Web Translation. Web Developer Guide v v10.5.0
|
|
|
- Oswin Nicholson
- 10 years ago
- Views:
Transcription
1 Web Translation Web Developer Guide v v SonicWALL, Inc. All rights reserved. SonicWALL is a registered trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Last modified 12/7/09 10: Rev A
2
3 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide i Table of Contents Overview Introduction Translation Using Host Name and Path Portion Together Translation Using Only the Host Name Portion Benefits Notes and Caveats How Web Translation Works Content-Type of Web Pages Character Encoding Cookie Translation URLs HTML Translation CSS Translation HTC Translations JavaScript Translation Translation Rules Adding Custom Rules for JavaScript Translation VBScript Translation Java Applet, ActiveX and Flash Translation XML Translation Web Aliases Referrer Lookup
4 ii Table of Contents
5 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 1 Overview Introduction A truly clientless VPN appliance requires a robust Web-content translation engine: all network references within the Web content must be changed to point to the VPN appliance instead of internal hosts. With full-client VPNs or VPN appliances that use Web-deployed ActiveX or Java clients, this host mapping can be done on the client. But for VPN access for the broadest possible browser base, Web content translation is indispensable. This document is intended for Web application developers who want to make their software easier to translate for the SonicWALL Aventail translation engine. It provides a set of guidelines to achieve this goal and gives a brief overview of certain aspects of the translation engine. The instructions are valid for SonicWALL Aventail appliances running v8.6.0 through To illustrate why a translation engine is necessary for Web content, imagine an HTML page with the following anchor tag that links to an internal resource: <a href=" Web Access</a> Within the corporate network, the link works perfectly. When the user clicks the link in a Web browser, the browser asks the internal DNS server what the IP address of owa.in.sonicwall.com is and retrieves the desired page. Outside of the corporate network, however, the link does not work. The browser asks the DNS server of the local ISP what the IP address for owa.in.sonicwall.com is and is told that address doesn t exist. Even if the link were to a routable IP address within the corporate network, the corporate firewall would probably prevent the browser from accessing the desired resource. Web content translation is the process of changing (translating) the link above into something that is addressable in the public domain and also contain the intelligence to reach the desired backend resource. There are different ways to do the translation. 1. A dedicated DNS-resolvable host name is mapped to the desired resource. The translated URL may look something like this: <a href=" Web Access</a> The internal host name (owa.in.sonicwall.com) is mapped to the DNS-resolvable host name of the VPN appliance (exchange.sonicwall.com). But the appliance does not hold the desired resource: the end resource must be encoded in some way within the URL. In this example, the host name (exchange.sonicwall.com) itself is mapped to the desired resource. 2. A port number is mapped to the desired resource. The translated URL may look something like this: <a href=" Web Access</a> The internal host name (owa.in.sonicwall.com) is mapped to the DNS-resolvable host name of the VPN appliance (ex7000.sonicwall.com). ). But the appliance doesn t hold the desired resource: the end resource must be encoded in some way within the URL. In this example, it is mapped with the port Number (7456) in the host name portion of the URL. 3. The path portion contains the information of the desired resource.
