Secure Friendly Net Detection Server. July 2006
|
|
- Gertrude Hodge
- 8 years ago
- Views:
Transcription
1 Secure FND Server
2 Secure Friendly Net Detection Server July 2006
3 Disclaimer Considerable care has been taken in the preparation and publication of this manual, errors in content, typographical or otherwise may occur. If you have any comments or recommendations concerning the accuracy, then please contact NCP as desired. NCP makes no representations or warranties with respect to the contents or use of this manual, and explicitly disclaims all expressed or implied warranties of merchantability or use for any particular purpose. Furthermore NCP reserves the right to revise this publication and to make amendments to the content, at any time, without obligation to notify any person or entity of such revisions and changes. Copyright This manual is the sole property of NCP and may not be copied for resale, commercial distribution or translated to another language without the express written permission of NCP engineering GmbH, Dombühler Str. 2, D Nürnberg, Germany. Trademarks All trademarks or registered trademarks appearing in this manual belong to their respective owners NCP engineering GmbH. All rights reserved. 2 NCP engineering GmbH
4 Network Communications Products engineering GmbH GERMANY Headquarters: Dombühler Straße 2 D Nürnberg Tel.: Fax: Internet info@ncp.de NCP engineering GmbH 3
5 Support NCP offers support for all international users by means of Fax and Internet Mail. Fax Hotline Number Internet Mail Address When contacting NCP with your problems or queries please include the following information: exact product name serial number Version number Accurate description of your problem Any error message(s) NCP will do its best to respond as soon as possible, but we do not guarantee a fixed response period. 4 NCP engineering GmbH
6 Inhalt NCP Friendly Net Detection Installation Configuration [General] LogLevel LogPath Port LocalIPAdress PKCS12FileName PKCS12Pin [SysLog] [FND-USER 1] Enabled UserName Password EAP-Type Forming groups IP-Range [FND-USER 2] Enabled UserName EAP-Type IP-Range Configuration on the Client Basic Settings Filter Rules Automatic Friendly Network Detection IP address of the service for detection of friendly nets User name, password (FNDS) User (subject) of the incoming certificate Issuer certificate fingerprint Friendly Net Detection via TLS Configuration on the Management Console Starting the NCPFND Service Uninstalling Test NCP engineering GmbH 5
7 6 NCP engineering GmbH
8 NCP Friendly Net Detection Friendly Net Detection (FND) is a classic client/server application. Since the server (FND Server) is a service that must be installed separately, and it is completely independent from the VPN gateway, it can be installed on any computer within the network. The client (FND Client) is part of the NCP Secure Client Software and can be configured in the firewall settings. The operating principle of Friendly Net Detection is based on established standards. These standards ensure the security of the system and safeguard against errors that frequently occur with proprietary solutions. The prerequisite for the use of Friendly Net Detection is installation of the FND Server in a network that has been declared as a Friendly Net. This service must then be reachable from all network connections, i.e. it may be necessary to make changes to the firewall rules. If an employee operates his end device directly on the corporate network, then the Secure Client (that has been configured for automatic Friendly Net Detection) attempts to contact the configured FND Server. If the FND Server is reached and authenticated, then the system confirms that the computer is located in a friendly network and the appropriate firewall rules that have been pre-configured for this network will be activated automatically. The standardized authentication protocols MD5 (RFC2284), and TLS (RFC2716), provide the basis, however only the server is authenticated by the Client. NCP engineering GmbH 7
9 1. Installation The software for the NCP Friendly Net Detection Server can be downloaded from the NCP web site. It consists of five files that you can copy into any directory on a PC that is connected to a network that has been defined as a Friendly Net. These files have the following functions: ncpfnd.exe fndtest.exe ncpfnd.conf vpngw.p12 readme.txt service program (Friendly Net Detection Server) test client configuration file PKCS#12 file (soft certificate) command description After the files have been copied, the service can be started. Go to the installation directory and use the command: ncpfnd -install After successful installation the following message will appear: Service successfully installed The NCPFND service must be listed in under Services under Administrative Tools of the system as autostart type Automatic", then it will start automatically after a boot process of the PC (see below Starting the NCPFND service ). 8 NCP engineering GmbH
