging in to the SC on PCs running other operating systems are slightly different. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 19

25 2 Getting Started Prerequisites Required software has been downloaded and installed. For details, see Table 2-5. Table 2-5 Software packages Software Package AccessClient.msi AccessClient_x86 lnx.run AccessClient_x64 lnx.run Client_for_mac_v 1.6.xxxxx.dmg Description Applies to Windows PC Applies to Linux PCs running the following operating systems: Red Hat bit Ubuntu bit Applies to Linux PCs running the following operating systems: Red Hat bit Ubuntu bit Applies to Mac PC How to Obtain AccessClient.msi AccessClient_x86lnx.run AccessClient_x64lnx.run Client_for_mac_v1.6.xxxxx.dmg Procedure Step 1 Step 2 After the cloud client software is installed, double-click the CloudClient icon on the desktop to start the SC. In the Address Manager window, click Add. The Edit Server Info window is displayed. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 20

26 2 Getting Started Figure 2-3 Editing server information Step 3 Step 4 Step 5 Set Server Name to a customized name and set Server Address to the address obtained from the notification . Click Ok. On the Address Manager page, select the newly added server address and click Launch. The window for logging in to the desktop is displayed. Step 6 Tap in the upper-right corner. The Settings dialog box is displayed. Step 7 On the Network tab page, select Enable HTTP Proxy. Figure 2-4 Enabling HTTP proxy Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 21

27 2 Getting Started Step 8 Step 9 Step 10 Step 11 Click Yes. Enter the value for Host, Port, User Name, and Password of the proxy server obtained from the administrator. Click Ok. On the desktop login page, enter your domain account and password, and click Login to go to the desktop list page. Step 12 On the desktop list page, click to log in to the desktop, as shown in Figure 2-5. Figure 2-5 Desktop list ----End 2.6 Logging In to a Desktop Using a Browser Scenario Log in to a Workspace desktop using a browser. Use Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, Internet Explorer 11, and Mozilla Firefox 14 or later to log in to desktops. NOTE When you use a proxy for Internet access, you cannot log in to your desktop using a browser. Instead, you can log in to your desktop following the instructions in Logging In to a Desktop Using an SC (Using a Proxy for Internet Access). Procedure NOTE A Windows PC is used as an example in the following steps. The specific operation steps may be different on different OSs. Step 1 Open the browser, enter the desktop login address obtained from the notification in the address box, and press Enter. The window for logging in to the desktop is displayed. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 22

28 2 Getting Started NOTICE If a dialog box indicating a plug-in running request is displayed in the browser, enable the plug-in to avoid any effect on proper login and use. Step 2 Enter your domain account and password, and click Login, as shown in the following figure. Step 3 Download the client plug-in upon the first login, as shown in the following figure. Step 4 On the desktop list page, click to log in to the desktop, as shown in the following figure. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 23

29 2 Getting Started ----End 2.7 Logging In to a Desktop Using a TC Scenario Procedure Log in to a Workspace desktop using a TC. Step 1 Step 2 Step 3 Step 4 Connect all cables and power on the TC. Click Start, and choose Control Center. In Control Center, select Cloud Client. Click Add. In the Edit Server Info window that is displayed, set Server Name to a customized name and set Server Address to the address obtained from the notification . Step 5 Step 6 Step 7 Click Ok to save the configuration information. Click Launch to go to the desktop login page. On the desktop login page, enter your domain account and password, and click Login to go to the desktop list page. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 24

30 2 Getting Started Step 8 On the desktop list page, click to log in to the desktop. ----End 2.8 Logging In to a Desktop Using a Mobile Terminal (Android) Scenario Procedure FusionAccess is an application installed on a mobile terminal and used for accessing and using Workspace desktops. If you need to use Workspace desktops to work at home or during your trips, you can download FusionAccess to your Android device and use it to access and use Workspace desktops. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Open the application store on your Android mobile terminal. Search for FusionAccess. Download and install the FusionAccess desktop client software. After the FusionAccess software is installed, open the software on your Android mobile terminal. Tap Add Account. On the Add page that is displayed, set Label to customized description, set Address and User Name to the address and username obtained from the notification , and set Password to the new password. Tap save in the upper-right corner to save the configuration. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 25

31 2 Getting Started Step 8 On the home page of the FusionAccess software, tap the Label you set to log in to the desktop. The following figure shows the functions of the shortcut menus on the desktop. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 26

32 2 Getting Started ----End 2.9 Logging In to a Desktop Using a Mobile Terminal (ios) Scenario Procedure FusionAccess is an application installed on a mobile terminal and used for accessing and using Workspace desktops. If you need to use Workspace desktops to work at home or during your trips, you can download FusionAccess to your ios devices and use it to access and use Workspace desktops. Step 1 Step 2 Step 3 Step 4 Step 5 Open App Store on your ios mobile terminal. Search for FusionAccess. Download and install the FusionAccess desktop client software. After the FusionAccess software is installed, open the software on your ios mobile terminal. Tap New Account. Step 6 Tap in the upper-right corner. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 27

33 2 Getting Started The New Account page is displayed. Step 7 Step 8 Set Description to customized description, set Address and User Name to the address and username obtained from the notification , and set Password to the new password. Tap Save in the upper-right corner to save the configuration. Step 9 On the home page of the FusionAccess software, tap the desktop description you set to log in to the desktop. The following figure shows the functions of the shortcut menus on the desktop. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 28

34 2 Getting Started ----End Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 29

35 3 Operation Guide (Administrators) 3 Operation Guide (Administrators) 3.1 Overview Configuration Information After applying for the Workspace service, view statistics information about Workspace, including the configuration information, desktop status, and number of online users on the Dashboard page. Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 In the Configuration Information area, view Workspace network configurations and AD domain configurations. Desktop Status ----End Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 In the Status area, Workspace displays the Login Status and Running Status of the desktop in pie charts. Table 3-1 describes the meaning of each status. Table 3-1 Desktop status Category Status Description Login Status In use Indicates that a user has successfully logged in to the desktop and is using the desktop. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 30

36 3 Operation Guide (Administrators) Category Status Description Running Status Unregistered Ready Disconnected Running Stopped Faulty Indicates that the desktop is stopped or faulty. A desktop automatically registers with the infrastructure server after being started up. Indicates that the desktop has been registered with and connected to the infrastructure server and is waiting for the user to log in. Indicates that the desktop is disconnected from the terminal because the user closes the window of the terminal or the network connection between the terminal and the desktop is interrupted. Indicates that the desktop runs properly. Indicates that the desktop is stopped. Indicates that the desktop is faulty. You can restart the desktop or contact technical support engineers to rectify the fault. ----End Number of Online Users Step 1 Step 2 Step 3 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. In the Online Users area, view the number of online users by day, week, or month. ----End 3.2 Managing Desktops Scenario Procedure Start, stop, restart, or delete a desktop, add disks to a desktop, manage tags, or change desktop specifications. You can search for and view a desktop based on the tag added during desktop creation. Step 1 Step 2 Step 3 Log in to the Workspace management console. Click Desktop. The Desktop page is displayed. In the upper-right corner of the desktop list, select Assigned user, enter a keyword, and click. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 31

37 3 Operation Guide (Administrators) Step 4 Select a desktop, and click Start/Stop/Restart/Delete/Add Disk/Modify Specifications in the upper-left corner of the desktop list or in the Operation column. NOTE When performing the Stop Desktop operation, determine whether to select Forcibly stop based on site requirements. When performing the Restart Desktop operation, determine whether to select Forcibly restart based on site requirements. When performing the Delete Desktop operation, determine whether to select Delete the user based on site requirements. You can add disks (data disks) to the desktop whose status is Running and user group is Administrators only. Each desktop can have a maximum of 10 data disks. You can change specifications for desktops whose status is Stopped only and can only make them more advanced. Step 5 Click in the row that contains the desktop, click the Tag tab, and add tags to, delete tags from, or edit or view the tags of the desktop. NOTE You can add tags to, delete tags from, or edit the tags of the desktops whose Running Status is Running, Stopped, or Creating. View tags. You can view details of desktop tags, including the number of tags and the key and value of each tag. Add a tag. Click Add in the upper left corner. In the displayed dialog box, enter the key and value of the tag to be added, and click OK. Edit a tag. Locate the row containing the tag to be edited and click Edit in the Operation column. In the Edit Tag dialog box, change the value of the tag and click OK. Delete a tag. Locate the row containing the tag to be deleted and click Delete in the Operation column. In the Delete Tag dialog box, click OK. Step 6 Confirm the displayed information. ----End 3.3 Managing Users Scenario View the number of desktops owned by a user, change the address, export data, reset the password, unlock the account, send the notification or delete the account for a created user. NOTE If the enterprise uses an existing AD domain, the password reset and account unlocking functions are not supported. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 32

38 3 Operation Guide (Administrators) Procedure Changing an address You can change an address if the address provided by a user is incorrect or cannot receive s. Step 1 Step 2 Log in to the Workspace management console. Click User. The User Management page is displayed. Step 3 In the row that contains the user whose address you want to change and click Modify. The Modify User Information dialog box is displayed. Step 4 Step 5 In the Address text box, enter the new address. Click OK. The user receives an address change notification. ----End Exporting data You can batch export user data, including the username, address, and the number of desktops. Step 1 Step 2 Log in to the Workspace management console. Click User. The User Management page is displayed. Step 3 Click Export Account. The system exports user information to a local computer. ----End Resetting a password You can reset the password of a user when the user loses or forgets the login password. NOTICE Password resetting is risky. After being reset, the original password cannot be used. Confirm that the operation is necessary. Step 1 Step 2 Log in to the Workspace management console. Click User. The User Management page is displayed. Step 3 In the row that contains the user whose password needs to be reset, click More > Reset Password. The dialog box for password resetting is displayed. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 33

39 3 Operation Guide (Administrators) Step 4 Click OK. The password resetting link will be sent to the user's address automatically by the system. NOTICE The validity period of the password resetting link in the is 24 hours. Reset the password in a timely manner. ----End Unlocking an account You can unlock the account for a user when the user's account is locked because the user enters an incorrect password consecutively. Step 1 Step 2 Log in to the Workspace management console. Click User. The User Management page is displayed. Step 3 In the row that contains the user whose account needs to be unlocked, click More > Unlock. The dialog box for account unlocking is displayed. Step 4 Click OK. ----End Sending a notification You can send a notification when the user already has a desktop and the for notifying the user of the desktop creation needs to be sent again. Step 1 Step 2 Log in to the Workspace management console. Click User. The User Management page is displayed. Step 3 In the row that contains the user to whom the notification needs to be sent, click More > Resend Notification . The dialog box for sending the is displayed. Step 4 Click OK. ----End Deleting an account You can delete a specific account as required. You cannot delete a user if the user has desktops. Step 1 Step 2 Log in to the Workspace management console. Click User. The User page is displayed. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 34

