BorderGuard Client. Version 4.4. November 2013

Size: px
Start display at page:

Download "BorderGuard Client. Version 4.4. November 2013"

Transcription

1 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks Parke Long Court, Suite 103 Chantilly, Virginia All Products are provided with RESTRICTED RIGHTS. Use, duplication or disclosure by the Government is subject to restrictions set forth herein and in sub-paragraphs (a) through (d) of the Commercial Computer-Restricted Rights clause at FAR , as applicable.

2 Table of Contents 1 Introduction Overview Hardware and Software Requirements Software Hardware Operation Installing Prerequisites Installing from CD or Disk Drive Installing using SMS or SCCM Running First Time Use when using Security Tokens Connecting using a Security Token Connecting using a Crypto Ignition Key Connecting using an X.509 Certificate Disconnecting from your Home Network Viewing Logs Troubleshooting Page 2

3 1 Introduction 1.1 Overview The BorderGuard (BG) Client is used to securely connect a Windows PC to a remote Home Network (the customer s or agency s internal network) after the end-user s identity is validated. There are three different authentication methods used by the. The first is a Security token. When the Security Token is inserted into a USB port, the application will prompt for a PIN number. After the PIN is validated, will connect to the remote Home Network specified on the Security Token. Security Tokens are generated using the Token Utility which can be downloaded from the BorderGuard Management Console. After the Security Token is created, a PIN must be generated on the token using the BorderGuard PIN utility. The second authentication method is to use an X.509 Identification Certificate. This certificate can be installed on the user s PC or it can be located on a smart card (such as a CAC or PIV card) inserted into the PC. Also optionally, after the PC has network connectivity to the Home Network, the BorderGuard Client can be configured to terminate the connection if an Active Directory Smart Card Authentication is not performed. The third authentication method is a USB Crypto Ignition key. In this case, a policy on the key indicates that a PIN is not required and the client will connect without prompting for a password as soon as the key is inserted into a USB port. 2 Hardware and Software Requirements 2.1 Software Microsoft Windows VISTA, Service Pack 2 and above (32 and 64 Bit). Microsoft Windows 7, Service Pack 0 and above (32 and 64 Bit). Microsoft Windows 8, Service Pack 0 and above (32 and 64 Bit). 2.2 Hardware Multi-core processor recommended: Recommended: Core 2 Duo (>=1.8Ghz) or better Minimum: Pentium 4 with hyper-threading enabled (>=2.4Ghz) or better 1.00 GB of Available RAM (2.0 GB Recommended). 200 MB free Hard Disk space. 3 Operation 3.1 Installing NOTE: should not be installed on any PC that already has a Blue Ridge VPN Client installed on it that uses an ikey for two-factor authentication. Any previous version of BorderGuard Client must be uninstalled prior to installing the latest version. Page 3

4 3.1.1 Prerequisites Disable any Antivirus software. Close all applications and utilities. The system should have at least the minimum configuration described above Installing from CD or Disk Drive 1. To run the installation program, logon as a user with local administrator rights on the system. The installation will check the rights and terminate with an error if the user doesn't have the local administrator privileges on the system. Note: The user does not require administrator privileges to run the application; administrator privileges are only required for installation. 2. If AppGuard Consumer is installed, lower the AppGuard protection level to Install or Off prior to initiating the installation software. 3. If AppGuard Enterprise is installed on the PC, use the Administrator Mode to disable all AppGuard protections and stop the AppGuard Service. Refer to you AppGuard Enterprise System Administrator for more information. 4. Launch the setup program from either the CD or disk drive. 5. Follow the installation directions. 6. Reboot the workstation if prompted Installing using SMS or SCCM Launch setup.exe with the following parameters: /S To Suppress messages from setup.exe /v Pass parameters (below) to the msiexec.exe /qn Quiet and no user interface /Log <LOG_FILE_PATH> Logs the install to a file REBOOT=ReallySuppress Notes: Parameters are encased in double quotes Everything is case sensitive 3.2 Running First Time Use when using Security Tokens The very first time that you use your Security Token in a particular USB port, a plug and play driver for the Rainbow ikey 1000 is installed. Page 4

