User Guide. Cloud Gateway Software Device
|
|
- John Bailey
- 8 years ago
- Views:
Transcription
1 User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software). Every effort has been made to make this document as complete and accurate as possible, but no warranty or fitness is implied. CensorNet Ltd does not accept any liability for poorly designed or malfunctioning networks. 1
2 TABLE OF CONTENTS Overview... 4 Network Positioning... 5 Best practices... 5 Firewall... 5 Requirements... 6 Installation... 7 Installing the system... 7 Configuration Logging in Navigation Overview Service Status Resource Status Captive Portal Activity Browsing Activity Network Interfaces Cloud Connection Gateway & DNS Servers Authentication Deciding which authentication method to use Active Directory to Cloud authentication Step 1 Join the gateway to Active Directory domain Step 2 Create encryption keys Step 3 Create a DNS entry Step 4 Configure web browsers Obtain keys on client computers Cache access denied error
3 Direct to Cloud authentication Captive Portal Configuring web browsers to use Cloud Gateway Manually configure web browser proxy settings Best practice for deploying the Cloud Gateway proxy User mapping Creating new mappings Troubleshooting Managing existing mappings System Time Settings Captive Portal Backup & Restore Change Password Shutdown or Reboot
4 OVERVIEW The Cloud Gateway software appliance is part of the hybrid Cloudwebfiltering.com architecture and is designed to be installed on-premise and provide local devices (managed and unmanaged) with filtered Web internet access. Web dashboard CLOUD BASED SERVICE ICAP ICAP Roaming laptop (3G/4G) Roaming laptop (Wi-Fi) Captive Portal ICAP ICAP Guest laptops Smartphones Head Office Branch office Cloud Gateway Cloud Gateway Tablets Active Directory Single sign on Network Network The Cloud Gateway works by providing a direct proxy or intercepted proxy connection for locally connected devices. The Cloud Gateway then relays snapshots of web requests to the cloud (no proxying takes place here) to decide on whether access to a particular web site should be granted or not. After installation, management of users, policies and reports takes place via the Cloudwebfiltering.com portal as normal. You can deploy multiple Cloud Gateway devices around your network, for example you could have one in each branch office. For roaming users, the Cloud Link client software can be installed which will provide the exact same experience as Cloud Gateway when the device is outside of the network. NOTE: If you decide to use Cloud Link then do not configure the device for use with Cloud Gateway as it is not necessary. Cloud Gateway is available as a software image (.ISO) and should be installed on a dedicated physical or virtual machine. 4
5 NETWORK POSITIONING The Cloud Gateway device should be positioned before the firewall. The Cloud Gateway supports multiple network interfaces allowing you to connect various networks for filtering. Unmanaged devices (e.g. devices where you are unable to configure proxy settings) will need their gateway set to the IP address of Cloud Gateway in order for traffic to be intercepted. This should be handled by the DHCP server. The following diagram illustrates a typical network deployment: Local network CLOUD BASED SERVICE Captive Portal Smartphones Guest laptops Active Directory ( ) Core switch Web browser proxy set to TCP port 1344 Tablets Guest network (Gateway set to ) Cloud Gateway (Net 1: Net 2: Gateway: ) Firewall ( ) BEST PRACTICES Managed devices should have their web browsers configured to use the proxy server on Cloud Gateway and keep existing gateway settings. Unmanaged devices should have their gateway changed to the IP of Cloud Gateway (on the appropriate interface) using an appropriate method such as DHCP. Unmanaged devices should install the SSL Certificate to avoid problems accessing some HTTPS web sites (downloadable from Captive Portal splash page). If using the Captive Portal, ensure that you have appropriate Terms of Service in place to cover web filtering and SSL web site filtering. For roaming users (e.g. laptops/netbooks) consider installing the Cloud Link client software instead. If you are planning to use Active Directory authentication, set the Primary DNS and NTP server setting on Cloud Gateway to be the IP address of your Active Directory server. FIREWALL For the Cloud Gateway device to operate correctly TCP PORT 1344 must be open for outbound connections from the Cloud Gateway server. In addition, TCP PORT 80 AND 443 must be open for outbound connections from devices running the Cloud Link client software. See note on BEST PRACTICE FOR DEPLOYING THE CLOUD GATEWAY PROXY later in this document. 5
6 REQUIREMENTS A valid Cloudwebfiltering.com account Dedicated server or virtual server x86 64-bit CPU or above (see 2GB RAM 8GB Hard Disk space At least one Ethernet port Internet Explorer 9, Firefox 11 or Chrome 11 and above CLOUD GATEWAY CANNOT BE USED WITH A PARENT (UPSTREAM) PROXY AT THIS TIME. 6
