Symantec 14541094 User Guide - Page 131

Cancel thin host after the remote session ends, Prompt to confirm connection

Page 131 highlights

Controlling another computer remotely 131 Connecting to a computer that does not have a host running 6 Under Authentication type, select one of the following: pcAnywhere PAM Authentication Validates a user by checking the user name and password against a list that is maintained on the host computer. Use this method for non-network connections or if your environment does not support the other authentication methods. This method of authentication is the least secure. See "About authentication in pcAnywhere" on page 190. Validates a user or group by using the authentication service on the Linux host computer. This option is only available for Linux computers. Open Directory Validates a user or group by using the authentication service on the Mac OS X host computer. This option is only available for Mac OS X computers. 7 To encrypt the data stream between the host and remote computers, in the Encryption level box, select the appropriate encryption level. See "Using encryption to protect data" on page 204. 8 Check Cancel thin host after the remote session ends to cancel the host after the remote control session ends. If you do not cancel the host after the session ends, the host continues to run until the operating system restarts. 9 Check Prompt to confirm connection, and then select the number of seconds in which the host user has to respond to the prompt. If the timeout period expires, the connection is canceled. 10 To protect the host by serializing connections, check Assign serial ID to limit host connections, and then type the serial number that you want to use. This embeds a serial ID in the host configuration. Serial IDs must be a numeric value between 0 and 4,294,967,296. Remote users must have the same serial ID embedded in their remote configuration for the host to accept the connection. For more information, see the Symantec pcAnywhere Administrator's Guide. 11 Click Next.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313

6
Under Authentication type, select one of the following:
Validates a user by checking the user name and password
against a list that is maintained on the host computer.
Use this method for non-network connections or if your
environment does not support the other authentication
methods. This method of authentication is the least
secure.
See
“About authentication in pcAnywhere”
on page 190.
pcAnywhere
Validates a user or group by using the authentication
service on the Linux host computer.
This option is only available for Linux computers.
PAM Authentication
Validates a user or group by using the authentication
service on the Mac OS X host computer.
This option is only available for Mac OS X computers.
Open Directory
7
To encrypt the data stream between the host and remote computers, in the
Encryption level box, select the appropriate encryption level.
See
“Using encryption to protect data”
on page 204.
8
Check
Cancel thin host after the remote session ends
to cancel the host after
the remote control session ends.
If you do not cancel the host after the session ends, the host continues to run
until the operating system restarts.
9
Check
Prompt to confirm connection
, and then select the number of seconds
in which the host user has to respond to the prompt.
If the timeout period expires, the connection is canceled.
10
To protect the host by serializing connections, check
Assign serial ID to limit
host connections
, and then type the serial number that you want to use.
This embeds a serial ID in the host configuration. Serial IDs must be a numeric
value between 0 and 4,294,967,296.
Remote users must have the same serial ID embedded in their remote
configuration for the host to accept the connection.
For more information, see the
Symantec pcAnywhere Administrator's Guide
.
11
Click
Next
.
131
Controlling another computer remotely
Connecting to a computer that does not have a host running