Web Translation. Web Developer Guide v v10.5.0

Size: px
Start display at page:

Download "Web Translation. Web Developer Guide v8.6.0 - v10.5.0"

Transcription

1 Web Translation Web Developer Guide v v SonicWALL, Inc. All rights reserved. SonicWALL is a registered trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Last modified 12/7/09 10: Rev A

2

3 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide i Table of Contents Overview Introduction Translation Using Host Name and Path Portion Together Translation Using Only the Host Name Portion Benefits Notes and Caveats How Web Translation Works Content-Type of Web Pages Character Encoding Cookie Translation URLs HTML Translation CSS Translation HTC Translations JavaScript Translation Translation Rules Adding Custom Rules for JavaScript Translation VBScript Translation Java Applet, ActiveX and Flash Translation XML Translation Web Aliases Referrer Lookup

4 ii Table of Contents

5 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 1 Overview Introduction A truly clientless VPN appliance requires a robust Web-content translation engine: all network references within the Web content must be changed to point to the VPN appliance instead of internal hosts. With full-client VPNs or VPN appliances that use Web-deployed ActiveX or Java clients, this host mapping can be done on the client. But for VPN access for the broadest possible browser base, Web content translation is indispensable. This document is intended for Web application developers who want to make their software easier to translate for the SonicWALL Aventail translation engine. It provides a set of guidelines to achieve this goal and gives a brief overview of certain aspects of the translation engine. The instructions are valid for SonicWALL Aventail appliances running v8.6.0 through To illustrate why a translation engine is necessary for Web content, imagine an HTML page with the following anchor tag that links to an internal resource: <a href=" Web Access</a> Within the corporate network, the link works perfectly. When the user clicks the link in a Web browser, the browser asks the internal DNS server what the IP address of owa.in.sonicwall.com is and retrieves the desired page. Outside of the corporate network, however, the link does not work. The browser asks the DNS server of the local ISP what the IP address for owa.in.sonicwall.com is and is told that address doesn t exist. Even if the link were to a routable IP address within the corporate network, the corporate firewall would probably prevent the browser from accessing the desired resource. Web content translation is the process of changing (translating) the link above into something that is addressable in the public domain and also contain the intelligence to reach the desired backend resource. There are different ways to do the translation. 1. A dedicated DNS-resolvable host name is mapped to the desired resource. The translated URL may look something like this: <a href=" Web Access</a> The internal host name (owa.in.sonicwall.com) is mapped to the DNS-resolvable host name of the VPN appliance (exchange.sonicwall.com). But the appliance does not hold the desired resource: the end resource must be encoded in some way within the URL. In this example, the host name (exchange.sonicwall.com) itself is mapped to the desired resource. 2. A port number is mapped to the desired resource. The translated URL may look something like this: <a href=" Web Access</a> The internal host name (owa.in.sonicwall.com) is mapped to the DNS-resolvable host name of the VPN appliance (ex7000.sonicwall.com). ). But the appliance doesn t hold the desired resource: the end resource must be encoded in some way within the URL. In this example, it is mapped with the port Number (7456) in the host name portion of the URL. 3. The path portion contains the information of the desired resource.

