All Products
Search
Document Center

WUYING Workspace:Peripheral control

Last Updated:Sep 05, 2023

If end users need to access the files or data stored on on-premises devices from cloud computers, or if end users need to use peripherals such as printers and webcams that are connected to on-premises devices, you can enable the relevant features on the WUYING Workspace console as an administrator. This topic describes how to enable the peripheral control feature.

Feature overview

The following table describes the configuration items of the peripheral control feature.

Configuration item

Description

Limit

Local Disk Mapping

Specifies whether to allow end users to read data from or write data to the mapped drives of local disks after the end users connect to cloud computers.

  • If the on-premises devices of end users run Windows or macOS, the end users can read data from or write data to the on-premises devices after the end users connect to cloud computers. The data write or read speed is determined by the bandwidth between on-premises devices and cloud computers.

  • WUYING Workspace does not support the running of on-premises applications on cloud computers. You can run installation-free applications on a cloud computer. However, if you run installation-free applications on a cloud computer, the bandwidth is occupied and the user experience with the cloud computer is compromised. Therefore, we recommend that you do not run installation-free applications on a cloud computer. After you enable the local disk mapping feature, your end users can read data from or write data to their on-premises devices from their cloud computers.

Printer Redirection

Specifies whether to allow end users to access the printers that are connected to their on-premises devices after the end users connect to cloud computers.

  • Adaptive Streaming Protocol (ASP)-based cloud computers do not support the Printer Redirection feature.

  • You can enable the Printer Redirection feature for end users who connect to cloud computers from Windows clients, macOS clients, and web clients.

  • If an Active Directory (AD) user who is connected to a cloud computer wants to use a printer, you must enable the group policy of the AD domain and the printer redirection feature at the same time.

Webcam Redirection

Specifies whether to allow end users to use the webcams of their on-premises devices after they connect to cloud computers.

  • Only ASP-based Windows cloud computers support the webcam redirection feature. For High-definition Experience (HDX)-based cloud computers, you can enable this feature by configuring USB Redirection.

  • There is no priority between Webcam Redirection and USB Redirection. If your end users need to use USB webcams after they connect to cloud computers, we recommend that you enable the USB Redirection feature.

    For example, if you disable the USB redirection feature and enable the webcam redirection feature, end users cannot use USB webcams after the end users connect to their cloud computers. They can use only non-USB cameras, such as the cameras on laptop computers.

USB Redirection

Specifies whether to allow end users to use the USB devices that are connected to their on-premises devices after the end users connect to cloud computers.

  • ASP-based Linux cloud computers do not support the USB Redirection feature.

  • Cloud computers that are connected from web clients do not support the USB Redirection feature.

Procedure

The following section describes how to enable the peripheral control feature.

  1. Log on to the WUYING Workspace console.

  2. In the left-side navigation pane, choose Operations > Policies.

  3. In the upper-left corner of the top navigation bar, select a region.

  4. On the Policies page, click Create Policy.

  5. In the Create Policy panel, enter the name of the policy that you want to create as prompted.

  1. Click the Peripheral Control tab and configure the following parameters as prompted.

    Parameter

    Description

    Local Disk Mapping

    By default, this parameter is set to Disable. If you enable this feature, you can set the Local Disk Mapping parameter to Read-only or Read/Write.

    • Read-only: allows end users to view the files and folders stored on local disks after the end users connect to cloud computers.

    • Read/Write: allows end users to create or edit files and folders on local disks after the end users connect to cloud computers.

    Printer Redirection

    By default, this parameter is set to Enabled. If you enable this feature, end users can use the printers that are connected to their on-premises devices after the end users log on to cloud computers.

    Webcam Redirection

    By default, this parameter is set to Enabled. After you enable this feature, end users can use the webcams of their on-premises devices after the end users connect to cloud computers.

    USB Redirection

    By default, this parameter is set to Disable. After you enable this feature, end users can the USB devices that are connected to their on-premises devices after the end users connect to cloud computers. You can also configure a USB device whitelist or blacklist to implement fine-grained control.

    Note

    Before you configure a USB device whitelist or blacklist, take note of the following information:

    • If no USB device whitelist or blacklist is configured after you enable the USB Redirection feature, end users can use all USB devices that are connected to their on-premises devices after the end users connect to cloud computers.

    • The blacklist and whitelist are mutually exclusive. If you configure a USB device blacklist, end users cannot use the USB devices that are included in the blacklist. If you configure a USB device whitelist, end users can use only the USB devices that are included in the whitelist.

    • You can add up to 100 access control rules in a USB device whitelist or blacklist. If a USB device whitelist or blacklist includes multiple access control rules, the access control rule that ranks first has the top priority. You can adjust the ranking order of the access control rules in a list to change the priority.

    • The VIDs and PIDs must be in the format of four-digit hexadecimal characters. Example: a12c.

    • After you configure a USB device whitelist or blacklist, the configurations take effect upon the next connection to the associated cloud computer.

  2. Click Create.

    After the policy is created, you can view the policy on the Policies page.

References