DNS and Network Configuration Version 8.0
|
|
- Brent Blair
- 8 years ago
- Views:
Transcription
1 Version 8.0 Symantec, Incorporated. Page 1 of 37
2 1 Legal Notices Copyrights Symantec IM Manager and related modules. Copyright by Symantec, Incorporated. All rights reserved. This manual and the application program associated with it is provided under a software licensing agreement from Symantec, Incorporated ( Symantec ) and may only be used, copied and distributed under the terms of that agreement. The information contained herein is for informational use only; it is subject to change without notice and does not represent a commitment by Symantec for any specific application or use of the software (express or implied). Unless specified in the software licensing agreement, this manual (in whole or in part) may not be reproduced or transmitted in any form or by any means, electronic, mechanical, recording or otherwise without the express written permission of Symantec, Incorporated. This software and documentation are commercial products developed exclusively at private expense. The rights of the Government, including Department of Defense Agencies, to use, duplicate and disclose are limited to those set forth in the License Agreement. This product includes software developed by the Apache Software Foundation ( This project includes software licensed under the OpenLDAP license version 2.8. Portions Copyright sysfire LLC Portions Copyright 1999,2000 Boris Fomitchev Cookies.js - Copyright JavaScript & DHTML Cookbook by Dan Goodman, Published by O Reilly & Associates ISBN: Warranty Symantec warrants the software according to the terms in the software license agreement. Symantec assumes no responsibility or liability for any errors or omissions that may exist in this manual. Trademarks AOL and AOL Instant Messenger are trademarks or registered trademarks of America Online, Incorporated. IBM,Lotus, and Sametime are registered trademarks of the IBM Corporation. McAfee, McAfee Security, Sniffer Technologies, and Magic Solutions are trademarks or registered trademarks of Network Associates, Inc. Symantec is a trademark of Symantec Corporation. Microsoft Windows and Active Directory are trademarks or registered trademarks of Microsoft Corporation. MSN and MSN Messenger are registered trademarks of Microsoft Corporation. Netscape and Netscape Navigator are registered trademarks of America Online, Incorporated. Reuters is a registered trademark of the Reuters Group of companies worldwide. Yahoo!, Yahoo! Messenger, and Yahoo! Messenger Enterprise Edition are registered trademarks of Yahoo!, Incorporated. Jabber XCP, Jabber Messenger are registered trademarks of Jabber Incorporated. OpenLDAP is a registered trademark of the OpenLDAP Foundation. Other brand and product names are trademarks or registered trademarks of their respective owners. Symantec, Incorporated. Page 2 of 37
3 Legal Disclaimers The use of software under the OpenLDAP Public License is provided under the following conditions: The OpenLDAP Public License Version 2.8, 17 August 2003 Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following conditions are met: 1. Redistributions in source form must retain copyright statements and notices, 2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution, and 3. Redistributions must contain a verbatim copy of this document. The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version number. You may use this Software under terms of this license revision or under the terms of any subsequent revision of the license. THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at all times remain with copyright holders. OpenLDAP is a registered trademark of the OpenLDAP Foundation. Copyright The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and distribute verbatim copies of this document is granted. Document Version Symantec, Incorporated. Page 3 of 37
4 Table of Contents 1 Legal Notices Introduction IM Control Configuration Strategies Overview DNS Rerouting Configuration Overview Rerouting DNS Addresses DNS for IM over HTTP Firewall Configuration Connecting to Public IM IM Manager in a DMZ Blocking HTTP IM Access Blocking ICQ Chat Room Access...15 Appendix A: Configuring DNS on the IM Manager Server...16 Appendix B: Configuring DNS Redirection in Windows Creating a Zone in Windows Assign Hosts to Zone in Windows Appendix C: Configuring DNS Redirection in Windows Creating a Zone in Windows Assign Hosts to Zone in Windows Balance IM Manager Relay Loading in Windows Error! Bookmark not defined. Appendix D: Configuring DNS Redirection in Windows NT Configuring DNS Redirection in Windows NT Creating a Zone in Windows NT Creating a New Record Host in Windows NT Appendix E: Configuring DNS Redirection in UNIX BIND...34 Symantec, Incorporated. Page 4 of 37