10 2. Configuration Configure the FND Server by editing the configuration file ncpfnd.conf that is divided into the following sections. 2.1 [General] The most important parameters for the FNDS service are described in this section. LogLevel = 0 LogPath =.\log Port = #LocalIpAddr = Pkcs12FileName =.\vpngw.p12 Pkcs12Pin = 1234 LogLevel Usually the LogLevel is set to 0" so that no log messages are written. Log messages are only required for maintenance purposes. LogPath The LogPath is the current directory of the FNDS software. It is only required for maintenance purposes. Port Port is pre-set as standard port for the FND service and should not be changed. LocalIPAdress LocalIpAddr, the local IP address must only be entered if the computer has multiple IP addresses and it only should respond to the entered IP address. In the standard setting the IP address is commented out with #. If an IP address is entered here then it must agree with one of the IP address that have been used in the firewall setting of the client under Friendly Nets as the IP address of the service for detection of friendly nets NCP engineering GmbH 9
11 (see below -> Configuration of the client). This means that this FND server must be reachable with the IP address specified in the client configuration. PKCS12FileName LocalIpAddr, the local IP address must only be entered if the computer has multiple IP addresses and it only should respond to the entered IP address. In the standard setting the IP address is commented out with #. If an IP address is entered here then it must agree with one of the IP address that have been used in the firewall setting of the client under Friendly Nets as the IP address of the service for detection of friendly nets (see below -> Configuration of the client). This means that this FND server must be reachable with the IP address specified in the client configuration. PKCS12Pin Plcs12Pin must be entered as the PIN of the certificate stored here. The PIN 1234" only applies for the NCP test certificate. 10 NCP engineering GmbH
12 2.2 [SysLog] After configuration of this section log messages can be transferred to a Syslog server. Host = Port = 514 LogEnabled = 0 LogFacility = TraceEnabled = 0 TraceFacility = As standard the Syslog Server (with the specified IP address) is addressed via the UDP port 514. The messages are generated if LogEnabled and/or TraceEnabled are set to 1". The log files are identified on the Syslog Server via LogFacility / TraceFacility. NCP engineering GmbH 11
13 2.3 [FND-USER 1] This section in the sample configuration specifies the authentication protocol MD5. This means that user name and password in the firewall settings of the client must agree with the user name and password entered here. Enabled = 1 UserName = testmd5 Password = testmd5 EAP-TYPE = MD5 #IP-Range1 = #IP-Range2 = Enabled Enabled (switched on)the authentication is set via MD5 by setting 1". With 0" the authentication is switched off for this section via MD5. UserName UserName corresponds to the parameter UserName in the firewall settings of the client under the header Friendly Nets. Password Password corresponds to the parameter Password in the firewall settings of the client under the header Friendly Nets. EAP-Type You can choose between the authentication protocols MD5 and TLS as EAP type. If the MD5 protocol is selected as EAP type, then UserName and password must be entered as described above. Forming groups Group formation can be undertaken via the correspondence of UserName and password with the parameters in the firewall settings of the client. This is done by duplication of above section of the configuration file [FND-USER 1] and by entering other placehol- 12 NCP engineering GmbH
14 ders in the duplicated section for UserName and password, which then must also be transferred accordingly into the configurations of the clients for this group. IP-Range The IP range describes the IP addresses that the FND Server accepts. These can be individual IP addresses or address ranges. If these ranges are commented out with # thenalladdressesfromthelanwillbeallowed. NCP engineering GmbH 13
15 2.4 [FND-USER 2] This section in the sample configuration specifies TLS as the authentication protocol. This means that in the firewall settings of the client a user name must agree with the UserName entered here. The password is not required. In addition, for authentication via TLS the issuer certificate or all certificates that are necessary for validation of the FNDS certificate must be available to the client. Moreover the fingerprint of the issuer certificate, and of the user (subject) of the FNDS certificate, can be configured on the client. Thus you can prevent a knowledgeable user fromsimulatinganfnathome(seebelow Configuration on the client). Enabled = 1 UserName = testtls EAP-TYPE = TLS #IP-Range1 = #IP-Range2 = Enabled Enabled (switched on) the authentication is switched on via TLS by setting the 1". With 0" the authentication is switched off for this section. UserName UserName corresponds to the parameter UserName in the firewall settings of the client under the header Friendly Nets. EAP-Type You can choose between the authentication protocols, MD5 and TLS, as EAP type. If the TLS protocol is selected as EAP type, then it suffices to enter a UserName, as described above. IP-Range The IP range describes the IP address that the server accepts. This can be individual IP addresses or address ranges. If these ranges are commented out with # then all addresses from the LAN will be allowed. 14 NCP engineering GmbH
