MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003

Size: px
Start display at page:

Download "MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003"

Transcription

1 Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration MailMarshal Specific Configuration Summary MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003 This document is a general guide to configuring load balancing within an array of MailMarshal SMTP servers. It focuses on the configuration of Microsoft Network Load Balancing for this purpose. The concepts used should assist in the configuration of load balancing in any environment. This document is not intended to be a complete or definitive guide to configuring load balancing with MailMarshal SMTP. In fact the configuration of load balancing is, in most cases, completely outside the scope of the configuration of MailMarshal SMTP. By its very nature network level load balancing is transparent to the application that is the target of such load balancing techniques. All recent versions of MailMarshal SMTP can be used in array installations. Support for centralized management of configuration and Rules across the members of an array, as mentioned in this paper, is included in MailMarshal 5.5 SMTP..

2 THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, MARSHAL LIMITED PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of Marshal Limited, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of Marshal Limited. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Marshal Limited may make improvements in or changes to the software described in this document at any time Marshal Limited, all rights reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R (for Department of Defense (DOD) acquisitions) and 48 C.F.R and (for non-dod acquisitions), the government s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. Firewall Suite, MailMarshal, Security Reporting Center, and WebMarshal are trademarks or registered trademarks of Marshal Limited. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies.

3 Introduction This paper provides an overview of how to configure network load balancing to work with MailMarshal SMTP (hereafter referred to as MailMarshal). The concepts described will generally apply to any network load balancing environment employed, regardless of whether the technology is delivered through software or a network switch/router. The paper presents a specific example using the Microsoft Network Load Balancing services delivered with Windows 2000 Advanced Server and Windows 2000 Datacenter Server. Target Audience For the purpose of this document it is assumed that the reader is familiar with Windows 2000 Server and general networking environments. The reader should also have a good understanding of messaging systems, networking architecture and TCP/IP. It is also assumed that the reader has an understanding of MailMarshal, or at the very least SMTP gateways. Document Purpose The intended purpose of this document is to provide information and guidelines on load balancing inbound SMTP connections across an array of MailMarshal servers. This document does not describe every possible technique. Various options will be presented that may or may not be relevant to every possible environment. Preparation Ensure that adequate backups of system(s) on which the changes are to be made have been performed before any of the changes suggested in this document are undertaken. It is assumed that MailMarshal has been correctly installed on all nodes that will be members of the array. For a summary of specific configuration options for the MailMarshal Servers see the section entitled MailMarshal Specific Configuration. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 1

4 Network Load Balancing General Concepts Network Load Balancing, in the context of its use with MailMarshal, is the configuration of an environment employing more than one MailMarshal server, where processing of inbound SMTP connections is shared by all the MailMarshal servers. This type of environment would normally be created to allow for performance scalability. Scalability is achieved by sharing the outbound TCP load across a number of servers. This type of environment also provides for a degree of redundancy. The outbound connections go to a reduced number of servers in the event of a server failure. The MailMarshal servers themselves are not involved in load balancing. Each MailMarshal server simply processes inbound SMTP connections allocated to it by whatever mechanism is deployed to distribute a defined proportion of the connections to each server. In many cases network load balancing is implemented as a software solution that is deployed on all participating members of an array of servers. Each member of the array is configured with a set of rules that define the TCP traffic to be load balanced, and what proportion of traffic any particular server is responsible for. In much larger environments the task of load balancing may be delivered through configurable network switching equipment or purpose built network load balancing appliances. The concepts employed in all situations are similar. Environment IP Addressing In most cases each member of the array of servers will be assigned a dedicated IP address. Connections to an individual array member can be made using this IP address or by the name (defined in the DNS) associated with this IP address. There is generally an additional IP address that is associated with the array as a whole. This is often referred to as a Virtual IP address. All members of the array will use this address. The network load balancing technology will accept connections on this address and re-allocate them to individual array members. DNS Within the DNS of the site, records must be created for each of the individual members of the array, with their associated IP addresses. A record must also be created with the Virtual IP address of the array. This name will be the one used by gateways establishing SMTP connections to the array. Usually an MX record must also be created to allow for delivery. This record should point to the name associated with the Virtual IP address of the array. 2 Technical White Paper

