Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

Size: px
Start display at page:

Download "Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology"

Transcription

1 The #1 Remote Control and File Transfer Software Contents 1 Introduction 1 Application Level Security 2 Network Level Security 2 Usage Examples 4 Summary 4 Appendix A Setting Up a Firewall for Timbuktu Pro 5 Appendix B Differences Among the Timbuktu Pro Family Timbuktu Pro Enterprise Security White Paper A secure approach to deployment of remote control technology

2 Introduction Netopia has gone to great lengths to ensure that the security features built into the Timbuktu Pro line of software are not only stringent enough to meet IS needs, but have the flexibility to work with existing security standards such as firewall, Virtual Private Networks (VPN), PAP, CHAP, Point-to-Point Tunneling Protocol (PPTP), SecureID, etc. This high level of security allows Timbuktu Pro to be an essential tool for safety conscious organizations such as Banker s Trust, the Pentagon and Hughes Aircraft. Timbuktu Pro s security can be divided into application level security and network level security. Application level security refers to features in Timbuktu Pro that make it a secure application on your network. The network level security section of this document illustrates how Timbuktu Pro interacts with security hardware and software already in place on your network. Application Level Security Password Protection (User level access) At its most basic level, Timbuktu Pro is designed to require a specific user name and password for each person needing access to a given machine. In addition, users can be set up with varying levels of access depending on their individual needs. For example, a Timbuktu Pro machine can be easily configured so that one or more remote accounts have control access for administrative purposes, others have observe access for training purposes, and all accounts have send privileges to facilitate communication and collaboration across the Intranet. Attended Access In attended access mode, access can be restricted only to specifically authorized users. Here, the user of the Timbuktu Pro machine must specifically authorize on a per-session basis any incoming connections. For maximum security, the administrator can permit only attended access mode. Master Password Timbuktu Pro can be configured with a Master Password to prevent any changes to the security specifications on a machine. When configured in this w a y, Timbuktu Pro requires the correct Master Password whenever somebody tries to change security-related preferences, such as the defined users or incoming access. Site Keys and Administrators The Timbuktu Site Key Generator can be used to enforce the established security policy for corporate use of Timbuktu Pro. Enforcement can involve disabling various features, modifying the TCP ports used for Timbuktu Pro, requiring Site Keys in order to connect to members of the site, and restricting modifications after the initial installment and configuration of Timbuktu Pro. Secure Screen Blanking Timbuktu Pro for Windows supports secure screen blanking on Windows NT and Windows 95 machines. When this option is enabled, a remote control session will automatically blank the screen on the host, preventing the disclosure of any sensitive or confidential information to somebody with physical access to the host machine. Remote Control Notification Timbuktu Pro for Windows can be configured to warn you of active remote control or observe sessions in two ways. You either can configure it to beep periodically, show a warning dialog, or both. This feature ensures that you don t inadvertently display sensitive information while somebody observes your screen. Activity Logging Every Timbuktu Pro connection established to a machine is logged to an Activity Log. This file is a continuous record of which machines (including IP addresses where applicable) have used a given service. This information is logged in a standard format and may be audited on a regular basis for security violations. Under Windows NT, Timbuktu Pro also logs connection information to the Application Event Log. This enables integration with standard Windows NT monitoring and auditing software. Ti m b u k t up ro 1