40 3 Operation Guide (Administrators) Step 3 In the row that contains the user whose account needs to be deleted, click More > Delete (If the enterprise uses an existing AD domain, click Delete). The dialog box for user information deletion is displayed. Step 4 Click OK. ----End 3.4 Viewing User Login Records Scenario View user login records to obtain the desktop running status and user login status. This helps troubleshooting and system maintenance. Procedure Step 1 Step 2 Step 3 Log in to the Workspace management console. Click User Login Record. The User Login Record page is displayed. View user login records, including Desktop Name, Login User, Terminal IP Address, Terminal System Type, Connection Start Time, Connection End Time, and Failure Cause. ----End 3.5 Managing Policies Scenario Configure policies such as USB Port Redirection, Printer Redirection, File Redirection, and Clipboard Redirection to control the permission on data transmission and peripheral access between user terminals and Workspace. Procedure Step 1 Step 2 Log in to the Workspace management console. Click Policy. The Policy page is displayed. Step 3 On the Policy page, click the following button to enable or disable a policy. Table 3-2 describes the policies. indicates that the policy is enabled. indicates that the policy is disabled. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 35

41 3 Operation Guide (Administrators) Table 3-2 Policy management Policy Type Policy Parameter Policy Description USB port redirection Printer redirection Universal printer driver File redirection Clipboard redirection Graphics devices (such as scanners) Video devices (such as cameras) Print devices (such as printers) Storage devices (such as USB flash drives) Smartcard devices (such as Ukeys) Sync Client Default Printer Default HDP XPSDrv Driver Universal Printing PCL 5 Universal Printing PCL 6 Universal Printing PS Fixed Drive (such as local disks) Removable drive (such as USB flash drives) CD/DVD-ROM drives Network Drive Server to client Users can use USB graphics devices by using USB port redirection on desktops. Users can use USB video devices by using USB port redirection on desktops. Users can use USB print devices by using USB port redirection on desktops. Users can use USB storage devices by using USB port redirection on desktops. Users can use smartcard devices by using USB port redirection on desktops. Users can use printers by using printer redirection (a policy of device redirection) on desktops. When Default is selected, Universal Printing PS will be loaded if printer redirection is enabled on Linux clients, and HDP XPSDrv Driver will be loaded if printer redirection is enabled on Windows clients. NOTICE To use the printer service, you need to ensure that all end users use SCs running the same OS to log in to Workspace. Redirects client fixed drives. Redirects client removable drives, such as USB flash drives and removable hard disks. Redirects client CD-ROM drives. Redirects client network drives. After the redirection is enabled, end users can copy data on desktops and paste the data on clients. However, data copied on clients cannot be pasted on desktops. That is, the one-way clipboard function from the server to the client is supported. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 36

42 3 Operation Guide (Administrators) Policy Type Policy Parameter Policy Description HDP Plus Display level Advanced policies Client to server Enable Bidirection Disable Enable Disable (default) Smoothness first (default) Image quality first Bandwidth Frame Rate Video Frame Rate Smoothing Factor Lossy Compression Quality After the redirection is enabled, end users can copy data on clients and paste the data on desktops. However, data copied on desktops cannot be pasted on clients. That is, the one-way clipboard function from the client to the server is supported. After the redirection is enabled, end users can copy data on clients and paste the data on desktops, and data copied on desktops can also be pasted on clients. That is, the two-way clipboard function between the client and the server is supported. Disables the clipboard redirection. This option only applies to video editing scenarios. Balances display quality and bandwidth requirement. The recommended bandwidth is 20,000 kbit/s. Provides best display quality but requires highest bandwidth. The recommended bandwidth is 25,000 kbit/s. For details about how to set video image quality and smoothness, see Table 3-3. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 37

43 3 Operation Guide (Administrators) Table 3-3 Advanced policies Policy Name Default Value Range Description Bandwidth (kbit/s) This policy is available only when the HDP Plus policy is disabled. Smoothness first: 20,000 Quality first: 25, to 25,000 Specifies the data code stream limit. Increasing this value improves user experience but consumes more bandwidth resources. For this reason, if the network bandwidth is insufficient, increasing this value compromises the smoothness. The default value is recommended. Frame Rate (fps) This policy is available only when the HDP Plus policy is disabled. Video Frame Rate (fps) This policy is available only when the HDP Plus policy is disabled. Smoothness first: 25 Quality first: 30 Smoothness first: 30 Quality first: to 30 Specifies the frame rate in non-video scenarios. Increasing this value improves image smoothness but consumes more bandwidth resources. For this reason, if the network bandwidth is insufficient, increasing this value compromises the smoothness. The default value is recommended. 15 to 50 Specifies the video frame rate. Increasing this value improves image smoothness but consumes more bandwidth resources. For this reason, if the network bandwidth is insufficient, increasing this value compromises the smoothness. The default value is recommended. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 38

44 3 Operation Guide (Administrators) Policy Name Default Value Range Description Smoothing Factor This policy is available only when the HDP Plus policy is disabled. Lossy Compression Quality Smoothness first: 60 Quality first: 60 Smoothness first: 85 Quality first: 90 0 to 60 Specifies the static image quality. Decreasing this value improves image quality but consumes more bandwidth resources, and compromises the smoothness. 70 to 90 Specifies the static natural image quality. Increasing this value improves image quality but consumes more bandwidth resources, and compromises the smoothness. Step 4 Click Save to save the configured policy information. An end user must relog in to the desktop for the new policy to take effect. ----End 3.6 Restoring Infrastructure Server Data Scenario If a system fault occurs, use data that is automatically backed up to restore the infrastructure servers. NOTICE After you restore the data of infrastructure servers: The desktop data and user data generated after the backup point in time are not stored. If the desktop data or user data is incorrect, follow the instructions or contact technical support engineers to rectify the fault. Enabled or disabled policies may be restored to the state before the backup point in time. If this happens, configure the policies again. For details, see Managing Policies. An end user cannot use the password set after the backup point in time to log in to the desktop. Inform the end user to use the password set before the backup point in time to log in to the desktop or reset the password. Procedure Step 1 Log in to the Workspace management console. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 39

45 3 Operation Guide (Administrators) Step 2 Click Infrastructure. The Infrastructure page is displayed. Step 3 Click Restore. The Restore page is displayed. Step 4 Step 5 Choose the time point when you want to restore the data of infrastructure servers from the Backup Time Point drop-down list. Select I understand the impact and want to continue and click OK. Disk data is restored to the last backup point in time. ----End 3.7 Changing the Internet Access Port Scenario Procedure On the Workspace management console, change the Internet access port based on the plan. Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 In the Network area, click Modify next to Internet Access Port. The Internet access port changing dialog box is displayed. Step 4 Step 5 Change the HTTPS access port or Access Gateway (AG) port based on the plan. The port ID can be 80 or 443, or ranges from 1024 to 65,535. Click OK. ----End 3.8 Changing the Service Subnet Scenario Procedure On the Workspace management console, change the service subnet based on the plan. Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 40

46 3 Operation Guide (Administrators) Step 3 Step 4 Step 5 In the Network area, click Modify next to Service Subnet. Select a desired service subnet based on your planned subnet information. Click OK. ----End 3.9 Configuring Two-Factor Authentication Scenario Two-factor authentication indicates the Domain account + Dynamic password authentication. In the scenario where Workspace is connected to an existing AD server, you can enable twofactor authentication as required to enhance system security. NOTE Two-factor authentication only applies to the scenario where dynamic password authentication using the customer's Radius authentication server based on the standard Radius protocol is required. Procedure Enabling dual-factor authentication Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 Click Modify next to Two-factor authentication. The Two-factor authentication dialog box is displayed. Step 4 Click to enable two-factor authentication and set the following parameters. Table 3-4 Parameters to be configured Parameter Description Example Value Radius server address Port The Radius server is a twofactor authentication server used for dynamic password authentication based on the Radius protocol. Indicates the IP address of the Radius server. Indicates the port used for communication between the Radius server and the Web login page of end users Default: 1812 Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 41

47 3 Operation Guide (Administrators) Parameter Description Example Value Shared secret code Confirm shared secret code Authentication type Indicates the password used for authentication between the Radius server and client. Enter the shared password again. Indicates the password authentication protocol. - - Only PAP is supported. Server timeout(in seconds) 1 to 999. Max retries 1 to 999. Configure it based on latencies of the Web login page of end users and Radius server. Indicates the maximum number of retries upon connection failure between the Web login page of end users and Radius server. Recommended value: 10 Recommended value: 2 Step 5 Click OK. Two-factor authentication is enabled. ----End Disabling dual-factor authentication Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 Click Modify next to Two-factor authentication. The Two-factor authentication dialog box is displayed. Step 4 Click to disable two-factor authentication. Step 5 Click OK. Two-factor authentication is disabled. ----End Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 42

48 3 Operation Guide (Administrators) 3.10 Changing the Password of a Domain Administrator Scenario The password of a domain administrator needs to be changed periodically to ensure system security. You are advised to change the password every three months. Change the password of a domain administrator on the Workspace management console. Procedure NOTE If the enterprise uses an existing AD domain, the period for changing the password of the domain administrator depends on the preset password policy. Change the domain administrator password on the AD server first, and then perform the following operations. Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 Click Modify in the lower right corner of AD Domain. The Modify Password dialog box is displayed. Step 4 Set Old Password, New Password, and Confirm New Password, and click OK. ----End 3.11 Monitoring Workspace Monitoring Metrics Table 3-5 describes Workspace monitoring metrics. Table 3-5 Workspace monitoring metrics Metric Description Value Range Monitored Object CPU usage Measures the CPU usage of a monitored object (unit: %). 0% to 100% Infrastructure server Memory usage Measures the memory usage of a monitored object (unit: %). 0% to 100% Infrastructure server Disk usage Measures the disk usage of a monitored object (unit: %). 0% to 100% Infrastructure server IOPS Measures the number of I/O operations per second on a monitored object. 0 counts Infrastructure server Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 43

