Secure Friendly Net Detection Server. July 2006

Size: px
Start display at page:

Download "Secure Friendly Net Detection Server. July 2006"

Transcription

1 Secure FND Server

2 Secure Friendly Net Detection Server July 2006

3 Disclaimer Considerable care has been taken in the preparation and publication of this manual, errors in content, typographical or otherwise may occur. If you have any comments or recommendations concerning the accuracy, then please contact NCP as desired. NCP makes no representations or warranties with respect to the contents or use of this manual, and explicitly disclaims all expressed or implied warranties of merchantability or use for any particular purpose. Furthermore NCP reserves the right to revise this publication and to make amendments to the content, at any time, without obligation to notify any person or entity of such revisions and changes. Copyright This manual is the sole property of NCP and may not be copied for resale, commercial distribution or translated to another language without the express written permission of NCP engineering GmbH, Dombühler Str. 2, D Nürnberg, Germany. Trademarks All trademarks or registered trademarks appearing in this manual belong to their respective owners NCP engineering GmbH. All rights reserved. 2 NCP engineering GmbH

4 Network Communications Products engineering GmbH GERMANY Headquarters: Dombühler Straße 2 D Nürnberg Tel.: Fax: Internet info@ncp.de NCP engineering GmbH 3

5 Support NCP offers support for all international users by means of Fax and Internet Mail. Fax Hotline Number Internet Mail Address When contacting NCP with your problems or queries please include the following information: exact product name serial number Version number Accurate description of your problem Any error message(s) NCP will do its best to respond as soon as possible, but we do not guarantee a fixed response period. 4 NCP engineering GmbH

6 Inhalt NCP Friendly Net Detection Installation Configuration [General] LogLevel LogPath Port LocalIPAdress PKCS12FileName PKCS12Pin [SysLog] [FND-USER 1] Enabled UserName Password EAP-Type Forming groups IP-Range [FND-USER 2] Enabled UserName EAP-Type IP-Range Configuration on the Client Basic Settings Filter Rules Automatic Friendly Network Detection IP address of the service for detection of friendly nets User name, password (FNDS) User (subject) of the incoming certificate Issuer certificate fingerprint Friendly Net Detection via TLS Configuration on the Management Console Starting the NCPFND Service Uninstalling Test NCP engineering GmbH 5

7 6 NCP engineering GmbH

8 NCP Friendly Net Detection Friendly Net Detection (FND) is a classic client/server application. Since the server (FND Server) is a service that must be installed separately, and it is completely independent from the VPN gateway, it can be installed on any computer within the network. The client (FND Client) is part of the NCP Secure Client Software and can be configured in the firewall settings. The operating principle of Friendly Net Detection is based on established standards. These standards ensure the security of the system and safeguard against errors that frequently occur with proprietary solutions. The prerequisite for the use of Friendly Net Detection is installation of the FND Server in a network that has been declared as a Friendly Net. This service must then be reachable from all network connections, i.e. it may be necessary to make changes to the firewall rules. If an employee operates his end device directly on the corporate network, then the Secure Client (that has been configured for automatic Friendly Net Detection) attempts to contact the configured FND Server. If the FND Server is reached and authenticated, then the system confirms that the computer is located in a friendly network and the appropriate firewall rules that have been pre-configured for this network will be activated automatically. The standardized authentication protocols MD5 (RFC2284), and TLS (RFC2716), provide the basis, however only the server is authenticated by the Client. NCP engineering GmbH 7

9 1. Installation The software for the NCP Friendly Net Detection Server can be downloaded from the NCP web site. It consists of five files that you can copy into any directory on a PC that is connected to a network that has been defined as a Friendly Net. These files have the following functions: ncpfnd.exe fndtest.exe ncpfnd.conf vpngw.p12 readme.txt service program (Friendly Net Detection Server) test client configuration file PKCS#12 file (soft certificate) command description After the files have been copied, the service can be started. Go to the installation directory and use the command: ncpfnd -install After successful installation the following message will appear: Service successfully installed The NCPFND service must be listed in under Services under Administrative Tools of the system as autostart type Automatic", then it will start automatically after a boot process of the PC (see below Starting the NCPFND service ). 8 NCP engineering GmbH