7 INSTALLATION INSTALLING THE SYSTEM INTERNET ACCESS IS REQUIRED DURING INSTALLATION. THE NETWORK SETTINGS CONFIGURED DURING INSTALLATION MUST BE VALID FOR SUCCESSFUL INSTALLATION. Once you boot from the installation CD you will be prompted to select the language to use. Select the appropriate option from the list and press ENTER. The Cloud Gateway splash screen will be displayed. Press ENTER again to start the installation. The console based installer will appear. To select options use the CURSOR KEYS, to move between options press the TAB key and press ENTER to confirm your selection. 7
8 Select the desired language and press ENTER. Select the geographic location where the Cloud Gateway server is located and press ENTER. Next you will be prompted to detect the keyboard layout. Press ENTER to skip automatic detection. 8
9 Now select the correct country for your keyboard from the list and press ENTER. Next select the best layout that corresponds to your keyboard and press ENTER. 9
10 The installer will now copy files required for installation. This process can take up to a few minutes depending on the speed of the machine. Once complete, you will be prompted to enter an IP address for the Cloud Gateway server. Type the IP address in one of the supported formats and press ENTER. 10
11 You will then be prompted to enter the subnet mask. Enter the correct subnet mask and press ENTER. Next you will be prompted to enter in the default gateway. Enter the default gateway and press ENTER. 11
12 You will then be prompted to enter in at least one DNS server. You may enter up to three DNS servers separated by spaces. Press ENTER. Next you will be prompted to enter a hostname for the Cloud Gateway server. This will form part of the Fully Qualified Domain Name of the server. The hostname can be changed later if required. Enter the hostname and press ENTER. 12
13 You will then be prompted to enter in the domain name for the Cloud Gateway. At this stage, it is acceptable to simply enter in the hostname again followed by ".local" then press ENTER. For security, you are required to create an operating system user account for the Cloud Gateway server. This allows you to access the Linux command line directly. Enter a suitable real name for the account, such as "System Administrator" and press ENTER. 13
14 Next you will be prompted to enter a username for this user - the default is guessed based on the previously entered real name. Enter a username and press ENTER. MAKE A NOTE OF THE USERNAME AND KEEP IT SAFE - THIS ACCOUNT IS USED FOR MAINTENANCE, TECHNICAL SUPPORT AND UPGRADES. You will then be prompted to enter a password for the account. A good password should contain a mixture of letters, numbers and punctuation. Enter the password and press ENTER. MAKE A NOTE OF THE PASSWORD AND KEEP IT SAFE. 14
15 You will be prompted to re-enter the password. Re-enter the password and press ENTER. Next, the installer will attempt to guess the time zone. If the time zone is correct, press ENTER otherwise use TAB to select NO and select the correct time zone. 15
16 Next, the installer will prompt to create partitions on the server hard disk. NOTE: THIS STEP WILL ERASE ALL OF THE DATA ON THE HARD DISK AND INSTALL THE CLOUD GATEWAY OPERATING SYSTEM. If you are happy to proceed press ENTER. Confirm again that you are happy to ERASE ALL DATA FROM THE HARD DISK. Press TAB to select YES and then press ENTER. 16
17 The Cloud Gateway operating system will now be installed. This may take several minutes. DO NOT INTERRUPT THE INSTALLATION PROCESS. Next you will be prompted to enter a password to secure the web interface on the Cloud Gateway. Enter a password and press ENTER. KEEP THIS PASSWORD SAFE AS YOU WILL NEED IT TO ADMINISTER THE CLOUD GATEWAY SERVER AFTER INSTALLATION. 17
18 You will then be prompted to re-enter the web interface password. Re-enter the password and press ENTER. The Cloud Gateway software will now be installed. This may take several minutes. 18
19 Finally, you will be prompted to installed the boot loader. Press ENTER to install the boot loader. The installation process will then finish and you will be prompted to remove the installation CD from the drive. The server will then reboot. Press ENTER to finish the installation. 19
20 20
21 CONFIGURATION LOGGING IN The Cloud Gateway device is configured using a web based interface. Point your web browser at the IP address configured during installation of the Cloud Gateway. You will be presented with the login page, as shown below. Enter the password configured during installation or if that password fails, try leaving the password blank and pressing LOGIN (remember to set a new password via the System / Change Password menu option). NAVIGATION Navigating the Cloud Gateway web interface is straight forward. Use the buttons along the top right of the screen to switch between sections. To log out, click the LOG OUT link in the top right hand corner or close the browser window. 21
