Aventail SSL VPN. Installation and Administration Guide. Version 9.0.0

Size: px
Start display at page:

Download "Aventail SSL VPN. Installation and Administration Guide. Version 9.0.0"

Transcription

1 Aventail SSL VPN Installation and Administration Guide Version SonicWALL, Inc. All rights reserved. SonicWALL is a registered trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Last modified 1/21/08 15:42 Part number _Rev_A

2

3 SonicWALL / Aventail SSL VPN Installation and Administration Guide i Table of Contents Chapter 1 Introduction Features of Your SonicWALL / Aventail Appliance Aventail Appliance Models Administrator Components User Access Components What s New in This Release System Requirements Server Components Client Components About the Documentation Document Conventions Chapter 2 Installation and Initial Setup Network Architecture Preparing for the Installation Gathering Information Verifying Your Firewall Policies Helpful Management Tools Installation and Deployment Process Installation and Configuration Overview Moving the Appliance into Production Installing the Appliance Rack Installation Front Panel Controls and Indicators Connecting the Appliance Powering Up Powering Down and Rebooting the Appliance Performing Initial Network Setup Web-Based Configuration Using Setup Wizard Next Steps Chapter 3 Working with AMC Accessing AMC Logging In to AMC Logging Out AMC Basics A Quick Tour of the AMC Interface Adding, Editing, Copying, and Deleting Objects in AMC Getting Help Administrator Accounts Managing Administrator Accounts and Roles Avoiding Configuration File Conflicts with Multiple Administrators Managing Multiple SonicWALL Devices Working with Configuration Data Saving Configuration Changes to Disk Applying Configuration Changes Discarding Pending Configuration Changes Deleting Referenced Objects Chapter 4 Network and Authentication Configuration Configuring Basic Network Settings Specifying System Identity Configuring Network Interfaces Configuring Fallback Servers for Connect Tunnel

4 ii Table of Contents Configuring Routing Configuring Network Gateways Choosing a Network Gateway Option Configuring Network Gateways in a Dual-Homed Environment Configuring Network Gateways in a Single-Homed Environment Enabling a Route to the Internet Configuring Static Routes Configuring Name Resolution Configuring Domain Name Service Configuring Windows Network Name Resolution Certificates Server Certificates CA Certificates Certificate FAQ Managing User Authentication Configuring Authentication Servers Configuring LDAP and LDAPS Authentication Configuring Microsoft Active Directory Servers Configuring RADIUS Authentication Configuring a PKI Authentication Server Configuring a Single Sign-On Authentication Server CA etrust SiteMinder and RSA ClearTrust Authentication Configuring Local User Storage Testing LDAP and AD Authentication Configurations Configuring Chained Authentication Enabling Group Affinity Checking in a Realm Next Steps Chapter 5 Security Administration Creating and Managing Resources Resource Types Resources and Resource Groups Creating and Managing Resource Groups Web Application Profiles Creating Forms-Based Single Sign-On Profiles Access Control Rules Configuring Access Control Rules Resolving Deny Rule Incompatibilities Resolving Invalid Destination Resources Chapter 6 User Management Overview: Users, Groups, Communities, and Realms Using Realms and Communities Viewing Realms Default, Visible, and Hidden Realms Specifying the Default Realm Enabling and Disabling Realms Best Practices for Defining Realms Configuring Realms and Communities Creating Realms Adding Communities to a Realm Creating and Configuring Communities Network Tunnel Client Configuration Using the Default Community Changing the Order of Communities Listed in a Realm Configuring RADIUS Accounting in a Realm Editing, Copying and Deleting Communities Managing Users and Groups Viewing Users and Groups Managing Users and Groups Mapped to External Repositories

