SSL VPN Technology White Paper

Size: px
Start display at page:

Download "SSL VPN Technology White Paper"

Transcription

1 SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and application scenarios. Acronyms: Acronym AD CA HTTPS LDAP RADIUS SMB SSL VPN Full spelling Active Directory Certificate Authority HTTP Security Lightweight Directory Access Protocol Remote Authentication Dial-In User Service Server Message Block Secure Sockets Layer Virtual Private Network Hewlett-Packard Development Company, L.P. 1

2 Table of Contents Overview 3 Background 3 Benefits 3 SSL VPN Implementation 4 Concepts 4 SSL VPN System Components 5 Operation of SSL VPN 6 SSL VPN Access Modes 8 Web Access 9 TCP Access 10 IP Access 11 Comware V5 Technical Characteristics 12 Clients Requiring No Manual Installation and Maintenance 12 Support for Multiple Authentication Methods 13 Rich and Flexible Security Policies 13 Granular Resource Access Control 13 Application Scenarios 14 Remote Access 14 SSL VPN Gateway Sharing Application Scenario 15 SSL VPN Networking Modes 16 Hewlett-Packard Development Company, L.P. 2

3 Overview Background With the popularity of the Internet and fast development of E-commerce, more and more enterprises and organizations need to allow employees, users, and partners to access the internal resources from any place at any time, so as to save time and improve efficiency. However, some users may be illegal and some remote hosts may not be secure, bringing potential security threats to internal networks. Security VPN (SVPN) technologies are commonly used to solve this problem. They provide a secure access mechanism, which can well protect the internal networks resources. SVPN technologies mainly include IPsec VPN and SSL VPN. Due to the limitations in way of implementing IPsec VPN, IPsec VPN has the following disadvantages. It requires complicated client software installation on user hosts. There are various user hosts, which are often mobile. The mobility requires fast client-side VPN deployment, while the diversity requires the VPN client software to support multiple platforms and be easy to upgrade and maintain. However, IPsec VPN cannot satisfy the above requirements. IPsec VPN cannot evaluate the security of user hosts. If users use insecure hosts to access the corporate network, the corporate network may be infected by viruses. IPsec VPN cannot provide strict and granular access control. As IPsec is implemented at the network layer and cannot identify contents of the IP packets, it cannot control access requests from higher layers. In addition, to improve efficiency, enterprises need to establish extranets to exchange information and share resources with partners. Therefore, the enterprises need to control accesses of the partners effectively and strictly to ensure security of the enterprise information system. However, IPsec VPN cannot control access rights. IPsec VPN is difficult to be deployed in complicated networking environments. For example, in a scenario using NAT, you need to configure NAT traversal for IPsec VPN; in a scenario using firewalls, you need to configure the firewalls to permit IPsec packets to pass, for IPsec headers are added in front of the original TCP/UDP headers. Benefits In a word, IPsec VPN is suitable for scenarios where connections are fixed and strict access control is not required. It cannot satisfy the requirements of mobile accesses and precise access control. Compared with IPsec VPN, SSL VPN can better satisfy the technical and management requirements of remote access. SSL VPN supports multiple platforms, requires no manual installation and maintenance of clients, and provides flexible and effective access right management. Therefore it is more and more popular in the remote access market. The following section details the advantages of SSL VPN. SSL VPN is a VPN technology based on Secure HTTP (HTTPS, that is, SSL-supported HTTP). Using the certificate-based identity authentication, data encryption and integrity verification mechanisms that the SSL protocol provides, SSL VPN can establish secure connections for remote users to access the corporate network. SSL VPN features these advantages: Hewlett-Packard Development Company, L.P. 3

