Documente Academic
Documente Profesional
Documente Cultură
EMCRemote
Release 6.04
User Guide
P/N 300-007-598
REV A03
EMC Corporation
Corporate Headquarters:
Hopkinton, MA 01748-9103
1-508-435-1000
www.EMC.com
EMC CONFIDENTIAL
EMC believes the information in this publication is accurate as of its publication date. The information is
subject to change without notice.
Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com.
All other trademarks used herein are the property of their respective owners.
Contents
Preface
PART 1 Introduction
Chapter 1 Overview
Introduction to EMCRemote ........................................................... 20
How EMCRemote works ................................................................. 21
Connection methods......................................................................... 22
Connecting over TCP/IP ........................................................... 22
Connecting point to point with a modem............................... 22
Installation requirements ................................................................. 23
Modem (if used).......................................................................... 23
Operating systems ...................................................................... 23
Microsoft Visual C++ ................................................................. 23
Video drivers ............................................................................... 24
Mouse pointer scheme ...............................................................24
PART 3 Operation
PART 4 Appendixes
Index
Figures
Title Page
1 Mouse pointer scheme................................................................................... 24
2 EMCRemote user authorization acknowledgment ................................... 29
3 License key prompt........................................................................................ 30
4 Install Type dialog box .................................................................................. 33
5 Remote control incompatibility caution prompt ....................................... 34
6 License key prompt........................................................................................ 34
7 Uninstall welcome dialog box ...................................................................... 37
8 File Transfer Status progress windows (client and host) ......................... 43
9 EMCRemote main window .......................................................................... 54
10 Configure EMCRemote dialog box.............................................................. 55
11 Host Configuration WizardStart.............................................................. 55
12 Host Configuration WizardComputer Name ........................................ 56
13 Host Configuration WizardConnection.................................................. 56
14 Host Configuration WizardModem Selection ....................................... 57
15 Host Configuration WizardModem Selection ....................................... 57
16 Host Configuration WizardWait for a Call ............................................ 58
17 Host Configuration WizardWait for a Call ............................................ 58
18 Host Configuration WizardRestart.......................................................... 59
19 Host Configuration WizardSecurity Options ........................................ 60
20 Host Configuration WizardLogon Security Options ............................ 61
21 Host Configuration WizardPerformance Options ................................ 62
22 Host Configuration WizardFinish ........................................................... 63
23 EMCRemoteHost main window, immediately after an initial configura-
tion .................................................................................................................... 64
24 Initial response to Wait for a Call toggle .................................................... 65
25 Opening EMCRemote Host from the Windows taskbar or tray ............. 66
26 EMCRemoteHost in Waiting for connection mode........................... 66
27 EMCRemote Host settings window ............................................................ 69
28 Master password prompt.............................................................................. 69
29 Master Password dialog box ........................................................................ 70
Tables
Title Page
1 Checklist for Host Configuration Wizard.................................................... 52
2 Checklist for Client Configuration Wizard ................................................. 82
3 EMCRemote connection messages ............................................................. 125
4 Login parameters for Service Credential GINA ....................................... 130
5 Video resolution descriptions...................................................................... 133
6 EMCRemoteHost menu bar contents..................................................... 161
7 Host Settings tabs .......................................................................................... 163
8 General options descriptions....................................................................... 164
9 Performance options descriptions .............................................................. 167
10 Security options descriptions ...................................................................... 170
11 Master Password dialog box ....................................................................... 172
12 Logon Security options descriptions .......................................................... 174
13 Modem settings descriptions....................................................................... 178
14 TCP/IP Settings descriptions ...................................................................... 179
15 TCP/IP Port ................................................................................................... 180
16 Caller Setup: Default..................................................................................... 182
17 Caller SetupIndividual ............................................................................. 183
18 Caller PropertiesGeneral .......................................................................... 185
19 Caller Properties: Privileges settings.......................................................... 188
20 Time tab settings............................................................................................ 189
21 Callback settings notes ................................................................................. 192
22 Call Manager menu bar contents ................................................................ 197
23 Call Manager Dialer body fields ............................................................ 201
24 Call Manager Settings tabs........................................................................... 203
25 Call Manager Settings: General options descriptions.............................. 204
26 Call Manager Settings: Connect Attempts options descriptions............ 206
27 Call Manager Settings: Performance options descriptions ..................... 208
28 Properties Settings tabs ................................................................................ 210
29 Communication settings: Logon tab options descriptions...................... 211
30 Communication settings: Connection options descriptions ................... 213
Preface
Audience This guide is part of the EMCRemote 6.04 documentation set, and is
intended for use by EMC customers, EMC Customer Service
Engineers (CSEs) and EMC Third Party Maintainers (TPMs) who
install, troubleshoot, and maintain the EMC communications
program EMCRemote. It is also intended for reference and occasional
use by customer representatives managing EMCRemote Host
operation.
Related Related EMC publications include the EMCRemote Release 6.04 Release
documentation Notes.
! CAUTION
A caution contains information essential to avoid a hazard that will
or can cause minor personal or property damage if you ignore the
warning.
! IMPORTANT
An important notice contains information essential to operation of
the software. The important notice applies only to software.
Typographical conventions
EMC uses the following type style conventions in this guide:
Normal Used in running (nonprocedural) text for:
Names of interface elements (such as names of windows,
dialog boxes, buttons, fields, and menus)
Names of resources, attributes, pools, Boolean expressions,
buttons, DQL statements, keywords, clauses, environment
variables, filenames, functions, utilities
URLs, pathnames, filenames, directory names, computer
names, links, groups, service keys, file systems, notifications
Bold: Used in running (nonprocedural) text for:
Names of commands, daemons, options, programs,
processes, services, applications, utilities, kernels,
notifications, system call, man pages
Used in procedures for:
Names of interface elements (such as names of windows,
dialog boxes, buttons, fields, and menus)
What user specifically selects, clicks, presses, or types
Italic: Used in all text (including procedures) for:
Full titles of publications referenced in text
Emphasis (for example a new term)
Variables
Courier: Used for:
System output, such as an error message or script
URLs, complete paths, filenames, prompts, and syntax when
shown outside of running text.
Courier bold: Used for:
Specific user input (such as commands)
Courier italic: Used in procedures for:
Variables on command line
User input variables
<> Angle brackets enclose parameter or variable values supplied by
the user
[] Square brackets enclose optional values
Where to get help EMC support, product, and licensing information can be obtained as
follows.
Product information For documentation, release notes, software
updates, or for information about EMC products, licensing, and
service, go to the EMC Powerlink web site (registration required) at:
http://Powerlink.EMC.com
PART 1
Introduction
Overview
Overview 19
EMC CONFIDENTIAL
Overview
Introduction to EMCRemote
EMCRemote is an EMC program that allows communication
between two computers:
Host computer Located at the customers site, this computer
can be any of the following:
CLARiiON management station
CLARiiON storage array
EMC Centera management station
Connectrix server
EMC ControlCenter Server
EMC Invista
RepliCareTM management station
Symmetrix service processor
Client computer This computer can be either of the following:
CLARiiON management station
Customer Service PC belonging to either EMC or an
Alternative Service Provider (ASP)
EMCRemote is a Microsoft Windows based program that allows
Customer Service personnel to remotely access a host computer and
perform the following activities:
Run programs
Monitor, interrogate, manipulate, transfer files
Chat
Reboot the system
Log in or log out of the system
Automatically log in using short-lived credentials
21
EMC CONFIDENTIAL
Overview
Connection methods
EMCRemote allows you to connect two computers through the EMC
Secure Remote Support Gateway system. Alternatively, you can use a
modem.