5 This should only happen the very first time that a particular USB port is used with the. Double click on the tray icon to initiate another connection Connecting using a Security Token To start the client, insert your token into a USB port and you will be prompted for a PIN (if you have not received a PIN, please contact your system administrator): Once the PIN is validated, the client will verify that there is connectivity to the Blue Ridge BorderGuard network security appliance. Once connectivity is verified, the client will establish an encrypted tunnel to the home network. While the connection is being established, the tray icon will blink until the secure connection is complete. When the connection process is complete, status notification is provided at the tray icon: Likewise, when the tunnel has been dropped, a status notification of the change is displayed: Move the cursor over the icon at any time to view a tool tip displaying the current status Connecting using a Crypto Ignition Key A Crypto Ignition Key is a special security token which has an embedded policy that indicates a PIN is not required in order to initiate a connection. As soon as the Crypto Ignition Key is inserted into a USB port, the Client will validate the key and initiate a VPN Connection to a BorderGuard listed in the connection policy on the Key. Connection status notification is provided as shown in section above. Page 5

6 The Crypto Ignition Key may be used during PC boot up in order to establish a tunnel prior to logging into the PC. This facilitates Active Directory login remotely through the tunnel. When using this feature, the LED on the Crypto Ignition Key provides connection status: On: During PC boot up, if the Crypto Ignition key is inserted prior to the BorderGuard Client service starting, this indicates that the USB driver has recognized that the key has been inserted Steady Double Blink: Indicates that the Client is reading the token and is in the process of connecting. Steady Single Blink: Indicates that the Client is connected. Off: Indicates that either the key s USB driver is not functioning or that the Client has encountered an error when validating the key. Steady Triple Blink: Indicates that the Client is resetting the Cryptographic Engine Using the Crypto Ignition Key during boot up When a Crypto Ignition Key is used to initiate a connection prior to logging in, services to establish Network Connectivity and to enable USB device drivers must be started on the PC. Because this may take several minutes, it is recommended that the Crypto Ignition Key be inserted after the Windows Login screen is displayed. Once the key is inserted, USB drivers will recognize the event and the token s LED will be lit. Next, the client will validate the token s policy settings and initiate a connection to the BorderGuard. During this step, the LED will blink twice in quick succession if the crypto key can be validated. If it cannot be validated, the LED will be turned off. When a connection has been established, the LED will blink steadily. The connection can be terminated by removing the Crypto Ignition key or by clicking on the client tray icon Connecting using an X.509 Certificate Connecting the client using an X.509 certificate requires that a connection profile be defined on the PC for each user. Once the profile is created and saved, connecting is as simple as doubleclicking on the tray icon. Connection status notification is provided as shown in section above. There are three different methods of creating profiles: Manually Create the Profile To create a profile, right-click on the tray icon and select Open BorderGuard from the tray menu: The User Interface will be displayed: Page 6

7 Selecting New from the File menu will display the Connection Profile User Interface: Page 7

8 To create a connection profile, enter the following fields: Profile Name: Enter a name for this profile. This name will appear on the client s main user interface. Description: This is an optional description of the connection profile. BorderGuard: Enter the IP address of the BorderGuard that the client will connect to. Certificate: Click on the Select button to select an X.509 certificate for authentication to the BorderGuard. If using a certificate on a smart card, be sure to insert your smart card prior to clicking on this button: If your policy requires Active Directory Authentication, click on the Check box in the upper left-hand corner. This will cause only certificates which are valid for Active Directory authentication to be displayed. Auto Reconnect: Check this box, if you wish to have the client automatically reconnect if the connection should get disrupted. Commands Tab (optional): The commands tab is used to run programs or scripts at various trigger points during the connection process: o Before connecting: This command will run before the connection process is initiated. o After connecting: This command will run after the connection is established. o Before disconnecting: This command will run after a user explicitly disconnects (i.e. disconnects by clicking on the Disconnect button or selecting Disconnect from the tray menu) the. o After disconnecting: this command will run after the has disconnected from the BorderGuard. o After AD authn: this command will run after a successful Active Directory Authentication is performed. The command should include the entire path of the script or executable. Note: the command execution is ultimately controlled by policy that is downloaded from the BorderGuard immediately before the connection is established. If the policy does not Page 8

