Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Size: px
Start display at page:

Download "Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module"

Transcription

1 Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common browser, this does not require any client (client-less use). Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Browser with SSL and Java (available on most computers and many mobile devices) Background External access to various Web applications is often impossible. These are either not encrypted in the company network, or no provisions have been made for access from the Internet. These applications can now be made available for external access with encryption and without any customization. The integration of SSL VPN facilitates the support of such applications, such as Outlook Web Access, on external workstations. Based on SSL, it is also possible to use all applications whose protocols use only one port. For example, this enables full, decentralized access to mail programs. With its SSL VPN solution, Collax also provides agents for the use of terminal services. In this way, the Microsoft Remote Desktop Protocol (RDP) as well as Citrix ICA client connections or the open Virtual Network Computing (VNC) can be supported. These agents are automatically started as Java applets. Thus, no VPN client and no terminal client need to be installed. Users and Groups Create a separate permission group and a user for the access to SSL applications. These dialogs are located under "System Usage Policy Policies Groups" and "Policies Users". Specify the "Internet" and additionally the "LocalNet" (for tests) in order to enable client access from this network. The "Internet" must be specified in order to enable access by clients from the Internet. Networks of the newly created group "sslusergroup" and the user "ssluser": User Page Later on, the access to the resources will take place over the user page via HTTPS. To enable the access, designate a server certificate for the Web server and assign the permissions for the "Access to user page (HTTPS)". This dialog is located under "Services File Export Services Web Server" Collax GmbH Status: Final Version: 5.8 Date: October 28, 2014

2 The previously created group can be edited directly and the permission can be set in the "Permissions" section under "System Usage Policy Policies Group". SSL VPN Resources Four different variants are available as SSL VPN resources: Applets with special user interface Reverse proxy for Web forwards Tunneled Web forwards SSL tunnel for connections with the native application Applications For remote access to internal hosts, the respective applications can be set up in this dialog and be made available to the desired groups by way of the user page. The supported protocols include Remote Desktop, VNC, and Citrix ICA. This dialog is located under "Services Infrastructure SSL VPN Applications". Collax SSL VPN Howto 2/5

3 Application You can select the desired application from this list. Remote Desktop connections, VNC connections, and Citrix ICA Client connections are available for selection. Destination host The selected application connects to a destination host. Specify the IP address or host name of the destination host. Destination port If the service of the destination host is tied to a specific port, this destination port must be specified here. If the service of the destination host runs on the default port of the application, this field can be left blank. Enable SSO The setting takes over the user of the Web interface for authenticating the application. Domain If a domain login (Active Directory or NT domain) is to take place, the domain can be specified here. If the option "Enable SSO" is not set, the login and password for the connection can be specified manually. Alternatively, you can leave the login and password blank; in this case, the authentication query will take place after the establishment of the connection. For an optimum window display, various resolutions can be selected for the particular application. If the application is started in full-screen mode, this mode can be terminated by pressing Alt+Enter. Additional options can be configured in the "Native Options" tab. Finally, select the group whose users are to be granted authorized access to the application. Web Forwards and Reverse Proxy Web forwards enable encrypted access to Web-based applications. By way of the reverse proxy, the data addressed to the destination URL are rewritten by the Collax server. No Java applet is required here. These dialogs are located under "Services Infrastructure SSL VPN Web Forwards" and "Services Infrastructure SSL VPN Reverse Proxy". Collax SSL VPN Howto 3/5

4 By means of the permissions, they are made available to the desired groups by way of the user page. SSL Tunnel By defining an SSL tunnel, the Collax server can tunnel any service port from the local host to a destination host and destination port. Once the SSL tunnel has been established, the destination application can be addressed from the local host with "localhost:destination-port". This dialog is located under "Services Infrastructure SSL VPN SSL Tunnel". Local port Specify the desired local network port here. Specify a destination port in the range from 1 to To avoid possible conflicts with local services, we recommend selecting a port in the range from 1024 to Collax SSL VPN Howto 4/5

5 Destination host In this field, specify the IP address or host name of the desired destination host. Destination port In this field, specify the service port to be reached on the destination host. Specify a destination port in the range from 1 to The reachability of this service port and the authentication with this service depend on the settings on the destination host. By means of the permissions, it is made available to the desired groups by way of the user page. In this way, the access is tunneled to an internal SSH server on the local port Thus, a connection to the destination server is possible via an SSH client by specifying the server (localhost) and port Use via the Web Interface After entering in the browser window, a login dialog will open up for the user page. Following the successful login, the user can access his SSL VPN resources. Collax SSL VPN Howto 5/5

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter. Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Campus VPN. Version 1.0 September 22, 2008

Campus VPN. Version 1.0 September 22, 2008 Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

Collax Active Directory

Collax Active Directory Collax Active Directory Howto This howto describes the configuration of a Collax server for joining a Windows Active Directory Service (ADS) domain. Furthermore, this howto focuses on how to set up the

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through

More information

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu...

INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... 18 Updated: Juha Jokinen Page (1/18) INTRODUCTION This is a guide

More information

SCENARIO EXAMPLE. Case study of an implementation of Swiss SafeLab M.ID with Citrix. Redundancy and Scalability

SCENARIO EXAMPLE. Case study of an implementation of Swiss SafeLab M.ID with Citrix. Redundancy and Scalability SCENARIO EXAMPLE Case study of an implementation of Swiss SafeLab M.ID with Citrix Redundancy and Scalability Informations about the following case study The following example shows an installation of

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

Citrix StoreFront 2.0

Citrix StoreFront 2.0 White Paper Citrix StoreFront 2.0 Citrix StoreFront 2.0 Proof of Concept Implementation Guide www.citrix.com Contents Contents... 2 Introduction... 3 Architecture... 4 Installation and Configuration...

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

Remote Monitoring and Control of the R&S FSV with a Web Browser

Remote Monitoring and Control of the R&S FSV with a Web Browser Rohde & Schwarz Products: R&S FSV3, R&S FSV7, R&S FSV13, R&S FSV30 Remote Monitoring and Control of the R&S FSV with a Web Browser Application Note This application note describes remote operation or monitoring

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3 White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Connecting an Android to a FortiGate with SSL VPN

Connecting an Android to a FortiGate with SSL VPN Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must

More information

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

Remote Monitoring and Control of the R&S FSL with a Web Browser

Remote Monitoring and Control of the R&S FSL with a Web Browser Rohde & Schwarz Products: R&S FSL3, R&S FSL6, R&S FSL18 Remote Monitoring and Control of the R&S FSL with a Web Browser Application Note This application notes describes remote operation or monitoring

More information

Using WebVPN (webvpn.childrens.harvard.edu) to access shared and P drives, access e-mail, and use Remote Desktop

Using WebVPN (webvpn.childrens.harvard.edu) to access shared and P drives, access e-mail, and use Remote Desktop Using WebVPN (webvpn.childrens.harvard.edu) to access shared and P drives, access e-mail, and use Remote Desktop Connecting to your shared drive To connect to your shared drive, you must bookmark it. When

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP

More information

1. Accessing the LONZA network from a private PC or Internet Café

1. Accessing the LONZA network from a private PC or Internet Café Using SSL VPN from non Lonza PCs 1. Accessing the LONZA network from a private PC or Internet Café To work at home with your private PC or from an Internet Café, you can use your browser to connect to

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

visionapp Remote Desktop (vrd)

visionapp Remote Desktop (vrd) visionapp Remote Desktop () Version Overview Product I nformation www..com visionapp Remote Desktop at a Glance visionapp Remote Desktop is a powerful tool for managing and accessing multiple servers and

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

Collax E-Mail Archive

Collax E-Mail Archive Collax E-Mail Archive Howto This howto describes how a Collax server can easily be set up as an e-mail archive in order to enable team members to access their own e-mail archive. Additionally, auditor

More information

Securing Citrix with SSL VPN Technology

Securing Citrix with SSL VPN Technology Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across

More information

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013 SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

What s New in Juniper s SSL VPN Version 6.0

What s New in Juniper s SSL VPN Version 6.0 What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Sophos UTM. Remote Access via SSL. Configuring UTM and Client

Sophos UTM. Remote Access via SSL. Configuring UTM and Client Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Configuring Single Sign-on for WebVPN

Configuring Single Sign-on for WebVPN CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using

More information

App Orchestration 2.5

App Orchestration 2.5 Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account. Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will

More information

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods: SSL Web Proxy Vigor2930, Vigor2950 and VigorPro 5500/5510 series router support SSL Web Proxy function to let user access lots of servers in security via Internet environment. We provide a general user

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Four Windows Server 2008 Remote Desktop Services, Part 1 Objectives Describe the Remote Desktop

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

NetMan Desktop Manager 4.5

NetMan Desktop Manager 4.5 NetMan Desktop Manager 4.5 H+H Software GmbH Table of Contents Table of Contents Introduction 1 Contents of This Manual...3 NetMan Desktop Manager: The Basics...5 Performance Features...9 Desktop Sessions

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief

More information

Set up a Home Secure Global Desktop Enterprise Edition Remote Access Server

Set up a Home Secure Global Desktop Enterprise Edition Remote Access Server Set up a Home Secure Global Desktop Enterprise Edition Remote Access Server Purpose This document provides a step-by-step walk-through of how I set up my home network and Tarantella Secure Global Desktop

More information

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam 1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Defender EAP Agent Installation and Configuration Guide

Defender EAP Agent Installation and Configuration Guide Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections

More information

Administrator Guide. v 11

Administrator Guide. v 11 Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

icrosoft TMG Replacement with NetScaler

icrosoft TMG Replacement with NetScaler icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Deploying NetScaler Gateway in ICA Proxy Mode

Deploying NetScaler Gateway in ICA Proxy Mode Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction

More information

Connecting to the FILTER Virtual Private Network (VPN)

Connecting to the FILTER Virtual Private Network (VPN) Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs

More information

Connecting to Delta College Exchange services off-campus

Connecting to Delta College Exchange services off-campus Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt. USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

visionapp Remote Desktop 2010 (vrd 2010)

visionapp Remote Desktop 2010 (vrd 2010) visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...

More information

Configuring Outlook for Windows to use your Exchange email

Configuring Outlook for Windows to use your Exchange email Configuring Outlook for Windows to use your Exchange email McGill faculty, staff and students are given a Microsoft Exchange account which will give you an email box, calendaring features, access to McGill

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information