3 Network Level Security Firewalls Virtually every corporate LAN connected to the Internet has a firewall in place. Because of its flexible TCP/IP implementation, Timbuktu Pro can be blocked or permitted on a service-by-service basis at the firewall level. Every service that Timbuktu Pro provides can be configured with the Site Key Generator for distinct and unique TCP/IP ports. For example, the firewall could be configured to allow Observe and Send to take place across a WAN, but prohibit services like Control and Exchange Files across insecure connections. See Appendix A for detailed information involving firewall configuration. Network Management Integration Timbuktu Pro is integrated with popular network management and help desk software such as SMS and R e m e d y. This integration lets a Network Administrator automatically use Timbuktu Pro s remote control capability to access a machine from within their existing network management software. Usage Example The following examples are accounts of how Timbuktu Pro can be used in a corporate environment. They are examples based on feedback that Netopia s Technical Support department received from customers. Example 1 Virtual Private Networks (VPNs) A Virtual Private Network allows secure communication over a connection that would normally be either blocked by a firewall or unsuitable for sensitive material due to the inherent insecurity of Internet communications. A number of companies are providing VPNs as either stand-alone products or as add-ons to firewalls. These VPNs are capable of encrypting an entire WAN connection, tunneling it through the Internet or some other insecure link, and decrypting it at the other end, all the while ensuring the data hasn t been tampered with or spied on while in transit. Many such VPNs are capable of 128-bit encryption, which is more than suitable for today s computing technology. Please see Example 3 in the Usage Example section for details on how such technologies can be used in conjunction with Timbuktu Pro. Remote Access Authentication In order to prevent dial-up users from gaining access, you can require various levels of authentication from your Remote Access Server (RAS). Because Timbuktu Pro for Windows doesn t contain a direct dial component, it is possible to require that remote access users go through a standard security mechanism such as PAP or CHAP PPP access as well as have a closely monitored central RAS box. For the highest level of s e c u r i t y, you can supplement PPP access with SecureID (or other token-card technology) to ensure that only authorized users are able to access your LAN and your Timbuktu Pro resources. The problem: Company A is a financial organization that needed a more effective way of supporting and training their users. They were experiencing two problems: 1. Users were frustrated by the time required to get support from the help desk 2. The help desk was department frustrated with the amount of time and effort spent fixing or explaining simple problems. Management did not want to double the help desk staff in order to meet the needs of the end users in a timely fashion. The solution: In a pilot program, Timbuktu Pro was rolled out to two help desk people and twenty end users. Whenever any of these users required support, they used the standard mechanism already in place to contact the help desk. Without ever leaving their seats, the help desk was able to observe or control the user s screen in attended access mode and either fix the software problem or demonstrate how to accomplish a task. Timbuktu Pro had the necessary components to effectively double the productivity and responsiveness of the help desk department without any staffing changes.

4 The security: This organization was extremely security conscious, but had fairly simple requirements for Timbuktu Pro. They had an Internet connection, but didn t want Timbuktu Pro to be accessible across the Internet. Since their existing firewall implementation completely blocked the IP ports used by Timbuktu Pro, this was not a problem. They eventually installed Timbuktu Pro on every user s machine for support purposes, but didn t want or need to take advantage of the peer-topeer collaboration capabilities of the software. This was easily addressed by having a corporate wide Site Key that was pre-installed on all Timbuktu Pro machines. This Site Key locked down the preferences so that only somebody with the administrator s key was able to connect. The help desk department then installed the administrator s key on all of their machines so only they could connect to the users with Timbuktu Pro. Example 2 The problem: Company B was in a similar situation to Company A. However, as a computer manufacturer targeting vertical markets, they wanted to provide technical support to their customers using the same tools the help desk used to provide internal support. The solution: Similar to Example 1, Company B used a corporate wide Site Key, but allowed employees to use Timbuktu Pro for collaboration purposes. Their employees find Timbuktu Pro to be an extremely useful tool for sending files and ideas to coworkers instantaneously. Company B also purchased a site license allowing them to ship Timbuktu Pro to any customer with a support contract. When Company B s support staff communicates via phone or with a customer, they are able to use their existing Internet connection to provide the same kind of support their help desk provides internally. The security: Company B used their existing firewall implementation to block incoming Timbuktu Pro connections, and rolled out a less restrictive Site Key that allowed peerto-peer usage of Timbuktu Pro while still providing the help desk benefits outlined in Example 1. The machines used for external customer support were put in an external no-mans-land between two levels of firewall. Most importantly, these machines were located outside of a firewall to ensure that even if a machine used for support is compromised, it will not be a risk to corporate data or security since no sensitive information is stored on these machines, and the firewall prevents these machines from being used to leapfrog into the internal network. Also, there is a useful external firewall protecting these external support machines from non-timbuktu attacks such as SYN-ACK denial of service and routed packets. Example 3 The goal: Company C is a global organization with locations in twenty U.S. states and thirteen countries. Their primary use of Timbuktu Pro is collaboration, as well as administering about 75 file servers, web servers, and application servers running Windows NT. All of their offices are connected via various methods to a single WAN. Many of their connections are over dedicated leased lines, but nearly half tunnel their WAN connection through the Internet to reduce the costs of leasing high-speed international data lines. The solution: Timbuktu Pro is running on virtually every machine in the company and is used in a number of different ways. 1. The web masters use it to administer their web servers for both internal and external information publishing. 2. The engineers use it to share ideas and files among themselves, and to quickly facilitate a review process between engineering, QA, product management, and marketing. 3. The sales force uses it to access information on their desktop machines when they are dialed in to the corporate network while traveling. The security: These links are secured with Virtual Private Network technology. Some of these VPNs use the Point-to-Point Tunneling Protocol available in Windows NT and many modern routers while others use more proprietary VPNs from Trusted Information Systems (TIS) a well regarded firewall manufacturer. In both cases, these VPNs are used to provide an encrypted LAN-to- LAN connection that can be tunneled over any 3

