Contivity Configuration Manager Tool Set

Size: px
Start display at page:

Download "Contivity Configuration Manager Tool Set"

Transcription

1 2.2 Part No A Rev 00 December Technology Park Drive Billerica, MA Contivity Configuration Manager Tool Set * A_Rev_00*

2 2 Copyright 2004 Nortel Networks All rights reserved. December The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks Inc. The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of that license. The software license agreement is included in this document. Trademarks Nortel Networks, the Nortel Networks logo, the Globemark, Unified Networks, Contivity, and Contivity Configuration Manager are trademarks of Nortel Networks. Adobe and Acrobat Reader are trademarks of Adobe Systems Incorporated. Cloudscape is a trademark of International Business Machines Corporation. Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation. Solaris is a trademark of Sun Microsystems, Inc. Norton Antivirus is a trademark of Symantec Corporation. The asterisk after a name denotes a trademarked item. Restricted rights legend Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial Computer Software-Restricted Rights clause at FAR Statement of conditions In the interest of improving internal design, operational function, and/or reliability, Nortel Networks Inc. reserves the right to make changes to the products described in this document without notice. Nortel Networks Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. Portions of the code in this software product may be Copyright 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms of such portions are permitted, provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that such portions of the software were developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from such portions of the software without specific prior written permission. SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE A Rev 00

3 3 In addition, the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed by third parties). Nortel Networks Inc. software license agreement This Software License Agreement ( License Agreement ) is between you, the end-user ( Customer ) and Nortel Networks Corporation and its subsidiaries and affiliates ( Nortel Networks ). PLEASE READ THE FOLLOWING CAREFULLY. YOU MUST ACCEPT THESE LICENSE TERMS IN ORDER TO DOWNLOAD AND/OR USE THE SOFTWARE. USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF THIS LICENSE AGREEMENT. If you do not accept these terms and conditions, return the Software, unused and in the original shipping container, within 30 days of purchase to obtain a credit for the full purchase price. Software is owned or licensed by Nortel Networks, its parent or one of its subsidiaries or affiliates, and is copyrighted and licensed, not sold. Software consists of machine-readable instructions, its components, data, audio-visual content (such as images, text, recordings or pictures) and related licensed materials including all whole or partial copies. Nortel Networks grants you a license to use the Software only in the country where you acquired the Software. You obtain no rights other than those granted to you under this License Agreement. You are responsible for the selection of the Software and for the installation of, use of, and results obtained from the Software. 1. Licensed Use of Software. Nortel Networks grants Customer a nonexclusive license to use a copy of the Software on only one machine at any one time or to the extent of the activation or authorized usage level, whichever is applicable. To the extent Software is furnished for use with designated hardware or Customer furnished equipment ( CFE ), Customer is granted a nonexclusive license to use Software only on such hardware or CFE, as applicable. Software contains trade secrets and Customer agrees to treat Software as confidential information using the same care and discretion Customer uses with its own similar information that it does not wish to disclose, publish or disseminate. Customer will ensure that anyone who uses the Software does so only in compliance with the terms of this Agreement. Customer shall not a) use, copy, modify, transfer or distribute the Software except as expressly authorized; b) reverse assemble, reverse compile, reverse engineer or otherwise translate the Software; c) create derivative works or modifications unless expressly authorized; or d) sublicense, rent or lease the Software. Licensors of intellectual property to Nortel Networks are beneficiaries of this provision. Upon termination or breach of the license by Customer or in the event designated hardware or CFE is no longer in use, Customer will promptly return the Software to Nortel Networks or certify its destruction. Nortel Networks may audit by remote polling or other reasonable means to determine Customer s Software activation or usage levels. If suppliers of third party software included in Software require Nortel Networks to include additional or different terms, Customer agrees to abide by such terms provided by Nortel Networks with respect to such third party software. 2. Warranty. Except as may be otherwise expressly agreed to in writing between Nortel Networks and Customer, Software is provided AS IS without any warranties (conditions) of any kind. NORTEL NETWORKS DISCLAIMS ALL WARRANTIES (CONDITIONS) FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is not obligated to provide support of any kind for the Software. Some jurisdictions do not allow exclusion of implied warranties, and, in such event, the above exclusions may not apply. Contivity Configuration Manager Tool Set

