Configuring the SA 500 for Active Directory Authentication of VPN Clients 2. Establishing a SSL VPN Connection By Using a Different Port Number 35

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Configuring the SA 500 for Active Directory Authentication of VPN Clients 2. Establishing a SSL VPN Connection By Using a Different Port Number 35"

Transcription

1 Application Note Configuring a Cisco SA 500 for Active Directory Authentication of SSL VPN Clients This application note document provides information on how to enable the authentication of SSL VPN Clients with Active Directory on a Cisco SA 500 Series security appliance. Contents Overview 2 Scope and Assumptions 2 Requirements 2 Configuring the SA 500 for Active Directory Authentication of VPN Clients 2 Establishing a SSL VPN Connection By Using a Different Port Number 35 Appendix 40 For More Information Cisco Systems, Inc. All rights reserved. Page 1 of 46

2 Overview The Cisco SA 500 is a small business security router that provides SSL VPN access to remote users. SSL VPN is a flexible and secure way to extend network resources to virtually any remote user who has access to the Internet and a Web browser. A benefit is that you do not have to install and maintain VPN client software on the remote machines. Users can remotely access the network by using a web browser. When the tunnel is established, each user will have an IP address on the internal network to allow them to use shared resources and applications. Alternatively, you can use SSL VPN Port Forwarding to provide remote access to specific services and applications on your network: Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. You can use an Active Directory authentication server so that SSL VPN Clients can authenticate to the SA 500 with their current Active Directory account. Before you begin, make sure that your users can successfully authenticate to the Active Directory server. You can then use the Security Appliance Configuration Utility to configure your SA 500. Scope and Assumptions The procedures and guidelines in this application note assume that your SA 500 is set up for Internet connectivity and has a basic configuration. It only applies to a SA 500 running firmware version or later. Using different versions might display slightly different screens and configurations that what are described in this document. Requirements Before you begin the configuration, make sure that you have the following information: Windows Active Directory server IP address and FQDN (Fully Qualified Domain Name). IP addresses, port numbers, and account information for application servers and computers. Configuring the SA 500 for Active Directory Authentication of VPN Clients Follow the steps in these sections to enable Active Directory authentication of VPN Clients: Enabling Remote Management (RMON) Customizing a Portal Site Configuring Domains, Groups, and User Lists Configuring SSL VPN Port Forwarding Configuring Resources Configuring SSL VPN Policies SSL VPN Tunnel Client Configuration Connecting to the SSL VPN Site 2010 Cisco Systems, Inc. All rights reserved. Page 2 of 46

3 Enabling Remote Management (RMON) To access the router securely from a remote wide-area network (WAN) you first need to enable the remote management option. To enable remote management: Step 1. Login to the SA 500 as administrator by entering this address: The default username is cisco. The default password is cisco. Note: For security purposes, we highly recommend that you change the default passwords before continuing. When remote management is enabled, the router is accessible to anyone who knows its IP address which increases the possibility of a malicious WAN attack. To change the password, click Administration > Users from the Configuration Utility main page. Step 2. Click Network Management on the menu bar, and then click Remote Management in the navigation tree. The Remote Management (RMON) window appears Cisco Systems, Inc. All rights reserved. Page 3 of 46

4 Step 3. Enter the following information: Enable Remote Management: Check the box to enable Remote Management and SSL VPN access. Access Type: Choose one of these permission levels for the remote management/ssl VPN user IP addresses: All IP Addresses: Users can login from any address. If you select this option, make sure that you change the default address and set strong login/password settings. IP Address Range: Enter the range of allowed IP addresses. If you select this option, enter the From: starting IP address for the allowed range and To: ending IP address for the allowed range. Only this PC: When enabled, only the current computer will be allowed to login remotely. Enter the IP address of the computer that has remote management permissions. Port Number: Set the port number used for remote management. In this example, the port number is set to port 443. Note: Using a port other than 443 or will disable QuickVPN access. Remote SNMP Enable: Check this box to enable SNMP for the remote connection. Step 4. Click Apply to save your settings. Customizing a Portal Site The router contains a default SSL VPN portal for users, but you can also customize different portal sites for different groups.you can modify the title, banner heading, banner message, security settings, and access type (VPN tunnel, port forwarding, or both). Note: Verify that Remote Management (RMON) is enabled on the router. Otherwise, SSL VPN access will be blocked. The following window shows the default SSL VPN Portal page: 2010 Cisco Systems, Inc. All rights reserved. Page 4 of 46

5 To customize the Portal page for a group. Step 1. Click VPN on the menu bar, and then click SSL VPN Server > Portal Layouts in the navigation tree Cisco Systems, Inc. All rights reserved. Page 5 of 46

6 The Portal Layouts window appears. Step 2. Click Add Cisco Systems, Inc. All rights reserved. Page 6 of 46

7 The Portal Layout Configuration window appears. Step 1. Configure the Layout settings for the portal. In this example, the portal name and title names is Channel. Portal Layout and Theme Name Portal Layout Name: Enter a unique name for your portal. Portal Site Title: Enter the web browser window title for the portal. Banner Title (Optional): Enter the banner title for this group. Banner Message: Enter a message for the group s SSL VPN users. For example: Welcome to Channel Sales group SSL VPN Portal Page. Login with your domain account. Please follow company security policies. Display banner message on login page: Check this box to display both the Banner Title and Banner Message on the portal s login page. HTTP meta tags for cache control (recommended): Check this box to ensure that client s browsers do not cache SSL VPN portal pages and other web content. The HTTP meta tags cache control directives prevent out-of-date web pages and data from being stored on the client s web browser cache. ActiveX web cache cleaner: Check this box to load an ActiveX cache control whenever users login to this SSL VPN portal. Step 2. Select the SSL VPN Portal pages that users can access in this portal by enabling the VPN Tunnel or Port Forwarding pages Cisco Systems, Inc. All rights reserved. Page 7 of 46

