PULSE. Pulse for Windows Phone Quick Start Guide. Release Published Date
|
|
|
- Delphia Kennedy
- 9 years ago
- Views:
Transcription
1 PULSE Pulse for Windows Phone Quick Start Guide Release Published Date 1.0 July 2015
2 Contents PART 1 Pulse for Windows Phone 4 CHAPTER 1 5 Introducing Pulse for Windows Phone 5 Pulse for Windows Phone Overview 5 Pulse for Windows Phone Supported Platforms 5 Pulse for Windows Phone Supported Features 5 Pulse for Windows Phone Limitations 6 Configuring Pulse Secure Access Service for Pulse for Windows Phone VPN Connections 7 Configuring a Pulse Connection for Windows Phone Manual Configuration 9 PART 2 Index 12 2
3 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA Pulse Secure, Pulse, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Pulse Secure, LLC. in the United States and other countries. The Pulse Secure Logo, and the Pulse logo are trademarks of Pulse Secure, LLC. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Pulse Secure assumes no responsibility for any inaccuracies in this document. Pulse Secure reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Pulse for Windows Phone Quick Start Revision History Release Release 1.0R1 The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Pulse Secure hardware and software products are Year 2000 compliant. OS has no known time-related limitations through the year However, the NTP application is known to have some difficulty in the year END USER LICENSE AGREEMENT The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure software. Use of such software is subject to the terms and conditions of the End User License Agreement ( EULA ) posted at By downloading, installing or using such software, you agree to the terms and conditions of that EULA. 3
4 PART 1 Pulse for Windows Phone Introducing Pulse for Windows Phone on page 5 4
5 CHAPTER 1 Introducing Pulse for Windows Phone Pulse for Windows Phone on page 4 Configuring Pulse Secure Access Service for Pulse for Windows Phone VPN Connections on page 7 Configuring a Pulse Connection for Windows Phone Manual Configuration on page 9 Pulse for Windows Phone Overview Pulse for Windows Phone provides secure connectivity between a Windows Phone and Pulse Secure Access Service. Pulse for Windows Phone is available from the Windows Phone Store. (The Pulse app is visible only when searching from a Windows Phone that is running Windows Phone 8.1.) After installing the Pulse VPN app on a Windows Phone (Windows Phone 8.1 or later), the user can configure a connection and establish Layer 3 VPN (SSL) communications. Configuration on the Pulse server to support Pulse for Windows Phone is the same as for the Pulse for Windows client. You use sign-in policies, authentication realms, roles, and VPN tunnel policies to define authentication and access permissions. A typical Pulse server configuration for Windows Phone access is to create a realm, a role, and a remediation role that are designed for Windows Phone users. Pulse for Windows Phone Supported Platforms Pulse for Windows Phone Overview on page 5 Configuring a Pulse Connection for Windows Phone Manual Configuration on page 9 Configuring Pulse Secure Access Service for Pulse for Windows Phone VPN Connections on page 7 Pulse for Windows Phone Supported Features The following list describes the supported features for the Pulse for Windows Phone client. 5
6 Pulse for Windows Phone supports VPN (SSL) connections to Pulse Secure Access Service R8.0 and later. Only one connection at a time can be active. The user can manually connect and disconnect. Username and password. Username and RSA token code. (User PIN and system PIN are supported.) Configuring a Pulse Connection for Windows Phone Manual Configuration Authentication server prompts for retry, change password, create PIN, change PIN, and specify next token code. Realm and role selection and preferred realm and role. (The user cannot choose to save a connection preference.) Sign-in notification messages. Secondary authentication. HTTPS proxy. IPv4 and IPv6. Pulse for Windows Phone supports the following tunneling functions: Split tunneling enabled or disabled. Note: Pulse for Windows Phone connections always have local subnetaccess enabled. SSL-VPN connections. Split tunneling policies: IPv4 inclusion and exclusion routes, and IPv6 inclusion routes. In split-tunneled mode, the DNS search order options do not apply. Pulse forwards only those DNS requests contained by the configured DNS suffixes to the specified DNS servers. You can specify the VPN option Search device DNS only to forward all DNS requests to configured DNS servers. Pulse for Windows Phone Limitations Pulse for Windows Phone supports connections to Pulse Secure Access Service only. The following Pulse features are not available with Pulse for Windows Phone: Host Checker 6