4 4 3. Limitation of Remedies. IN NO EVENT SHALL NORTEL NETWORKS OR ITS AGENTS OR SUPPLIERS BE LIABLE FOR ANY OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY CLAIM; b) LOSS OF, OR DAMAGE TO, CUSTOMER S RECORDS, FILES OR DATA; OR c) DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS), WHETHER IN CONTRACT, TORT OR OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT OF YOUR USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS, ITS AGENTS OR SUPPLIERS HAVE BEEN ADVISED OF THEIR POSSIBILITY. The forgoing limitations of remedies also apply to any developer and/or supplier of the Software. Such developer and/or supplier is an intended beneficiary of this Section. Some jurisdictions do not allow these limitations or exclusions and, in such event, they may not apply. 4. General a. If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks Software available under this License Agreement is commercial computer software and commercial computer software documentation and, in the event Software is licensed for or on behalf of the United States Government, the respective rights to the software and software documentation are governed by Nortel Networks standard commercial license in accordance with U.S. Federal Regulations at 48 C.F.R. Sections (for non-dod entities) and 48 C.F.R (for DoD entities). b. Customer may terminate the license at any time. Nortel Networks may terminate the license if Customer fails to comply with the terms and conditions of this license. In either event, upon termination, Customer must either return the Software to Nortel Networks or certify its destruction. c. Customer is responsible for payment of any taxes, including personal property taxes, resulting from Customer s use of the Software. Customer agrees to comply with all applicable laws including all applicable export and import laws and regulations. d. Neither party may bring an action, regardless of form, more than two years after the cause of the action arose. e. The terms and conditions of this License Agreement form the complete and exclusive agreement between Customer and Nortel Networks. f. This License Agreement is governed by the laws of the country in which Customer acquires the Software. If the Software is acquired in the United States, then this License Agreement is governed by the laws of the state of New York. Open Source License Notices The BNR, FPM and SSL-VPN Manager applications include the Kunststoff library (v2.0.2) which is distributed under the terms of the Lesser GNU Public License. The BNR, FPM and SSL-VPN Manager applications include the Metouia library (v1.0 alpha) which is distributed under the terms of the Lesser GNU Public License. The BNR, FPM and SSL-VPN Manager applications include the Jgoodies library (v1.2.1) which is distributed under the terms of the BSD Open Source License. The BNR, FPM and SSL-VPN Manager applications include the JSCH library (v0.1.14) which is distributed under the terms of the BSD Style License. The BNR, FPM and SSL-VPN Manager applications include the XML/RPC library (v1.2-b1) which is distributed under the terms of the Apache License 2.0. The BNR, FPM and SSL-VPN Manager applications include the Jakarta Commons Net library (v1.2.2, 1.0 for fileupload) which is distributed under the terms of the Apache License 2.0. The BNR & FPM applications include the Xstream library (v1.0.1) which is distributed under the terms of the BSD Style License. The BNR application includes the Jakarta ORO library (v2.0.8) which is distributed under the terms of the Apache License A Rev 00

5 5 The BNR application includes the Jcalendar library (v1.2.1) which is distributed under the terms of the Lesser GNU Public License. Contivity Configuration Manager Tool Set

6 A Rev 00

7 7 Contents Introduction Firewall Policy Manager tool Concepts: Process: Adding or editing a global device Configuring scope objects Service objects Network objects Policies Rules Apply Policy Importing policies Saving Data Tips & Techniques Exporting File order SSL VPN Read-only SSL VPN support Launching the SSL VPN Manager SSL VPN Initialization Wizard Backup and Restore Full Backup Full Restore Configuration Backup Configuration Restore Adding devices Adding multiple devices from a file Adding a single device Backup operations Restore operations Exporting devices Contivity Configuration Manager Tool Set

8 8 Advanced topics Enabling FTP Deleting backup plans and devices Saving Hard-copy technical manuals How to get help A Rev 00

9 9 Introduction This guide provides information about the Contivity Configuration Manager 2.2 Tool Set.These tools are bundled with CCM 2.2 to help simplify the management options available to you. The following tools are included in the tool set: Firewall Policy Manager tool on page 10 SSL VPN on page 17 Backup and Restore on page 20 Contivity Toolset 2.2

10 10 Firewall Policy Manager tool The Firewall Policy Manager is a tool to help you deal with the problem of managing many devices running the Contivity Stateful Firewall Application. This tool allows you to create and edit firewall policies that can be applied to multiple Contivity devices.you can apply these policies to multiple devices in a very short time. You can also save and send policies and rules to other network administrators using the Firewall Policy Manager. Firewall Policy Manager only supports Contivity devices running version 4.80 and higher. It only supports device models 1050 and higher. You can use Firewall Policy Manager to configure override rules and default rules. Interface-specific rules are not supported. Concepts: Process: Policy an ordered list of rules Rule made up of conditions, actions, and additional information Condition consists of a qualification of interfaces and policy objects (scope objects) Interfaces: source and destination Policy objects: network objects and service objects Global devices elements that are available in the network to which defined policies can applied. 1 Discover devices. 2 Create a policy. 3 Define rules. a b Define policy objects (interfaces, network objects, and so on). Define actions. If user authenticate is selected, specify a user group. 4 Enter additional information (log, remark) as needed A Rev 00

