Introduction to Mobile Access Gateway Installation

Size: px
Start display at page:

Download "Introduction to Mobile Access Gateway Installation"

Transcription

1 Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure and effective method for individual applications to access corporate resources. For more information about how you can leverage MAG, architecture and security information, and Admin Console settings to manage the MAG's functionality, please refer to the Mobile Access Gateway Admin Guide. In This Guide Before You Begin Ensure your deployment meets the necessary hardware, sizing, software and firewall requirements before attempting to install the MAG. MAG Installation Preparation Perform some preliminary steps to ensure a smooth installation of the MAG. MAG Installation for a Relay-Endpoint Configuration Run the MAG installer for a relay-endpoint configuration. MAG Installation for a Basic Configuration Run the MAG installer for a basic (endpoint only) configuration. Appendix A SSL Offloading Read more about how to enable SSL Offloading for the MAG. 1

2 Before You Begin This section covers topics and prerequisites you should familiarize yourself with so you can get the most out of using this guide. In This Section Requirements See a list of requirements you must meet before installing the MAG. Recommended Reading See a list of additional guides that contain supplemental information about MAG. Getting Started See additional considerations you should know before you begin. Requirements For a complete listing of all requirements for installing MAG in a SaaS environment, refer to the Prerequisites for MAG Connectivity in SaaS Environments. For a complete listing of all requirements for installing MAG in an on-premise environment, refer to the Prerequisites for MAG Connectivity for On-Premise Environments. Recommended Reading Mobile Access Gateway Admin Guide This guide provides an overview of the MAG and how to enable MAG functionality within the Admin Console. Getting Started Note the following distinction between on-premise and SaaS deployments: o On-premise refers to deployments where your organization hosts all components and servers on its internal networks. o SaaS refers to deployments where certain components, such as the Console and API servers, are hosted in the cloud by. Before continuing with MAG installation, ensure AWCM is configured and operational. If you are an on-premise customer, refer to the AWCM Guide for instructions on how to configure AWCM before installing the MAG. Ensure you have performed all the necessary preliminary steps in MAG Installation Preparation. 2

3 Prerequisites for MAG Connectivity for SaaS Environments Status Checkli st Requirement Notes Hardware Requirements VM or Physical Server (64-bit) 1 CPU Core (2.0+ GHz) 2 GB RAM or higher 5 GB Disk Space Sizing for up to 100,000 Devices Number of Devices CPU Cores 1 Up to 5,000 5,000 to 50,000 50,000 to 100, , or 2 load-balanced w/ 2 CPU Cores 4 or 2 load-balanced w/ 2 CPU Cores 2 load-balanced with 4 CPU Cores RAM (GB) General Requirements Remote access to Windows Servers available to and Administrator rights Installation of Notepad++ (Recommended) Recommended to setup Remote Desktop Connection Manager for multiple server management, installer can be downloaded from Installer can be downloaded from Software Requirements Windows Server 2008 R2 or Windows Server 2012 or Windows Server 2012 R2 Install Role from Server Manager Install Features from Server Manager Install.NET Framework 4.0 Java Runtime Environment 7+ IIS 7.0 (Server 2008 R2) IIS 8.0 (Server 2012 or Server 2012 R2) IIS 8.5 (Server 2012 R2 only).net Framework Features: Entire module (.NET Framework 3.5.1, WCF Activation) Telnet Client Download from Download from https://java.com/en/download/index.jsp 3

4 Status Checkli st Requirement Internally registered DNS Externally registered DNS SSL Certificate from trusted third party with Subject or Subject Alternative name of DNS IIS 443 Binding with the same SSL certificate Ensure the AWCM SSL certificates Intermediate and Root CA certificate are in the Java CA Keystore on the MAG server Notes Register the MAG relay (If Relay-Endpoint) or register the (If Endpoint only) Register the MAG relay (If Relay-Endpoint) or register the (If Endpoint only) Ensure SSL certificate is trusted by all device types being used. (i.e. not all Comodo certificates are natively trusted by Android) Validate that you can connect to the server over (https://yourdomain.com). At this point, you should see the IIS splash page. Use the Command Line Utility on the MAG server to enter the following: keytool -list -v -keystore $JAVA_HOME\jre \lib\security\cacerts OR Use the GUI tool (free) here: Network Requirements Source Component Destination Component Protocol Port Verification Note Devices (from Internet and Wi- Fi) Devices (from Internet and Wi- Fi) MAG HTTP 2010 (for Browser) MAG 2020 (for Browser) Once MAG starts correctly, it should be listening on ports 2010 and 2020 by default. To make sure, you can open browser and check the following: You should see 407 MAG Authentication Failed! https://maghost:2020 You should see an untrusted certificate screen unless there is a trusted SSL certificate and in that case you should see 407 MAG Authentication Failed! 1 1 Devices (from Internet and Wi- Fi) MAG 443 (for Content) Telnet from Internet to MAG server on port 1 MAG Basic-Endpoint Configuration Cloud Messaging Server* 443 Verify by entering https://<awcm URL>: 443/awcm/status in browser and ensure there is 2 4