49 3 Operation Guide (Administrators) Metric Description Value Range Monitored Object Network input throughput Measures incoming network traffic of a monitored object per second (unit: bytes/s). 0 bytes/s Infrastructure server Network output throughput Measures outgoing network traffic of a monitored object per second (unit: bytes/s). 0 bytes/s Infrastructure server Setting Alarm Rules Scenarios Procedure Setting alarm rules for Workspace infrastructure servers allows you to customize the monitored objects and notification policies and determine the running status of your infrastructure server at any time. An infrastructure server alarm rule includes the alarm rule name, monitored object, metric, threshold, monitoring interval, and whether to send a notification. This section describes how to set alarm rules for infrastructure servers. Step 1 Step 2 Step 3 Step 4 Log in to the management console. Choose Management & Deployment > Cloud Eye. In the navigation pane on the left, choose Alarm Management > Alarm Rules. On the displayed Alarm Rules page, click Create Alarm Rule. For details about how to configure alarm parameters, see the Cloud Eye User Guide. ----End Viewing Monitoring Metrics Scenarios Prerequisites Cloud Eye provided by the public cloud monitors the running statuses of Workspace infrastructure servers. You can obtain the monitoring metrics of each infrastructure server on the management console. Monitored data requires a period of time for transmission and display. The status of an infrastructure server displayed on the Cloud Eye page is the status obtained 5 10 minutes before. If your Workspace service has just been enabled, that is, your infrastructure server has just been created, wait for 5-10 minutes and check the monitoring data. The infrastructure server is running properly for about 10 minutes. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 44

50 3 Operation Guide (Administrators) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Log in to the management console. Choose Management & Deployment > Cloud Eye. In the navigation pane on the left, choose Cloud Service Monitoring > Workspace. Click View Graph in the Operation column of the infrastructure server whose monitoring details you want to view. In the Workspace monitoring area, you can select a duration to view the monitoring data. You can view the monitoring data of an infrastructure server in the recent 1 hour, 3 hours, or 12 hours. To view the monitoring curve of a longer time range, click to enlarge the graph. ----End 3.12 Recording Workspace Operations Key Operations Recorded by CTS CTS records operations related to Workspace for further query, audit, and backtrack operations. Table 3-6 Workspace operations that can be recorded by CTS Operation Resource Type Trace Name Start a desktop. workspace startdesktop Shut down a desktop. workspace shutdowndesktop Restart a desktop. workspace rebootdesktop Purchase a desktop. workspace ordervm Subscribe to the service. workspace openservice Update a desktop. workspace updatedesktopstatus Modify the user information. workspace modifyuserinfo Delete a user. workspace deleteuser Unlock a user. workspace unlockuser Reset a password. workspace resetuserpassword Export the user information. Download a user template. workspace workspace exportuserinfo downloadusermould Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 45

51 3 Operation Guide (Administrators) Operation Resource Type Trace Name Update a policy. workspace updatepolicy Modify the domain controller information. workspace updateadpwd Deregister a tenant. workspace tenantclose Delete a desktop. workspace deletedesktop Update the desktop metadata information. workspace updatedesktopmetadata Delete a task. workspace deletejob Synchronize IAM resource tenants. Change the password of a domain user. Tenants retry tasks about the service. Restore an infrastructure VM. Modify desktop properties. Modify the Internet access address. workspace workspace workspace workspace workspace workspace syniamresourcetenant updatedomainuserpassword tenantretryservicetask restoremanagervmbackup modifydesktopattributes modifyinternetaddress Update the access mode. workspace updateaccessway Update a port. workspace changeinternetaccessport Clear a tenant's resources. Add data disks to a desktop. workspace workspace cleanuptenantresources addvolumes Send s to a user. workspace send Modify the bandwidth. workspace modifybandwidth Enable Internet access. workspace adjustaccessmode Change desktop specifications. Modify the Radius server information. workspace workspace resizedesktop modifyradius Modify a subnet. workspace updatesubnets Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 46

52 3 Operation Guide (Administrators) Operation Resource Type Trace Name Create a tag. workspace createtag Delete a tag. workspace deletetag Update a tag. workspace updatetag Perform operations on tags in batches. workspace operationtagbatch Implement an order. workspace orderimplementation CTS Traces Scenarios Procedure After CTS is enabled, CTS starts recording operations on cloud resources. The CTS management console stores the last seven days of operation records. This section describes how to query the last seven days of operation records on the CTS console. Step 1 Log in to the management console. Step 2 In the upper left corner of the page, click and select the desired region and project. Step 3 Step 4 Step 5 Click Service List. Under Management & Deployment, choose Cloud Trace Service. Choose Trace List in the navigation pane on the left. Specify the filters used for querying traces. The following four filters are available: Trace Source, Resource Type, Search By, and Operator Select the filter from the drop-down list. When you select Trace name for Search By, you also need to select a specific trace name. When you select Resource ID for Search By, you also need to select or enter a specific resource ID. When you select Resource name for Search By, you also need to select or enter a specific resource name. Operator: Select a specific operator (a user rather than tenant). Trace Status: Available options include all trace status, normal, warning, and incident. You can only select one of them. Start time and end time: You can specify the time period for query traces. Step 6 Click on the left of the record to be queried to extend its details. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 47

53 3 Operation Guide (Administrators) Step 7 Locate a trace and click View Trace in the Operation column. ----End 3.13 Canceling Workspace Scenario Procedure If Workspace is no longer needed, delete the user desktops and perform the following steps to cancel Workspace. Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 In the Configuration Information area, click Cancel Workspace. The Cancel Workspace dialog box is displayed. Step 4 Click OK. ----End Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 48

54 4 Operation Guide (End Users) 4 Operation Guide (End Users) Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 49

55 4 Operation Guide (End Users) 4.1 Introduction to Workspace Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 50

56 4 Operation Guide (End Users) Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 51

57 4 Operation Guide (End Users) Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 52

58 4 Operation Guide (End Users) 4.2 Introduction to Terminals Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 53

59 4 Operation Guide (End Users) Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 54

60 4 Operation Guide (End Users) 4.3 Risky Operations Workspace desktops provide on-demand services based on network resources and work depending on OSs and network configurations in desktops. This section describes some risky operations on desktops. Risky Operations (Processes and Services) 1. Change the default service and startup options in the system configuration. Figure 4-1 shows the Services and Startup options. Figure 4-1 Services and startup 2. Disable HDP services shown in Figure 4-2. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 55

61 4 Operation Guide (End Users) Figure 4-2 HDP services 3. Uninstall programs shown in Figure 4-3. Figure 4-3 Programs 4. End the LOCAL SERVICE, NETWORK SERVICE, or SYSTEM processes in Task Manager. Figure 4-4 shows the processes that cannot be ended. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 56

62 4 Operation Guide (End Users) Figure 4-4 Task Manager Risky Operations (Network) 1. Disable NICs, and disable or modify network configurations, as shown in Figure 4-5. Figure 4-5 Local connection Risky Operations (Others) 2. Run the script or command for modifying a route, such as route DELETE *. 3. Delete ports 28511, 28512, 28521, and from Windows firewall exception options. 4. Enable software or tools, such as the IPsec, that can restrict network traffic. 1. Delete files or folders in C:\Program Files\Huawei listed in Figure 4-6. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 57

63 4 Operation Guide (End Users) Figure 4-6 Folders 2. Enable the sleep function on desktops. The sleep function is disabled for desktops by default, as shown in Figure 4-7. Figure 4-7 Sleep function 3. Modify the configuration file of the HDP client (AccessAgent). 4. Run Rabbit Magic or Wopti Utilities to clean or optimize the registry. 5. Install a customized screensaver with complex transformation functions, which consumes system resources and causes a delay in desktop access. 4.4 Failure When Connecting to Desktops During the use of Workspace desktops, desktops may fail to be connected due to misoperations. If this happens, you can click problem. to restart the desktops to resolve the NOTE If desktops cannot be restarted or you cannot log in to the desktops after they are restarted, click to forcibly restart the desktops. Data that is not saved may be lost after the desktops are forcibly restarted. Therefore, exercise caution when forcibly restarting desktops. 4.5 Dual-Screen Display Configuration When accessing Workspace desktops using TCs, perform the following operations to configure dual-screen display. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 58

64 4 Operation Guide (End Users) Prerequisites Table 4-1 lists the materials required for configuring dual-screen display. Table 4-1 Materials required for configuring dual-screen display Item Quantit y Image (Example) Description TC 1 - Monitor/Converter 2 Typically, a monitor provides a DVI-D port and a VGA port. If two monitors have only VGA ports in some special cases, a DVI-D-to- VGA converter is required. DVI-I one-to-two cable 1 Converts DVI-I signals to DVI-D and VGA signals. DVI-D-to-DVI-D cable 1 - VGA-to-VGA cable 1 - Procedure Dual-Screen Connection Step 1 Connect a TC to monitors based on the monitor type. If the monitors provide DVI and VGA ports, go to Step 2. If the monitors provide VGA ports only, go to Step 3. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 59

65 4 Operation Guide (End Users) Step 2 Connect the TC to the monitors, as shown in Figure 4-8. Figure 4-8 Dual-screen connection Step 3 Connect the TC to the monitors, as shown in Figure 4-9. Figure 4-9 Dual-screen connection ----End TC Setting Step 1 Step 2 Step 3 Step 4 Step 5 Power on the TC. Perform the following operation based on the TC type. Linux TC: Perform Step 3 to Step 7. Windows TC: Perform Step 8to Step 10 Click Start, and choose Control Center. Double-click Display. Select Optimum settings. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 60

66 4 Operation Guide (End Users) Step 6 Step 7 Step 8 Step 9 Select the display mode based on site requirements. Duplicate Extend Select the main monitor based on site requirements. DVI VGA The task is completed. Right-click on the desktop and choose Screen Resolution. Set Multiple displays based on site requirements. Duplicate these displays Extend these displays NOTE Only Extend these displays can be selected when two desktops and dual-screen display are used. Step 10 Click OK. ----End Client Setting Step 1 Step 2 Step 3 Step 4 Step 5 Perform the following operation based on the dual-screen display scenario. If a desktop and two screens are used, go to Step 2. If two desktops and two screens are used, go to Step 6. Log in to the desktop using the client. Click Settings. Select Open Multiple Monitor (The configuration will take effect after reconnect). Click Close. The task is completed. Step 6 Step 7 Step 8 Step 9 Log in to a desktop using the client. Click Settings. Deselect Open Multiple Monitor (The configuration will take effect after reconnect). Click Close. Step 10 Log in to the other desktop and repeat Step 6 to Step 9. Step 11 Drag the two desktops to different screens to achieve dual-screen display. ----End Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 61

67 4 Operation Guide (End Users) Others 4.6 HDPDeviceHelper Peripheral Assistant If you encounter peripheral configuration problems when using Workspace, you can use HDPDeviceHelper. Choose Start > Huawei vdesk. Start HDPDeviceHelper and configure peripherals following the instructions. Figure 4-10 vdesk Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 62