6 2 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide The translated URL may look something like this: <a href=" Web Access</a> The host name is changed from the internal host name (owa.in.sonicwall.com) to the DNSresolvable host name of the VPN appliance (ex7000.sonicwall.com/go/owa.in.sonicwall.com). But the appliance doesn t hold the desired resource: the end resource must be encoded in some way within the URL. In this example, it is encoded within the path portion of the URL. If the only kind of Web translation necessary were a translation of HTML links, as in this example, things would be easy. This unfortunately is not so. There are numerous ways to reference network resources in HTML alone. JavaScript, for example, is difficult to handle because it provides a means of executing code on the browser and it allows the user to feed in additional input that is unknown at the time the server-side translation is done. The user can be prompted for a URL using JavaScript and the browser can then be instructed to go to that URL. The scenarios (1) and (2) above are those of translating only the host name portion of the URL. Case (3) is that of translating both the host name and the path portion of the URL. There are options in the AMC to select the type of transaction for each resource. For better compatibility, SonicWALL strongly recommends using options (1) or (2) in most production environments. Option (3) should be used for well-known Web applications like Outlook Web Access and Sharepoint. More details about the two methods of Translating Web URLs are provided in the following sections. Translation Using Host Name and Path Portion Together The host name is DNS-resolvable to the VPN appliance. The information for the desired backend resource is contained in the path portion of the URL. Translation Using Only the Host Name Portion The host name is DNS-resolvable to the VPN appliance and also contains the desired backend resource information. There are two ways to contain the resource information. 1. Host name mapped Host name mapping means that the backend resource or server is mapped to an external host name. The resource is accessed with the host name rather than with the IP address. The host name is resolvable to an IP address in the public domain. Apache listens on port 443 at this IP address. All HTTPS traffic is terminated at this socket. A new HTTP request is made to retrieve the mapped backend resource. The HTTP reply is parsed to translate absolute URLs. Each host name mapped site must have a valid certificate. The wildcard certificates can be leveraged for multiple host mapped sites. See example #1 in the Introduction section. 2. Port mapped Port mapping involves mapping the backend resource or server to a port number at the EX- Series appliance. The Server listens on this port and all HTTPS traffic received on it is terminated at the appliance. A new HTTP request is made to retrieve the mapped backend resource. The HTTP reply is parsed to translate absolute URLs. With Port Mapped access, any firewalls in the network need to be configured to keep the specific ports open. See example #2 in the Introduction section. These translations work best for applications using relative URLs. But the translation engine does process data for absolute URL translation. The example in the above segment explains that of an absolute URL translation. For relative URLs it works automatically as the base URL is similar in the two cases of direct access or indirect access through the VPN appliance.

7 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 3 Benefits Light weight as compared to other translation Less maintenance is required Works better with most of the well written applications The resources can be accessed directly as a bookmark, or through a link in WorkPlace Modern applications which contain AJAX or Flash will work better with this mode of translation Notes and Caveats How Web Translation Works Logging out of applications like OWA, DWA and Sharepoint from an Internet Explorer browser may log you out of WorkPlace For port mapping, the firewall needs to be configured to grant access to the specific ports Each resource should be configured using only one of the access methods; do not mix translated, port mapped and host name mapped modes Host name mapped resources should be configured/accessed using host name only, that is. not via IP address The Web translation engine is part of the SonicWALL Aventail SSL VPN appliance, which sits at the network perimeter. The appliance isolates and protects private Web-based resources from unauthorized external access. A user first logs in to the appliance and is presented with the WorkPlace portal, where he or she follows links that point to resources on the internal network, or enters a URL. All URLs point to the SonicWALL Aventail appliance. The Web translation engine translates an incoming URL using an alias contained in the URL. Aliases are used to obscure the URLs that point to resources on your internal ( downstream ) servers. Because all requests are directed to the appliance, the user sees only the incoming URL that contains the alias. The translation engine matches the alias to a list it stores in memory and translates the URL. Once it s determined that the URL submitted by the user is valid and points to a resource on the network, the appliance checks its access control and authentication rules to make sure the user is authorized to access the requested resource. Content-Type of Web Pages Although the SonicWALL Aventail translation engine uses heuristics to guess the type of content in an HTTP response from the backend Web server, it is best to avoid relying on this and to instead specify the type explicitly. The single most important thing you can do to ensure proper translation is to make sure that all pages are served up with the correct Content-Type header. The Content-Type must be set as follows: Content HTML JavaScript XML Content-Type header text/html application/x-javascript text/html