11 11 5 Select a policy. 6 Add devices to the device list of the selected policy. 7 Apply the policy. Adding or editing a global device Global devices are elements that are available in the network to which defined policies can be applied. The Firewall Policy Manager allows you to add or edit global devices quickly and easily. 1 From the Firewall Policy Manager window, select the Global Devices tab. 2 To add a device, click the Add button at the bottom of the window. To edit, click the Edit button. 3 In the Add Device dialog box, enter the IP Address, User Name, and Password for the device in the appropriate fields. If you choose to edit an existing device, a similar dialog box appears with the current information for the device already in place. You can make any changes in this dialog box. 4 Click OK. Once the device is entered, the Firewall Policy Manager will attempt to contact the device and, if successful, will display the device model and software version. Configuring scope objects Service objects 1 From the Firewall Policy Manager window, select the Policy Objects tab. 2 From the Service Objects panel, select the service object from the list and click the Add button at the bottom of the window. 3 In the Add Service Object dialog box, assign the object to a specific type in the drop-down list. The choices are TCP, UDP, IP Protocol, ICMP, and Group. 4 In the Add Service Object dialog box, enter name, any service data, and optionally add a remark for the object in the fields provided. 5 Click OK. Contivity Toolset 2.2

12 12 The object is available for use in the Policy rules. Once created, Service Objects can edited or deleted. However, you cannot change the type of service object when editing it. Network objects 1 From the Firewall Policy Manager window, select the Policy Objects tab. 2 From the Network Objects panel, select a network object from the list and click the Add button at the bottom of the window. 3 In the Add Network Object dialog box, assign the network object to a specific type in the drop-down list. The choices are network, ip_range, host, and group. 4 In the Add Network Object dialog box, enter the name, any network data, and optionally add a remark for the object in the fields provided. 5 Click OK. The object is available for use in the Policy rules. Once created, Network Objects can be edited and deleted. However, you cannot change the type of the network object when editing it. Note: When you delete a scope object that is used in a rule or contained in a group, you get an error message detailing where that scope object is used and why it cannot be deleted. You can modify a scope object; however, you get a warning message showing where the object is used A Rev 00 Policies A policy is an ordered list of rules. A policy consists of two sets of rules, default and override, and a list of devices to which a policy is applied. To add a policy: 1 From the Firewall Policy Manager window, select the Policies tab. 2 Click the Add Policy button. 3 In the Add Policy dialog box, enter the name of the new policy. 4 Click OK.

13 Policies can be deleted by clicking the Delete Policy button. Policy names can be edited by double-clicking the selected policy. Note: The renaming of a policy in FPM does not cause a renaming on the Contivity device. You will not be able to rename a Contivity device policy using FPM. Instead, you can store a second, possibly identical, policy on the device using the new name. 13 Rules Rules are made up of conditions, actions, and additional information. You can create override rules, default rules, or both for any given policy. Once a policy is selected, the current lists of rules can be modified by selecting either the Override Rules tab or the Default Rules tab. To add a rule: 1 From the Firewall Policy Manager window, select the Policies tab. 2 Select a Policy from the Policies panel. 3 Select a Rule type: Default or Override. 4 Click the Add Rule Before or Add Rule After button. Note: Order is very important to the firewall policy and you can insert a rule either before or after the selected row. 5 From the Add Rule dialog box, select the Source Interface from the drop-down list. You can choose any, system, trusted, untrusted, tunnel:any, user tunnel:any, branch tunnel:any, and ssl-vpn. The default is any. 6 Select the Destination Interface from the drop-down list. You can choose any, system, trusted, untrusted, tunnel:any, user tunnel:any, branch tunnel:any, and ssl-vpn. The default is any. 7 Select the Source from the options listed. The list is derived from the Scope Network Objects. 8 Select the Destination from the options listed. The list is derived from the Scope Network Objects. Contivity Toolset 2.2