9 permit the end-user to edit these commands, then the client will not execute them. Also, if a command is included in the policy it will take precedence over any command that is entered by the end-user. Alternate BorderGuards (optional): This tab is used to enter additional BorderGuards that will be connected to when the primary BorderGuard does not respond: To add an Alternate BorderGuard, enter an IP address and then click on the Add button. To change the order of the BorderGuards, click on the up and down arrows as desired. If Load Spreading is selected, the client will randomly connect to one of the BorderGuards in the Alternate List as well as the BorderGuard entered on the main Connection Profile page resulting in load sharing between all BorderGuards in the list. In the example shown above, the Client will randomly connect to either or If Load Spreading is not selected, then the client will always connect to the BorderGuards in the order listed. Disaster Recovery BorderGuards (optional): This tab is used to enter additional BorderGuards that will be connected to if the primary BorderGuard and all Alternate BorderGuards do not respond. Note, a connection to the disaster recovery BorderGuards will be attempted if and only if all of the other BorderGuards (primary and alternate) could not be reached. After the profile information is entered, click on OK. The profile will now appear in the Profile drop down box on the main user interface: Page 9

10 Automatically create each user s profile from the All Users profile This method of creating the profile is especially useful when will be used by multiple users on the same PC. In this case, the administrator will create a connection profile manually (refer to Section 3.2.4) and edit the file to remove certificate information. The file(s) should be copied to the C:\ProgramData\Blue Ridge Networks\Profiles directory on the target PC. The first time that a user double-clicks on the icon, the All Users connection profile will be copied to the currently logged on User s profile directory. Since the certificate fields are not included in the All Users Connection profile, the user will be prompted to select a certificate: Once the certificate is selected, click on OK and the client will proceed with the connection. To create the All Users connection profile, follow the instructions in Section Once the profile is saved, locate the profile in the current user s profile directory: C:\Users\<user_name>\AppData\Roaming\Blue Ridge Networks\Profiles There will be two files located in this directory. Open them in Notepad and remove any lines starting with the following text: Certificate= CertificateThumbprint= Page 10

11 Save the files and copy them to the C:\ProgramData\Blue Ridge Networks\Profiles directory on the target PC. will now use the connection profile file(s) found in this directory to create connection profile files for any user that logs in and uses the BorderGuard Client for the first time Automatically create the profile based on information embedded in the Certificate The is also able to automatically create a connection profile based on information that is embedded in the Initials field of the Certificate. Of course this feature cannot be used in the case where the certificates are being generated by an outside Certificate Authority (such as for U.S. Government CAC/PIV cards), but when generating certificates using the BorderGuard Management Console this option can be quite useful. When using this feature, the end-user does not have to create a profile or select a certificate. In this case, when the end-user double-clicks on the tray icon, the will search for a certificate in the user s Certificate Store that contains a BorderGuard IP in the Initials field. If a certificate is found containing the BorderGuard IP, a connection profile using the information embedded in the Initials Field will be created. Note: the first certificate found with an embedded BorderGuard IP will be used. On the BorderGuard Management Console ID Certificates page, create a template containing the BG IPs: Once the template is saved, additional ID certificates with the desired Profile can easily be created by loading the template when creating new certificates. Populate the Initials field as follows to use the auto-profile features: 1. To specify a Primary BG: ///BG=<ip>/// 2. To specify Alternate BGs: ///BG=<ip>/BG=<ip>/BG=<ip>/// Page 11