22 OVERVIEW The OVERVIEW page contains a snapshot of the Cloud Gateway status. NOTE: AFTER FIRST TIME INSTALLATION THE OVERVIEW PAGE MAY SHOW ERRORS. THIS IS NORMAL AND THE STATUS WILL CHANGE ONCE THE SYSTEM IS CONFIGURED. The OVERVIEW page is dynamic and will automatically update without you needing to refresh the web browser. Hovering over elements of the OVERVIEW page will reveal more information if it makes sense to do so e.g. there is an error condition. SERVICE STATUS The SERVICE STATUS panel lists the critical services running on the Cloud Gateway. This information is updated every few seconds. The services checked are as follows: Internet access this indicates whether or not the gateway can connect to the Internet. Internet access is required for the system to operate correctly. Cloud service this indicates whether the gateway can communicate with the cloud service. To configure this, please see the Network section of this document. Proxy service this indicates whether the proxy service on the gateway is running. The proxy provides web access for local browsers and user authentication. System services this indicates whether the core system service is operational. The system services are responsible for configuring backend processes. RESOURCE STATUS The RESOURCE panel shows the current system resource levels on the Cloud Gateway. This information is updated every few seconds. The resources checked are as follows: Uptime the time since the last reboot of the Cloud Gateway system. Load a CPU utilisation graph. Used RAM the amount of physical memory used, shown as a percentage. The bar will change to yellow and red to indicate warning and critical levels. Used disk the amount of hard disk space used, shown as a percentage. The bar will change to yellow and red to indicate warning and critical levels. CAPTIVE PORTAL ACTIVITY If the CAPTIVE PORTAL feature is enabled then active users in the previous hour will be displayed here. Hovering over a user will display further information such as IP address, MAC address and log in time. See the Captive Portal section of this document. 22
23 BROWSING ACTIVITY This graph shows the browsing activity for all users on the connected Cloud account (see Network section). NOTE: THIS GRAPH SHOWS ACTIVITY FROM ALL USERS ACROSS ALL CLOUD GATEWAY DEVICES AND CLOUD LINK CLIENTS. THIS GRAPH IS NOT LIMITED TO A SINGLE CLOUD GATEWAY DEVICE. The graph is a mirror image of the PRODUCTIVITY MONITOR in the Cloudwebfiltering.com dashboard. The graph shows the previous 24 hours of browsing activity. Allowed these are visits to web sites that have been allowed by the configured filtering policies. Blocked these are visits to web sites that have been blocked by the configured filtering policies. Mixed these are visits that contain both allowed and blocked content, for example this could be advertising banners blocked on a news web site. The graph automatically updates on the hour, every hour. Hovering over a point on the graph will reveal the actual visit count as a tooltip. 23
24 NETWORK The NETWORK section allows you to configure network interfaces that are connected to the gateway, basic network settings for connectivity and the credentials to link the gateway to a Cloudwebfiltering.com account. INTERFACES The Cloud Gateway supports multiple network interfaces although only one is required for normal operation. Typically, these interfaces will connect the gateway to multiple network segments, so that web traffic on those networks can also be filtered. You can add as many interfaces as required to the Cloud Gateway. When the gateway boots up, it will scan all available interfaces and make them available via the Network option of the web interface. To configure an interface, click on the interface name and the accordion will expand to reveal more options. There must be at least one network interface present in the server for normal operations this is usually called eth0. For each interface, it is possible to configure a name which is used to identify the interface more easily than using the abbreviated reference, i.e. eth0. You can also specify an IP address and subnet mask for the interface to listen on. This allows devices on that network to communicate with the Cloud Gateway. If necessary you can also force the interface UP (active) or DOWN (inactive) from this section. 24
25 CLOUD CONNECTION In order for the Cloud Gateway to operate it must have a valid connection to the Cloudwebfiltering.com service. You will need a valid username and password with admin rights in order for the Cloud Gateway to connect. Contact your service provider for this information. The following options must be configured: ICAP server domain this information is given to you with your Cloudwebfiltering.com account. Typically for customers in the UK & Europe this will be cloudwebfiltering.com. For customers in North America, Canada and Central America, this will be us.cloudwebfiltering.com. ICAP server IP address this box will be filled in automatically. Admin username this is a username with admin rights. It must be set up within the Users & Groups section of your Cloudwebfiltering.com account. Admin user password this is the password associated with the ADMIN USERNAME. Re-type Admin user password you are required to confirm the admin user password. Global password this is the Global Password configured in the Account / Global Settings section of your Cloudwebfiltering.com account. Re-type Global password you are required to confirm the GLOBAL PASSWORD again. If you are unsure of any of the above settings please contact your service provider. NOTE: THE CLOUD GATEWAY WILL NOT OPERATE WITHOUT THE CLOUD CONNECTION OPTION CONFIGURED WITH A VALID CLOUDWEBFILTERING.COM ACCOUNT. 25