7 Note: If a Pulse for Windows Phone user attempts to connect to a realm or role that has any Host Checker OS check rule enabled, the Windows Phone will fail the host check. Save realm or role preference Machine authentication Location awareness rules Logon and logoff scripts WINS server tunnel parameter UDP-ESP tunnel (SSL mode only) Certificate trust override prompt RSA soft-token integration Session extension Suspend/resume tunnel Related Documentation Configuring a Pulse Connection for Windows Phone Manual Configuration on page 9 Configuring Pulse Secure Access Service for Pulse for Windows Phone VPN Connections on page 7 Configuring Pulse Secure Access Service for Pulse for Windows Phone VPN Connections Pulse enables you to secure your company resources using authentication realms, user roles, and resource policies. For complete information on the Pulse access management framework, see the Pulse server documentation. A Pulse server checks the authentication policy defined for the authentication realm. The user must meet the security requirements you define for a realm s authentication policy, or else the Pulse server does not forward the user s credentials to the authentication server. At the realm level, you can specify security requirements based on various elements such as the user s source IP address or the possession of a client-side certificate. If the user meets the requirements specified by the realm s authentication policy, the Pulse server forwards the user s credentials to the appropriate authentication server. If this server successfully authenticates the user, then the Pulse server evaluates the role mapping rules defined for the realm to determine which roles to assign to the user. 7
8 Note: If a Pulse for Windows Phone user attempts to connect to a realm or role that has any Host Checker OS check rule enabled, the Windows Phone will fail the host check. The following is a generalized example of configuring a Pulse server for the Pulse for Windows Phone app. 1. Click Users > User Roles, and then create a new role. You can use an existing role. However, because Host Checker supports different options for each type of device operating system, a typical approach is to create different roles for different devices. 2. Specify a name and optional description for the role, for example, WinPhoneRole, Windows Phone VPN role. 3. To use certificate authentication at the role level, click Restrictions > Certificate on the role s General tab, and add the required certificate information. 4. Enable certificate authentication by clicking Only allow users with a client-side certificate signed by Certification Authority to sign in. One typical method of installing the client certificate on the Windows Phone is to send the certificate as an attachment to the Windows Phone user. The certificate must be installed on the Windows Phone before the user can connect. The user is prompted to select the certificate during the initial Pulse VPN connection process. 5. Define the client certificate, click Add, and then click Save Changes. For complete information on certificate authentication, see Understanding Digital Certificate Security. 6. Set the options on the role s Web and Files tabs as needed. 7. Click Users > User Realms, and then create a new realm or select an existing realm. Configure and save your options on the General and the Authentication Policy tabs. 8. On the Role Mapping tab, click New Rule to create a new role mapping rule. One option for a role mapping rule is to create a custom expression that uses the user agent string to identify a Windows Phone. The Pulse for Windows Phone user agent string is-pulse/ (Windows Phone; ARM) PulseVpn/ You can use all or part of the string in a custom expression that uses the useragent variable. For example, useragent = *Windows Phone*. 9. Select the role that you created earlier for the Windows Phone users, add it to the Selected Roles list, and then click Save Changes Related Documentation Pulse for Windows Phone Overview on page 5 Configuring a Pulse Connection for Windows Phone Manual Configuration on page 9 8
9 Configuring a Pulse Connection for Windows Phone Manual Configuration Pulse for Windows Phone is available from the Windows Phone Store. (The Pulse app is visible only when searching from a Windows Phone that is running Windows Phone 8.1.) After the user installs the app, the user can create Pulse VPN connections. Figure 1 on page 7 shows Pulse VPN after it has been installed on a Windows Phone. Figure 1: Windows Phone Apps List Note: To configure a VPN connection, or to initiate a manual VPN connection, use Settings on the phone. Tapping Pulse in the apps list simply opens an information screen. You create, manage, and delete Pulse connections by using Windows Phone Settings. Pulse connections appear as VPN connections in the Networks list. Note: If you use client certificate authentication, the client certificate must be installed on the Windows Phone before Pulse can connect. One typical way of installing a certificate is to it to the user. The user simply taps the certificate in the and Windows Phone installs it. 9
10 To create a Pulse VPN connection on a Windows Phone: Tap Settings, and then tap VPN. 2. If the status slider is set to On, the phone displays a list of existing VPN connections. Figure 2 on page 10 shows the Windows dialog where you configure the connection. Figure 2: Manually Adding a Pulse Connection 2. To create a new connection, tap the plus icon at the bottom of the screen. The Add Profile screen appears. 3. In the Server name or IP address box, specify the target for this connection. You can identify the server using the server IP address, the hostname, or a URL that optionally specifies the port the connection uses and the specific sign-in page. To specify a URL, use the following format: page] The brackets indicate options. Also, if you specify a specific sign-in page, be sure that the name you specify matches what is defined on the Pulse server. (Authentication > Signing in > Sign-in pages.) 4. Tap the Type box to expand it, and then tap Pulse VPN to select it. 5. Specify a username and password. If you specify a username and password, the prompt for this information does not appear when you activate the connection. For token code authentication, specify a username and leave the password field blank. 6. Enable or disable Connect automatically as needed. 10