5 Source Component Destination Component Protocol Port Verification Note no certificate trust error Internal Content Repository 80 or Internal WebServer/App 80 or Internal System Any Any MAG Relay-Endpoint Configuration 6 MAG Relay Cloud Messaging Server 443 Verify by entering https://<awcm URL>:443/awcm/status in browser and ensure there is no certificate trust error 2 MAG Relay HTTP 2010 (for Browser) Telnet from MAG Relay to server on port 3 MAG Relay 443 (for Content) Telnet from MAG Relay to server on port 3 Internal Content Repository 80 or Internal WebServer/App 80 or Internal System Any Any 6 * For SaaS customers, see https://ask.air-watch.com/entries/ what-are-the--ip-ranges-for-saas-datacenters to view an ASK article that provides the most up-to-date IP ranges. 1. For devices attempting to access internal resources. 2. For the MAG to query the Admin Console for compliance and tracking purposes. 3. For MAG Relay topologies to forward device requests to the internal MAG endpoint only. 4. For devices with the Secure Content Locker to access internal content. 5. For devices with the Secure Browser to access internal websites/web applications. 6. For devices with app tunnel; enables applications to communicate with internal systems. Note: If a firewall resides between the and an internal system you are trying to reach, then you will have to open the corresponding port depending on the traffic. For example, Windows Network Files Shares require ports 135 through 139 and 445 to be open in order to access content on Windows fileshares. 5

6 Prerequisites for MAG Connectivity for On-Premise Environments Status Checkli st Requirement Notes Hardware Requirements VM or Physical Server (64-bit) 1 CPU Core (2.0+ GHz) 2 GB RAM or higher 5 GB Disk Space Note: The requirements listed here support basic data query. You may require additional server space if your use case involves the transmission of large encrypted files from a content repository. Sizing for up to 100,000 Devices Number of Devices Up to 5,000 5,000 to 50,000 50,000 to 100, ,000+ CPU Cores 1 4 or 2 load-balanced w/ 2 CPU Cores 4 or 2 loadbalanced w/ 2 CPU Cores 2 load-balanced with 4 CPU Cores RAM (GB) General Requirements Remote access to Windows Servers available to and Administrator rights Installation of Notepad++ (Recommended) Recommended to setup Remote Desktop Connection Manager for multiple server management; you can download the installer from: You can download the installer from: Software Requirements Windows Server 2008 R2 or Windows Server 2012 or Windows Server 2012 R2 Install Role from Server Manager Install Features from Server Manager IIS 7.0 (Server 2008 R2) IIS 8.0 (Server 2012 or Server 2012 R2) IIS 8.5 (Server 2012 R2 only).net Framework Features: Entire module (.NET Framework 3.5.1, WCF Activation) 6