12 The first BG is interpreted as the primary BG and all additional BG=<ip> are interpreted as Alternate BGs. 3. To specify Disaster Recovery BGs: ///BG-=<ip>/BG-=<ip>/// 4. To specify Load Spreading enter LS=<0 1> : ///BG=<ip>/BG=<ip>/LS=<0 1>/// The default setting is for Load Spreading is enabled ( LS=1 ). 5. To specify a Static IP (used by the Client s Virtual Network Interface Card when connected to the Home Network): ///IP=<ip>/NM=<net mask>/gw=<gateway>/dns=<ip >/WINS=<ip>/// The DNS and WINS specifications are optional. The maximum number of DNS IP addresses is 3. The maximum number of WINS IP addresses is The client can use combinations of any of the above: ///IP= /NM= /GW= /DNS= /BG= /BG= /BG- = /BG-= /LS=1/// Disconnecting from your Home Network To disconnect from the Home Network, perform one of the following: If using a Security Token or Crypto Ignition Token, remove the token. Right-click on the tray icon and select Disconnect from the tray menu: Open the GUI and click on the Disconnect button: Viewing Logs The creates logs when it attempts to connect. The logs can be viewed by selecting Log from the tray menu: Page 12

13 This will display an interface which shows the log files: From this Window, select the Logs you wish to view and click on View Logs. The logs will be opened with NotePad. The Logs can also be deleted from this menu Troubleshooting Initial Connection When using a Security Token, if the cannot reach a BorderGuard, it will display the following message: This is an indication of one of the following: 1. There is no network connectivity verify that you have Internet access. 2. The BorderGuards are down: Consult your administrator to determine. 3. The BorderGuard IP addresses or UDP ports are being blocked by a Firewall or router. 4. The Token has been disabled. DpfPing.exe, a utility installed with the, can be used to troubleshoot issues where Firewalls or routers are blocking access to BorderGuard IP addresses or UDP ports. To use DpfPing, open a DOS command prompt and navigate to the Program Files directory: Page 13

14 On 64-bit systems, the is located in the Program Files (x86)\blue Ridge Networks directory. On 32-bit systems, the is located in Program Files\Blue Ridge Networks. Executing DpfPing without any command line parameters will display the command line syntax, but generally the two most useful commands are: And Dpfping <ip_address> -u<udp_port> Dpfping <ip_address> -u<udp_port> -rnv Additional Logs In addition to the Connectivity Logs discussed in Section 3.2.6, the provides logs that may be requested by customer support when trouble-shooting connection problems. These logs provide more detail about the activity of each of the components during a connection. These logs can be exported by selecting the Options->Export Log menu item on the Client s user interface: When exporting logs, the client will prompt for a folder to export the log files to: Page 14

15 Select a folder such as your My Documents folder or Desktop and click on OK. The client will collect all related logs and compress them into a file named brn.cab in the selected folder. the file to Blue Ridge Networks customer support (support@blueridgenetworks.com) Debug Log When requested by customer service, even more information may be gathered by enabling the Debug Log. This should only be done at customer service s request as this may have some performance impacts. To enable the debug log, select Options->Enable Debug Log menu item on the client s User Interface: Page 15

Getting Started - Client VPN

Getting Started - Client VPN Getting Started - Client VPN Symantec Client VPN v9.0 This chapter includes the following topics: What is new in this release on page 2 System requirements on page 3 Documentation on page 3 Upgrading to

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started

StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started Contents StrikeRisk v6.0 Introduction 1/1 1 Installing StrikeRisk System requirements Installing StrikeRisk Installation troubleshooting

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Tufts VPN Client User Guide for Windows

Tufts VPN Client User Guide for Windows Tufts VPN Client User Guide for Windows Introduction The Tufts Virtual Private Network (VPN) implementation is a service that is provided to the faculty and staff of Tufts University to enable secure access

More information

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

ASTi PC ver Windows 7 Installation Guide. Document: DOC-01-PCVW7-IG-1

ASTi PC ver Windows 7 Installation Guide. Document: DOC-01-PCVW7-IG-1 500 A Huntmar Park Drive ASTi PC ver Windows 7 Installation Guide Document: DOC-01-PCVW7-IG-1 Advanced Simulation Technology inc. 500A Huntmar Park Drive, Herndon, Virginia, 20170 USA Revision B (October

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

How To Connect To A University Of Cyprus Vpn 3000 From Your Computer To A Computer With A Password Protected Connection