14 14 9 Select the Service from the options listed. The is list is derived from the Scope Service Objects. 10 In the Action drop-down list, select accept, drop, reject, or user authentication. The default is accept. 11 Enter the name of a User Group in the User Group field. Note: If you selected user authentication from the Action drop-down list, you must make sure the user group exists on the device. The FPM does not verify that the group exists. 12 In the Log drop-down list, select none, brief, detail, and trap. The default is none. 13 In the Status drop-down list, select enable or disable. The default is enable. 14 In the Remark field, enter a comment about the rule. This is an optional field. 15 Click OK. Apply Policy Note: Once started, an Apply Policy operation cannot be stopped. To apply a policy to a group of devices: 1 From the Firewall Policy Manager window, select the Policies tab. 2 Select a policy from the policy list and click the Apply Policy button. After the policy is applied, the scope objects that exist in FPM are the only ones available on the device. 3 The Device Status pop-up window appears, displaying the devices in the policy s device list. The status of the apply process is updated for each device A Rev 00

15 15 Note: When you apply a policy to a device, that policy becomes the active policy. Importing policies To import policies: 1 From the Firewall Policy Manager window, select the Policies tab. 2 Click on the Global Policies tab and select a device. 3 Click the Import Policies button. 4 From the Import Policies dialog box, select the policies to import from the list provided. Those policies are then imported into the Policy Manager. Note: When you import a policy from a device and there are scope objects with the same name as those already present on FPM, the FPM scope objects are not overwritten. The scope objects from the device are ignored. Saving Data The data representing the devices, the policies, and the scope objects can be stored to a file. This allows you to keep backups, and gives you the ability to distribute the data to other users. 1 From the Firewall Policy Manager window, select File > Save. 2 If the policy data has never been saved, select a file name at the prompt. If the name of the files has been previously selected, Save will not ask for a file name. The last saved files will be the file that is read during the restart of the tool. Contivity Toolset 2.2

16 16 Tips & Techniques Exporting When you export a policy to a device and the device already contains a policy with the same name, the export operation overwrites the device s existing policy. However, interface specific rules defined for a specific policy will not be overwritten during an export operation. File order In the Firewall Policy Manager menu bar, selecting File > Open presents a list of directory files in ascending order by name. You cannot change this sort order A Rev 00

17 17 SSL VPN The SSL VPN support in CCM is divided into three parts: Read-only SSL VPN Configuration information in the SSL VPN tab under the Configuration Data > Contivity device > Services > Properties tab. Application Link to launch SSL VPN Manager SSL VPN Initialization Wizard Read-only SSL VPN support The new tab features the following read-only fields: Enabled Allow SSL-VPN traffic through Stateful FW Allow one time password for aportal full access Status SSL VPN Management IP SSL VPN IP To view the read-only parameters: 1 From the CCM navigation pane, select Configuration Data and expand a Contivity device. 2 Expand the Contivity device and select Services. 3 From the context-sensitive pane, select the Properties > SSL VPN tab. Launching the SSL VPN Manager If the Contivity device has an SSL VPN card installed and SSL VPN is initialized and enabled, an application link called Launch SSL VPN Manager is automatically added to the CCM Applications tab. By clicking the Go button, you can launch SSL VPN Manager as if launching it through the Contivity Web GUI. Contivity Toolset 2.2

18 18 To launch SSL VPN Manager via the Applications tab: 1 From the navigation pane, select Configuration Data > Contivity device > Services. 2 From the context-sensitive pane, select the Applications tab. If the Applications tab is not visible, select View > Context Pane from the CCM menu bar and click Applications from the drop-down menu. 3 Select the Launch SSL VPN Manager application link and click the GO! button. SSL VPN Initialization Wizard The SSL VPN Initialization wizard allows you to: Enable/Disable SSL VPN Enable/Disable Allow SSL-VPN traffic through Stateful FW Enable/Disable Allow one-time password for portal full access Check the current status of SSL VPN Initialize SSL VPN to configure Management IP Address, Interface IP Address, and Admin Password To configure the SSL VPN Initialization Wizard: 1 From the navigation pane, select the Contivity device. 2 In the context-sensitive pane, select the Wizards tab. 3 Select the SSL VPN Initialization wizard and click the Run button. 4 The first wizard dialog box appears. If the wizard has not been run before and SSL VPN has not been initialized, you can configure the SSL VPN parameters by selecting the checkboxes available. 5 Click Next. 6 In the following window, enter the SSL VPN Management Address, the SSL VPN Interface Address, and the SSL VPN Admin Password in the fields provided. All three fields must be filled in. The initialization may take several minutes. 7 Click Next A Rev 00

19 19 8 If you would like to report the result, select a reporting option from the list available. The report will be saved to a file or displayed in a pop-up Web browser. 9 Click Finish. If SSL VPN has been initialized, the only options to configure are the three parameters listed in the first wizard window: Enable SSL VPN, Allow SSL-VPN Traffic through Stateful FW, and Allow One Time Password for Portal Full Access. Contivity Toolset 2.2