5 2 Introduction Welcome again to the Symantec IM Manager (IM Manager). IM Manager is a comprehensive Instant Messaging (IM) archiving, review, and audit solution. This guide provides information on how to configure your enterprise s network and Distributed Name Server (DNS) to complement IM Manager features and provide better control over user access to public IM networks. Enterprise IM typically does not require any DNS or networking changes; IM Manager takes advantage of existing IM infrastructure. If you have questions after reading this guide, please visit the Symantec Support Website at Intended Audience This document is intended for use by IT Administrators who are using IM Manager. At a minimum, IM Manager Administrators must have advanced knowledge of Internet and IM protocols and technology, as well as local area networks. Related Documents Symantec provides electronic versions of this and related documents in PDF format located in the Documents folder of the Symantec installation directory (located by default at \Program Files\Symantec\Documents). Symantec, Incorporated. Page 5 of 37
6 3 IM Control Configuration Strategies Overview Your IM control strategy consists of two elements: Clients must connect to IM Manager, and not directly to the internet. This can be done through DNS redirection or by modification of individual IM clients and workstations. DNS redirection is covered in detail in the DNS Rerouting Configuration section of this document. The corporate network should block any IM connections that don t go through IM Manager. The section titled Firewall Configuration goes into detail about the ports that are important for Public IM and IM Manager. Section 5 covers the specific steps necessary to block IM over HTTP (port 80). The specific configuration strategy that you choose depends on your goals. For IM Manager to capture IM traffic, IM clients must connect to the IM Manager server. Clients that connect directly to the Internet without passing through the IM Manager server are not controlled. For this reason, it is important that your environment limit the ability of clients to connect to the Internet directly. The most secure environment is one where the user s desktop is blocked by the corporate firewall from making any direct external connections. End users are permitted to connect to the Internet only through IM Manager and a web proxy. Symantec, Incorporated. Page 6 of 37
7 4 DNS Rerouting Configuration 4.1 Overview Each of the Public IM clients depends on a DNS query to make a connection to the IM network. You can configure your company s DNS to reply with the IP address of the IM Manager server, rather than an address on the Internet. By controlling your DNS, you cause the IM clients to connect to IM Manager rather than to the Internet. Important: IM Manager needs to be able to find the true Internet IP addresses of the Public IM networks. That means that IM Manager can not use the same DNS server as the end users. Additionally, some IM Manager features require successful DNS lookups of your internal corporate servers; that means that IM Manager should not use your ISP s external DNS servers. The common solution is to install a separate DNS service on the IM Manager server for the IM Manager s use. The steps to do this are detailed in Appendix A: Configuring DNS on the IM Manager Server. 4.2 Rerouting DNS Addresses The first stage in configuring DNS redirection is to implement the DNS zones on an internal dedicated DNS server. All the zones point IM Client connections to the IM Manager Relay server. In order to reroute public IM network addresses from your DNS server to the IM Manager Relay server, each zone file should include the domain names for each IM network service provider your enterprise supports. NOTE: ICQ support requires that a separate IP address be configured on the relay. Please read the Installation Guide s section titled Configuring ICQ Support for more information. NOTE: Each individual IM network service provider maintains and controls its own DNS Hostnames. Therefore, they are subject to change with minimal notice. Symantec makes every attempt to maintain current IM network addressing information in its documentation and Support Web Portal and strives to inform customers proactively of changes, usually before the change goes live. The appendices provide DNS configuration procedures for the following four operating systems: Windows (2003) DNS Windows (2000) DNS Windows NT4 (WINS) UNIX (BIND) Table 1 lists the domain names for the most popular Public IM Services (as they existed on the date this document was published): Symantec, Incorporated. Page 7 of 37
8 Table 1: Public IM Network Domains Service Provider Domain Name AOL Instant Messenger login.oscar.aol.com toc.oscar.aol.com ats.byoa.aol.com Yahoo! Messenger relay.msg.yahoo.com scs.msg.yahoo.com scsa.msg.yahoo.com scsb.msg.yahoo.com scsc.msg.yahoo.com MSN Messenger messenger.hotmail.com Googletalk talk.google.com talkx.l.google.com ICQ login.icq.com NOTE: login.icq.com should point to the IP address dedicated to ICQ. Please read the Installation Guide s section titled Configuring ICQ Support for more information. 4.3 DNS for IM over HTTP IM Manager can be deployed to control IM communication in two modes: Native Protocol Mode: When you deploy IM Manager in native protocol mode, the IM client application typically uses its native protocol mode and one of the following approaches to log into the IM service provider s network (shown with solid lines in Figure 1: Client IM Logon Controls (Native and HTTP Mode)). This option allows for zero-client configuration, that is, desktop IM clients need not be changed in any way. HTTP Protocol Mode: When you deploy IM Manager in HTTP protocol mode, all IM traffic must go through the IM Manager Replay server (in HTTP mode), then to the Web Proxy, and finally to the Internet and the IM service provider s network Symantec, Incorporated. Page 8 of 37