5 SonicWALL / Aventail SSL VPN Installation and Administration Guide iii Managing Local User Accounts Chapter 7 System Administration Optional Network Configuration Enabling SSH Access from Remote Hosts Enabling ICMP Configuring Time Settings System Logging and Monitoring Overview: System Logging and Monitoring Log Files Monitoring the Appliance SNMP Configuration Managing Configuration Data Exporting the Current Configuration to a Local Machine Saving the Current Configuration on the Appliance Importing Configuration Data Restoring or Exporting Configuration Data Stored on the Appliance Replicating Configuration Data Requirements for Replication Getting Started Defining a Collection of Appliances to Receive Configuration Data Beginning Replication Viewing Configuration Data Recipients Upgrading or Rolling Back the System Updating the System Rolling Back to a Previous Version SSL Encryption Configuring SSL Encryption Software Licenses Viewing License Details Managing Licenses Chapter 8 End Point Control Overview: End Point Control How the Appliance Uses Zones and Device Profiles for End Point Control End Point Control Scenarios Managing EPC with Zones and Device Profiles Enabling and Disabling End Point Control Zones and Device Profiles Creating Zones for Special Situations Removing Data Left On the Client Configuring Aventail Cache Control Advanced EPC: Aventail Secure Desktop Symantec On-Demand Protection Pre-Authentication Integrity Checks Chapter 9 The Aventail WorkPlace Portal A Quick Tour of Aventail WorkPlace Home Page Intranet Address Box Bookmarks Network Explorer Page Web Shortcut Access Configuring Aventail WorkPlace General Settings Working with WorkPlace Shortcuts Viewing Shortcuts Adding Web Shortcuts Adding Network Shortcuts Creating Network Shortcuts to Personal Folders

6 iv Table of Contents Editing Shortcuts Deleting Shortcuts Moving Shortcuts WorkPlace Sites Adding WorkPlace Sites WorkPlace and Small Form Factor Devices Customizing Aventail WorkPlace Login, Error, and Notification Pages Overview: Custom WorkPlace Templates How Template Files are Matched Customizing WorkPlace Templates Uploading Your WorkPlace Custom Templates Giving Users Access to Aventail WorkPlace End Point Control and the User Experience How Aventail Secure Desktop Works How Aventail Cache Control Works Chapter 10 User Access Components and Services User Access Agents Client and Agent Provisioning (Windows) Aventail WorkPlace The Aventail Tunnel Clients The Aventail Proxy Clients Aventail Web Access Aventail Client Installation Packages Downloading the Aventail Client Installation Packages Customizing the Configuration for the Aventail Connect Tunnel Client Customizing the Configuration for the Aventail Connect Mobile Client Running Aventail Connect as a Service Distributing Aventail Client Setup Packages The Aventail OnDemand Proxy Agent Overview: OnDemand How OnDemand Redirects Network Traffic Configuring OnDemand to Access Specific Applications Configuring Advanced OnDemand Options Client Configuration The Aventail Connect Proxy Client Managing the Aventail Access Services Overview: Access Services Stopping and Starting the Aventail Access Services Configuring the Network Tunnel Service Configuring IP Address Pools Configuring the Network Proxy Service Configuring the Web Proxy Service Terminal Server Access Providing Access to Terminal Server Resources Citrix Server Resources Defining an Access Control Rule and Resource for Terminal Server Access Managing Graphical Terminal Agents Graphical Terminal Shortcuts Chapter 11 Administering a High-Availability Cluster Overview: High-Availability Cluster Cluster Architecture The Load Balancing Service Stateful Failover Synchronized Cluster Administration Installing and Configuring a Cluster Step 1: Connect the Cluster Network Step 2: Run Setup Tool on All Nodes of the Cluster Step 3: Assign the Master Node