20 20 Backup and Restore The backup and restore application dramatically lessens the time needed to perform backup, restore, or backup and restore operations on multiple devices. You no longer have to go to each device and schedule your backup operations. All managed devices are covered by one consistent, centrally managed backup plan. Launch the Backup and Restore Tool by selecting the following in the Contivity device: Configuration Data>Contivity Switch>Applications>Launch Backup and Restore Manager The Backup and Restore Tool provides a user-friendly graphical user interface geared toward making multi-device operations simple. It also provides a command line interface to incorporate backup and restore in automated maintenance scripts. In a backup operation, the tool saves copies of files from a Contivity device. Depending on the type of backup running, these files can include configuration files, image files, SSL VPN configurations, LDAP databases, and log files. In a restore operation, the tool copies the files back to the device. Contivity devices support two types of backup operations. The first type is the full backup for crash recovery purposes. The second type is the configuration backup that only backs up the device configuration information. Note: The Backup and Restore tool currently supports Contivity Secure IP Services Gateway devices running software versions 4.8x and later. Full Backup Full backup operations are used primarily to recover from device crashes and to configure replacements. The backup data contains configuration, image, logs, and audits, as well as the whole system directory. Full backups can take up to ten minutes or more and can be prohibitively large A Rev 00

21 21 Note: If the Backup and Restore tool performs a restore operation from a full backup, only the configuration and LDAP data is restored. A full restore requires a recovery diskette. Full Restore Full restore operations use a recovery process that requires booting from a diskette and requires a reboot. Alternately, data can be restored by downgrading the device to a previous image version, then upgrading it using the CES Admin > Upgrade feature by pointing to the FTP server where the backup is stored. Configuration Backup In a configuration backup, the backup data contains only partial information from the device. It contains full configuration data, LDAP database, SSL VPN configurations, but does not contain logs or images. Configuration backup is very fast when compared to a full backup operation and uses disk space more efficiently. Configuration Restore In a configuration restore operation, you can restore a configuration snapshot at any time. Restore operations can be done very quickly. Once the restore is complete, the system reboots. Adding devices Adding multiple devices from a file 1 Launch the Contivity Backup and Restore Manager. 2 To add devices to the Devices tab, select File > Import Devices. 3 From the Open dialog box (shown in Figure 1 on page 22), select the file or file folder to add. Contivity Toolset 2.2

22 22 Figure 1 Open dialog box 4 In the Add Device dialog box, enter the IP Address, User Name, and Password for the device you want to add. Note: A User Name or Password cannot exceed 30 characters. The Devices tab lists the imported devices and gives you a status of each device. 5 Click OK. 6 You can choose to back up all of the added devices immediately by clicking the Start Backup button at the top of the window. Adding a single device 1 Select the Devices tab. 2 Click the Add button. 3 Enter the IP Address, User Name and Password for the device you want to add. 4 Click OK. Note: A User Name or Password cannot exceed 30 characters A Rev 00

23 23 Backup operations To back up devices: 1 From the Contivity Backup and Restore Manager, select the Backup tab. 2 Click the Add button at the top of the window to add your backup plan. A backup plan contains the devices to be backed up and the scheduling information for the backup. You can have multiple backup plans and the same device can appear in more than one plan. 3 In the Add New Backup Operation dialog box (shown in Figure 2), enter the name of your backup plan. Figure 2 Add New Backup Operation dialog box 4 Click OK. 5 To add devices to a backup plan, highlight the backup plan located on the left side of your window. 6 On the right window panel, select the Devices tab, and click the Add button at the bottom of the window. 7 From the Add Device dialog box, select a device or multiple devices from the device list. When you have finished selecting the devices, click OK. 8 Select the Configure tab. Figure 3 on page 24 shows the Configuration tab. Contivity Toolset 2.2

24 24 Figure 3 Configuration tab 9 Select the type of backup configuration for the backup plan devices. Configuration backup contains full configuration data, LDAP database, SSL VPN configurations, but does not contain logs or images. Full backup contains configuration, image, logs, and audits, as well as the whole system directory. 10 Select the Schedule tab. Figure 4 on page 25 shows the Schedule tab. Note: Backups can be scheduled repeatedly. Restore operations cannot A Rev 00

25 25 Figure 4 Schedule tab 11 To schedule backups, first check the Enabled checkbox. 12 In the Schedule fields, enter the Date, Time, and repetition for the backup. 13 To start backup immediately, select the Start Backup button at the top of the window. Once the backup is performed, the devices are listed in the Archive tab, which is a list of all backed up devices. Restore operations To restore devices: 1 From the Contivity Backup and Restore Manager, select the Restore tab. Figure 5 on page 26 shows the Restore tab. Contivity Toolset 2.2