9 (shown with dotted lines in Figure 1: Client IM Logon Controls (Native and HTTP Mode)). This option requires both client configuration and Web Proxy Hostname filtering. The decision on which IM Manager configuration strategy to choose depends on your enterprise s network configuration and security requirements. This decision to deprecate functionality should be made only if your policies require you to. In response to each approach, IM Manager Administrators must do the corresponding task described in Table 2: Public IM Network Hostnames to ensure that all IM traffic passes through the IM Manager Relay server: Table 2: IM Client Login Approaches IM Client Application s Login Approach IM client application uses Native Protocol mode to connect directly to the IM network login server using a hostname or the last successfully used IP address and port. IM Manager Administrator s Task Create forward DNS zones for each of the Public IM domains listed in Table 1 and point these zones to the IM Manager Relay server. This prevents IM clients from directly connecting to the IM Service s login server without first passing through the IM Relay server (shown with the solid line in Figure 1: Client IM Logon Controls (Native and HTTP Mode) Configure the IM Manager Relay server to use a different DNS server, as described in Appendix A: Configuring DNS on the IM Manager Server. This prevents a situation where the IM Relay server resolves DNS entries to itself. IM client application is configured in HTTP Protocol mode and points to the IM Manager Relay server (with a Web Proxy). Create forward DNS zones to a non-existent IP Address (such as ) for each of the Public IM Network Domains listed in Table 2: Public IM Network Hostnames. This essentially blocks HTTP access for IM client communications on Port 80 so that they can not bypass the IM Manager Relay server (shown with the solid line in Figure 1: Client IM Logon Controls (Native and HTTP Mode)). Filter IM Service Hostnames on the Web Proxy server. Prevents IM clients from failing over to HTTP mode and using the Web Proxy to connect to the IM Service s login server except when initiated by the IM Manager Relay server (shown with the dotted line in Figure 1: Client IM Logon Controls (Native and HTTP Mode)). To support HTTP access for IM clients, all client IM applications must change their connection settings to point to the IM Manager Relay server in HTTP protocol mode. (shown with the solid line in Figure 1: Client IM Logon Controls (Native and HTTP Mode)). Symantec, Incorporated. Page 9 of 37
10 Figure 1: Client IM Logon Controls (Native and HTTP Mode) shows the typical network configurations for the various DNS Reconfigurations described in Table 2: Public IM Network Hostnames IM Network Login Servers Internet Firewall Intranet IM Manager Relay Web Proxy Internal DNS Server AOL Instant Messenger MSN Messenger Yahoo! Messenger Clients Figure 1: Client IM Logon Controls (Native and HTTP Mode) Symantec, Incorporated. Page 10 of 37
11 5 Firewall Configuration To ensure that native protocol IM traffic only goes through the IM Manager Relay server, it is necessary, at a minimum, to block the ports that the Public IM Service Provider networks use. Blocking the specified ports is usually sufficient to force all standard clients through the IM Manager relay. If additional security is required, the firewall should be configured to prevent any communication (inbound or outbound) with the IM clients on other ports as well. 5.1 Connecting to Public IM Table 4 provides a list of ports used by the Public IM Service networks. These ports must be blocked for all communication except from the IM Manager Relay server. The IM Manager server must be able to initiate outbound connections on these ports. Table 1 Public IM Network Ports Service Provider Port (TCP) AOL Instant Messenger 5190 Yahoo! Messenger 5050 MSN Messenger 1863 Googletalk 5222 ICQ 5190 NOTE: The MSN client s authentication requires an SSL connection over port 443 directly from the end user to MSN (loginnet.passport.com or login.passport.com). 5.2 IM Manager in a DMZ Symantec, Incorporated. Page 11 of 37
12 You may choose to put the IM Manager Relay service in your DMZ. This diagram describes the ports required for the various clients connecting to IM Manger. It also illustrates required ports for the components of IM Manager. Connection Description Direction Initiated Ports 1 ODBC connection for Administrator Web Interface From web server to database Standard SQL ports 2 Client messaging connections with IM Manager From client to IM Manager relay AIM: 5190, 5191, 5192, 5290, 5291, 5292 MSN: 1863, 1864 Yahoo: 5050 ICQ: 5190 Googletalk: 5222 SOCKS: 1080 Client file transfer connections with IM Manager From client to IM Manager relay AIM: 5193, 5194 MSN: 1863 Yahoo: 80 Client file transfer connections with IM Manager (AIM only) From IM Manager relay to client AIM: ODBC connection for IM Manager relay service From IM Manager relay to database Standard SQL ports 4 IM Manager messaging connections with Internet From IM Manager relay to Internet AIM: 5190 MSN: 1863 Yahoo: 5050 ICQ: 5190 Googletalk: 5222 IM Manager file transfer connections with Internet From IM Manager relay to Internet AIM: 5190 MSN: 1863 Yahoo: 80 Symantec, Incorporated. Page 12 of 37