6 2 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide The translated URL may look something like this: <a href=" Web Access</a> The host name is changed from the internal host name (owa.in.sonicwall.com) to the DNSresolvable host name of the VPN appliance (ex7000.sonicwall.com/go/owa.in.sonicwall.com). But the appliance doesn t hold the desired resource: the end resource must be encoded in some way within the URL. In this example, it is encoded within the path portion of the URL. If the only kind of Web translation necessary were a translation of HTML links, as in this example, things would be easy. This unfortunately is not so. There are numerous ways to reference network resources in HTML alone. JavaScript, for example, is difficult to handle because it provides a means of executing code on the browser and it allows the user to feed in additional input that is unknown at the time the server-side translation is done. The user can be prompted for a URL using JavaScript and the browser can then be instructed to go to that URL. The scenarios (1) and (2) above are those of translating only the host name portion of the URL. Case (3) is that of translating both the host name and the path portion of the URL. There are options in the AMC to select the type of transaction for each resource. For better compatibility, SonicWALL strongly recommends using options (1) or (2) in most production environments. Option (3) should be used for well-known Web applications like Outlook Web Access and Sharepoint. More details about the two methods of Translating Web URLs are provided in the following sections. Translation Using Host Name and Path Portion Together The host name is DNS-resolvable to the VPN appliance. The information for the desired backend resource is contained in the path portion of the URL. Translation Using Only the Host Name Portion The host name is DNS-resolvable to the VPN appliance and also contains the desired backend resource information. There are two ways to contain the resource information. 1. Host name mapped Host name mapping means that the backend resource or server is mapped to an external host name. The resource is accessed with the host name rather than with the IP address. The host name is resolvable to an IP address in the public domain. Apache listens on port 443 at this IP address. All HTTPS traffic is terminated at this socket. A new HTTP request is made to retrieve the mapped backend resource. The HTTP reply is parsed to translate absolute URLs. Each host name mapped site must have a valid certificate. The wildcard certificates can be leveraged for multiple host mapped sites. See example #1 in the Introduction section. 2. Port mapped Port mapping involves mapping the backend resource or server to a port number at the EX- Series appliance. The Server listens on this port and all HTTPS traffic received on it is terminated at the appliance. A new HTTP request is made to retrieve the mapped backend resource. The HTTP reply is parsed to translate absolute URLs. With Port Mapped access, any firewalls in the network need to be configured to keep the specific ports open. See example #2 in the Introduction section. These translations work best for applications using relative URLs. But the translation engine does process data for absolute URL translation. The example in the above segment explains that of an absolute URL translation. For relative URLs it works automatically as the base URL is similar in the two cases of direct access or indirect access through the VPN appliance.
7 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 3 Benefits Light weight as compared to other translation Less maintenance is required Works better with most of the well written applications The resources can be accessed directly as a bookmark, or through a link in WorkPlace Modern applications which contain AJAX or Flash will work better with this mode of translation Notes and Caveats How Web Translation Works Logging out of applications like OWA, DWA and Sharepoint from an Internet Explorer browser may log you out of WorkPlace For port mapping, the firewall needs to be configured to grant access to the specific ports Each resource should be configured using only one of the access methods; do not mix translated, port mapped and host name mapped modes Host name mapped resources should be configured/accessed using host name only, that is. not via IP address The Web translation engine is part of the SonicWALL Aventail SSL VPN appliance, which sits at the network perimeter. The appliance isolates and protects private Web-based resources from unauthorized external access. A user first logs in to the appliance and is presented with the WorkPlace portal, where he or she follows links that point to resources on the internal network, or enters a URL. All URLs point to the SonicWALL Aventail appliance. The Web translation engine translates an incoming URL using an alias contained in the URL. Aliases are used to obscure the URLs that point to resources on your internal ( downstream ) servers. Because all requests are directed to the appliance, the user sees only the incoming URL that contains the alias. The translation engine matches the alias to a list it stores in memory and translates the URL. Once it s determined that the URL submitted by the user is valid and points to a resource on the network, the appliance checks its access control and authentication rules to make sure the user is authorized to access the requested resource. Content-Type of Web Pages Although the SonicWALL Aventail translation engine uses heuristics to guess the type of content in an HTTP response from the backend Web server, it is best to avoid relying on this and to instead specify the type explicitly. The single most important thing you can do to ensure proper translation is to make sure that all pages are served up with the correct Content-Type header. The Content-Type must be set as follows: Content HTML JavaScript XML Content-Type header text/html application/x-javascript text/html
