Tera Term Telnet. Introduction

Size: px
Start display at page:

Download "Tera Term Telnet. Introduction"

Transcription

1 Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start a session on a remote computer, select TeraTerm - Telnet from the Network option of the Public menu: The start-up screen looks like this: A dialogue box containing a drop down list of pre-configured hosts will be shown, including the College s UNIX machine Alpha, the Library service and the BIDS service at Bath. To connect to one of these services, select the site name by clicking on it then click on the OK button. Telnet 1

2 A successful connection will produce a session window ready for you to log in to the selected computer: Connecting To Other Sites Graphics Emulation File Transfer Logging A Session As well as a standard Windows menu bar, with all the facilities of cut and paste editing, printing and saving, there is a vertical scroll bar, which enables you to scroll back through the output of a session. The menus are detailed in the appendix to this chapter. To open a connection to a computer other than those already listed in the New Connection dialogue box, delete the selected entry and replace it with the name of the computer to which you wish to connect then click OK. If your work requires graphical output (plots for example) you can switch to an emulation of a Tektronics terminal by choosing Open Tek from the Control menu. This starts up a second window in which you can continue working with both text and graphics. To send a file from your PC filestore to the remote machine or host, choose Send File from the File menu. Be sure to check the Binary check box if necessary, that is, if the file is anything other than a plain text file. There are several other file transfer protocols available under the Transfer option of the File menu, including Kermit, that allow transfer of files in either direction, provided the required software is running at the host site. You can save the output from a session by opening a log file. To do this, choose Log from the File menu, type in a file name in the resulting dialogue box and select the drive on which to save it (usually the G: drive). Anything that appears on the screen after this will be recorded in the file. To end recording, click on the Close button in the Log dialogue box (note that this box may be minimised to a button on the Windows task bar) or, if you have finished the session, just log out. You can also save selected text from the screen and copy it to other applications using Copy and Paste from the Edit menu. 2 Telnet

3 Ending A Session Configurations Changing Configuration Settings When you have finished the session on the remote machine, logout in the usual way and telnet will quit automatically. Each site name in the site lists has a configuration associated with it, which determines the appearance of the session, such as the font used, the size of the screen in columns and lines and the foreground and background colours. Many features of the telnet set-up and window appearance may be customised using the Set-up menu. For example, to change the number of columns and lines displayed, select the Terminal Set-up option to display the following dialogue box: Saving Settings SSH Security Then change the numbers in the Terminal Size boxes. To save settings, including the addition of your own sites to the sites list, choose Save Set-up from the Set-up menu, name the settings file and select a drive (usually G:) on which to save it. To use the settings you have saved in previous sessions, choose Restore settings from the Set-up menu and select the appropriate file. Secure Shell (SSH) is a system that provides strong authentication and secure communications over insecure channels. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. When using SSH's login procedure the entire session, including transmission of password, is encrypted and it is almost impossible for an outsider to collect passwords or other sensitive information. To use Tera Term with SSH protection, first check the SSH radio button in the New Connection window when you start a new session. The SSH Authentication window will then offer three authentication methods as shown here: Telnet 3

4 The first method uses a secure way of sending a password. Password only: The password you type in the 'passphrase' box is sent directly to the server. (It is sent over a secure channel, so no one will be able to read it simply by listening on the network.) The other methods use the principal of machine-generated private and public 'keys'. You will first need to have generated the appropriate keys on the machine to which you want to connect. One of these keys will then need to be copied to the local machine: RSA: Select a file containing your RSA private key. You can select a file by clicking on the button or by typing its name directly into the box provided. This file will have been generated by the sshkeygen program on the machine to which you are trying to connect. If this file is protected with a passphrase you should type the passphrase in the 'passphrase' box. rhosts and rhosts with RSA: Enter the local user name that the remote side is expecting. If you wish to prove the identity of the local machine to the server using an RSA key, select the private key file as with plain RSA authentication. The passphrase from the 'passphrase' box will be used to access the key. You should contact the system administrator of the host machine for advice on the generation and use of appropriate keys. Tera Term Appendix File Menus New connection... Connects to a new host or a serial port. Log... Logs received characters to a file. Send file... Sends a file to the host. Transfer Transfers files between the PC and the host with the Kermit/XMODEM/ZMODEM/B-Plus/Quick-VAN protocols. Change directory... Changes the current directory for file transfers. Print... Prints the current screen, or the selected text. Disconnect Closes the connection. If the connection type is TCP/IP and the Auto window close option is selected, Tera Term is also closed. Exit Closes Tera Term. If the connection is open, it is also closed. 4 Telnet

