Protocols for Dummies

Size: px
Start display at page:

Download "Protocols for Dummies"

Transcription

1 Protocols for Dummies Part 1: SMB Family March 20, 2014 Peter Murray Senior Product Specialist

2 Housekeeping Items Ask Questions Ask questions throughout the presentation by typing them into the chat area of your WebEx console We will address as many questions at the end as possible Recording & Slides Everyone who registers for the webinar trainings will receive: Link to WebEx recording Link to PDF copy of the slides 2

3 Announcements Webinar Schedule April 24 v3.6 Product Release Learn all the latest and greatest product feature in the newest product release! May 15 Flash Testing How to best validate Flash storage performance including de-dup and compressions June 19 Workload Modeling Review of workloads including VDI July 17 How to Win the Storage Bake- Off Stories from the trenches Aug 21 Storage Protocols for Dummies Part 2 We have lots of information to cover 3

4 Speaker Peter Murray Senior Product Specialist Peter Murray is an expert with more than 25 years of experience in storage and network testing. Prior to joining Load DynamiX in 2009, Peter worked with leading vendors including F5 Networks and Spirent Communications, and was extensively involved with the architecture and design of networked testing products and customer engagements. 4

5 CIFS/SMB: Windows XP Windows Server 2003/2008 R1

6 TCP Connect Enter Server IP address TCP Destination Port 445

7 Negotiate Use LM 0.12 Dialect Remaining are historical Unicode Strings = True

8 Session Setup Domain Name: WORKGROUP for server login Full domain name for domain-based login Some vendors require Machine Name Authentication required May use one username and password for all users Domain-based login to be addressed in a future Webinar Use Virtual Circuit 1

9 Tree Connect Format is \\<server>\share Windows ignores all characters between \\ and \ except some clustered implementations

10 Directory Creation: Create or Open File Used for creating, opening or deleting a directory Path is directory name Literal is used here Create Disposition: Typically use Open if Exists, Create otherwise (See next slide) Create Options: Flag as Directory=True creates or opens the directory Hint Delete-On-Close deletes the directory when closed

11 Disposition: How to Create/Open Directory or File Open if Exists, Create otherwise If it s there, use it. If not, create it Supercede if exists, Create otherwise If it s there, erase the content and start over. If new, create it Open if exists, fail otherwise use when you expect a file or directory to be present. Otherwise, fail the open Fail if exists, Create otherwise fail the open if the file already exists, create otherwise Overwrite if exists, Fail otherwise If it s there, write over existing content. If not, fail the Open Overwrite if exists, create otherwise If there, write over existing content. If not, create it

12 File Creation: Create or Open File Used for creating, opening or deleting a file Path is file name User parameter reference shown here Create Options: None usually required Hint Delete-On-Close deletes a file when closed Create Disposition: Typically use Open if Exists, Create otherwise.

13 File Write Automatic Offset True enables long file writes Note: Bytes per Block must be less than Avoids splitting a request in two due to SMB padding Bytes Total defines total write E.g. Block size and Bytes Total 655,000 results in 10 Read requests on the wire Block Sequence writes blocks forward, backwards or randomly within Total Bytes

14 Remaining Commands File/share/session handle configuration is occasionally required for File Close, Tree Disconnect or Session Logoff Only needed if multiple files, shares, or sessions commands opened in one Scenario

15 SMB2: Windows 7 Windows Server 2008 R2

16 TCP Connect Enter Server IP address TCP Destination Port 445

17 Negotiate Dialects: SMB2.002: SMB2 SMB 2.1: SMB2.1 SMB 2.24 Beta SMB3 SMB 3.0: RTM SMB3 Capabilities: All are optional Used with SMB 2.1 and SMB3 SMB 2.0 capabilities: Distributed File System

18 Session Setup Domain Name: WORKGROUP for server login Full domain name for domain-based login Some vendors require Machine Name Authentication required May use one username and password for all users Domain-based login to be addressed in a future Webinar

19 Session Setup: NTLM Flags Windows 7 settings Hex: E Copy NTLM Flags value from PCAP (either hex as shown above or decimal) and paste directly in dropdown pane at top of NTLM Flags rather than setting flags individually

20 Tree Connect Format is \\<server>\share Windows ignores all characters between \\ and \ except some clustered implementations