5 An example DNS configuration is illustrated below. The Virtual IP address of the array is associated with the host name MailMarshal. The nodes of the array are named ArrayNode01 and ArrayNode02. The MX record for the gateway has the name MailMarshal.demo.marshalsoftware.com. Ports The network load balancing configuration will include options to determine what TCP ports will be load balanced across the array. In many cases this will be a single port if the array is hosting only a single application. In the case of MailMarshal the only port required are 25. Protocols The network load balancing configuration will include options to determine what IP protocols will be load balanced across the array. In many cases this will only be a single protocol. Some applications may require more than one set of protocol/port assignments. In the case of MailMarshal the only protocol required is TCP. Affinity Affinity in the network load balancing configuration determines how the traffic on a particular protocol/port combination is allocated. Generally affinity relates to the stickiness of connections from an external address to an individual server in the array. In the case of MailMarshal load balancing the affinity should generally be set to none. This means that each new connection made to the array from a particular external address can be allocated to any MailMarshal server in the array. This gives the best option for load balancing, since multiple connections from the same host (even concurrent connections) will be distributed evenly across the array. MailMarshal can have the affinity set to none because no SMTP connection has any relationship to any other SMTP connection. The Value of Network Load Balancing With the growth of the web as an information component of the corporate environment, the need for dynamic scalability of web access has never been greater. With Network Load Balancing, you have the ability to build an infrastructure for supporting your critical, on-demand web access in a distributed, load-balanced manner. Network Load Balancing helps ensure your web access can scale to handle the heaviest of traffic loads, while also guarding against both planned and unplanned server downtime. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 3

6 Microsoft Network Load Balancing (Described) The Microsoft TCP load balancing service load balances incoming IP (Internet Protocol) traffic across clusters of up to 32 nodes. Network Load Balancing enhances both the availability and scalability of Internet serverbased programs such as Web servers, streaming media servers, and Terminal Services. By acting as the load balancing infrastructure and providing control information to management applications built on top of Windows Management Instrumentation (WMI), Network Load Balancing can seamlessly integrate into existing Web server farm infrastructures. Network Load Balancing will also serve as an ideal load balancing architecture for use with the Microsoft release of the upcoming Application Center in distributed Web farm environments. 4 Technical White Paper

7 Example Environment To demonstrate the configuration of MailMarshal in a load balancing environment, the following example details how MailMarshal can be configured in a two server array, using the network load balancing services offered by Microsoft Windows 2000 Advanced Server. This environment was chosen because it is readily available and demonstrates the configuration concepts. These concepts could be applied to any other network load balancing environment for use with MailMarshal. A diagram illustrating the example environment is presented below. Basically the environment consists of two MailMarshal servers (ArrayNode01 and ArrayNode02). Each has MailMarshal installed and the two servers have fixed IP addresses of and respectively. The shared array (Virtual) IP address is There is a separate SQL server on the network. The SQL server is used by all of the array members to log transaction information for the purposes of reporting on traffic and filtering activity. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 5

8 Microsoft Network Load Balancing (Configuration) Microsoft Load Balancing must be configured on each server that will be a node of the array. First Node On the ArrayNode01 server, open Network And Dial-up Connections, right-click on the interface you want to use for load balancing (usually one of the Local Area Connections), and select Properties. Highlight the Network Load Balancing item. Then click Properties to access the options for configuring Network Load Balancing on this interface. You will be presented with the Network Load Balancing Properties dialog. 6 Technical White Paper

9 Cluster Parameters To properly configure NLB, you must first select the Cluster Parameters tab. Enter the following information: 1. Primary IP Address: The Primary IP Address is the Virtual IP address of the Network Load Balancing configuration (as opposed to the physical interface IP address). All servers in this load balanced array will use this IP address. This is shown in the example diagram as the Array IP ( ). 2. Subnet Mask: Enter an appropriate subnet mask for your environment. A default mask will be provided based on the IP address entered above. 3. Full Internet Name: Enter the fully qualified domain name (FQDN) configured in the DNS for the IP address entered as the Primary IP Address. Remember to configure your DNS with this name and resolve it to the IP address before going live with your load-balancing machines. 4. Network Address: This hardware (MAC) address is automatically configured and cannot be changed. 5. Multicast Support: Check this box if you want to enable multicast support. If you are using a server with only one network card, this option is required. 6. Remote Password: If you want to use remote administration, enter and confirm a remote password and select the Remote Control check box. With this feature enabled, you can, for example, start and stop the cluster services or display diagnostics from a remote machine. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 7