7 SonicWALL / Aventail SSL VPN Installation and Administration Guide v Step 4: Configure the Cluster s External Virtual IP Address Final Steps: Network Configuration and Licensing Managing the Cluster Viewing and Configuring Network Information for Each Node Powering up a Cluster Starting and Stopping Services Monitoring a Cluster Backing up a Cluster Performing Maintenance on a Cluster Upgrading a Cluster Upgrading a Single Appliance to a Cluster Configuration Troubleshooting a Cluster Cluster Scenarios Normal Flow of Traffic Node Failure Appendix A Appliance Command-Line Tools Configuring a New Appliance Using Setup Tool Tips for Working with Setup Tool Using Setup Tool Saving and Restoring Configuration Data Saving Configuration Data Restoring Configuration Data Upgrading or Rolling Back System Software Installing System Upgrades Reverting to a Previous Version Performing a Factory Reset Validating Hosts Appendix B Troubleshooting General Networking Issues Verify a Downloaded Upgrade File Troubleshooting Client Provisioning (Windows) AMC Issues Authentication Issues Clearing the Certificate Cache Using Personal Firewalls with Aventail Agents Aventail Services Issues Aventail Tunnel Issues Aventail OnDemand Proxy Issues General OnDemand Proxy Issues Specific OnDemand Issues Windows Client Troubleshooting Resetting Browser and Java Settings Uninstalling Aventail Components Logging Back In to WorkPlace Macintosh and Linux Tunnel Client Troubleshooting Macintosh System and Application Information Linux System and Application Information Troubleshooting Tools in AMC Ping Command Traceroute Command DNS Lookup Viewing the Current Routing Table Capturing Network Traffic Logging Tools for Network Tunnel Clients Snapshot Tool

8 vi Table of Contents Appendix C Best Practices for Securing the Appliance Network Configuration Appliance Configuration Appliance Sessions Administrator Accounts Access Policy Set Up Zones of Trust SSL Ciphers Client Access Appendix D Log File Output Formats File Locations System Message Log Auditing Access Policy Decisions Viewing Client Certificate Errors in the Log End Point Control Interrogation Network Proxy/Tunnel Audit Log Auditing Connection Status Messages Web Proxy Audit Log Management Console Audit Log WorkPlace Logs WorkPlace Shortcut Examples Appendix E Internationalization Support Support for Native Character Sets RADIUS Policy Server Character Sets Selected RADIUS Character Sets Other Supported RADIUS Character Sets Appendix F Configuring a High-Capacity Cluster Overview of Clustering Cluster Management Performing Initial Appliance Setup Configuring the Appliance Attaching the Appliance to the Switch Configuring the Load Balancer Index

9 SonicWALL / Aventail SSL VPN Installation and Administration Guide 1 Chapter 1 Introduction The SonicWALL / Aventail SSL VPN appliance provides secure access including clientless access to Web applications, access to client/server applications, and file sharing to employees, business partners, and customers. All traffic is encrypted using Secure Sockets Layer (SSL) to protect it from unauthorized users. The appliance makes applications available from a range of access methods including a standard Web browser, a Windows client, or a mobile device on a wide range of platforms including Windows, Macintosh, and Linux. You might use the appliance to: Create a remote access VPN that enables remote employees to securely access private company applications such as over the Internet. Create a business partner VPN that provides designated suppliers with access to an internal supply chain application over the Internet. The appliance s granular access control lets you define policy and control access down to the user and resource level. Managing policy and configuring the appliance is quick and easy with the Webbased management console. For an overview of planning your Aventail SSL VPN appliance configuration and deployment, see the Aventail SSL VPN Getting Started Guide.

10 2 Chapter 1 - Introduction Features of Your SonicWALL / Aventail Appliance This section highlights the key components provided with your appliance. Aventail Appliance Models Aventail offers the following SSL VPN appliance models, all of which are documented in this manual. Most of them can be clustered: a cluster of two appliances with internal load balancing is intended for high availability (it provides system redundancy in case one of the nodes fails), and clusters of up to eight can be used to increase capacity: Aventail EX-2500: Supports up to 2,000 concurrent users, and provides for clustering two identical appliances behind one virtual IP address with internal load balancing, or up to eight appliances using an external load balancer. Aventail EX-1600 and EX-1500: Supports up to 250 concurrent users and provides for clustering two identical appliances behind one virtual IP address with internal load balancing, or up to eight appliances using an external load balancer. Aventail EX-750: Supports up to 50 concurrent users. Administrator Components These are the key components for managing the Aventail appliance and services: Aventail Management Console (AMC) is a Web-based administrative tool used to manage the appliance. It provides centralized access for managing security policies, configuring the system (including networking and certificate configuration), and monitoring. AMC is accessible from a Web browser. The Aventail Web proxy service provides users with secure access to Web-based applications, Web servers, and network file servers from a Web browser. The Web proxy service is a secure HTTP reverse proxy that brokers and encrypts access to Web-based resources. It also manages TCP/IP connections from the OnDemand proxy agent, and for the Connect Mobile client. The Aventail network tunnel service is a network routing technology that provides secure network tunnel access to a wide range of applications, including those that use non-tcp protocols such as Voice Over IP (VoIP) and ICMP, reverse-connection protocols, and bidirectional protocols such as FTP. It works in conjunction with the Aventail Connect tunnel client and the Aventail OnDemand tunnel agent to provide authenticated and encrypted access. The network tunnel service can traverse firewalls, NAT devices, and other proxy servers that can interfere with traditional VPN devices. The Aventail network proxy service provides a secure proxy for accessing standard client/server applications. It works in conjunction with the Aventail Connect proxy to provide authenticated and encrypted access over the Internet. The network proxy service is based on the SOCKS v5 protocol. The network proxy service brokers and encrypts access to internal