10 2. Configuration Configure the FND Server by editing the configuration file ncpfnd.conf that is divided into the following sections. 2.1 [General] The most important parameters for the FNDS service are described in this section. LogLevel = 0 LogPath =.\log Port = #LocalIpAddr = Pkcs12FileName =.\vpngw.p12 Pkcs12Pin = 1234 LogLevel Usually the LogLevel is set to 0" so that no log messages are written. Log messages are only required for maintenance purposes. LogPath The LogPath is the current directory of the FNDS software. It is only required for maintenance purposes. Port Port is pre-set as standard port for the FND service and should not be changed. LocalIPAdress LocalIpAddr, the local IP address must only be entered if the computer has multiple IP addresses and it only should respond to the entered IP address. In the standard setting the IP address is commented out with #. If an IP address is entered here then it must agree with one of the IP address that have been used in the firewall setting of the client under Friendly Nets as the IP address of the service for detection of friendly nets NCP engineering GmbH 9

11 (see below -> Configuration of the client). This means that this FND server must be reachable with the IP address specified in the client configuration. PKCS12FileName LocalIpAddr, the local IP address must only be entered if the computer has multiple IP addresses and it only should respond to the entered IP address. In the standard setting the IP address is commented out with #. If an IP address is entered here then it must agree with one of the IP address that have been used in the firewall setting of the client under Friendly Nets as the IP address of the service for detection of friendly nets (see below -> Configuration of the client). This means that this FND server must be reachable with the IP address specified in the client configuration. PKCS12Pin Plcs12Pin must be entered as the PIN of the certificate stored here. The PIN 1234" only applies for the NCP test certificate. 10 NCP engineering GmbH

12 2.2 [SysLog] After configuration of this section log messages can be transferred to a Syslog server. Host = Port = 514 LogEnabled = 0 LogFacility = TraceEnabled = 0 TraceFacility = As standard the Syslog Server (with the specified IP address) is addressed via the UDP port 514. The messages are generated if LogEnabled and/or TraceEnabled are set to 1". The log files are identified on the Syslog Server via LogFacility / TraceFacility. NCP engineering GmbH 11

13 2.3 [FND-USER 1] This section in the sample configuration specifies the authentication protocol MD5. This means that user name and password in the firewall settings of the client must agree with the user name and password entered here. Enabled = 1 UserName = testmd5 Password = testmd5 EAP-TYPE = MD5 #IP-Range1 = #IP-Range2 = Enabled Enabled (switched on)the authentication is set via MD5 by setting 1". With 0" the authentication is switched off for this section via MD5. UserName UserName corresponds to the parameter UserName in the firewall settings of the client under the header Friendly Nets. Password Password corresponds to the parameter Password in the firewall settings of the client under the header Friendly Nets. EAP-Type You can choose between the authentication protocols MD5 and TLS as EAP type. If the MD5 protocol is selected as EAP type, then UserName and password must be entered as described above. Forming groups Group formation can be undertaken via the correspondence of UserName and password with the parameters in the firewall settings of the client. This is done by duplication of above section of the configuration file [FND-USER 1] and by entering other placehol- 12 NCP engineering GmbH

14 ders in the duplicated section for UserName and password, which then must also be transferred accordingly into the configurations of the clients for this group. IP-Range The IP range describes the IP addresses that the FND Server accepts. These can be individual IP addresses or address ranges. If these ranges are commented out with # thenalladdressesfromthelanwillbeallowed. NCP engineering GmbH 13

15 2.4 [FND-USER 2] This section in the sample configuration specifies TLS as the authentication protocol. This means that in the firewall settings of the client a user name must agree with the UserName entered here. The password is not required. In addition, for authentication via TLS the issuer certificate or all certificates that are necessary for validation of the FNDS certificate must be available to the client. Moreover the fingerprint of the issuer certificate, and of the user (subject) of the FNDS certificate, can be configured on the client. Thus you can prevent a knowledgeable user fromsimulatinganfnathome(seebelow Configuration on the client). Enabled = 1 UserName = testtls EAP-TYPE = TLS #IP-Range1 = #IP-Range2 = Enabled Enabled (switched on) the authentication is switched on via TLS by setting the 1". With 0" the authentication is switched off for this section. UserName UserName corresponds to the parameter UserName in the firewall settings of the client under the header Friendly Nets. EAP-Type You can choose between the authentication protocols, MD5 and TLS, as EAP type. If the TLS protocol is selected as EAP type, then it suffices to enter a UserName, as described above. IP-Range The IP range describes the IP address that the server accepts. This can be individual IP addresses or address ranges. If these ranges are commented out with # then all addresses from the LAN will be allowed. 14 NCP engineering GmbH

