NetScaler 9000 Series

Size: px
Start display at page:

Download "NetScaler 9000 Series"

Transcription

1 NetScaler 9000 Series SSL VPN User s Guide for Windows, Mac OS, Linux, and Unix platforms 180 Baytech Drive San Jose, CA Phone: , Fax: NetScaler Part No.:NSVPNUGJ60 Printed: January 2005

2 NETSCALER, INC., ALL RIGHTS RESERVED. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS OR USED TO MAKE DERIVATIVE WORK (SUCH AS TRANSLATION, TRANSFORMATION, OR ADAPTATION) WITHOUT THE EXPRESS WRITTEN PERMISSION OF NETSCALER, INC. ALTHOUGH THE MATERIAL PRESENTED IN THIS DOCUMENT IS BELIEVED TO BE ACCURATE, IT IS PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE ALL RESPONSIBILITY FOR THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS MANUAL. NETSCALER, INC. OR ITS SUPPLIERS DO NOT ASSUME ANY LIABILITY THAT MAY OCCUR DUE TO THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS DOCUMENT. INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. COMPANIES, NAMES, AND DATA USED IN EXAMPLES ARE FICTITIOUS UNLESS OTHERWISE NOTED. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. Modifying the equipment without NetScaler s written authorization may result in the equipment no longer complying with FCC requirements for Class A digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television communications at your own expense. You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the NetScaler Request Switch 9000 Series equipment. If the NetScaler equipment causes interference, try to correct the interference by using one or more of the following measures: Move the NetScaler equipment to one side or the other of your equipment. Move the NetScaler equipment farther away from your equipment. Plug the NetScaler equipment into an outlet on a different circuit from your equipment. (Make sure the NetScaler equipment and your equipment are on circuits controlled by different circuit breakers or fuses.) Modifications to this product not authorized by NetScaler, Inc., could void the FCC approval and negate your authority to operate the product. BroadCom is a registered trademark of BroadCom Corporation. Fast Ramp, NetScaler, and NetScaler Request Switch are trademarks of NetScaler, Inc. Linux is a registered trademark of Linus Torvalds. Internet Explorer, Microsoft, PowerPoint, Windows and Windows product names such as Windows NT are trademarks or registered trademarks of the Microsoft Corporation. Netscape is a registered trademark of Netscape Communications Corporation. Red Hat is a trademark of Red Hat, Inc. Sun and Sun Microsystems are registered trademarks of Sun Microsystems, Inc. Other brand and product names may be registered trademarks or trademarks of their respective holders. Software covered by the following third party copyrights may be included with this product and will also be subject to the software license agreement: Copyright 1998 Carnegie Mellon University. All rights reserved. Copyright David L. Mills 1993, Copyright 1992, 1993, 1994, 1997 Henry Spencer. Copyright Jean-loup Gailly and Mark Adler. Copyright 1999, 2000 by Jef Poskanzer. All rights reserved. Copyright Markus Friedl, Theo de Raadt, Niels Provos, Dug Song, Aaron Campbell, Damien Miller, Kevin Steves. All rights reserved. Copyright 1982, 1985, 1986, , 1993 Regents of the University of California. All rights reserved. Copyright 1995 Tatu Ylonen, Espoo, Finland. All rights reserved. Copyright UNIX System Laboratories, Inc. Copyright 2001 Mark R V Murray. Copyright Eric Young. Copyright 1995,1996,1997,1998. Lars Fenneberg. Copyright Livingston Enterprises, Inc. Copyright 1992, 1993, 1994, The Regents of the University of Michigan and Merit Network, Inc. Copyright , RSA Data Security, Inc. Created Copyright 1998 Juniper Networks, Inc. All rights reserved. Copyright 2001, 2002 Networks Associates Technology, Inc. All rights reserved. Copyright (c) 2002 Networks Associates Technology, Inc. Copyright The Open LDAP Foundation. All Rights Reserved. Copyright 1999 Andrzej Bialecki. All rights reserved. Copyright 2000 The Apache Software Foundation. All rights reserved. Copyright (C) Robert A. van Engelen, Genivia inc. All Rights Reserved.