5 Edit Copy Copies selected text to the clipboard. Copy table Copies selected text to the clipboard. If the copied text consists of words, each space between words is converted to a Tab character. If you copy a table on the screen by using this command, you can paste it into a spread sheet application, like Excel. Paste Sends text in the clipboard to the host. Paste <CR> Sends text in the clipboard to the host, and then sends a newline code. Clear screen Erases the screen. Clear buffer Erases the scroll buffer and the screen. Setup Terminal... Changes the terminal emulation setup. Window... Changes the window setup. Font... Changes the font. Keyboard... Changes the keyboard setup. Serial port... Changes the serial port parameters. TCP/IP... Changes the TCP/IP setup. General... Changes the miscellaneous setup. Save setup... Saves the current setup to a Tera Term setup file. Restore setup... Restores setup data from a Tera Term setup file. Load key map... Load a keyboard configuration from a keyboard setup file. Control Reset terminal Resets various terminal modes. Are you there Sends an AYT (Are You There) telnet signal. Usually, the host sends back some message responding to it. This command is available only with a telnet connection. Send break Sends a break signal to the host. Telnet 5

6 Reset port Resets the serial port. This command is available only with a serial connection. Open TEK Opens the TEK window. Close TEK Closes the TEK window. Macro Runs a macro file. Window You can activate an existing window by selecting it from the list in this menu. At most 9 windows can be listed in this menu. If actual number of windows exceeds 9 and you want to activate a window which is not in the list, use the Window command at the bottom of this menu. Window... Activates or closes a Tera-Term window. Help Index Displays index of help topics. Using help Displays the help about Windows Help. About Tera Term... Displays information about Tera Term. 6 Telnet

SSH access to databases at DIMDI

SSH access to databases at DIMDI SSH access to databases at DIMDI From November 2013 we will be fulfilling the requirement of a large number of users for increased security during research activities. For this, we will be providing a

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure & Ad Hoc Networks Mac OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks Macintosh OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part

More information

Installing the SSH Client v3.2.2 For Microsoft Windows

Installing the SSH Client v3.2.2 For Microsoft Windows WIN1011 June 2003 Installing the SSH Client v3.2.2 For Microsoft Windows OVERVIEW... 1 SYSTEM REQUIREMENTS... 2 INSTALLING THE SSH PACKAGE... 2 STARTING THE PROGRAMS... 5 USING THE SHELL CLIENT... 8 USING

More information

F-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide

F-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide F-Secure Securing the Mobile Distributed Enterprise F-Secure SSH User's and Administrator's Guide F-Secure SSH for Windows, Macintosh, and UNIX Secure Remote Login and System Administration User s & Administrator

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

TELNET CLIENT 5.11 SSH SUPPORT

TELNET CLIENT 5.11 SSH SUPPORT TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Getting Started. A Getting Started Guide for Locum RealTime Monitor. Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED

Getting Started. A Getting Started Guide for Locum RealTime Monitor. Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED Getting Started A Getting Started Guide for Locum RealTime Monitor Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED Locum House, 84 Brown Street, Sheffield, S1 2BS, England Telephone: +44 (0) 114 252-1199