8 Note. Any page that is not selected will not be visible from the SSL VPN portal navigation menu. However, users can still access the hidden pages unless SSL VPN access policies are created to prevent access to these pages. See Configuring SSL VPN Policies, page 24. Step 3. Click Apply to save the portal page. Configuring Domains, Groups, and User Lists You can configure details of User accounts as it pertains to SSL VPN. You can specify the user privileges, control user access to network resources, and streamline the setup process by organizing VPN users into domains and groups that share VPN policies. Configuring Domains Step 1. Click Administration on the menu bar, and then click User > Domains in the navigation tree. The Domains window appears. Step 2. Click Add Cisco Systems, Inc. All rights reserved. Page 8 of 46

9 The Domains Configuration window appears. Step 3. In the Domains Configuration area, enter this information: Domain Name: Enter a unique name for your domain. For example: sbsbulab.com. Authentication Type: Enter the Authentication type for this Domain. For example: Active Directory. Select Portal: Choose a portal layout from the drop-down list. For example: Sales. Only the users of the associated domain can log in through the chosen portal. Authentication Server: Enter the IP address of the authentication server. For example: Active Directory Domain: For Active Directory authentication, enter the Active Directory s domain. For example: sbsbulab.com. Contact your Active Directory administrator for this domain name. Users that are registered in the Active Directory database can access the SSL VPN portal by using their Active Directory username and password. Step 4. Click Apply to save the Domains configuration Cisco Systems, Inc. All rights reserved. Page 9 of 46

10 The new domains are added to the List of Domains Cisco Systems, Inc. All rights reserved. Page 10 of 46

11 Adding Groups If you have a large pool of users, we recommend that you create Groups.Groups are used to separate logical sets of SSL VPN users that share the authentication domain, LAN and services access rules, and idle timeout settings. To add a group: Step 1. Click Users > Groups in the navigation tree. The Groups window appears. Step 2. Click Add Cisco Systems, Inc. All rights reserved. Page 11 of 46

12 The Group Configuration window appears. Step 3. Enter this information: Group Name: Enter a unique identifier for the group. For example: Sales. Domain: Assign a domain from the drop-down list of authentication domains. In this example, the domain is: sbsbulab.com Idle Timeout: Enter the number of minutes of activity allowed before a user session is ended. The default timeout is 10 minutes. Step 4. Click Apply to save the group configuration Cisco Systems, Inc. All rights reserved. Page 12 of 46

13 The new group appears in the List of Groups. Creating Users and Assigning to Groups To create users and assign them to groups: Step 1. Click Users > Users in the navigation tree Cisco Systems, Inc. All rights reserved. Page 13 of 46

14 The Users window appears. Step 2. Click Add Cisco Systems, Inc. All rights reserved. Page 14 of 46

15 The Users Configuration window appears. Step 3. Enter the following information for each user in the Active Directory Domains and Groups: User Name: Enter a unique name for each user. The value must match the user s account on the Active Directory server. For example: JoeD. First Name: Enter the user s first name. Last Name: Enter the user s last name. User Type: Identify the user s account type (SSL VPN User, Administrator, Guest). In this example, the user account specified is: SSL VPN User. Select Group: Choose a user s Group membership from the drop-down list. Password: Not applicable.this field is grayed out for Active Directory Group members. Idle Timeout: Enter the number of minutes of inactivity allowed before a user s session is ended.the default timeout is 10 minutes. The timeout value for the individual user has precedence over the timeout for the group. Step 4. Click Apply to save the user configuration Cisco Systems, Inc. All rights reserved. Page 15 of 46

16 The new users are added to the List of Users Cisco Systems, Inc. All rights reserved. Page 16 of 46

17 Configuring SSL VPN Port Forwarding Port forwarding allows you to detect and reroute data sent from remote users to the SSL VPN gateway to predefined applications running on private networks. This section describes how to configure application and hosts for port forwarding. Configuring Applications for Port Forwarding The following table lists the common applications for port forwarding and their corresponding TCP port numbers. TCP Application Port Numbers FTP Data (usually not needed) 20 FTP Control Protocol 21 SSH 22 Telnet 23 SMTP (send mail) 25 HTTP (web) 80 POP3 (receive mail) 110 NTP (network time protocol) 123 Citrix 1494 Terminal Services 3389 VNC (virtual network computing 5900 or 5800 To configure an application for port forwarding: Step 1. Click VPN on the menu bar, and then click SSL VPN Server > Port Forwarding in the navigation tree Cisco Systems, Inc. All rights reserved. Page 17 of 46

18 The Port Forwarding window appears. Step 2. Click Add from the list of Configured Applications for Port Forwarding Cisco Systems, Inc. All rights reserved. Page 18 of 46

19 The Port Forwarding Application Configuration window appears. Step 3. Enter the following information: Local Server IP Address: Enter the IP address of the server hosting the application. For example: TCP Port Number: Enter the TCP port number for the application. In this example, enter enter 443 to specify HTTPS. Step 4. Click Apply to save your settings. Configuring Hosts for Port Forwarding To simplify access to the shared hosts on the local network, you can configure hosts for Port Forwarding. With this option, remote users can use the FQDN host names (such as ftp.sbsbulab.com), instead of harder to remember IP addresses. To configure a host for port forwarding: Step 5. From the Port Forwarding window, click Add from the list of Configured Names for Port Forwarding table Cisco Systems, Inc. All rights reserved. Page 19 of 46

20 The Port Forwarding Host Configuration window appears. Step 6. Enter the following information: Local Server IP Address: IP address of the server hosting the application. For example: Fully Qualified Domain Name: Name of the host server where the port forwarded application resides. For example: ftp.sbsbulab.com. Step 7. Click Apply to save your changes Cisco Systems, Inc. All rights reserved. Page 20 of 46

21 Configuring Resources Network resources are a collection of services or host that are used to easily create and configure VPN policies for groups or users. Resources are helpful when there are many resources per host, or if many hosts are providing resources to remote users. To add a resource: Step 1. Click VPN on the menu bar, and then click SSL VPN Server > Resources in the navigation tree. The Resources window appears. Step 2. Click Add Resource Cisco Systems, Inc. All rights reserved. Page 21 of 46

22 The Resource Configuration window appears. Step 3. Enter the following information: Resource Name: Enter a unique name to identify this resource. For example: . Service: Choose one of the supported SSL VPN services to associate with this resource. Select either VPN Tunnel, Port Forwarding, or All (both). Step 4. Click Apply to save your settings. The new resource appears in the List of Resources on the Resources window. Step 5. From the List of Resources, click Add Object to Resource to add all objects that correspond to the resource Cisco Systems, Inc. All rights reserved. Page 22 of 46