13 Connection Description Direction Initiated Ports IM Manager connections for RTTPS IM Manager connections for Autoupdate service From IM Manager relay to rtps.imlogic.com From IM Manager relay to tcupdate.imlogic.com MSN and Googletalk authentication connections From client to Internet Blocking HTTP IM Access Almost all of the Public IM clients have the ability to connect to their networks via HTTP. To ensure that all IM traffic is captured by IM Manager, these HTTP connections should be blocked. Ensure that the Hostnames in Table 2 for the IM Service Provider networks are blocked at the Web Proxy for HTTP Access so that IM clients cannot bypass the IM Manager Relay server and go directly to the Internet in HTTP mode: Table 2: Public IM Network Hostnames Service Provider Hostname AOL Instant Messenger aimexpress.aol.com aimexpress.oscar.aol.com (Java client) aimhttp.oscar.aol.com beta.aimexpress.aol.com aimexpress.aim.com toc.oscar.aol.com Yahoo! Messenger http.msg.yahoo.com shttp.msg.yahoo.com ypager.yahoo.com (Java client) http.chat.yahoo.com (Chat) jcs.chat.yahoo.com (Chat) messenger.yahoo.com Symantec, Incorporated. Page 13 of 37
14 Service Provider Hostname MSN Messenger gateway.messenger.hotmail.com messenger.hotmail.com webmessenger.msn.com Googletalk mail.google.com gmail.google.com http.proxy.icq.com ICQ icq.com (to permit ICQ client download and ICQ registration, permit access to and download.icq.com) Symantec, Incorporated. Page 14 of 37
15 7 Blocking ICQ Chat Room Access The IM Manager Relay blocks invites to ICQ chat rooms. An additional step is required to block internal users from entering a chat through the web URL. DNS redirection and/or firewall settings should be used to block this address: IRC.ICQ.COM To test that the block is working, try accessing address and entering a room. If the block is working, you should see repeated reconnection attempts which fail. This can also be implemented by adding the following entry to the hosts file: IRC.ICQ.COM Symantec, Incorporated. Page 15 of 37
16 8 Blocking Yahoo Webcam Access Yahoo has features called View webcam and Invite to View My Webcam, which allow you to view another contact s webcam and vice versa. This feature does not pass through the IM Manager relay, but instead, establishes a direct connection with the host webcam.yahoo.com on port DNS redirection and/or firewall settings should be used to block this address: WEBCAM.YAHOO.COM To test that the block is working, select the View Webcam option in Yahoo! Messenger. If the block is working, you will see repeated connection attempts fail. This can also be implemented by redirecting the server name to a fictitious IP address in the hosts file. For example: WEBCAM.YAHOO.COM Symantec, Incorporated. Page 16 of 37
17 Appendix A: Configuring DNS on the IM Manager Server As described in Section 3.1, IM Manager needs to be able to find the true Internet IP addresses of the Public IM networks. That means that IM Manager can not use the same DNS server as the end users. Additionally, some IM Manager features require successful DNS lookups of your internal corporate servers; that means that IM Manager should not use your ISP s external DNS servers. The common solution is to install a separate DNS service on the IM Manager server for the IM Manager s use. The steps to do this are detailed here. The DNS service is installed by going to the Add/Remove Programs panel and choosing to install a Windows Component. Choose the DNS Service and start the install. If you need details on this installation, please refer to your Microsoft Windows documentation. To configure the DNS: 1. Open the Computer Management screen and right click on the Services and Applications DNS <servername> node. Select Properties. Select the Forwarders tab. 2. Enter the IP address of the external DNS server (or an internal DNS server that resolves internet addresses externall) in the Selected domains forwarder IP address list textbox. Click Add. Click OK. 3. Right click on Forward Lookup Zones. Select New Zone to display the New Zone Wizard dialog box. Symantec, Incorporated. Page 17 of 37
18 4. Click Next to display the Zone Type dialog box. 5. Click the Secondary Zone radio option. Click Next to display the Zone Name dialog box. 6. Enter your internal zone name (e.g. symantec.com) in the Zone name textbox. Click Next to display the Master DNS Servers dialog box. 7. Enter the IP addresses of the internal DNS servers and click Add. Click Next to display the finish screen. Click Finish. Symantec, Incorporated. Page 18 of 37