68 5 FAQs (Administrators) 5 FAQs (Administrators) 5.1 What Is Workspace? Workspace is a cloud computing-based desktop service that outperforms personal computers (PCs) and the conventional VDI solution. Workspace provides the same configurations (including vcpus, GPUs, memory, and disks) as those of PCs and Windows OSs. Its familiarity ensures that you can use Workspace like using your own PCs. Different from the conventional local VDI solution, Workspace does not require high investment or a long deployment period. Workspace can automatically handle heavy deployment tasks and provide hosting services. Workspace supports access from multiple devices, including computers running Windows and Mac OSs, as well as ipads, iphones, and Android smart devices. With Workspace, you can save and obtain files, and use applications anytime and anywhere, implementing mobile office. 5.2 What Are the Features and Advantages of Workspace? A web-based management console is provided for you to flexibly enable and disable Workspace that works out of the box. Workspace provides the following features and advantages: Workspace can be provisioned and deployed quickly whereas deploying conventional private desktop clouds takes several days. Administrators can manage hundreds of desktops at the same time using the web page. Multiple desktop package specifications are available for you to choose the most appropriate one (vcpus, GPUs, memory, system disks, and data disks). The password can be reset if a user forgets it. Encrypted remote access, isolated user resources, and network and peripheral security control are used to ensure high security of data access. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 63

69 5 FAQs (Administrators) 5.3 What Is the Process of Using Workspace? Administrators only need to apply for Workspace and purchase desktops before using desktops, as shown in Figure 5-1. End users can use desktops after completing basic configurations on clients, as shown in Figure 5-2. Figure 5-1 Workspace use process on servers Figure 5-2 Workspace use process on clients 5.4 What Are Workspace Packages? Workspace Packages Workspace packages are resources that are packaged for leasing. Table 5-1 lists Workspace packages. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 64

70 5 FAQs (Administrators) Table 5-1 Workspace packages Package Type vcpu Memor y GPU System Disk Data Disk OS Economical 2 2 GB - 60 GB 100 GB Windows Standard 2 4 GB - 60 GB 100 GB Windows Advanced 4 8 GB - 60 GB 150 GB Windows Luxury 8 16 GB - 60 GB 200 GB Windows GPU A desktop GPU B desktop 4 8 GB M60-1Q (1 GB) 8 16 GB M60-2Q (2 GB) 80 GB 200 GB Windows 80 GB 200 GB Windows NOTICE When an order expires, a 7-day grace period is provided. Services in the grace period are still available. After the grace period elapses, a 15-day reservation period is provided. Resources in the reservation period are unavailable but retained. The resources are automatically deleted after the reservation period elapses and the order is not renewed. Charging Mode of AD Management Virtual Desktops For a normal order, AD management virtual desktops are not charged. If the administrator applies for the Workspace service but does not purchase desktops in more than 15 days, the AD management desktops will be reclaimed. The administrator must apply for Workspace again for subsequent use. 5.5 How Is Workspace Charged? Workspace supports the pay-per-use and monthly/yearly charging modes. Workspace is charged based on the usage of the following resources: vcpu, memory, and GPU System disk and data disk 5.6 Do I Need to Purchase TCs? You are advised to log in to the desktop using an SC or purchase a TC for login. You can use Huawei FusionCloud Compatibility Check Assistant > FusionAccess > Compatible Terminal List to query TC models that are compatible with Workspace. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 65

71 5 FAQs (Administrators) You can contact the local TC vendor or agent to purchase the TC. 5.7 How Do End Users Access the Internet? The administrator can enable user desktops to access the Internet as follows: using NAT gateway using SNAT using a proxy server Method 1: using NAT gateway The NAT gateway provides the Network Address Translation (NAT) service for Workspace desktops in a VPC so that multiple Workspace desktops can share an EIP to access the Internet. For detailed operations, see the NAT Gateway User Guide. After configuring the NAT gateway, you need to set the number of interface metrics on the user desktop. 1. Log in to the desktop. 2. Go to Network and Sharing Center. 3. In the View your active networks area, click Local Area Connection 2 or Ethernet 2. The Local Area Connection 2 Status dialog box or the Ethernet 2 Status dialog box is displayed. 4. Click Properties. The Local Area Connection 2 Properties dialog box or the Ethernet 2 Properties dialog box is displayed. 5. Click Advanced. The Advanced TCP/IP Settings dialog box is displayed. 6. Deselect Automatic metric, and set Interface metric to Click OK in sequence to save the settings and close the dialog boxes. 8. Click Close to close the Local Area Connection 2 Status dialog box or the Ethernet 2 Status dialog box. Method 2: using SNAT Based on the SNAT service provided by HUAWEI CLOUD, within the specified bandwidth, Workspace desktops without EIPs can access the Internet. In this way, end users can download software updates via the Internet. Currently, Workspace desktops are allowed to access the Internet, but cannot be accessed from the Internet. The bandwidth is shared by all Workspace desktops. Basic principle: ECSs assigned with public EIPs are used as SNAT routers or gateways of Workspace desktops in the same subnet or VPC, thereby enabling Workspace desktops to access the Internet. Creating a SNAT server 1. Create an ECS with an EIP as the SNAT server. The ECS is in the same VPC with the Workspace desktops, runs on CentOS, and has one NIC. The following uses CentOS 6.5 as an example. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 66

72 5 FAQs (Administrators) Setting the NIC and security group rule of the SNAT server 1. Log in to the management console. 2. On the page that is displayed, choose Computing > Elastic Cloud Server. 3. On the displayed page, locate the target ECS in the ECS list and click the ECS name to switch to the page showing ECS details. 4. Click the NIC tab and disable the source/destination check function. 5. Select Security Group, and add an inbound Any rule for WorkspaceUserSecurityGroup. Configuring routing information 1. Log in to the management console. 2. In the navigation pane on the left, choose Virtual Private Cloud. 3. In the navigation pane on the left, select a VPC to which a route is to be added and click Route Table. 4. On the Route Table page, click Add Route. 5. Set route information on the displayed page. Destination: indicates the destination network segment. The value can be a network segment of subnets in the VPC. The default value is /0. The destination of each route must be unique. Next Hop: indicates the IP address of the next hop. Set it to a private IP address or a floating private IP address in a VPC. NOTE 6. Click OK. If Next Hop is set to a floating private IP address, the floating private IP addresses in the VPC cannot have EIPs bound. Otherwise, the route will not take effect. Configuring the SNAT server 1. On the ECS console, use the remote login function to log in to the ECS on which SNAT is to be configured. 2. Run the following command and enter the password of user root to switch to user root: su - root 3. Run the following command to check whether the ECS can successfully connect to the Internet: ping The ECS can access the Internet if the following information is displayed: [root@localhost ~]# ping PING (xxx.xxx.xxx.xxx) 56(84) bytes of data. 64 bytes from xxx.xxx.xxx.xxx: icmp_seq=1 ttl=51 time=9.34 ms 64 bytes from xxx.xxx.xxx.xxx: icmp_seq=2 ttl=51 time=9.11 ms 64 bytes from xxx.xxx.xxx.xxx: icmp_seq=3 ttl=51 time=8.99 ms 4. Run the following command to check whether IP forwarding of the Linux OS is enabled: cat /proc/sys/net/ipv4/ip_forward In the command output, 1 indicates enabled, and 0 indicates disabled. The default value is 0. If IP forwarding in Linux is enabled, go to 8. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 67

73 5 FAQs (Administrators) If IP forwarding in Linux is disabled, go to Run the following command to edit the /etc/sysctl.conf file. Press I to enter the edit mode and set net.ipv4.ip_forward to 1. vi /etc/sysctl.conf 6. Press Esc, type :wq, and press Enter. Save the settings and exit the vi editor. 7. Run the following command to make the change take effect: sysctl -p /etc/sysctl.conf 8. Run the following command to configure the NAT conversion rule: iptables -t nat -A POSTROUTING -o eth0 -s VPC or subnet segment where Workspace desktops reside/mask bits -j SNAT --to internal IP address of the SNAT server For example, if the VPC network segment is , the mask bits is 24, and the internal IP address of the SNAT server is , run the following command: iptables -t nat -A POSTROUTING -o eth0 -s /24 -j SNAT --to Run the following command to save the configuration: service iptables save 10. Run the following command to check whether the operation is successful: iptables -t nat --list The operation is successful if the information shown in Figure 5-3 (for example, /24) is displayed. Figure 5-3 Verifying configuration 11. Run the following command to edit the rc.local file: vi /etc/rc.d/rc.local 12. Add the following content to the end of the file: echo `/sbin/iptables-restore /etc/sysconfig/iptables` >>/etc/rc.d/rc.local 13. Press Esc, type :wq, and press Enter. Save the settings and exit the vi editor. 14. Run the following command to modify the ifcfg-eth0 file: vi /etc/sysconfig/network-scripts/ifcfg-eth0 15. Add the following content to the end of the file: DNS1= DNS2= Press Esc, type :wq, and press Enter. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 68

74 5 FAQs (Administrators) Save the settings and exit the vi editor. 17. Run the following command to restart the NIC: service network restart Configuring the user desktop 1. Go to Network and Sharing Center. 2. In the View your active networks area, click Local Area Connection 2 or Ethernet 2. The Local Area Connection 2 Status dialog box or the Ethernet 2 Status dialog box is displayed. 3. Click Properties. The Local Area Connection 2 Properties dialog box or the Ethernet 2 Properties dialog box is displayed. 4. Double-click Internet Protocol Version 4 (TCP/IPv4). The Internet Protocol Version 4 (TCP/IPv4) Properties dialog box is displayed. 5. Select Use the following DNS server addresses, and set the DNS server address to and Click Advanced. The Advanced TCP/IP Settings dialog box is displayed. 7. Deselect Automatic metric, and set Interface metric to Click OK in sequence to save the settings and close the dialog boxes. 9. Click Close to close the Local Area Connection 2 Status dialog box or the Ethernet 2 Status dialog box. 10. In the View your active networks area, click Local Area Connection or Ethernet. The Local Area Connection Status dialog box or the Ethernet Status dialog box is displayed. 11. Click Details. The Network Connection Details dialog box is displayed. 12. Record the IPv4 address, for example, Open the cmd window and run the following command to add a route: route add mask Gateway of the primary NIC p The first two segments of Gateway of the primary NIC are the same as those of the IP address recorded in 12, and the last two segments are 0 and 1 respectively. NOTE For example, if the IPv4 address is , the gateway of the primary NIC is Run the following command to add a route: route add mask p Method 3: using a proxy server Creating a proxy server 1. Create a proxy server that runs, for example, CentOS. The proxy server must reside on a subnet different from the one where Workspace resides in the same VPC. NOTE For details about how to configure the ECS, see the Elastic Cloud Server User Guide. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 69