11 SonicWALL / Aventail SSL VPN Installation and Administration Guide 3 applications and networks. Its proxy-based architecture and use of SSL enables the network proxy service to traverse firewalls, NAT devices, and other proxy servers that can interfere with traditional VPN devices. User Access Components The appliance includes several components that provide users with access to resources on your network. Aventail WorkPlace The Aventail WorkPlace portal provides users with quick access to resources on your network. It is accessible from any Web browser that supports SSL and has JavaScript enabled. WorkPlace provides a range of access methods for you to choose from: Basic Web (HTTP) resources are accessible using the Web translation engine, a reverse proxy that provides single sign-on and fine-grained access control. File system resources are accessible from the web-based Network Explorer that is integrated in WorkPlace. Client/server traffic (TCP/IP) is accessible using one of the network redirection clients, OnDemand proxy or OnDemand tunnel. These clients are automatically provisioned or activated when the user logs in to WorkPlace.

12 4 Chapter 1 - Introduction The access method you choose will be based on several factors, including the network protocols used by your applications, your security requirements, end-user convenience, and the target platforms. Here s what your company s WorkPlace portal might look like: Aventail OnDemand proxy agent The OnDemand proxy agent is a secure agent that provides access to resources protected by the Aventail Web proxy service. Aventail OnDemand can be downloaded from any Web server on demand to give users clientless VPN access ideal for partners or vendors that do not have standard VPN access to your network or for mobile employees that may need to access network resources from a non-work computer such as a public kiosk. Aventail Connect and Aventail OnDemand clients with Smart Tunneling Clients with Smart Tunneling provide network-level access to all resources, effectively making each user device a virtual node on your network. The Connect tunnel client provides full network and application access from a Web-deployed Windows client for computers running a Windows Vista, Windows XP, Windows 2000, Macintosh, or Linux operating system. The client can be provisioned either transparently using a link from the Aventail WorkPlace portal or through an executable installation package. The Connect tunnel client provides split-tunneling control, granular access controls, and automatic proxy detection and authentication. The OnDemand tunnel agent provides the same features as the Connect tunnel, except that it can t be used as a dial-up adapter for domain logins, and is integrated into Aventail WorkPlace. OnDemand can operate in either split-tunnel mode or redirect all traffic mode. Aventail Connect Mobile client Connect Mobile provides remote TCP/IP access to Windows Mobile-powered devices. The Connect Mobile client is installed by a stand-alone installer package, and is managed by the Aventail Web proxy service.