3 Contents Chapter 1 :NetScaler SSL VPN Overview NetScaler SSL VPN : Architecture NetScaler SSL VPN : Key Features Chapter 2 :Getting Started with NetScaler SSL VPN System Requirements Starting a NetScaler SSL VPN Session Using the SSL VPN Browser Plug-in Accessing Client/Server Applications Hosts File Modification Method SourceIP and SourcePort Method Using Web-based Applications Using SSL VPN on Netscape and Mozilla Using SSL VPN on Safari Accessing a Remote File System Top Panel Left Panel Right Panel Accessing Internal Web Sites Using Portal Tools The Ping Tool The Tip and Help Tools Using Bookmarks Terminating the SSL VPN Session Chapter 3 :Troubleshooting the SSL VPN Browser Plug-in Debugging the SSL VPN Browser Plug-in NetScaler SSL VPN Session Error Codes NetScaler 9000 Series SSL VPN User s Guide 1

4 2 NetScaler 9000 Series SSL VPN User s Guide

5 1 : NetScaler SSL VPN Overview Chapter 1 NetScaler SSL VPN Overview The NetScaler SSL VPN is a secure remote access solution that provides point-to-point communication between remote users, such as mobile employees, partners, or resellers, and a private enterprise network. It does so by creating a secure SSL-based tunnel between a standard Web browser and a NetScaler 9000 system. This allows authorized remote users to gain access to critical business resources such as corporate intranets, shared file systems, native client/server applications, and terminal services. This chapter provides an overview of the NetScaler SSL VPN features. The following topics are described in this chapter: NetScaler SSL VPN : Architecture NetScaler SSL VPN : Key Features NetScaler 9000 Series SSL VPN User s Guide 1-1

6 1 : NetScaler SSL VPN Overview 1.0 NetScaler SSL VPN : Architecture When you log on to a Web site that is secured by the NetScaler SSL VPN, the NetScaler system instructs the browser to download the SSL VPN browser plug-in onto your computer. The plug-in is a Java applet that creates a secure channel of communication between your browser and the NetScaler system, thus allowing you to remotely access those resources you are authorized to use. Before the plug-in is downloaded, you will be prompted to permit it to execute. The plug-in first initializes itself by fetching the intranet applications, it supports, from the NetScaler system. The network administrator configures the NetScaler system with these applications. Once initialized, the plug-in listens on preconfigured ports. When it receives a request from the client, it opens a server-side connection, authenticates that connection with the user's credentials, and then tunnels subsequent data packets between the client and the server across the connection. This is illustrated in the following figure. Figure 1 SSL VPN browser plug-in architecture The following section provides a step-by-step description of the preceding diagram. 1. The client application looks up the Hosts file for the address of the server. 2. The Hosts file points to localhost. The plug-in listens for requests, from the client application, on preconfigured ports. 3. The client application sends a request to the plug-in. 4. The plug-in forwards the request to the SSL VPN gateway. NetScaler 9000 Series SSL VPN User s Guide 1-2

7 1 : NetScaler SSL VPN Overview 5. The SSL VPN gateway forwards the request to the Application server. 6. The Application server responds to the SSL VPN gateway. 7. The SSL VPN gateway replies to the plug-in. 8. The plug-in replies to the client application. NetScaler 9000 Series SSL VPN User s Guide 1-3

8 1 : NetScaler SSL VPN Overview 2.0 NetScaler SSL VPN : Key Features The NetScaler SSL VPN supports: SSL 3.0 and TLS bit encryption Most TCP-based applications Windows, Linux, and Mac OSX NetScaler 9000 Series SSL VPN User s Guide 1-4

9 Chapter 2 Getting Started with NetScaler SSL VPN The preceding chapter covered the architectural details of the SSL VPN browser plug-in. In this chapter, you will learn to use the plug-in. This chapter begins with a brief introduction to the system requirements for the plug-in. This is followed by detailed instructions on downloading and running the plug-in. The final section covers the various controls of the user interface. The following topics are described in this chapter: System Requirements Starting a NetScaler SSL VPN Session Using the SSL VPN Browser Plug-in NetScaler 9000 Series SSL VPN User s Guide 2-1