After you have connected, the controlling computer takes command
of the host to access its programs and data files. The clients screen,
keyboard, and mouse function as though you were using their host
counterparts.
Installation requirements
Before installing EMCRemote, verify that your installation
environment meets the requirements in this section.
Operating systems
To identify the currently supported Windows operating systems,
please connect to Powerlink and navigate or query for the latest
EMCRemote Release Notes:
http://Powerlink.EMC.com
This file can be downloaded from the Microsoft web site. The
required version numbers are:
Quick Details version 8.0.50727.762 (or later).
After downloading the files from Microsoft, right-clicking on the
package icon and opening Properties and then opening the
Version tab shows file version number 6.0.3790.0 (or later).
When installed as standalone libraries, these packages display as
version 8.0.56336 (or later).
23
EMC CONFIDENTIAL
Overview
Note: When using versions of the runtime libraries listed here, EMC cannot
guarantee the runtime libraries are compatibile with operation of all other
non-EMC applications requiring a Visual C++ redistributable package.
Video drivers
! CAUTION
The EMCRemote Host may be incompatible with some system
video drivers. It is recommended that you update your video
drivers to the latest version before installing the EMCRemote Host.
Installation Options
Installation Options 27
EMC CONFIDENTIAL
Installation Options
Installation
EMC-external GA distribution (EMC customers and EMC TPMs)
distribution Client only This installer is for GA and EMC Third Party
Maintainers (TPMs) distribution. For installation instructions,
readthe section Installing the client-only version on page 29.
sr_tpm_client.exe
Full (client and host) This installer puts both a client and a
host on one machine. It is also available in limited distribution for
TPM use. For installation instructions, see Installing the full
(both client and host) version on page 32.
sr_full.exe
Uninstallation
For uninstallation instructions for any version of EMCRemote, see
Uninstalling EMCRemote on page 37.
3. Click OK.
A dialog box appears (Figure 2 on page 29), asking you to
acknowledge that you are authorized to use the product.
29
EMC CONFIDENTIAL
Installation Options
31
EMC CONFIDENTIAL
Installation Options
Preparation Immediately before installing EMCRemote you need to exit from all
other programs.
3. Click OK.
A dialog box appears (Figure 2 on page 29), asking you to
acknowledge that you are authorized to use the product.
4. Click I Accept to accept the terms.
The Install Type dialog box (Figure 4 on page 33) appears.
33
EMC CONFIDENTIAL
Installation Options
7. If you are installing the TPM version, you are prompted to type a
license key (Figure 6 on page 34). Type in the license key
applicable to your organization (the cursor automatically
advances from field-to-field as you type the key), and click OK.
35
EMC CONFIDENTIAL
Installation Options
Uninstalling EMCRemote
1. Invoke the uninstallation process by:
Using Add/Remove Programs:
a. Select Start > Settings > Control Panel > Add/Remove
Programs to open the program list.
b. Select EMCRemote, then click Change/Remove to remove
all EMCRemote software.
or
Using the EMCRemote program menu, select Start >
Programs > EMCRemote > Uninstall EMCRemote
You see the acknowledgment as shown in Figure 7 on page 37.
2. Click Next.
The uninstaller program silently removes the EMCRemote
components installed. You are then prompted to reboot. You save
any data and exit any other programs running, if necessary,
beforehand.
3. Click OK to start the reboot.
4. After reboot, verify that the software has also been removed by
making sure that EMCRemote is not listed in Control Panel
Add/Remove Programs.
37
EMC CONFIDENTIAL
Installation Options
3
Configuration
Considerations
Configuration Considerations 39
EMC CONFIDENTIAL
Configuration Considerations
Recording activity
Audit log (event log) EMCRemote can keep track of every login, failed login attempt, and
file transfer performed on the host, with each entry timestamped. You
can use this record to keep track of who is using the host and the
actions they performed:
Audit logs are located in the EMCRemote installation root folder.
The default installation root path is:
C:\Program Files\EMC\SymmRemote\
Audit log filenames are (for host and client, respectively):
Host: PWHOST.LOG
Client: PWCLIENT.LOG
Audit logging is also captured by Microsoft Message Queuing
(MSMQ). Some EMC products use this queue to compile their
own logs.
Audit logs can be configured to exclude status messages. Doing
this can greatly reduce the size of PWHOST.LOG.
Excluded messages are listed in Table 37, Audit log: Host
status messages, on page 225.
For details:
Host: see Host Settings: General on page 164.
Client: see Communication settings: Logon on page 211.
MSMQ: see Microsoft web site or other Microsoft documentation.
Chat log EMCRemote can also track Chat activity, with each entry
timestamped. You can use this record to keep track of who is using
the host or client and the actions they performed.
Chat logs are located in the EMCRemote installation root folder.
The default installation root path is:
C:\Program Files\EMC\SymmRemote\
Chat log filenames are (for host and client, respectively):
Host: HOSTCHAT.TXT
Client: CLIENTCHAT.TXT
Host chat logging can be activated or deactivated at any time the
host settings are accessible. See Table 8 on page 164.
41
EMC CONFIDENTIAL
Configuration Considerations
Onsite security
EMCRemotes onsite security features can be crucial in high traffic
areas, if you are working with confidential material, or if the host will
be left running unattended in an area accessible to others.
Master password
The Host Settings allow you to specify the keys that will open the
host to the calling client, and the privileges the client will enjoy. The
host allows you to further protect these keys by protecting access to
the Host Settings themselves, by use of a master password.
When you first install EMCRemote, the master password is
undefined, and the host will not prompt for a password before it
allows access to its settings. After you have specified a password, the
host prompts for it each time you access the Host Settings dialog box.
See Master Password on page 172.
Data encryption
By default, EMCRemote encrypts all data communicated between the
host and the client using advanced data encryption techniques.
43
EMC CONFIDENTIAL
Configuration Considerations
Host password
Host passwords enable you to control who can connect to the host. A
user must know the hosts password to establish connection. Host
passwords are effective over a dialup or IP connection.
Depending on whether you are using a single set of default Caller
properties, or (one or more) sets of Caller-specific properties, the host
password is defined through, respectively, either:
Caller Setup: Default on page 182, or
Caller Properties: GeneralIndividual only on page 185.
Access code
In concert with a specialized client, a license key paired with an
access code can be used to control client-to-host access over modem
connections.
This method is used by:
EMC partners
Alliances
Third Party Maintainers (TPM)
Other parties in special circumstances
Access codes are not required by EMC Customer Support.
Note: EMC Customer Support uses a version of EMCRemote Client
software that does not require a license key.
A host can be configured with one or more unique access codes that
allow modem connections from a client with a matching license key.
The client license key is inserted during the client installation.
Keyed clients that do not have a matching license key will receive the
message Access code mismatch if attempting to connect over a
modem. If the host is not configured with at least one access code, a
keyed client attempting to access the host through a modem
connection will receive the message Access code not set No modem
access allowed. All keyed clients will be forced to access the host
through an IP connection only.