More information

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

Remote Desktop In OpenSUSE 10.3

Remote Desktop In OpenSUSE 10.3 Only for dummies Remote Desktop In OpenSUSE 10.3 Remote access to Linux GUI Environment from Windows Client Tedy Tirtawidjaja 5/14/2008 In Microsoft Windows environment we know Remote Desktop application

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII

IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII Internet Protocol (IP) Interface Product Options Cat # 1810815 IP Interface Only Cat # 1810870: Interface and DB9/RJ45 Adapter (9015028)

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session

More information

How To Industrial Networking

How To Industrial Networking How To Industrial Networking Prepared by: Matt Crites Product: Date: April 2014 Any RAM or SN 6xxx series router Legacy firmware 3.14/4.14 or lower Subject: This document provides a step by step procedure

More information

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software

More information

Configuration Guide. Remote Backups How-To Guide. Overview

Configuration Guide. Remote Backups How-To Guide. Overview Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter

More information

AnzioWin FTP Dialog. AnzioWin version 15.0 and later

AnzioWin FTP Dialog. AnzioWin version 15.0 and later AnzioWin FTP Dialog AnzioWin version 15.0 and later With AnzioWin version 15.0, we have included an enhanced interactive FTP dialog that operates similar to Windows Explorer. The FTP dialog, shown below,

More information

Install and configure SSH server

Install and configure SSH server Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd

More information

VPN Overview. The path for wireless VPN users

VPN Overview. The path for wireless VPN users VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0

More information

RSA SecurID Token User Guide February 12, 2015

RSA SecurID Token User Guide February 12, 2015 RSA SecurID Token User Guide Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation

More information

How to set up your Secure Email in Outlook 2010*

How to set up your Secure Email in Outlook 2010* How to set up your Secure Email in Outlook 2010* This guide is for hosting clients who are hosting their email with us. If you are using a third party email, you should not use these instructions. 1. Open

More information

Cloudvue Remote Desktop Client GUI User Guide

Cloudvue Remote Desktop Client GUI User Guide Cloudvue Remote Desktop Client GUI User Guide I. To connect to a Windows server - After power up, the login screen will be displayed. A. Auto Search/User Defined Use Auto Search to find available Windows

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

MATLAB on EC2 Instructions Guide

MATLAB on EC2 Instructions Guide MATLAB on EC2 Instructions Guide Contents Welcome to MATLAB on EC2...3 What You Need to Do...3 Requirements...3 1. MathWorks Account...4 1.1. Create a MathWorks Account...4 1.2. Associate License...4 2.

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc. XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Web File Management with SSH Secure Shell 3.2.3

Web File Management with SSH Secure Shell 3.2.3 Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided

More information

Allworx Installation Course

Allworx Installation Course VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The

More information

Steps for using MagicConnect

Steps for using MagicConnect Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,

More information

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin

More information

Campus VPN. Version 1.0 September 22, 2008

Campus VPN. Version 1.0 September 22, 2008 Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several

More information

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh...

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... Chapter7 Setting the Receiving PC for Direct Upload Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... 153 Setting the Receiving PC for Direct Upload This section explains

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

File Transfers. Contents

File Transfers. Contents A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Network Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Install MS SQL Server 2012 Express Edition

Install MS SQL Server 2012 Express Edition Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other

More information

X Series Application Note 43:

X Series Application Note 43: X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the

More information

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

Windows Server 2008 R2 Initial Configuration Tasks

Windows Server 2008 R2 Initial Configuration Tasks Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the

More information

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved. 2010 Ing. Punzenberger COPA-DATA GmbH All rights reserved. Distribution and/or reproduction of this document or parts thereof in any form are permitted solely with the written permission of the company

More information

Scan to E-mail Quick Setup Guide

Scan to E-mail Quick Setup Guide Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:

More information

Avalanche Enabler 5.3 User Guide

Avalanche Enabler 5.3 User Guide Avalanche Enabler 5.3 User Guide 30/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095 Telephone:

More information

Chapter 5 - Ethernet Setup

Chapter 5 - Ethernet Setup Chapter 5 - Ethernet Setup Chapter Overview Introduction... 5-3 EtherTalk Network Configuration... 5-3 Select the EtherTalk Phase 2 Driver...5-3 Change the EtherTalk Zone Name...5-4 Novell NetWare Configuration...