4 Support for various application protocols. SSL works between the transport layer and the application layer. Any application can be secured by SSL VPN without knowing the details of SSL VPN. Support for various software platforms. At present, SSL has become a global standard for identity authentication of websites and webpage viewers and encrypted communication between Web browsers and Web servers. The SSL protocol has been integrated into most of the browsers, such as IE, Netscape, and Firefox. This means that almost every PC installed with a browser supports SSL connections. SSL VPN clients are based on the SSL protocol. Hence, most of the software running environments can act as the SSL VPN client. Automatic installation and uninstallaion of the client software. In applications where specific client software is required, SSL VPN allows the operating system to download and install the client software automatically and, when the SSL VPN connection is closed, uninstall and delete the client software automatically. Security evaluation of client hosts. SSL VPN can evaluate the security status of remote hosts, so as to determine whether the remote hosts are safe enough to access the enterprise network. Dynamic authorization. Traditional right control authorizes users mainly by user identity. A user is always authorized with the same right no matter where the user is when logging in to the network. This authorization mode is called static authorization. Dynamic authorization authorizes a user based on not only the user identity but also the security status of the host used by the user. This allows dynamic control of the user access right. The more secure the remote host is, the higher access right the SSL VPN will grant the user. Multiple user authentication methods and granular access control. The SSL VPN gateway supports various user authentication methods and granular access control, implementing controlled access of external users to the internal resources. Deploying SSL VPN does not impact the existing network. As the SSL protocol works over the transport layer, it does not change the IP header or TCP header. Therefore, SSL packets are transparent for NAT. Meanwhile, SSL always uses port 443. You just need to open port 443 on firewalls instead of modifying settings on the firewalls according to different application protocols. This not only reduces the workload of network administrators but also improves the network security. Independent resource access control of domains sharing the same SSL VPN gateway. SSL VPN allows enterprises or departments of an enterprise share an SSL VPN gateway, so as to reduce costs. In this case, you can configure multiple domains on the gateway, each of which is for a single enterprise or department to control its resources and users independently. By creating multiple domains, you can divide a physical SSL VPN gateway into several logical SSL VPN gateways. SSL VPN Implementation Concepts SSL VPN users include super administrators, domain administrators, and common users. Hewlett-Packard Development Company, L.P. 4

5 Super administrator: Manager of the entire SSL VPN gateway. A super administrator can create domains and set the passwords of domain administrators. Domain administrator: Manager of an SSL VPN domain. A domain administrator can create local users and resources, and specify the access right for the users. Common SSL VPN user: Simply called user, referring to users accessing network resources through the SSL VPN system. The resource access right of a user is assigned by the domain administrator. SSL VPN System Components Figure 1 Architecture of SSL VPN Figure 1 shows a typical SSL VPN network. The SSL VPN system consists of the following components: Remote host: Terminal from which an administrator or user log in to the network, such as a PC, mobile phone, and PDA. SSL VPN gateway: An important component of the SSL VPN system. Administrators maintain the information of users and internal resources on the SSL VPN gateway. Users can view the resources that can be accessed on the SSL VPN gateway. The SSL VPN gateway forwards packets between remote hosts and the internal servers. An SSL connection is established between the SSL VPN gateway and a remote host to ensure the security of data transmission. Internal servers: Servers of any type, for example, Web server and FTP server; or hosts in the enterprise network that need to communicate with a remote host. CA: Certificate authority. CA issues a digital certificate, which contains the public key, for the SSL VPN gateway. This is for the SSL VPN gateway to pass identity authentication on the remote host and establish an SSL connection with the remote host. Authentication server: External authentication server for remote user authentication. The SSL VPN gateway supports not only local user authentication but also remote user authentication through an external authentication server. Hewlett-Packard Development Company, L.P. 5

6 Operation of SSL VPN The following describes the operation of SSL VPN: The supper administrator creates domains on the SSL VPN gateway. The domain administrators create users and resources corresponding to the internal servers on the SSL VPN gateway. Users access the internal servers through the SSL VPN gateway. Creating domains Figure 2 Creates domains Super admininstrator SSL VPN gateway Internal servers Internet LAN 1) Establish an SSL connection with the SSL VPN gateway and enter the login page of the SSL VPN gateway 2) Input the username and password to pass authentication and enter the Web interface of the SSL VPN gateway 3) Create domains on the SSL VPN gateway As shown in Figure 2, a supper administrator goes through three steps to create domains: 1. Input the URL address of the SSL VPN gateway on the remote host, which will authenticate the identity of the SSL VPN gateway by the certificate of the gateway and establish an SSL connection with the SSL VPN gateway. After the SSL connection is established successfully, the login page of the SSL VPN gateway Web interface appears. 2. Input the username (including the authentication method) and password on the login page of the SSL VPN gateway Web interface. The SSL VPN gateway will authenticate the super administrator by using the input information. After passing the identity authentication, the super administrator enters the Web interface of the SSL VPN gateway. 3. Create domains on the SSL VPN gateway and set the passwords of the domain administrators. Hewlett-Packard Development Company, L.P. 6