7 Status Checkli st Requirement Install.NET Framework 4.0 Java Runtime Environment 7+ Internally registered DNS Externally registered DNS SSL Certificate from trusted third party with Subject or Subject Alternative name of DNS IIS 443 Binding with the same SSL certificate Ensure the AWCM SSL certificates Intermediate and Root CA certificate are in the Java CA Keystore on the MAG server Notes Telnet Client Download from Download from https://java.com/en/download/index.jsp Register the MAG relay (If Relay-Endpoint) or register the (If Endpoint only) Register the MAG relay (If Relay-Endpoint) or register the (If Endpoint only) Ensure SSL certificate is trusted by all device types being used. (i.e. not all Comodo certificates are natively trusted by Android) Validate that you can connect to the server over (https://yourdomain.com). At this point, you should see the IIS splash page. Use the Command Line Utility on the MAG server to enter the following: keytool -list -v -keystore $JAVA_HOME\jre \lib\security\cacerts OR Use the GUI tool (free) here: Network Requirements Source Component Destination Component Protocol Port Verification Note Devices (from Internet and Wi- Fi) MAG HTTP 2010 (for Browser) Once MAG starts correctly, it should be listening on ports 2010 and 2020 by default. To make sure, you can open browser and check the following: 1 Devices (from Internet and Wi- Fi) MAG 2020 (for Browser) You should see 407 MAG Authentication Failed! https://maghost:2020 You should see an untrusted certificate screen unless there is a trusted SSL certificate and in that case you should see 407 MAG Authentication Failed! 1 Devices (from Internet and Wi- MAG 443 (for Content) Telnet from Internet to MAG server on port 1 7

8 Source Component Destination Component Protocol Port Verification Note Fi) MAG Basic-Endpoint Configuration Cloud Messaging Server* 2001 or a port you configure Verify by entering https://<awcm URL>: <port>/awcm/status in browser and ensure there is no certificate trust error 2 MAG Endpoint REST API (DS or CN server) 80 or 443 Verify by entering https://apiserverurl/api/help in browser and ensure there is no certificate trust error (cannot be a self-signed certificate). If you are prompted for credentials, enter Airwatch admin credentials 7 Internal Content Repository 80 or Internal WebServer/App 80 or Internal System Any Any MAG Relay-Endpoint Configuration 6 MAG Relay Cloud Messaging Server 2001 or a port you configure Verify by entering https://<awcm URL>:<port>/awcm/status in browser and ensure there is no certificate trust error 2 MAG Relay REST API (DS or CN server) 80 or 443 Verify by entering https://apiserverurl/api/help in browser and ensure there is no certificate trust error (cannot be a self-signed certificate). If you are prompted for credentials, enter Airwatch admin credentials 7 MAG Relay HTTP 2010 (for Browser) Telnet from MAG Relay to server on port 3 MAG Relay 443 (for Content) Telnet from MAG Relay to server on port 3 Internal Content Repository 80 or Internal WebServer/App 80 or Internal System Any Any 6 8

9 Source Component Destination Component Protocol Port Verification Note Device Services MAG (relay) 80 or Console MAG (relay) 80 or For devices attempting to access internal resources. 2. For the MAG to query the Admin Console for compliance and tracking purposes. 3. For devices with the Secure Content Locker to access internal content from websites, such as SharePoint. 4. For devices with the Browser to access internal websites/web applications. 5. For devices with app tunnel; enables applications to communicate with internal systems. Note: If a firewall resides between the and an internal system you are trying to reach, then you will have to open the corresponding port depending on the traffic. For example, Windows Network Files Shares require ports 135 through 139 and 445 to be open in order to access content on Windows file shares. 6. For MAG Relay topologies to forward device requests to the internal MAG endpoint only. 7. The MAG needs to communicate with the API for initialization. The API server is generally hosted on the Admin Console Server or can be a separate server. Ensure there is connectivity between this server and the MAG server. 8. For the Device Services server to enumerate the repositories via the content relay and convert them into a format devices can use. 9. For the Console server to enumerate the repositories via the content relay for viewing in the Admin Console. 9

10 MAG Installation Preparation Overview Before installing the MAG within your network, you must ensure your environment meets all the Mobile Access Gateway Requirements, and then prepare for installation by downloading the MAG installation files. Notes: Steps 1 and 2 are applicable for on-premise customers only. If you are a SaaS customer, begin the installer download process with step 4. Before you begin installing MAG, ensure that AWCM is installed correctly, running, and communicating with without any errors. For more information about configuring AWCM refer to the AWCM Guide. recommends you do not configure MAG at the Global organization group level. Performing Preliminary Installation Steps Prepare for the installation by performing the following steps. 1. Navigate to Groups & Settings All Settings System Advanced Site URLs in the Admin Console. 2. Ensure the URLs highlighted above are correct: REST API URL Should be in the format "https://<url>/api". AWCM Server External URL Should be in the format "server.acme.com" and not include a protocol such as https. AWCM Service Internal URL Should be in the format "https://server.acme.com". 3. Select Save. 4. Navigate to Groups & Settings All Settings System Advanced Device Root Certificate and verify the device root certificate exists. If it does not exist, click the Override radio button and generate the root device certificate. 10