10 Host Parameters After configuring Cluster Parameters, click the Host Parameters tab. Enter the following configuration parameters: 1. Priority (Unique Host ID): You must select a unique number for every server in your array. The example environment includes two servers. Set ArrayNode01 Priority to 1 and ArrayNode02 Priority to Initial Cluster State: Select this check box if you want to enable this server in the array immediately. 3. Dedicated IP Address: Enter the static IP address of the server's network interface card prior to enabling Network Load Balancing. In the example this is Note In the Primary IP Address in Cluster Parameters, you entered the virtual IP address for the cluster. Here, you enter the server's individual IP address. 4. Subnet Mask: Enter the appropriate subnet mask for the server's static IP address. 8 Technical White Paper

11 Port Rules After configuring your Host Parameters, click the Port Rules tab. This tab allows you to configure your TCP/IP traffic by selecting the appropriate protocols and port ranges. These port rules must be identical on each member server of the array. For example, you might configure TCP to work on only a certain range of ports. By default, the port range is 0 to on both TCP and UDP ports. After configuring your rule, click the Add button. For a simple MailMarshal configuration create the rules as pictured above. This will set single server affinity for all traffic except for SMTP, which will have affinity set to none. Tip If you are hosting other applications on the same array, you may need to generate specific rules for each protocol, particularly if they have differing affinity requirements. Click OK. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 9

12 Cluster IP Address The last step for this node is to enter the Array IP address in the Advanced Settings of your TCP/IP configuration. 1. Open Network And Dial-up Connections, and right-click on the interface for which you have configured Network Load Balancing. 2. Choose Properties, highlight Internet Protocol (TCP/IP), click Properties, and then click Advanced. 3. Choose Add and enter the Array IP address as a secondary IP address associated with this interface. In the example this is You have now successfully created the first server in your array for use with MailMarshal. 10 Technical White Paper

13 Second Node On the ArrayNode02 server, configure all parameters to be the same as those configured for the first node, with the exception of the following: Host Parameters 1. Priority (Unique Host ID): Within the Example this is ArrayNode02. Set the Priority to 2. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 11

14 Cluster IP Address The last step for this node is to enter the Array IP address in the Advanced Settings of your TCP/IP configuration. 1. Open Network And Dial-up Connections, and right-click on the interface for which you have configured Network Load Balancing. 2. Choose Properties, highlight Internet Protocol (TCP/IP), click Properties, and then click Advanced. 3. Choose Add and enter the Array IP address as a secondary IP address associated with this interface. In the example this is You have now successfully created the second server in your array for use with MailMarshal. 12 Technical White Paper

15 Validating your NLB configuration After you have completed the NLB array configuration, you can verify that the configuration is correct. Open a Windows Command Prompt window on any server in the array, and enter: wlbs query You can also ping the virtual IP address to see whether it is responding. An additional insurance step to take once configuration is complete is to enter the following commands: wlbs stop (to stop the load balancing service), then wlbs start (to re-start it the load balancing service). This will refresh all connections and ensure all members have re-loaded the load balancing configuration. Another useful test is to use telnet from a non array member and make several connections to port 25 of the DNS name associated with the array. For example: telnet MailMarshal.demo.marshalsoftware.com 25 Leave each connection open when making subsequent connections. This will ensure that the Load Balancing services allocate the new connections to different members. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 13

16 If Load Balancing is correctly configured, you should be allocated a connection to a different array member as illustrated: 14 Technical White Paper

17 MailMarshal Specific Configuration As has already been mentioned, there is no specific configuration required when MailMarshal is used in a Network Load Balancing environment. MailMarshal can be installed on each server in the array as usual. Additional configuration options to support array operations may be available, depending on the version of MailMarshal installed. MailMarshal 5.5 When you install and configure MailMarshal, you can specify that MailMarshal will be used in an array with one server as the master. Configuration information can be replicated automatically to other servers. Configuration and management of MailMarshal 5.5 SMTP for use in arrays is covered in detail in the MailMarshal SMTP User Guide. For details of configuration, see the section Configuration Wizard in Chapter 3, Installation. For details of management, and more information on the settings that are replicated, see Chapter 20, Arrays. MailMarshal 4.X and 5.0 MailMarshal 4.X and 5.0 support unique logging identifiers for each server in an array. In most cases where there is an array of MailMarshal servers all logs of message traffic will be maintained using a single Microsoft SQL Server database. The individual MailMarshal servers must be uniquely identified in the log records. To configure unique identifiers, in the MailMarshal Configurator, choose Server Properties from the Tools menu. Select the Logging tab. Check the box MailMarshal is used in an array. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 15