26 GATEWAY & DNS SERVERS During installation you will be prompted to enter the network configuration for the Cloud Gateway. Post installation, you can change those settings in the GATEWAY & DNS Servers option. Default gateway this is the default gateway the Cloud Gateway will use for Internet access. Gateway hostname this is the host name of the Cloud Gateway server. Default is CLOUDGW. A valid hostname is required for Active Directory authentication and will form part of the Fully Qualified Domain Name (FQDN) of the Cloud Gateway server. Primary DNS server this is the primary DNS server that the Cloud Gateway will use for name resolution. NOTE: FOR BEST PERFORMANCE USE A LOW LATENCY DNS SERVER. Secondary DNS server this is an alternative DNS server that the Cloud Gateway will use if the PRIMARY DNS server is unavailable. 26
27 AUTHENTICATION All connections to the Cloud Gateway must be authenticated either directly with the Cloudwebfiltering.com service or via Active Directory. In order for browser based authentication to work (single sign on or prompted), the web browser must be configured to use the proxy that runs on the Cloud Gateway service. Browser settings can be configured manually, by Group Policy or via WPAD (Web Proxy Auto Discovery) and each of these methods are described later in this section. DECIDING WHICH AUTHENTICATION METHOD TO USE The Cloud Gateway currently supports two proxy based authentication methods ACTIVE DIRECTORY TO CLOUD and DIRECT TO CLOUD. The Cloud Gateway also provides a CAPTIVE PORTAL to authenticate connections that are transparently intercepted on a network interface. If enabled, the CAPTIVE PORTAL is available on all network interfaces configured in the Network section. All three methods are described below: Active Directory to Cloud this method provides single sign on authentication between the browser, Cloud Gateway and Active Directory and is the recommended option if you have a Windows domain. If you plan to use ACTIVE DIRECTORY TO CLOUD mode, you must: o Create static user mappings between users on Active Directory and users in the Cloudwebfiltering.com service see the User Mappings section. o Use the fully qualified domain name (FQDN) of the Cloud Gateway in the browser proxy settings (not the IP address) on port TCP port o Ensure the time on the Cloud Gateway see the Time Settings section is no more than 5 minutes apart from the time on the Active Directory server. Direct to Cloud this method prompts the user to manually enter their Cloudwebfiltering.com username and password whenever they open a web browser window. This method is suitable for non-domain environments. Like Active Directory, you must configure the web browser proxy settings to use the hostname or IP of Cloud Gateway and TCP port Captive Portal this method prompts the user to manually enter their Active Directory (if Active Directory Cloud authentication is configured) or Cloudwebfiltering.com (if Direct to Cloud authentication is configured) username and password when the web browser is opened for the first time. Users will be required to log back in after 15 minutes of inactivity. Unlike the DIRECT TO CLOUD method, which uses the web browser authentication prompt, the CAPTIVE PORTAL displays an inbrowser logon page which can be customised see Captive Portal section. The CAPTIVE PORTAL method is ideal for guest devices because unlike the other methods it does not require the browser to be configured with proxy settings. However, if you use the CAPTIVE PORTAL mode, you should ensure that you install the SSL certificate to avoid problems with some HTTPS web sites. The SSL certificate is available to download from the CAPTIVE PORTAL login page or from NOTE: IF THE CAPTIVE PORTAL IS ENABLED IT WILL OPERATE ON ALL NETWORK INTERFACES. If you want to exclude a computer from requiring authentication use one of the following methods to ensure the web requests do not reach the Cloud Gateway: Issue a different gateway for the computer to bypass the Captive Portal e.g. static DHCP entry Use WPAD (Web Proxy Auto Discovery) to send requests from the computer directly to the Internet rather than to the Cloud Gateway proxy. Add an entry in the web browser proxy exceptions for the site you do not want to authenticate/filter. 27
28 ACTIVE DIRECTORY TO CLOUD AUTHENTICATION Setting up ACTIVE DIRECTORY TO CLOUD authentication is a four step process and assumes that you have already configured a valid Cloudwebfiltering.com account - see Network settings. STEP 1 JOIN THE GATEWAY TO ACTIVE DIRECTORY DOMAIN If you have never attempted to join the gateway to your domain before, click JOIN DOMAIN. If you are not sure if a relationship exists, click TEST DOMAIN to verify. If the verification fails with Join to domain not valid then proceed with clicking JOIN DOMAIN. The options are as follows: Active Directory server IP address this is the IP address of your Active Directory server (the one you want to authenticate against). Active Directory server hostname this is the hostname of the Active Directory server. This is just the name of the server, not the fully qualified domain name. 28