11 5. Navigate to Groups & Settings All Settings System Advanced API REST API and click the Override radio button. 6. Ensure the Enable API Access check box is selected and an API Key is displayed in the field highlighted above. 7. Click Save. 8. Navigate to Groups & Settings All Settings System Enterprise Integration Mobile Access Gateway. If this is your first time configuring MAG, then select Configure and follow the configuration wizard screens. Otherwise, select the Override radio button, ensure the Enable Mobile Access Gateway check box is selected, and then select Configure to configure the following settings. In either case, select Configure MAG for Windows. Note: The MAG for Linux option available here is intended for the App Tunnel mobile app that is not yet released. Please check back when the app is available for instructions on configuring it to provide Per App VPN for your ios 7 and higher devices. a. Select either Basic or Relay-Endpoint as your Configuration Type. Select Next. b. Enter the following information: Host Name The name given to the server where the MAG will be installed. If you plan to install the MAG on an SSL offloaded server, enter the name of that server in place of the Host Name. Note: When entering the Host Name, do not include protocol (http://, https://, etc.). Default HTTP Port The port number automatically assigned for HTTP communication with the MAG. 11

12 Default Port The port number automatically assigned for communication with the MAG. Note: For example, if you are utilizing both port 2010 and 2020 (HTTP Tunneling) then enter a port value for both fields. If you are utilizing only one port either 2010 or 2020 ( Tunneling) then enter '0' for Default HTTP Port and either 2010 or 2020 for Default Port. Refer to the HTTP and Tunneling section of the Mobile Access Gateway Admin Guide for more information. Content Repository URL The URL used to access the MAG Content Repository Relay from the Internet. Typically the same as the hostname field but with an HTTP/ protocol. For example: ://magrelay.acme.com. Ignore SSL Errors Select to ignore SSL errors that occur during communication between the Admin Console and the content repository. c. If using a Relay-Endpoint setup, enter the Endpoint Details as follows: Host Name Enter the FQDN (absolute domain name) of the MAG endpoint. Relay-Endpoint Port This is the port used for traffic between the MAG relay and MAG endpoint. Note that you should not use port 80, because IIS, which is required for MAG installation, will already be bound to port 80. Content Repository URL The URL used to access the MAG Content Repository Endpoint from the Internet. Typically the same as the hostname field but with an HTTP/ protocol. For example: ://magendpoint.acme.com. Username and Password Enter a Username and Password to create a basic user account for MAG authentication between the MAG relay and endpoint using credentials of your choosing. There is no need to use existing credentials, but you should document the values you enter. d. Select Next. 9. Select the Use Public SSL Certificate check box if you are using third party public SSL certificates for authentication between applications and the MAG. Select Upload to browse for and upload your certificate file (.pfx or.p12). This file must contain both your public and private key pair. Select Next. 10. Review the summary of your MAG configuration and select Save. 11. Select the Advanced tab and then select Generate Certificates to enable MAG Authentication. If you plan to install the MAG on an SSL offloaded server, click Export MAG Certificate from the Admin Console once the certificate has been generated. Then, import the certificate on the server performing SSL offload. (This server can be a load balancer or reverse proxy.) 12

13 12. Select the General tab and then select the Download Mobile Access Gateway Installer hyperlink. 13. Enter and confirm a certificate password and then click Download. Note: The MAG password must contain a minimum of six characters. 14. Click Save. Note: If you make any changes on this configuration screen after you have downloaded the MAG installer and installed the MAG, then you will need to select Save again, uninstall the MAG, delete all MAG folders, re-download the MAG installer and re-install the MAG. Note: At this time you can configure additional advanced settings, which are documented in the Mobile Access Gateway Admin Guide in the Configuring MAG System Settings section. 13