7 Creating users and resources corresponding to the internal servers Figure 3 Create users and resources corresponding to the internal servers As shown in Figure 3, a domain user goes through the following three steps to create users and resources corresponding to the internal servers: 1. Input the URL address of the SSL VPN gateway on the remote host, which will authenticate the identity of the SSL VPN gateway by the certificate of the gateway and establish an SSL connection with the SSL VPN gateway. After the SSL connection is established successfully, the login page of the SSL VPN gateway Web interface appears. 2. Input the username (including the authentication method) and password on the login page of the SSL VPN gateway Web interface. The SSL VPN gateway will authenticate the domain administrator by using the input information. After passing the identity authentication, the domain administrator enters the Web interface of the SSL VPN gateway. 3. Create users and resources corresponding to the internal servers, and specify the resource access rights for the users. Hewlett-Packard Development Company, L.P. 7

8 Accessing internal servers Figure 4 Access internal servers As shown in Figure 4, a user goes through the following steps to access the internal servers: 1. Input the URL address of the SSL VPN gateway on the remote host, which will authenticate the identity of the SSL VPN gateway by the certificate of the gateway and establish an SSL connection with the SSL VPN gateway. After the SSL connection is established successfully, the login page of the SSL VPN gateway Web interface appears. 2. Input the username (including the authentication method) and password. The SSL VPN gateway will authenticate the user identity by using the input information. After passing the identity authentication, the user enters the Web interface of the SSL VPN gateway. 3. View the list of available resources, such as Web server resources and file sharing resources. 4. Select the resource to access and send the access request to the SSL VPN gateway through the SSL connection. 5. The SSL VPN gateway resolves the request, checks the access right of the user and, if the user is authorized to access the resource, forwards the request to the corresponding server in plaintext. 6. The server sends the reply in plaintext to the SSL VPN gateway. 7. After receiving the reply, the SSL VPN gateway forwards the reply to the user through the SSL connection. SSL VPN Access Modes SSL VPN provides three access modes: Hewlett-Packard Development Company, L.P. 8

9 Web access TCP access IP access Users can use different access modes to access different types of resources. In different access modes, the data forwarding procedures between the remote host, SSL VPN gateway, and internal servers are different. The following sections describe the three access modes in details. Web Access Web access allows users to access server resources through the SSL VPN gateway by using browsers in HTTPS mode. In this mode, all data operations are performed on Web pages. Resources for web-based accesses include Web server resources and file sharing resources. Web server resources Web servers provide services to users through Web pages. Users can get the desired information by simply clicking the links on the pages. SSL VPN provides secure connections for users to access Web servers and can prevent illegal users from accessing the protected Web servers. Figure 5 Access Web server resources As shown in Figure 5, during Web server access, the SSL VPN gateway mainly acts as a relay. 1. After receiving the HTTP request from a user, the SSL VPN gateway finds the required resource according to the URL in the HTTP request, and then forwards the HTTP request to the Web server that provides the required resource. 2. After receiving the HTTP reply from the server, the SSL VPN gateway changes the webpage links pointing to the internal network to links pointing to the SSL VPN gateway before forwarding it to the user, so that the user has to access the internal resources through the SSL VPN gateway. In this way, the SSL VPN gateway protects the security of the internal network and implements access control of users. During the whole process, in the perspective of the user, all HTTP replies are from the SSL VPN gateway; while in the perspective of the Web server, all HTTP requests are initiated by the SSL VPN gateway. File sharing resources File sharing is a common network application. An example is the application of Shared Documents folder provided by the Windows operating system. File sharing allows users to perform file operations on a remote server or host, such as browsing files and uploading and downloading files. The SSL VPN gateway provides the file sharing resources to users through Web. As shown in Figure 6, the SSL VPN gateway acts as the protocol converter between the remote host and the file server. Hewlett-Packard Development Company, L.P. 9