18 For each member in the array choose a unique Server Instance (or name). This will force the message numbers generated by the individual MailMarshal Servers to be unique and allow centralized reporting of all traffic across the array. 16 Technical White Paper

19 Summary This white paper has provided a short introduction to Network Load Balancing in Windows 2000 and its application to MailMarshal. You should now have the concepts necessary to deploy MailMarshal into an array of servers for load balancing and/or redundancy, using the Microsoft Network Load Balancing services. The concepts shown should enable you to use any other form of Network Load Balancing to provide similar functionality to that illustrated. Further information about Microsoft Network Load Balancing can be found in TechNet or on the Microsoft Web site: Further information about MailMarshal in load balanced arrays can be obtained by contacting NetIQ Support: MailMarshal support is also available through your local NetIQ Partner. NetIQ MailMarshal SMTP in a Load Balanced Array of Servers 17

Using the Message Releasing Features of MailMarshal SMTP Technical White Paper October 15, 2003

Using the Message Releasing Features of MailMarshal SMTP Technical White Paper October 15, 2003 Contents Introduction... 1 Automatic Message Releasing Concepts...2 Server Configuration...3 Policy components...5 Array Support...7 Summary...8. Using the Message Releasing Features of MailMarshal SMTP

More information

NetIQ Aegis Adapter for Databases

NetIQ Aegis Adapter for Databases Contents NetIQ Aegis Adapter for Databases Configuration Guide May 2011 Overview... 1 Product Requirements... 1 Implementation Overview... 1 Installing the Database Adapter... 2 Configuring a Database

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Integration With Third Party SIEM Solutions

Integration With Third Party SIEM Solutions Integration With Third Party SIEM Solutions Secure Configuration Manager February 2015 www.netiq.com Legal Notice NetIQ Secure Configuration Manager is protected by United States Patent No(s): 5829001,

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Lecture Manual

Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Lecture Manual ATT9290 Lecture Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Lecture Manual ATT9290 NetIQ Training Services

More information

LOAD BALANCING 2X APPLICATIONSERVER XG SECURE CLIENT GATEWAYS THROUGH MICROSOFT NETWORK LOAD BALANCING

LOAD BALANCING 2X APPLICATIONSERVER XG SECURE CLIENT GATEWAYS THROUGH MICROSOFT NETWORK LOAD BALANCING SECURE CLIENT GATEWAYS THROUGH MICROSOFT NETWORK LOAD BALANCING Contents Introduction... 3 Network Diagram... 3 Installing NLB... 3-4 Configuring NLB... 4-8 Configuring 2X Secure Client Gateway... 9 About

More information

NetIQ Aegis Adapter for VMware vcenter Server

NetIQ Aegis Adapter for VMware vcenter Server Contents NetIQ Aegis Adapter for VMware vcenter Server Configuration Guide May 2011 Overview... 1 Product Requirements... 1 Supported Configurations... 2 Implementation Overview... 2 Ensuring Minimum Rights

More information

NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide

NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide September 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND

More information

MailMarshal Exchange in a Windows Server Active/Passive Cluster

MailMarshal Exchange in a Windows Server Active/Passive Cluster MailMarshal Exchange in a Windows Server Active/Passive Cluster November, 2006 Contents Introduction 2 Preparation 3 Generic Resource Creation 4 Cluster MailMarshal Install 4 Antivirus Software 8 Known

More information

NetIQ Free/Busy Consolidator

NetIQ Free/Busy Consolidator Contents NetIQ Free/Busy Consolidator Technical Reference September 2012 Overview... 3 Understanding NetIQ Free/ Busy Consolidator... 3 Supported Versions... 4 Requirements for Free/Busy Consolidator...