14 MAG Installation for a Relay-Endpoint Configuration Overview Perform the following steps to install the MAG for a Relay-Endpoint configuration, which you can view below. Verify the presence of IIS and install Java on the MAG server as needed, as noted in the Requirements section. Note: Before you begin, ensure the server you are installing MAG on can reach AWCM by browsing to "https://{url}:<port>/awcm/status", where <port> is the configurable external port for AWCM. You should see the status of the AWCM with no SSL errors. If there are errors, resolve them before continuing or the MAG will not properly function. Example of a Relay-Endpoint Configuration For more information about the supported MAG configurations and deployment models, refer to the Mobile Access Gateway Admin Guide. Installing the MAG The process below walks you through installing the MAG on the Relay server first. Immediately afterward, follow the instructions for installing the MAG on the Endpoint server as well. Relay Server 1. Open the installer executable on the Relay MAG server and then click Next. For Relay-Endpoint configurations, you must perform MAG installation on both the Relay and Endpoint servers. The steps below assume you are first installing it on the Relay server. Note: If a previous version of MAG is installed, the installer auto-detects it and offers the option to upgrade to the latest version. 2. Accept the End User License Agreement and then click Next. 14

15 3. Specify the destination for the downloaded MAG installation files and then click Next. 4. Select the Relay button to first install MAG on the Relay server. 15

16 5. Select Is this server SSL Offloaded? if you are setting up a reverse proxy configuration with SSL Offloading. For more information see the Appendix B SSL Offloading section. 6. Select Next. 7. Enter the Certificate Password you created in the Admin Console and then click Next. 8. Select the Target Site in which the application should be installed using the drop-down menu and then click Next. 16

17 If Windows Firewall is turned on, you may receive the following dialog indicating that certain profiles are enabled. In this case, please ensure the necessary MAG ports which include both the ones you configured in the Admin Console and the default IIS website port you are using to access content are allowed in the Windows Firewall settings. 9. Click Install to begin MAG installation on the server. 17

18 10. Click Finish to close the MAG installer. Review the activity found in the.log file created by the MAG installer to verify successful MAG installation. The file can be found in the same destination folder where the installer executable was initially downloaded. Next, you will install the MAG on the Endpoint server. Endpoint Server 1. Open the installer executable on the Endpoint MAG server and then click Next. Note: If a previous version of MAG is installed, the installer auto-detects it and offers the option to upgrade to the latest version. 2. Accept the End User License Agreement and then click Next. 3. Specify the destination for the downloaded MAG installation files and then click Next. 18

19 4. Select the Endpoint button to install MAG on the Endpoint server. 5. Select the check box to indicate if MAG will use an outbound proxy. If so, enter the address of the Proxy Host and Proxy Port number to be used for communication. If the proxy requires authentication, first select the Does the proxy require authentication credentials? checkbox, then select whether it uses Basic or NTLM authentication, then specify the Username and Password credentials. 6. Specify whether you are using Proxy auto-configuration (PAC) files as part of your MAG installation. A PAC file is a set of rules that a browser checks to determine where traffic gets routed. For MAG, traffic is checked against the PAC file to determine if it has to go through an outbound proxy. If you have authentication for PAC files, then the MAG must know username and password of the proxy. You can reference a PAC file on a remote server by providing the PAC URL or Upload a PAC file directly. When you are finished, click Next. 19

20 7. Enter the Certificate Password you created in the Admin Console and then click Next. 8. Select the Target Site in which the application should be installed using the drop-down menu and then click Next. 20

21 If Windows Firewall is turned on, you may receive the following dialog indicating that certain profiles are enabled. In this case, please ensure the necessary MAG ports which include both the ones you configured in the Admin Console and the default IIS website port you are using to access content are allowed in the Windows Firewall settings. 9. Click Install to begin MAG installation on the server. 21

22 10. Click Finish to close the MAG installer. Review the activity found in the.log file created by the MAG installer to verify successful MAG installation. The file can be found in the same destination folder where the installer executable was initially downloaded. 22

23 MAG Installation for a Basic (Endpoint only) Configuration Overview Perform the following steps to install the MAG for a Basic configuration, which you can view below. Verify the presence of IIS and install Java on the MAG server as needed, as noted in the Requirements section. Note: Before you begin, ensure the server you are installing MAG on can reach AWCM by browsing to "https://{url}:<port>/awcm/status", where <port> is the configurable external port for AWCM. You should see the status of the AWCM with no SSL errors. If there are errors, resolve them before continuing or the MAG will not properly function. Example of a Basic Configuration For more information about the supported MAG configurations and deployment models, refer to the Mobile Access Gateway Admin Guide. Installing MAG for Basic (Endpoint only) Configurations 1. Open the installer executable on the Endpoint MAG server and then click Next. Note: If a previous version of MAG is installed, the installer auto-detects it and offers the option to upgrade to the latest version. 2. Accept the End User License Agreement and then click Next. 23