16 3. Configuration on the Client The prerequisite for use of Friendly Net Detection is installation of the FND Server in a network that has been declared as a Friendly Net. This service must then be reachable from all network connections, i.e. it may be necessary to make changes to the firewall rules. If an employee operates his end device directly on the corporate network, then the Secure Client (that has been configured for automatic Friendly Net Detection) attempts to contact the configured FND Server. If the FND Server is reached and authenticated, then the system confirmed that the computer is located in a friendly network and the appropriate firewall rules that have been pre-configured for this network will be activated automatically. 3.1 Basic Settings The NCP Secure Client s integrated Personal Firewall enables extremely flexible organization of firewall rules. Thus it is possible to define rules that are derived from a blocked base setting (everything is prohibited that is not allowed), or open base setting (everything is allowed that is not prohibited). Normally the Blocked base setting is selected. NCP engineering GmbH 15

17 3.2 Filter Rules Network packets can be filtered according to certain criteria depending on the base setting. Examples: Sender address Recipient address Protocol (IP, UDP, ICMP, usw.) Application program See the detailed description in the Secure Client manual for information on configuring the firewall rules. The criteria that are specified in the Security Policy precisely define what a user is allowed to do, and not allowed to do, from his computer in a network e.g. Intranet, central data network (corporate network), Internet etc. The Security Policy is usually created and maintained by the network administrator. So that a user cannot circumvent this security policy and deactivate, delete, or change firewall rules, Secure Enterprise Management enables an access block to these configuration parameters. This also applies for users with administrator rights, i.e. regardless of the rights of the system environment. For information in this regard see the section Configuration on the Management Console". 16 NCP engineering GmbH

18 3.3 Automatic Friendly Network Detection In order to activate Automatic detection of friendly nets, select the appropriate function in the firewall settings under the header Friendly Nets. This Fig. shows an MD5 configuration. Compare the description for the configuration section 2.3 [END-USER 1] of the server. IP address of the service for detection of friendly nets The Friendly Net Detection Server (FNDS), which must be installed in a network that has been defined as a Friendly Net is required. This Friendly Net Detection Server must be reachable via IP and its IP address must be entered here. This IP address corresponds to the LocalIpAddr" in the section General of the configuration file ncpfnd.conf (see above). To increase redundancy the IP address of a second FND server can be entered after a semicolon. In this case, ensure that the appropriate configuration file ncpfnd.conf is also available on the second FND Server. If the Client is in the friendly net, then it will attempt to reach the first FND server, three times in 3-second intervals. If contact cannot be established, then the second IP address is selected. User name, password (FNDS) The Friendly Net Detection Server is authenticated via MD5 or TLS. The user name and password that must be entered here must agree with those stored on the FNDS. When using MD5, authentication occurs via User name and password. When using TLS a password is not required. NCP engineering GmbH 17

19 User name and Password correspond to UserName and Password in the sections FND User 1" and FND User 2" in the configuration file, ncpfnd.conf. This illustration shows a TLS configuration. Compare the description for the configuration section 2.4 [FND USER 2] of the server. User (subject) of the incoming certificate The incoming certificate of the FNDS server is checked for this string. Only if there is agreement will the connected network be recognized as a friendly net. The appropriate issuer certificate, or all certificates that are necessary for validation of the incoming FNDS certificate, must be available on the Client in the installation directory under CaCerts. Issuer certificate fingerprint In order to offer maximum security relative to forgery, you can specify that the fingerprint of the issuer certificate must be checked. The fingerprint must agree with the hash value entered here. Friendly Net Detection via TLS If friendly Net detection will occur via TLS (including authentication via the fingerprint of the issuer certificate), then this issuer certificate must be located in the program directory CaCerts, and its fingerprint must agree with the one configured here. Thus you can prevent a knowledgeable user from simulating a friendly net at home. 18 NCP engineering GmbH