10 1. The remote host and the SSL VPN gateway communicate through HTTPS. The remote host sends the user request of accessing file sharing resources to the SSL VPN gateway through an HTTPS packet. 2. The SSL VPN gateway and the file server communicate through SMB. After receiving the request packet from the remote host, the SSL VPN gateway converts it into an SMB packet and then sends the packet to the filer server. 3. After receiving the reply packet from the file server, the SSL VPN gateway converts the packet into an HTTPS packet and then sends the packet to the remote host. Figure 6 Access shared file resources TCP Access TCP access is used to support TCP applications on remote hosts to access open ports on internal servers securely. TCP access allows users to access any TCP-based services, including remote access services (such as Telnet), desktop sharing services, and mail services. To access internal servers in TCP access mode, users do not need to upgrade existing TCP programs. However, a dedicated TCP access client is required. The client uses an SSL connection to transmit the application layer data. As shown in Figure 7, a user goes through the following steps to access TCP-based services: 1. Launch TCP application on the remote host, which automatically downloads the TCP access client software from the SSL VPN gateway. 2. Click a resource link on the Web interface of the SSL VPN gateway or launches a TCP program, such as opening the remote desktop connection program to connect to an internal server, the TCP access client will automatically establish an SSL connection with the SSL VPN gateway and use an extended HTTP message to request access to the resource. 3. The SSL VPN gateway establishes a TCP connection with the internal server that provides the resource. 4. After the TCP connection is established successfully, the TCP access client sends the user access data to the SSL VPN gateway through the SSL connection. Then, the SSL VPN gateway obtains the application layer data and sends the data to the internal server through the TCP connection. 5. After receiving the reply from the internal server, the SSL VPN gateway forwards the reply to the TCP access client through the SSL connection. The client will then obtain the reply data and forward the data to the application program. Hewlett-Packard Development Company, L.P. 10

11 Figure 7 Access internal servers in TCP access mode Host SSL VPN gateway Application server SSL Application TCP access client SSL VPN gateway Internal server Connection establishment Data transmission 1) Initiate a TCP connection 6) TCP connection established 7) Send application layer data 12) Forward the reply to the application 2) Establish an SSL connection with the SSL VPN gateway and then send an extended HTTP message to request access to a resource 5) Return a message to inform the client of the success 8) Forward the application layer data to the SSL VPN gateway through the SSL connection 11) Send the reply to the client through the SSL connection 3) Establish a TCP connection with the internal server 4) TCP connection established successfully 9) Forward the application layer data to the internal server through the internal network 10) Reply IP Access IP access is used to implement secure communication between a remote host and an internal server at the network layer, and thereby, it implements all IP-based intercommunication between remote hosts and internal servers. For example, ping an internal server from a remote host. When a user accesses an internal server in IP access mode, a dedicated IP access client is required, which will install a virtual network interface card (VNIC) on the remote host. As shown in Figure 8, a user goes through the following steps to access IP-based resources. 1. Launch the IP application on the remote host, which then automatically downloads the IP access client software from the SSL VPN gateway. Then, the IP access client establishes an SSL connection with the SSL VPN gateway, installs a VNIC on the host, requests an IP address for the VNIC, sets the gateway IP address, and installs routes with the outbound interfaces being the VNIC. 2. Click a resource link on the Web interface of the SSL VPN gateway or execute an IP access command, such as the ping command, to access an IP network resource, the IP packet will be routed to the VNIC, and then encapsulated and sent by the VNIC to the SSL VPN gateway through the SSL connection. 3. After receiving the packet, the SSL VPN gateway de-encapsulates the packet into the IP packet and sends the IP packet to the corresponding server. Hewlett-Packard Development Company, L.P. 11

12 4. After receiving a reply from the server, the SSL VPN gateway encapsulates the reply packet and then sends the packet to the IP access client through the SSL connection. 5. The client de-encapsulates the packet and then delivers the IP packet through the VNIC to the host for processing. Figure 8 Access internal servers in IP access mode Comware V5 Technical Characteristics Clients Requiring No Manual Installation and Maintenance The client software running on remote hosts includes: SSL-supporting Web browser: At present, most operating systems provide browsers that support SSL. Hence, users can use such browsers to access internal servers in Web mode Host checker: Used to evaluate the security status of remote hosts. When a user logs in, the remote host will automatically download and install the host checker. Cache cleaner: When a user quits the SSL VPN system, the cache cleaner clears the temporary files, configuration files and downloaded client software used during the SSL VPN communication, avoiding system information leakage. When a user logs in, the remote host will automatically download and install the cache cleaner. Hewlett-Packard Development Company, L.P. 12