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

Configuring the WT-4 for ftp (Ad-hoc Mode)

Configuring the WT-4 for ftp (Ad-hoc Mode) En Configuring the WT-4 for ftp (Ad-hoc Mode) Windows XP Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2 ftp server

More information

Remote Access to Unix Machines

Remote Access to Unix Machines Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework

More information

DDNS Management System User Manual V1.0

DDNS Management System User Manual V1.0 DDNS Management System User Manual V1.0 1 03/01/2012 Table of Contents 1. Introduction.3 2. Network Configuration 3 2.1. Configuring DDNS locally through DVR Menu..3 2.2. Configuring DDNS through Internet

More information

Shellshock Security Patch for X86

Shellshock Security Patch for X86 Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL

More information

Configure thin client settings locally

Configure thin client settings locally This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring

More information

Using WS_FTP. This tutorial explains how to use WS_FTP, a File Transfer Program for Microsoft Windows. INFORMATION SYSTEMS SERVICES.

Using WS_FTP. This tutorial explains how to use WS_FTP, a File Transfer Program for Microsoft Windows. INFORMATION SYSTEMS SERVICES. INFORMATION SYSTEMS SERVICES Using WS_FTP This tutorial explains how to use WS_FTP, a File Transfer Program for Microsoft Windows. AUTHOR: Information Systems Services DATE: July 2003 EDITION: 1.1 TUT

More information

Lab 8.3.3b Configuring a Remote Router Using SSH

Lab 8.3.3b Configuring a Remote Router Using SSH Lab 8.3.3b Configuring a Remote Router Using SSH Objectives Use SDM to configure a router to accept SSH connections. Configure SSH client software on a PC. Establish a connection to a Cisco ISR using SSH

More information

CPEi 800/825 Series. User Manual. * Please see the Introduction Section

CPEi 800/825 Series. User Manual. * Please see the Introduction Section CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the

More information

How to use FTP Commander

How to use FTP Commander FTP (File Transfer Protocol) software can be used to upload files and complete folders to your web server. On the web, there are a number of free FTP programs that can be downloaded and installed onto

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Configuration Manual

Configuration Manual Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through

More information

Steps for using MagicConnect

Steps for using MagicConnect Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,

More information

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

Miami University RedHawk Cluster Connecting to the Cluster Using Windows Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.

More information

Internet Access to a DVR365

Internet Access to a DVR365 Configuration Details : Internet Access to DVR365 Page : 1 Internet Access to a DVR365 These instructions will show you how to connect your DVR365 to the internet via an ADSL broadband modem/router. The

More information

How-to: Single Sign-On

How-to: Single Sign-On How-to: Single Sign-On Document version: 1.02 nirva systems info@nirva-systems.com nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

DDM Distributed Database Manager for SQL and ODBC. Installation and User Guide Version 5.27.xx

DDM Distributed Database Manager for SQL and ODBC. Installation and User Guide Version 5.27.xx DDM Distributed Database Manager for SQL and ODBC Installation and User Guide Version 5.27.xx Communication Devices Inc. 85 Fulton St. Boonton, NJ 07005 USA Phone: 800 359 8561 Fax: 973 334 0545 Internet:

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter EOS UTility Mode Infrastructure or Ad Hoc Networks Windows XP / Windows 7 Professional 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in

More information

Getting Started with POS. Omni POS Getting Started Manual. switched on accounting

Getting Started with POS. Omni POS Getting Started Manual. switched on accounting Omni POS Getting Started Manual switched on accounting i i Getting Started with Omni POS Table Of Contents Overview...1 Setting up POS...2 Initial Steps...2 Tellers...2 POS Clearing Account...3 Printing...4