13 SonicWALL / Aventail SSL VPN Installation and Administration Guide 5 What s New in This Release Aventail Connect proxy client Connect proxy is a Windows application that provides access to resources protected by the Aventail network proxy service. Installed on the user s computer, Aventail Connect can provide additional security by requiring personal firewalls and antivirus applications. In most cases, users interact with Aventail Connect only when it prompts them to type authentication credentials or to select their local and remote networks. End Point Control (EPC) EPC components ensure that your network is not compromised when accessed from PCs in untrusted environments by enabling you to interrogate devices and determine whether they are running the programs that you require. Advanced EPC simplifies granular end point protection by allowing you to set up device profiles (for clients running on Microsoft Windows) using a comprehensive predefined checklist that includes security solutions from leading vendors like Symantec, McAfee, Computer Associates, Sophos, and Kaspersky. Advanced EPC is included with the EX-2500 appliance and licensed separately for the other appliances in the EX-series. All Aventail access methods support EPC except for the Aventail Connect proxy client. It does, however, support application detection. This enables you to define what applications must be running on users' computers before remote network access is granted. Data Protection You can use a data protection agent Aventail Cache Control to automatically remove session data from the computer. Advanced EPC offers additional session-related security with Aventail Secure Desktop. It is included with the EX-2500 appliance and licensed separately for the other appliances in the EX-series. The appliance also supports integration with third-party client integrity controls that automatically check for malware on the client system before allowing access. This version of the Aventail VPN software includes the following new and enhanced features: Backend connectivity testing: Capture network traffic using a utility that is based on tcpdump to see a packet-by-packet list of the data going in and out of the appliance. If you are new to troubleshooting, you can use this utility to generate traffic data that can be sent to Technical Support for troubleshooting. If you are familiar with reading trace files, you can analyze the traffic using a network protocol analyzer, such as Wireshark. See Capturing Network Traffic on page 359. RADIUS IP assignment for tunnel clients: You can now allocate IP addresses to the network tunnel clients using a RADIUS server, which is often used for applications that require a one-toone relationship between an assigned IP address and a user. See Address Pool Allocation Methods on page 299. Fallback options for Connect tunnel: You can set up one or more fallback servers for Connect tunnel users in case a primary appliance becomes unavailable due to a planned outage, for example, or a natural disaster. You configure the list of backup servers in AMC; users don t need to make any configuration changes on the client. See Configuring Fallback Servers for Connect Tunnel on page 51. Local network access for tunnel clients: When configuring the network tunnel clients, you can now give users access to resources on their local network, such as printers and file shares. See Redirection Modes on page 145. Licensing enhancements and integration with MySonicWALL: Beginning with v9.0.0, you must register on MySonicWALL.com for access to essential resources, such as your license file, firmware updates, and technical support information. The license is in a different format beginning with version 9.0.0, so existing customers must log in to mysonicwall.com to retrieve the license (in addition to the upgrade file), upload both of them to the appliance, upgrade the appliance, and then apply the license. See Managing Licenses on page 208. Global Management System integration: GMS is a single management interface for centrally managing and deploying SonicWALL appliances and security policy configurations. You can configure an Aventail EX-series appliance to be managed by SonicWALL GMS and get reports on user authentication-related events and status. See Managing Multiple SonicWALL Devices on page 43.

14 6 Chapter 1 - Introduction System Requirements Server Components This section describes the system requirements for the administrator and client components for the Aventail SSL VPN. Note Only 32-bit operating systems are supported. If you are using a client component with Internet Explorer on a computer running 64-bit, you'll see an error message to this effect; if you are using Firefox you will not see a message. The system requirements for the administrator components and authentication servers are listed in the following table. Platforms and browsers shown in the regular font are fully supported, while those shown in brackets in [italic] typeface are compatible with the appliance. (There are no known issues with compatible configurations, and we continue to offer technical support for them, but they have not been specifically tested in the current release and future product changes will not take them into account.) System Administration Operating system Notes Aventail Management Console (AMC) Windows Vista Windows XP Pro, SP2 Windows XP Home, SP2 Internet Explorer 7.0 Internet Explorer 6.0, SP2 Mozilla Firefox 2.0 [Mozilla Firefox 1.5] Linux Mozilla Firefox 2.0 [Mozilla Firefox 1.5] Authentication Servers Operating system/version Notes Active Directory Windows Server platform: Windows 2003 Server Windows 2000 Server General support, including password change LDAP servers LDAP version 3 compatible servers No LDAP password change support IBM Directory Server, versions 5 and 6 LDAP password change supported on ID5 RADIUS Version 5.2 Version 5.0 Single sign-on CA etrust SiteMinder, version 6.02 RSA ClearTrust, version 4.6