23 The Resource Object Configuration window appears. Step 6. Specify the resource information: Object Type: Select the object type (IP Address or IP Network). Object Address: Enter the object IP address. For example: Mask Length: If you selected IP Network as the object type, enter the mask length. Port Range/Port Number: Enter the object s port Begin and End numbers. For example: 110 and 110 for POP3. Step 7. Click Apply to save the object to the Resource you are editing. Note: You can enter as many resources that you need for your defined resource. For example, if you are configuring a resource for , you can specify the ports and server hosts that provide service to remote users Cisco Systems, Inc. All rights reserved. Page 23 of 46

24 Configuring SSL VPN Policies SSL VPN Policies give Administrators control over which resources are accessed by specific SSL VPN Groups and Users. You can create global, group and user policies that apply to a specific network resource, an IP address, an IP address range, or other services. Policies are applied based on precedence. User level policies take highest priority, followed by Group policies, and finally the Global policies. Policies can be offered to the VPN Tunnel, Port Forwarding or both access groups. Note: By default the Security Appliance s VPN tunnel is configured for Global PERMIT policy over all addresses, services and ports. It is good practice to place restrictive DENY policies on the global groups and proceed to place permit policies on groups and users. Alternatively, start with Global PERMIT policies and then create DENY policies for Groups and Users to block resources that you do not want to be accessed remotely. To configure an SSL VPN Policy: Step 1. Click VPN on the Menu bar, and then select SSL VPN Server > SSL VPN Policies on the navigation tree. The SSL VPN Policies window appears. Step 2. Click Add to create a new VPN policy Cisco Systems, Inc. All rights reserved. Page 24 of 46

25 The SSL VPN Policy Configuration window appears. Step 3. Enter the following information: Policy For: Choose the type of policy: Global: All users of the device. Group: Group of users of the device. If you choose this option, also choose the group from the Available Groups list User: A particular user of the device. If you choose this option, also choose the user from the Available Users list Available Groups: Allows you to add a group-level policy for the selected group. Available Users: Allows you to add a user-level policy for a particular user. Step 4. In the SSL VPN Policy area, enter the following information: Apply Policy to: Choose to apply the policy to a Network Resource, an IP address, an IP network, or All Addresses that are managed by the device. Policy Name: Enter a unique name to identify this policy. If you create a policy with same name as that of any existing policy, the newly policy overwrites the existing one. IP Address: If you chose IP Address or Network Resource in the Apply Policy to field, enter the IP address of the device. Mask Length: If you chose IP Network in the Apply Policy to field, enter the length of the subnet mask Cisco Systems, Inc. All rights reserved. Page 25 of 46

26 Port Range / Port Number (Begin & End): Specify a port or a range of ports to apply the policy to all TCP and UDP traffic with those ports. Leave the fields empty to apply the policy to all traffic. Service: Choose VPN Tunnel, Port Forwarding, or All Services Defined. Defined Resources: Choose the services for a particular policy. This option is available only for policies that are applied to a Network Resource. Permission: Choose either Permit or Deny for this policy. Step 5. Click Apply to save your settings. SSL VPN Tunnel Client Configuration An SSL VPN tunnel client provides a point-to-point connection between the browser-side machine and the security appliance. When a SSL VPN client is launched from the user portal, a network adapter with an IP address from the corporate subnet, DNS and WINS settings is automatically created. This allows access to services on the private network without any special network configuration on the remote SSL VPN client machine. Make sure that the virtual (PPP) interface address of the VPN tunnel client does not conflict with the address of any physical devices on the LAN. The IP address range for the SSL VPN virtual network adapter should be either in a different subnet or non-overlapping range as the corporate LAN. If the SSL VPN client is assigned an IP address in a different subnet than the corporate network, a client route must be added to allow access to the private LAN through the VPN tunnel. Configuring the SSL VPN Client To configure an SSL VPN tunnel for a client: Step 1. Click VPN on the menu bar, and then click SSL VPN Client > SSL VPN Client in the navigation tree Cisco Systems, Inc. All rights reserved. Page 26 of 46

27 The SSL VPN Client window appears. Step 2. Enter the following information: Enable Split Tunnel Support: Check this box to enable Split Tunnel Mode Support, or uncheck this box for Full Tunnel Mode Support. Note. With Full Tunnel Mode, all of the traffic from the host is directed through the tunnel. With Split-Tunnel Mode, the tunnel is used only for the traffic that is specified by the client routes. If you enable Split Tunnel Support, you also need to configure SSL VPN Client Routes. DNS Suffix (Optional): DNS Suffix for this client Primary DNS Server (Optional): IP Address of the Primary DNS Server for this client. Secondary DNS Server (Optional): IP address of the secondary DNS Server for this client. Client Address Range Begin: First IP address that will be assigned to SSL VPN clients. Client Address Range End: Last IP address that will be assigned to SSL VPN clients. Make sure that you configure an IP address range that does not directly overlap with any of addresses on your local network. For example, the default range shown on the window above is to Step 3. Click Apply to save your settings Cisco Systems, Inc. All rights reserved. Page 27 of 46

28 Configuring Client Routes for Split Tunnel Mode Step 1. Click VPN on the menu bar, and then click SSL VPN Client > Configured Client Routes in the navigation tree. The Configured Client Routes window appears. Step 2. Click Add Cisco Systems, Inc. All rights reserved. Page 28 of 46

29 The SSL VPN Client Route Configuration window appears. Step 3. Enter the following information: Destination Network: Enter the destination subnet to which a route is added on the SSL VPN Client. Subnet Mask: Enter the subnet mask for the destination network. Step 4. Click Apply to save your settings. Connecting to the SSL VPN Site This section describes how remote users can connect to the SSL VPN site. It consists of the following information: Connecting to the Portal Connecting through an SSL VPN Tunnel Connecting through SSL VPN Port Forwarding Note: When connecting to the SA 500 through a VPN tunnel or through VPN Port Forwarding, do not reload your browser. Otherwise, the SSL VPN Tunnel client will disconnect and then reconnect to the remote network. To prevent this from happening, we strongly recommend that you uninstall any active clients, logout, and then close the browser Cisco Systems, Inc. All rights reserved. Page 29 of 46

