We are unable to get Lenovo P50 and P70 laptops to properly present to Unite on our Intel NUCs. They connect and the mouse cursor is visible (and moves), but the screen content does not render. It's just a black background.
We do NOT have such problems with our Lenovo T470s laptops, so this is likely related to the higher-end graphics cards in the P50/70 models. Unfortunately, our entire IT Development group uses these and they are clamoring (quite loudly) to get this fixed so they can collaborate using the same Unite abilities that their Corporate brethren enjoy.
Some background details and things tried:
* P50/70, i7, running Windows 10 v1703, with latest patches.
* Latest Unite 184.108.40.206 software package on Server, Hub and Client components.
* Latest BIOS on P50/70 (7/6/2017).
* Latest Intel drivers.
* Latest Lenovo, and then NVIDA-supplied drivers tried on the discreet NVIDIA Quadra M2000M card (220.127.116.11 and 377.48).
* Latest Lenovo-supplied drivers tried on the built-in NVDIA graphics card (this is not normally used).
* Tried various video resolutions and scaling, below the normal 3840x2160 (both hybrid and discreet cards).
* Tried methodically disabling or changing various advanced graphics settings (e.g. disabling 3D).
* Tested against multiple NUCs, supporting different type display devices (4K monitors, 800x600 projectors, etc.).
* Installed the Unite Extended Display update.
Any ideas? I'm kinda stumped.
Update: The source of this problem has actually been traced to our firewalls. While formerly reviewed and shown as Allowed in the firewall logs, the "unknown-upd" traffic is obviously being restricted in some form on our more secure user networks (such as used by our IT Department). Our less-restrictive deployment network had an any-any rule that was passing this traffic without any impacts.
Arriving at this cause was rather involved, but since we had laptops that were properly working, we were able to methodically identify and test all of the things that were "different" with their configuration and use.
Anyway, the challenge now is figuring-out how to create an appropriate application-override rule in the PAN firewalls, so that it ignores and let's pass this traffic without any impactful overhead. Unfortunately, this is more difficult than you'd think. The source and destination ports are being randomly generated (48,000-63,000 so far) and it's challenging to identify specific details upon which to base a rule. Obviously, allowing all unknown-udp would be a very bad idea. :0
I'll post an update, as progress is made.