19 Appendix B: Configuring DNS Redirection in Windows 2003 This section provides an example of setting up a primary zone for login.oscar.aol.com in Windows 2003 so that IM client queries to the internal DNS machine for that domain name will receive the IP address of the IM Manager Relay server. There are two stages in this procedure: Creating a Zone Assigning one or more hosts (IM Manager Relay servers) to the new Zone. Optionally, properties of the host may be modified. 8.1 Creating a Zone in Windows 2003 To create a zone, perform the following steps: Open the DNS manager window. To do so, in Windows click Start Programs Administrative Tools DNS. The DNS window is shown in Figure 2: DNS Manager Window (Windows 2003): Figure 2: DNS Manager Window (Windows 2003) Symantec, Incorporated. Page 19 of 37
20 Right-click Forward Lookup Zones, and on the shortcut menu, select New Zone to open the New Zone wizard window. The first screen, Zone Type, is shown in Figure 3: Zone Type Screen Figure 3: Zone Type Screen Click the Primary button to set the zone type, then click the Next button to commit the type setting, and open the Zone Name screen, shown in Figure 4: Zone Name Screen: Symantec, Incorporated. Page 20 of 37
21 Figure 4: Zone Name Screen In the Name text box, type the name of the zone; for this example: login.oscar.aol.com. Then click the Next button to open the Zone File screen, shown in Figure 5: Zone File Screen. Figure 5: Zone File Screen Symantec, Incorporated. Page 21 of 37
22 Select the Create a new file with this file name button. The default file name is already filled in (the zone name plus the.dns file name extension). Figure 6: DNS Manager Screen with New Zone Selected Select next. Choose to not allow dynamic updates. Symantec, Incorporated. Page 22 of 37
23 Click the Next button to create the new zone file and close the wizard. The DNS window receives the focus again. The new zone appears on a branch under the Forward Lookup Zones item, as shown in Figure 7: DNS Manager Screen with New Zone Selected: Figure 7: DNS Manager Screen with New Zone Selected NOTE: Do not close the DNS window; continue using it for the next stage described below. 8.2 Assign Hosts to Zone in Windows 2003 To assign a host to the new zone, perform the following steps: In the DNS manager window, right-click the new zone item (in this example: login.oscar.aol.com), and in the shortcut menu, choose the New Host option to open the New Host dialog box, shown in Figure 8: New Host Dialog Box: Symantec, Incorporated. Page 23 of 37
24 Figure 8: New Host Dialog Box Leave the Name text box empty. In the IP address text box, type IP address of the IM Manager Relay server. Click the Add Host button to create the host record, and close the dialog box. The DNS Manager window receives focus again. Symantec, Incorporated. Page 24 of 37
25 Appendix C: Configuring DNS Redirection in Windows 2000 This section provides an example of setting up a primary zone for login.oscar.aol.com in Windows 2000 so that IM client queries to the internal DNS machine for that domain name will receive the IP address of the IM Manager Relay server. There are two to three stages in this procedure: Creating a Zone Assigning one or more hosts (IM Manager Relay servers) to the new Zone. Balancing Relay server Loading Optionally, properties of the host may be modified. 8.3 Creating a Zone in Windows 2000 To create a zone, perform the following steps: Open the DNS manager window. To do so, in Windows click Start Programs Administrative Tools DNS. The DNS window is shown in Figure 9: DNS Manager Window (Windows 2000): Figure 9: DNS Manager Window (Windows 2000) Right-click Forward Lookup Zones, and on the shortcut menu, select New Zone to open the New Zone wizard window. The first screen, Zone Type, is shown in Figure 10: Zone Type Screen: Symantec, Incorporated. Page 25 of 37
26 Figure 10: Zone Type Screen Click the Standard Primary button to set the zone type, then click the Next button to commit the type setting, and open the Zone Name screen, shown in Figure 11: Zone Name Screen: Figure 11: Zone Name Screen In the Name text box, type the name of the zone; for this example: login.oscar.aol.com. Then click the Next button to open the Zone File screen, shown in Figure 12: Zone File Screen: Symantec, Incorporated. Page 26 of 37
27 Figure 12: Zone File Screen Select the Create a new file with this file name button. The default file name is already filled in (the zone name plus the.dns file name extension). Symantec, Incorporated. Page 27 of 37
28 Click the Next button to create the new zone file and close the wizard. The DNS window receives the focus again. The new zone appears on a branch under the Forward Lookup Zones item, as shown in Figure 13: DNS Manager Screen with New Zone Selected: Figure 13: DNS Manager Screen with New Zone Selected NOTE: Do not close the DNS window; continue using it for the next stage described below. 8.4 Assign Hosts to Zone in Windows 2000 To assign a host to the new zone, perform the following steps: In the DNS manager window, right-click the new zone item (in this example: login.oscar.aol.com), and in the shortcut menu, choose the New Host option to open the New Host dialog box, shown in Figure 14: New Host Dialog Box: Symantec, Incorporated. Page 28 of 37