30 Connecting to the Portal To connect to the portal: Step 1. The user starts a web browser and then enters the portal URL. The default SSL VPN portal URL is: https://<wan ip address of security appliance>/portal/ SSLVPN. If the user belongs to a group that is using a customized portal, the URL will be in this format: https://<wan ip address of security appliance>/portal/<portal Unique Name>. For example: https:// /portal/sales. Note. Java, Java Script, and Active-X controls must also be enabled or allowed in the web browser settings. Step 2. The user enters their Active DIrectory username and password to log in to the portal. The Portal Info window appears. Note. The window only shows the configured services for that particular account (VPN Tunnel, Port Forwarding, or Both) Cisco Systems, Inc. All rights reserved. Page 30 of 46

31 Connecting through an SSL VPN Tunnel Step 1. On the Portal Info page, select the VPN Tunnel option on the navigation menu Cisco Systems, Inc. All rights reserved. Page 31 of 46

32 The VPN Tunnel window appears. Step 2. Click the icon to connect to the remote network. Keep your browser open to maintain the connection Cisco Systems, Inc. All rights reserved. Page 32 of 46

33 The remote user can now employ those resources to which there is permission. Note: We Strongly Recommend that you always follow this sequence to make the connection safer, easier to maintain, and avoid possible errors: Disconnect and Uninstall the Cisco-SSLVPN Tunnel, logout, and close the browser window Cisco Systems, Inc. All rights reserved. Page 33 of 46

34 Connecting through SSL VPN Port Forwarding Step 1. On the Portal Information page, select the Port Forwarding on the navigation menu. The Port Forwarding/Client Installer/Launcher window appears. Step 2. Click the icon to connect to the network ports you want to forward. Keep your browser open to maintain the connection. You can now launch the applications that are using Port Forwarding. Note: We Strongly Recommend that you always follow this sequence to make the connection safer, easier to maintain, and avoid possible errors: Disconnect and Uninstall the Cisco-SSLVPN Tunnel, logout, and close the browser window. Step 3. To see the Port Forwarding status double-click the SSL VPN Port Forwarding (airplane) icon on the Taskbar Cisco Systems, Inc. All rights reserved. Page 34 of 46

35 The SSL VPN Port Forwarding status window appears. Establishing a SSL VPN Connection By Using a Different Port Number If the default WAN Port (443) is being used by another service or application, you can change the default port that SSL VPN clients access. This section describes how to create a new service port and how to forward it to LAN port 443. This means that instead of logging in to the SA 500 through the WAN, you will login through the LAN instead. Creating a New Service Port To create a new service port: Step 1. Step 2. Log in to the router by using Administrator account. Click Firewall on the menu bar, and then click Firewall > Services in the navigation tree Cisco Systems, Inc. All rights reserved. Page 35 of 46

36 The Custom Services window appears. Step 3. Click Add Cisco Systems, Inc. All rights reserved. Page 36 of 46

37 The Custom Services Configuration window appears. Step 4. Enter the following information: Name: Enter a unique name for your custom service. For example: NEWSSL_PORTAL. Type: Select the protocol that the service uses from the drop-down menu (TCP, UDP, or ICMP). If you choose ICMP or ICMPv6, also enter the ICMP Type. If you choose TCP or UDP, specify the port range by entering the Start Port and the Finish Port. Start Port: The first TCP or UDP port of a range that the service uses. If the service uses only one port, the start port will be the same as the end port. In this example the port number is: End Port: The last TCP or UDP port of a range that the service uses. In this example the end Port is the same as Start Port: Note. Make sure that the port(s) chosen is/are not in use by any other application or service. Otherwise, that port will conflict with an application resource in use in their environment. Step 5. Click Apply to save your settings Cisco Systems, Inc. All rights reserved. Page 37 of 46

38 Creating a Firewall Rule for the Service Port After you create a new service port, you need to create a firewall rule to forward that port to LAN port 443. In this example, the WAN port number used is: To create a firewall rule for the new service port: Step 1. Click Firewall on the menu bar, and then click Firewall > IPv4 Rules in the navigation tree. The IPv4 Firewall Rules page appears. Step 2. Click Add to create the IPv4 Rule that will forward WAN traffic from port to LAN port 443. The IPv4 Firewall Select Rules window appears. Step 3. Enter the following information: From Zone: The source of traffic controlled by this rule. For example: UNSECURE (Dedicated WAN/Optional WAN). To Zone: The destination of traffic controlled by this rule. For example: SECURE (LAN). Action: The action the firewall takes if this rule is met. For example: ALLOW Always. Source Hosts: The hosts that will be using this firewall rule. For example: Never. Log: Specifies whether the packets for this rule should be logged. For example: Any Cisco Systems, Inc. All rights reserved. Page 38 of 46

39 Internal IP Address: The host that is the recipient of traffic according to the firewall rule. In this example we use the LAN IP address of the Security Appliance ( ). Enable Port Forwarding: Check the box to enable port forwarding to the port specified in the Translate Port Number field. Translate Port Number: The port number to use for port forwarding. For example: 443. External IP Address: The WAN interface where the remote clients will connect through. For example: Dedicated WAN. Step 4. Click Apply to save your settings. The new firewall rule appears in the IPv4 Firewall Rules window Cisco Systems, Inc. All rights reserved. Page 39 of 46

40 Step 5. Connect through the new port. Appendix Modifying End User Polices You can strengthen the router s security by adding login policies for each user that you define. You can can also edit a policy to deny login rights for user, a policy to deny a user login rights, or edit the user login policy by login, browser or IP address. To add or edit use login policies: Step 1. Click Users > Users in the navigation tree Cisco Systems, Inc. All rights reserved. Page 40 of 46

41 The Users window appears. User Login Policy Step 1. From the Users window, click the Login icon in the Edit User Policies column Cisco Systems, Inc. All rights reserved. Page 41 of 46