8 4 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide Character Encoding Cookie Translation URLs As an internationalized network device, the SonicWALL Aventail appliance uses UTF-8 exclusively for its internal work. ISO-8859-x encoding is not supported. Use UTF-8 exclusively for all your Web content, and do not use the Microsoft code-pages. This particularly important when POSTing form data. The path portion of a Set-Cookie header is translated, and the domain portion is discarded. For example, suppose the back-end Web server sends the following header: Set-Cookie: x=y; path=/; domain=.in.sonicwall.com If the alias associated with the Web resource is morty, then this header is translated as follows: Set-Cookie: x=y; path=/morty/ This forces the Web browser to send the cookie only to the alias (and therefore the Web server) that set the cookie. Follow these recommendations when handling browser cookies: Avoid sophisticated client-side cookie manipulations using JavaScript. Avoid using URLs in cookies. Although an attempt is made to translate those URLs, there is some risk of letting them through. The translation engine can handle URLs in any form: Type of URL Fully-qualified Example Absolute path /dir1/dir2/file.html Relative path (recommended)../dir2/file.html HTML Translation Using relative paths in your Web application is recommended. This also has the advantage of making your Web application more portable if you move it to another Web server and directory. HTML translation is handled very reliably by the SonicWALL Aventail appliance. Follow these recommendations when coding your HTML: Make sure your HTML content is formatted according to standards, especially the quotes around attributes in tags. Ideally, use XHTML formatting. HTML attributes containing a value (for example, src="path") may not be translated if they contain any of the following errors: Spaces before or after the equal sign: src ="path" or src= "path" Leading or trailing spaces within the value: src=" path" or src="path " Missing an opening or closing quotation mark: src="path or src=path" Avoid base tags in your HTML code. For example: <base href=" /> The meta tag is commonly used to redirect users to another page. For example: <meta http-equiv="refresh" content="5;url=redirecturl.html" />

9 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 5 CSS Translation HTC Translations JavaScript Translation The meta tag s content attribute must be formatted carefully; don t include line breaks or spaces. CSS content is handled by the translation engine without difficulty. No translation is done for HTC (HTML components). Avoid using the standard attributes (such as action and innerhtml) of HTML as a property of various HTML components. JavaScript translation is complex and there are certain coding practices that you can use to make sure your code translates correctly. Translation Rules The SonicWALL Aventail JavaScript translation engine is based on a parse tree that can handle complex syntax. It is also a rule-based translator that makes use of the appliance s client-side JavaScript library. The rules are stored in the following file: /usr/local/extranet/etc/jstrans.cfg The translation rules are divided into the following four categories: Type ASSIGNMENT CALL SUBSTITUTION SUBARGS Description Assignment statement translation Function call translation Substitution of one language token with another Special kind of substitution within a function call Here are the JavaScript rules as of January # Type Left Hand Side (LHS) Encapsulate RHS with ASSIGNMENT location aventail.translate_url ASSIGNMENT.location aventail.translate_url ASSIGNMENT.href aventail.translate_url ASSIGNMENT.src aventail.translate_url ASSIGNMENT.action aventail.translate_url ASSIGNMENT document.domain aventail.setdomain ASSIGNMENT document.cookie aventail.setcookie ASSIGNMENT.innerHTML aventail.posttext ASSIGNMENT.url aventail.translate_url # Function Call Translation # Type Function Name Param Encapsulate param with