29 Active Directory domain name this is the fully qualified Active Directory domain name WITHOUT the hostname at the beginning. Active Directory container this is where the Cloud Gateway machine account will be created on your Active Directory server. By default, leaving this option blank will place it in the Computers OU. If you require a specific path, specify it from the tree root in the format PATH/TO/OU (note the use of forward slashes rather than back slashes) Domain admin username this is the username of an account on the domain with administrator privileges (member of DOMAIN ADMINS). Domain admin password this is the password of the user specified in DOMAIN ADMIN USERNAME. The password cannot contain any special characters, such as a % sign. Click JOIN to attempt to join to the domain. If the join is successful, you will see the message Joined <HOSTNAME> to realm <DOMAIN>. If the join fails, check the settings above and consult with your network administrator. Tick the TURN ON DEBUGGING checkbox and try again this may highlight the problem area in more detail. Verify the join is successful by clicking the TEST DOMAIN MEMBERSHIP button. If successful, you should see the following: STEP 2 CREATE ENCRYPTION KEYS Creating a set of encryption keys on the domain allows the Cloud Gateway to authenticate domain users automatically. Click the CREATE KEYS button and then LIST KEYS. If successful, you should see a key set similar to the one below: 29
30 If there is an error, double check that Step 1 has been successful. You can also try clicking FLUSH KEYS first and also attempt to CREATE KEYS with debugging enabled. STEP 3 CREATE A DNS ENTRY In order for the single sign on authentication to work correctly you must reference the Cloud Gateway proxy by its fully qualified domain name and not its IP address. For this to work, you must create an A record on your DNS server for the FQDN and point it to the Cloud Gateway IP address. 30
31 On Windows Server, go to Start -> Administrative Tools and click DNS Manager. For further assistance please contact your network administrator. STEP 4 CONFIGURE WEB BROWSERS The final step is to configure the web browsers on your network to use the Cloud Gateway proxy see Configuring web browsers to use Cloud Gateway. Proxy settings should use the FQDN (e.g. cloudgw.ad2008.local) and port 8080, for example: OBTAIN KEYS ON CLIENT COMPUTERS Please log out and log back in any domain users and then open a web browser configured to use the Cloud Gateway proxy. If authentication fails, you can verify that the computer has a valid kerberos ticket by opening a COMMAND PROMPT and typing KLIST. The HTTP key should match the FQDN of the Cloud Gateway, e.g: 31
32 CACHE ACCESS DENIED ERROR This error will appear if you have configured Active Directory authentication but you do not have a valid mapping between the domain user (local user) and a cloud user - see User Mapping. DIRECT TO CLOUD AUTHENTICATION DIRECT TO CLOUD authentication is not a single sign on method. With this method configured, users will be prompted to authenticate using the in-built browser authentication pop-up screen (used for BASIC authentication common on many web sites). Users must then enter a username and password from the connected Cloudwebfiltering.com account to access the web. To enable this method, simply click ENABLE and then configure web browsers to point to the Cloud Gateway proxy see Configure web browsers to use Cloud Gateway. CAPTIVE PORTAL The CAPTIVE PORTAL can be enabled or disabled. THE CAPTIVE PORTAL SHOULD NOT BE ENABLED ON UNSECURED WIRELESS NETWORKS. WPA1/2 SECURITY SHOULD BE USED AS A MINIMUM OR AN SSL SERVER CERTIFICATE IS REQUIRED FOR THE CAPTIVE PORTAL. 32
33 If it is enabled, the CAPTIVE PORTAL listens on all available network interfaces for connections to port 80 and 443, intercepts them and redirects them to the CAPTIVE PORTAL login page. This is ideal for guest devices where configuring proxy settings is not possible or desirable. Users wishing to browse the web are required to enter a valid username and password from the configured Cloudwebfiltering.com account. The default CAPTIVE PORTAL login form is shown below: The login page can be customised see Captive Portal section. TO AVOID PROBLEMS WITH HTTPS WEB SITES IT IS RECOMMENDED THAT THE GUEST DEVICE INSTALLS THE SSL CERTIFICATE WHICH IS AVAILABLE TO DOWNLOAD FROM THE LOGIN PAGE. CONFIGURING WEB BROWSERS TO USE CLOUD GATEWAY There are numerous documented methods for applying web browser proxy settings. The most common options are described below. MANUALLY CONFIGURE WEB BROWSER PROXY SETTINGS All modern web browsers support web proxies and the settings can usually be found in the OPTIONS menu. Examples are shown below. INTERNET EXPLORER Open Internet Explorer and go to Tools menu then select Internet Options. Click the Connections tab and then LAN SETTINGS. 33