26 26 Figure 5 Restore tab 2 Select the Device tab and click the Add button. 3 From the Add Device dialog box, select a device or multiple devices from the device list. When you have finished selecting the devices, click OK. 4 Using the radio buttons at the top of the window, select the type of restore for the device. Latest use the most recent backup configuration Custom choose the backup to use from the list Dated choose according to backup date 5 Click the Restore button at the top of the window OR From the Schedule tab, check the Enabled checkbox and enter the Date and Time in the schedule fields for the restore operation to run. Note: Backups can be scheduled repeatedly. Restore operations cannot. 6 After a restore operation, reboot the device A Rev 00

27 27 Exporting devices 1 Launch the Contivity Backup and Restore Manager. 2 From the Archive tab, select a device or devices from the list. 3 Select File > Export Devices. 4 From the Save dialog box, specify where you want the files saved. 5 Enter the File Name. 6 Click Save. The folder is created in the directory specified and the selected files are saved. Advanced topics Enabling FTP The Contivity Backup and Restore Tool automatically enables the FTP server on the private side of the Contivity Secure IP Services Gateway device before each operation and disables the FTP server upon completion of the operation. Once the Backup and Restore Tool is finished attempting to run an operation, the value of the Services > Available > FTP flag is returned to the state it was in before Backup and Restore Tool began its task. If during the operation, the Backup and Restore Tool cannot start an FTP session, an error is displayed in the status column for the device, and you will have to troubleshoot each problem independently. Deleting backup plans and devices Be careful when deleting backup plans. If you delete a backup plan running on a schedule, a warning box appears notifying you of the scheduled backup and asking if you want to proceed with the deletion. If you attempt to delete a device that is assigned to a backup plan, a warning dialog box appears, notifying you of the backup plan assignment and confirming the deletion process. Contivity Toolset 2.2

28 28 Saving Each time you exit the Contivity Backup and Restore Manager, a warning dialog box appears, reminding you to save your work. You can save at this time, or save any time during your session by selecting File > Save and selecting the appropriate directory. Hard-copy technical manuals You can print selected technical manuals and release notes from the Internet at no cost. Go to the URL. Find the product for which you need documentation. Locate the specific category and model or version for your hardware or software product. Use Adobe* Acrobat Reader* to open the manuals and release notes, search for the sections you need, and print them. Most material can be printed on standard printers. Go to Adobe Systems at the URL to download a free copy of the Adobe Acrobat Reader. How to get help If you purchased a service contract for your Nortel Networks product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller for assistance. If you purchased a Nortel Networks service program, contact Nortel Networks Technical Support. To obtain contact information online, go to the URL, then click on Technical Support. From the Technical Support page, you can open a Customer Service Request online or find the telephone number for the nearest Technical Solutions Center. If you are not connected to the Internet, you can call NORTEL ( ) to learn the telephone number for the nearest Technical Solutions Center A Rev 00

29 An Express Routing Code (ERC) is available for many Nortel Networks products and services. When you use an ERC, your call is routed to a technical support person who specializes in supporting that product or service. To locate an ERC for your product or service, go to the erc/index.html URL. 29 Contivity Toolset 2.2

30 A Rev 00

MyShortcut. Administrator's Guide

MyShortcut. Administrator's Guide MyShortcut Administrator's Guide January 2011 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Shasta 5000 Broadband Service Node Provisioning Subscribers

Shasta 5000 Broadband Service Node Provisioning Subscribers Release 4.3 Part No. 214664-B Rev 00 November 2003 2305 Mission College Blvd. Santa Clara, CA 95054 Shasta 5000 Broadband Service Node Provisioning Subscribers 2 Copyright 2003 Nortel Networks All rights

More information

Automated Database Backup. Procedure to create an automated database backup using SQL management tools

Automated Database Backup. Procedure to create an automated database backup using SQL management tools Automated Database Backup Procedure to create an automated database backup using SQL management tools Genetec Technical Support 6/29/2009 Notice This manual, and the software that it describes, is provided

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

Adaptec Event Monitor Utility. User s Guide

Adaptec Event Monitor Utility. User s Guide Adaptec Event Monitor Utility User s Guide 2 Copyright Copyright 2013 PMC-Sierra, Inc. All rights reserved. The information in this document is proprietary and confidential to PMC-Sierra, Inc., and for

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Serverless Backup Option Guide r11.5 D01182-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the

More information

Version 14.5 Inmagic DB/Text for SQL Administrator s Guide [12/09/13]