20 4. Configuration on the Management Console So that a user cannot circumvent this security policy and deactivate, delete, or change firewall rules, Secure Enterprise Management enables an access block to these configuration parameters. This also applies for users with administrator rights, i.e. regardless of the rights of the system environment. For this, first one or more firewall templates are created in the Management Console for the desired users. This is done in precisely the same manner as it is done in the Client Configuration (described above). NCP engineering GmbH 19

21 Then the desired firewall template is transferred into the Client template by selecting it in the configuration field (see Fig. above). Thereafter the rights to change the firewall settings can be assigned or blocked in the Client template (see Fig. above). 20 NCP engineering GmbH

22 5. Starting the NCPFND Service The NCPFND service must be listed in under Services under Administrative Tools of the system as autostart type Automatic", then it will start automatically after a boot process of the PC (see below Starting the NCPFND service ). The service can also be started and stopped manually with the commands: net start ncpfnd and net stop ncpfnd NCP engineering GmbH 21

23 5.1 Uninstalling In order to deinstall the service, the command below must be entered: ncpfnd -remove 5.2 Test Use the program fndtest.exe to test the respective type of authentication that has been set in the configuration file, without having to install a Secure Client. For this specify the authentication type after the command fndtest, and specify the client parameters as described under Automatic detection of friendly nets. 22 NCP engineering GmbH

Software Activation. high security remote access. NCP Secure Entry Client

Software Activation. high security remote access. NCP Secure Entry Client Software Activation high security remote access NCP Secure Entry Client Copyright Considerable care has been taken in the preparation and publication of this manual, errors in content, typographical or

More information

NCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05

NCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05 What s New NCP Secure Enterprise Management for Windows OS New Features version 1.03 to 2.05 Disclaimer Considerable care has been taken in the preparation and publication of this document, errors in content,

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

Seamless Roaming in a Remote Access VPN Environment

Seamless Roaming in a Remote Access VPN Environment Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

Information on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance

Information on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Radius Integration Guide Version 9

Radius Integration Guide Version 9 Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but

More information

bintec Workshop Stateful Inspection Firewall Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

bintec Workshop Stateful Inspection Firewall Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 bintec Workshop Stateful Inspection Firewall Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 Purpose Liability Trademarks Copyright Guidelines and standards How to reach

More information

ADS Integration Guide

ADS Integration Guide ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of

More information

POP3 Connector for Exchange - Configuration

POP3 Connector for Exchange - Configuration Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches?

How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches? PowerConnect Application Note #12 February 2004 How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches? This Application Notes relates to the following Dell PowerConnect products: PowerConnect

More information

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:

More information

IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions

IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions Integrated SFTP server 2011 IBM Corporation The presentation gives an overview of integrated SFTP server feature IntegratedSFTPServer.ppt

More information

Google Docs Print. Administrator's Guide

Google Docs Print. Administrator's Guide Google Docs Print Administrator's Guide October 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Google Docs...4 Acquiring a Google account...4 Customizing the application icon...4 Configuring

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

Automatic Hotspot Logon

Automatic Hotspot Logon WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...

More information

Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone

Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone Placing the for Originally posted: June 2002 Affected software versions BlackBerry Enterprise version 2.0 for Microsoft Exchange version 2.1 for Microsoft Exchange version 3.5 for Microsoft Exchange Summary

More information

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0 Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

WNMS Mobile Application

WNMS Mobile Application WNMS Mobile Application User s Guide Revision 1.0 18 October 2013 Copyright 2013 Deliberant www.deliberant.com Copyright 2013 Deliberant This user s guide and the software described in it are copyrighted

More information

High Availability Configuration Guide Version 9

High Availability Configuration Guide Version 9 High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable

More information

VPNC Interoperability Profile

VPNC Interoperability Profile StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN

More information

Syslog on Polycom Phones

Syslog on Polycom Phones Syslog on Polycom Phones Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational, analytic, or

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Thirdlane User Portal 2.1. Users Guide 05/12/2008. Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930. http://www.thirdlane.