10 6 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide CALL.addBehavior 1 aventail.translate_url CALL.showModalDialog 1 aventail.translate_url CALL.showModelessDialog 1 aventail.translate_url CALL.insertAdjacentHTML 2 aventail.posttext CALL.location.replace 1 aventail.translate_url CALL location.replace 1 aventail.translate_url CALL location.assign 1 aventail.translate_url CALL location.href 1 aventail.translate_url CALL eval 1 aventail.post # Subsitution of one token with another # lvalue/rvalue: 0: substitute always # 1: substitute only if token is an rvalue (read from) # 2: substitute only if token is an lvalue (written to) # 3: substitute only if token is a function name # Type Token lval/rval Replacement SUBSTITUTION location.pathname 0 aventail.location.pathname SUBSTITUTION.location.pathname 0.aventail.location.pathname SUBSTITUTION document.domain 1 document.aventail.getdomain() SUBSTITUTION document.domain 2 aventail.junk SUBSTITUTION location.host 0 aventail.location.host SUBSTITUTION.location.host 0.aventail.location.host SUBSTITUTION location.hostname 0 aventail.location.hostname SUBSTITUTION.location.hostname 0.aventail.location.hostname SUBSTITUTION location.port 0 aventail.location.port SUBSTITUTION.location.port 0.aventail.location.port SUBSTITUTION location.protocol 0 aventail.location.protocol SUBSTITUTION.location.protocol 0.aventail.location.protocol SUBSTITUTION location.href 1 aventail.location.href SUBSTITUTION.location.href 1.aventail.location.href SUBSTITUTION location.search 1 aventail.location.search SUBSTITUTION.location.search 1.aventail.location.search SUBSTITUTION location 1 aventail.location SUBSTITUTION.scripts 1.aventail.getScripts() # Subsitution of one token with another, with a twist: # Take the "stem" of the call and make it the first argument in the new function. # For example: # If we have the token "foo.bar" and the replacement "aventail.ourfoo": # We will replace the construction "anobject.foo.bar(arg1, arg2)" with: # aventail.ourfoo(anobject, arg1, arg2) # This allows us to verify the type of the anobject object prior to operating on it # lvalue/rvalue: 0: substitute always # 1: substitute only if token is an rvalue (read from) # 2: substitute only if token is an lvalue (written to) # 3: substitute only if token is a function name # 4: special case, turn a flat lvalue into a function call # The "3" case above is used in cases such as "foo.location" to allow us to ensure # that "foo" is an object such as a document, window, or frame, and not some # user-defined object that just happens to have a "location" member.

11 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 7 # Type Token lval/rval Replacement SUBARGS document.close 0 aventail.docclose SUBARGS document.write 0 aventail.docwrite SUBARGS document.writeln 0 aventail.docwrite SUBARGS.open 0 aventail.objopen SUBARGS.Open 0 aventail.objopen SUBARGS.location 4 aventail.objlocation SUBARGS.opener 4 aventail.findopener SUBARGS.execCommand 3 aventail.execcommand # SharePoint 2003 extensions... Because these URLs end up getting # passed directly to an ActiveX control that fires up MSWord directly # we need to include our state token in the URLs. # These calls are documented at: # CALL.ViewDocument 1 aventail.translatewithstatetoken CALL.ViewDocument2 2 aventail.translatewithstatetoken CALL.EditDocument 1 aventail.translatewithstatetoken CALL.EditDocument2 2 aventail.translatewithstatetoken CALL.CreateNewDocument 1 aventail.translatewithstatetoken CALL.CreateNewDocument 2 aventail.translatewithstatetoken CALL.CreateNewDocument2 2 aventail.translatewithstatetoken CALL.CreateNewDocument2 3 aventail.translatewithstatetoken CALL ExportList 1 aventail.translatewithstatetoken CALL RDSDataSpace.CreateObject 2 aventail.translate_url Adding Custom Rules for JavaScript Translation Although most rules for standard JavaScript translation are present in jstrans.cfg, additional rules may be required. To create new rules you must first understand how each ASSIGNMENT, CALL, SUBSTITUTION, and SUBARGS is translated. ASSIGNMENT This is used to translate the assignments. Sample rule ASSIGNMENT location aventail.translate_url Result Replaces assignments such as location=str with location= aventail.translate_url(str) CALL This is used to translate the parameters (which have urls) of function calls. Sample rule CALL eval 1 aventail.post Result

12 8 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide Sample rule Replaces calls such as eval(str) with eval(aventail.post(str)) In this case the eval parameter must be translated before the function is called. SUBSITUTION This is used to replace certain tokens with something else. Sample rule SUBSTITUTION location.host 0 aventail.location.host Result In this rule, 0 is the lval/rval value, which tells the Web access service (extraweb) when to do substitution. If substitution is to be done only when a token is read from RHS then the value is 1. If substitution is to be done only when a token is written to, then this value is 2. To substitute in all instances, 0 is used. The sample rule above replaces all instances of location.host with aventail.location.host. SUBARGS This is used if the object on which the function is called requires translation. Sample rule SUBARGS.Open 0 aventail.objopen Result Replaces all calls such as window.open(param) with avential.objopen(window, param). This helps in translating the param correctly depending on the window object, and then does additional processing before opening a new window.

