Toolbox Overview Guide Extensive Testing

Size: px
Start display at page:

Download "Toolbox Overview Guide Extensive Testing"

Transcription

1 Summary Agent and probe introduction... 2 Parameters of connection on Windows... 4 Parameters of connection to the test center on Windows... 4 Start and stop an agent or probe on Windows... 5 Start and stop an agent on Linux... 6 Start/Stop a probe on Linux... 7 Open external IDE... 8 Author: Denis Machard Date: 10/09/2015 Version: 1.3 1

2 Agent and probe introduction Agent or probes are used to communicate remotely with the system under test (SUT and are controlled by the test center. Agents or probseare configured automatically to start on boot of the computer. One agent or one probe can be deployed on Windows or Linux. The agent or probe use the port tcp/443 to communicate with the test center over the following protocols: WebSocket and HTTPS. Agent or probes must be registered to the test center, the name must be unique. Message sent from the test center to agent: «Init» : initialization message «Notify» : notification message «Reset» : reset message Messages sent from agent to the test center: «Error» : error message «Data» : data message «Notify» : notification message Available agents: «dummy» : agent for example only «socket» : communicate on network over TCP/UDP and SSL «ftp» : communicate with ftp server «sikulix» : integration of the «Sikuli» project: «selenium» : integration of the «Selenium» project: «soapui» : integration of the «SoapUI» project: «command» : execute system commands «file» : read file on system «command» : execute system commands gateway-sms : send or received texto 2

3 Commands sent from the test center to the probe: «Start» : start a probe «Stop» : stop a probe All type of probes available: «dummy» : example «textual» : tailf on text file «network» : network probe «file» : files collect 3

4 Parameters of connection on Windows 1. Set the name of the agent or probe, this name must be unique 2. Select the agent or probe type to start 3. Set a small description, it s optional. All agent or probes types availables Parameters of connection to the test center on Windows 1. Set the address of your test center 2. Check the following option «Use a HTTPS proxy server» if a proxy is needed. 4

5 Start and stop an agent or probe on Windows Click on the button «Deploy» to start an agent or the probe. The registration is automatic. The result of the registration is displayed on the logs viewer. A new tab appears with the name of the agent or probe. You can click on the button Terminate to stop it. 5

6 Start and stop an agent on Linux 1. Run the script «./toolagent» to start one agent from the command line #./toolagent Command line agent launcher Usage:./agent [test-server-ip] [test-server-port] [ssl-support] [dummy socket ftp sikuli selenium soapui command file] [agent-name] [agentdescription] [[proxy-ip] [proxy-port]] * Server parameters [test-server-ip]: your test server ip or hostname. This option is mandatory. [test-server-port]: your test server port. This option is mandatory. [ssl-support=true/false]: ssl support. This option is mandatory. * Agents parameters [Values expected: dummy socket ftp sikuli command file]: agent type to start. This option is mandatory. [agent-name]: The agent name. This option is mandatory. [agent-description]: The agent description. This option is mandatory. * Proxy parameters [proxy-ip]: proxy address. This option is optional. [proxy-port]: proxy port. This option is optional. 6

7 Start/Stop a probe on Linux 1. Run the script«./toolprobe» to start a probe from Linux #./toolprobe Command line probe launcher Usage:./probe [test-server-ip] [test-server-port] [ssl-support] [dummy textual network file] [probe-name] [probe-description] [[proxy-ip] [proxy-port]] * Server parameters [test-server-ip]: your test server ip or hostname. This option is mandatory. [test-server-port]: your test server port. This option is mandatory. [ssl-support=true/false]: ssl support. This option is mandatory. * Probes parameters [Values expected: dummy textual network file]: probe type to start. This option is mandatory. [probe-name]: The probe name. This option is mandatory. [probe-description]: The probe description. This option is mandatory. * Proxy parameters [proxy-ip]: proxy address. This option is optional. [proxy-port]: proxy port. This option is optional. 7

8 Open external IDE 1. Select the type agent Sikuli or SoapUI on the combo list 2. Click on the button Open IDE to open the external IDE 8

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Biznet GIO Cloud Connecting VM via Windows Remote Desktop Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without