34 MOZILLA FIREFOX Open the Tools menu and click Options and then Advanced tab. Click the Network tab and then SETTINGS. AUTOMATICALLY CONFIGURE WEB BROWSER PROXY SETTINGS USING GROUP POLICY If you are running an Active Directory domain you can use GROUP POLICY to configure Internet Explorer proxy settings automatically. 34
35 On your Active Directory server, follow these steps: 1. Open the MMC console. 2. Add the GROUP POLICY snap-in. 3. Select either DEFAULT DOMAIN POLICY or the appropriate policy for your users, as the GROUP POLICY OBJECT. 4. Navigate to the Users / Configuration / Windows Settings / Internet Explorer Maintenance / Connection option in the left hand pane. 5. Edit the proxy settings options to use the Cloud Gateway FQDN and port number as described earlier in this document. 6. Push the changes out to your users. NOTE: SOME USERS MAY NEED TO REBOOT OR RUN "GPUPDATE /FORCE" FOR THE PROXY SETTINGS TO TAKE EFFECT. For Mozilla Firefox users there is a Group Policy add-on available: USING WEB PROXY AUTO DISCOVERY TO AUTOMATICALLY SET THE PROXY SETTINGS The WEB PROXY AUTODISCOVERY PROTOCOL (WPAD) method is used by web browsers to locate a proxy on the network and configure it automatically using an auto-configuration (.pac) file. The.pac file is issued via DHCP or via DNS and the web browser should have the option to AUTOMATICALLY DETECT A PROXY SERVER enabled. For further information and extensive documentation please visit: BEST PRACTICE FOR DEPLOYING THE CLOUD GATEWAY PROXY It is recommended that you block connections from your local computers to TCP ports 80 and 443 and only allow connections from the Cloud Gateway server IP address to these ports. This will ensure that only web browsers configured to use the proxy correctly can access the web and therefore avoid circumvention of the filtering. 35
36 USER MAPPING Usernames in the Cloudwebfiltering.com service are identified by addresses. Users in Active Directory have a different naming convention. In order to associate an Active Directory user with a Cloudwebfiltering.com user, a user mapping is required. User mappings are created manually unless the users in Active Directory have the field configured in their account profile. If so, it is possible to automatically create the mappings, which can save time. The Cloud Gateway can also automatically create users on the Cloudwebfiltering.com service that don t already exist provided there are sufficient licenses available, meaning you don't have to create the user accounts manually in the cloud. IN ORDER TO CREATE NEW MAPPINGS PLEASE ENSURE YOU HAVE CONFIGURED THE CLOUD CONNECTION IN THE "NETWORK" MENU OPTION AND YOU HAVE SELECTED "ACTIVE DIRECTORY TO CLOUD" AUTHENTICATION IN THE "AUTHENTICATION" MENU OPTION. CREATING NEW MAPPINGS Clicking on the NEW MAPPING tab will automatically load users from the Cloudwebfiltering.com service into the CLOUD USER ACCOUNTS TREE. If this does not happen, check the CLOUD CONNECTION settings in the Network menu option. 36
37 MANUALLY CREATE A USER MAPPING Creating a new mapping involves 3 steps, which are outlined as follows: 1. Refresh THE LOCAL USER ACCOUNTS TREE by clicking REFRESH below it. You will be prompted to enter the Active Directory server administrator password. If successful, the Active Directory users will appear. Click a user in the LOCAL USER ACCOUNTS TREE. 2. Click the corresponding user in the CLOUD USER ACCOUNTS TREE. If there is no corresponding user, create one in the Cloudwebfiltering.com account under USERS & GROUPS and then refresh the CLOUD USER ACCOUNTS TREE. 3. Click ADD MAPPING. TROUBLESHOOTING LOCAL USER DOES NOT CONTAIN AN AUTHORISED DOMAIN This error occurs if the Active Directory user selected has an domain in the " " setting of the account profile that does not match a list of authorised domains for your Cloudwebfiltering.com account. You can view a list of authorised domains in the Account / Global Settings option of your Cloudwebfiltering.com account. THE LOCAL USERNAME OR THE ADDRESS IS ALREADY PART OF A LOCAL MAPPING This error occurs if you attempt to add a local username or address which has already been used in a mapping. Local users and cloud users have a one-to-one mapping. You cannot map multiple local users to a single cloud user. AUTOMATICALLY MATCHING USERS It is possible to automatically match local and cloud users and optionally create non-existent cloud users. NOTE: THIS FEATURE REQUIRES THAT THE ACTIVE DIRECTORY USER HAS THE " " PROFILE FIELD COMPLETED WITH AN ADDRESS THAT IS VALID FOR THE CLOUDWEBFILTERING.COM ACCOUNT IN USE. To perform the auto-match: 37
38 1. Ensure that the LOCAL USER ACCOUNTS TREE is up to date by pressing REFRESH below it. 2. Ensure that the CLOUD USER ACCOUNTS TREE is up to date by pressing REFRESH below it. 3. Click PERFORM AUTO-MATCH to attempt to match Active Directory users to Cloud users 4. Review the auto-matched users and click RUN. MANAGING EXISTING MAPPINGS You can make changes to existing mappings on the Cloud Gateway by selecting the User mapping menu option and then the EXISTING MAPPINGS tab. You can delete a mapping by clicking on it and pressing DELETE MAPPING. You can edit a mapping by double-clicking on it, making the change, and pressing the ENTER key. 38