10 1.0 System Requirements The minimum system requirements are: Windows Platform Web browsers: Internet Explorer 5.0+, Netscape 7.1, Mozilla 1.2+ Java Plug-in: JRE1.3.1 or greater Macintosh (MacOSX) Web browsers: Safari v1.2(v125) Java Plug-in: JRE1.4.2 Linux Platform Web browsers: Mozilla Java Plug-in: JRE1.3.1 or greater Note You can download the Java Runtime Environment (JRE) from Sun Microsystem s Java website if needed. Browse to to find the JRE for your operating system. NetScaler 9000 Series SSL VPN User s Guide 2-2

11 2.0 Starting a NetScaler SSL VPN Session As mentioned earlier, the NetScaler SSL VPN has been designed to provide remote users access to authorized resources on a private network, over a secure connection. To establish a secure connection, you must first log on to the SSL VPN Web site. Contact your system administrator for the URL to this Web site, and the login credentials. The typical format for such a URL is as follows: To log on to your company s SSL VPN Web site 1. Open a Web browser and enter the URL of the SSL VPN Web site. If your administrator has not configured a proper SSL certificate that identifies the server, the operating system will prompt you with a Security Alert window asking your permission to access the NetScaler SSL VPN login window. Figure 1 Security Alert window The security alert indicates that there might be discrepancies in the certificate. For example: the certificate has expired. the domain name in the certificate does not match the domain name of the server. NetScaler 9000 Series SSL VPN User s Guide 2-3

12 the certificate is not trusted. Click the Cancel button and contact the system administrator. 2. The SSL VPN login page is displayed. Figure 2 SSL VPN login page 3. Enter your Login name and Password. 4. Click Go. When you log on to the NetScaler SSL VPN for the first time, a security warning is displayed as shown in the following figure. This warning prompts you to download the SSL VPN browser plug-in. NetScaler 9000 Series SSL VPN User s Guide 2-4

13 Figure 3 Security warning Note The appearance of these dialog boxes may differ across platforms and browsers. 5. Click the Grant this session or Grant always button. It is recommended that you click the Grant always button. The Proxy Configuration alert is displayed. Figure 4 Proxy Configuration alert Note This alert will not be displayed when you use Internet Explorer on Windows. For details on configuring the proxy settings of your Web browser, refer to the section Using Web-based Applications of this chapter. 6. Click the OK button. The Secure Remote Access Session window and the services page are loaded as shown. NetScaler 9000 Series SSL VPN User s Guide 2-5

14 Figure 5 Secure Remote Access Session window and services page Note The Secure Remote Access Session window may take a few seconds to appear. If your computer using Netscape Navigator was was unable to fully load the smaller secure remote session window shown in the figure above, Netscape Navigator may not have been installed with Sun Java 2 support. You may need to rerun the Netscape Navigator installer, ensuring that Sun Java 2 support is selected. Note Update the proxy settings of the your Web browser to the values displayed on the Proxy Configuration alert or the Secure Remote Access Session window. This will enable you to access Web-based applications. NetScaler 9000 Series SSL VPN User s Guide 2-6

15 3.0 Using the SSL VPN Browser Plug-in The Secure Remote Access Session window is the graphical user interface to the browser plug-in. It allows you to securely access intranet portals, corporate applications, file systems, or mail on a private network. Closing the SSL VPN Session window will end the session. As a result, you will be disconnected from the private network. Figure 6 Secure Remote Access Session window The components of the Secure Remote Access Session window are described as follows: Proxy: The IP address and port number that the Web browser s proxy that enables Web access. Bytes sent: The quantity of data sent through the plug-in from the client to the server. Bytes received: The quantity of data received through the plug-in from the server to the client. Applications: Click this button to view the list of intranet applications configured on the NetScaler system. Services: Click this button to view the services page. This page provides links to commonly accessed Web sites on the corporate network. File Transfer: Click this button to download/upload files, from the network, via the Web-based interface. Logout: Click this button to log off from the SSL VPN session. The message displayed on the Secure Remote Access Session window, indicates that the SSL VPN session will be terminated if you close the NetScaler 9000 Series SSL VPN User s Guide 2-7