More information

Trend Micro Worry-Free Remote Manager Agent Installation Guide

Trend Micro Worry-Free Remote Manager Agent Installation Guide Trend Micro Worry-Free Remote Manager Agent Installation Guide Agent Installation Guide The Agent Installation Guide contains information about the Worry-Free Remote Manager (WFRM) agent installation process

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered

More information

For Internet Facing and Private Data Systems

For Internet Facing and Private Data Systems For Internet Facing and Private Data Systems Audience Prerequisites Course Overview Day 1 Section 1: Functionality and Purpose Day 2 Section 2: Policies and Alerts Section 3: Live Lab 2 Lab Setup Course

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

NAS 224 Remote Access Manual Configuration

NAS 224 Remote Access Manual Configuration NAS 224 Remote Access Manual Configuration Connect to your ASUSTOR NAS through the Internet A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Configure

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

NAS 272 Using Your NAS as a Syslog Server

NAS 272 Using Your NAS as a Syslog Server NAS 272 Using Your NAS as a Syslog Server Enable your NAS as a Syslog Server to centrally manage the logs from all network devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this

More information

Support Guide: Managing the Subject machine s Firewall.

Support Guide: Managing the Subject machine s Firewall. Support Guide: Managing the Subject machine s Firewall. Note: This guide assumes you have successfully deployed F-Response to the subject/target machine. If not, then we recommend you look at one of the

More information

How to integrate Verax NMS & APM with Verax Service Desk

How to integrate Verax NMS & APM with Verax Service Desk How to integrate Verax NMS & APM with Verax Service Desk Table of contents Abstract... 3 1. Configuring Service Desk notification profile in Verax Administrator Console... 4 2. Configuring incident categories

More information

TECHNICAL CONDITIONS REGARDING ACCESS TO VP.ONLINE. User guide. vp.online 2011 2011-10-01

TECHNICAL CONDITIONS REGARDING ACCESS TO VP.ONLINE. User guide. vp.online 2011 2011-10-01 TECHNICAL CONDITIONS REGARDING ACCESS TO VP.ONLINE vp.online 2011 2011-10-01 Contents 1 PROBLEMS SEEING VP.ONLINE... 3 2 BROWSER CONFIGURATION... 6 3 WRITE ACCESS TO DISK DRIVE... 7 4 SESSION TIMEOUT AND

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

How to Program a Commander or Scout to Connect to Pilot Software

How to Program a Commander or Scout to Connect to Pilot Software How to Program a Commander or Scout to Connect to Pilot Software Commander and Scout are monitoring and control products that can transfer physical environmental conditions and alarm sensor electrical

More information

Remote Desktop In OpenSUSE 10.3

Remote Desktop In OpenSUSE 10.3 Only for dummies Remote Desktop In OpenSUSE 10.3 Remote access to Linux GUI Environment from Windows Client Tedy Tirtawidjaja 5/14/2008 In Microsoft Windows environment we know Remote Desktop application

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

How to install and use CrossTec Remote Control or SchoolVue in a Virtual and or Terminal Service environment

How to install and use CrossTec Remote Control or SchoolVue in a Virtual and or Terminal Service environment How to install and use CrossTec Remote Control or SchoolVue in a Virtual and or Terminal Service environment 1 P a g e CrossTec Corporation 500 NE Spanish River Blvd. Suite 201 Phone 800.675.0729 Fax 561.391.5820

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

Using LifeSize systems with Microsoft Office Communications Server 2007. Server Setup

Using LifeSize systems with Microsoft Office Communications Server 2007. Server Setup Using LifeSize systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server

More information

SSL (Secure Socket Layer)

SSL (Secure Socket Layer) eztcp Application Note SSL (Secure Socket Layer) Version 1.2 Sollae Systems Co., Ltd. http://www.eztcp.com Contents 1 INTRODUCTION...- 2-1.1 SSL (Secure Socket Layer)...- 2-1.2 SSL with the eztcp... -

More information

Polycom Phones User Guide. 2003-2012 Bicom Systems

Polycom Phones User Guide. 2003-2012 Bicom Systems I Table of Contents Part I Introduction 1 Part II Requirements 1 Part III Installation 2 1 Power... Adapter 3 2 Power... over Ethernet (PoE) 3 3 Factory... Settings 3 3 Part IV Registering Phone 1 Manual...