Version 14.5 Inmagic DB/Text for SQL Administrator s Guide [12/09/13] Version 14.5 Inmagic DB/Text for SQL Administrator s Guide [12/09/13] Copyright 2003 2013 by Inmagic (a subsidiary of SydneyPLUS International Library Systems). All rights reserved. Inmagic, the Inmagic

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Administration Guide SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Copyright 2004 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced,

More information

Converting to the Inmagic DB/Text for SQL Platform

Converting to the Inmagic DB/Text for SQL Platform Converting to the Inmagic DB/Text for SQL Platform Copyright 2007 2011 by Inmagic (a subsidiary of SydneyPLUS International Library Systems). All rights reserved. Inmagic, the Inmagic logo, DB/Text, DB/TextWorks,

More information

Extension Module (XMOD): Batch Order Management (BOM)

Extension Module (XMOD): Batch Order Management (BOM) Extension Module (XMOD): Batch Order Management (BOM) 1999-Present Kryptronic, Inc. All rights reserved worldwide. Kryptronic, the Kryptronic logo and all Kryptronic software names and logos are trademarks

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Bentley CONNECT Dynamic Rights Management Service

Bentley CONNECT Dynamic Rights Management Service v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation Contents System Requirements... 3 Installation... 3 Microsoft SQL Express 2008 R2 Installation... 3 Microsoft.NET Framework 4.0 Installation... 7 InFocus Management Tool Installation... 8 Log In... 10

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Virtual LoadMaster for Microsoft Hyper-V

Virtual LoadMaster for Microsoft Hyper-V Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 VERSION: 1.3 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright

More information

NCD ThinPATH Load Balancing Startup Guide

NCD ThinPATH Load Balancing Startup Guide NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing

More information

IBM Lotus Protector for Mail Encryption

IBM Lotus Protector for Mail Encryption IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.

More information

Installing the IPSecuritas IPSec Client

Installing the IPSecuritas IPSec Client Mac Install Installing the IPSecuritas IPSec Client IPSecuritasMac201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

Upgrade Guide. CA Application Delivery Analysis 10.1

Upgrade Guide. CA Application Delivery Analysis 10.1 Upgrade Guide CA Application Delivery Analysis 10.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Commonwealth of Pennsylvania Software License Requirements Contract # 4400007199 Tab Software

Commonwealth of Pennsylvania Software License Requirements Contract # 4400007199 Tab Software Andrew Baarson MPA Central Sales Manager Public Software Division Dell Software Inc. 850 Asbury Dr Buffalo Grove, IL 60089 tel +1-800-953-2191 fax +1-847-465-3277 andrew_baarson@dell.com www.dell.com https://shop.asap.com/

More information

Mayfair EULA for Journal Office

Mayfair EULA for Journal Office Mayfair EULA for Journal Office 9-April-2014 Page 1 of 9 Mayfair EULA for Journal Office Mayfair Software End User License Agreement Software programs which you received either installed on on the device

More information

Scanner Wedge for Windows Software User Guide

Scanner Wedge for Windows Software User Guide Scanner Wedge for Windows Software User Guide Contents INSTALLING THE SCANNER WEDGE SOFTWARE 2 ACTIVATING THE SCANNER CONNECTION 3 TRACING SCANNER OUTPUT 7 FORMATTING OUTPUT 9 SELECTING START-UP OPTIONS

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server TelePresence Migrating TelePresence Management Suite (TMS) to a New Server THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

etrust Audit Using the Recorder for Check Point FireWall-1 1.5

etrust Audit Using the Recorder for Check Point FireWall-1 1.5 etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

How To Set Up A Thermal Cycler With Veritilink Remote Management Software

How To Set Up A Thermal Cycler With Veritilink Remote Management Software Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

QuickBack. User s Guide

QuickBack. User s Guide QuickBack Data backup, volume cloning and file / folder archiving utility. Features automated scheduling, compression, encryption, CD/DVD burning and can preserve volume backup bootability. Part of the

More information

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc..

More information

NetBak Replicator 4.0 User Manual Version 1.0

NetBak Replicator 4.0 User Manual Version 1.0 NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...

More information

AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1

AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1 AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1 NOTICE TO USER: PLEASE READ THIS DOCUMENT CAREFULLY. THIS IS THE CONTRACT BETWEEN YOU AND

More information

Sun Microsystems, Inc. ("Sun") ENTITLEMENT for SOFTWARE. Licensee/Company: Entity receiving Software.