16 window. To gracefully terminate the session, click the Logout button. Otherwise, changes to the Hosts file on the client computer and the proxy settings will not be rolled back. The following sections cover the various tasks that you can perform with the plug-in. 3.1 Accessing Client/Server Applications As a remote user, you are authorized to access and use a limited set of client/ server applications on your company s intranet. The administrator configures these client/server applications on the NetScaler system. To view these applications, click the Applications button on the Secure Remote Access Session window. The Intranet Applications window, listing all the applications, is displayed. Figure 7 Intranet Applications window During a NetScaler SSL VPN session, you will access these applications via the plug-in. There are two methods for doing so. The methods are: Hosts File Modification Method SourceIP and SourcePort Method These methods are explained in the following sections. NetScaler 9000 Series SSL VPN User s Guide 2-8

17 3.1.1 Hosts File Modification Method In this method, the plug-in adds an entry, corresponding to the applications configured by the VPN administrator, in the Hosts file. Note however that you must be logged in with root or administrative privileges in order for the plug-in to be able to modify this file. If you are not logged in to the system with the adequate privileges, you will need to manually edit the file yourself, adding the appropriate entries to the Hosts file as discussed in the following section. Consider a scenario where you need to open a Telnet session to a remote system from your laptop. You use the laptop to work both within your company s intranet and remotely. To ensure connectivity to the remote system from both within and outside your company s intranet 1. Add an entry telnet1 in the Hosts file on your computer. This entry consists of the IP address of the remote system and it s host name. Note On a computer that hosts the Windows platform, the Hosts file is located at %SYSTEMROOT%\system32\drivers\etc. On a computer that hosts the Mac and Linux operating systems, this file is located at /etc/hosts. To access the remote system from within your company s intranet 1. Initiate a Telnet session. 2. Type Open telnet1. The login prompt of the remote system is displayed. To access the remote system outside your company s intranet 1. Log on to the SSL VPN Web site. 2. Initiate a Telnet session. 3. Type Open telnet1. The login prompt of the remote system is displayed. NetScaler 9000 Series SSL VPN User s Guide 2-9

18 3.1.2 SourceIP and SourcePort Method If you do not possess administrative rights on your computer, the plug-in will not update the Hosts file. As a result, you need to manually configure the client/server applications using the source IP address and port values indicated on the Intranet Applications window. Within your company's intranet, use the destination IP address and destination port values corresponding to the application to be accessed. When using NetScaler SSL VPN to access an application, use the source IP address and port values. These values are highlighted in the following figure. Figure 8 Details of the telnet1 application in the Intranet Applications window Consider the example in the previous section. To access the remote system from within your company s intranet 1. Initiate a Telnet session. 2. Type Open The login prompt of the remote system is displayed. Note is the DestIP value corresponding to telnet1. To access the remote system 1. Log on to the SSL VPN Web site. 2. Initiate a Telnet session. 3. Type Open The login prompt of the remote system is displayed. NetScaler 9000 Series SSL VPN User s Guide 2-10

19 Note is the SourceIP value corresponding to telnet Using Web-based Applications NetScaler's SSL VPN solution follows the Forward Proxy model to access intranet portals. All Web-based traffic is tunneled through the plug-in. When Internet Explorer is used to access the SSL VPN login page, the plug-in changes the proxy settings to reflect the proxy server indicated on the Secure Remote Access Session window. These changes are rolled back when the user logs off. This behavior is restricted to Internet Explorer on Windows. Other browsers need to be configured manually Using SSL VPN on Netscape and Mozilla You need to manually configure the proxy server settings of Netscape and Mozilla. The following procedure lists the steps to do so. To configure the proxy settings on Netscape and Mozilla 1. Select the Preferences option from the Edit menu. The Preferences window is displayed. NetScaler 9000 Series SSL VPN User s Guide 2-11

20 Figure 9 Preferences window 2. Expand the Advanced option in the Category pane and select the Proxies option. The Proxies pane is displayed. Figure 10 Proxies pane NetScaler 9000 Series SSL VPN User s Guide 2-12

21 3. Select the Manual proxy configuration option. 4. Enter the IP and port address, displayed on the Secure Remote Access Session Window, in the HTTP Proxy and SSL Proxy fields respectively. 5. Click OK to save the changes Using SSL VPN on Safari When accessing the NetScaler SSL VPN from the Mac OS X Safari web browser, the appropriate proxy settings are automatically configured for the session by the plug-in. No proxy configuration is necessary by the user. 3.3 Accessing a Remote File System To access the remote file system, click the File Transfer button on the Secure Remote Access Session window. The NetScaler SSL VPN: Remote Secure File System Access page is displayed. This page allows you to log on to the intranet and access shared resources. The following figure illustrates the various components of this page. Figure 11 Remote Secure File System Access page. NetScaler 9000 Series SSL VPN User s Guide 2-13