15 SonicWALL / Aventail SSL VPN Installation and Administration Guide 7 Citrix Server Farms Servers Citrix Presentation Server 4 Citrix MetaFrame XP Citrix MetaFrame version 1.8 Notes Citrix XML service must be running on the MetaFrame server MetaFrame 1.8 must have a license for Service Pack 2 and Feature Release 1 (SP2/FR1) EOL has been announced for MetaFrame XP and 1.8 Client Components The system requirements for the client components are listed in the following tables. Platforms and browsers shown in the regular font are fully supported, while those shown in brackets in [italic] typeface are compatible with the appliance. (There are no known issues with compatible configurations, and we continue to offer technical support for them, but they have not been specifically tested in the current release and future product changes will not take them into account.) Web-Based Clients Operating system Browser Notes Aventail WorkPlace Portal, Translated Web access Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Macintosh OS X v 10.4 [Macintosh OS X v 10.3] Internet Explorer 7.0 Internet Explorer 6.0, SP2 Mozilla Firefox 2.0 [Mozilla Firefox 1.5] Safari 2.0 [Safari 1.3] ActiveX, or JRE or later Linux Mozilla Firefox 2.0 [Mozilla Firefox 1.5] Web-enabled mobile devices The browser appropriate for your device

16 8 Chapter 1 - Introduction Tunnel Clients Operating system Browser Notes Connect Tunnel Client Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Windows Server platform: Windows 2003 Server Windows 2000 Server, SP4 Macintosh OS X v 10.5 Macintosh OS X v 10.4 n/a Windows administrator rights required for installation n/a Administrator rights required for installation No support for End Point Control Macintosh OS X v 10.5 has been tested only on Intel computers Linux kernel or later Mozilla Firefox 2.0 [Mozilla Firefox 1.5] Administrator rights required for installation Browser required only for proxy detection No support for End Point Control Connect Tunnel Service Windows XP Pro, SP2 Windows Server platform: Windows 2003 Server Windows 2000 Server, SP4 n/a No support for End Point Control OnDemand Tunnel Agent Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Internet Explorer 7.0 Internet Explorer 6.0, SP2 Mozilla Firefox 2.0 [Mozilla Firefox 1.5] ActiveX, or JRE or later Windows administrator rights required for installation [JRE 1.4.2] Macintosh OS X v 10.4 Safari 2.0 JRE JRE Administrator rights required for installation [JRE 1.4.2] Linux kernel or later Mozilla Firefox 2.0 [Mozilla Firefox 1.5] JRE JRE Administrator rights required for installation [JRE 1.4.2]

17 SonicWALL / Aventail SSL VPN Installation and Administration Guide 9 Proxy Clients Operating system Browser Notes OnDemand Proxy Agent Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Macintosh OS X v 10.4 [Macintosh OS X v 10.3] Internet Explorer 7.0 Internet Explorer 6.0, SP2 Mozilla Firefox 2.0 [Mozilla Firefox 1.5] Safari 2.0 [Safari 1.3] ActiveX, or JRE and later Port-mapped mode requires ActiveX or Java; for users who can t run ActiveX, JRE is used. Administrator rights required for dynamic redirection mode [JRE 1.4.2] JRE JRE [JRE 1.4.2] Linux kernel or later Mozilla Firefox 2.0 [Mozilla Firefox 1.5] JRE JRE Web Proxy Agent Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Connect Mobile Client Internet Explorer 7.0 Internet Explorer 6.0, SP2 ActiveX, or JRE and later [JRE 1.4.2] Windows Mobile 6 Windows Mobile 5 [Windows Mobile 2003 Second Edition for Pocket PC Phone Edition (Windows CE 4.21)] [Windows Mobile 2003 for Pocket PC Phone Edition (Windows CE 4.20)] n/a Includes Mobile2Market certification Supports Pocket PC devices and smartphones Does not support some legacy devices, such as Audiovox SMT5600, Motorola MPx200 & MPx220, Sierra Wireless Voq, Samsung i600, imate SP2, etc. n/a [Does not include support for smartphones] Connect Proxy Client Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 n/a Windows administrator rights required for installation No support for Windows Vista