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

NetIQ Privileged User Manager

NetIQ Privileged User Manager NetIQ Privileged User Manager Performance and Sizing Guidelines March 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Upgrading to MailMarshal Version 6.0 SMTP Technical Reference

Upgrading to MailMarshal Version 6.0 SMTP Technical Reference Upgrading to MailMarshal Version 6.0 SMTP Technical Reference April 19, 2005 Contents Introduction... 3 Case 1: Standalone MailMarshal SMTP Server... 3 Case 2: Array of MailMarshal SMTP Servers... 14 Additional

More information

WebTrends 7 Backup and Restore for MySQL Databases

WebTrends 7 Backup and Restore for MySQL Databases WebTrends 7 Backup and Restore for MySQL Databases May 2004 Edition 2004 NetIQ Corporation Disclaimer This document and the software described in this document are furnished under and are subject to the

More information

Configuring Windows Server Clusters

Configuring Windows Server Clusters Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Identity as a Service Powered by NetIQ Solution Overview Guide

Identity as a Service Powered by NetIQ Solution Overview Guide Identity as a Powered by NetIQ Solution Overview Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Installing Policy Patrol on a separate machine

Installing Policy Patrol on a separate machine Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the

More information

Building a Scale-Out SQL Server 2008 Reporting Services Farm

Building a Scale-Out SQL Server 2008 Reporting Services Farm Building a Scale-Out SQL Server 2008 Reporting Services Farm This white paper discusses the steps to configure a scale-out SQL Server 2008 R2 Reporting Services farm environment running on Windows Server

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

Enabling Remote Management of SQL Server Integration Services

Enabling Remote Management of SQL Server Integration Services Enabling Remote Management of SQL Server Integration Services Michael@SchmittDotNet.com www.schmittdotnet.com Version 1.0 10/14/2010 Copyright and Disclaimers This guide is for informational purposes only.

More information

Identity as a Service Powered by NetIQ Privileged Account Manager Service Installation and Configuration Guide

Identity as a Service Powered by NetIQ Privileged Account Manager Service Installation and Configuration Guide Identity as a Service Powered by NetIQ Privileged Account Manager Service Installation and Configuration Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation Basic ViPNet VPN Deployment Schemes Supplement to ViPNet Documentation 1991 2015 Infotecs Americas. All rights reserved. Version: 00121-04 90 01 ENU This document is included in the software distribution

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Using HP Systems Insight Manager to achieve high availability for Microsoft Team Foundation Server

Using HP Systems Insight Manager to achieve high availability for Microsoft Team Foundation Server Using HP Systems Insight Manager to achieve high availability for Microsoft Team Foundation Server Executive summary... 2 Audience... 2 Architecture... 3 Prerequisite... 4 Deploying AT servers... 5 Configuring

More information

Common Driver Administration Guide. Identity Manager 4.0.2

Common Driver Administration Guide. Identity Manager 4.0.2 Common Driver Administration Guide Identity Manager 4.0.2 July 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

NetIQ SecureLogin 8.0.1 includes new features, improves usability, and resolves several previous issues.

NetIQ SecureLogin 8.0.1 includes new features, improves usability, and resolves several previous issues. NetIQ SecureLogin 8.0 SP1 Readme May 2014 NetIQ SecureLogin 8.0.1 includes new features, improves usability, and resolves several previous issues. Many of these improvements were made in direct response

More information

Integrating Email Campaign Data with WebTrends

Integrating Email Campaign Data with WebTrends Integrating Email Campaign Data with WebTrends Disclaimer This document and the software described in this document are furnished under and are subject to the terms of a license agreement or a non-disclosure

More information

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

NetIQ Directory and Resource Administrator NetIQ Exchange Administrator. Installation Guide

NetIQ Directory and Resource Administrator NetIQ Exchange Administrator. Installation Guide NetIQ Directory and Resource Administrator NetIQ Exchange Administrator Installation Guide August 2013 Legal Notice NetIQ Directory and Resource Administrator is protected by United States Patent No(s):

More information

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web

More information

Configuring Network Load Balancing with Cerberus FTP Server

Configuring Network Load Balancing with Cerberus FTP Server Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Deploying Remote Desktop IP Virtualization Step-by-Step Guide Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability

More information

Load Balancing Exchange 2007 SP1 Hub Transport Servers using Windows Network Load Balancing Technology

Load Balancing Exchange 2007 SP1 Hub Transport Servers using Windows Network Load Balancing Technology Load Balancing Exchange 2007 SP1 Hub Transport Servers using Windows Network Load Balancing Technology Introduction Exchange Server 2007 (RTM and SP1) Hub Transport servers are resilient by default. This

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

CONFIGURING MNLB FOR LOAD BALANCING EXCHANGE 2013 CU2 CAS SERVERS FOR HIGH AVAILABILITY

CONFIGURING MNLB FOR LOAD BALANCING EXCHANGE 2013 CU2 CAS SERVERS FOR HIGH AVAILABILITY CONFIGURING MNLB FOR LOAD BALANCING EXCHANGE 2013 CU2 CAS SERVERS FOR HIGH AVAILABILITY INFRASTRUCTURE CONFIGURATION 2 CAS Servers Virtual Machines running on Hyper-V Windows Server 2013 R2 Generation

More information

eprism Email Security Suite

eprism Email Security Suite Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered

More information

Resonate Central Dispatch

Resonate Central Dispatch Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and

More information

Using IIS Application Request Routing to Publish Lync Server 2013 Web Services

Using IIS Application Request Routing to Publish Lync Server 2013 Web Services Using IIS Application Request Routing to Publish Lync Server 2013 Web Services DISCLAIMER 2014 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync,

More information

NetIQ AppManager for Cisco Interactive Voice Response. Management Guide

NetIQ AppManager for Cisco Interactive Voice Response. Management Guide NetIQ AppManager for Cisco Interactive Voice Response Management Guide February 2009 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract

More information

Installation Guide NetIQ AppManager

Installation Guide NetIQ AppManager Installation Guide NetIQ AppManager April 2016 www.netiq.com/documentation Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335.

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Citrix XenServer Workload Balancing 6.5.0 Quick Start. Published February 2015 1.0 Edition

Citrix XenServer Workload Balancing 6.5.0 Quick Start. Published February 2015 1.0 Edition Citrix XenServer Workload Balancing 6.5.0 Quick Start Published February 2015 1.0 Edition Citrix XenServer Workload Balancing 6.5.0 Quick Start Copyright 2015 Citrix Systems. Inc. All Rights Reserved.

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

Trouble Shooting SiteManager to GateManager access

Trouble Shooting SiteManager to GateManager access Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Biznet GIO Cloud Connecting VM via Windows Remote Desktop Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make

More information

SharePoint Server for Business Intelligence

SharePoint Server for Business Intelligence SharePoint Server for Business Intelligence SharePoint Business Intelligence Content Team Summary: Step-by-step, learn how to install and configure SharePoint Server 2010 and SQL Server 2008 to create

More information

User Guide. NetIQ Agent Manager. May 2013

User Guide. NetIQ Agent Manager. May 2013 User Guide NetIQ Agent Manager May 2013 NetIQ Agent Manager is protected by United States Patent No: 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

Identity as a Service Powered by NetIQ Services Director Installation Guide

Identity as a Service Powered by NetIQ Services Director Installation Guide Identity as a Service Powered by NetIQ Services Director Installation Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Microsoft Corporation Published: October 2007 Author: Dave Bishop Editor: Scott Somohano Technical Reviewers: Sarah

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

10.3.1.8 Lab - Configure a Windows 7 Firewall

10.3.1.8 Lab - Configure a Windows 7 Firewall 5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two

More information

axsguard Gatekeeper Internet Redundancy How To v1.2

axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH

More information

NetIQ AppManager for NetBackup UNIX

NetIQ AppManager for NetBackup UNIX NetIQ AppManager for NetBackup UNIX Management Guide January 2008 Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335. THIS

More information

PlateSpin Forge 4. Rebuilding Forge 4 Appliance 2. June 14, 2014

PlateSpin Forge 4. Rebuilding Forge 4 Appliance 2. June 14, 2014 PlateSpin Forge 4 Rebuilding Forge 4 Appliance 2 June 14, 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT

More information

Installation and Configuration Guide. NetIQ Security and Compliance Dashboard

Installation and Configuration Guide. NetIQ Security and Compliance Dashboard Installation and Configuration Guide NetIQ Security and Compliance Dashboard June 2011 Legal Notice NetIQ Secure Configuration Manager is covered by United States Patent No(s): 5829001, 7093251. THIS DOCUMENT