75 5 FAQs (Administrators) 2. Configure an elastic IP address for the proxy server to access the Internet. Installing squid NOTE The following operations use Cent OS 6.6 as an example. 1. Log in to the proxy server as user root. 2. Run the following command to check whether squid is installed: rpm -qa grep squid If it is installed, go to 4. If it is not installed, go to Run the following command to install squid: yum -y install squid 4. Run the following command to edit the squid.conf configuration file: vi /etc/squid/squid.conf 5. Check whether SSH is used for connection. If SSH is used, go to 6. If SSH is not used, go to Press I to enter the edit mode and add the following content in a blank row. aclsafe_ports port Use # to comment out http_access deny CONNECT!SSL_ports. 8. Press Esc to exit the edit mode. Type :wq and press Enter. Save configurations and exit the vi editor. 9. Run the following command to restart the squid service. service squid restart Configuring security group rules 1. Configure security group rules to ensure that the extranet cannot access any port of the proxy server and the user desktop can access only the proxy port of the proxy server. NOTE For details about how to configure security group policies, see the Virtual Private Cloud User Guide. Configuring the user's browser 1. Open the proxy server setting page of the browser. 2. Set the IP address and the port of the proxy server to the IP address and the monitoring port configured in 1, respectively. 5.8 How Do I Install Applications on the Desktop? If an end user needs to install applications on the desktop, the administrator can use the following methods to assist the end user in the installation: Method 1: using file redirection Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 70

76 5 FAQs (Administrators) 1. Choose File redirection > Fixed Drive (such as local disks) to enable the policy. For details, see Managing Policies. 2. The end user downloads required applications to the local PC. 3. The end user copies the applications from the local PC to the desktop and installs them. Method 2: using USB redirection 1. Choose USB port redirection > Storage devices (such as USB flash drives) to enable the policy. For details, see Managing Policies. 2. The end user copies the applications from the USB flash drive to the desktop and installs them. Method 3: using the Internet 1. Enable the Internet access permission for the end user. For details, see How Do End Users Access the Internet?. 2. The end user downloads the applications from the Internet to the desktop and installs them. Method 4: using private images Create the desktop where the required applications are installed for the end user. For details, see Purchasing Workspace Desktops. Method 5: using Microsoft AD pushing Use Microsoft AD to push the applications to the desktop of the end user. For details, see How to use Group Policy to remotely install software in Windows Server What Resources Do I Need to Prepare Before Applying for Workspace? You need to enable ports listed in Table 5-2 on the enterprise firewall so that end users can log in to the desktops properly. Table 5-2 Internet access ports Port Protocol Description 443 TCP Used by the end user to access the web login page TCP Used by the end user to access the desktop. NOTE By default, port 443 and port 8443 are used. If you want to change the ports, see Changing the Internet Access Port. In GPU desktop scenarios, prepare DirectConnect resources. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 71

77 5 FAQs (Administrators) 5.10 What Should I Do If I Fail to Apply for Workspace? Scenario Procedure If you are unable to access Workspace after the initial application is complete, retry the application, or cancel Workspace and reapply again. Step 1 Step 2 Log in to the Workspace management console. Click Dashboard. The Dashboard page is displayed. Step 3 In the Configuration Information area, click Retry. The Retry Apply for Workspace dialog box is displayed. Step 4 Click OK. NOTE ----End You can click Cancel Workspace in the Configuration Information area to cancel Workspace and apply for Workspace again How Is Workspace Connected to Enterprise Intranets? Workspace desktops can communicate with PCs in the enterprise intranet using the VPN or DirectConnect method. VPN: Figure 5-4 shows how to use VPN to connect Workspace desktops to PCs in the enterprise intranet. Figure 5-4 Connecting Workspace to an enterprise intranet using a VPN Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 72

78 5 FAQs (Administrators) DirectConnect: To connect Workspace to an enterprise intranet using DirectConnect, see Direct Connect User Guide. NOTE Workspace reserves the /16 network segment for the NIC on the management plane. Do not use this network segment on the enterprise intranet in case the route conflict occurs How Do I Interconnect Workspace with Microsoft AD? You can deploy Microsoft AD in the intranet of the enterprise DC or in the VPC where Workspace resides. The following describes how to interconnect Workspace with Microsoft AD in two deployment scenarios. After interconnecting Workspace with Microsoft AD, configure DNS forwarding on the DNS to allow Workspace to access the Internet. Procedure NOTE Ensure that the network where Workspace resides is communicating correctly with that where Microsoft AD resides. Scenario 1: Microsoft AD is deployed in the intranet of the customer's DC. Figure 5-5 Microsoft AD deployed in the intranet of the customer's DC Step 1 Step 2 Use DirectConnect or IPsec VPN to connect the customer's DC to the VPC. For details about the configuration, see the Direct Connect User Guide or VPN User Guide. If a firewall is deployed between Microsoft AD and Workspace, enable the following ports on the firewall for Workspace to connect to Microsoft AD, as shown in Table 5-3: Table 5-3 Port list Role Port Protocol Description AD 135 TCP Remote Procedure Call (RPC) protocol This port is used by the Lightweight Directory Access Protocol (LDAP), Distributed File System (DFS), and Distributed File System Replication (DFSR). Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 73

79 5 FAQs (Administrators) Role Port Protocol Description 137 UDP NetBIOS name resolution This port is used by the network login service. 138 UDP NetBIOS data gram service 139 TCP NetBIOS-SSN service This port is used by services, such as the DFS and network login service. This port is used for network basic input and output. 445 TCP NetBIOS-SSN service 49,152-65,535 TCP RPC dynamic port 49,152-65,535 UDP RPC dynamic port This port is used for network basic input and output. 88 TCP Kerberos key distribution center service 88 UDP Kerberos key distribution center service 123 UDP Port used by the NTP service 389 UDP LDAP server 389 TCP LDAP server 464 TCP Kerberos authentication protocol 464 UDP Kerberos authentication protocol 500 UDP isakmp 593 TCP RPC over HTTP 636 TCP LDAP SSL 3268 TCP LDAP global catalog server 3269 TCP LDAP global catalog server 4500 UDP IPsec NAT-T 5355 UDP llmnr 9389 TCP Active Directory Web service DNS 53 TCP DNS server 53 UDP DNS server Step 3 After the configuration, verify the interconnection and ensure that the networks and ports are working correctly. For details, see Verification. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 74

80 5 FAQs (Administrators) Step 4 Log in to your DNS server, configure the DNS reverse lookup function in the DNS Manager, and add the first subnet segment that is selected in the subnet list during Workspace application to the IP address segment for reverse lookup. ----End Scenario 2: Microsoft AD is deployed in a subnet and the VPC where Workspace resides is deployed in another subnet. Figure 5-6 Microsoft AD deployed in a subnet and the VPC where Workspace resides deployed in another subnet In this scenario, you must add security group rules for Microsoft AD to enable some ports of Microsoft AD for Workspace so that Workspace can connect to Microsoft AD. Step 1 Step 2 Create a security group, add an inbound rule, and configure the parameters as follows: Protocol: ANY Source IP Address: IP Address IP Address: Enter the subnet where Workspace resides. Apply the security group to AD server instances so that Workspace can communicate correctly with Microsoft AD. NOTE If you want to minimize the number of enabled ports and protocols, you can add multiple inbound rules to the security group. For details about the ports that need to be enabled, see Table 5-3. Step 3 Step 4 After the configuration, verify the interconnection and ensure that the networks and ports are working correctly. For details, see Verification. Log in to your DNS server, configure the DNS reverse lookup function in the DNS Manager, and add the first subnet segment that is selected in the subnet list during Workspace application to the IP address segment for reverse lookup. ----End Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 75

81 5 FAQs (Administrators) Verification Step 1 Check the firewall or security group settings of the AD server and ensure that ports 49,152 to 65,535 have been enabled. NOTE For details about the requirements on AD server ports, see Active Directory and Active Directory Domain Services Port Requirements. Step 2 Create a Windows OS instance in the VPC where the user desktop resides using the ECS service and add the instance to the existing domain. NOTE For details about how to configure and operate ECS, see the Elastic Cloud Server User Guide. Step 3 Log in to the Windows instance using the RDP client tool (such as mstsc) or VNC. The remaining steps are performed on this Windows instance. Step 4 Step 5 Step 6 Download ADTest.zip and unzip the test application. In the blank area of the directory where ADTest.exe resides, hold down Shift, right-click, and choose Open command windows here. In Command Prompt, enter the following command to check the AD server connectivity: ADTest.exe -file ADTest.cfg -ip AD IP address -domain AD domain name -user domain administrator account Command example: ADTest.exe -file ADTest.cfg -ip domain abc.com -user vdsadmin Step 7 Check whether SUCCEED is displayed in all test results. If FAILED is displayed, check the AD server configuration or firewall ports following the instructions. ----End Configure DNS forwarding. NOTE The following uses Windows Server 2012 as an example. Step 1 Log in to the DNS server as the administrator. Step 2 On the task bar, click. The Server Manager window is displayed. Step 3 Step 4 In the navigation pane on the left, click DNS. In the SERVER area, right-click server name and choose DNS Manager. The DNS Manager window is displayed. Step 5 Step 6 Unfold DNS, right-click computer name, and choose Properties from the shortcut menu. On the Advanced tab page, deselect Disable recursion (also disable forwarders), and click Apply. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 76

82 5 FAQs (Administrators) Step 7 On the Forwarders tab page, click Edit, enter the IP address of the default DNS server of HUAWEI CLOUD, and click OK. NOTE ----End You can view the IP address of the default DNS server of HUAWEI CLOUD on the page for creating the VPC What Should I Do If I Fail to Apply for Workspace by Interconnecting with Microsoft AD? Scenario Procedure If you fail to apply for Workspace by interconnecting with Microsoft AD and a message is displayed stating "Failed to configure an infrastructure component(85%)", you can rectify the fault as follows: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 In the AD Domain area of the Dashboard page, check whether the domain information is correct. Click Modify to modify incorrect domain configurations. Click Retry to reapply for the service. If you use Scenario 1: Microsoft AD is deployed in the intranet of the customer's DC in section How Do I Interconnect Workspace with Microsoft AD? and use DirectConnect for connections, log in to the AD server and ping the IP address of DirectConnect. If the ping fails, check whether the network where the AD server resides as well as the VPC network and subnet ports used for applying for Workspace are normal. Check the AD server connectivity. For details, see the Verification area in section How Do I Interconnect Workspace with Microsoft AD?. Click Retry to reapply for the service. If the fault persists, contact technical support engineers. ----End 5.14 How Do I Check the Network Status of Desktops? Procedure Perform the following operations to check the network status of desktops and determine the network segment where the fault occurs. Step 1 Step 2 Log in to the desktop. Move the cursor to the upper area of the desktop. The floating window is displayed, as shown in Figure 5-7. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 77