As described with host passwords, access codes are defined in one of
two places:
Caller Setup: Default on page 182,
or Caller Properties: GeneralIndividual only on page 185.
Caller properties
Caller properties settings allow you to identify the specific activities
each user or class of users is allowed to perform. They are extensions
of the attributes of either a default single caller, or of each specific
user (individual) caller. Procedures and options for these properties
are described in the following sections:
Caller Properties: PrivilegesDefault or Individual on
page 187
Caller Properties: TimeDefault or Individual on page 189
45
EMC CONFIDENTIAL
Configuration Considerations
! CAUTION
You can also disable Restart Windows at end of session. However,
this leaves the host somewhat more vulnerable, as described in
Recovering from an accidental disconnect, which follows.
! CAUTION
Unless you have selected the Start the host whenever your system
starts option, you will not be able to log in to the host after an
automatic reboot. Instead, Windows will display its login prompt,
waiting for you to log in locally.
47
EMC CONFIDENTIAL
Configuration Considerations
49
EMC CONFIDENTIAL
Configuration Considerations
4
Host Configuration
Procedure
Note: If you cancel the wizard during this initial run, and then later
restart the host, the wizard will not restart automatically. To re-invoke it,
select Settings > Configuration Wizard from the host menu.
53
EMC CONFIDENTIAL
Host Configuration Procedure
2. Select Configure.
The Configure EMCRemote dialog box opens (Figure 10 on
page 55).
4. Click Next.
55
EMC CONFIDENTIAL
Host Configuration Procedure
5. Type a name for the host computer, and then click Next.
The Host Configuration Wizard - Connection dialog box opens
(Figure 13 on page 56).
7. Select from the drop-down list the type of modem, and click Next.
The Host Configuration Wizard - Startup dialog box opens
(Figure 15 on page 57).
8. Select the method EMCRemote will use to start, and click Next.
57
EMC CONFIDENTIAL
Host Configuration Procedure
59
EMC CONFIDENTIAL
Host Configuration Procedure
61
EMC CONFIDENTIAL
Host Configuration Procedure
63
EMC CONFIDENTIAL
Host Configuration Procedure
It will not yet actively be waiting for a call. You will now need to
switch to Waiting for a call mode.
EMCRemote loaded is
uncovered after wizard
dialog box closes.
Instead, the Caller Setup dialog box appears, and Dont accept
calls appears in the lower right (Figure 24 on page 65). This
happens because you have not yet set a host password.
65
EMC CONFIDENTIAL
Host Configuration Procedure
67
EMC CONFIDENTIAL
Host Configuration Procedure
Hint:Be sure to set a master Before continuing, you should set a master password.
password. See discussion at
right. For more information on setting the master password, read the
section Setting the master password on page 70.
Click Settings
! IMPORTANT
If the Remember this password checkbox is selected, the
master password can then be changed by any local host user
who invokes Settings > Security > Master Password.
69
EMC CONFIDENTIAL
Host Configuration Procedure
Note: Contrast this with the host password, which controls which user has
login access to EMCRemote Host.
! IMPORTANT
When you set a master password, it is important that you not lose or
forget it. If you do, you will need to uninstall and then reinstall
EMCRemote before you can access the hosts settings.
Start procedure
On the EMCRemote Host window (under region on left side
labeled Connection), click Wait for a Call (far left icon button) so that
it changes the host listener status to read Dont accept calls.
Select Modem
Click Setup
Connection
71
EMC CONFIDENTIAL
Host Configuration Procedure
Click Settings
3. Click Settings.
The modem properties sheet (Figure 32 on page 72) appears.
Select TCP/IP
Click Setup
Connections
73
EMC CONFIDENTIAL
Host Configuration Procedure
Note: You should not set the TCP/IP port unless your network
administrator instructs you to do so.
Prior configuration: The GUI response to step 2 depends on which caller properties
configuration you chose in Logon Security (see figure at left, and
Host Settings: Logon Security on page 173):
If you chose Use Default Setup... , after step 2 go to Path 1:
Default caller properties (single property set) on page 76.
If you chose Use individual Caller Setup... (or know that you
are using RSA security for credential-enabled devices), after
step 2 continue with Path 2: Individual caller properties
(multiple property sets) on page 77.
75
EMC CONFIDENTIAL
Host Configuration Procedure
Note: For RSA security (SLC-enabled hosts), single-user setup is never used.
If you are using RSA security, you will instead follow Path 2: Individual
caller properties (multiple property sets) on page 77.
If you are using the Default Setup for your caller configuration, and
you have clicked Set up Caller (Figure 36 on page 75), the Caller
Setup dialog box (Figure 37 on page 76) opens.
1. In the Access Code box, type the client's unique 5-digit access
code (Access code on page 44).
If keyed clients will not be used, or if this host is accessed only
with IP, this field is not required:
Leave blank
If you want to use multiple access codes:
Type two or more codes: You must separate each adjacent pair
of codes with a single comma, a semicolon, or a space.
2. If you have not set a host password, type a password in the
Password box, and then retype it in the Confirm Password box.
3. Optionally, click the Default Settings to open the Default Caller
Properties, which enables you to set properties for all callers.
When you are done editing the properties, click OK to return to
the Caller Setup dialog box.
4. Click OK to save your settings.
5. Continue with Assign caller privileges on page 78.
77
EMC CONFIDENTIAL
Host Configuration Procedure
After clicking Edit, New, or Copy, you will see the Caller
Properties window.
79
EMC CONFIDENTIAL
Host Configuration Procedure
5
Client Configuration
Procedure
2. Select Configure.
The Configure EMCRemote dialog box opens (Figure 41 on
page 84).
83
EMC CONFIDENTIAL
Client Configuration Procedure
4. Click Next.
5. Type a name (or confirm the captured name string) for the client
computer, and then click Next.
The Client Configuration Wizard - Full Screen dialog box opens
(Figure 44 on page 85).
85
EMC CONFIDENTIAL
Client Configuration Procedure
87
EMC CONFIDENTIAL
Client Configuration Procedure
89
EMC CONFIDENTIAL
Client Configuration Procedure
Settings button
! IMPORTANT
Before proceeding to Step 2, note that for the next prompt you
must:
(1) Carefully type a password in the single Password field.
(2) Remember, or write down, this database password for
future use.
Database password
The database password is a personal, case-sensitive password that
unlocks your dialing database directory. When you initially open this
screen, type any password. During future use of the Call Manager,
you will see the same prompt, but your entry must match the stored
password.
! CAUTION
Do not lose this password. Otherwise, your database cannot be
recovered, and client software must be reinstalled.
3. Type your database password, taking care when typing it, and
record it for future use. Click OK.
4. Continue with Client configuration: Application (Call Manager
settings) on page 93.
91
EMC CONFIDENTIAL
Client Configuration Procedure
Note: If you lose your database password, you must reinstall the client
software.
93
EMC CONFIDENTIAL
Client Configuration Procedure
(b)
(a)
Figure 58 Dial Directory just after opening (a) initially and (b) after populating
97
EMC CONFIDENTIAL
Client Configuration Procedure
Figure 60 Default Settings for New Address Book Entries dialog box: Logon tab
Note: Logon ID and Password fields are dimmed for Default Settings.