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Trouble Shooting SiteManager to GateManager access via a corporate Intranet

Trouble Shooting SiteManager to GateManager access via a corporate Intranet Trouble Shooting SiteManager to GateManager access via a corporate Intranet If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection

More information

NetIQ AppManager for Self Monitoring (AM Health) Management Guide

NetIQ AppManager for Self Monitoring (AM Health) Management Guide NetIQ AppManager for Self Monitoring (AM Health) Management Guide September 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Configuration of a Load-Balanced and Fail-Over Merak Cluster using Windows Server 2003 Network Load Balancing

Configuration of a Load-Balanced and Fail-Over Merak Cluster using Windows Server 2003 Network Load Balancing Configuration of a Load-Balanced and Fail-Over Merak Cluster using Windows Server 2003 Network Load Balancing Author: Gerrit Schunk Last Modified: 2005-07-08 Copyright SolWeb Informática S.L. All rights

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Lab 05: Deploying Microsoft Office Web Apps Server

Lab 05: Deploying Microsoft Office Web Apps Server Lab 05: Deploying Microsoft Office Web Apps Server DISCLAIMER 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync, PowerPoint, Silverlight, SQL

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

PlateSpin Migrate 11.1 Installation and Upgrade Guide

PlateSpin Migrate 11.1 Installation and Upgrade Guide PlateSpin Migrate 11.1 Installation and Upgrade Guide September 22, 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

Configuring a SQL Server Reporting Services scale-out deployment to run on a Network Load Balancing cluster

Configuring a SQL Server Reporting Services scale-out deployment to run on a Network Load Balancing cluster Microsoft Dynamics AX Configuring a SQL Server Reporting Services scale-out deployment to run on a Network Load Balancing cluster White Paper A SQL Server Reporting Services (SSRS) scale-out deployment

More information

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager 5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...

More information

Dell Compellent Storage Center

Dell Compellent Storage Center Dell Compellent Storage Center How to Setup a Microsoft Windows Server 2012 Failover Cluster Reference Guide Dell Compellent Technical Solutions Group January 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL

More information

NetIQ and LECCOTECH: Integrated Solutions for Optimal SQL Server Performance October 2003

NetIQ and LECCOTECH: Integrated Solutions for Optimal SQL Server Performance October 2003 NetIQ and LECCOTECH: Integrated Solutions for Optimal SQL Server Performance October 2003 Contents Introduction... 1 Traditional Methods of Monitoring and Tuning... 1 The NetIQ and LECCOTECH Solution...

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Prestige 314 Read Me First

Prestige 314 Read Me First Prestige 314 Read Me First Console WAN 10M PORT Prestige Rear Panel Connections CONNECTION Use an RS-232 console cable. Use the cable that came with your broadband modem. LAN 10/100M Port Number COMPUTER

More information

Quick Start Guide For Ipswitch Failover v9.0

Quick Start Guide For Ipswitch Failover v9.0 For Ipswitch Failover v9.0 Copyright 1991-2015 All rights reserved. This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with

More information

PlateSpin Protect 11.0.1 Installation and Upgrade Guide

PlateSpin Protect 11.0.1 Installation and Upgrade Guide PlateSpin Protect 11.0.1 Installation and Upgrade Guide February 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT

More information

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting

More information

High Availability Configuration

High Availability Configuration www.novell.com/documentation High Availability Configuration ZENworks Mobile Management 3.2.x September 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Reporting Guide NetIQ Reporting Center

Reporting Guide NetIQ Reporting Center Reporting Guide NetIQ Reporting Center October 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF

More information

Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack

Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack Retail Deployment Guide Microsoft Dynamics AX 2012 Feature Pack Microsoft Corporation February 2012 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you

More information

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Load Balancing. Outlook Web Access. Web Mail Using Equalizer Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Introduction to DirectAccess in Windows Server 2012

Introduction to DirectAccess in Windows Server 2012 Introduction to DirectAccess in Windows Server 2012 Windows Server 2012 Hands-on lab In this lab, you will configure a Windows 8 workgroup client to access the corporate network using DirectAccess technology,

More information