Sun Microsystems, Inc. (Sun) ENTITLEMENT for SOFTWARE. Licensee/Company: Entity receiving Software. Sun Microsystems, Inc. ("Sun") ENTITLEMENT for SOFTWARE Licensee/Company: Entity receiving Software. Effective Date: Date of delivery of the Software to You. Software: JavaFX 1.2 Software Development Kit

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

CA arcserve Unified Data Protection Agent for Linux

CA arcserve Unified Data Protection Agent for Linux CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

DME-N Network Driver Installation Guide for LS9

DME-N Network Driver Installation Guide for LS9 DME-N Network Driver Installation Guide for LS9 ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

Arcserve Cloud. Arcserve Cloud Getting Started Guide

Arcserve Cloud. Arcserve Cloud Getting Started Guide Arcserve Cloud Arcserve Cloud Getting Started Guide This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Quick Start Guide 82099700

Quick Start Guide 82099700 82099700 Quick Start Guide MultiVOIPManager MultiVOIPManager Quick Start Guide P/N 82099700 Revision A Copyright 2001 by Multi-Tech Systems, Inc. All rights reserved. This publication may not be reproduced,

More information

SUBSCRIPTION SERVICES.

SUBSCRIPTION SERVICES. SUSE Manager Server SUSE Manager Server with Database SUSE Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY PURCHASING, INSTALLING AND/OR USING THE SOFTWARE (INCLUDING ITS COMPONENTS),

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Customer Appointment Manager

Customer Appointment Manager Customer Appointment Manager Getting Started Guide Standard & Pro Editions This page is intentionally blank. ii License Agreement Software License Agreement PLEASE READ THIS DOCUMENT CAREFULLY BEFORE USING

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

HP OpenView Patch Manager Using Radia

HP OpenView Patch Manager Using Radia HP OpenView Patch Manager Using Radia for the Windows and Linux operating systems Software Version: 2.0 Migration Guide February 2005 Legal Notices Warranty Hewlett-Packard makes no warranty of any kind

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

REPAIRING THE "ORACLE VM VIRTUALBOX" VIRTUAL MACHINE PROGRAM

REPAIRING THE ORACLE VM VIRTUALBOX VIRTUAL MACHINE PROGRAM REPAIRING THE "ORACLE VM VIRTUALBOX" VIRTUAL MACHINE PROGRAM Objective: If one or more of the features of the "Oracle VM VirtualBox" program fail, you can usually repair it by starting the installation

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS IMPORTANT: READ THIS CAREFULLY BEFORE INSTALLING, USING OR ELECTRONICALLY

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY

APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY Applied Biosystems StepOne Real-Time PCR System Applied Biosystems

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Database Client/Server

Database Client/Server Part IV Database Client/Server Database Server 1. Run srvadmin.exe (you can add to the Windows Startup folder). Figure IV.1 DBISAM Database Server Icon Figure IV.2 DBISAM Database Server Status E-Mon Energy

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Nimsoft Monitor. dns_response Guide. v1.6 series

Nimsoft Monitor. dns_response Guide. v1.6 series Nimsoft Monitor dns_response Guide v1.6 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

CA NetQoS Performance Center

CA NetQoS Performance Center CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,

More information

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

BMC Remedy Action Request System 7.0 Open Source License Agreements

BMC Remedy Action Request System 7.0 Open Source License Agreements March 2006 BMC Remedy Action Request System 7.0 Open Source License Agreements Copyright 1991 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names, BMC

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,

More information

ios Deployment Simplified FileMaker How To Guide

ios Deployment Simplified FileMaker How To Guide ios Deployment Simplified FileMaker How To Guide Table of Contents FileMaker How To Guide Introduction... 3 Deployment Options... 3 Option 1 Transfer to the ios device... 3 Option 2 - Host with FileMaker

More information

Web Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide

Web Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide for 8614xB-series Optical Spectrum Analyzers Installation Guide Copyright Agilent Technologies Company 2001 All Rights Reserved. Reproduction, adaptation, or translation without prior written permission

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

PN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00

PN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 PN 00651 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 First Edition This documentation was prepared to assist licensed

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

for Windows OS 4 TERMS AND CONDITIONS OF USE... 11 Date Version Note Author 13/05/2015 1 First release A.Cappellozza

for Windows OS 4 TERMS AND CONDITIONS OF USE... 11 Date Version Note Author 13/05/2015 1 First release A.Cappellozza for Windows OS Summary 1 Required software... 1 2 Preparation... 1 2.1 Wizard Installation... 2 2.2 Set your internal network (LAN)... 3 2.3 Access to the server from Internet (WAN)... 6 3 Users creation

More information

CaseWare Audit System. Getting Started Guide. For Audit System 15.0

CaseWare Audit System. Getting Started Guide. For Audit System 15.0 CaseWare Audit System Getting Started Guide For Audit System 15.0 Copyright and Trademark Notice Copyright. 2013 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication, or disclosure

More information