16 3. Configuration on the Client The prerequisite for use of Friendly Net Detection is installation of the FND Server in a network that has been declared as a Friendly Net. This service must then be reachable from all network connections, i.e. it may be necessary to make changes to the firewall rules. If an employee operates his end device directly on the corporate network, then the Secure Client (that has been configured for automatic Friendly Net Detection) attempts to contact the configured FND Server. If the FND Server is reached and authenticated, then the system confirmed that the computer is located in a friendly network and the appropriate firewall rules that have been pre-configured for this network will be activated automatically. 3.1 Basic Settings The NCP Secure Client s integrated Personal Firewall enables extremely flexible organization of firewall rules. Thus it is possible to define rules that are derived from a blocked base setting (everything is prohibited that is not allowed), or open base setting (everything is allowed that is not prohibited). Normally the Blocked base setting is selected. NCP engineering GmbH 15
17 3.2 Filter Rules Network packets can be filtered according to certain criteria depending on the base setting. Examples: Sender address Recipient address Protocol (IP, UDP, ICMP, usw.) Application program See the detailed description in the Secure Client manual for information on configuring the firewall rules. The criteria that are specified in the Security Policy precisely define what a user is allowed to do, and not allowed to do, from his computer in a network e.g. Intranet, central data network (corporate network), Internet etc. The Security Policy is usually created and maintained by the network administrator. So that a user cannot circumvent this security policy and deactivate, delete, or change firewall rules, Secure Enterprise Management enables an access block to these configuration parameters. This also applies for users with administrator rights, i.e. regardless of the rights of the system environment. For information in this regard see the section Configuration on the Management Console". 16 NCP engineering GmbH
18 3.3 Automatic Friendly Network Detection In order to activate Automatic detection of friendly nets, select the appropriate function in the firewall settings under the header Friendly Nets. This Fig. shows an MD5 configuration. Compare the description for the configuration section 2.3 [END-USER 1] of the server. IP address of the service for detection of friendly nets The Friendly Net Detection Server (FNDS), which must be installed in a network that has been defined as a Friendly Net is required. This Friendly Net Detection Server must be reachable via IP and its IP address must be entered here. This IP address corresponds to the LocalIpAddr" in the section General of the configuration file ncpfnd.conf (see above). To increase redundancy the IP address of a second FND server can be entered after a semicolon. In this case, ensure that the appropriate configuration file ncpfnd.conf is also available on the second FND Server. If the Client is in the friendly net, then it will attempt to reach the first FND server, three times in 3-second intervals. If contact cannot be established, then the second IP address is selected. User name, password (FNDS) The Friendly Net Detection Server is authenticated via MD5 or TLS. The user name and password that must be entered here must agree with those stored on the FNDS. When using MD5, authentication occurs via User name and password. When using TLS a password is not required. NCP engineering GmbH 17
19 User name and Password correspond to UserName and Password in the sections FND User 1" and FND User 2" in the configuration file, ncpfnd.conf. This illustration shows a TLS configuration. Compare the description for the configuration section 2.4 [FND USER 2] of the server. User (subject) of the incoming certificate The incoming certificate of the FNDS server is checked for this string. Only if there is agreement will the connected network be recognized as a friendly net. The appropriate issuer certificate, or all certificates that are necessary for validation of the incoming FNDS certificate, must be available on the Client in the installation directory under CaCerts. Issuer certificate fingerprint In order to offer maximum security relative to forgery, you can specify that the fingerprint of the issuer certificate must be checked. The fingerprint must agree with the hash value entered here. Friendly Net Detection via TLS If friendly Net detection will occur via TLS (including authentication via the fingerprint of the issuer certificate), then this issuer certificate must be located in the program directory CaCerts, and its fingerprint must agree with the one configured here. Thus you can prevent a knowledgeable user from simulating a friendly net at home. 18 NCP engineering GmbH