21 Directory Creation: Create File Used for creating, opening or deleting a directory Path is directory name Literal is used here Create Disposition: Typically use Open if Exists, Create otherwise Create Options: Flag as Directory=True creates or opens the directory Hint Delete-On-Close deletes the directory when closed

22 File Creation: Create File Used for creating, opening or deleting a file Path is file name User parameter reference shown here Create Disposition: Typically use Open if Exists, Create otherwise Create Options: None usually required Hint Delete-On-Close deletes a file when closed

23 File Write Automatic Offset True enables long file writes Note: Bytes per Block must be less than Avoids splitting a request in two due to SMB padding Bytes Total defines total write E.g. Block size and Bytes Total 655,000 results in 10 Read requests on the wire Block Sequence writes blocks forward, backwards or randomly within Total Bytes

24 Remaining Commands File/share/session handle configuration is occasionally required for File Close, Tree Disconnect or Session Logoff Only needed if multiple files, shares, or sessions commands opened in one Scenario

25 SMB2.1/SMB3 Hybrid: Windows 8, 8.1 Windows Server 2012

26 TCP Connect Enter Server IP address TCP Destination Port 445

27 Negotiate Required dialects: SMB2.002: SMB2 SMB 2.1: SMB2.1 SMB 3.0: RTM SMB3 Capabilities: All are optional Used with SMB 2.1 and SMB3 SMB 2.1 capabilities: Distributed File System Leasing Large MTU (Multi-Credit) SMB 3.0 capabilities: Persistent Handles Directory Leasing Encryption

28 Session Setup Domain Name: WORKGROUP for server login Full domain name for domain-based login Some vendors require Machine Name Authentication required May use one username and password for all users Domain-based login to be addressed in a future Webinar

29 Session Setup: NTLM Flags Windows 8 settings Hex: E Copy NTLM Flags value from PCAP (either hex as shown above or decimal) and paste directly in dropdown pane at top of NTLM Flags PCAP rather than setting flags individually

30 Tree Connect Format is \\<server>\share Windows ignores all characters between \\ and \ except some clustered implementations

31 Validate Negotiate Verifies that a client has connected to a real SMB3 server Helps prevent Man in the Middle attacks Revalidates the Capabilities first specified in Negotiate

32 Query Network Interface Determines if multiple interfaces are available on server If present, may be one or more: Ethernet interfaces 10G Ethernet iwarp (RDMA) interfaces Infiniband RDMA interfaces Other interfaces may be shared iwarp and Infiniband interfaces enable highspeed large data transfers

33 Remaining Commands Share/session handle configuration is occasionally required for Tree Disconnect or Session Logoff Only needed if multiple files, shares, or sessions commands opened in one Scenario Advanced copy using SMB3 will be a topic in a future Webinar

34 More to Come Future Protocol for Dummies webinars will address: NFSv3, NFSv4 and NFSv4.1 Fibrechannel iscsi Many advanced topics: Writing / Reading with complex content types Working with metadata Compound vs. Async command config and processing And more! Please stay tuned 35

35 Thank you! (408)

LucidNAS Quick Start Guide

LucidNAS Quick Start Guide LucidNAS Quick Start Guide This section demonstrates the initial preparation that should be performed before you start using the LucidNAS system. Set Administrative Access By default, no password is required

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

How to Join QNAP NAS to Microsoft Active Directory (AD)

How to Join QNAP NAS to Microsoft Active Directory (AD) How to Join QNAP NAS to Microsoft Active Directory (AD) What is Active Directory? Active Directory is a Microsoft directory used in Windows environments to centrally store, share, and manage the information

More information

How to setup FTP and Secure FTP for XD Series

How to setup FTP and Secure FTP for XD Series How to setup FTP and Secure FTP for XD Series Use the following steps prior to enabling support for FTP services on XD Series: 1) Create NAS volume and Share(s) 2) Create Users and Groups 3) Select an

More information

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 Send to the SMB server You can send the data read in from the copier's ADF or the original scanning glass (scanned data)

More information

Configuring Windows Server Clusters

Configuring Windows Server Clusters Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed

More information

Scan to SMB(PC) Set up Guide

Scan to SMB(PC) Set up Guide Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft

More information

TELNET CLIENT 5.11 SSH SUPPORT

TELNET CLIENT 5.11 SSH SUPPORT TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10 Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

OPC UA vs OPC Classic

OPC UA vs OPC Classic OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation

More information

Chapter 3 Authenticating Users

Chapter 3 Authenticating Users Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Microsoft SMB 2.2 - Running Over RDMA in Windows Server 8

Microsoft SMB 2.2 - Running Over RDMA in Windows Server 8 Microsoft SMB 2.2 - Running Over RDMA in Windows Server 8 Tom Talpey, Architect Microsoft March 27, 2012 1 SMB2 Background The primary Windows filesharing protocol Initially shipped in Vista and Server

More information

Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist, http://aka.ms/yungchou, @yungchou

Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist, http://aka.ms/yungchou, @yungchou Page 1 of 23 Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist, http://aka.ms/yungchou, @yungchou Windows Server 2012 Hyper-V Replica is a built-in mechanism for replicating

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Microsoft Networks. SMB File Sharing Protocol Extensions. Document Version 3.4

Microsoft Networks. SMB File Sharing Protocol Extensions. Document Version 3.4 Microsoft Networks SMB File Sharing Protocol Extensions Document Version 3.4 February 7, 2010 1. Introduction...2 2. Negotiate Protocol...2 3. Session Setup and X...3 4. Tree Connect and X SMB...4 5. Locking

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Directory and File Transfer Services. Chapter 7

Directory and File Transfer Services. Chapter 7 Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major

More information

Default configuration for the Workstation service and the Server service

Default configuration for the Workstation service and the Server service Article ID: 887429 - Last Review: November 30, 2007 - Revision: 2.4 Overview of Message Block signing INTRODUCTION This article describes Message Block (SMB) signing. SMB signing is a security mechanism

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

CYAN SECURE WEB HOWTO. NTLM Authentication

CYAN SECURE WEB HOWTO. NTLM Authentication CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved.

User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. User s Manual Package Contents: 1 NextStar FX Gigabit NAS Adapter x1 2 AC Adapter x1 3 Installation Guide x1 4 Rubber Feet x4 5 User s CD

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Discovering passwords in the memory

Discovering passwords in the memory Discovering passwords in the memory Abhishek Kumar (abhishek.kumar@paladion.net) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Technical Report Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp June 2015 TR-4286 Abstract An antivirus solution is key for enterprises

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Installation Troubleshooting Guide

Installation Troubleshooting Guide Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching

More information

FileCruiser Backup & Restoring Guide

FileCruiser Backup & Restoring Guide FileCruiser Backup & Restoring Guide Version: 0.3 FileCruiser Model: VA2600/VR2600 with SR1 Date: JAN 27, 2015 1 Index Index... 2 Introduction... 3 Backup Requirements... 6 Backup Set up... 7 Backup the

More information

Prestige 2002 Series. VoIP Analog Telephone Adaptor. Quick Start Guide

Prestige 2002 Series. VoIP Analog Telephone Adaptor. Quick Start Guide VoIP Analog Telephone Adaptor Quick Start Guide Version 3.60 5/2005 Overview The Prestige allows you to use an analog telephone to make phone calls over the Internet (Voice over IP or VoIP). It uses SIP

More information

How to Logon with Domain Credentials to a Server in a Workgroup

How to Logon with Domain Credentials to a Server in a Workgroup How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos johan@accessdenied.be Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Application Notes Backup Exec 11D VSS Snapshots and Transportable Offhost Backup Legal Notices Warranty The only warranties for HP products and services are set

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

SMC7004ABR Barricade Broadband Router Installation Instructions

SMC7004ABR Barricade Broadband Router Installation Instructions SMC7004ABR Barricade Broadband Router Installation Instructions SPECIAL NOTE: Part D Upgrading the Firmware in Your Barricade MUST occur in ALL installations for multiple VPN sessions to work!!! SPECIAL

More information

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold

More information

ecopy ShareScan v4.3 Pre-Installation Checklist

ecopy ShareScan v4.3 Pre-Installation Checklist ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes

More information

Flash Storage: Trust, But Verify

Flash Storage: Trust, But Verify Flash Storage: Trust, But Verify A better, vendor-independent way to analyze flash performance Leah Schoeb, Evaluator Group Peter Murray, Load DynamiX 1 Introductions 2 Speakers Leah Schoeb Senior Partner

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

1 Outlook 2010 (Windows OS) and MAPI Configuration

1 Outlook 2010 (Windows OS) and MAPI Configuration 1 Outlook 2010 (Windows OS) and MAPI Configuration Automatic configuration of Outlook 2010 is expected to work for most users under most conditions with Windows 7 and Microsoft Outlook 2010 installed.