5 Internet connection. Because they have no need to communicate outside of their own network, their external links to the Internet are configured to completely block Timbuktu Pro traffic. Site Keys are used only on the servers that need to be administered and only the server administrators are provided with the administration keys for these machines. Summary Timbuktu Pro has an extensive set of security features built into it. Even more important, it has been designed from the ground up to be flexible enough to work with and extend a corporation s existing security policies and mechanisms. This document is an introductory look at the ways Timbuktu Pro s administration, communication, and collaboration features can be securely used on your network. Netopia has focused for years on the security needs of a corporate network, and our support department can assist you in design and implementation of Timbuktu Pro usage on your network. If you would like to discuss implementation possibilities or problems, or if you have some unique requirements that aren t addressed by this document or the Timbuktu Pro feature set, contact us to see exactly how our product can be adapted to meet your needs. Appendix A Setting Up a Firewall for Timbuktu Pro For security reasons, network managers on TCP/IP networks usually want to restrict external access to their networks. Most of the time they will only open TCP/UDP ports for Telnet, FTP and other common services. To do that, they will configure their IP routers (sometimes referred to as gateways) to filter out access to different ports. These filters are usually referred to as firewalls. TCP/IP security firewalls may be configured in ways that selectively allow or block various types of Timbuktu Pro connections. The firewall administrator should configure the firewall for use with Timbuktu Pro to meet the needs of the corporate security policy. Timbuktu Pro uses well-defined UDP Port 407 for connection handshaking. Once the UDP connection is established, Timbuktu Pro uses TCP ports for each of the seven types of Timbuktu sessions. Timbuktu Pro UDP Ports Connection (handshaking) - UDP Port 407 (Timbuktu Pro for MacOS and Netopia Virtual Office use UDP port 1419) Timbuktu Pro TCP Ports Control TCP port 1417 Observe TCP port 1418 Send Files TCP port 1419 Exchange Files TCP port 1420 Chat Dynamic TCP port (NVO and Timbuktu for MacOS only) Notify Dynamic TCP port (NVO and Timbuktu for MacOS only) Intercom Dynamic UDP and TCP ports (NVO and Timbuktu for MacOS only) These ports are used during access from registered users - those users who have valid user accounts and passwords on the Timbuktu Pro hosts. Any or all of these ports can be firewalled to ensure security from unauthorized users. Some network managers will firewall all ports, but allow a connection to be established to UDP Port 407 and TCP Port This allows anyone on the Internet to send files via Timbuktu Pro. The Timbuktu Administrator s Toolkit (included with the Timbuktu Pro for Enterprise package) provides the ability for network administrators to reconfigure the TCP ports used by Timbuktu Pro. However, UDP Port 407 and 1419 cannot be changed. Timbuktu Pro also supports attended access from temporary guests where the host s user admits a guest on a one-time basis without requiring a password. Timbuktu Pro defaults to using a dynamic port assignment for attended access connections thereby bypassing the firewall on the static ports. If network administrators wish to firewall this attended access feature, they can simply assign it to a static port using the Administrator s Toolkit. Registered port numbers are used only by computers receiving a connection. Users who initiate connections are using dynamic port numbers. A dynamic TCP port is negotiated by the two computers involved in a Timbuktu Pro connection. Dynamic ports usually have numbers greater than If these dynamic ports are firewalled, Timbuktu Pro will not be able to complete a TCP/IP connection. The network manager will need to re-configure the