11 7. The IP ranges option is available if you have enabled the Connect automatically slider. The IP ranges option lets you identify specific IP addresses that can trigger this Pulse VPN connection. When you attempt a connection to an IP address in the specified range, and that address is not reachable, the Pulse VPN connection is activated. 8. The Profile name defaults to the value you entered for Server name or IP address box. The Profile name appears in the VPN list; you can change it to something more meaningful. 9. Tap Advanced to set the following: Proxy If you enable the Proxy setting, the app opens a screen where you can specify the settings for connecting to the Pulse server through a proxy server. Don t use VPN on company WiFi When you are in the company office, network traffic uses the company WiFi network without first establishing a VPN connection. DNS suffix If you have automatic connections enabled, a request to access information within the specified domain name suffix causes Windows to initiate a VPN connection before connecting to the target. Don t use VPN for home WiFi traffic Network traffic uses the home WiFi network without first establishing a VPN connection. After the user saves the new connection, it appears in the VPN list. The user can tap the connection to initiate a VPN connection. When a VPN connection is active, a small lock icon appears next to the WiFi status icon. Related Documentation Pulse for Windows Phone Overview on page 5 Host Checker for Pulse for Windows Phone Configuring Pulse Secure Access Service for Pulse for Windows Phone VPN Connections on page 7 11
12 PART 2 Index Index on page 13 12
13 Index C certificate auth 8 Client certificate, smart card, and virtual smart card. 6 create Pulse connection 6 creating on Windows Phone 10 D DNS Windows Phone 6 L location awareness 7 M Machine authentication 7 R RSA soft-token integration 7 RSA token code 6 S Sign-in notification messages 6 Sign-in notification messages. 6 soft-token 7 Supported Features 5 Supported Platforms 5 T token code 10 U upgrade Windows in-box Pulse client 5 user agent string 8 V virtual smart card 6 W Windows Phone 6 Windows Phone Store 5 Windows Update 5 13
Pulse Secure Client for Chrome OS
Pulse Secure Client for Chrome OS Quick Start Guide Product Release 5.2r1 Document Revision 1.5 Published: 2016-06 2016 by Pulse Secure, LLC. All rights reserved 1 Pulse Secure, LLC 2700 Zanker Road, Suite
Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Pulse Secure Universal App for Windows
Pulse Secure Universal App for Windows Quick Start Guide Product Release 5.2.8 Document Revision 1.5 Published: August 2016 2016 by Pulse Secure, LLC. All rights reserved 1 Pulse Secure, LLC 2700 Zanker
Junos Pulse. Windows In-Box Junos Pulse Client Solution. Release 5.0. Published: 2013-11-20. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Solution Release 5.0 Published: 2013-11-20 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San
Once the software has finished downloading, locate the ivms-4000(v2.0).exe on your hard drive and open it.
Installing the IVMS ZoomVideo software on a PC The ivms ZoomVideo software can be downloaded, free of charge, from the ZoomVideo website. Go to http://zoomvideo.com.au/, click on support and select the
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version
Pulse Secure Client. Administration Guide. Product Release 5.1. Document Revision 1.0 Published: 2015-03-19
Pulse Secure Client Administration Guide Product Release 5.1 Document Revision 1.0 Published: 2015-03-19 2015 by Pulse Secure, LLC. All rights reserved 2700 Zanker Road, Suite 200 San Jose, CA 95134 http://www.pulsesecure.net
SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide
SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide
Protecting Juniper SA using Certificate-Based Authentication Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Pulse Secure Desktop Client
Pulse Secure Desktop Client Platforms Guide Product Release 5.1 Document Revision 2.0 Published: 2015-02-25 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance Juniper Networks, Inc. 1 Table of Contents Before we begin... 3 Configuring IKEv2 on IVE... 3 IKEv2 Client Side Configuration on Windows
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios 2 OpenTopic TOC Contents What is BIG-IP Edge Client app for ios?... 3 About supported authentication types... 3 About establishing
How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)
How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) Scenario # 1: Single Node or Standalone SA... 2 Scenario
Deploying NetScaler Gateway in ICA Proxy Mode
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010
Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from
Accessing TP SSL VPN
Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
Virtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.
Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor
Setting Up groov Mobile Apps. Introduction. Setting Up groov Mobile Apps. Using the ios Mobile App
Introduction Using the ios Mobile App Opto 22 s free groov View apps for ios and Android allow you to use View for one or more groovs on your smartphone or tablet in full-screen mode without the address
How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates
Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication
Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication This document describes how to configure WPA-Enterprise and WPA2 security protocols with RADIUS authentication for Check Point Embedded
Configuring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Global Protect SSL VPN Overview This document gives you an overview on how to configure
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Smart Card Authentication Client. Administrator's Guide
Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Using the ECM VPN with Windows 7
Using the ECM VPN with Windows 7 ECM IT has set up a VPN server to provide an enhanced service to ECM staff and students. This document shows you how to set up a connection on a Windows computer once your
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
For paid computer support call 604-518-6695 http://www.netdigix.com [email protected]
Setting up your vpn connection on windows 2000 or XP in continuation from installing x.509 certificate on windows (please do not continue if you have not installed your x.509 certificate): Instructions
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip
F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
Mobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
Aventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
H3C SSL VPN RADIUS Authentication Configuration Example
H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
Junos Pulse. Administration Guide. Release 3.0. Published: 2012-04-30. Copyright 2012, Juniper Networks, Inc.
Junos Pulse Administration Guide Release 3.0 Published: 2012-04-30 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 408-745-2000 www.juniper.net This product includes the Envoy
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
How to Set Up SSL VPN for Off Campus Access to UC eresources
How to Set Up SSL VPN for Off Campus Access to UC eresources Contents How to Set Up SSL VPN for Off Campus Access to UC eresources... 1 Off Campus Access via SSL VPN... 2 SSL VPN (Secure Sockets Layer
Defender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
MultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4
Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Updated: May 31, 2011 Contents This document describes the Cisco AnyConnect Secure Mobility Client 2.4 for devices running Symbian.
INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu...
INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... 18 Updated: Juha Jokinen Page (1/18) INTRODUCTION This is a guide
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Dell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Contents. Introduction. Prerequisites. Requirements. Components Used
Contents Introduction Prerequisites Requirements Components Used Background Information Configure Step 1. Configure the Firepower User Agent for Single-Sign-On Step 2. Integrate the Firepower Management
Juniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
User Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
Windows Live Mail Setup Guide
Versions Addressed: Windows Live Mail 2011 Document Updated: 11/24/2010 Copyright 2010 Purpose: This document will assist the end user in configuring Windows Live Mail to access a POP3 email account hosted
Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client
Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client 22/07/2014 Dear Friends, This mailer helps you in understanding and configuring PPTP VPN of Matrix NAVAN CNX200 with Windows
Integration Guide. Duo Security Authentication
Integration Guide Duo Security Authentication Revised: 21 January 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration
SSL VPN Portal Options
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets
Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10
Pulse Policy Secure RADIUS Server Management Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved iii Pulse Secure, LLC 2700 Zanker Road,
Client applications are available for PC and Mac computers and ios and Android mobile devices. Internet
Introduction to OpenVPN 1 - Introduction to OpenVPN The AN-300-RT-4L2W router features a built-in OpenVPN server for secure, easily configured access to the network from the Internet using devices with
Integration Guide. Swivel Secure Authentication
Integration Guide Swivel Secure Authentication Revised: 21 February 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration
Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel
Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel This document describes the procedures required to configure an IPSec VPN tunnel between a WatchGuard SOHO or SOHO tc and a Check Point FireWall-1.
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
BEFORE YOU START... 1 Set Up Your PC Desktop Computer/Laptop... 1 Set Up Remote Desktop on Your ipad... 3
Quick Reference Guide Using Remote Desktop With Your ipad and PC This user guide is for users connecting their ipad to a PC computer or laptop. This user guide covers how to set up your ipad to connect
What is the Barracuda SSL VPN Server Agent?
The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
Two Factor Authentication in SonicOS
Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
SAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
Junos Pulse Release 3.0R1.1
Access Solutions Junos Pulse Release 3.0R1.1 Junos Pulse Build# 20017 Pulse Secure Access Build# 20761 Pulse Access Control Build# 19175 JWOS Build# 6.2R1 Juniper Networks, Inc. 1194 North Mathilda Avenue
Juniper Secure Analytics
Juniper Secure Analytics Vulnerability Manager User Guide Release 2014.2 Published: 2014-12-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide
Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox
How to Create a Basic VPN Connection in Panda GateDefender eseries
How to Create a Basic VPN Connection in Panda GateDefender eseries Support Documentation How-to guides for configuring VPNs with Panda GateDefender eseries Panda Security wants to ensure you get the most
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Using Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
The Barracuda Network Connector. System Requirements. Barracuda SSL VPN
Barracuda SSL VPN The Barracuda SSL VPN allows you to define and control the level of access that your external users have to specific resources inside your internal network. For users such as road warriors
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