13 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide 9 VBScript Translation Follow these recommendations when writing JavaScript: Do not use DOM references as variables names. For example, do not call any of your variables location. See the list of existing rules in Translation Rules on page 5 to know what to avoid. Avoid the with construct. For example: with(object) {statements} Avoid passing DOM objects as parameters to functions. For example, avoid writing functions of the following form: function test(mywin) { mywin.location = " } Instead, make sure that the network-sensitive JavaScript appears verbatim and do not hide the names of the underlying DOM objects. For example: window.location = " Do not set a base tag using JavaScript; this invalidates all the translated URLs on the page. Do not use conditional compilation for Internet Explorer (for ). Do not use Microsoft Script Encoding (for example, do not set language to JScript.Encode). Avoid using eval and innerhtml; they post the content back to the server for translation, which may affect performance. To add a rule for JavaScript translation 1. Create a file named custom-jstrans.cfg in the /usr/local/extranet/etc/ directory on the appliance. 2. Add custom translation rules following the syntax used in jstrans.cfg (see Translation Rules on page 5). For example, suppose an application uses a function that loads a file from a link, such as.load. This function is not defined in JavaScript, but is a method of a standard object present in the browser context. The param of this function must be translated in order for it to work properly. Add the following line to custom-jstrans.cfg to do the required translation: CALL.load 1 aventail.translate_url 3. Restart the Web access service by running the following command on the appliance: /etc/init.d/extraweb restart Alternatively, you can restart Web proxy service in AMC: click Services in the main navigation menu, click Stop, and then click Start. VBScript translation is not supported. Java Applet, ActiveX and Flash Translation XML Translation No translation of Java applets, ActiveX or Flash objects is performed. If possible, avoid using them. If it is not possible to avoid using these objects entirely, consider constructing the network references they need from the URL of the page that they are on. Perform this construction dynamically at run time. Host name mapped or Port mapped translations can be used for Java applets, ActiveX or Flash object based applications. The XML translation is done when content is identified as XML data, which is determined using the following logic: Content header is text/xml An XML declaration tag is present inside the content header: <?xml version="1.0" encoding="utf-8"?>

14 10 SonicWALL Aventail E-Class SRA SSL VPN Web Translation Developer Guide Web Aliases Referrer Lookup The html tag has an attribute of xmlns Doctype/Meta tags are used to indicate the content type Since XML needs to be described to make sense of the data, you must identify the portions of the XML content that require translation. This is done in the following file: /usr/local/extranet/etc/custom-xmltrans.cfg The format of the rules to add to this file is: ELEMENT ATTR1 ATTR2... ATTRn This instructs the translation engine to look for element ELEMENT in the XML and to translate its attributes ATTR1, ATTR2..., ATTRn (these attributes are URLs). For XML the custom-xmltrans.cfg file needs to be edited only if relative URLs are used. For example: <customelement path= /foo/bar.html helpfile= /help/en/index.html > <otherelement src= /> <otherelement src= /> <otherelement src= /> <otherelement src= /> <otherelement src= /> </customelement> The src attribute of otherelement does not need an entry because it always uses a fully qualified URL. Because customelement uses relative paths it requires a rule: customelement path helpfile Web aliases are declared when you configure a resource. They are used to hide the host name of the internal server. You should avoid using the same name for the alias as for the top level directory of your application. For example, if your Web appliance resides in do not use coolapp as the alias for the resource in AMC. When a request for an absolute or relative URL for which there is no matching alias comes in, the Web translation engine looks at the Referrer HTTP header or the referrer cookie that it sets. This header or cookie is used to correctly assemble the destination URL. This is a best effort attempt and you should not rely on this mechanism for proper translation.