8 4 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide Character Encoding Cookie Translation URLs As an internationalized network device, the SonicWALL Aventail appliance uses UTF-8 exclusively for its internal work. ISO-8859-x encoding is not supported. Use UTF-8 exclusively for all your Web content, and do not use the Microsoft code-pages. This particularly important when POSTing form data. The path portion of a Set-Cookie header is translated, and the domain portion is discarded. For example, suppose the back-end Web server sends the following header: Set-Cookie: x=y; path=/; domain=.in.sonicwall.com If the alias associated with the Web resource is morty, then this header is translated as follows: Set-Cookie: x=y; path=/morty/ This forces the Web browser to send the cookie only to the alias (and therefore the Web server) that set the cookie. Follow these recommendations when handling browser cookies: Avoid sophisticated client-side cookie manipulations using JavaScript. Avoid using URLs in cookies. Although an attempt is made to translate those URLs, there is some risk of letting them through. The translation engine can handle URLs in any form: Type of URL Fully-qualified Example Absolute path /dir1/dir2/file.html Relative path (recommended)../dir2/file.html HTML Translation Using relative paths in your Web application is recommended. This also has the advantage of making your Web application more portable if you move it to another Web server and directory. HTML translation is handled very reliably by the SonicWALL Aventail appliance. Follow these recommendations when coding your HTML: Make sure your HTML content is formatted according to standards, especially the quotes around attributes in tags. Ideally, use XHTML formatting. HTML attributes containing a value (for example, src="path") may not be translated if they contain any of the following errors: Spaces before or after the equal sign: src ="path" or src= "path" Leading or trailing spaces within the value: src=" path" or src="path " Missing an opening or closing quotation mark: src="path or src=path" Avoid base tags in your HTML code. For example: <base href=" /> The meta tag is commonly used to redirect users to another page. For example: <meta http-equiv="refresh" content="5;url=redirecturl.html" />
9 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 5 CSS Translation HTC Translations JavaScript Translation The meta tag s content attribute must be formatted carefully; don t include line breaks or spaces. CSS content is handled by the translation engine without difficulty. No translation is done for HTC (HTML components). Avoid using the standard attributes (such as action and innerhtml) of HTML as a property of various HTML components. JavaScript translation is complex and there are certain coding practices that you can use to make sure your code translates correctly. Translation Rules The SonicWALL Aventail JavaScript translation engine is based on a parse tree that can handle complex syntax. It is also a rule-based translator that makes use of the appliance s client-side JavaScript library. The rules are stored in the following file: /usr/local/extranet/etc/jstrans.cfg The translation rules are divided into the following four categories: Type ASSIGNMENT CALL SUBSTITUTION SUBARGS Description Assignment statement translation Function call translation Substitution of one language token with another Special kind of substitution within a function call Here are the JavaScript rules as of January # Type Left Hand Side (LHS) Encapsulate RHS with ASSIGNMENT location aventail.translate_url ASSIGNMENT.location aventail.translate_url ASSIGNMENT.href aventail.translate_url ASSIGNMENT.src aventail.translate_url ASSIGNMENT.action aventail.translate_url ASSIGNMENT document.domain aventail.setdomain ASSIGNMENT document.cookie aventail.setcookie ASSIGNMENT.innerHTML aventail.posttext ASSIGNMENT.url aventail.translate_url # Function Call Translation # Type Function Name Param Encapsulate param with
10 6 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide CALL.addBehavior 1 aventail.translate_url CALL.showModalDialog 1 aventail.translate_url CALL.showModelessDialog 1 aventail.translate_url CALL.insertAdjacentHTML 2 aventail.posttext CALL.location.replace 1 aventail.translate_url CALL location.replace 1 aventail.translate_url CALL location.assign 1 aventail.translate_url CALL location.href 1 aventail.translate_url CALL eval 1 aventail.post # Subsitution of one token with another # lvalue/rvalue: 0: substitute always # 1: substitute only if token is an rvalue (read from) # 2: substitute only if token is an lvalue (written to) # 3: substitute only if token is a function name # Type Token lval/rval Replacement SUBSTITUTION location.pathname 0 aventail.location.pathname SUBSTITUTION.location.pathname 0.aventail.location.pathname SUBSTITUTION document.domain 1 document.aventail.getdomain() SUBSTITUTION document.domain 2 aventail.junk SUBSTITUTION location.host 0 aventail.location.host SUBSTITUTION.location.host 0.aventail.location.host SUBSTITUTION location.hostname 0 aventail.location.hostname SUBSTITUTION.location.hostname 0.aventail.location.hostname SUBSTITUTION location.port 0 aventail.location.port SUBSTITUTION.location.port 0.aventail.location.port SUBSTITUTION location.protocol 0 aventail.location.protocol SUBSTITUTION.location.protocol 0.aventail.location.protocol SUBSTITUTION location.href 1 aventail.location.href SUBSTITUTION.location.href 1.aventail.location.href SUBSTITUTION location.search 1 aventail.location.search SUBSTITUTION.location.search 1.aventail.location.search SUBSTITUTION location 1 aventail.location SUBSTITUTION.scripts 1.aventail.getScripts() # Subsitution of one token with another, with a twist: # Take the "stem" of the call and make it the first argument in the new function. # For example: # If we have the token "foo.bar" and the replacement "aventail.ourfoo": # We will replace the construction "anobject.foo.bar(arg1, arg2)" with: # aventail.ourfoo(anobject, arg1, arg2) # This allows us to verify the type of the anobject object prior to operating on it # lvalue/rvalue: 0: substitute always # 1: substitute only if token is an rvalue (read from) # 2: substitute only if token is an lvalue (written to) # 3: substitute only if token is a function name # 4: special case, turn a flat lvalue into a function call # The "3" case above is used in cases such as "foo.location" to allow us to ensure # that "foo" is an object such as a document, window, or frame, and not some # user-defined object that just happens to have a "location" member.