2. A dialog box (Figure 61 on page 99) with the name of the target
device appears, with the Logon tab open.
99
EMC CONFIDENTIAL
Client Configuration Procedure
Connection tab
To change connection settings:
Select the Connection tab (Figure 62 on page 100).
From here:
If using TCP/IP settings, continue with TCP/IP settings on
page 101.
If using a modem connection, continue with Modem settings
on page 100.
Note: If settings options for more than one modem are indicated, be sure
to identify the correct modem.
2. Click Properties.
101
EMC CONFIDENTIAL
Client Configuration Procedure
3. Click Advanced.
The TCP/IP Port dialog box (Figure 65 on page 102) appears.
Security tab
If a target host grants the right to lock your client keyboard and
mouse, or blank your screen, Security options are operational. These
are accessible as shown in Figure 66 on page 103:
103
EMC CONFIDENTIAL
Client Configuration Procedure
Callback tab
105
EMC CONFIDENTIAL
Client Configuration Procedure
! CAUTION
This password is your personal password that unlocks your
dialing database directory. The first time you open this screen,
type any password, but be sure to remember it or you will lose
your database.
5. Double-click the Add New Entry icon, or click New, for the
Address Entry Wizard Start panel (Figure 71 on page 107).
6. Click Next.
107
EMC CONFIDENTIAL
Client Configuration Procedure
7. Type a name for the host computer, and then click Next (Figure 73
on page 108).
109
EMC CONFIDENTIAL
Client Configuration Procedure
11. Select the modem type, and then click Next (Figure 75 on
page 110).
12. Type the telephone number, and then click Finish (Figure 76 on
page 110).
111
EMC CONFIDENTIAL
Client Configuration Procedure
Note: To modify an existing address book entry, right-click on the entry and
select Properties from the pop-up menu.
3. Type the string to replace in the Find string field, and type the
string to substitute in its place into Replace with.
4. Click OK.
The client now searches its Caller database, and automatically and
silently substitutes all instances of the designated values into that
database.
113
EMC CONFIDENTIAL
Client Configuration Procedure
PART 3
Operation
6
Using the Client to
Access a Host
Starting a connection
Once you have prepared the host to receive a call, and created your
address book entry, you are ready to place a call. To place a call to a
remote host, use the EMCRemote connection database to select an
EMCRemote address book entry and then from the EMCRemote Call
Manager, place a call.
You can connect to a host using either:
Connecting using the Call Manager on page 119
Connecting using the Dialer on page 122
Alternatively, you can access Host calling from the Splash Screen,
described below.
Note: You can also more directly connect to a host by making a call from the
Program Menu. See Connecting using the Call Manager on page 119.
Note: For information on setting up new address book entries, refer to Call
Manager configuration: Address book on page 105.
Note: If you are connecting through TCP/IP, or if you have more than
one serial connection available, you can use EMCRemote to run multiple
remote control sessions at once. Simply return to the Call Manager
window and repeat for each host you want to call. However, each host
can accept only one caller at a time.
119
EMC CONFIDENTIAL
Using the Client to Access a Host
The Call
button
A selected address
book entry
121
EMC CONFIDENTIAL
Using the Client to Access a Host
123
EMC CONFIDENTIAL
Using the Client to Access a Host
Completing a connection
Current connection
status message
Message Notes
Waiting for a Modem session In the process of contacting the host through modem and waiting for a reply.
Waiting for a IPv4 session In the process of contacting the host through IPv4 protocol and waiting for a reply.
Waiting for a IPv6 session In the process of contacting the host through IPv6 protocol and waiting for a reply.
Sending user credential and Host has acknowledged it is ready, and client has supplied login information.
password
RSA library is missing or corrupted Presented when encryption software is missing, corrupted, or otherwise could not be
accessed.
Waiting for next Fob tokencode Presented if credential validation depends on verification of multiple tokencodes (time
window).
Connection Error TCP/IP connection has been established, but upper protocol returned error.
Maximum login attempts have been After the maximum number of allowed attempts have been made.
reached. Login failed.
125
EMC CONFIDENTIAL
Using the Client to Access a Host
Message Notes
Maximum connection time has been Presented when, at the previous logout time, the cumulative time of previous connections
exceeded. Login failed. exceeded maximum.
SLC expired Presented when the local system time has passed the SLC expiration timestamp.
Host version number is x.xx.xx Presented after Login ID and password are both accepted.
Connection results
Success After EMCRemote has successfully connected to a host, the
connection process attempts to authenticate you by using the
information supplied from the address book entry you selected, or
you are prompted for it.
If authentication is successful, a session will then be established, and
you will be able to see the host monitor as a local user would see it,
but within in a Session window. A local user may or may not be
logged in. Continue with Session establishment on page 126.
Failure If the connection attempt cannot be completed, you will know from
feedback provided in the Connection Status window. In particular, if
there is remote user session contention, the request will time out. See
Figure 84 on page 124 and EMCRemote connection messages on
page 125.
Session establishment
If someone is already Upon establishing a session you may find that a local user at the host
logged in may already be logged in, in which case you will see the users
desktop interface. If so, skip to After successful login on page 131.
If no one is already After you connect to a host, a local user may not be logged in. In this
logged in case you will see the Windows login prompt inside an EMCRemote
client Session window, as shown in Figure 85 on page 127.
From here you can access the login interface (GINA) at the host, and
log in using one of two methods:
If SLC is implemented, you can bypass the manual interface with
a Service Credential login sequence. See Automated login on
page 127.
Or, invoke the hosts login GINA and manually key in your user
ID and password or SLC credentials using Manual login on
page 129.
Automated login If you are using RSA security credentials you can invoke a fully
automated login command from the Session window: Options >
Auto Login with SLC (as shown in Figure 86 on page 128), or click
RSA.
RSA button
127
EMC CONFIDENTIAL
Using the Client to Access a Host
When you invoke Auto Login, the client Session packages the login
command with your currently active SLC login credentials. The
remote hosts Windows login GINA is then invoked silently. If your
login credentials are successfully authenticated, you will next see the
host desktop (similar to Figure 89 on page 131).
Manual login From the Session window you can also invoke the remote hosts
Windows login GINA, by selecting Options > Send Ctrl+Alt+Del to
Host, or clicking Login. After you invoke this function, you can log in
as if you were local at the host:
129
EMC CONFIDENTIAL
Using the Client to Access a Host
Type Username field Label: Contents Password field Label: Contents Domain
RSA security
SLC Credential: Recently generated SLC string Password: Users SLC Password SLC
Fob Passcode: Fob digital readout PIN: Users fob PIN FOB
Local use Username: Local users login ID Password: Local users login password Local Host
Figure 89 The client Session window showing client computer desktop context
131
EMC CONFIDENTIAL
Using the Client to Access a Host
Note: One quick way to tell whether you are running a program on the host
computer is to minimize the Session window by clicking the small dash in
the upper right corner. If the application you are working on disappears, it is
actually running on the host. Remote host applications are visible only in the
Session window.
Resolution Description
Both computers use the same The default Session window will fill your entire screen.
resolution. There will be scroll bars, but you will be able to see
almost the entire host desktop without scrolling.
The host computer uses a The entire host desktop will appear in the Session
lower resolution. window with extra room on the sides, and no scroll bars.