29 Figure 14: New Host Dialog Box Leave the Name text box empty. In the IP address text box, type IP address of the IM Manager Relay server. Click the Add Host button to create the host record, and close the dialog box. The DNS Manager window receives focus again. Symantec, Incorporated. Page 29 of 37
30 Appendix D: Configuring DNS Redirection in Windows NT 8.5 Configuring DNS Redirection in Windows NT4 The following is an example of setting up a primary zone for login.oscar.aol.com in Windows NT4 Service Pack 6a. Client machines that query the DNS machine for that domain name will receive the IP of the IM Manager Relay server which is entered using this procedure. There are two stages in this procedure: Creating a Zone Creating a New Record Host (for the IM Manager Relay server) in the new Zone. Optionally, properties of the host may be modified. 8.6 Creating a Zone in Windows NT4 To create a zone, perform the following steps: Open the Domain Name Service Manager. To do so, in Windows click Start Programs Administrative Tools DNS. The Domain Name Service Manager window is shown in Figure 15: DNS Manager (Windows NT4): Figure 15: DNS Manager (Windows NT4) Symantec, Incorporated. Page 30 of 37
31 In the left-hand pane, expand the Server List item, and locate the DNS server item. NOTE: In Figure 15: DNS Manager (Windows NT4) s example, the server appears as the item. Right-click the DNS server item, and on the shortcut menu, choose the New Zone option to open the Creating New Zone wizard. The first screen appears in Figure 16: Zone Type Selection: Figure 16: Zone Type Selection Click the Primary option button, then click the Next button to continue to the screen shown in Figure 17: Setting Zone Name: Figure 17: Setting Zone Name Symantec, Incorporated. Page 31 of 37
32 In the Zone Name text box, enter the domain name; for this example: login.oscar.aol.com, then press the Tab key to automatically complete the Zone File text box (the default zone file name is called by the domain name plus the.dns file name extension). Click the Next button to create the zone file. The dialog box closes and the focus returns to the Do not close the Domain Name Service Manager window. Do not the window. Instead, continue with the next stage. 8.7 Creating a New Record Host in Windows NT4 To create a New Record host (for the IM Manager Relay server) for the new zone, perform the following steps: In the Domain Name Service Manager window, locate the item corresponding to the new zone (in this example, login.oscar.aol.com). Right-click the item, and on the shortcut menu, choose the New Record option, to open the New Resource Record dialog box, shown in Figure 18: New Resource Record Dialog Box. In the Record Type list box, click the A Record item. Leave the Host Name text box empty. Figure 18: New Resource Record Dialog Box In the Host IP Address text box, type the IP address of the IM Manager Relay server. Click the OK button to create the new record. The dialog box closes and the Domain Name Service Manager window displays the new record, as shown in Figure 19: Domain Name Service Manager: Displaying Zone Information: Symantec, Incorporated. Page 32 of 37
33 Figure 19: Domain Name Service Manager: Displaying Zone Information Symantec, Incorporated. Page 33 of 37
34 Appendix E: Configuring DNS Redirection in UNIX BIND This section provides the following code examples: A sample named.conf file that contains all the customizations needed to set up DNS redirection with BIND for MSN Messenger, AOL Instant Messenger, ICQ, and Yahoo! Messenger. Figure 20: Sample Named.Conf File A sample standard Zone file for messenger.hotmail.com that returns a record for messenger.hotmail.com. This is a standard zone file that can be used for all other IM services since are exactly the same as this messenger.hotmail.com example, with the exception of msg.yahoo.com.zone. Figure 21: Sample Zone File (Standard) A sample specific Zone file for msg.yahoo.com.zone that is more complicated because there are sub domains in it. Figure 22: Sample Zone File (Specific for Yahoo IM) // generated by named-bootconf.pl options { directory "/var/named"; /* * If there is a firewall between you and name servers you want * to talk to, you might need to uncomment the query-source * directive below. Previous versions of BIND always asked * questions using port 53, but BIND 8.1 uses an unprivileged * port by default. */ // query-source address * port 53; }; // // a caching only name server config // controls { inet allow { localhost; } keys { rndckey; }; }; zone "." IN { type hint; }; file "named.ca"; zone "localhost" IN { type master; file "localhost.zone"; allow-update { none; }; }; zone " in-addr.arpa" IN { type master; file "named.local"; Symantec, Incorporated. Page 34 of 37