22 The following sections cover the various components of the NetScaler SSL VPN: Remote Secure File System Access page Top Panel The top panel of the NetScaler SSL VPN: Remote Secure File System Access page displays the buttons, which allow you to perform various tasks, pertaining to the storage and transfer of files. Click this button to log on to the corporate network or a specific computer on that network. Click this button to navigate to the preceding folder in the folder tree. Click this button to refresh the contents of the active folder. Click this button to create a subfolder within the folder that is selected. Click this button to download the file from the remote server. Click this button to upload the file from the local client computer to a folder in the remote file server. Click this button to delete the file from the remote server. Click this button to change the name of a file or folder, which is selected. Click this button to disconnect from the remote server Left Panel The servers, their directories, and the directory structure are displayed in a tree format in the left panel as shown in the following figure. Click the + icon to view a subfolder. NetScaler 9000 Series SSL VPN User s Guide 2-14

23 Figure 12 Left panel Right Panel The right panel displays the Login Server window. Use this window to log on to the file system on the intranet or an appropriate file server. To access the file system, leave the Login Server field blank or click the Network Neighborhood link in the left panel. Note If you are not using Internet Explorer on Windows, ensure that you have modified the proxy settings of your Web browser. For details, refer to the section Using Web-based Applications, of this chapter. To log on to a file server 1. Enter the IP address or the name of the server in the Address field. NetScaler 9000 Series SSL VPN User s Guide 2-15

24 Note If you leave this field blank, you will be logged on to the file system on the intranet. Alternately, if you type \\servername\c$, you can access the hidden shared folders on the server. 2. Enter your Login ID in the Login field. 3. Enter your password in the Password field. If you do not have a password, leave the field blank. 4. Enter a valid domain name. If you have not been assigned a domain, leave the field blank. The right panel now displays the subfolders and files as shown in the following figure. The location of the active folder is displayed in the Address field. Figure 13 Right panel NetScaler 9000 Series SSL VPN User s Guide 2-16

25 To download a file from a remote server 1. Select the file. 2. Click the Download icon. The File Download window is displayed. Figure 14 File Download window 3. Click the Save button. The Save As dialog box is displayed as shown in the following figure. Figure 15 Save As dialog box NetScaler 9000 Series SSL VPN User s Guide 2-17

26 4. Navigate to the appropriate folder, and click the Save button to save the file. To upload a file to the remote server 1. Select the file in the local machine. 2. Click to upload the file to the remote server. To remove a folder, a subfolder, or a file 1. Select the file, folder, or subfolder. 2. Click the Delete icon. The file is deleted from the local file system. Note A parent folder that contains subfolders cannot be removed. To delete a parent folder with subfolders, you need to delete the subfolders first and then delete the parent folder. 3.4 Accessing Internal Web Sites Most corporations host internal Web sites for sharing information. You can use the plug-in to access Web sites that are hosted on your intranet. To view these Web sites, click the Services button on the Secure Remote Access Session window. The Portal page is displayed below. The Portal page is created based on the data configured by the administrator. This page lists the most commonly accessed intranet Web sites. The administrator needs to configure this page manually. NetScaler 9000 Series SSL VPN User s Guide 2-18

27 Figure 16 Portal page 3.5 Using Portal Tools The Portal page has several built in tools to assist you in using the SSL VPN. These tools include a ping interface for checking the accessibility of network hosts, tips, and a link to the SSL VPN User s guide. All of these tools can be found in the left pane on the Portal page as shown in the previous figure The Ping Tool The ping tool is used to check the accessibility of other computers on your intranet and on the Internet. This feature can help you in troubleshooting connectivity issues with your SSL VPN session in addition to determining whether or not a server which is hosting an intranet resource is answering on the network. NetScaler 9000 Series SSL VPN User s Guide 2-19