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1 Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example

More information

Working with FirePass Portal Access (Reverse Proxy)

Working with FirePass Portal Access (Reverse Proxy) Deployment Guide Working with the FirePass Controller Portal Access (Reverse Proxy) Mode Working with FirePass Portal Access (Reverse Proxy) The FirePass controller, the industry leading SSL VPN solution

More information

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010 DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration

More information

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Outlook Web Access (OWA) Premium

More information

Release Notes. Platform Compatibility. Supported Operating Systems and Browsers: AMC. WorkPlace

Release Notes. Platform Compatibility. Supported Operating Systems and Browsers: AMC. WorkPlace Secure Remote Access SonicWALL Aventail E-Class SRA EX-Series 10.5.6 Platform Compatibility The SonicWALL Aventail E-Class SRA EX-Series 10.5.6 release is supported on the following SonicWALL appliances:

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

Dell SonicWALL SRA 8.0. Application Offloading and HTTP(S) Bookmarks Feature Module

Dell SonicWALL SRA 8.0. Application Offloading and HTTP(S) Bookmarks Feature Module Dell SonicWALL SRA 8.0 Application Offloading and HTTP(S) Bookmarks Feature Module 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Portals and Hosted Files

Portals and Hosted Files 12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines

More information

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment

More information

ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide

ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide ESET SECURE AUTHENTICATION SonicWall SSL VPN Integration Guide ESET SECURE AUTHENTICATION Copyright 2013 by ESET, spol. s r.o. ESET Secure Authentication was developed by ESET, spol. s r.o. For more information

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3 Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

Microsoft Lync Server 2010

Microsoft Lync Server 2010 Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web

More information

Tableau Server Trusted Authentication

Tableau Server Trusted Authentication Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Configuring Single Sign-on for WebVPN

Configuring Single Sign-on for WebVPN CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

Chapter 5 Configuring the Remote Access Web Portal

Chapter 5 Configuring the Remote Access Web Portal Chapter 5 Configuring the Remote Access Web Portal This chapter explains how to create multiple Web portals for different users and how to customize the appearance of a portal. It describes: Portal Layouts

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

Novell Access Manager

Novell Access Manager Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model

More information

Working With Virtual Hosts on Pramati Server

Working With Virtual Hosts on Pramati Server Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name

More information

Release Notes for Version 1.5.207

Release Notes for Version 1.5.207 Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4

More information

Webmail Using the Hush Encryption Engine

Webmail Using the Hush Encryption Engine Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5

More information

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT) Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate

More information

2 Downloading Access Manager 3.1 SP4 IR1

2 Downloading Access Manager 3.1 SP4 IR1 Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1

More information

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0 GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2010, Parallels, Inc.

More information

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction SSL-VPN Using different Security Policies on Group Level for AD within one Portal SSL-VPN Security on Group Level Introduction Security on the SSL-VPN is done via Policies which allows or denies access

More information

Access Gateway Guide Access Manager 4.0 SP1

Access Gateway Guide Access Manager 4.0 SP1 Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

ADOBE CONNECT ENTERPRISE SERVER 6

ADOBE CONNECT ENTERPRISE SERVER 6 Chapter 1: ADOBE CONNECT ENTERPRISE SERVER 6 SSL CONFIGURATION GUIDE Copyright 2006 Adobe Systems Incorporated. All rights reserved. Adobe Connect Enterprise Server 6, for Windows If this guide is distributed

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone

More information

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on

More information

LabVIEW Internet Toolkit User Guide

LabVIEW Internet Toolkit User Guide LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,

More information

Transferring Your Internet Services

Transferring Your Internet Services Page 1 of 6 Transferring Your Internet Services Below you will find the instructions necessary to move your web hosting, email, and DNS services to NuVox. The Basics Transferring your domain name Preparing

More information

Appendix D: Configuring Firewalls and Network Address Translation

Appendix D: Configuring Firewalls and Network Address Translation Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.

More information

Reverse Proxy Guide. Version 2.0 April 2016

Reverse Proxy Guide. Version 2.0 April 2016 Version 2.0 April 2016 Reverse Proxy Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for

More information

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

Anonymity on the Internet Over Proxy Servers

Anonymity on the Internet Over Proxy Servers Anonymity on the Internet Over Proxy Servers Final Product Fábio Rodrigues [email protected] Matej Bulić [email protected] Introduction user always leaves digital sign need for security and anonymity Proxy

More information

Technical Brief ActiveSync Configuration for WatchGuard SSL 100

Technical Brief ActiveSync Configuration for WatchGuard SSL 100 Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile

More information

Securing Citrix with SSL VPN Technology

Securing Citrix with SSL VPN Technology Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across