11 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 7 # Type Token lval/rval Replacement SUBARGS document.close 0 aventail.docclose SUBARGS document.write 0 aventail.docwrite SUBARGS document.writeln 0 aventail.docwrite SUBARGS.open 0 aventail.objopen SUBARGS.Open 0 aventail.objopen SUBARGS.location 4 aventail.objlocation SUBARGS.opener 4 aventail.findopener SUBARGS.execCommand 3 aventail.execcommand # SharePoint 2003 extensions... Because these URLs end up getting # passed directly to an ActiveX control that fires up MSWord directly # we need to include our state token in the URLs. # These calls are documented at: # CALL.ViewDocument 1 aventail.translatewithstatetoken CALL.ViewDocument2 2 aventail.translatewithstatetoken CALL.EditDocument 1 aventail.translatewithstatetoken CALL.EditDocument2 2 aventail.translatewithstatetoken CALL.CreateNewDocument 1 aventail.translatewithstatetoken CALL.CreateNewDocument 2 aventail.translatewithstatetoken CALL.CreateNewDocument2 2 aventail.translatewithstatetoken CALL.CreateNewDocument2 3 aventail.translatewithstatetoken CALL ExportList 1 aventail.translatewithstatetoken CALL RDSDataSpace.CreateObject 2 aventail.translate_url Adding Custom Rules for JavaScript Translation Although most rules for standard JavaScript translation are present in jstrans.cfg, additional rules may be required. To create new rules you must first understand how each ASSIGNMENT, CALL, SUBSTITUTION, and SUBARGS is translated. ASSIGNMENT This is used to translate the assignments. Sample rule ASSIGNMENT location aventail.translate_url Result Replaces assignments such as location=str with location= aventail.translate_url(str) CALL This is used to translate the parameters (which have urls) of function calls. Sample rule CALL eval 1 aventail.post Result
12 8 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide Sample rule Replaces calls such as eval(str) with eval(aventail.post(str)) In this case the eval parameter must be translated before the function is called. SUBSITUTION This is used to replace certain tokens with something else. Sample rule SUBSTITUTION location.host 0 aventail.location.host Result In this rule, 0 is the lval/rval value, which tells the Web access service (extraweb) when to do substitution. If substitution is to be done only when a token is read from RHS then the value is 1. If substitution is to be done only when a token is written to, then this value is 2. To substitute in all instances, 0 is used. The sample rule above replaces all instances of location.host with aventail.location.host. SUBARGS This is used if the object on which the function is called requires translation. Sample rule SUBARGS.Open 0 aventail.objopen Result Replaces all calls such as window.open(param) with avential.objopen(window, param). This helps in translating the param correctly depending on the window object, and then does additional processing before opening a new window.