35 }; allow-update { none; }; // // These zones are for MSN IM traffic // zone "messenger.hotmail.com" IN { type master; file "messenger.hotmail.com.zone"; allow-update { none; }; }; // // These zones are for AOL IM traffic // zone "login.oscar.aol.com" IN { type master; file "login.oscar.aol.com.zone"; allow-update { none; }; }; zone "toc.oscar.aol.com" IN { type master; file "toc.oscar.aol.com.zone"; allow-update { none; }; }; zone "aimexpress.aol.com" IN { type master; file "aimexpress.aol.com.zone"; allow-update { none; }; }; // // This zone is for ICQ IM traffic // zone "login.icq.com" IN { type master; file "login.icq.com.zone"; allow-update { none; }; }; // // These zones are for Yahoo IM traffic // zone "scs.msg.yahoo.com" IN { type master; file "scs.yahoo.com.zone"; allow-update { none; }; }; zone "scsa.msg.yahoo.com" IN { type master; file "scsa.yahoo.com.zone"; allow-update { none; }; }; zone "scsb.msg.yahoo.com" IN { type master; file "scsb.yahoo.com.zone"; Symantec, Incorporated. Page 35 of 37
36 }; allow-update { none; }; zone "scsc.msg.yahoo.com" IN { type master; file "scsc.yahoo.com.zone"; allow-update { none; }; }; include "/etc/rndc.key"; Figure 20: Sample Named.Conf File $TTL 1D IN root ( 2 ; serial (d. adams) 3H ; refresh 15M ; retry 1W ; expiry 1D ) ; IN NS 1d IN A Figure 21: Sample Zone File (Standard) $TTL 1D IN root ( 2 ; serial (d. adams) 3H ; refresh 15M ; retry 1W ; expiry 1D ) ; IN NS 1d IN A scs 1d IN A scsa 1d IN A scsb 1d IN A scsc 1d IN A Symantec, Incorporated. Page 36 of 37
37 Figure 22: Sample Zone File (Specific for Yahoo IM) Symantec, Incorporated. Page 37 of 37
Integrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
More informationInstallation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationInstalling Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationFortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
More informationHow To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More informationWeb Security Firewall Setup. Administrator Guide
Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
More informationUsing SNMP with OnGuard
Advanced Installation Topics Chapter 8: Using SNMP with OnGuard SNMP (Simple Network Management Protocol) is used primarily for managing and monitoring devices on a network. This is achieved through the
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationVersion 3.8. Installation Guide
Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro
More informationRSA Two Factor Authentication. Feature Description
RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationEnterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
More informationQuick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationStrong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationSample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationRemote Desktop Services
Remote Desktop Services VERSION: 1.0 UPDATED: JUNE 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 43 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc.. All rights
More informationDell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationCitrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition
Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationAIMS Installation and Licensing Guide
AIMS Installation and Licensing Guide Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Toll Free: 800-609-8610 Direct: 925-217-5170 FAX: 925-217-0853 Email: support@avatier.com Limited Warranty
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationv6.1 Websense Enterprise Reporting Administrator s Guide
v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationCA NetQoS Performance Center
CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,
More informationRemote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationCitrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition
Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 9.0, Enterprise Edition Copyright and Trademark Notice Use of the product documented in
More informationSSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer
SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort
More informationSetting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
More informationActivelock Customer Management 1.0
Activelock Customer Management 1.0 Mark Bastian January 19, 2009 Contents Overview... 3 Activelock EULA... 3 Activelock Customer Management Forms... 4 Main Menu... 4 Customer Management... 5 New Software
More informationLog Insight Manager. Deployment Guide
Log Insight Manager Deployment Guide VERSION: 3.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationGetting Started. Websense V10000 Appliance. v1.1
Getting Started Websense V10000 Appliance v1.1 1996 2009, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved. Published 2009 Revision C Printed in the United States
More informationSimba ODBC Driver with SQL Connector for Apache Cassandra
Simba ODBC Driver with SQL Connector for Apache Cassandra Installation and Configuration Guide May 7, 2013 Simba Technologies Inc. Copyright 2012-2013 Simba Technologies Inc. All Rights Reserved. Information
More informationMicrosoft SharePoint
Microsoft SharePoint VERSION: 1.1 UPDATED: JULY 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 13 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc.. All rights
More informationVirtual LoadMaster for Microsoft Hyper-V
Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 VERSION: 1.3 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright
More informationMailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003
Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...