42 The Users/User Login Policies window appears, Step 2. To deny login for a user, select one of these options: Disable Login: Check this box to disable the account, or uncheck this box to enable the account. This setting cannot be changed for the default admin account. Deny Login from WAN Interface: Check this box to prevent the user from logging in from the WAN, or uncheck this box to allow the user to log in from the WAN. This setting cannot be changed for the default admin account. Step 3. Click Apply to save your settings Cisco Systems, Inc. All rights reserved. Page 42 of 46

43 User Login Policy By Browser Step 1. From the Users window, click the By Browser icon in the Edit User Policies column. The Users/User Policy By Client Browser window appears. Step 2. To add or edit user login browser policies, select one of these options: In the User Policy By Client Browser area, select either Deny Login from Defined Browsers or Allow Login only from Defined Browsers. To add a browser, choose a client browser from the Add Defined Browser table and click Add. To delete a browser, check the box next the browser, and click Delete. Step 3. Click Apply to save your settings Cisco Systems, Inc. All rights reserved. Page 43 of 46

44 User Login Policy By IP Address Step 1. From the Users window, click the By IP icon in the Edit User Policies column. The Users/User Policy By Source IP Address window appears. Step 2. To add defined addresses for the policies, click Add from the Defined Addresses table Cisco Systems, Inc. All rights reserved. Page 44 of 46

45 The Defined Addresses window appears. Step 3. Step 4. Step 5. Choose a source type from the drop-down list (Individual IP address or IP network). Enter the IP address or IP network address range. If the IP address is a range, also enter the Mask Length value (0-32) Click Apply to save your settings Cisco Systems, Inc. All rights reserved. Page 45 of 46

46 For More Information Product and Support Resources SA 500 Technical Documentation Cisco Partner tools Cisco Small Business Support Community Cisco.com Technical Support page Location CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco Nurse Connect, Cisco Pulse, Cisco StackPower, Cisco StadiumVision, Cisco TelePresence, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Good, Flip Mino, Flipshare (Design), Flip Ultra, Flip Video, Flip Video (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capital, Cisco Capital (Design), Cisco:Financed (Stylized), Cisco Store, and Flip Gift Card are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Continuum, EtherFast, EtherSwitch, Event Center, Explorer, Fast Step, Follow Me Browsing, FormShare, GainMaker, GigaDrive, HomeLink, ilynx, Internet Quotient, IOS, iphone, iquick Study, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0908R) 2010 Cisco Systems, Inc. All rights reserved. OL Cisco Systems, Inc. All rights reserved. Page 46 of 46

Release Notes for Cisco IronPort Email Security Plug-in 7.1

Release Notes for Cisco IronPort Email Security Plug-in 7.1 Release Notes for Cisco IronPort Email Security Plug-in 7.1 Revised: December 10, 2010 Contents These release notes contain information critical to upgrading and running the Cisco IronPort Email Security

More information

Release Notes for Cisco IronPort Email Security Plug-in 7.2

Release Notes for Cisco IronPort Email Security Plug-in 7.2 Release Notes for Cisco IronPort Email Security Plug-in 7.2 Revised: October 12, 2011 Contents These release notes contain information critical to installing and running the Cisco IronPort Email Security

More information

Cisco Director Class SAN Planning and Design Service

Cisco Director Class SAN Planning and Design Service Cisco Director Class SAN Planning and Design Service Improve data center infrastructure for accessing, managing, and protecting growing information resources. Mitigate risk and accelerate the deployment

More information

Cisco Unified Computing Virtualization Services

Cisco Unified Computing Virtualization Services Cisco Unified Computing Virtualization Services Accelerating the Success of Your Virtualization Initiative The Cisco Unified Computing Virtualization Services provide expert assistance in the planning,

More information

Accessibility Guidelines for Cisco Unified Contact Center Management Portal

Accessibility Guidelines for Cisco Unified Contact Center Management Portal Accessibility Guidelines for Cisco Unified Contact Center Management Portal Release 8.0(1) February 2010 Corporate Headquarters Cisco System s, Inc. 170 West Tasman D riv e San Jose, CA 95134-1706 USA

More information

Cisco Unified Attendant Console Backup and Restore Guide

Cisco Unified Attendant Console Backup and Restore Guide Cisco Unified Attendant Console Backup and Restore Guide Revised: January 28, 2013, 2011, This document describes how to back up Cisco Unified Attendant Console server Version 9.0 (all Editions), and restore

More information

Transferring Files Using HTTP or HTTPS

Transferring Files Using HTTP or HTTPS Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device

More information

Cisco Data Center Virtualization Assessment Service

Cisco Data Center Virtualization Assessment Service Cisco Data Center Virtualization Assessment Service Prepare for End-to-End Virtualization of Your Data Center A proactive approach to virtualization helps maintain the application performance, security,

More information

Terminal Services Overview

Terminal Services Overview Terminal Services Overview This chapter provides an overview of Cisco IOS terminal services and includes the following main sections: Cisco IOS Network Access Devices Line Characteristics and s Asynchronous

More information

Smart Care Guide to Troubleshooting Appliance Registration

Smart Care Guide to Troubleshooting Appliance Registration Smart Care Guide to Troubleshooting Appliance Registration Revised: September 2008 Contents Troubleshooting Appliance Registration Verify the registration of the Partner CCO account Verify that the Customer

More information

Cisco IronPort Encryption Appliance 6.5.5 Release Notes

Cisco IronPort Encryption Appliance 6.5.5 Release Notes Cisco IronPort Encryption Appliance 6.5.5 Release Notes Published: August 30, 2011 Contents These release notes contain important information about running the latest version of the IronPort Encryption

More information

Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway

Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway This document describes how to configure Cisco Unified Communications Manager systems to use the NovaTec TransNova

More information

Cisco Unified Reporting Administration Guide

Cisco Unified Reporting Administration Guide This guide provides an overview of the Cisco Unified Reporting web application, describes how to use the application, and provides procedures for completing various reporting tasks. The guide, which serves

More information

Cisco Data Center Architecture Assessment Service

Cisco Data Center Architecture Assessment Service Cisco Data Center Architecture Assessment Service Align networks, computer systems, and storage devices. Increase the efficiency, adaptability, and scalability of your data center by deploying Cisco Data