13 TCP access client: Client software used in TCP access mode. IP access client: Client software used in IP access mode. Except the Web browsers, other client software is all to be downloaded from the SSL VPN gateway. The client software requires no manual installation and maintenance. They are downloaded, installed, configured, and used to establish connections automatically. Support for Multiple Authentication Methods SSL VPN supports four authentication methods: Local authentication: The network administrator configures local users on the SSL VPN gateway. The SSL VPN gateway authenticates a user by comparing the input username and password with those locally saved. RADIUS authentication: User information is saved on the RADIUS server. The SSL VPN gateway serves as the RADIUS client and exchanges authentication messages with the RADIUS server to authenticate users. LDAP authentication: User information is saved on the LDAP server. The SSL VPN gateway serves as the LDAP client to query user information on the LDAP server to authenticate users. Active Directory (AD) authentication: LDAP authentication implemented by Microsoft. A user uses a browser to enter the login page of the Web interface of the SSL VPN gateway, inputs the username, password, and authentication method, and then the information will be sent to the SSL VPN gateway through an SSL connection, ensuring the security of data transmission. After the SSL VPN gateway receives the login information, it authenticates the user according to the authentication method. The authentication methods provided by the SSL VPN gateway are simple, universal, and of good extensibility. Rich and Flexible Security Policies Insecure remote hosts may bring potential security threats to the internal network. Host checking is a good practice to avoid such threats. When a host logs in to the SSL VPN gateway, the host checker can check the host s operating system and its patches, version and patches of the browser, version of the firewall, and version of the anti-virus software, and then determines which resources the host can access based on the checking results. You can configure security policies on the SSL VPN gateway, so as to configure the security checking method, define the checking items, and specify the protected resources, ensuring that only remote hosts that satisfy the security policies can access the corresponding resources. Granular Resource Access Control The resource access control mechanism of SSL VPN can control user access rights flexibly, implementing granular resource access control. A super administrator creates domains and specifies passwords for the domain administrators. The domain administrators create resources and users of their own domains, add resources into resource Hewlett-Packard Development Company, L.P. 13

14 groups, add users into user groups, and then specify the resource groups that can be accessed by each user group. In addition, the SSL VPN gateway can perform security checking on remote hosts. After a user logs in, the SSL VPN gateway determines the resource groups allowed to be accessed by the user based on the security checking results and the user groups to which the user belongs. In this way, the SSL VPN gateway implements flexible and granular resource access control. Application Scenarios Remote Access Figure 9 Network diagram for remote access application Mobile employee Network access terminal Mobile phone SSL VPN gateway Internet Partner Enterprise network Dwelling house Hotel As shown in Figure 9, SSL VPN has many advantages in remote access application. It is suitable for various complicated networking scenarios. Compared with IPsec VPN, SSL VPN is especially suitable for the following scenarios: Dynamic remote access: Users use various terminals to access the enterprise network through the Internet from any place at any time. Scenarios where remote hosts are not surely secure: Users use public computers in, for example, cybercafes or hotels to access the enterprise network. Public computers are insecure as they are more likely to be attacked and infected with viruses Users with different access rights: Remote users using the Extranet may be employees, partners, or other personnel. The resources that can be accessed by different users are different. Various running environments on remote terminals: Different remote terminals may use different operating systems and applications to access the enterprise network. Hewlett-Packard Development Company, L.P. 14