6 firewall permissions to permit TCP and UDP port assignments. Refer to the firewall or router documentation for details. If the default TCP port assignments are not the preferred ones, a network administrator can use the Timbuktu Pro Administrator s Toolkit to designate which TCP/IP ports are used for Timbuktu Pro services throughout the site. For information about the Toolkit, contact Netopia s Customer Service at (510) Appendix B Differences Among the Timbuktu Pro Family Netopia Virtual Office While Netopia Vi rtual Office doesn t contain Timbuktu in the product name, it does use Timbuktu Pro Remote Control and File Transfer technology. Therefore, this document applies equally to both Timbuktu Pro and Netopia Virtual Office. In addition to the features covered in this document, Netopia Virtual Office 1.1 also contains a miniature web server. This HTTP server operates on TCP port 80 by default, but can be overridden with a Site Key. Timbuktu Pro for Windows All portions of this document are relevant to Timbuktu Pro for Windows 1.5x. References to the Chat and Intercom features are not currently available in this product. Versions of Timbuktu Pro prior to 1.5 do not support all of the Window s NT specific features. If you are running Window s NT and have an earlier version of Timbuktu Pro, contact Netopia to upgrade to 1.5. Timbuktu Pro for MacOS Timbuktu Pro for MacOS supports two transports protocols that are not found in the Windows version and may require special considerations. The first transport is AppleTalk. If your network uses the AppleTalk protocol, then Timbuktu Pro for MacOS can take advantage of this for easy communications between Macintoshes on the LAN. Unless you have AppleTalk bridges to untested networks, this will not be a security concern. The second Mac specific transport is Dial Direct. This feature allows two machines with Timbuktu Pro for MacOS to communicate directly with each other over a modem without going through a network connection. To address security concerns about unmonitored remote access and remote control, this feature can be configured and/or disabled with a Site Key. In addition, Timbuktu Pro 4.0 introduces a feature allowing a network administrator to monitor the network for machines configured for Direct Dial. For further information about this feature, contact Netopia at

7 More than five million network users and 300,000 network administrators depend on Netopia innovation. Since 1986, Netopia has been the industry leader in providing networking products that connect personal computers, and help users communicate quickly, easily, and effectively. With products for PCs, Macs, notebooks, workstations, and printers, Netopia offers easy-to-use solutinos for connectivity and communications. Netopia, Inc Mariner Square Loop Alameda, CA USA (510) (510) Fax 1997 Netopia, Inc. All rights reserved. All trademarks are the property of their respective holders. Printed in the USA. v ZPK800

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents The #1 Remote Control and File Transfer Software Contents 1 Integration Summary 1 An Introduction to Timbuktu Pro 2 Integration Details 2 SMS Application Distribution Packs for Timbuktu Pro 3 SMS Console

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

ALTOONA AREA SCHOOL DISTRICT

ALTOONA AREA SCHOOL DISTRICT No. 815.1 SECTION: OPERATIONS ALTOONA AREA SCHOOL DISTRICT TITLE: THIRD PARTY NETWORK ACCESS ADOPTED: August 17, 2009 REVISED: 815.1. THIRD PARTY NETWORK ACCESS 1. Purpose The purpose of this policy is

More information

1 Getting Started. Before you can connect to a network

1 Getting Started. Before you can connect to a network 1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

Firewalls and Virtual Private Networks

Firewalls and Virtual Private Networks CHAPTER 9 Firewalls and Virtual Private Networks Introduction In Chapter 8, we discussed the issue of security in remote access networks. In this chapter we will consider how security is applied in remote