More information

Authentication on the Cisco IronPort Web Security Appliance

Authentication on the Cisco IronPort Web Security Appliance Cisco IronPort Web Security Appliance White Paper Authentication on the Cisco IronPort Web Security Appliance Executive Summary Table of Contents 1 Executive Summary 2 Introduction 2 Authentication Protocals

More information

Cisco Virtual Desktop Infrastructure Planning and Design Service

Cisco Virtual Desktop Infrastructure Planning and Design Service Cisco Virtual Desktop Infrastructure Planning and Design Service Reduce IT costs and increase application availability, scalability, and manageability with a virtualized desktop solution The Cisco Virtual

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

Medical Data Exchange A New Approach to Healthcare Interoperability

Medical Data Exchange A New Approach to Healthcare Interoperability Medical Data Exchange A New Approach to Healthcare Interoperability Introduction The healthcare industry has reached a tipping point. Costs have escalated at an unprecedented rate in the United States

More information

Collaboration: Know Your Enthusiasts and Laggards

Collaboration: Know Your Enthusiasts and Laggards . White Paper Collaboration: Know Your Enthusiasts and Laggards What You Will Learn Collaboration has captured the attention of organizations seeking a competitive edge in a challenging economy. Executives

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,

More information

PCI Compliance: Improve Payment Security

PCI Compliance: Improve Payment Security PCI Compliance: Improve Payment Security The latest Payment Card Industry (PCI) Data Security Standards (DSS) for customer data give you more ways to address an evolving risk environment and meet PCI compliance

More information

Connecting Cisco Serial High-Speed WAN Interface Cards

Connecting Cisco Serial High-Speed WAN Interface Cards Connecting Cisco Serial High-Speed WAN Interface Cards Revised: April 5, 008, Overview This document describes Cisco serial and high-speed WAN interface cards (HWICs) and how to connect them to a network.

More information

Cisco Registered Envelope Recipient Guide

Cisco Registered Envelope Recipient Guide September 8, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

More information

Cisco Aironet Dual Band MIMO Low Profile Ceiling Mount Antenna (AIR-ANT2451NV-R)

Cisco Aironet Dual Band MIMO Low Profile Ceiling Mount Antenna (AIR-ANT2451NV-R) Cisco Aironet Dual Band MIMO Low Profile Ceiling Mount Antenna (AIR-ANT2451NV-R) This document outlines the specifications for the AIR-ANT2451NV-R dual band MIMO low profile ceilng mount antenna and provides

More information

Best Practices for Monitoring Cisco Unity Devices with Cisco Unified Operations Manager

Best Practices for Monitoring Cisco Unity Devices with Cisco Unified Operations Manager . Best Practices for Monitoring Cisco Unity Devices with Cisco Unified Operations Manager Copyright 2010 Cisco Systems, Inc. This document is Cisco Public Information. Page 1 of 16 Contents Introduction...

More information

Cisco Smar t Busines s Communications System IP Phone Por tfolio

Cisco Smar t Busines s Communications System IP Phone Por tfolio Cisco Smar t Busines s Communications System IP Phone Por tfolio Rich voice conversations, stylish appearance, and support for business applications. The Cisco Smart Business Communications System (SBCS)

More information

Cisco Unified Wireless IP Phone 7925G Accessory Guide

Cisco Unified Wireless IP Phone 7925G Accessory Guide Cisco Unified Wireless IP Phone 7925G Accessory Guide This guide describes the accessories that you can order for your Cisco Unified Wireless IP Phone 7925G. Contents This document contains these sections:

More information

7828H3 Hard Disk Firmware Update

7828H3 Hard Disk Firmware Update 7828H3 Hard Disk Firmware Update March 31, 2009 A firmware solution for a hard disk drive issue on MCS 7828-H3 model. Contents This document discuss the following topics: Introduction, page 1 Verify that

More information

Cisco Unified Wireless IP Phone 7925G Accessory Guide

Cisco Unified Wireless IP Phone 7925G Accessory Guide Cisco Unified Wireless IP Phone 7925G Accessory Guide This guide describes the accessories that you can order for your Cisco Unified Wireless IP Phone 7925G. Contents This document contains these sections:

More information

DHCP Release and Renew CLI in EXEC Mode

DHCP Release and Renew CLI in EXEC Mode DHCP Release and Renew CLI in EXEC Mode The DHCP Release and Renew CLI in EXEC Mode feature provides the ability to perform two independent operations from the command-line interface (CLI): Immediately

More information

Release Notes for Cisco Support Tools Release 2.4(1)

Release Notes for Cisco Support Tools Release 2.4(1) Release Notes for Cisco Support Tools Release 2.4(1) July 2009 Contents Introduction, page 1 System Requirements, page 2 New Features, page 4 Limitations and Restrictions, page 4 Important Notes, page

More information

Cipher Suites and WEP

Cipher Suites and WEP Cipher Suites and WEP This module describes how to configure the cipher suites required for using Wireless Protected Access (WPA) and Cisco Centralized Key Management (CCKM); Wired Equivalent Privacy (WEP);

More information

Cisco WAAS Installation and Configuration Guide for Windows on a Virtual Blade

Cisco WAAS Installation and Configuration Guide for Windows on a Virtual Blade Cisco WAAS Installation and Configuration Guide for Windows on a Virtual Blade Revised: September 4, 2008, Contents This document describes how to install and configure the Windows Server on WAAS product.