20 4. Configuration on the Management Console So that a user cannot circumvent this security policy and deactivate, delete, or change firewall rules, Secure Enterprise Management enables an access block to these configuration parameters. This also applies for users with administrator rights, i.e. regardless of the rights of the system environment. For this, first one or more firewall templates are created in the Management Console for the desired users. This is done in precisely the same manner as it is done in the Client Configuration (described above). NCP engineering GmbH 19
21 Then the desired firewall template is transferred into the Client template by selecting it in the configuration field (see Fig. above). Thereafter the rights to change the firewall settings can be assigned or blocked in the Client template (see Fig. above). 20 NCP engineering GmbH
22 5. Starting the NCPFND Service The NCPFND service must be listed in under Services under Administrative Tools of the system as autostart type Automatic", then it will start automatically after a boot process of the PC (see below Starting the NCPFND service ). The service can also be started and stopped manually with the commands: net start ncpfnd and net stop ncpfnd NCP engineering GmbH 21
23 5.1 Uninstalling In order to deinstall the service, the command below must be entered: ncpfnd -remove 5.2 Test Use the program fndtest.exe to test the respective type of authentication that has been set in the configuration file, without having to install a Secure Client. For this specify the authentication type after the command fndtest, and specify the client parameters as described under Automatic detection of friendly nets. 22 NCP engineering GmbH
Software Activation. high security remote access. NCP Secure Entry Client
Software Activation high security remote access NCP Secure Entry Client Copyright Considerable care has been taken in the preparation and publication of this manual, errors in content, typographical or
More informationNCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05
What s New NCP Secure Enterprise Management for Windows OS New Features version 1.03 to 2.05 Disclaimer Considerable care has been taken in the preparation and publication of this document, errors in content,
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationSecure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
More informationData Sheet. NCP Secure Enterprise Management. General description. Highlights
Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server
More informationSeamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
More informationInformation on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance
Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationBasic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
More informationRadius Integration Guide Version 9
Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
More informationbintec Workshop Stateful Inspection Firewall Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9
bintec Workshop Stateful Inspection Firewall Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 Purpose Liability Trademarks Copyright Guidelines and standards How to reach
More informationADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
More informationPOP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
More informationRelease Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
More informationHow Do I Upgrade Firmware and Save Configurations on PowerConnect Switches?
PowerConnect Application Note #12 February 2004 How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches? This Application Notes relates to the following Dell PowerConnect products: PowerConnect
More informationRelease Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
More informationIBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions
IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions Integrated SFTP server 2011 IBM Corporation The presentation gives an overview of integrated SFTP server feature IntegratedSFTPServer.ppt
More informationGoogle Docs Print. Administrator's Guide
Google Docs Print Administrator's Guide October 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Google Docs...4 Acquiring a Google account...4 Customizing the application icon...4 Configuring
More information9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
More informationHow To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
More informationAutomatic Hotspot Logon
WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...
More informationPlacing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone
Placing the for Originally posted: June 2002 Affected software versions BlackBerry Enterprise version 2.0 for Microsoft Exchange version 2.1 for Microsoft Exchange version 3.5 for Microsoft Exchange Summary
More informationHowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0
Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...