The host computer uses a The default Session window will fill your entire screen
higher resolution. and you will need to scroll to view the entire desktop.
133
EMC CONFIDENTIAL
Using the Client to Access a Host
4. Make the host desktop take up the entire screen on the client:
EMCRemote offers the following methods to maximize the
Session window display. You will need to experiment to
determine which method works on your system:
Click Full Screen (Figure 91 on page 134).
The Full Screen button displays as much of the host desktop
as possible on your screen. If any space is being taken up by
the button bar, the Windows taskbar, or menus, EMCRemote
hides them from view.
135
EMC CONFIDENTIAL
Using the Client to Access a Host
Figure 93 File Transfer window (with portion of initial view): View > All Drives
Note: When you choose View All Drives, it may take several minutes
for the screen in Figure 94 on page 137 to open, as information for all
drives must come across the connection.
The File Transfer window looks and works much like two
Explorer windows placed side by side. By default, the local
clients files are displayed on the left side and the remote hosts
files are displayed on the right.
4. Select the file(s) or director(ies) that you want to transfer, then:
Drag it to the destination location
or
While in the File Transfer window, select File > Send
or
While in the File Transfer window, click the Start Transfer
button (looks like Session windows File Transfer button).
File Transfer The files and directories on The files and directories on
windows Start
Transfer button the client computer. the remote host computer.
137
EMC CONFIDENTIAL
Using the Client to Access a Host
The File Transfer Status dialog box appears, showing you the file
or files you selected (Figure 95 on page 138).
Click Start to
begin the file
transfer.
139
EMC CONFIDENTIAL
Using the Client to Access a Host
When you are satisfied with the settings, click OK to save them and
return to the File Transfer window.
Note: This feature can be used to capture and transfer text data
(formatted or not) from any application that allows copying to the
clipboard, and usually allows image capture. However, Get Clipboard
should not be used to capture non-text (such as WordArt, Excel
spreadsheet, or other) data from Microsoft applications. Microsoft
applications may handle the captured data in a proprietary way that is
not transferable across EMCRemote.
141
EMC CONFIDENTIAL
Using the Client to Access a Host
Executing a command
To execute a command or program on the host and/or client, similar
to doing so at the Windows Run prompt, do the following:
1. Select Options > Execute Application or click Run (Figure 98 on
Run button page 142).
To temporarily lock out the keyboard and mouse on the host from the
client, select Options > Lock Host Mouse and Keyboard or click
Lock Host. Performing this action again unlocks the keyboard and
mouse.
Lock Host button
To blank the host computers screen, so that users at the host cannot
see actions being taken, select Options > Blank Host Screen or click
Blank Host. Performing this action again enables the host screen.
Reboot Host button To pause a remote session on the client screen, select Options > Pause
Remote Control or click Pause. Performing this action again enables
the client screen.
Pause button
143
EMC CONFIDENTIAL
Using the Client to Access a Host
7
Two-Sided EMCRemote
Session
Introduction
A common use for remote control is to access the host computer
while you are away from the customers site. There are times,
however, when you may want to use remote control to communicate
or demonstrate a process with another person at a remote computer.
One example of this is the Customer Support Center, where someone
logs in to the host while you are at the customers site to troubleshoot
a problem.
Who is in charge?
In every EMCRemote session there is a host computer, and a
computer that controls the host. Before starting a remote control
session, you need to decide which computer will host the session,
and which computer will control. This will determine how you
launch your side of the session. You must always have one client and
at least one host for a remote control session.
Note: If you decide to change roles in the remote control session, simply
disconnect and launch the other EMCRemote component.
147
EMC CONFIDENTIAL
Two-Sided EMCRemote Session
Preparing the host 1. Run the EMCRemote Host, as described in Host startup (first
time) on page 52 or Host startup (after the first time) on
page 66.
2. Review the hosts settings, if desired.
3. Make sure that the host windows status line says Waiting for a
call. If it does not, select Action > Wait for a call from the menu,
or click Wait for a call.
4. Wait for the client to call. If the host prompts with the
confirmation dialog, click Yes to allow the correct caller to log on.
Preparing the client 1. Run the EMCRemote Call Manager, as described in Client
startup (first time) on page 82 or Client startup (after the first
time) on page 92.
2. Verify that you have configured an address book entry for the
host, as explained in Call Manager configuration: Address
book on page 105.
3. Highlight the address book entry for the host, and select Action >
Place a call to a Host from the menu, or click Call.
4. Wait for the connection.
Caller confirmation Caller confirmation displays a confirmation dialog box when someone
is trying to log in to the host computer. You can either grant or deny
the caller access, which gives you greater control over your system
(Figure 100 on page 149).
Caller confirmation
notifies you when a call is
coming in. It also allows
you to confirm or deny
access to your host.
Note: If you select the Hang up option, be sure to disable this option
when you want to call in to your own computer. Otherwise, you
could set the computer as a host, leave, call in remotely, and have the
host hang up because you are not there to confirm your own access.
149
EMC CONFIDENTIAL
Two-Sided EMCRemote Session
Blanking the Blanking the connected computer blanks the Session window, so
connected computer neither person can see what action is taking place on the other
computer.
Occasionally, you may need to enter sensitive information while
someone else is remotely controlling your computer. In this case, you
may want to temporarily blank the screen while you type in
confidential information.
Note: Be sure to give ample warning to the caller before blanking his or her
screen. This command only blanks the Session window, but the user might
end the remote control session if he or she does not understand what is
occurring.
Note: The EMCRemote Chat dialog box will not remain open if you reboot
the host computer at the end of the session.
151
EMC CONFIDENTIAL
Two-Sided EMCRemote Session
Chat logging
Your chat session is stored both at the client and at the host. See Chat
log on page 41.
To disable chat logging at the host, you can disable it through the
Host Settings: General tab. See
Figure 102 File Transfer Status windows (client and host examples)
PART 4
Appendixes
A
Host Configuration
Reference
This appendix provides details about the EMCRemote Host GUI and
other user interfaces:
Starting EMCRemote and the host................................................. 158
Host reference: Main window ........................................................ 160
Host reference: Application settings (Host Settings)................... 163
Host reference: Connection settings .............................................. 176
Host reference: Caller settings ........................................................ 181
Windows Start menu The EMCRemote installation program provides a particular set of
functionality for the menu items.
Click Start > Programs > EMCRemote to see the available
EMCRemote menu items. (The Full version installation list is
shown in Figure 103 on page 158.)
Figure 103 Start > Programs > EMCRemote (shown for Full installation)
The Start menu items provide access as noted, and may include some
or all of the following, depending on your installation version:
EMCRemote Help (This is a WinHelp implementation.)
EMCRemote This option starts up the general-access splash
screen, shown in Figure 104 on page 159.
For a host, from the splash screen you can:
Wait for a call
Configure your host
Additional options allow client configuration and operation, if a
client was installed locally.
Uninstall EMCRemote Removes all components of any
versions of EMCRemote existing on your computer.
Convert Database (Client use only)
Place a call (Client use only)
Wait for a call Opens the EMCRemote Host main GUI
window. See Host reference: Main window on page 160.
Splash screen menu You can keep a splash screen (Figure 104 on page 159) running for
quick access to one of four action categories. This screen is invoked
by the EMCRemote item inside Start > Programs > EMCRemote:
Place a call (Client use only)
Wait for a call Opens the EMCRemote Host main GUI
window. See Host reference: Main window on page 160.