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks for Apple ios Devices 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Terminal Server Guide

Terminal Server Guide Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing

More information

Polycom RealPresence Desktop for Windows

Polycom RealPresence Desktop for Windows 3.1 January 2014 3725-69930-002A Polycom RealPresence Desktop for Windows Trademark Information POLYCOM and the names and marks associated with Polycom's products are trademarks and/or service marks of

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

WSNetServer User Manual. Date: July 13 2003

WSNetServer User Manual. Date: July 13 2003 Date: July 13 2003 1 Revision History... 2 2 Introduction... 2 3 Installation... 2 4 Normal Operation... 2 4.1 Startup... 2 4.2 About Box... 3 4.3 Specifying The Cross Point XY Broadcast Port... 3 4.4

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

Installing the Microsoft Network Driver Interface

Installing the Microsoft Network Driver Interface Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's

More information

Configuring Keystroke with KeyPay

Configuring Keystroke with KeyPay Configuring Keystroke with KeyPay Please read the PA-DSS Implementation Guide for Keystroke POS from our website before proceeding. It is also installed in the \KEYSTROK\DOC subdirectory on your computer.

More information

SQL Tuning and Maintenance for the Altiris Deployment Server express database.

SQL Tuning and Maintenance for the Altiris Deployment Server express database. Article ID: 22953 SQL Tuning and Maintenance for the Altiris Deployment Server express database. Question Now Deployment Server is installed how do I manage the express database? Topics that will be covered

More information

Configuring Basic Settings

Configuring Basic Settings CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the

More information

Quick Scan Features Setup Guide

Quick Scan Features Setup Guide Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)

More information

ICE. TCP PLUS. J. River, Inc. ICE.TCP PLUS Programs. DejaWinT with SSH FTP Pro ICElp Printing Network Toolbox

ICE. TCP PLUS. J. River, Inc. ICE.TCP PLUS Programs. DejaWinT with SSH FTP Pro ICElp Printing Network Toolbox ICE. TCP PLUS ICE.TCP PLUS Programs DejaWinT with SSH FTP Pro ICElp Printing Network Toolbox J. River, Inc. Table of Contents ICE.TCP PLUS Programs... 1 Installation:... 6 Install ICE.TCP PLUS Files on

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Job Aid: Creating Additional Remote Access Logins

Job Aid: Creating Additional Remote Access Logins This job aid describes the steps required to add an additional remote access login to the Avaya S8300, S8500, and S8700 Series Media Servers. These logins may be used to establish a Point to Point Protocol

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold

More information

Mac OS VPN Set Up Guide

Mac OS VPN Set Up Guide Mac OS VPN Set Up Guide If internet traffic is not being sent over the VPN then go to System Preferences- >Network and click on your VPN connection. Click the "Advanced..." button, and in the "Options"

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Load Balancing. Outlook Web Access. Web Mail Using Equalizer Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems

More information

INPS Remote Vision MIQUEST Training Manual

INPS Remote Vision MIQUEST Training Manual INPS Remote Vision MIQUEST Training Manual DEVELOPED BY: DHARMESH PATEL DATE: SEPTEMBER 2008 Page 1 of 24 MIQUEST Miquest stands for Morbidity Query Information Export Syntax. It is a tool recommended

More information

Instructions for Microsoft Outlook 2003

Instructions for Microsoft Outlook 2003 ElkhartNet, Inc. is dedicated to providing our email customers with excellent service and support. In a targeted effort to reduce SPAM and to provide more secure and faster email, we are changing our outgoing

More information

5nine Hyper-V Commander

5nine Hyper-V Commander 5nine Hyper-V Commander 5nine Hyper-V Commander provides a local graphical user interface (GUI), and a Framework to manage Hyper-V R2 server and various functions such as Backup/DR, HA and P2V/V2V. It

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information