28 To use this tool, enter the IP address or hostname of the computer you which to ping. Then click the Ping button. The tool will respond with a message immediately below the entry box with the result of the ping The Tip and Help Tools The Tip tool offers helpful hints on using the SSL VPN and its various features. The Help tool is used to access the SSL VPN User s Guide. The User s Guide includes not only instruction on using the SSL VPN but also lists error code explanations and other troubleshooting assistance. 3.6 Using Bookmarks The NetScaler SSL VPN Portal allows you to create your own set of links to commonly accessed resources. These bookmarks may be links to either websites or network accessible file systems on your intranet. You may also create bookmarks to external websites on your portal page. To create these bookmarks, click on the add links on the right side of the page. The following figure shows the new page. Figure 17 Add New Bookmark Page NetScaler 9000 Series SSL VPN User s Guide 2-20

29 In the Name field, enter the label to be used for your new link. In the Address Field enter either the uniform resource locator (URL) for the website you are creating a link to or the network path to the fileserver you wish to add a link for. Once done, select the Add button to apply the new link or Cancel to exit the window without making any changes. Note The system automatically differentiates between website addresses (URLs) and network file system paths based on the format in which they are entered. Hence you do not need to specify which type of resource your link is for when you create it. 3.7 Terminating the SSL VPN Session To log off from the SSL VPN session, click the Logout button. If you close the Secure Remote Access Session window (by clicking the Close button or by pressing Alt+F4), the changes to the Hosts file on the client computer and the proxy settings will not be rolled back. NetScaler 9000 Series SSL VPN User s Guide 2-21

30 3 : Troubleshooting the SSL VPN Browser Plug-in Chapter 3 Troubleshooting the SSL VPN Browser Plug-in This chapter covers the troubleshooting of the SSL VPN browser plug-in. The following topics are described in this chapter: Debugging the SSL VPN Browser Plug-in NetScaler SSL VPN Session Error Codes NetScaler 9000 Series SSL VPN User s Guide 3-1

31 3 : Troubleshooting the SSL VPN Browser Plug-in 1.0 Debugging the SSL VPN Browser Plug-in By default, the plug-in maintains a log of all of its activities in a separate ASCII file. This ASCII file, also known as a log file, is stored in the file system by the name mpsslvpn. On a computer that runs the Windows operating system, this file is stored in the root directory. For example, if the operating system resides on a partition labeled C of the hard disc, the log file is generated in the root (C:\)of this partition. On Mac OSX and Linux, the log file is generated in the /tmp directory. 3-2 NetScaler 9000 Series SSL VPN User s Guide

32 3 : Troubleshooting the SSL VPN Browser Plug-in 2.0 NetScaler SSL VPN Session Error Codes The following table lists the error codes displayed by the SSL VPN session. It also provides a description of these error codes. Table 1 Specific error codes displayed by the SSL VPN session Message Explanation Action Hosts file update failed. This message indicates that the plug-in has been unable to update the Hosts file on the client computer. Log on to the computer as an administrator. This will ensure that the Hosts file is updated. Alternately, follow the procedure outlined in the section SourceIP and SourcePort Method in chapter 2 of this guide. NetScaler 9000 Series SSL VPN User s Guide 3-3

33 3 : Troubleshooting the SSL VPN Browser Plug-in 3-4 NetScaler 9000 Series SSL VPN User s Guide

Citrix NetScaler Application Switch. SSL VPN User s Guide for the Windows Platform

Citrix NetScaler Application Switch. SSL VPN User s Guide for the Windows Platform Citrix NetScaler Application Switch SSL VPN User s Guide for the Windows Platform Release 7.0 Citrix Systems, Inc. CITRIX SYSTEMS, INC., 2005. ALL RIGHTS RESERVED. NO PART OF THIS DOCU- MENT MAY BE REPRODUCED

More information

NetScaler 9000 Series

NetScaler 9000 Series NetScaler 9000 Series SSL VPN User s Guide for Windows platform only 180 Baytech Drive San Jose, CA 95134 Phone: 408-678-1600, Fax: 408-678-1601 www.netscaler.com NetScaler Part No.:NSVPNUG60 Printed:

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this

More information

SSL VPN User s Guide for the Windows Platform Citrix Systems, Inc.