Thirdlane User Portal 2.1. Users Guide 05/12/2008. Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930. http://www.thirdlane. Thirdlane User Portal 2.1 Users Guide 05/12/2008 Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930 http://www.thirdlane.com Copyright 2003-2008. Third Lane Technologies, LLC. All rights reserved.

More information

VPN CLIENT USER S GUIDE

VPN CLIENT USER S GUIDE STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

SUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE

SUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE SUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE Contents 1. INTRODUCTION...1 2. EMAIL ACCOUNT SETTINGS ON PHONE...1 3. EMAIL ACCOUNT SETTINGS WITH PC SUITE...4 Legal Notice Copyright 2003

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for Email Gateway emailgtw v2.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

Integration Guide. Zen Load Balancer Ubuntu/Microsoft Windows

Integration Guide. Zen Load Balancer Ubuntu/Microsoft Windows Integration Guide Zen Load Balancer Ubuntu/Microsoft Windows Integration Guide: Zen Load Balancer Imprint copyright 2014 Utimaco IS GmbH Germanusstrasse 4 D-52080 Aachen Germany phone +49 (0)241 / 1696-200

More information

Getting Started with RES Automation Manager Agent for Linux

Getting Started with RES Automation Manager Agent for Linux Getting Started with RES Automation Manager Agent for Linux Contents Chapter 1: Introduction 1 Chapter 2: Prerequisites and General Guidelines 2 Chapter 3: Installation 3 3.1 Manual Installation... 3 3.2

More information

How To Configure L2TP VPN Connection for MAC OS X client

How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July

More information

PRINT FLEET MANAGER USER MANUAL

PRINT FLEET MANAGER USER MANUAL PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced

More information

axsguard Gatekeeper Internet Redundancy How To v1.2

axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

MDM Mass Configuration Tool User s Manual

MDM Mass Configuration Tool User s Manual User s Manual First Edition, October 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

Nokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication

Nokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication Nokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication Table of Contents Introduction... 3 Internal address pool configuration... 4 Creating VPN policies... 7 Creating

More information

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All

More information

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0 Creating a System DSN for Crystal Reports to Access a Sentinel Server Database Configuration Guide Version 1.0 July 2007 Configuration Guide Part Number: 62-14332000, V1.0 Copyright 1995-2007 Ringdale

More information

Quick Installation Guide For Sensors with Cacti

Quick Installation Guide For Sensors with Cacti Quick Installation Guide For Sensors with Cacti Edited January 23, 2011 - Rev 1 PART DOC-MANUAL-SENSORGATEWAY-CACTI 1 Copyright: Copyright 2011 ServersCheck BVBA All rights reserved. Reproduction without

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Abstract These Application Notes describe the steps for

More information

z/os V1R11 Communications Server system management and monitoring

z/os V1R11 Communications Server system management and monitoring IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North

More information

Installation and Testing of NMM (Windows)

Installation and Testing of NMM (Windows) Installation and Testing of NMM (Windows) Motama GmbH, Saarbruecken, Germany (http://www.motama.com) April 2010 Copyright (C) 2005-2010 Motama GmbH, Saarbruecken, Germany http://www.motama.com Permission

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Legal Notice Copyright Nokia 2006. All rights reserved. Reproduction, transfer, distribution

More information

MAXIS ONE TECHNOLOGIES, L.L.C. MAXIS ONE TECHNOLOGIES, L.L.C. CLOUD-BASED VIRTUAL HOSTED PBX USER S MANUAL

MAXIS ONE TECHNOLOGIES, L.L.C. MAXIS ONE TECHNOLOGIES, L.L.C. CLOUD-BASED VIRTUAL HOSTED PBX USER S MANUAL MAXIS ONE TECHNOLOGIES, L.L.C. WWW.MAXISONE.COM BRINGING THE NEXT GENERATION OF VOICE TECHNOLOGY TO YOU CLOUD-BASED VIRTUAL HOSTED PBX USER S MANUAL July 27, 2015 MAXIS ONE TECHNOLOGIES, L.L.C. A Service-Disabled

More information

Cyberoam IPSec VPN Client Configuration Guide Version 4

Cyberoam IPSec VPN Client Configuration Guide Version 4 Cyberoam IPSec VPN Client Configuration Guide Version 4 Document version 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time

More information

Configuring and Integrating MAPI

Configuring and Integrating MAPI Configuring and Integrating MAPI The Basics of MAPI 3 The MAPI User Experience Monitor in SAM 4 Troubleshooting MAPI 7 This document includes basic information about MAPI and its role with SolarWinds SAM.