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

Data Centre Disaster Recovery and Business 4 Continuance

Data Centre Disaster Recovery and Business 4 Continuance A Hot Topic in the NHS: Evolution of the Data Centre Data Centre Disaster Recovery and Business 4 Continuance Cisco has a long-standing commitment to the NHS and, over many years, has been able to offer

More information

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be

More information

Cisco IronPort M-Series Security Management Appliance

Cisco IronPort M-Series Security Management Appliance Cisco IronPort M-Series Security Management Appliance Flexible management and complete security control at the network gateway The Cisco IronPort M-Series security management appliance is the perfect complement

More information

Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix

Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix This document contains information about the Cisco platforms and software versions that support the 100-Megabit Ethernet Small Form-Factor Pluggable

More information

System Message Logging

System Message Logging System Message Logging This module describes how to configure system message logging on your wireless device in the following sections: Understanding System Message Logging, page 1 Configuring System Message

More information

Cisco Unified Contact Center Express Port Utilization Guide

Cisco Unified Contact Center Express Port Utilization Guide Cisco Unified Contact Center Express Utilization Guide Cisco Unified Contact Center Express and Cisco Unified IP IVR Release 7.0(1) April 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

L2TP Dial-Out Load Balancing and Redundancy

L2TP Dial-Out Load Balancing and Redundancy L2TP Dial-Out Load Balancing and Redundancy The L2TP Dial-Out Load Balancing and Redundancy feature enables an L2TP network server (LNS) to dial out to multiple L2TP access concentrators (LACs) When the

More information

User Guide for Cisco Unified MeetingPlace Web Conferencing

User Guide for Cisco Unified MeetingPlace Web Conferencing User Guide for Cisco Unified MeetingPlace Web Conferencing Release 6.0 July 15, 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel:

More information

Cisco Unified Web and Interaction Manager Browser Settings Guide

Cisco Unified Web and  Interaction Manager Browser Settings Guide Cisco Unified Web and E-Mail Interaction Manager Browser Settings Guide For Unified Contact Center Enterprise Release 9.0(2) September 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

What every business needs to know about financing*

What every business needs to know about financing* What every business needs to know about financing* *without the small print Aligning your technology investments with changing business needs Financing is an acquisition strategy that can offer significant

More information

Cisco Data Center Business Continuity Planning Service

Cisco Data Center Business Continuity Planning Service Cisco Data Center Business Continuity Planning Service Build a Comprehensive Business Continuity Strategy with Cisco Technology and Expertise. The Cisco Data Center Business Continuity Planning Service

More information

Installation Guide for Cisco Unified Videoconferencing Manager Release 7.1

Installation Guide for Cisco Unified Videoconferencing Manager Release 7.1 Installation Guide for Cisco Unified Videoconferencing Manager Release 7.1 February 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Registered Envelope Service 4.3 Recipient Guide

Cisco Registered Envelope Service 4.3 Recipient Guide Cisco Registered Envelope Service 4.3 Recipient Guide December 6, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco Ironport, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco

More information

Constraining IP Multicast in a Switched Ethernet Network

Constraining IP Multicast in a Switched Ethernet Network Constraining IP Multicast in a Switched Ethernet Network This module describes how to configure routers to use the Cisco Group Management Protocol (CGMP) in switched Ethernet networks to control multicast

More information

Cisco Registered Envelope Service 4.4 Recipient Guide

Cisco Registered Envelope Service 4.4 Recipient Guide Cisco Registered Envelope Service 4.4 Recipient Guide March 21, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1

Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1 Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1 June 2007 Rev. A0 These release notes are for use with the Cisco WAN Modeling Tools, which includes the following subsystems: NMT

More information

Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement

Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement June 2007 This documentation guide contains the End User Supplemental License Agreement for Cisco Systems Network

More information

Cisco TelePresence Solutions

Cisco TelePresence Solutions Cisco TelePresence Solutions To excel in today s economy you have to collaborate with colleagues, partners, and customers around the globe at a moment s notice. You must continuously innovate and focus

More information

Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network

Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network Revised: May 1, 2008, OL-12808-01 This guide describes how to connect Cisco Fast Ethernet Integrated Services Digital Network (ISDN)

More information

Hardware and System Software Specification for Cisco Unified Web and E-Mail Interaction Manager

Hardware and System Software Specification for Cisco Unified Web and E-Mail Interaction Manager Hardware and System Software Specification f Cisco Unified Web and E-Mail Interaction Manager F Unified Contact Center Express Release 4.2(5) October 2009 Americas Headquarters Cisco Systems, Inc. 170

More information

VPN Device Manager Client for Cisco IOS Software (XSM Configuration)

VPN Device Manager Client for Cisco IOS Software (XSM Configuration) VPN Device Manager Client for Cisco IOS Software (XSM Configuration) Note For the primary documentaiton of the latest version of the VPN Device Manager (version 1.2), see the Installation Guide and Release

More information

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T. BGP Link Bandwidth The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for

More information

Implementation Note for NetFlow Collectors

Implementation Note for NetFlow Collectors This document describes the implementation details for NetFlow collectors for the ASA 5580 adaptive security appliance, and includes the following sections: Event-Driven Data Export Bidirectional Flows

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications

More information

Cisco Registered Envelope Recipient Guide

Cisco Registered Envelope Recipient Guide February, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

More information

Cisco IPICS Dispatch Console User Guide

Cisco IPICS Dispatch Console User Guide Cisco IPICS Dispatch Console User Guide Cisco IPICS Release 4.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business WAP200 Wireless-G Access Point with Power Over Ethernet and Rangebooster CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco Ironport, the Cisco logo, Cisco

More information

Analog Channel Re-Creation Using the Digital Service Access Node

Analog Channel Re-Creation Using the Digital Service Access Node Analog Channel Re-Creation Using the Digital Service Access Node The All-Digital Network Migration Challenge Broadband service providers are under constant pressure to provide the bandwidth required to

More information

Design Guide for the Cisco Unified Videoconferencing Solution Using Desktop Component Release 7.1

Design Guide for the Cisco Unified Videoconferencing Solution Using Desktop Component Release 7.1 Design Guide for the Cisco Unified Videoconferencing Solution Using Desktop Component Release 7.1 May 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Meeting 21st-Century Healthcare Challenges: A Smart+Connected Health Approach

Meeting 21st-Century Healthcare Challenges: A Smart+Connected Health Approach Meeting 21st-Century Healthcare Challenges: A Smart+Connected Health Approach The Cisco Connected Insight Series. Thought-provoking discussions on common issues facing public sector agencies today in government,

More information

Cisco Small Form-Factor Pluggable Modules for Gigabit Ethernet Applications

Cisco Small Form-Factor Pluggable Modules for Gigabit Ethernet Applications Cisco Small Form-Factor Pluggable Modules for Gigabit Ethernet Applications The industry-standard Cisco Small Form-Factor Pluggable (SFP) Gigabit Interface Converter is a hotswappable input/output device

More information

Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements

Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements Enhancements The purpose of this document is to provide a summary of some of the feature behavior enhancements on the new, and how they differ from the Cisco IP Phone 7960G/7940G. Complete information

More information

Cisco PIX 515E Security Appliance Getting Started Guide

Cisco PIX 515E Security Appliance Getting Started Guide Cisco PIX 515E Security Appliance Getting Started Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Cisco UCS B200 M1 and UCS B250 M1 Blade Servers. Table 1 compares the features of the Cisco UCS B-Series Blade Servers.