Configure To host (or local client) application settings. See
Figure 105 on page 159.
159
EMC CONFIDENTIAL
Host Configuration Reference
Configuration mode
Operation mode
Command Description
File
Clear Log Remove all entries from log file.
View Log Opens log in plain-text editor window.
View Diagnostic Log Opens diagnostic log in plain-text editor window.
Exit Shut down EMCRemote Host.
View
Action Bar Icon menu below menu bar.
Small Action Bar Use small icons in the display.
Large Action Bar Use large icons in the display.
No Action Bar Hide icon menu.
Note: All appropriate Action Bar commands are also available through the
menu bar.
Tool Tips
Status Bar Toggle between hide or show for status message bar at the bottom of the
main window.
Action
Wait for a Call This is the hosts active state:Listening for and responding to incoming calls.
Place a Call
Note: Call out to EMC products is not currently supported.
161
EMC CONFIDENTIAL
Host Configuration Reference
Command Description
Settings
Callers Set up client user (caller) attributes, including login information and usage
privileges.
Connection Set up connection attributes, including modem or TCP/IP settings.
General Settings indicating circumstances for restart; logging toggles.
Performance Change graphics behavior to improve graphics appearance or improve
information transfer efficiency.
Security Control scope of access by callers.
Logon Security Control type of login and limit login attempts.
Configuration Invoke master wizard to guide user and ensure all settings are populated.
Wizard
Help
Help Topics Invoke online help (WinHelp). This help system is the same on both host
and client, and covers both applications.
About EMCRemote Display the version of this software.
-or-
Depending on your user
Settings button
security level, application
(below menu bar) is for
settings may or may not be
application settings only
available.
The application settings options are arranged into four tabs within
the Host Settings dialog box. See Table 7 on page 163.
General Settings in this group determine the hosts basic behaviors. For example, you can specify the hosts startup
actions, and whether the host will reboot after a remote control session ends.
Performance Settings in this group determine the graphical Windows elements that the host will transmit to the client as part
of the desktop. This can dramatically improve performance without detracting from the convenience of remote
control.
Security Settings in this group determine the measures the host will take to protect your computer when a client has
logged in. You can choose to have the host lock its keyboard and mouse, or blank its screen, or have it prompt
you when someone calls.
Logon Security Settings in this group determine how the host will handle incoming calls and login attempts. For example, you
can enable the use of case-sensitive passwords and limit the number of login attempts per call. Use of RSA
security, for SLC or fob use, is specified here.
163
EMC CONFIDENTIAL
Host Configuration Reference
Start Host Available only when Start the host whenever your service starts is available:
Application if it is If this checkbox is selected, the EMCRemote Host window will start the host application if it halts
closed... (for any reason) ...
... in [__] ... after this number of seconds.
seconds 10
Automatically If this checkbox is selected, the EMCRemote Host window will not be displayed while the host is
minimize while is in Waiting for a call mode or is connected in a remote control session. Instead, the window will
waiting for a call appear as a small icon (minimized). The type of icon depends on which minimize method is
selected in the When minimized list box.
Selection value is onand selection editing disabledwhenever Start the host whenever your
service starts is selected.
When Minimize to Allows you to select what the host icon will look like, and where it is located, when host window is
minimized: Tray minimized.
Options:
Minimize to Tray: Shows a small icon in the Windows task bar tray
Minimize to Taskbar: Shows a button on the Windows task bar
Active: When Automatically minimize while waiting for a call is selected.
Restart Windows reboots when remote session ends (based on condition option below).
Windows at end This option helps ensure a dependable connection in the event of remote hardware problems.
of session If, for example, the host system is unable to respond during a session, the host computer will
reboot as soon as the client hangs up. It is important to also enable Start the host whenever
your system starts so that you can call in again for a fresh start.
Save your changes often when this option is selected. Any unsaved work on the host
computer will be lost when Windows reboots.
Select one of two condition options as the restart trigger: Always, or If the connection was lost.
Always Windows reboots whenever a session ends this includes normal logoff as well as an abnormal
termination.
If the Windows will not reboot after a normal logout. It will reboot only when the connection is lost due
connection to problems with the host computer or the client.
was lost
Available only when ... in [__] seconds is available:
Restart Host Checkbox: Host can be forced to restart after one or both of the following settings:
... after [__] 10 A configurable number (between 1 and 100) of sessions
sessions or ...
... [__] 1000 A configurable number (between 100 and 10000) of port pings
portpings
Session Host Audit (or Event) log is PWHOST.LOG
Logging Location of host (and client) log is at the installation root, which by default is:
Options C:\Program Files\EMC\SymmRemote\
Viewing log from GUI: At EMCRemote Host window (main screen), select File >View Log.
165
EMC CONFIDENTIAL
Host Configuration Reference
Note: If you turn off (uncheck) Log status, you may be able to significantly reduce the log file
size without adverse effect. Contact EMC Global Services for more information.
Disable screen saver Host will not display the screen saver animation.
Disable desktop pattern Desktop pattern of the host will not be displayed, and instead it will look blank.
167
EMC CONFIDENTIAL
Host Configuration Reference
Note: Use this option with caution. If EMCRemote is always busy, other processes
cannot easily continue, and may even halt.
Note: These settings may or may not be available, depending on the security
level of user.
169
EMC CONFIDENTIAL
Host Configuration Reference
Screen blanking method Method 1 Select from three methods of screen blanking. Your choice will depend on the video
drivers of the host.
Although (due to limited screen real estate) no method descriptions are provided, you
can test each method with the Test button at right.
Test [button] Allows you to test the screen-blanking option you have selected at left. A Screen
Blanking Test dialog box will appear if the screen blanking method is unsuccessful:
If all three methods are unsuccessful, Screen blanking is not available for the host.
Lock this keyboard and Caller can lock the host keyboard and mouse at login.
mouse on connection
Caller Confirmation
Prompt the user on this Host will attempt to notify the host user when a caller attempts to log in:
computer when
someone tries to log on
Enabling this checkbox allows you to access additional, dependent options with which
you can specify how individual calls will be confirmed (see below).
Seconds to wait for 15 Allows you to specify the amount of time the host will wait for Caller Confirmation
the user to respond to before processing the caller. The host's specific action is determined by the dependent
the prompt option you select (see below).
171
EMC CONFIDENTIAL
Host Configuration Reference
Note: These settings may or may not be available, depending on the security
level of user.
173
EMC CONFIDENTIAL
Host Configuration Reference
RSA security For SLC-enabled hosts, this option is restricted: It is view only below
enabled hosts a certain (relatively high) level, and may be inaccessible entirely
below another level.
Use EMCRemote application security to The host will rely on EMCRemote's built-in security.
validate users
Make passwords case sensitive The host will handle all passwords as case sensitive. Otherwise,
upper- and lowercase letters are the same when validating
passwords.
Use Windows NT security to validate If this checkbox is selected, a client can use any valid Windows
users NT/2000 user account, regardless of the Windows NT/2000 user
account privileges, to connect to the host. Use the Windows
NT/2000 User Manager on the host computer to configure a
Windows NT/2000 user account.