24 3. Specify the destination for the downloaded MAG installation files and then click Next. 4. Select the check box to indicate if MAG will use an outbound proxy. If so, enter the address of the Proxy Host and Proxy Port number to be used for communication. If the proxy requires authentication, first select the Does the proxy require authentication credentials? checkbox, then select whether it uses Basic or NTLM authentication, then specify the Username and Password credentials. 24

25 5. Specify whether you are using Proxy auto-configuration (PAC) files as part of your MAG installation. A PAC file is a set of rules that a browser checks to determine where traffic gets routed. For MAG, traffic is checked against the PAC file to determine if it has to go through an outbound proxy. If you have authentication for PAC files, then the MAG must know username and password of the proxy. You can reference a PAC file on a remote server by providing the PAC URL or Upload a PAC file directly. When you are finished, click Next. 6. Enter the Certificate Password you created in the Admin Console and then click Next. 25

26 7. Select the Target Site in which the application should be installed using the drop-down menu and then click Next. If Windows Firewall is turned on, you may receive the following dialog indicating that certain profiles are enabled. In this case, please ensure the necessary MAG ports which include both the ones you configured in the Admin Console and the default IIS website port you are using to access content are allowed in the Windows Firewall settings. 26

27 8. Click Install to begin MAG installation on the server. 9. Click Finish to close the MAG installer. Review the activity found in the.log file created by the MAG installer to verify successful MAG installation. The file can be found in the same destination folder where the installer executable was initially downloaded. 27

28 Appendix A SSL Offloading Overview When accessing HTTP endpoints over the MAG using HTTP Tunneling, all HTTP traffic is encrypted and authenticated using an SSL certificate and sent over port 2020 as. You can perform SSL Offloading with products such as F5's BIG-IP Local Traffic Manager (LTM), or Microsoft's Unified Access Gateway (UAG), Threat Management Gateway (TMG) or Internet Security and Acceleration Server (ISA) solutions. The following diagram illustrates how SSL Offloading affects MAG traffic in a Relay-Endpoint configuration. Note: Using the MAG to access internal content supports both SSL offloading and also proxying traffic. Using the MAG to perform app tunneling supports SSL Offloading only. SSL Offloading Traffic Flow 1. A device requests access to content or resources, which can be either an endpoint. Requests to HTTP endpoints are sent over port 2020 and encrypted and authenticated with an SSL certificate. Requests to endpoints are sent over port 2010 and encrypted and authenticated with a third party SSL certificate. 2. The traffic hits an SSL Termination Proxy, which must contain the certificate exported from the Admin Console or your organization's own public certificate. Requests to HTTP endpoints over port 2020 have their SSL certificate offloaded and sent to the MAG relay unencrypted over port Requests to endpoints over port 2010 are unaffected and continue to the MAG relay on that port. Note: Since all traffic is now sent over port 2010, you must create a rule on your SSL Termination Proxy to forward all traffic on port The traffic continues from the MAG Relay to the on a port you configure. 4. The communicates with your backend systems to access the requested content or resources. 28

29 Enabling SSL Offloading To enable SSL Offloading, ensure the SSL Offloading check box is selected in the MAG installation for the MAG Relay server. This informs the MAG Relay to expect to receive all traffic on port

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Introduction to the AirWatch Cloud Connector (ACC) Guide

Introduction to the AirWatch Cloud Connector (ACC) Guide Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document

More information

Introduction to the Secure Email Gateway (SEG)

Introduction to the Secure Email Gateway (SEG) Introduction to the Secure Email Gateway (SEG) Overview The Secure Email Gateway (SEG) Proxy server is a separate server installed in-line with your existing email server to proxy all email traffic going

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration

F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Scenarios for Setting Up SSL Certificates for View

Scenarios for Setting Up SSL Certificates for View Scenarios for Setting Up SSL Certificates for View VMware Horizon 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication

More information

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG)

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG) How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG) Introduction Understanding Forefront Threat Management Gateway (TMG) Network Topology Understanding Forefront Threat Management

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Deploying F5 to Replace Microsoft TMG or ISA Server