More informationUse Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
More informationWNMS Mobile Application
WNMS Mobile Application User s Guide Revision 1.0 18 October 2013 Copyright 2013 Deliberant www.deliberant.com Copyright 2013 Deliberant This user s guide and the software described in it are copyrighted
More informationHigh Availability Configuration Guide Version 9
High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
More informationVPNC Interoperability Profile
StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN
More informationSyslog on Polycom Phones
Syslog on Polycom Phones Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational, analytic, or
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationThirdlane User Portal 2.1. Users Guide 05/12/2008. Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930. http://www.thirdlane.
Thirdlane User Portal 2.1 Users Guide 05/12/2008 Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930 http://www.thirdlane.com Copyright 2003-2008. Third Lane Technologies, LLC. All rights reserved.
More informationVPN CLIENT USER S GUIDE
STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current
More informationEMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
More informationSUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE
SUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE Contents 1. INTRODUCTION...1 2. EMAIL ACCOUNT SETTINGS ON PHONE...1 3. EMAIL ACCOUNT SETTINGS WITH PC SUITE...4 Legal Notice Copyright 2003
More informationCA Nimsoft Monitor Snap
CA Nimsoft Monitor Snap Configuration Guide for Email Gateway emailgtw v2.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as
More informationIntegration Guide. Zen Load Balancer Ubuntu/Microsoft Windows
Integration Guide Zen Load Balancer Ubuntu/Microsoft Windows Integration Guide: Zen Load Balancer Imprint copyright 2014 Utimaco IS GmbH Germanusstrasse 4 D-52080 Aachen Germany phone +49 (0)241 / 1696-200
More informationGetting Started with RES Automation Manager Agent for Linux
Getting Started with RES Automation Manager Agent for Linux Contents Chapter 1: Introduction 1 Chapter 2: Prerequisites and General Guidelines 2 Chapter 3: Installation 3 3.1 Manual Installation... 3 3.2
More informationHow To Configure L2TP VPN Connection for MAC OS X client
How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
More informationPRINT FLEET MANAGER USER MANUAL
PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced
More informationaxsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
More informationMobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
More informationBasic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
More informationMDM Mass Configuration Tool User s Manual
User s Manual First Edition, October 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and
More informationNokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication
Nokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication Table of Contents Introduction... 3 Internal address pool configuration... 4 Creating VPN policies... 7 Creating
More informationNokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
More informationCreating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0
Creating a System DSN for Crystal Reports to Access a Sentinel Server Database Configuration Guide Version 1.0 July 2007 Configuration Guide Part Number: 62-14332000, V1.0 Copyright 1995-2007 Ringdale
More informationQuick Installation Guide For Sensors with Cacti
Quick Installation Guide For Sensors with Cacti Edited January 23, 2011 - Rev 1 PART DOC-MANUAL-SENSORGATEWAY-CACTI 1 Copyright: Copyright 2011 ServersCheck BVBA All rights reserved. Reproduction without
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationApplication Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Abstract These Application Notes describe the steps for
More informationz/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
More informationInstallation and Testing of NMM (Windows)
Installation and Testing of NMM (Windows) Motama GmbH, Saarbruecken, Germany (http://www.motama.com) April 2010 Copyright (C) 2005-2010 Motama GmbH, Saarbruecken, Germany http://www.motama.com Permission
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationNokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Legal Notice Copyright Nokia 2006. All rights reserved. Reproduction, transfer, distribution
More informationMAXIS ONE TECHNOLOGIES, L.L.C. MAXIS ONE TECHNOLOGIES, L.L.C. CLOUD-BASED VIRTUAL HOSTED PBX USER S MANUAL
MAXIS ONE TECHNOLOGIES, L.L.C. WWW.MAXISONE.COM BRINGING THE NEXT GENERATION OF VOICE TECHNOLOGY TO YOU CLOUD-BASED VIRTUAL HOSTED PBX USER S MANUAL July 27, 2015 MAXIS ONE TECHNOLOGIES, L.L.C. A Service-Disabled
More informationCyberoam IPSec VPN Client Configuration Guide Version 4
Cyberoam IPSec VPN Client Configuration Guide Version 4 Document version 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time
More informationConfiguring and Integrating MAPI
Configuring and Integrating MAPI The Basics of MAPI 3 The MAPI User Experience Monitor in SAM 4 Troubleshooting MAPI 7 This document includes basic information about MAPI and its role with SolarWinds SAM.