How To Connect To A University Of Cyprus Vpn 3000 From Your Computer To A Computer With A Password Protected Connection VPN 3000 Client for Windows XP & VISTA Information Security office University Of Cyprus October 11, 2007 Table of Contents 1. What is VPN 3000? 2. How To Use VPN 3000 3. Installing the VPN 3000 Client

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

1. System Requirements

1. System Requirements BounceBack Ultimate 14.2 User Guide This guide presents you with information on how to use BounceBack Ultimate 14.2. Contents 1. System Requirements 2. BounceBack Pre-Installation 3. How To Install The

More information

Lexia Network Installation Instructions

Lexia Network Installation Instructions Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

HP MediaSmart Server Software Upgrade from v.2 to v.3

HP MediaSmart Server Software Upgrade from v.2 to v.3 HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will

More information

DOE VPN Client Installation and Setup Guide March 2011

DOE VPN Client Installation and Setup Guide March 2011 DOE VPN Client Installation and Setup Guide March 2011 Table of Contents Introduction... 3 System Requirements... 3 Microsoft Windows... 3 Mac OS X... 4 Windows... 4 Installation for the Cisco AnyConnect

More information

DIS VPN Service Client Documentation

DIS VPN Service Client Documentation DIS VPN Service Client Documentation Background ------------------------------------------------------------------------------------------------ 1 Downloading the Client ---------------------------------------------------------------------------------

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Server Sentinel Monitored Server

Server Sentinel Monitored Server Server Sentinel Monitored Server Installation and Reinstallation Guide for Systems Monitoring Third-Party Products Server Sentinel 4.4.3 and Higher April 2007 . unisys imagine it. done. Server Sentinel

More information

USER GUIDE WWPass Security for Windows Logon

USER GUIDE WWPass Security for Windows Logon USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

TRBOnet Enterprise 3.0

TRBOnet Enterprise 3.0 TRBOnet Enterprise 3.0 Installation and Configuration Guide TRBOnet Enterprise Installation and Configuration Guide 2 Contents: Architecture Overview 1 1.1. Architecture Overview 1 1.2. System Diagram

More information

Ultra Thin Client TC-401 TC-402. Users s Guide

Ultra Thin Client TC-401 TC-402. Users s Guide Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age

3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age 3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System Version 4.2 Software Installation Guide (Upgrade) 1 P age Contents Important Information Read First... 3 Software Download...

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

Server Sentinel Client Workstation

Server Sentinel Client Workstation Server Sentinel Client Workstation Installation and Reinstallation Guide Server Sentinel 4.4.3 and Higher April 2008 . unisys imagine it. done. Server Sentinel Client Workstation Installation and Reinstallation

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0 Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system

More information

Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista

Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Installation and Connection Guide to the simulation environment GLOBAL VISION

Installation and Connection Guide to the simulation environment GLOBAL VISION Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Esi-Mail. Setup and User s Guide. Visit http://www.esiusers.com for up-to-date help. 0450-0479 Rev. A

Esi-Mail. Setup and User s Guide. Visit http://www.esiusers.com for up-to-date help. 0450-0479 Rev. A Esi-Mail Setup and User s Guide 0450-0479 Rev. A Visit http://www.esiusers.com for up-to-date help. Table of contents Introduction... 1 About this guide... 1 System requirements... 2 ESI hardware requirements...

More information

FedEx Ship Manager Software. Installation Guide

FedEx Ship Manager Software. Installation Guide FedEx Ship Manager Software Installation Guide Before you start Check here to see that your PC has what it needs to run FedEx Ship Manager Software: Minimum System and Hardware Requirements Intel Pentium

More information

Point of Sale 2015 Enterprise. Installation Guide

Point of Sale 2015 Enterprise. Installation Guide Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System

More information

Operating System Installation Guide

Operating System Installation Guide Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem Start Here Follow these instructions to set up your router. Verify That Basic Requirements Are Met Assure that the following requirements are met: You have your broadband Internet service settings handy.

More information

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin

More information

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions..