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

Configuring Security for FTP Traffic

Configuring Security for FTP Traffic 2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Elluminate Live! Access Guide. Page 1 of 7

Elluminate Live! Access Guide. Page 1 of 7 This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram

More information

To install the SMTP service:

To install the SMTP service: To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click

More information

University of Central Florida UCF VPN User Guide UCF Service Desk

University of Central Florida UCF VPN User Guide UCF Service Desk University of Central Florida UCF VPN User Guide UCF Service Desk Table of Contents UCF VPN... 1 Cisco AnyConnect SSL Client... 2 Installation... 2 Starting New Sessions... 4 Ending a VPN Session... 5

More information

REMOTE ACCESS DDNS CONFIGURATION MANUAL

REMOTE ACCESS DDNS CONFIGURATION MANUAL REMOTE ACCESS DDNS CONFIGURATION MANUAL Analog DVR Series 1 www.mezory.com INTRODUCTION TO REMOTE ACCESS As the World sinks into one global village, reliable connectivity is one of the most demanding facilities

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

NAS 109 Using NAS with Linux

NAS 109 Using NAS with Linux NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on

More information

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Open Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next.

Open Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next. Server Type: POP3 or IMAP Incoming(POP3 or IMAP) Mail Server: student.ncnm.edu POP3 Port: 995 (SSL) IMAP Port: 993 (SSL) Outgoing(SMTP) Mail Server: student.ncnm.edu SMTP Port: 587 (TLS) (Users must change

More information

Managing the System Event Log

Managing the System Event Log Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers

More information

Dragonframe License Manager User Guide Version 1.2.2

Dragonframe License Manager User Guide Version 1.2.2 Dragonframe License Manager User Guide Version 1.2.2 The Dragonframe License Manager (DFLM) provides floating license management for Dragonframe 3.0 and above. You must contact support (support@dragonframe.com)

More information

Smart Call Home Quick Start Configuration Guide

Smart Call Home Quick Start Configuration Guide . Quick Start Guide Smart Call Home Quick Start Configuration Guide Cisco Unified Computing System Cisco Smart Call Home is an automated support capability that provides continuous monitoring, proactive

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

Wakanda Studio Features

Wakanda Studio Features Wakanda Studio Features Discover the many features in Wakanda Studio. The main features each have their own chapters and other features are documented elsewhere: Wakanda Server Administration Data Browser

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH ADOBE ACROBAT CONNECT PROFESSIONAL

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH ADOBE ACROBAT CONNECT PROFESSIONAL DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH ADOBE ACROBAT CONNECT PROFESSIONAL Deploying the BIG-IP LTM system with Adobe Acrobat Connect Professional Welcome to the F5 - Adobe Acrobat Connect

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972A: Administering the Web Server (IIS) Role of Windows Server Course Details Course Outline Module 1: Overview and Installing Internet Information Services In this module students will learn

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

VMware vcenter Support Assistant 5.1.1

VMware vcenter Support Assistant 5.1.1 VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following

More information

Security Guidelines for MapInfo Discovery 1.1

Security Guidelines for MapInfo Discovery 1.1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................

More information

Sophos UTM. Remote Access via PPTP Configuring Remote Client

Sophos UTM. Remote Access via PPTP Configuring Remote Client Sophos UTM Remote Access via PPTP Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Managing the System Event Log

Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers in a Chassis, page 2 Configuring

More information

Integrate Websense Web Security Gateway (WSG)

Integrate Websense Web Security Gateway (WSG) Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions

More information

Background (http://ha.ckers.org/slowloris)

Background (http://ha.ckers.org/slowloris) CS369/M6-109 Lab DOS on Apache Rev. 3 Deny Of Service (DOS): Apache HTTP web server DOS attack using PERL script Background (http://ha.ckers.org/slowloris) The ideal situation for many denial of service

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

Security IIS Service Lesson 6

Security IIS Service Lesson 6 Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and

More information

Microsoft Labs Online

Microsoft Labs Online Microsoft Labs Online Self-Service Student Guide Welcome to Microsoft Labs Online powered by Xtreme Velocity. This document provides stepby-step instructions on how to: Create an account. Use your virtual

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

Fasthosts Internet Parallels Plesk 10 Manual

Fasthosts Internet Parallels Plesk 10 Manual Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...

