DUK - Dažniausiai užduodami klausimai

Ar Veyon veikia Chrome OS (ChromeBook) ar MacOS kompiuteriuose?

Šiuo metu Veyon yra pasiekiama Linux ir Windows operacinėms sistemoms. Kadangi Veyon projektas yra atvirojo kodo, jo plėtra priklauso nuo patyrusių programuotojų kurie dirba prie sistemos pritaikymo kitoms platformoms, tokioms kaip macOS ar Android.

Kaip pridėti kompiuterius, kad juos būtų galima pasiekti

If the default Tinklo objektų direktorija is used, all you need to do is add the appropriate locations and computers on the Vietos ir kompiuteriai configuration page. Afterwards the added resources are available in Veyon Master.

If LDAP/AD integracija is configured the network object directory has to be changed to the appropriate LDAP backend so that the computers from the directory are displayed in the Veyon Master.

How can I migrate an existing iTALC installation to Veyon?

Although iTALC and Veyon are conceptually similar, a complete new installation and configuration is necessary to use Veyon, since configuration and file formats as well as their paths have changed and are not compatible. For a migration iTALC has to be uninstalled completely first. It is recommended to reboot the computer afterwards. Veyon can then be installed and configured in the same way as iTALC.

While the configuration of authentication methods is very similar, the configuration of locations and computers is done via the Veyon Configurator and no longer in the Master application. In this context you should check whether the new LDAP/AD integracija can be used to make locations and computers automatically available in Veyon.

Ar yra įmanoma naudoti Veyon Master keliuose kompiuteriuose?

The usage of Veyon Master on multiple computers is possible without any restrictions. For this to work an identical configuration has to be used on all master computers like it’s required for client computers in general. If logon authentication is used no further steps are necessary. If key file authentication is used the same private key has to be distributed to all master computers.

Kaip esamas VNC serveris gali būti naudojamas su Veyon?

In some environments a VNC server is already installed (e. g. UltraVNC) or is provided by the system (e. g. VNC-based access to virtual desktops in VDI environments). This may result in degraded performance or conflicts with the Veyon-internal VNC server. In such cases it is recommended to configure Veyon to use the existing (external) VNC server instead of starting the internal VNC server. The configuration is done through the Veyon Configurator on the configuration page Paslauga in section VNC serveris.

Ar galima importuoti/naudoti jau esamą ar sugeneruotą failą su kompiuterio vieta ir informacija?

As of Veyon 4.1, there is a new module for the command line interface. This module can be used to import locations and computers from any kind of text files (including CSV files) into the builtin network object directory.

Kaip galima peržiūrėti ar valdyti visus ekranus nutolusiuose kompiuteriuose

On Windows by default only the primary monitor of a computer is accessible with Veyon. You can however change this behaviour in the VNC serveris configuration. Select the VNC server plugin Builtin VNC server and enable the option Enable multi monitor support.

Kaip importuoti ar eksportuoti pasirinktus kompiuterius?

The selection of displayed computers is saved in the personal user configuration. There are two ways to share this configuration with multiple users. Either the user configuration file can be copied into the profile of the user, e.g. via login scripts. Alternatively, the user configuration can be also be stored in a shared directory (e.g. a network drive) and the user configuration setting has to be changed accordingly so that the user configuration is loaded from this directory. Please note that the access rights may have to be adjusted so that changes made by users are not written back into the global user configuration.

In this context please also refer the function Automatic switch to current classroom, which can be used to directly realize the desired behavior.

Kaip paslėpti pagrindinį kompiuterį iš darbo vietos?

Reikia pažymėti opciją Paslėpti vietinį kompiuterį pagrindinio kompiuterio konfigūracijoje

Kas bus jeigu nebus sutapimo su prieigos taisykle?

If there is no rule where all activated conditions apply when processing the configured access control rules, access is denied and the connection is closed. This prevents an attacker from being accidentally granted access due to an incomplete ruleset.