Previous Next Chapter 1, Introducing VNC Viewer Plus

Getting VNC Viewer Plus ready to use

Before you can establish a connection, certain operations must be performed on both host and client computers.

This section addresses the client computer user and assumes the same person is able (that is, is physically present and has sufficient privileges) to configure the host computer as well. If not, contact a system administrator or a host computer user.

Note: Some operations need only be performed once. Others must be performed before each connection.

Host computer

1. Ensure the host computer is connected to a power supply unless it has an independent power source (for example, a laptop). Note, however, that it need not be powered on, or have a functioning operating system.

2. Ensure the host computer is connected to a network to which the client computer can also connect. This User Guide assumes you are connecting over a private network such as a LAN or VPN, but if you are connecting over the Internet, see also Connecting over the Internet.

3. Ensure AMT Server is enabled on the host computer. For more information, see Setting up Intel AMT.

4. You need to know a network address for AMT Server. For more information, start with Discovering a net­work address.

5. You may need to know authentication credentials for AMT Server. For more information, start with Dis­covering authentication credentials.

6. Ensure the keyboard language of the host computer is mapped to the type of keyboard attached to your client computer. Note you can use VNC Viewer Plus to do this after you connect. For more information, see page 28.

Client computer

1. Ensure the client computer is powered on, has a functioning operating system, and is connected to the same network as the host computer.

2. Install and license VNC Viewer Plus. To see how to do this, and for information on trial license keys, visit www.realvnc.com/products/viewerplus.

Note: VNC Viewer Plus need not be licensed to make a standard VNC connection.

3. If your client computer is protected by proxy servers, provide the appropriate information. For more infor­mation, see Connecting via proxy servers.