More information

SBBWU PROXY SETTING IT CENTRE How to Set a Proxy Server in All Major Internet Browsers for Windows

SBBWU PROXY SETTING IT CENTRE How to Set a Proxy Server in All Major Internet Browsers for Windows SBBWU PROXY SETTING IT CENTRE How to Set a Proxy Server in All Major Internet Browsers for Windows If you take your laptop to lots of places, including corporate networks that use proxy servers, you need

More information

Elluminate Live! Access Guide. Page 1 of 7

Elluminate Live! Access Guide. Page 1 of 7 This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document

More information

Web Server XX220-11-00. Configuration Guide

Web Server XX220-11-00. Configuration Guide Configuration Guide XX220-11-00 Web Server Vicon Industries Inc. Tel: 631-952-2288 Fax: 631-951-2288 Toll Free: 800-645-9116 24-Hour Technical Support: 800-34-VICON (800-348-4266) UK: 44/(0) 1489-566300

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

IBM WebSphere Application Server Communications Enabled Applications Setup guide

IBM WebSphere Application Server Communications Enabled Applications Setup guide Copyright IBM Corporation 2009, 2011 All rights reserved IBM WebSphere Application Server Communications Enabled Applications Setup guide What this exercise is about... 1 Lab requirements... 2 What you

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Quick Start Guide. Hosting Your Domain

Quick Start Guide. Hosting Your Domain Quick Start Guide Hosting Your Domain http://www.names.co.uk/support/ Table of Contents Web Hosting... 3 FTP (File Transfer Protocol)... 3 File Manager... 6 SiteMaker... 7 2 Please keep these documents

More information

MultiSite Manager. Using HTTPS and SSL Certificates

MultiSite Manager. Using HTTPS and SSL Certificates MultiSite Manager Using HTTPS and SSL Certificates Contents 1. Using HTTPS... 2 What is HTTPS... 2 Where to implement HTTPS... 2 MultiSite Manager HTTPS (TSL/SSL) options... 2 2. How to enable HTTPS in

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Linux Squid Proxy Server

Linux Squid Proxy Server Linux Squid Proxy Server Descriptions and Purpose of Lab Exercise Squid is caching proxy server, which improves the bandwidth and the reponse time by caching the recently requested web pages. Now a days

More information

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5 Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

OCS Virtual image. User guide. Version: 1.3.1 Viking Edition

OCS Virtual image. User guide. Version: 1.3.1 Viking Edition OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...

More information

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016 ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011 Quick Note 026 Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server Digi International Technical Support December 2011 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...

More information

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Phone Network Gateway Android Application. User Guide

Phone Network Gateway Android Application. User Guide Phone Network Gateway Android Application For Smartphones, PDAs and other hand-held devices which use Android 2.2 (or higher) Operating System User Guide Feb 2015 Page 1 of 16 Contents 1. Installation...

More information

1. How do I access my VPS control panel?

1. How do I access my VPS control panel? VPS Business FAQ Section 1: Installation...2 1. How do I access my VPS control panel?...2 2. How do I access my Windows VPS?...6 3. How do I access my Linux VPS?...8 Section 2: using a VPS...9 4. How to

More information

Installation Troubleshooting Guide

Installation Troubleshooting Guide Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.

Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview. Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2 Organizations can use the Barracuda Load Balancer to enhance the scalability and availability of their Microsoft Office Communications

More information

Cisco SSL Encryption Utility

Cisco SSL Encryption Utility About SSL Encryption Utility, page 1 About SSL Encryption Utility Unified ICM web servers are configured for secure access (HTTPS) using SSL. Cisco provides an application called the SSL Encryption Utility

More information

Important Notes for WinConnect Server ES Software Installation:

Important Notes for WinConnect Server ES Software Installation: Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation

More information

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) Installing and configuring Intelligent Power Protector On Xen Virtualized Architecture Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) 1 Introduction... 3 1. Citrix

More information

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup 1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already

More information

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this

More information