15 Figure 10 SSL VPN gateway serves as the ingress of the enterprise network As shown in Figure 10, the SSL VPN gateway can cooperate with the firewall to serve as the ingress of the enterprise network, protecting the enterprise network from being attacked. Figure 11 SSL VPN gateway protects important servers in the enterprise network As shown in Figure 11, the SSL VPN gateway can be used to protect only important internal servers from being attacked, without affecting other parts of the enterprise network. SSL VPN Gateway Sharing Application Scenario Figure 12 Network diagram for SSL VPN gateway sharing application Users of enterprise A LAN Network of enterprise A Internet SSL VPN gateway LAN Network of enterprise B Users of enterprise B Users of enterprise C LAN Network of enterprise C Enterprises can share a single SSL VPN gateway, each of which uses one domain of the SSL VPN gateway. The SSL VPN gateway allows these enterprises manage their own users independently, saving network costs for the enterprises. As shown in Figure 12, enterprises A, B, and C share the same SSL VPN gateway, using domain A, B, and C on the SSL VPN gateway respectively. Enterprise A manages Hewlett-Packard Development Company, L.P. 15

16 its own users and server resources in domain A, and configures its own security policies to ensure that users of enterprise A can access only the resources of enterprise A. enterprises B and C manage their users in the same way. SSL VPN Networking Modes According to the way in which the SSL VPN gateway is connected to the network, the SSL VPN networking modes fall into two types: dual-arm and single-arm. In dual-arm mode, the SSL VPN gateway resides between the internal network (or internal servers) and the external network, as shown in Figure 9, Figure 10, and Figure 11. The advantage of the dual-arm mode is that the SSL VPN gateway can provide full protection to the whole internal network or the internal servers. The downside is that the gateway, located at the exit of the internal network, may become a bottleneck of the network. Therefore, it must have high processing capability, availability, and reliability. Figure 13 Network diagram for sing-arm mode As shown in Figure 13, in sing-arm mode, the SSL VPN gateway acts as a proxy server for the communication between the remote host and the internal network. The advantage of the single-arm mode is that the SSL VPN gateway is not the bottleneck of the network as it is not deployed at the key path. However, the SSL VPN gateway cannot provide full protection to the internal network. Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Hewlett-Packard Development Company, L.P. 16

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

H3C SSL VPN RADIUS Authentication Configuration Example

H3C SSL VPN RADIUS Authentication Configuration Example H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

QuickSpecs. Models. Features and benefits Application highlights. HP 7500 SSL VPN Module with 500-user License

QuickSpecs. Models. Features and benefits Application highlights. HP 7500 SSL VPN Module with 500-user License Overview Models JD253A Key features High performance hardware encryption Thin client and browser based access Multiple access authentication methods Remote security status checking Low Running Cost Product

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

H3C SSL VPN Configuration Examples

H3C SSL VPN Configuration Examples H3C SSL VPN Configuration Examples Keywords: SSL, VPN, HTTPS, Web, TCP, IP Abstract: This document describes characteristics of H3C SSL VPN, details the basic configuration and configuration procedure

More information

FTP Server Configuration

FTP Server Configuration FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,

More information

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxies. Chapter 4. Network & Security Gildas Avoine Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

How to Configure Web Authentication on a ProCurve Switch

How to Configure Web Authentication on a ProCurve Switch An HP ProCurve Networking Application Note How to Configure Web Authentication on a ProCurve Switch Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring the ProCurve

More information

Remote Access for LAPD Users Using Aventail SSL VPN

Remote Access for LAPD Users Using Aventail SSL VPN Remote Access for LAPD Users Using Aventail SSL VPN About Aventail SSL VPN This document describes how to access the LAPD network remotely, using a technology called SSL (Secure Socket Layer) VPN (Virtual

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able

More information

HP Operations Orchestration Software

HP Operations Orchestration Software HP Operations Orchestration Software Software Version: 9.00 HP Project and Portfolio Management Integration Guide Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide HP ProLiant DL320 Firewall/VPN/Cache Server User Guide Running Microsoft Internet Security and Acceleration Server 2004 June 2005 (Third Edition) Part Number 341672-003 Copyright 2004, 2005 Hewlett-Packard

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

HP Service Manager Architecture and Security HP Software-as-a-Service

HP Service Manager Architecture and Security HP Software-as-a-Service HP Service Manager Architecture and Security HP Software-as-a-Service Introduction...2 Architecture...2 Infrastructure Setup...4 Security Setup...4 Customer Infrastructure Requirements...5 Introduction

More information

Enterprise Security Critical Standards Summary

Enterprise Security Critical Standards Summary Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Check Point Security Administrator R70