Cisco UCS B200 M1 and UCS B250 M1 Blade Servers. Table 1 compares the features of the Cisco UCS B-Series Blade Servers. Data Sheet Cisco UCS B-Series Blade Servers Cisco Unified Computing System Overview The Cisco Unified Computing System is a next-generation data center platform that unites compute, network, storage access,

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange)

White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange) White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange) Revised August 10, 2007 Purpose This document provides capacity planning recommendations

More information

Installation and Configuration Guide Cisco Unified CRM Connector for SAP

Installation and Configuration Guide Cisco Unified CRM Connector for SAP Installation and Configuration Guide Cisco Unified CRM Connector for SAP Release 1.0(x) December 2009 Corpora te Headquarters Cisco System s, Inc. 170 West Tasman Drive San Jo se, CA 95134-1706 USA htt

More information

Cisco IronPort Hosted and Hybrid Hosted Email Security Services

Cisco IronPort Hosted and Hybrid Hosted Email Security Services FAQ Cisco IronPort Hosted and Hybrid Hosted Email Security Services Cisco IronPort Hosted and Hybrid Hosted Email Security services provide industry-leading anti-spam efficacy, capacity assurance, a dedicated

More information

Initial Access and Basic IPv4 Internet Configuration

Initial Access and Basic IPv4 Internet Configuration Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N

More information

InformaCast Virtual Appliance Basic Paging

InformaCast Virtual Appliance Basic Paging Quick Start Guide for a Cisco Unified Communications Manager Environment November 28, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service

Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service For Qualified Cisco Partners October 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Cisco Physical Security for Retail Banking

Cisco Physical Security for Retail Banking Cisco Physical Security for Retail Banking Enabling a Collaborative Customer Experience What You Will Learn Physical security systems that effectively protect your assets, customers, and employees are

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Cisco Aironet 5-GHz MIMO 6-dBi Patch Antenna (AIR-ANT5160NP-R)

Cisco Aironet 5-GHz MIMO 6-dBi Patch Antenna (AIR-ANT5160NP-R) Cisco Aironet 5-GHz MIMO 6-dBi Patch Antenna (AIR-ANT5160NP-R) This document outlines the specifications for the Cisco Aironet 5-GHz MIMO 6-dBi Patch Antenna (AIR-ANT5160NP-R) and provides instructions

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business RV 120W Wireless-N VPN Firewall CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase,

More information

Cisco Unified Communications 500 Series Model 560 for Small Business

Cisco Unified Communications 500 Series Model 560 for Small Business Cisco Unified Communications 500 Series Model 560 for Small Business Platform Reference Guide 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Contents Product Overview

More information

Integrating CAD with Thin Client and Virtual Desktop Environments

Integrating CAD with Thin Client and Virtual Desktop Environments Integrating CAD with Thin Client and Virtual Desktop Environments CAD for Cisco Unified Contact Center Express, releases 6.2 10.5 CAD for Cisco Unified Contact Center Enterprise, releases 7.0 10.0 First

More information

User Guide for Cisco Unified MeetingPlace Web Conferencing

User Guide for Cisco Unified MeetingPlace Web Conferencing User Guide for Cisco Unified MeetingPlace Web Conferencing Release 5.4 Revised August, 2007 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

Cisco Unified IP Phone 6901 and 6911 User Guide for Cisco Unified Communications Manager 8.0 (SCCP)

Cisco Unified IP Phone 6901 and 6911 User Guide for Cisco Unified Communications Manager 8.0 (SCCP) Cisco Unified IP Phone 6901 and 6911 User Guide for Cisco Unified Communications Manager 8.0 (SCCP) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1)

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) First Published: June 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA

More information

Data Center Infrastructure Design Guide 2.1 Readme File

Data Center Infrastructure Design Guide 2.1 Readme File Data Center Infrastructure Design Guide 2.1 Readme File Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Cisco UCS B-Series Blade Servers Windows Installation Guide

Cisco UCS B-Series Blade Servers Windows Installation Guide Cisco UCS B-Series Blade Servers Windows Installation Guide October 06, 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Cisco Unified CallConnector for Microsoft Office Troubleshooting Guide

Cisco Unified CallConnector for Microsoft Office Troubleshooting Guide Cisco Unified CallConnector for Microsoft Office Troubleshooting Guide First Published: April 2007 Last Updated: April 2007 OL 13005-01 In this document you will find basic information that will help you

More information

Cisco Unified Videoconferencing 5100 & 5200 Series Products

Cisco Unified Videoconferencing 5100 & 5200 Series Products Cisco Unified Videoconferencing 5100 & 5200 Series Products Cisco Unified Videoconferencing 7.0 High-Definition Video Conferencing Solution for Cisco Unified Communications Product Overview Cisco Unified

More information

Chapter 5 Configuring the Remote Access Web Portal

Chapter 5 Configuring the Remote Access Web Portal Chapter 5 Configuring the Remote Access Web Portal This chapter explains how to create multiple Web portals for different users and how to customize the appearance of a portal. It describes: Portal Layouts

More information

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS) NetVanta 2000 Series Technical Note How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS) This document is applicable to NetVanta 2600 series, 2700 series,

More information

Cisco IronPort X1070 Email Security System

Cisco IronPort X1070 Email Security System Cisco IronPort X1070 Email Security System THE ULTIMATE EMAIL SECURITY SYSTEM FOR THE WORLD S MOST DEMANDING NETWORKS. As the battle to protect the email perimeter continues, two predominant trends emerge:

More information

Cisco ASA 5505 Getting Started Guide

Cisco ASA 5505 Getting Started Guide Cisco ASA 5505 Getting Started Guide Software Version 7.2 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information