83 5 FAQs (Administrators) Figure 5-7 Floating window Step 3 Click Network. The Connection Status dialog box is displayed. NOTE Step 4 When the network connection is good, the network indicator is steady green. When the network connection is poor, the network indicator is steady yellow. When the network connection is bad, the network indicator is steady red. On the Connection Status page, check Round-Trip Time. Figure 5-8 shows the network connection status. Figure 5-8 Network connection status Step 5 Step 6 Click Start. In the Search programs and files text box, type cmd, and press Enter. In the command-line interface, run the following command to check the network connectivity between the desktop and the terminal: ping Internet access address of the desktop NOTE The Internet access address of the desktop can be found in the desktop provisioning notification . Information similar to the following is displayed: Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 78

84 5 FAQs (Administrators) Step 7 Determine the network segment where the fault occurs based on the results in Step 4 and Step 6. If the network latency in Step 4 and Step 6 is large, the public network is faulty. If the network latency in Step 4 is large but that in Step 6 is small, the internal network of Workspace is faulty. ----End 5.15 What Are the Network Requirements for Accessing the Desktop? Table 5-4 lists the network requirements for accessing the desktop. If the network requirements cannot be met, you are advised to use DirectConnect access. Table 5-4 Network requirements Desktop Type Common desktop GPU desktop Network Requirement Average bandwidth: 300 kbps/ instance; Peak 5 Mbps/ instance. Packet loss rate 0.01% Round -trip delay 30 ms Jitter 10 ms Average bandwidth: 20 Mbps/ instance. Packet loss rate 0.01% Round -trip delay 30 ms Jitter 10 ms These values are for reference only and may be more stringent depending on the application scenario. Must be used in conjunction with the Direct Connect service. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 79

85 6 FAQs (End Users) 6 FAQs (End Users) 6.1 What Devices Can Be Used to Log In to Workspace? You can log in to Workspace using TCs, SCs, browsers, Android terminals, and ios terminals. 6.2 What Are the Precautions for Using Workspace? Workspace desktops provide on-demand services based on network resources and work depending on OSs and network configurations in desktops. This section describes some risky operations on desktops. These operations do not need to be adjusted. If special modification is required, contact the administrator for confirmation. Risky Operations (Processes and Services) 1. Change the default service and startup options in the system configuration. Figure 6-1 shows the Services and Startup options. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 80

86 6 FAQs (End Users) Figure 6-1 Services and startup 2. Disable HDP services shown in Figure 6-2. Figure 6-2 HDP services 3. Uninstall programs shown in Figure 6-3. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 81

87 6 FAQs (End Users) Figure 6-3 Programs 4. End the LOCAL SERVICE, NETWORK SERVICE, or SYSTEM processes in Task Manager. Figure 6-4 shows the processes that cannot be ended. Figure 6-4 Task Manager Risky Operations (Network) 1. Disable NICs, and disable or modify network configurations, as shown in Figure 6-5. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 82

88 6 FAQs (End Users) Figure 6-5 Local connection Risky Operations (Others) 2. Run the script or command for modifying a route, such as route DELETE *. 3. Delete ports 28511, 28512, 28521, and from Windows firewall exception options. 4. Enable software or tools, such as the IPsec, that can restrict network traffic. 1. Delete files or folders in C:\Program Files\Huawei listed in Figure 6-6. Figure 6-6 Folders 2. Enable the sleep function on desktops. The sleep function is disabled for desktops by default, as shown in Figure 6-7. Figure 6-7 Sleep function 3. Modify the configuration file of the HDP client (AccessAgent). 4. Run Rabbit Magic or Wopti Utilities to clean or optimize the registry. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 83

89 6 FAQs (End Users) 5. Install a customized screensaver with complex transformation functions, which consumes system resources and causes a delay in desktop access. 6.3 What OSs Can Run on Workspace? Workspace runs Windows Server 2008 R2 or Windows Server 2016 and delivers the Windows 7 or Windows 10 desktop environment. 6.4 Can I Upgrade OSs by Myself? Workspace must use OSs provided by HUAWEI CLOUD or OSs made based on the OSs provided by HUAWEI CLOUD. You are not allowed to upgrade an OS but can install OS patches. 6.5 How Do I Install Applications on the Desktop? By default, end users are configured as local administrators and can install applications. Administrators can modify the settings to prevent end users from installing applications. An end user can install applications on the desktop using the following methods: NOTE The administrator must enable necessary policies and perform required configurations before the following methods are used. Method 1: using file copy 1. Download required applications to the local PC. 2. Copy the applications from the local PC to the desktop and install them. Method 2: using USB flash drive copy Copy the applications from the USB flash drive to the desktop and install them. Method 3: using the Internet Download the applications from the Internet to the desktop and install them. Method 4: using private images Contact the administrator to create the required desktop. Method 5: using application pushing Contact the administrator to push the required applications to your desktop and install them. 6.6 What Software Is Compatible with Workspace? Software that works with Workspace must be compatible with Windows Server 2008 R2 or Windows Server Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 84

90 6 FAQs (End Users) 6.7 How Does Workspace Manage Peripherals? If you encounter peripheral configuration problems when using Workspace, you can use HDPDeviceHelper. Choose Start > Huawei vdesk. Start HDPDeviceHelper and configure peripherals following the instructions. Figure 6-8 vdesk 6.8 Does Workspace Support Personalized Settings? By default, after logging in to Workspace, end users can personalize items, such as wallpapers, icons, and shortcuts for OSs. The settings will be retained until the next modification. Administrators can use policies, such as USB Redirection, Printer Redirection, File Redirection, and Clipboard Redirection to control data transmission and peripheral access permission between end users and Workspace. NOTICE Installing a customized screensaver with complex transformation functions consumes system resources and causes a delay in desktop access. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 85

91 6 FAQs (End Users) 6.9 Can Data in Workspace Be Saved for a Long Time? Yes. End users use Workspace desktops separated from other end users. Applications, documents, settings, and other data can be saved for a long time How Do I Use a Local Printer for Printing? If you have configured a local printer, the printer will be selected by default. If no printer is configured, you need to configure one. Then select the local printer from the printing menu and click Print How Do I Use a Network Printer for Printing? Any printer that resides in the same network as Workspace and is supported by Windows can be added as a network printer. After a network printer is added, you can select the printer in applications for printing What Should I Do If the Desktop Cannot Be Connected? During the use of Workspace desktops, desktops may fail to be connected due to misoperations. If this happens, you can click problem. to restart the desktops to resolve the NOTE If desktops cannot be restarted or you cannot log in to the desktops after they are restarted, click to forcibly restart the desktops. Data that is not saved may be lost after the desktops are forcibly restarted. Therefore, exercise caution when forcibly restarting desktops How Do I Log In to the Desktop for Maintenance Using VNC? If you cannot log in to your desktop normally, you can log in to the desktop for maintenance using VNC. NOTE This function does not apply to scenarios where DirectConnect is used to access desktops. The procedure is as follows: 1. Log in to the desktop and enter the desktop list page. 2. Click, as shown in Figure 6-9. The VNC self-help console is displayed. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 86

92 6 FAQs (End Users) NOTE If a black screen occurs, click Send CtrlAltDel in the upper-right corner of the window. Figure 6-9 Self-help console 6.14 What Should I Do If the Desktop Freezes When Using Workspace? If a fault such as desktop freezing or slow response occurs when you use a Workspace desktop, rectify the fault by performing operations provided in this section. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 87

93 6 FAQs (End Users) Figure 6-10 Fault locating Method 1: Stopping Unnecessary Processes 1. On the desktop, open Task Manager. The following figure shows the Task Manager window. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 88

94 6 FAQs (End Users) Figure 6-11 Windows Task Manager 2. View the processes that consume massive CPU and memory resources. 3. Save user documents. 4. Stop the processes that consume massive CPU and memory resources. NOTICE Do not stop the processes mandatory for desktop operating. For details, see What Are the Precautions for Using Workspace?. Method 2: Restarting the Desktop 1. Save user documents. 2. Choose Start > Restart or click to restart the desktop, as shown in the following figure. NOTE If desktops cannot be restarted or you cannot log in to the desktops after they are restarted, click to forcibly restart the desktops. Data that is not saved may be lost after the desktops are forcibly restarted. Therefore, exercise caution when forcibly restarting desktops. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 89

95 6 FAQs (End Users) Figure 6-12 Self-help console 3. On the login page that is displayed, enter the user domain account and password. 4. In the desktop list, click to go to the desktop How Do I Check the Network Status of Desktops? Perform the following operations to check the network status of desktops and determine the network segment where the fault occurs. Procedure Step 1 Step 2 Log in to the desktop. Move the cursor to the upper area of the desktop. The floating window is displayed, as shown in Figure Figure 6-13 Floating window Step 3 Click Network. The Connection Status dialog box is displayed. NOTE When the network connection is good, the network indicator is steady green. When the network connection is poor, the network indicator is steady yellow. When the network connection is bad, the network indicator is steady red. Step 4 On the Connection Status page, check Round-Trip Time. Figure 6-14 shows the network connection status. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 90

96 6 FAQs (End Users) Figure 6-14 Network connection status Step 5 Step 6 Click Start. In the Search programs and files text box, type cmd, and press Enter. In the command-line interface, run the following command to check the network connectivity between the desktop and the terminal: ping Internet access address of the desktop NOTE The Internet access address of the desktop can be found in the desktop provisioning notification . Information similar to the following is displayed: Step 7 Determine the network segment where the fault occurs based on the results in Step 4 and Step 6. If the network latency in Step 4 and Step 6 is large, the public network is faulty. If the network latency in Step 4 is large but that in Step 6 is small, the internal network of Workspace is faulty. ----End 6.16 How Do I Change the Login Password? The passwords of accounts in the system must be changed periodically. The recommended interval is three months. The minimum validity period of a password is two days. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 91