Deploying F5 to Replace Microsoft TMG or ISA Server Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE

Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE A comprehensive excerpt from Jeff Schertz s Lync Server MVP Blog Lync Web Services Load Balancing with KEMP VLM This article addresses a standard DNS Load Balanced

More information

Citrix Receiver for Mobile Devices Troubleshooting Guide

Citrix Receiver for Mobile Devices Troubleshooting Guide Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

App Orchestration 2.5

App Orchestration 2.5 Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Implementing PCoIP Proxy as a Security Server/Access Point Alternative Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet

More information

How to Logon with Domain Credentials to a Server in a Workgroup

How to Logon with Domain Credentials to a Server in a Workgroup How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos johan@accessdenied.be Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

insync Installation Guide

insync Installation Guide insync Installation Guide 5.2 Private Cloud Druva Software June 21, 13 Copyright 2007-2013 Druva Inc. All Rights Reserved. Table of Contents Deploying insync Private Cloud... 4 Installing insync Private

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Citrix StoreFront 2.0

Citrix StoreFront 2.0 White Paper Citrix StoreFront 2.0 Citrix StoreFront 2.0 Proof of Concept Implementation Guide www.citrix.com Contents Contents... 2 Introduction... 3 Architecture... 4 Installation and Configuration...

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

Introduction to the AirWatch Browser Guide

Introduction to the AirWatch Browser Guide Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser

More information

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. 1 Copyright Acronis International GmbH, 2002-2016 Copyright Statement Copyright Acronis International GmbH, 2002-2016. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Mobility Manager 9.0. Installation Guide

Mobility Manager 9.0. Installation Guide Mobility Manager 9.0 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Installing Oracle 12c Enterprise on Windows 7 64-Bit

Installing Oracle 12c Enterprise on Windows 7 64-Bit JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

PrinterOn Print Delivery Station Admin Guide

PrinterOn Print Delivery Station Admin Guide PrinterOn Print Delivery Station Admin Guide Version 2.6 Doc Rev 2.6EH Table of Contents 1. Print Delivery Station (PDS) Overview...4 1.1. Print Delivery Hub...4 1.2. Print Delivery Station...4 1.2.1.

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

BlackBerry Enterprise Service 10. Version: 10.2. Installation Guide

BlackBerry Enterprise Service 10. Version: 10.2. Installation Guide BlackBerry Enterprise Service 10 Version: 10.2 Installation Guide Published: 2015-08-17 SWD-20150817115607897 Contents 1 About this guide...5 2 What is BlackBerry Enterprise Service 10?... 6 Key features

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1

More information

AvePoint Meetings 3.2.2 for SharePoint On-Premises. Installation and Configuration Guide

AvePoint Meetings 3.2.2 for SharePoint On-Premises. Installation and Configuration Guide AvePoint Meetings 3.2.2 for SharePoint On-Premises Installation and Configuration Guide Issued August 2015 Table of Contents About AvePoint Meetings for SharePoint... 4 System Requirements... 5 2 System

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

Syncplicity On-Premise Storage Connector

Syncplicity On-Premise Storage Connector Syncplicity On-Premise Storage Connector Implementation Guide Abstract This document explains how to install and configure the Syncplicity On-Premise Storage Connector. In addition, it also describes how

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Rsync-enabled NAS Hardware Compatibility List

Rsync-enabled NAS Hardware Compatibility List WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

GlobalProtect Configuration for IPsec Client on Apple ios Devices

GlobalProtect Configuration for IPsec Client on Apple ios Devices GlobalProtect Configuration for IPsec Client on Apple ios Devices Tech Note PAN-OS 4.1 Revision D 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com CONTENTS OVERVIEW... 3 PREREQUISITES... 3 GLOBALPROTECT

More information

vrealize Air Compliance OVA Installation and Deployment Guide

vrealize Air Compliance OVA Installation and Deployment Guide vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the

More information

Getting Started Guide

Getting Started Guide BlackBerry Web Services For Microsoft.NET developers Version: 10.2 Getting Started Guide Published: 2013-12-02 SWD-20131202165812789 Contents 1 Overview: BlackBerry Enterprise Service 10... 5 2 Overview:

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

CHAPTER 7 SSL CONFIGURATION AND TESTING

CHAPTER 7 SSL CONFIGURATION AND TESTING CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information