18 10 Chapter 1 - Introduction End Point Control Operating system Browser Notes Interrogator and Installer Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows Mobile Windows XP Home, SP2 Macintosh OS X v 10.4 [Macintosh OS X v 10.3] Internet Explorer 7.0 Internet Explorer 6.0, SP2 Pocket Internet Explorer 4.0 Mozilla Firefox 2.0 [Mozilla Firefox 1.5] Safari 2.0 [Safari 1.3] ActiveX, or JRE and later [JRE 1.4.2] JRE JRE [JRE 1.4.2] Linux Mozilla Firefox 2.0 [Mozilla Firefox 1.5] JRE JRE Aventail Cache Control Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Macintosh OS X v [Macintosh OS X v 10.3] Internet Explorer 7.0 Internet Explorer 6.0, SP2 Mozilla Firefox 2.0 Mozilla Firefox 1.5 Safari 2.0 [Safari 1.3] JRE JRE [JRE 1.4.2] JRE JRE [JRE 1.4.2] Linux Mozilla 1.2 and later JRE JRE Advanced EPC Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Internet Explorer 7.0 Internet Explorer 6.0, SP2 Mozilla Firefox 2.0 [Mozilla Firefox 1.5] JRE JRE [JRE 1.4.2] Aventail Secure Desktop (included in Advanced EPC) Windows Vista Windows XP Pro, SP2 Windows 2000 Pro, SP4 Windows XP Home, SP2 Internet Explorer 7.0 Internet Explorer 6.0, SP2 Mozilla Firefox 2.0 Mozilla Firefox 1.5 JRE JRE [JRE 1.4.2] Integration with Third-Party Components The Aventail appliance integrates with several popular security programs. In some cases (such as Symantec On-Demand Protection), the files necessary for integration are already on the appliance, and in other cases (such as Zone Labs Integrity Clientless Security), the files must be copied to the appliance. Description Notes Windows Terminal Services agent Windows (ActiveX control) Version 5.2 Cross-platform (Java applet) Version 8.6 Citrix agent

19 SonicWALL / Aventail SSL VPN Installation and Administration Guide 11 Description Windows 2000 and Windows XP (ActiveX control) Notes Version v8.x and later Windows Vista (ActiveX control) Version v10 and later Cross-platform (Java applet) Version v8.x and later Requires JRE or later Symantec On-Demand Protection See Symantec On-Demand Protection on page 238. For information on what operating systems are supported, refer to the vendor s Web site: Version 3.1 MP2 Requires JRE or Windows Macintosh Confidence Online for Web Applications The Aventail appliance supports version 5.0 of this product; manual installation and additional configuration are required. See WholeSecurity Confidence Online for Web Applications on page 240. For information on what operating systems are supported, refer to the vendor s Web site: Version 4.3 Version 5.0 Windows Macintosh Linux Zone Labs Integrity Clientless Security (Includes the Integrity Desktop, Agent, and Flex clients). See Zone Labs Integrity Clientless Security on page 241 [Version 2.2] Requires JRE and later About the Documentation Document Conventions This document contains detailed information about installing, configuring, and maintaining the appliance. Its contents are also available as context-sensitive Help from AMC; see Getting Help on page 39 for more information. Your Aventail appliance also comes with a printed Getting Started Guide that explains important VPN concepts and components and will aid in planning to deploy your VPN. For access to electronic copies of all of the product documentation, log in to your mysonicwall.com account and register your appliance. See Registering Your SonicWALL Aventail SSL VPN Appliance on page 209 for more information. Throughout this document, external refers to the network interface connected to the Internet. Internal refers to the network interface connected to your internal corporate network. This document uses the following typographical conventions: Typographical convention Bold Monospace font Italic Usage User interface components (such as text boxes or buttons on a Web page). Information you are supposed to type. File names and directories, examples, and selections from drop-down lists.

20 12 Chapter 1 - Introduction Typographical convention commandname -x [-y] Initial Caps Usage In command-line syntax, square brackets indicate optional parameters. Key names such as Enter or Backspace, and key combinations such as Ctrl+Q.