13 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 9 VBScript Translation Follow these recommendations when writing JavaScript: Do not use DOM references as variables names. For example, do not call any of your variables location. See the list of existing rules in Translation Rules on page 5 to know what to avoid. Avoid the with construct. For example: with(object) {statements} Avoid passing DOM objects as parameters to functions. For example, avoid writing functions of the following form: function test(mywin) { mywin.location = " } Instead, make sure that the network-sensitive JavaScript appears verbatim and do not hide the names of the underlying DOM objects. For example: window.location = " Do not set a base tag using JavaScript; this invalidates all the translated URLs on the page. Do not use conditional compilation for Internet Explorer (for ). Do not use Microsoft Script Encoding (for example, do not set language to JScript.Encode). Avoid using eval and innerhtml; they post the content back to the server for translation, which may affect performance. To add a rule for JavaScript translation 1. Create a file named custom-jstrans.cfg in the /usr/local/extranet/etc/ directory on the appliance. 2. Add custom translation rules following the syntax used in jstrans.cfg (see Translation Rules on page 5). For example, suppose an application uses a function that loads a file from a link, such as.load. This function is not defined in JavaScript, but is a method of a standard object present in the browser context. The param of this function must be translated in order for it to work properly. Add the following line to custom-jstrans.cfg to do the required translation: CALL.load 1 aventail.translate_url 3. Restart the Web access service by running the following command on the appliance: /etc/init.d/extraweb restart Alternatively, you can restart Web proxy service in AMC: click Services in the main navigation menu, click Stop, and then click Start. VBScript translation is not supported. Java Applet, ActiveX and Flash Translation XML Translation No translation of Java applets, ActiveX or Flash objects is performed. If possible, avoid using them. If it is not possible to avoid using these objects entirely, consider constructing the network references they need from the URL of the page that they are on. Perform this construction dynamically at run time. Host name mapped or Port mapped translations can be used for Java applets, ActiveX or Flash object based applications. The XML translation is done when content is identified as XML data, which is determined using the following logic: Content header is text/xml An XML declaration tag is present inside the content header: <?xml version="1.0" encoding="utf-8"?>
14 10 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide Web Aliases Referrer Lookup The html tag has an attribute of xmlns Doctype/Meta tags are used to indicate the content type Since XML needs to be described to make sense of the data, you must identify the portions of the XML content that require translation. This is done in the following file: /usr/local/extranet/etc/custom-xmltrans.cfg The format of the rules to add to this file is: ELEMENT ATTR1 ATTR2... ATTRn This instructs the translation engine to look for element ELEMENT in the XML and to translate its attributes ATTR1, ATTR2..., ATTRn (these attributes are URLs). For XML the custom-xmltrans.cfg file needs to be edited only if relative URLs are used. For example: <customelement path= /foo/bar.html helpfile= /help/en/index.html > <otherelement src= /> <otherelement src= /> <otherelement src= /> <otherelement src= /> <otherelement src= /> </customelement> The src attribute of otherelement does not need an entry because it always uses a fully qualified URL. Because customelement uses relative paths it requires a rule: customelement path helpfile Web aliases are declared when you configure a resource. They are used to hide the host name of the internal server. You should avoid using the same name for the alias as for the top level directory of your application. For example, if your Web appliance resides in do not use coolapp as the alias for the resource in AMC. When a request for an absolute or relative URL for which there is no matching alias comes in, the Web translation engine looks at the Referrer HTTP header or the referrer cookie that it sets. This header or cookie is used to correctly assemble the destination URL. This is a best effort attempt and you should not rely on this mechanism for proper translation.
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Pass Through Proxy. How-to. Overview:..1 Why PTP?...1
Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example
Working with FirePass Portal Access (Reverse Proxy)
Deployment Guide Working with the FirePass Controller Portal Access (Reverse Proxy) Mode Working with FirePass Portal Access (Reverse Proxy) The FirePass controller, the industry leading SSL VPN solution
reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)
1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support
SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Outlook Web Access (OWA) Premium
Release Notes. Platform Compatibility. Supported Operating Systems and Browsers: AMC. WorkPlace
Secure Remote Access SonicWALL Aventail E-Class SRA EX-Series 10.5.6 Platform Compatibility The SonicWALL Aventail E-Class SRA EX-Series 10.5.6 release is supported on the following SonicWALL appliances:
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
Dell SonicWALL SRA 8.0. Application Offloading and HTTP(S) Bookmarks Feature Module
Dell SonicWALL SRA 8.0 Application Offloading and HTTP(S) Bookmarks Feature Module 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Portals and Hosted Files
12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines
SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide
SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment
ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide
ESET SECURE AUTHENTICATION SonicWall SSL VPN Integration Guide ESET SECURE AUTHENTICATION Copyright 2013 by ESET, spol. s r.o. ESET Secure Authentication was developed by ESET, spol. s r.o. For more information
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Microsoft Lync Server 2010
Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
Chapter 5 Configuring the Remote Access Web Portal
Chapter 5 Configuring the Remote Access Web Portal This chapter explains how to create multiple Web portals for different users and how to customize the appearance of a portal. It describes: Portal Layouts
Clientless SSL VPN End User Set-up
37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also
Novell Access Manager
Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
Working With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0
GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2010, Parallels, Inc.
Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction
SSL-VPN Using different Security Policies on Group Level for AD within one Portal SSL-VPN Security on Group Level Introduction Security on the SSL-VPN is done via Policies which allows or denies access
Access Gateway Guide Access Manager 4.0 SP1
Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
ADOBE CONNECT ENTERPRISE SERVER 6
Chapter 1: ADOBE CONNECT ENTERPRISE SERVER 6 SSL CONFIGURATION GUIDE Copyright 2006 Adobe Systems Incorporated. All rights reserved. Adobe Connect Enterprise Server 6, for Windows If this guide is distributed
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
LabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Using SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
Transferring Your Internet Services
Page 1 of 6 Transferring Your Internet Services Below you will find the instructions necessary to move your web hosting, email, and DNS services to NuVox. The Basics Transferring your domain name Preparing
Appendix D: Configuring Firewalls and Network Address Translation
Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.
Reverse Proxy Guide. Version 2.0 April 2016
Version 2.0 April 2016 Reverse Proxy Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Anonymity on the Internet Over Proxy Servers
Anonymity on the Internet Over Proxy Servers Final Product Fábio Rodrigues [email protected] Matej Bulić [email protected] Introduction user always leaves digital sign need for security and anonymity Proxy
Technical Brief ActiveSync Configuration for WatchGuard SSL 100
Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile
Securing Citrix with SSL VPN Technology
Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
Session Management in Web Applications
Session Management in Web Applications Author: EUROSEC GmbH Chiffriertechnik & Sicherheit Tel: 06173 / 60850, www.eurosec.com EUROSEC GmbH Chiffriertechnik & Sicherheit, 2005 What is Web-based Session
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Microsoft Exchange Server 2007 Table of Contents Table of Contents Deploying F5 devices with Microsoft Exchange Server 2007 Client Access Servers Prerequisites
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
FileMaker Server 14. Custom Web Publishing Guide
FileMaker Server 14 Custom Web Publishing Guide 2004 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6. Introduction. Table of Contents
Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6 Introduction Organizations use the Barracuda Load Balancer to distribute the load and increase the availability of
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates
Contents. Platform Compatibility. Known Issues
Secure Remote Access SonicWALL SSL VPN 4.0.0.13 Contents Platform Compatibility... 1 Known Issues... 1 Resolved Issues... 2 Upgrading SonicWALL SSL VPN Firmware... 3 Related Technical Documentation...
Deploying the BIG-IP System v10 with Oracle Application Server 10g R2
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
FileMaker Server 15. Custom Web Publishing Guide
FileMaker Server 15 Custom Web Publishing Guide 2004 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1
SUBJECT TITLE : WEB TECHNOLOGY SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1 16 02 2. CSS & JAVASCRIPT Test
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
Web Application Firewall on SonicWALL SRA
Web Application Firewall on SonicWALL SRA Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SRA 6.0. This document contains the following
SonicWALL SRA 6.0 Application Offloading and HTTP(S) Bookmarks
SonicWALL SRA 6.0 Application Offloading and HTTP(S) Bookmarks Document Scope This document describes the implementation of HTTP(S) reverse proxy to provide access to offloaded Web-based applications and
DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD
DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD Configuring the BIG-IP LTM system for use with FirePass controllers Welcome to the Configuring
SonicWALL SSL VPN 3.5 HTTP(S) Reverse Proxy Support
SonicWALL SSL VPN 3.5 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Sharepoint, Microsoft Outlook
Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server
Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server April, 2014 Introduction This document describes what is new and what has changed in RSA Authentication Agent 7.1.3
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Dell SonicWALL SRA 7.0 Application Offloading and HTTP(S) Bookmarks
Dell SonicWALL SRA 7.0 Application Offloading and HTTP(S) Bookmarks Document Scope This document describes the implementation of HTTP(S) reverse proxy to provide access to offloaded Web-based applications
Integrating the F5 BigIP with Blackboard
Integrating the F5 BigIP with Blackboard Nick McClure [email protected] Lead Systems Programmer University of Kentucky Created August 1, 2006 Last Updated June 17, 2008 Integrating the F5 BigIP with Blackboard
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Remote Access for LAPD Users Using Aventail SSL VPN
Remote Access for LAPD Users Using Aventail SSL VPN About Aventail SSL VPN This document describes how to access the LAPD network remotely, using a technology called SSL (Secure Socket Layer) VPN (Virtual
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