39 39
40 SYSTEM TIME SETTINGS IT IS VERY IMPORTANT THAT THE TIME AND TIME ZONE ON THE CLOUD GATEWAY IS CORRECT AS IT IS USED AS PART OF THE AUTHENTICATION SECURITY. On this page you configure the following: Current time zone - this should be set to the correct local time zone where the Cloud Gateway is installed. NTP server - this should be set to the address of a publically available NTP server (e.g. pool.ntp.org) or local NTP server (e.g. running on Active Directory server). Current server local time - this allows you to set the date and time manually if you decide not to use NTP. NTP is the recommended option. 40
41 CAPTIVE PORTAL It is possible to customise parts of the CAPTIVE PORTAL login page, for example the title, logo, introductory text and link to terms of service. On this page you can configure the following: Captive portal title - the title that appears at the top of the CAPTIVE PORTAL login page. Logo - a logo to appear in the top right hand corner of the CAPTIVE PORTAL login page. This must be a valid URL to an image hosted on a web server. Introduction/welcome text - this allows you to enter a welcome message that will appear on the CAPTIVE PORTAL login page. Terms of service text - this text will appear beside a checkbox that the user must tick in order to gain access to the web. It should be short and succinct. Leaving this blank will disable the checkbox. Link to Terms of Service - this allows you to link to an external document containing the Terms of Service. This can be any valid URL and will open in a new window when clicked. Click "Reset to default" to remove all customisations and display the default CAPTIVE PORTAL login page. 41
42 BACKUP & RESTORE It is important that you back up the Cloud Gateway configuration in case at some point the server needs to be re-installed or upgraded. To backup the Cloud Gateway server click DOWNLOAD BACKUP. Ensure that you store the backup file in a safe place. The backup contains all the settings on the Cloud Gateway excluding the Active Directory authentication trust relationship and keys as it is not possible to transfer these settings between machines. To restore a backup select a backup file from your computer and click RESTORE BACKUP. After restoring a backup, it is recommended that you reboot the Cloud Gateway using the Shutdown Or Reboot menu option. Once rebooted, you should follow the steps in the Authentication section of this document to enable authentication again. CHANGE PASSWORD If you need to change the password used to access the Cloud Gateway web control panel you can do it on this page. The change will take effect the next time you log in to the web interface. SHUTDOWN OR REBOOT From time to time it may be necessary to shut down or reboot the Cloud Gateway server. It is recommended that you use the options on this page as they are designed to shut down the server gracefully. Web browsing will be interrupted. 42
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationGetting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
More informationCYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationPlesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationComodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
More informationRally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationNetworking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
More informationBackup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationEucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationConfiguration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
More informationBarracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
More informationVirtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
More informationF-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
More informationWEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES
BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required
More informationHOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE
HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE Level 1, 61 Davey St Hobart, TAS 7000 T (03) 6165 1555 www.getbusi.com Table of Contents ABOUT THIS MANUAL! 1 SYSTEM REQUIREMENTS! 2 Hardware
More informationBlue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationSSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
More informationUser Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012
User Guide Hosted Web Security Copyright CensorNet Limited, 2007-2012 This document is designed to provide information about the first time configuration and administrator use of the Hosted Web Security
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationVirtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
More informationInitial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
More informationSevOne NMS Download Installation and Implementation Guide
SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and
More informationStorSimple Appliance Quick Start Guide
StorSimple Appliance Quick Start Guide 5000 and 7000 Series Appliance Software Version 2.1.1 (2.1.1-267) Exported from Online Help on September 15, 2012 Contents Getting Started... 3 Power and Cabling...
More informationVMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
More informationChapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
More informationGX-V. Quick Start Guide. Microsoft Hyper-V Hypervisor. Before You Begin SUMMARY OF TASKS. Before You Begin WORKSHEET VIRTUAL GMS SERVER
Quick Start Guide GX-V VIRTUAL GMS SERVER Microsoft Hyper-V Hypervisor 2012 Silver Peak Systems, Inc. Before You Begin Windows 2008 server installed and Hyper-V is running Hyper-V management software is
More informationRealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
More informationVirtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationhttp://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationGFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
More informationInvestment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More informationVirtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
More informationWorking Folder Linkage Setup Guide
For models listed below, see the respective "Working Foloder Linkage Setup Guide". wfs-mfp-installguide-09_en.pdf - ApeosPort-IV C5570/C4470/C3371/C3370/C2270 - ApeosPort-IV C7780/C6680/C5580 - ApeosPort-IV
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationVirtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
More informationREADYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
More informationXenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationStarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking
StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More informationBlue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More informationD-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
More informationReadyNAS Setup Manual
ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,
More informationUser Manual. User Manual Version 4.0.0.0
User Manual User Manual Version 4.0.0.0 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...
More informationThe SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationAppendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
More informationDeployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
More informationXMS Quick Start Guide
812-0055-002D XMS Quick Start Guide Overview of Quick Start Steps This guide will quickly get you up and running with the Xirrus Management System (XMS). It includes instructions for setting up the XMS
More informationOnCommand Performance Manager 2.0
OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
More informationConfigure thin client settings locally
This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationCounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
More informationXenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
More informationInfor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
More informationTable of Contents. Contents
Contents Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed,
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationSetting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
More informationDeploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
More informationKaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationnappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
More informationCentral Administration User Guide
User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationVX 9000E WiNG Express Manager INSTALLATION GUIDE
VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution
More informationPharos Control User Guide
Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter
More informationOnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
More informationLifeSize Control TM Deployment Guide
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationVirtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationUser Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000
User Manual Version 4.0.0.5 User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 I Endpoint Protector Appliance User Manual Table of Contents 1. Endpoint Protector Appliance Setup... 1 1.1.
More informationRequest Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationSetting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
More informationSuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationMaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
More informationConfiguring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0
Avaya Solution & Interoperability Test Lab Configuring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0 Abstract These Application Notes describe a solution comprised
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationCitrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationJAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
More informationGetting Started Guide
Getting Started Guide Sophos Firewall Software Appliance Document Date: November 2015 November 2015 Page 1 of 14 Contents Preface...3 Minimum Hardware Requirement...3 Recommended Hardware Requirement...3
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More information