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationConfiguring and Integrating Oracle
Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding
More informationInnominate mguard Version 6
Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
More informationOption Network Management Software for UPS UNMS II
Option Network Management Software for UPS UNMS II AEG Power Supply Systems GmbH Department: PSS E1 Name: Brandt/Rogge Revision: 00 Date: 20.05.2006 Operating Instructions...6000004951 BAL, en Legal Information
More informationSubversion Server for Windows
Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.
More informationQuick Start Guide for Symantec Event Collector for ForeScout CounterACT
Quick Start Guide for Symantec Event Collector for ForeScout CounterACT Quick Start Guide for Symantec Event Collector for ForeScout CounterACT The software described in this book is furnished under a
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationConfiguration Guide. SafeNet Authentication Service. Remote Logging Agent
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationCORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
More informationHP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.
More informationConfiguration Guide. SafeNet Authentication Service AD FS Agent
SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
More informationAndroid App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationInstallation and Configuration Guide
www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationConfiguring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
More informationIGEL Universal Management. Installation Guide
IGEL Universal Management Installation Guide Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including
More informationIntegrate Websense Web Security Gateway (WSG)
Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions
More informationProjetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations
Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationOfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
More informationGoogle Drive. Administrator's Guide
Google Drive Administrator's Guide November 2015 www.lexmark.com Contents 2 Contents Overview... 3 Configuring the application...4 Acquiring a Google account... 4 Accessing the configuration page for the
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
More informationRackConnect User Guide
RackConnect User Guide Updated: November 8, 2011 RackConnect User Guide Page 2 of 15 DISCLAIMER This RackConnect User Guide (the Guide ) is for informational purposes only and is provided AS IS. The information
More informationHow To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationUser Guide. Informatica Smart Plug-in for HP Operations Manager. (Version 8.5.1)
User Guide Informatica Smart Plug-in for HP Operations Manager (Version 8.5.1) Informatica Smart Plug-in for HP Operations Manager User Guide Version 8.5.1 December 2008 Copyright 2008 Informatica Corporation.
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationGTA SSO Auth. Single Sign-On Service. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com
GTA SSO Auth Single Sign-On Service SSOAuth201208-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com
More informationSonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
More informationHP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
More informationDIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
More informationNovell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More information7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
More informationsmartoci User Guide Secure FTP for Catalog Loads
smartoci User Guide Secure FTP for Catalog Loads INTELLECTUAL PROPERTY RIGHT INFORMATION Copyright NetSol Technologies North America, Inc. All Rights Reserved. NetSol, the Netsol logo, smartoci, and the
More informationSophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationFDS manual File Delivery Services SFTP and FTP file transfer
FDS manual File Delivery Services SFTP and FTP file transfer Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationCitrix XenApp Manager 1.0. Administrator s Guide. For Windows 8/RT. Published 10 December 2012. Edition 1.0.1
Citrix XenApp Manager 1.0 For Windows 8/RT Administrator s Guide Published 10 December 2012 Edition 1.0.1 Citrix XenApp Manager for Windows 8/RT Administrator s Guide Copyright 2012 Citrix Systems. Inc.
More informationConfiguring GTA Firewalls for Remote Access
GB-OS Version 5.4 Configuring GTA Firewalls for Remote Access IPSec Mobile Client, PPTP and L2TP RA201010-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220
More information