97 6 FAQs (End Users) You can perform the following steps to change the login password on the WI (desktop login page). Step 1 Use the original domain account and password to log in. The desktop list page is displayed. Step 2 On the desktop list page, click. Then click. Step 3 Step 4 Enter Old Password, New Password, and Confirm Password. Click OK. ----End 6.17 How Do I Change the Login Password (Mobile Client)? The passwords of accounts in the system must be changed periodically. The recommended interval is three months. The minimum validity period of a password is two days. You can perform the following steps to change the login password on the WI (desktop login page) through the FusionAccess client on a mobile terminal. Step 1 Open the FusionAccess client on the mobile terminal to go to the desktop login page. NOTE You must configure the desktop login address upon your initial login. Step 2 Step 3 Enter the username and password, and click Login. The VM list is displayed. Step 4 Click in the upper right corner and click Change Password. Step 5 The Change Password page is displayed. Step 6 Enter Old Password, New Password, and Confirm Password, as shown in Figure Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 92

98 6 FAQs (End Users) Figure 6-15 Change Password Step 7 Step 8 Choose Modify Password. The password is changed successfully. ----End 6.18 What Should I Do If I Forget the Password? If you lose or forget the login password, contact the administrator. After the administrator processing, the password resetting link will be sent to your address by the system. You can click the link to reset the password. NOTICE The validity period of the password resetting link in the is 24 hours. Reset the password in a timely manner What Should I Do If the Account Is Locked? Your account will be locked if you enter an incorrect password consecutively. If this happens, contact the administrator to unlock the account. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 93

99 6 FAQs (End Users) 6.20 Does Workspace Support Dual-Screen Display? Prerequisites When accessing Workspace desktops using TCs, perform the following operations to configure dual-screen display. Table 6-1 lists the materials required for configuring dual-screen display. Table 6-1 Materials required for configuring dual-screen display Item Quantity Image (Example) Description TC 1 - Monitor/Converter 2 Typically, a monitor provides a DVI-D port and a VGA port. If two monitors have only VGA ports in some special cases, a DVI-D-to-VGA converter is required. DVI-I one-to-two cable 1 Converts DVI-I signals to DVI-D and VGA signals. DVI-D-to-DVI-D cable 1 - VGA-to-VGA cable 1 - Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 94

100 6 FAQs (End Users) Procedure Dual-Screen Connection Step 1 Connect a TC to monitors based on the monitor type. If the monitors provide DVI and VGA ports, go to Step 2. If the monitors provide VGA ports only, go to Step 3. Step 2 Connect the TC to the monitors, as shown in Figure Figure 6-16 Dual-screen connection Step 3 Connect the TC to the monitors, as shown in Figure Figure 6-17 Dual-screen connection ----End TC Setting Step 1 Power on the TC. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 95

101 6 FAQs (End Users) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Perform the following operation based on the TC type. Linux TC: Perform Step 3 to Step 7. Windows TC: Perform Step 8 to Step 10 Click Start, and choose Control Center. Double-click Display. Select Optimum settings. Select the display mode based on site requirements. Duplicate Extend Select the main monitor based on site requirements. DVI VGA The task is completed. Right-click on the desktop and choose Screen Resolution. Set Multiple displays based on site requirements. Duplicate these displays Extend these displays NOTE Only Extend these displays can be selected when two desktops and dual-screen display are used. Step 10 Click OK. ----End Client Setting Step 1 Step 2 Step 3 Step 4 Step 5 Perform the following operation based on the dual-screen display scenario. If a desktop and two screens are used, go to Step 2. If two desktops and two screens are used, go to Step 6. Log in to the desktop using the client. Click Settings. Select Open Multiple Monitor (The configuration will take effect after reconnect). Click Close. The task is completed. Step 6 Step 7 Step 8 Step 9 Log in to a desktop using the client. Click Settings. Deselect Open Multiple Monitor (The configuration will take effect after reconnect). Click Close. Step 10 Log in to the other desktop and repeat Step 6 to Step 9. Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 96

102 6 FAQs (End Users) Step 11 Drag the two desktops to different screens to achieve dual-screen display. ----End Others 6.21 What Should I Do If I Fail to Log In to the GPU Desktop Using an SC? If your PC desktop is configured with a non-standard screen resolution, login to the GPU desktop using an SC may fail. You can perform the following steps to solve the problem. Procedure NOTE Examples of standard screen resolutions: 1920 x 1080 and 1680 x 1050 Step 1 Step 2 Step 3 Set a standard screen resolution, such as 1920 x 1080 or 1680 x 1050, for your PC desktop. Delete the SetCLientToTop.txt file in C:\PermanenceDataPath. Log in to the GPU desktop again using an SC. ----End Issue 18 ( ) Copyright Huawei Technologies Co., Ltd. 97

Workspace. User Guide (Administrators) Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD.

Workspace. User Guide (Administrators) Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 19 Date 2018-10-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Workspace. User Guide (Administrators) Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

Workspace. User Guide (Administrators) Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2018-10-12 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Workspace. User Guide (Administrators) Date

Workspace. User Guide (Administrators) Date Date 2018-11-12 Contents Contents 1 Introduction... 1 1.1 Concepts... 1 1.1.1...1 1.1.2 Software Client... 2 1.1.3 Mobile Terminal... 2 1.1.4 Infrastructure Server... 2 1.1.5 AD Management Server... 2

More information

Workspace. User Guide (End Users) Date

Workspace. User Guide (End Users) Date Date 2018-11-16 Contents Contents 1 Basic Concepts...1 1.1 Getting to Know...1 1.2 Software Client... 1 1.3 Mobile Terminal... 1 1.4 Desktop...1 2 Common Operation...3 2.1 Logging In to a Desktop Using

More information

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD.

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 21 Date 2018-09-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 20 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Web Cloud Solution. User Guide. Issue 01. Date

Web Cloud Solution. User Guide. Issue 01. Date Issue 01 Date 2017-05-30 Contents Contents 1 Overview... 3 1.1 What Is Web (CCE+RDS)?... 3 1.2 Why You Should Choose Web (CCE+RDS)... 3 1.3 Concept and Principle... 4... 5 2.1 Required Services... 5 2.2

More information

Advanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD.

Advanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 17 Date 2018-08-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Relational Database Service. User Guide. Issue 05 Date

Relational Database Service. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Concepts... 2 1.1.1 RDS... 2 1.1.2 DB Cluster... 2 1.1.3 DB Instance... 2 1.1.4 DB Backup... 3 1.1.5 DB Snapshot... 3 1.2 RDS DB Instances...

More information

Elastic Load Balance. User Guide. Issue 14 Date

Elastic Load Balance. User Guide. Issue 14 Date Issue 14 Date 2018-02-28 Contents Contents 1 Overview... 1 1.1 Basic Concepts... 1 1.1.1 Elastic Load Balance... 1 1.1.2 Public Network Load Balancer...1 1.1.3 Private Network Load Balancer... 2 1.1.4

More information

Unified Load Balance. User Guide. Issue 04 Date

Unified Load Balance. User Guide. Issue 04 Date Issue 04 Date 2017-09-06 Contents Contents 1 Overview... 1 1.1 Basic Concepts... 1 1.1.1 Unified Load Balance...1 1.1.2 Listener... 1 1.1.3 Health Check... 2 1.1.4 Region...2 1.1.5 Project...2 1.2 Functions...

More information

Huawei FusionCloud Desktop Solution 5.3. Branch Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Huawei FusionCloud Desktop Solution 5.3. Branch Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2015-06-30 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Database Security Service. FAQs. Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD.

Database Security Service. FAQs. Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 19 Date 2019-04-08 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Elastic Load Balancing. User Guide. Date

Elastic Load Balancing. User Guide. Date Date 2018-07-20 Contents Contents 1 Product Description... 4 1.1 What Is Elastic Load Balancing (ELB)?... 4 1.2 Load Balancer Type... 4 1.3 Basic Architecture... 5 1.3.1 Classic Load Balancer... 5 1.3.2

More information

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2017-12-20 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Anti-DDoS. User Guide. Issue 05 Date

Anti-DDoS. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Functions... 1 1.2 Application Scenarios...1 1.3 Accessing and Using Anti-DDoS... 2 1.3.1 How to Access Anti-DDoS...2 1.3.2 How to Use

More information

Object Storage Service. Client Guide (OBS Browser) Issue 10 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Client Guide (OBS Browser) Issue 10 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 10 Date 2018-07-15 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Object Storage Service. Client Guide (OBS Browser) Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Client Guide (OBS Browser) Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 02 Date 2018-01-17 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

CDN. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

CDN. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Direct Connect. User Guide. Issue 4 Date

Direct Connect. User Guide. Issue 4 Date Issue 4 Date 2017-10-30 Contents Contents 1 Change History... 1 2 Overview... 6 2.1 What Is Direct Connect?...6 2.2 Direct Connect Application Scenarios... 6 2.3 Charging Standards...7 3 Getting Started...

More information

Huawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.

Huawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Huawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper Issue 01 Date 2014-03-26 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced

More information

Virtual Private Cloud. User Guide. Issue 03 Date

Virtual Private Cloud. User Guide. Issue 03 Date Issue 03 Date 2016-10-19 Change History Change History Release Date What's New 2016-10-19 This issue is the third official release. Modified the following content: Help Center URL 2016-07-15 This issue

More information

Elastic Compute Service. Quick Start for Windows

Elastic Compute Service. Quick Start for Windows Overview Purpose of this document This document describes how to quickly create an instance running Windows, connect to an instance remotely, and deploy the environment. It is designed to walk you through

More information

Mediant Cloud Edition (CE)

Mediant Cloud Edition (CE) Installation Manual AudioCodes Mediant Family of Session Border Controllers (SBC) Mediant Cloud Edition (CE) Session Border Controller Version 7.2 Installation Manual Contents Table of Contents 1 Introduction...

More information

My Account. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

My Account. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-09-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Domain Name Service. FAQs. Issue 07 Date HUAWEI TECHNOLOGIES CO., LTD.

Domain Name Service. FAQs. Issue 07 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 07 Date 2019-03-05 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2018-12-31 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Third-Party Client (s3fs) User Guide

Third-Party Client (s3fs) User Guide Issue 02 Date 2017-09-28 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Getting Started with Amazon Web Services

Getting Started with Amazon Web Services Getting Started with Amazon Web Services Version 3.3 September 24, 2013 Contacting Leostream Leostream Corporation 411 Waverley Oaks Rd. Suite 316 Waltham, MA 02452 USA http://www.leostream.com Telephone:

More information

Third-Party Client (s3fs) User Guide

Third-Party Client (s3fs) User Guide Issue 02 Date 2017-09-28 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide 2018 Amazon AppStream 2.0: SOLIDWORKS Deployment Guide Build an Amazon AppStream 2.0 environment to stream SOLIDWORKS to your users June 2018 https://aws.amazon.com/appstream2/ 1 Welcome This guide describes

More information

VMware vcloud Air User's Guide

VMware vcloud Air User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

AD SSO Technical White Paper

AD SSO Technical White Paper Issue V1.0 Date 2017-02-28 Huawei Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Domain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Domain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Cloud Stream Service. User Guide. Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD.