Aventail SSL VPN. Getting Started Guide. Version 8.6

Aventail SSL VPN. Getting Started Guide. Version 8.6 Aventail SSL VPN Getting Started Guide Version 8.6 1996-2005 Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Tunnel, Aventail End Point Control, Aventail Management Console, Aventail

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4. Upgrade Guide

BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4. Upgrade Guide BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Upgrade Guide Published: 2014-01-16 SWD-20140116175501016 Contents 1 Overview: BlackBerry Enterprise Server...7 2 Planning

More information

McAfee SMC Installation Guide 5.7. Security Management Center

McAfee SMC Installation Guide 5.7. Security Management Center McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can

More information

Release Notes for Version 1.5.207

Release Notes for Version 1.5.207 Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4

More information

Release Notes. Platform Compatibility. Supported Operating Systems and Browsers: AMC. WorkPlace

Release Notes. Platform Compatibility. Supported Operating Systems and Browsers: AMC. WorkPlace Secure Remote Access SonicWALL Aventail E-Class SRA EX-Series 10.5.6 Platform Compatibility The SonicWALL Aventail E-Class SRA EX-Series 10.5.6 release is supported on the following SonicWALL appliances:

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2 RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560 WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control Step by step guide on how to configure SonicWALL Aventail SSL VPNs to detect the

More information

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013 SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Configuration Guide. Installation and. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Configuration Guide. Installation and. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4 BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Installation and Configuration Guide Published: 2014-01-14 SWD-20140114180405595 Contents 1 Overview: BlackBerry Enterprise

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

Remote Access for LAPD Users Using Aventail SSL VPN

Remote Access for LAPD Users Using Aventail SSL VPN Remote Access for LAPD Users Using Aventail SSL VPN About Aventail SSL VPN This document describes how to access the LAPD network remotely, using a technology called SSL (Secure Socket Layer) VPN (Virtual

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

How To Configure A Citrix Access Gateway Standard Edition Administrator Administrator S Guide

How To Configure A Citrix Access Gateway Standard Edition Administrator Administrator S Guide Citrix Access Gateway Standard Edition Administrator s Guide Citrix Access Gateway TM 4.5 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Non-Employee VPN Quick Start Guide

Non-Employee VPN Quick Start Guide 1. Computer Requirements Pentium-based personal computer Windows XP SP3: 128 MB RAM Windows Vista Windows 7 Home/Pro 10 MB hard disk space Microsoft Internet Explorer 6.0 or later or Mozilla Firefox 1.0

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns

More information

SonicOS Enhanced 5.7.0.2 Release Notes

SonicOS Enhanced 5.7.0.2 Release Notes SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following: Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise

What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Juniper SSL VPN Notes Page 1

Juniper SSL VPN Notes Page 1 Juniper SSL VPN Notes Page 1 The Juniper SSL VPN is a full-featured appliance using SSL protocol to allow remote computers to securely access our organization s resources with a standard browser. The types

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. 1 Copyright Acronis International GmbH, 2002-2016 Copyright Statement Copyright Acronis International GmbH, 2002-2016. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

BlackBerry Enterprise Server Express for Microsoft Exchange. Version: 5.0 Service Pack: 4. Upgrade Guide

BlackBerry Enterprise Server Express for Microsoft Exchange. Version: 5.0 Service Pack: 4. Upgrade Guide BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 4 Upgrade Guide Published: 2013-02-21 SWD-20130221113643226 Contents 1 Overview: BlackBerry Enterprise Server Express...

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc. SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam 1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives

More information

StoneGate Administrator's Guide SSL VPN 1.1

StoneGate Administrator's Guide SSL VPN 1.1 StoneGate Administrator's Guide SSL VPN 1.1 Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user license agreement,

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 9.0, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame White Paper Version 20100716 2009 SATO CORPORATION. All rights reserved. http://www.satoworldwide.com softwaresupport@satogbs.com

More information

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone

More information

SSL-Based Remote-Access VPN Solution

SSL-Based Remote-Access VPN Solution Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

IBM Remote Lab Platform Citrix Setup Guide

IBM Remote Lab Platform Citrix Setup Guide Citrix Setup Guide Version 1.8.2 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation in

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

ADMINISTRATOR S GUIDE

ADMINISTRATOR S GUIDE STONEGATE SSL VPN 1.4.3 ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4

1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 MED-V v1 Contents 1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 2 High-level Architecture... 6 2.1 System Requirements for MED-V

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

msuite5 & mdesign Installation Prerequisites

msuite5 & mdesign Installation Prerequisites CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information