If the client connects using a Windows NT/2000 user account, the
client will have the EMCRemote privileges defined in the Default
Caller Properties window of the host's Caller Setup dialog box. To
view these settings, select the Settings, Callers menu item, and
then click the Default Settings button.
This checkbox is disabled in the Windows 98 host.
Use Account list to limit the validated The host will use the account list to limit the validated users.
users
Use RSA security to validate users Validates by using SLC or fob: The host will process an incoming
SLC and SLC password, or fob readout and PIN, to determine
whether access will be allowed on that basis.
If the host detects that the required RSA files are not present,
this option cannot be chosen.
When selected, the [Caller Setup Type]: Default Setup option
is not available.
[Caller Setup Type]
Use Default Setup for activity permission Allowed only for EMCRemote application or Windows NT
security.
Use Individual Caller Setup for activity Allows multiple users
permission
Validating Logons
Time allowed for logging minutes 3 This field specifies the number of minutes the host will allow a
caller to log in. The time specified must provide enough time to
complete the login, so be sure to specify a value that allows time
for a slower modem if necessary.
Logon attempts per call (1-99) 5 This field specifies the number of tries the host will allow a caller
to correctly type in the password. If the correct password is not
entered after the specified number of attempts, the host will
disconnect.
Disabling Logons Prevents guessing the password through repeated attempts.
Disable logons ... If this checkbox is selected, all logins will be disabled if a caller
... after __ failed attempts 20 fails to type a valid password within the specified number of
attempts. These attempts can span several calls. If this value is
lower than the value specified in Logon attempts per call, it will
override that value.
Re-enable logons after __ minutes 15 This field specifies the number of minutes the host will wait after
logins have been disabled before it begins to take calls again.
This feature discourages unauthorized callers from repeatedly
attempting to access the host.
175
EMC CONFIDENTIAL
Host Configuration Reference
Settings menu:
Connection settings
-or-
Set up Connection button
177
EMC CONFIDENTIAL
Host Configuration Reference
Note: EMCRemote process priority will be raised above that of all other
applications.
179
EMC CONFIDENTIAL
Host Configuration Reference
TCP/IP Port Menu: Settings > Connection > TCP/IP Settings > Advanced
The TCP/IP port settings dialog box is shown in Figure 117 on
page 180 and the settings are listed in Table 15 on page 180.
Note: Edit this field only after consultation with your network administration.
Settings menu:
Callers settings
-or-
Set up Caller button
Selecting this option (one of the two paths in Figure 118 on page 181)
brings up either the Caller Setup Default (Figure 119 on page 182
and Table 16 on page 182) or the Caller Setup Individual (Figure 120
on page 183) window (see pages following), depending on the Host
Settings configuration.
181
EMC CONFIDENTIAL
Host Configuration Reference
Note: This tab is analogous to the individual users Caller Properties: General
dialog box (Figure 121 on page 185).
Caller SetupIndividual
Menu: Settings > Callers
or Right panel: Set up Caller
The Caller setup, individual settings dialog box is shown in
Figure 120 on page 183 and the settings are listed in Table 17 on
page 183.
183
EMC CONFIDENTIAL
Host Configuration Reference
Note: This tab (Figure 121 on page 185) is analogous to the single-user
default Caller Setup dialog box (Figure 119 on page 182).
185
EMC CONFIDENTIAL
Host Configuration Reference
Note: For specific user (individual) Caller Properties, the General tab
(Figure 121 on page 185) is included. In Default Caller Properties, the General
tab is absent.
See Figure 122 on page 187 for the interface and default settings, and
Table 19 on page 188 for further notes about these options.
187
EMC CONFIDENTIAL
Host Configuration Reference
189
EMC CONFIDENTIAL
Host Configuration Reference
! IMPORTANT
Although the Callback function is an EMCRemote feature, it is not
currently supported by EMC Customer Service for use with EMC
products.
Figure 126 Callback tab: callback on, TCP/IP, port setting dialog box
191
EMC CONFIDENTIAL
Host Configuration Reference
B
Client Configuration
Reference
From Windows Start The EMCRemote installation program provides functionality for the
menu menu items.
Click Start > Programs > EMCRemote to see the available
EMCRemote menu items. (The Full version installation list is
shown in Figure 127 on page 194.)
Figure 127 Start > Programs > EMCRemote (for Full installation)
The Start menu items provide access as noted, and may include
some or all of the following, depending on your installation
version:
EMCRemote Help This is a WinHelp implementation.
EMCRemote This option starts up the general access splash
screen, shown in Figure 128 on page 195.
For a client, from the splash screen you can:
Place a call
Configure your client
Additional options allow host configuration and operation, if
a host was installed locally.
Uninstall EMCRemote Removes all components of any
versions of EMCRemote existing on your computer.
Convert Database If you have EMCRemote Client 3.06 or
earlier, you will need to convert your existing database
(Phonebook) using this program. See Uninstalling
EMCRemote on page 37.
Splash screen menu You can keep a splash screen (Figure 128 on page 195) running for
quick access to one of four action categories. This screen is invoked
with Start > Programs > EMCRemote > EMCRemote.
195
EMC CONFIDENTIAL
Client Configuration Reference
Note: The first time the host is invoked, this window is active but initially
obscured by the Host Configuration Wizard.
Program Settings
(Equivalent to Settings > General)
Locked mode
Create a New entry in the address book Delete address book entry Address book Entry Properties
(Equivalent to: Edit > New Entry) (Equivalent to: Edit > Delete Entry) (Equivalent to: Edit > Entry Properties)
Open mode
Command Description
File
Clear Log Remove all entries from log file
View Log Open log in plain-text editor window
Exit Shut down EMCRemote - Call Manager
Edit
New Entry Open Client Configuration Wizard to create new address book entry
Delete Entry Delete address book entry, with warning
Rename Entry Focus mouse on entry name for editing
Entry Properties Invoke the Logon, Connection, Security, and Callback tabs window
Replace String Open search & substitute string window
View
Action Bar Icon menu below menu bar
Small Action Bar Use small icons in display
Large Action Bar Use large icons in display
No Action Bar Hide icon menu
Note: All appropriate action bar commands are also available through the
menu bar.
Tool Tips
Status Bar Toggle between hide or show for status message bar at bottom of main window.
Dialer Opens direct dial screen
Call Book Opens Call Manager initial screen
Large Icons
Small Icons Viewing options for EMCRemote - Call Manager field of icons.
When you close the Call Manager, the active Address Book view will be
List preserved and used the next time the Address Book is opened.
Details
Action
Place a call to a After you select a connection icon in the Address Book and then select this
Host command, EMCRemote Initiates that connection.
Alternatively, you can:
Double-click the connection icon
or
Select the icon, then press key combination Ctrl-P
197
EMC CONFIDENTIAL
Client Configuration Reference
Command Description
Wait for a call This invokes the listening state, which is dormant until an incoming call arrives.
Alternatively, you can
Press key combination Ctrl-W
Settings
Configuration Invoke Client Configuration Wizard.
Wizard
General Call Manager Settings: General (scaling; shortcut keys)
Connect Attempts Timing settings
Performance Change graphics behavior to improve graphics appearance or improve
information transfer efficiency
Dialing Properties Invoke Windows: Start > Control Panel > Phone and Modem Options > Dialing
Rules
Help
Help Topics Invoke online help (WinHelp). This help system is the same on both host and
client, and covers both applications.