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

The Win32 Network Management APIs

The Win32 Network Management APIs The Win32 Network Management APIs What do we have in this session? Intro Run-Time Requirements What's New in Network Management? Windows 7 Windows Server 2003 Windows XP Network Management Function Groups

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd. IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server

More information

Improved document archiving speeds; data enters the FileNexus System at a faster rate! See benchmark test spreadsheet.

Improved document archiving speeds; data enters the FileNexus System at a faster rate! See benchmark test spreadsheet. Feature Sheet Version 6.100.14 FileNexus Major Advances Client Server Communication - Dependency on Windows DCOM protocols eliminated which means NO additional configuration required on Client PCs after

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Upgrade Guide BES12. Version 12.1

Upgrade Guide BES12. Version 12.1 Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5

More information

Other documents in this series are available at: servernotes.wazmac.com

Other documents in this series are available at: servernotes.wazmac.com Wazza s Snow Leopard Server QuickStart 14. Win XP - Workgroup Setup About the Document This document is the fourteenth in a series of documents describing the process of installing and configuring a Mac

More information

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations Step-by-Step Secure Wireless for Home / Small Office and Small Organizations Microsoft Corporation Published: October 2005 Author: Brit Weston Editor: Allyson Adley Abstract This white paper presents two

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

Authenticating a Lucent Portmaster 3 with Microsoft IAS and Active Directory

Authenticating a Lucent Portmaster 3 with Microsoft IAS and Active Directory Authenticating a Lucent Portmaster 3 with Microsoft IAS and Active Directory The following tutorial will help you to setup a Portmaster 3 to authenticate your dial in users to Active Directory using IAS

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

Configuring WMI Performance Monitors

Configuring WMI Performance Monitors Configuring WMI Performance Monitors With WMI, WhatsUp Gold Premium Edition monitors and sends alerts based on performance counters that are reported from Microsoft Windows devices. The data collected

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

TECHNICAL NOTE TNOI27

TECHNICAL NOTE TNOI27 TECHNICAL NOTE TNOI27 Title: FTP Synchronization Product(s): G3, DSP and Enhanced Modular Controller ABSTRACT The purpose of this document is to describe the G3 s FTP feature and the configuration steps

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Samba 4 AD + Fileserver

Samba 4 AD + Fileserver Samba 4 AD + Fileserver Linuxtag 2013 Volker Lendecke Samba Team Volker Lendecke Co-founder - Service Network GmbH Free Software as a successful business model Network Security for the industry and the

More information

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc. User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) Scenario # 1: Single Node or Standalone SA... 2 Scenario

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Wharf T&T Cloud Backup Service User & Installation Guide

Wharf T&T Cloud Backup Service User & Installation Guide Wharf T&T Cloud Backup Service User & Installation Guide Version 1.6 Feb 2013 Table of contents BEFORE YOU INSTALL 3 Page Section 1. Installation of Client Software 5 Section 2. Account Activation 8 Section

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form

More information

Prestige 2302R Series

Prestige 2302R Series VoIP Station Gateway Quick Start Guide Version 3.60 6/2005 Overview This Quick Start Guide covers the Prestige (P2302R) and (P2302RL) models. It explains how to use your Prestige to make phone calls through

More information

13.1 Backup virtual machines running on VMware ESXi / ESX Server

13.1 Backup virtual machines running on VMware ESXi / ESX Server 13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines

More information

How-to: Single Sign-On

How-to: Single Sign-On How-to: Single Sign-On Document version: 1.02 nirva systems info@nirva-systems.com nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features

More information

Microsoft IAS Configuration for RADIUS Authorization

Microsoft IAS Configuration for RADIUS Authorization Microsoft IAS Configuration for RADIUS Authorization Purpose To illustrate how to create a Microsoft IAS Remote Access Policy that utilizes an Uplogix vendor specific attribute that contains a user group

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Good Morning Wireless! SSID: MSFTOPEN No Username or Password Required

Good Morning Wireless! SSID: MSFTOPEN No Username or Password Required Good Morning Wireless! SSID: MSFTOPEN No Username or Password Required 2 Today s Agenda - 9:00-10:30 - Windows Azure Infrastructure Services - 10:30-10:45 - Break - 10:45-12:00 - Windows Azure Infrastructure

More information