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Configuring and Integrating Oracle

Configuring and Integrating Oracle Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding

More information

Innominate mguard Version 6

Innominate mguard Version 6 Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Option Network Management Software for UPS UNMS II

Option Network Management Software for UPS UNMS II Option Network Management Software for UPS UNMS II AEG Power Supply Systems GmbH Department: PSS E1 Name: Brandt/Rogge Revision: 00 Date: 20.05.2006 Operating Instructions...6000004951 BAL, en Legal Information

More information

Subversion Server for Windows

Subversion Server for Windows Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.

More information

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT Quick Start Guide for Symantec Event Collector for ForeScout CounterACT Quick Start Guide for Symantec Event Collector for ForeScout CounterACT The software described in this book is furnished under a

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Configuration Guide. SafeNet Authentication Service. Remote Logging Agent

Configuration Guide. SafeNet Authentication Service. Remote Logging Agent SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1. CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.

More information

Configuration Guide. SafeNet Authentication Service AD FS Agent

Configuration Guide. SafeNet Authentication Service AD FS Agent SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Installation and Configuration Guide

Installation and Configuration Guide www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

IGEL Universal Management. Installation Guide

IGEL Universal Management. Installation Guide IGEL Universal Management Installation Guide Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including

More information

Integrate Websense Web Security Gateway (WSG)

Integrate Websense Web Security Gateway (WSG) Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions

More information

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

Google Drive. Administrator's Guide

Google Drive. Administrator's Guide Google Drive Administrator's Guide November 2015 www.lexmark.com Contents 2 Contents Overview... 3 Configuring the application...4 Acquiring a Google account... 4 Accessing the configuration page for the

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

RackConnect User Guide

RackConnect User Guide RackConnect User Guide Updated: November 8, 2011 RackConnect User Guide Page 2 of 15 DISCLAIMER This RackConnect User Guide (the Guide ) is for informational purposes only and is provided AS IS. The information

More information

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

User Guide. Informatica Smart Plug-in for HP Operations Manager. (Version 8.5.1)

User Guide. Informatica Smart Plug-in for HP Operations Manager. (Version 8.5.1) User Guide Informatica Smart Plug-in for HP Operations Manager (Version 8.5.1) Informatica Smart Plug-in for HP Operations Manager User Guide Version 8.5.1 December 2008 Copyright 2008 Informatica Corporation.

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

GTA SSO Auth. Single Sign-On Service. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com

GTA SSO Auth. Single Sign-On Service. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com GTA SSO Auth Single Sign-On Service SSOAuth201208-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Novell Access Manager

Novell Access Manager J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

smartoci User Guide Secure FTP for Catalog Loads

smartoci User Guide Secure FTP for Catalog Loads smartoci User Guide Secure FTP for Catalog Loads INTELLECTUAL PROPERTY RIGHT INFORMATION Copyright NetSol Technologies North America, Inc. All Rights Reserved. NetSol, the Netsol logo, smartoci, and the

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

FDS manual File Delivery Services SFTP and FTP file transfer

FDS manual File Delivery Services SFTP and FTP file transfer FDS manual File Delivery Services SFTP and FTP file transfer Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

Citrix XenApp Manager 1.0. Administrator s Guide. For Windows 8/RT. Published 10 December 2012. Edition 1.0.1

Citrix XenApp Manager 1.0. Administrator s Guide. For Windows 8/RT. Published 10 December 2012. Edition 1.0.1 Citrix XenApp Manager 1.0 For Windows 8/RT Administrator s Guide Published 10 December 2012 Edition 1.0.1 Citrix XenApp Manager for Windows 8/RT Administrator s Guide Copyright 2012 Citrix Systems. Inc.

More information

Configuring GTA Firewalls for Remote Access

Configuring GTA Firewalls for Remote Access GB-OS Version 5.4 Configuring GTA Firewalls for Remote Access IPSec Mobile Client, PPTP and L2TP RA201010-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220

More information