SSL VPN User s Guide for the Windows Platform Citrix Systems, Inc. Citrix NetScaler Application Switch SSL VPN User s Guide for the Windows Platform Citrix Systems, Inc. CITRIX SYSTEMS, INC., 2005. ALL RIGHTS RESERVED. NO PART OF THIS DOCU- MENT MAY BE REPRODUCED OR TRANSMITTED

More information

Citrix NetScaler Quick Start Guide: 7000 Platform. Citrix NetScaler 9.1

Citrix NetScaler Quick Start Guide: 7000 Platform. Citrix NetScaler 9.1 Citrix NetScaler Quick Start Guide: 7000 Platform Citrix NetScaler 9.1 Copyright and Trademark Notice CITRIX SYSTEMS, INC., 2009. ALL RIGHTS RESERVED. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Montefiore Portal Quick Reference Guide

Montefiore Portal Quick Reference Guide Montefiore Portal Quick Reference Guide Montefiore s remote portal allows users to securely access Windows applications, file shares, internal web applications, and more. To use the Portal, you must already

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Working With Your FTP Site

Working With Your FTP Site Working With Your FTP Site Welcome to your FTP Site! The UnlimitedFTP (UFTP) software will allow you to run from any web page using Netscape, Internet Explorer, Opera, Mozilla or Safari browsers. It can

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

Montefiore Portal Quick Reference Guide

Montefiore Portal Quick Reference Guide Montefiore Portal Quick Reference Guide Montefiore s remote portal allows users to securely access Windows applications, file shares, internal web applications, and more. To use the Portal, you must already

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Citrix NetScaler SDX Administration Guide

Citrix NetScaler SDX Administration Guide Citrix NetScaler SDX Administration Guide Citrix NetScaler 9.3.e Copyright and Trademark Notice CITRIX SYSTEMS, INC., 2011. ALL RIGHTS RESERVED. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 9.0, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper

More information

QUICK START. GO-Global Cloud 4.1 SETTING UP A LINUX CLOUD SERVER AND HOST INSTALL THE CLOUD SERVER ON LINUX

QUICK START. GO-Global Cloud 4.1 SETTING UP A LINUX CLOUD SERVER AND HOST INSTALL THE CLOUD SERVER ON LINUX GO-Global Cloud 4.1 QUICK START SETTING UP A LINUX CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0 Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

IBM Remote Lab Platform Citrix Setup Guide

IBM Remote Lab Platform Citrix Setup Guide Citrix Setup Guide Version 1.8.2 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation in

More information

Java Secure Application Manager

Java Secure Application Manager Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

RLP Citrix Setup Guide

RLP Citrix Setup Guide RLP Citrix Setup Guide M Version 2.1 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

FileMaker Server 13. Getting Started Guide

FileMaker Server 13. Getting Started Guide FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

AG MacOS Standalone Array Client Administration Guide

AG MacOS Standalone Array Client Administration Guide AG MacOS Standalone Array Client Administration Guide Copyright Statement Copyright Statement Copyright 2015 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved.

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

Entrust Managed Services PKI Administrator s Quick Start Guide

Entrust Managed Services PKI Administrator s Quick Start Guide Entrust Managed Services PKI Administrator s Quick Start Guide Each Managed Services PKI organization requires an administrator also known as a local registration authority (LRA) whose duty it is to manage

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

FileMaker Server 15. Getting Started Guide

FileMaker Server 15. Getting Started Guide FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

FileMaker Server 13. FileMaker Server Help

FileMaker Server 13. FileMaker Server Help FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

Using the FDO Remote Access Portal

Using the FDO Remote Access Portal Using the FDO Remote Access Portal Introduction The ODS NITOAD Branch has implemented a Juniper Networks secure sockets layer (SSL) virtual private network (VPN) solution at the national gateways to provide

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7. Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7. This document contains detailed instructions on all features. Table

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

SWsoft, Inc. Plesk VPN. Administrator's Guide. Plesk 7.5 Reloaded

SWsoft, Inc. Plesk VPN. Administrator's Guide. Plesk 7.5 Reloaded SWsoft, Inc. Plesk VPN Administrator's Guide Plesk 7.5 Reloaded (c) 1999-2004 ISBN: N/A SWsoft Inc 13800 Coppermine Drive Suite 112 Herndon VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright

More information

FileMaker Server 12. FileMaker Server Help

FileMaker Server 12. FileMaker Server Help FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

SSL VPN User Guide. Access Manager 3.2 SP2. June 2013

SSL VPN User Guide. Access Manager 3.2 SP2. June 2013 SSL VPN User Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

SSL VPN User Guide. Access Manager 4.0. November 2013

SSL VPN User Guide. Access Manager 4.0. November 2013 SSL VPN User Guide Access Manager 4.0 November 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

1. Accessing the LONZA network from a private PC or Internet Café

1. Accessing the LONZA network from a private PC or Internet Café Using SSL VPN from non Lonza PCs 1. Accessing the LONZA network from a private PC or Internet Café To work at home with your private PC or from an Internet Café, you can use your browser to connect to

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Enabling Backups for Windows and MAC OS X

Enabling Backups for Windows and MAC OS X Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA

More information

EURECOM VPN SSL for students User s guide

EURECOM VPN SSL for students User s guide EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...

More information

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Accessing Restricted University Online Resources Using Network Connect Table of Contents Overview... 1 Connecting to the Secure Remote

More information

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Load Balancing. Outlook Web Access. Web Mail Using Equalizer Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

ADMINISTRATOR S GUIDE

ADMINISTRATOR S GUIDE ADMINISTRATOR S GUIDE NetScreen-Statistical Report Server Version FP2 P/N 093-1386-000 Rev.A Copyright Notice Copyright 2004 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks

More information

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.

More information

Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0

Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0 Parallels Plesk Panel VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide Revision 1.0 Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49

More information

LabelWriter. Print Server. User Guide

LabelWriter. Print Server. User Guide LabelWriter Print Server User Guide Copyright 2010 Sanford, L.P. All rights reserved. 08/10 No part of this document or the software may be reproduced or transmitted in any form or by any means or translated

More information

FreeAgent DockStar Network Adapter User Guide

FreeAgent DockStar Network Adapter User Guide FreeAgent DockStar Network Adapter User Guide FreeAgent DockStar Network Adapter User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are

More information

Using the FDO Remote Access Portal

Using the FDO Remote Access Portal Using the FDO Remote Access Portal Introduction The ODS NITOAD Branch has implemented a Juniper Networks secure sockets layer (SSL) virtual private network (VPN) solution at the national gateways to provide

More information

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities Xerox 700 Digital Color Press with Integrated Fiery Color Server Utilities 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45072726

More information

HP AppPulse Active. Software Version: 2.2. Real Device Monitoring For AppPulse Active

HP AppPulse Active. Software Version: 2.2. Real Device Monitoring For AppPulse Active HP AppPulse Active Software Version: 2.2 For AppPulse Active Document Release Date: February 2015 Software Release Date: November 2014 Legal Notices Warranty The only warranties for HP products and services

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL. GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007

Getting Started with Microsoft Office Live Meeting. Published October 2007 Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

GTA SSL Client & Browser Configuration

GTA SSL Client & Browser Configuration GB-OS Version 6.1 GTA SSL Client & Browser Configuration SSL201203-02 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Entrust Managed Services PKI Administrator Guide

Entrust Managed Services PKI Administrator Guide Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered

More information

Remote Access Services Apple Macintosh - Installation Guide

Remote Access Services Apple Macintosh - Installation Guide Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java

More information

Secure IIS Web Server with SSL

Secure IIS Web Server with SSL Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help

More information

Citrix NetScaler and Microsoft. Microsoft Office Communication Server 2007 with NetScaler. www.citrix.com

Citrix NetScaler and Microsoft. Microsoft Office Communication Server 2007 with NetScaler. www.citrix.com Citrix NetScaler and Microsoft White Paper Microsoft Office Communication Server 2007 with NetScaler www.citrix.com Introduction Citrix NetScaler optimizes the delivery of Web applications increasing security,

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

Qvis Security Technical Support Field Manual LX Series

Qvis Security Technical Support Field Manual LX Series Table of Contents Page 1: Motion Detection 1.0 Configuring Motion Detection for LX Apollo / LX Zeus DVRs 2 1.1 Motion Playback on LX Apollo / LX Zeus DVRs 3 1.2 Scheduling Motion and Continuous Recording

More information

Remote Filtering Software

Remote Filtering Software Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information