More informationCloud Attached Storage
Using CTERA Agent in VDI mode Cloud Attached Storage November 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by
More informationUser Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
More informationConfiguration Guide. Contents. Transitioning from SurfControl Web Filter
Configuration Guide Transitioning from SurfControl Web Filter v7 Contents Introduction................................3 Prepare to install............................4 Install Websense filtering software..............6
More informationConnection Broker The Leader in Managing Hosted Desktop Infrastructures and Virtual Desktop Infrastructures (HDI and VDI) DNS Setup Guide
Connection Broker The Leader in Managing Hosted Desktop Infrastructures and Virtual Desktop Infrastructures (HDI and VDI) DNS Setup Guide Versions 8.0 December 9, 2014 Contacting Leostream Leostream Corporation
More informationVeritas Cluster Server Database Agent for Microsoft SQL Configuration Guide
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright
More informationQuick Start Guide For Ipswitch Failover v9.0
For Ipswitch Failover v9.0 Copyright 1991-2015 All rights reserved. This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationFor Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationInstallation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationCA VPN Client. User Guide for Windows 1.0.2.2
CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
More informationHigh Availability Setup Guide
High Availability Setup Guide Version: 9.0 Released: March 2015 Companion Guides: The UniPrint Infinity Administrator s Guide, Cluster Guide and Mobile Setup Guide can be found online for your convenience
More informationInstallation Guide. Squid Web Proxy Cache. Websense Enterprise Websense Web Security Suite. v6.3.2. for use with
Installation Guide for use with Squid Web Proxy Cache Websense Enterprise Websense Web Security Suite v6.3.2 1996-2008, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved.
More informationPulse Redundancy. User Guide
Pulse Redundancy User Guide August 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control and Automation
More informationSage HRMS 2014 Sage Employee Self Service
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationUser Guide for Paros v2.x
Table of Contents 1 Introduction...1 1.1 Paros Overview...1 1.2 History...1 2 Copyright...2 3 Installation...3 4 Configuration...4 5 Functions...6 5.1 Spider...6 5.2 Scanner...6 5.3 Filter...7 5.4 Trapping
More informationStep-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
More informationDEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationAgent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationMobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More informationRealShot Manager Compression Server software
RealShot Manager Compression Server software User Guide Software Version 1.0 RealShot Manager 2004 Sony Corporation Copyright Notice 2004 Sony Corporation. All rights reserved. This manual may not be reproduced,
More informationInstallation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide
Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationInstalling and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
More informationHyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide
Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc..
More informationaxsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
More informationMicrosoft Dynamics GP 2010. SQL Server Reporting Services Guide
Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information
More informationWHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationAzure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationPort Following. Port Following. Feature Description
Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationSetup and Configuration Guide for Pathways Mobile Estimating
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
More informationBarracuda IM Firewall Administrator s Guide
Barracuda IM Firewall Administrator s Guide Version 3.0 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2007, Barracuda Networks www.barracuda.com
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationCisco Collaboration with Microsoft Interoperability
Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010
More informationAccuTerm 7 Cloud Edition Connection Designer Help. Copyright 2010-2014 Zumasys, Inc.
AccuTerm 7 Cloud Edition Connection Designer Help Contents 3 Table of Contents Foreword 0 Part I AccuTerm 7 Cloud Edition 4 1 Description... 4 2 Usage... Guidelines 5 3 Connection... Designer 6 4 Internet...
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationInstalling the Shrew Soft VPN Client
Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
More informationVERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
More informationConfiguring and Monitoring Event Logs
Configuring and Monitoring Event Logs eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationStep By Step Guide: Demonstrate DirectAccess in a Test Lab
Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
More information