More information

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by

More information

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Load Balancing. Outlook Web Access. Web Mail Using Equalizer Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems

More information

Session Management in Web Applications

Session Management in Web Applications Session Management in Web Applications Author: EUROSEC GmbH Chiffriertechnik & Sicherheit Tel: 06173 / 60850, www.eurosec.com EUROSEC GmbH Chiffriertechnik & Sicherheit, 2005 What is Web-based Session

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Microsoft Exchange Server 2007 Table of Contents Table of Contents Deploying F5 devices with Microsoft Exchange Server 2007 Client Access Servers Prerequisites

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

FileMaker Server 14. Custom Web Publishing Guide

FileMaker Server 14. Custom Web Publishing Guide FileMaker Server 14 Custom Web Publishing Guide 2004 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6. Introduction. Table of Contents

Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6. Introduction. Table of Contents Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6 Introduction Organizations use the Barracuda Load Balancer to distribute the load and increase the availability of

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

Contents. Platform Compatibility. Known Issues

Contents. Platform Compatibility. Known Issues Secure Remote Access SonicWALL SSL VPN 4.0.0.13 Contents Platform Compatibility... 1 Known Issues... 1 Resolved Issues... 2 Upgrading SonicWALL SSL VPN Firmware... 3 Related Technical Documentation...

More information

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g

More information

DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES

DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The

More information

FileMaker Server 15. Custom Web Publishing Guide

FileMaker Server 15. Custom Web Publishing Guide FileMaker Server 15 Custom Web Publishing Guide 2004 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1

SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1 SUBJECT TITLE : WEB TECHNOLOGY SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1 16 02 2. CSS & JAVASCRIPT Test

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

How-to: Single Sign-On

How-to: Single Sign-On How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

Web Application Firewall on SonicWALL SRA

Web Application Firewall on SonicWALL SRA Web Application Firewall on SonicWALL SRA Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SRA 6.0. This document contains the following

More information

SonicWALL SRA 6.0 Application Offloading and HTTP(S) Bookmarks

SonicWALL SRA 6.0 Application Offloading and HTTP(S) Bookmarks SonicWALL SRA 6.0 Application Offloading and HTTP(S) Bookmarks Document Scope This document describes the implementation of HTTP(S) reverse proxy to provide access to offloaded Web-based applications and

More information

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD Configuring the BIG-IP LTM system for use with FirePass controllers Welcome to the Configuring

More information

SonicWALL SSL VPN 3.5 HTTP(S) Reverse Proxy Support

SonicWALL SSL VPN 3.5 HTTP(S) Reverse Proxy Support SonicWALL SSL VPN 3.5 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Sharepoint, Microsoft Outlook

More information

Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server

Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server April, 2014 Introduction This document describes what is new and what has changed in RSA Authentication Agent 7.1.3

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications 1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won

More information

Crawl Proxy Installation and Configuration Guide

Crawl Proxy Installation and Configuration Guide Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main

More information

Dell SonicWALL SRA 7.0 Application Offloading and HTTP(S) Bookmarks

Dell SonicWALL SRA 7.0 Application Offloading and HTTP(S) Bookmarks Dell SonicWALL SRA 7.0 Application Offloading and HTTP(S) Bookmarks Document Scope This document describes the implementation of HTTP(S) reverse proxy to provide access to offloaded Web-based applications

More information

Integrating the F5 BigIP with Blackboard

Integrating the F5 BigIP with Blackboard Integrating the F5 BigIP with Blackboard Nick McClure [email protected] Lead Systems Programmer University of Kentucky Created August 1, 2006 Last Updated June 17, 2008 Integrating the F5 BigIP with Blackboard

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Remote Access for LAPD Users Using Aventail SSL VPN

Remote Access for LAPD Users Using Aventail SSL VPN Remote Access for LAPD Users Using Aventail SSL VPN About Aventail SSL VPN This document describes how to access the LAPD network remotely, using a technology called SSL (Secure Socket Layer) VPN (Virtual

More information

Tableau Server Trusted Authentication

Tableau Server Trusted Authentication Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted

More information