Check Point Security Administrator R70 Page 1 of 6 Check Point Security Administrator R70 Check Point Security Administration R70 Length Prerequisites 5 days* (recommended) Basic networking knowledge, knowledge of Windows Server and/or UNIX,

More information

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations Security Considerations for VPM and HP SIM Servers Introduction... 3 External patch acquisition... 4 Comparing

More information

IPS Attack Protection Configuration Example

IPS Attack Protection Configuration Example IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling

More information

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14 1. Introduction... 2 2. Remote Access via IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 2 2.2. Configuration of the Remote Client...13 2.2.1. Astaro User Portal: Getting Software and

More information

HP Quality Center. Software Version: 10.00. Microsoft Word Add-in Guide

HP Quality Center. Software Version: 10.00. Microsoft Word Add-in Guide HP Quality Center Software Version: 10.00 Microsoft Word Add-in Guide Document Release Date: February 2012 Software Release Date: January 2009 Legal Notices Warranty The only warranties for HP products

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Java Secure Application Manager

Java Secure Application Manager Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

SMTP PROXY SERVER INSTALLATION FOR HP QUICKPAGE

SMTP PROXY SERVER INSTALLATION FOR HP QUICKPAGE SMTP PROXY SERVER INSTALLATION FOR HP QUICKPAGE INTRODUCTION To ensure accurate billing, the HP QuickPage program requires collection of the metered information from the printers and multifunction products

More information

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address NAT Introduction: Vidyo Conferencing in Firewall and NAT Deployments Vidyo Technical Note Section 1 The VidyoConferencing platform utilizes reflexive addressing to assist in setup of Vidyo calls. Reflexive

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

HP Application Lifecycle Management

HP Application Lifecycle Management HP Application Lifecycle Management Software Version: 11.00 Microsoft Word Add-in Guide Document Release Date: November 2010 Software Release Date: October 2010 Legal Notices Warranty The only warranties

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

EAsE and Integrated Archive Platform (IAP)

EAsE and Integrated Archive Platform (IAP) EAsE and Integrated Archive Platform (IAP) HP Outlook Web Access (OWA) Extension on Exchange 2007 Table of Contents Overview... 2 Microsoft Outlook Web Access 2007 (OWA 2007)... 2 HP Outlook Web Access

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

Introduction to Computer Security Benoit Donnet Academic Year 2015-2016

Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection: Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 FTPS Certificates Configuration Table of contents Overview... 2 Server certificate... 2 Configuring a server certificate on an IIS FTPS server... 2 Creating

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

HP Business Availability Center

HP Business Availability Center HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.05 Business Process Monitor Administration Document Release Date:September 2010 Software Release Date:

More information

HP Web Jetadmin Database Connector Plug-in reference manual

HP Web Jetadmin Database Connector Plug-in reference manual HP Web Jetadmin Database Connector Plug-in reference manual Copyright notice 2004 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation or translation without prior written permission

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks

More information

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2 offers a wealth of features that help organizations protect their networks against new threats

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

HP Business Service Management

HP Business Service Management HP Business Service Management Software Version: 9.26 Windows operating system RUM for Citrix - Best Practices Document Release Date: September 2015 Software Release Date: September 2015 RUM for Citrix

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes

HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes Supported platforms... 2 What s new in version 2.1... 2 What s new in version 2.0.3... 2 What s new in version 2.0.2... 2 What

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Technical White Paper

Technical White Paper Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device

More information

Installation Guide for the WebPortal

Installation Guide for the WebPortal Installation Guide for the WebPortal 100713 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Release Notes: Version P.1.8 Software. Related Publications. for HP ProCurve 1810G Switches

Release Notes: Version P.1.8 Software. Related Publications. for HP ProCurve 1810G Switches Release Notes: Version P.1.8 Software for HP ProCurve 1810G Switches Release P.1.8 supports the HP ProCurve 1810G-8 (J9449A) and 1810G-24 (J9450A) switches. These release notes include information on the

More information

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

How to configure MAC authentication on a ProCurve switch

How to configure MAC authentication on a ProCurve switch An HP ProCurve Networking Application Note How to configure MAC authentication on a ProCurve switch Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. Configuring the ProCurve

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information