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions.. Table of Contents 1. Overview..... 3 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3 2. Installation Instructions.. 4 2.1 Installing the On Call Diabetes Management Software. 4 2.2

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

AT&T Global Network Client User s Guide

AT&T Global Network Client User s Guide Version 9.0.2 AT&T Global Network Client User s Guide 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Software Operations Manual

Software Operations Manual Software Operations Manual Version 5.0 BinMaster 7201 North 98th Street Lincoln, NE 68507 Phone: 402-434-9102 / Fax: 402-434-9133 info@binmaster.com - www.binmaster.com System Requirements PC with 1GHz

More information

WinConnect Server ES User Manual

WinConnect Server ES User Manual THINSOFT PTE LTD 23 Tai Seng Drive, #06-00, Singapore 535224, Fax (65) 6289-7308 www.thinsoftinc.com WinConnect Server ES User Manual Document Version 1.0 1 WinConnect Server ES User Manual Copyright 2007

More information

HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation

HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA Note: These instructions direct you to download a free secure FTP client called FileZilla. If you already use a secure client such as WS-FTP Pro

More information

SafeCom Smart Printing Administrator s Quick Guide

SafeCom Smart Printing Administrator s Quick Guide SafeCom Smart Printing Administrator s Quick Guide D10600-08 March 2012 Trademarks: SafeCom, SafeCom Go, SafeCom P:Go, SafeCom epay and the SafeCom logo are trademarks of SafeCom a/s. Company and product

More information

How to connect to via VPN Remote Desktop for Windows 2000, XP, & Vista-32bit

How to connect to via VPN Remote Desktop for Windows 2000, XP, & Vista-32bit How to connect to via VPN Remote Desktop for Windows 2000, XP, & Vista-32bit Agnes Scott College offers remote desktop software for those who are approved to e-commute. Make sure you pick up the software

More information

Network Scanner Tool R3.1. User s Guide Version 3.0.04

Network Scanner Tool R3.1. User s Guide Version 3.0.04 Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

Matisse Installation Guide for MS Windows

Matisse Installation Guide for MS Windows Matisse Installation Guide for MS Windows July 2013 Matisse Installation Guide for MS Windows Copyright 2013 Matisse Software Inc. All Rights Reserved. This manual and the software described in it are

More information

Cyclope Print Management Software

Cyclope Print Management Software Cyclope Print Management Software - Installation Guide - Version 4.0 for Windows 2000/XP/Vista and Windows Server 2003/2008 Cyclope-Series, 2010 Table of Contents 1. Introduction...3 2. Requirements and

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Table of Contents. Rebit 5 Help

Table of Contents. Rebit 5 Help Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Guide for Remote Control PDA

Guide for Remote Control PDA 030.0051.01.0 Guide for Remote Control PDA For Use with Bluetooth and a PC Running Windows 7 Table of Contents A. Required Parts... 3 B. PC Software Installation... 3 C. Configure PC Software... 4 D. Testing

More information

atbusiness Deposit Installation Guide Table of Contents

atbusiness Deposit Installation Guide Table of Contents Installation Guide atbusiness Deposit Installation Guide Table of Contents Merchant Installation Technical Requirements...3 Overview...4 Setup CAR...6 Download Device Driver...9 Merchant Capture Merchant

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client. Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

HP MediaSmart Server Software Upgrade from v.1 to v.3

HP MediaSmart Server Software Upgrade from v.1 to v.3 HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare

More information

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

How To Configure CU*BASE Encryption

How To Configure CU*BASE Encryption How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE

More information

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

E-CERT C ONTROL M ANAGER

E-CERT C ONTROL M ANAGER E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...

More information

How To Install Sedar On A Workstation

How To Install Sedar On A Workstation SEDAR Client Installation Guide Version 1.2 January 27, 2014 10 Contents About This Guide... 2 Assumptions... 3 Date Format Synchronization... 3 Before You Begin the Installation Test of the SEDAR Client...

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)

Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer

More information

Initial Installation and Configuration

Initial Installation and Configuration Windows Terminal Server with EbixONE Windows 2000 and Windows 2003 Server Initial Installation and Configuration IMPORTANT: The use of this document is intended to be a quick reference for a certified

More information

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone

More information

FileMaker Server 8. Administrator s Guide

FileMaker Server 8. Administrator s Guide FileMaker Server 8 Administrator s Guide 1994-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.,

More information