More information

Internet and Intranet Calling with Polycom PVX 8.0.1

Internet and Intranet Calling with Polycom PVX 8.0.1 Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing

More information

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information

More information

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client 22/07/2014 Dear Friends, This mailer helps you in understanding and configuring PPTP VPN of Matrix NAVAN CNX200 with Windows

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0 Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction

More information

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client Make sure your DI-804HV or DI-808HV is running firmware ver.1.40 August 12 or later. You can check firmware version

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

To Configure Network Connect, We need to follow the steps below:

To Configure Network Connect, We need to follow the steps below: Network Connect Abstract: The Network Connect (NC) provides a clientless VPN user experience, serving as an additional remote access mechanism to corporate resources using an IVE appliance. This feature

More information

TW100-BRF114 Firewall Router. User's Guide. Cable/DSL Internet Access. 4-Port Switching Hub

TW100-BRF114 Firewall Router. User's Guide. Cable/DSL Internet Access. 4-Port Switching Hub TW100-BRF114 Firewall Router Cable/DSL Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION...1 TW100-BRF114 Features...1 Package Contents...3 Physical Details...

More information

Logical & Physical Security

Logical & Physical Security Building a Secure Ethernet Environment By Frank Prendergast Manager, Network Certification Services Schneider Electric s Automation Business North Andover, MA The trend toward using Ethernet as the sole

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls

More information

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and

More information

TW100-BRV204 VPN Firewall Router

TW100-BRV204 VPN Firewall Router TW100-BRV204 VPN Firewall Router Cable/DSL Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 TW100-BRV204 Features... 1 Package Contents... 3 Physical Details...

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Network Security Policy

Network Security Policy Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS

More information

Fig. 4.2.1: Packet Filtering

Fig. 4.2.1: Packet Filtering 4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the

More information

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall? What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Using a Firewall General Configuration Guide

Using a Firewall General Configuration Guide Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Broadband Router ALL1294B

Broadband Router ALL1294B Broadband Router ALL1294B Broadband Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...

More information

Chapter 17 Determining Windows 2000 Network Security Strategies

Chapter 17 Determining Windows 2000 Network Security Strategies 625 CHAPTER 17 Determining Windows 2000 Network Security Strategies Today, most organizations want their computer infrastructure connected to the Internet because it provides valuable services to their

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Network Security Topologies. Chapter 11

Network Security Topologies. Chapter 11 Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network

More information

Access control policy: Role-based access

Access control policy: Role-based access Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.

More information

LevelOne. User Manual. FBR-1430 VPN Broadband Router, 1W 4L V1.0

LevelOne. User Manual. FBR-1430 VPN Broadband Router, 1W 4L V1.0 LevelOne FBR-1430 VPN Broadband Router, 1W 4L User Manual V1.0 Table of Contents CHAPTER 1 INTRODUCTION... 1 VPN BROADBAND ROUTER FEATURES... 1 Internet Access Features... 1 Advanced Internet Functions...

More information

Internet-based remote support for help desks

Internet-based remote support for help desks Internet-based remote support for help desks White Paper Published: October 2005 Contents Introduction...1 Advantages of Internet-based Remote Support...1 Reduced Support Costs through Increased Productivity...2

More information

VPN Lesson 2: VPN Implementation. Summary

VPN Lesson 2: VPN Implementation. Summary VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation Basic ViPNet VPN Deployment Schemes Supplement to ViPNet Documentation 1991 2015 Infotecs Americas. All rights reserved. Version: 00121-04 90 01 ENU This document is included in the software distribution

More information

Using a VPN with CentraLine AX Systems

Using a VPN with CentraLine AX Systems Using a VPN with CentraLine AX Systems User Guide TABLE OF CONTENTS Introduction 2 What Is a VPN? 2 Why Use a VPN? 2 How Can I Set Up a VPN? 2 Important 2 Network Diagrams 2 Network Set-Up with a VPN 2

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu...

INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... 18 Updated: Juha Jokinen Page (1/18) INTRODUCTION This is a guide

More information

Implementing and Managing Security for Network Communications

Implementing and Managing Security for Network Communications 3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication

More information

Module 10: Supporting Remote Users

Module 10: Supporting Remote Users Module 10: Supporting Remote Users Contents Overview 1 Establishing Remote Access Connections 2 Connecting to Virtual Private Networks 13 Configuring Inbound Connections 17 Configuring Authentication Protocols

More information

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh...

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... Chapter7 Setting the Receiving PC for Direct Upload Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... 153 Setting the Receiving PC for Direct Upload This section explains

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network) COMPUTER NETWORKS LECTURES DR.PETER G. GYARMATI Research professor Lectures of P. G. Gyarmati 1. page 1999.-2006. 1999.-2006. This page is intentionally left blank Lectures of P. G. Gyarmati 2. page 1999.-2006.

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Chapter 4 Firewall Protection and Content Filtering

Chapter 4 Firewall Protection and Content Filtering Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with Web content filtering options such as Block Sites and Keyword Blocking. Parents and network administrators

More information

Defender EAP Agent Installation and Configuration Guide

Defender EAP Agent Installation and Configuration Guide Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections

More information

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Electronic Service Agent TM. Network and Transmission Security And Information Privacy Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting

More information

83-10-41 Types of Firewalls E. Eugene Schultz Payoff

83-10-41 Types of Firewalls E. Eugene Schultz Payoff 83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT

BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT USER S MANUAL V1.0 Trademarks Windows 95/98/Me and Windows NT/2000/XP are registered trademarks of Microsoft Corporation. All other brands

More information

Creating a VPN Using Windows 2003 Server and XP Professional

Creating a VPN Using Windows 2003 Server and XP Professional Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN

More information

IBM enetwork VPN Solutions

IBM enetwork VPN Solutions IBM enetwork VPN Solutions the Reach of Your Network Extend Agenda Description and Value of a VPN VPN Technology IBM's VPN Solutions and Future Enhancements Summary What is a VPN? Remote Access Business

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

VPN Tracker for Mac OS X

VPN Tracker for Mac OS X VPN Tracker for Mac OS X How-to: Interoperability with WatchGuard Firebox Internet Security Appliances Rev. 4.0 Copyright 2003-2005 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction

More information

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

How To Configure Apple ipad for Cyberoam L2TP

How To Configure Apple ipad for Cyberoam L2TP How To Configure Apple ipad for Cyberoam L2TP VPN Connection Applicable to Version: 10.00 (All builds) Layer 2 Tunneling Protocol (L2TP) can be used to create VPN tunnel over public networks such as the

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe

More information

Enterprise Edge Communications Manager. Data Capabilities

Enterprise Edge Communications Manager. Data Capabilities Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications

More information

Chapter 4 Firewall Protection and Content Filtering

Chapter 4 Firewall Protection and Content Filtering Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.

More information

Goverlan Remote Control

Goverlan Remote Control Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

EtherFast Cable/DSL VPN Router with 4-Port Switch

EtherFast Cable/DSL VPN Router with 4-Port Switch USER GUIDE EtherFast Cable/DSL VPN Router with 4-Port Switch Model: BEFVP41 About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call

More information

Sweex Wireless BroadBand Router + 4 port switch + print server

Sweex Wireless BroadBand Router + 4 port switch + print server Sweex Wireless BroadBand Router + 4 port switch + print server Advantages Internet Sharing - A broadband internet connection makes it possible for several PCs to use the internet simultaneously. Wireless

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

SECURELINK.COM REMOTE SUPPORT NETWORK

SECURELINK.COM REMOTE SUPPORT NETWORK REMOTE SUPPORT NETWORK I. INTRODUCTION EXECUTIVE SUMMARY MANAGING REMOTE SUPPORT IN A SECURE ENVIRONMENT Enterprise software vendors strive to maximize support efficiency log on to the customer system,

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit. SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information

More information