22
Table of Contents
6.2 RenAMing AnD Using Devices
Picture 1.
This is the start window for the Key user interface. You can
open the Lock user interface by double clicking the Lock
icon on the left side of the window.
Picture 2.
By clicking an extra menu opens.
Click “Open browser automatically when connected” to have the
1.
Lock user interface launch automatically when the Key connects
to the Lock.
Selecting “Show all details” allows you to view all the details of
2.
the connected device.
Click “Rename device” to rename the selected device. Lock
3.
names are Key specific, so a Lock’s name change will be reflected
only with the Key that was used to change it.
Picture 3.
You can open the browser user interface of the controlled device
1.
in “Open with browser (http)”.
You can connect to network sharing in “Open windows network
2.
share”.
You can open the remote desktop connection in “Open Remote
3.
Desktop Connection (RDP), if available”.
You can check the functionality of the controlled device with PING
4.
command in “Check if host available (PING)”.
6.3 ADDing eXtRA keys
Additional Keys can be serialized to a Lock.
Insert a previously serialized Key into the USB of your computer.
1.
Insert a new Key to another USB port of the computer.
2.
Picture 1.
Wait until ”New Key” window opens.
3.
If you are adding a sub key, do next the steps 1-4 ADDING SUB
4.
KEY.
If you are adding a backup key, do the steps 1-4 ADDING BACKUP
KEY.
Содержание Lock 200
Страница 1: ...1 Table of Contents Lock 200 Key 200 User Manual v1 2 ...
Страница 18: ...18 Table of Contents Picture 7 Picture 8 ...
Страница 20: ...20 Table of Contents 1 Deploying the Key 3 Key user interface 2 Setting the password ...
Страница 21: ...21 Table of Contents Key user interface Picture 1 Picture 2 Picture 3 Double click to open Lock user interface ...
Страница 25: ...25 Table of Contents Extra Key use case ...
Страница 44: ...44 Table of Contents Elektroniikkatie 10 FIN 90590 Oulu www tosibox com Copyright Tosibox Oy 2015 ...