Attributes on the Array Properties panel of Array Manager are
general settings for the array. The attributes apply to all array
members.
Array Manager |
Command line |
Description |
Port Numbers (unencrypted connections) |
--array-port-unencrypted tcp_port |
- The TCP port number used for unencrypted
connections between client devices and Secure Global Desktop
servers.
- Open this port in your firewall to enable connections from users
who have standard connections (connections not using SSL).
- You should restart every Secure Global Desktop server in the
array for changes to this attribute to take effect.
|
Port Numbers (encrypted connections) |
--array-port-encrypted tcp_port |
- The TCP port number used for encrypted
connections between client devices and Secure Global Desktop
servers.
- Open this port in your firewall to enable connections from users
who have secure (SSL-based) connections to Secure Global Desktop.
- You should restart every Secure Global Desktop server in the
array for changes to this attribute to take effect.
|
Port Numbers (connections between array members) |
--array-port-peer tcp_port |
- The TCP port number used for connections between
Secure Global Desktop array members.
- These connections are used to replicate information across the
array.
- You should restart every Secure Global Desktop server in the
array for changes to this attribute to take effect.
|
Log Filter |
--array-logfilter filter... |
- Which diagnostic messages are logged, and where.
- This attribute contains multiple values, each of the form
component/subcomponent/severity:destination . - Use the wildcard
* to match multiple
components, subcomponents and severities. On the command line, remember to
quote any filters containing wildcards to stop your shell from expanding them. - Valid destinations are a filename or the
TFN name of a plug-in log handler.
- On the command line, separate each filter with a
space. Remember to quote any filters that contain wildcards
* , to stop your shell from expanding them. - File names may include the placeholder
%%PID%% , which is substituted with a process ID. - On the command line, separate each filter with a
space. In Array Manager, separate each filter with a RETURN.
- For detailed information on setting log filters and viewing log output,
see Using log filters to
troubleshoot problems with the Secure Global Desktop server.
- Changes to this attribute take effect immediately.
|
Enable billing services |
--array-billingservices 1 | 0 |
- Whether to enable billing services across the array.
- This may use significant additional disk space on array members.
- If enabled, you can use
tarantella query billing to analyze the
billing logs. - Changes to this attribute take effect on an array member the
next time the Secure Global Desktop server starts.
|
Enable resource synchronization |
--array-resourcesync 1 | 0 |
- Whether to enable replication of resources across the array.
- If enabled, synchronization starts at a time determined in Tuning properties for each array member.
- Changes to this attribute take effect immediately.
|
Client Drive Mapping: Let users access client drives |
--array-cdm 1 | 0 |
- Whether to enable client drive mapping (CDM) across the array,
see configuring client drive mapping for details.
- If you enable drive mapping, CDM services only become
available when you restart all Secure Global Desktop servers in the array.
To manually start CDM services without restarting the array, run
the
tarantella start cdm command
on all members of the array. - If you disable drive mapping, the CDM processes only stop
when you restart all Secure Global Desktop servers in the array.
To manually stop CDM services without restarting the array, run
the
tarantella stop cdm command
on all members of the array. - Changes to this attribute only take effect for new webtop sessions.
|
Client Drive Mapping: Use WINS for better performance |
--array-cdm-wins 1 | 0 |
- Whether to enable WINS to improve performance of client drive
access. Without WINS, performance may be limited by known problems
with Microsoft Windows networking.
- WINS services use port
137/udp on the Secure Global Desktop server.
- Only enable WINS if either of the following is true:
- Your Microsoft Windows application servers are on the same subnet as an array member.
- Your Microsoft Windows application servers list an array member as a WINS server.
- Changes to this attribute take effect on an array member the
next time the Secure Global Desktop server starts.
|
Client Drive Mapping: Fallback Drive |
--array-cdm-fallbackdrive letter_direction |
- For client drives that can't be mapped using the configured
drive letter because that drive letter is already in use, which
drive letter to start searching from and the direction to search.
The first unused drive letter is used to map the client drive.
- Allowed values are of the form
[a-zA-Z][+-] , for
example V- to start at drive V and search
alphabetically backwards, or f+ to search forwards from
drive F. Drive letters are case-insensitive. - Changes to this attribute take effect for new webtop sessions.
|
Audio: Enable audio service |
--array-audio 1 | 0 |
- Whether to enable audio services across the array.
- Audio is only available for applications running on a Microsoft Windows
2003 application server. Audio redirection must also be enabled on the server.
- Changes to this attribute only take effect for new webtop sessions.
|
Audio: sound quality |
--array-audio-quality low | medium | high |
- The sample rate of the audio data.
- Adjusting the audio quality increases or decreases the amount of audio data sent.
- By default, Secure Global Desktop uses Medium Quality Audio. This should be sufficient in most cases.
- The sample rates are:
Setting |
Sound sample rate |
Low Quality Audio |
8kHz |
Medium Quality Audio |
22.05kHz |
High Quality Audio |
Same as medium
(this is a Terminal Services restriction) |
|
Smart card: Enable smart card service |
--array-scard 1 | 0 |
- Whether to enable smart card services across the array.
- Support for smart cards is only available for applications running on a Microsoft Windows
Server 2003 application server.
- Changes to this attribute only take effect for new webtop sessions.
|
Profile Editing: Enable user profile editing |
--array-editprofile 1 | 0 |
- Whether to allow users to create or edit their own profiles for use with the Secure Global Desktop Client.
- By default, profile editing is enabled.
- If profile editing is disabled, it is disabled for all users, including Secure Global Desktop Administrators. However, Secure Global Desktop Administrators can still create and edit profiles using the Profile Editor application.
- Profile editing for individual users can be enabled and disabled using the Profile Editing attribute for organization, organizational unit or person objects in Object Manager
- Changes to this attribute only take effect for new webtop sessions.
|
Clipboard: Enable copy and paste |
--array-clipboard-enabled 1 | 0 |
- Whether to allow copy and paste operations for Windows and X application emulator sessions across the array.
- By default, copy and paste is allowed.
- Copy and paste operations for individual users can be enabled and disabled using the Clipboard Access attribute for organization, organizational unit or person objects in Object Manager
- Changes to this attribute only take effect for new emulator sessions.
|
Clipboard: Client security level |
--array-clipboard-clientlevel |
- The security level for Secure Global Desktop clients.
- Used to control copy and paste operations between Windows or X application emulator sessions and applications running on the client device.
- The security level can be any positive integer. The higher the number, the higher the security level. The default security level is 3.
- Use
-1 on the command line to disable copy and paste operations with applications running on the client. - Changes to this attribute only take effect for new emulator sessions.
|
Serial Port: Enable serial port mapping |
--array-serialport 1 | 0 |
- Whether to enable access to serial ports across the array, see configuring access to serial ports for details.
- By default, access to serial ports is allowed.
- Access to serial ports for individual users can be enabled and disabled using the Serial Port Mapping attribute for organization, organizational unit or person objects in Object Manager
- Changes to this attribute only take effect for new webtop sessions.
|
Copyright © 1997-2006 Sun Microsystems, Inc. All rights reserved.