About EMCRemote Display the version of this software
Open mode When unlocked, the Call Manager displays two types of icons: the
Add New Entry icon in the upper left, and any previously created
entries to the right of and below the Add New Entry icon, as shown
in the example Figure 130 on page 196.
199
EMC CONFIDENTIAL
Client Configuration Reference
201
EMC CONFIDENTIAL
Client Configuration Reference
-or-
Settings button
(below menu bar) is for
application settings only
The application settings options are arranged into four tabs within
the Call Manager Settings dialog box. See Table 24 on page 203.
General The General settings are options that affect the remote control session once you have connected to a host.
Connect The Connect Attempts settings determine how EMCRemote will handle re-dialing a modem and how long it will
Attempts wait to connect over a network when connecting to a host computer.
Performance The Call Manager Performance Settings affect the speed of the remote control session. The default settings are
designed to be optimal for many computers, but you may be able to improve performance by experimenting with
these options.
203
EMC CONFIDENTIAL
Client Configuration Reference
205
EMC CONFIDENTIAL
Client Configuration Reference
Figure 136 Call Manager Settings dialog box: Connect Attempts tab
207
EMC CONFIDENTIAL
Client Configuration Reference
Note: The default compression setting will use maximum compression for modem and no
compression for TCP/IP connections.
209
EMC CONFIDENTIAL
Client Configuration Reference
Host Settings The communications settings for a particular host are accessible
(Properties) through one of the menu items identified in Figure 140 on page 210.
-or-
Properties from
pop-up menu on
Entry Properties button selected host icon
(below menu bar) applies to
selected host icon
Default and host The communication settings options, both for Default and particular
settings tabs hosts, are arranged into four tabs within the Call Manager Settings
dialog box. See Table 28 on page 210.
Logon The Logon properties specify the information that will be sent to your host computer so you can log in
automatically when you use an Address Book entry. The lower portion of the panel contains settings for logging
your online actions.
Connection The Connection properties specify how the client will connect to the host. When one of the connections is
selected, the appropriate information fields are displayed.
The types of connections available are:
Modems: All modems identified by Windows appear in this list.
TCP/IP: Your TCP/IP connection, either with dial-up or network card, as defined in the Windows network
configuration.
This option is usually selected if you want to call a remote control host that is on the Internet or on your
TCP/IP network.
Security The Security properties give you three different security tools, in addition to the security options that are preset
on the host computer.
Callback
Note: Although the Callback function is an EMCRemote feature, it is not currently supported for use with EMC
products.
Logon ID Type your logon ID as it is specified on the host computer. Your Logon ID is not case sensitive.
Password Type your password just as it is specified on the host computer. By default, the EMCRemote
Host does not consider the case of the password when you log in. However, if the host is set to
make passwords case-sensitive, you will need to precisely match the case of each letter.
Confirm Password This field confirms the Password field; both fields must match before you can exit the Logon
properties panel and save your settings.
211
EMC CONFIDENTIAL
Client Configuration Reference
213
EMC CONFIDENTIAL
Client Configuration Reference
215
EMC CONFIDENTIAL
Client Configuration Reference
! IMPORTANT
Although the Callback function is an available EMCRemote
feature, it is not currently supported for use with EMC products.
217
EMC CONFIDENTIAL
Client Configuration Reference
C
Host Audit Log
Messages
This appendix lists the types, storage locations, and variables of the
host log messages:
Access messages ............................................................................... 220
File transfer messages ...................................................................... 221
Configuration messages .................................................................. 223
Status messages................................................................................. 225
Access messages
Table 33 on page 220 and Table 34 on page 220 list access messages of
ConnectEMC.
PWHost.log Access: Remote user %s:%s connected. Role - %s. Activity - %s.
Symmetrix log Connect Success: Remote user %s connected. Role - %s. Activity - %s.
File transfer Table 35 on page 221 lists host file transfer messages of ConnectEMC.
messages
221
EMC CONFIDENTIAL
Host Audit Log Messages
Remote user %s %s %s
%s: (1)= UserName (2)=TransferCommand("deleted file", "created new file", "retrieved file", "deleted directory", "overwrote
existing file") (3)=SourceFile
Configuration messages
Table 36 on page 223 lists host configuration messages of
ConnectEMC.
PWHost.log Config: User role L%i is not authorized to change Caller settings
%s = Role Number
Config: User role L%i is not authorized to run new Caller Wizard settings
%s = Role Number
Status messages
Table 37 on page 225 through Table 39 on page 226 list host status
messages of EMCRemote.
Index
A chat session
About EMCRemote client menu item 198 ending 152
About EMCRemote host menu item 162 logs 41
access code 44 starting 151
Action Bar client menu item 197 Clear Log client menu item 197
Action Bar host menu item 161 Clear Log host menu item 161
address book client
creating new entry 105 address book
editing existing entry 112 creating new entry 105
Replace String function 112 configuration application settings 93
address book entries configuration of connections 95
using with Call Manager 120 EMC product types 20
audit logs 41 installation
automatic restart 49 client-only procedure 29
session establishment 126
startup, after the first time 92
B startup, first time 82
Blank Client Screen host menu item 161 Client Configuration Wizard
blank host screen 42 checklist 82
clipboard, copying/pasting between computers
C 140, 144
Call Manager configuration
making calls with 119 client application settings 93
caller confirmation security feature 149 Client Configuration Wizard checklist 82
Caller Setup dialog box client connections 95
default 76 host callers 75
individual 77 modem connection on host
callers host 71
host configuration 75 Configuration Wizard client menu item 198
properties Configuration Wizard host menu item 162
default setup 76 Connect Attempts client menu item 198
individual setup 77 connection methods 22
Callers host menu item 162 Connections host menu item 162
D H
data encryption 42 hang up, security feature 149
database password 91 Help Topics client menu item 198
default caller properties 76 Help Topics host menu item 162
de-installation host
see uninstallation 28, 37 application settings 163
Delete Entry client menu item 197 caller configuration 75
Details client menu item 197 configuration mode 160
devices disconnecting from 46
communication settings 98 EMC product types 20
Diagnostic Mode host menu item 161 main window 160
Dial Directory operation mode 160
locked password 44
default communication settings 95 reconnecting to 46
unlocking 96 restart 42, 46, 49
Dialer screen blanking 42
EMCRemote messages 125 startup, after the first time 66
Dialing Properties client menu item 198 startup, first time 52
Disconnect host menu item 161 Host Settings menu 163
Disconnection
host recovery 46
I
disconnection options 46
individual caller properties 77
installation
E client-only 29
EMC product types full (host and client) 33
client computer 20 uninstallation 28
host computer 20 IPv6
EMCRemote Dialer messages 125 address format 201
Entry Properties client menu item 197
event log 41
K
keyboard
F locking on host 42
file transfer 136
setting options 139
L
TurboTransfer option 139
LAN, connecting over 22
Full Screen button 134
Large Action Bar client menu item 197
Full Screen mode 133
Large Action Bar host menu item 161
Large Icons client menu item 197
G license key 28
General client menu item 198 List client menu item 197
General host menu item 162 Lock Client Mouse and Keyboard host menu item
global string substitution 161
address book entries 112 lock host keyboard and mouse 42
log
event 41