Cloud Stream Service. User Guide. Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 18 Date 2018-11-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Service Portal User Guide

Service Portal User Guide FUJITSU Cloud Service K5 IaaS Service Portal User Guide Version 1.4 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2016 K5IA-DC-M-005-001E Preface Purpose of This Manual This manual

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

NetApp Cloud Volumes Service for AWS

NetApp Cloud Volumes Service for AWS NetApp Cloud Volumes Service for AWS AWS Account Setup Cloud Volumes Team, NetApp, Inc. March 29, 2019 Abstract This document provides instructions to set up the initial AWS environment for using the NetApp

More information

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 2.0 May

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 2.0 May unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 2.0 May 2016 8205 5658-002 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information described

More information

How to set up a Virtual Private Cloud (VPC)

How to set up a Virtual Private Cloud (VPC) Date published: 15.06.2018 Estimated reading time: 20 minutes Authors: Editorial Team The bookmarks and navigation in this tutorial are optimized for Adobe Reader. How to set up a Virtual Private Cloud

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

Virtual Private Network. Network User Guide. Issue 05 Date

Virtual Private Network. Network User Guide. Issue 05 Date Issue 05 Date 2018-03-30 Contents Contents 1 Overview... 1 1.1 Concepts... 1 1.1.1 VPN... 1 1.1.2 IPsec VPN...1 1.2 Application Scenarios...2 1.3 Billing Standards... 3 1.4 VPN Reference Standards and

More information

HUAWEI Secospace USG Series User Management and Control White Paper

HUAWEI Secospace USG Series User Management and Control White Paper Doc. code HUAWEI Secospace USG Series User Management and Control White Paper Issue 1.0 Date 2014-03-27 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved.

More information

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Karthik Krishnan Page 1 of 20 Table of Contents Table of Contents... 2 Abstract... 3 What

More information

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide Introduction This onboarding guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC. FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

Comodo IT and Security Manager Software Version 6.9

Comodo IT and Security Manager Software Version 6.9 Comodo IT and Security Manager Software Version 6.9 End User Guide Guide Version 6.9.072817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Comodo IT and Security Manager Software Version 6.4

Comodo IT and Security Manager Software Version 6.4 Comodo IT and Security Manager Software Version 6.4 End User Guide Guide Version 6.4.040417 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Web Portal User Guide Leap GIO Public. Leap GIO Public. New Generation - Web Portal User Guide. Copyright 2017 by Leap Solutions Asia Co., Ltd.

Web Portal User Guide Leap GIO Public. Leap GIO Public. New Generation - Web Portal User Guide. Copyright 2017 by Leap Solutions Asia Co., Ltd. New Generation - Web Portal User Guide 1 Page Contents 1 General... 3 1.1 Overview... 3 1.2 Definition... 3 1.3 Access the Web Portal... 3 2 Sign-Up... 4 2.1 Personal Account... 4 2.2 Corporate Account...

More information

PrinterOn Embedded Agent for Samsung Printers and MFPs. Setup Guide for PrinterOn Hosted

PrinterOn Embedded Agent for Samsung Printers and MFPs. Setup Guide for PrinterOn Hosted PrinterOn Embedded Agent for Samsung Printers and MFPs Setup Guide for PrinterOn Hosted Contents Chapter 1: Introduction... 3 Overview: Setting up the PrinterOn Embedded Agent... 4 PrinterOn service prerequisites...

More information

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Cloud Service Administrator's Guide 15 R2 March 2016 Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Configuring Settings for Microsoft Internet Explorer...

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Virtual Private Cloud. User Guide

Virtual Private Cloud. User Guide Alibaba Cloud provides a default VPC and VSwitch for you in the situation that you do not have any existing VPC and VSwitch to use when creating a cloud product instance. A default VPC and VSwitch will

More information

Viz Licensing Administrator Guide. Product Version 1.0 November 27, 2017

Viz Licensing Administrator Guide. Product Version 1.0 November 27, 2017 Viz Licensing Administrator Guide Product Version 1.0 November 27, 2017 Copyright 2017 Vizrt. All rights reserved. No part of this software, documentation or publication may be reproduced, transcribed,

More information

Live Streaming Accelerator. Quick Start. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Live Streaming Accelerator. Quick Start. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.6 Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

ForeScout Amazon Web Services (AWS) Plugin

ForeScout Amazon Web Services (AWS) Plugin ForeScout Amazon Web Services (AWS) Plugin Version 1.1.1 and above Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic Segmentation

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Confluence Data Center on the AWS Cloud

Confluence Data Center on the AWS Cloud Confluence Data Center on the AWS Cloud Quick Start Reference Deployment March 2017 Atlassian AWS Quick Start Reference Team Contents Overview... 2 Costs and Licenses... 2 Architecture... 3 Prerequisites...

More information

Ansible Tower Quick Setup Guide

Ansible Tower Quick Setup Guide Ansible Tower Quick Setup Guide Release Ansible Tower 2.4.5 Red Hat, Inc. Jun 06, 2017 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 4 4 Examine the Tower Dashboard 6 5 The Setup

More information

ArcGIS 10.3 Server on Amazon Web Services

ArcGIS 10.3 Server on Amazon Web Services ArcGIS 10.3 Server on Amazon Web Services Copyright 1995-2016 Esri. All rights reserved. Table of Contents Introduction What is ArcGIS Server on Amazon Web Services?............................... 5 Quick

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA f Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

ServiceStage. User Guide. Issue 01 Date

ServiceStage. User Guide. Issue 01 Date Issue 01 Date 2018-06-26 Contents Contents 1 Environment Preparation...1 2 Console... 3 3 Resource Preparation... 5 3.1 Creating a Cluster... 5 3.2 Creating a Namespace... 11 3.3 Adding a Node...12 3.4

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

HikCentral Web Client User Manual

HikCentral Web Client User Manual HikCentral Web Client User Manual Table of Content Disclaimer... 1 Overview... 2 About This Document... 2 Introduction to HikCentral... 3 Administrator Rights... 4 Getting Started... 5 Installation and

More information

Administrator Guide. Flexible Storage

Administrator Guide. Flexible Storage Administrator Guide Flexible Storage Contents Introduction and Overview Define a plan Create/Change a user Other functionalities Introduction and Overview What is Flexible Storage? Sign in to the administrator

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Splashtop Enterprise for IoT Devices - Quick Start Guide v1.0

Splashtop Enterprise for IoT Devices - Quick Start Guide v1.0 Introduction For information about different deployment choices, please see chapter 3 of the full Splashtop Center Administrator s Guide. Splashtop Enterprise for IoT Devices is comprised of three components:

More information

Open Telekom Cloud Tutorial: Getting Started. Date published: Estimated reading time: 20 minutes Authors: Editorial Team

Open Telekom Cloud Tutorial: Getting Started. Date published: Estimated reading time: 20 minutes Authors: Editorial Team Date published: 03.08.2018 Estimated reading time: 20 minutes Authors: Editorial Team The bookmarks and navigation in this tutorial are optimized for Adobe Reader. Getting Started 1. Introduction 2. Prerequisites

More information

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE 22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE CONTENTS 1 Overview... 3 1.1 Netop Remote Control Portal... 3 1.2 Technical Requirements... 3 2 General... 4 2.1 Authentication... 4 2.1.1 Forgot

More information

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card 10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

CPM. Quick Start Guide V2.4.0

CPM. Quick Start Guide V2.4.0 CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

Horizon Cloud with On-Premises Infrastructure Administration Guide. VMware Horizon Cloud Service Horizon Cloud with On-Premises Infrastructure 1.

Horizon Cloud with On-Premises Infrastructure Administration Guide. VMware Horizon Cloud Service Horizon Cloud with On-Premises Infrastructure 1. Horizon Cloud with On-Premises Infrastructure Administration Guide VMware Horizon Cloud Service Horizon Cloud with On-Premises Infrastructure 1.3 Horizon Cloud with On-Premises Infrastructure Administration

More information

Blazer Express FAQ. Blazer Express V1.4 Frequently Asked Questions (FAQ)

Blazer Express FAQ. Blazer Express V1.4 Frequently Asked Questions (FAQ) Blazer Express V1.4 Frequently Asked s (FAQ) Frequently Asked s COPYRIGHT 2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings,

More information

CA Agile Central Administrator Guide. CA Agile Central On-Premises

CA Agile Central Administrator Guide. CA Agile Central On-Premises CA Agile Central Administrator Guide CA Agile Central On-Premises 2018.1 Table of Contents Overview... 3 Server Requirements...3 Browser Requirements...3 Access Help and WSAPI...4 Time Zone...5 Architectural

More information

Licensing Guide. BlackBerry Enterprise Service 12. Version 12.0

Licensing Guide. BlackBerry Enterprise Service 12. Version 12.0 Licensing Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-13 SWD-20141118133401439 Contents About this guide... 5 What is BES12?... 6 Key features of BES12...6 Product documentation...

More information

OBS. Management Console Operation Guide. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

OBS. Management Console Operation Guide. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD. Management Console Operation Guide Issue 02 Date 2015-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

DESS. User Guide. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD.

DESS. User Guide. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 06 Date 2018-12-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

AvePoint Online Services for Partners 2

AvePoint Online Services for Partners 2 AvePoint Online Services for Partners 2 User Guide Service Pack 1 Issued June 2017 Table of Contents What s New in this Guide...4 About...5 Submitting Documentation Feedback to AvePoint...6 Browser Support

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.7 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

Getting Started with Soonr

Getting Started with Soonr WWW.SOONR.COM Getting Started with Soonr A Quick Start Guide for New Users Soonr Inc. 12/19/2012 Revision 1.1 Copyright 2012, Soonr Inc., all rights reserved. Table of Contents 1 How Soonr Workplace Works...

More information

Huawei Agile Controller. Agile Controller 1

Huawei Agile Controller. Agile Controller 1 Huawei Agile Controller Agile Controller 1 Agile Controller 1 Product Overview Agile Controller is the latest user- and application-based network resource auto control system offered by Huawei. Following

More information

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Drake Hosted User Guide

Drake Hosted User Guide Drake Hosted User Guide Last Revision Date: 1/2/2017 Support.DrakeSoftware.com (828) 524-8020 Drake Hosted User Guide Copyright The Drake Hosted User Guide, Drake Tax Software, and any other related materials

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information