Using the XMLA connector with proxies and SSL
|
|
|
- Colin Parks
- 9 years ago
- Views:
Transcription
1 Technical Note: Using the XMLA connector with proxies and SSL Revision History: Version Author Details Laurentiu Iordache Created this document Page 1 of 8
2 Table of Contents Introduction... 3 XMLA Connector and proxies... 4 HTTP vs HTTPS... 5 Proxy Bypass... 6 Automatic configuration... 7 Authoritative Proxy... 7 SSL Support... 8 Page 2 of 8
3 Introduction This document details the usage of the XMLA Connector in conjunction with proxies. It also details SSL specific topics. Page 3 of 8
4 XMLA Connector and proxies The XMLA Connector is designed to automatically detect proxies. From the Windows perspective, the proxy settings are accessed from Control Panel by clicking Network and Internet and then Internet Options. In the dialog box that pops-up go to the Connections tab. On the bottom right of the tab click on LAN settings and the following dialog appears: Fig. 1 This example shows a system configured to use a proxy on :80. It also bypasses server for local addresses. Clicking on advanced will produce a popup like the one in the next figure: Fig. 2 Page 4 of 8
5 The configuration in the previous figure shows the system using the same proxy for all protocols. It also shows an exclusion list for the loopback address and From the perspective of the XMLA Connector only HTTP and Secure ports are used. The FTP and Secure proxies are ignored. Apart from this all the remaining settings have an effect to the functionality of the provider. The usage of a proxy server is a combination between the parameters aforementioned and the location, as it is typed in the Location text input when creating a new Connection. An example is given below: Fig. 3 HTTP vs HTTPS By default the provider tries to connect to the server using http. Using an http prefix is optional. With respect to the figure above, the address :8081 is equivalent to: In order to use SSL the address must be prefixed with For example, in the previous configuration, in order to connect using SSL he address should be: Page 5 of 8
6 Proxy Bypass There are a number of options to bypass the proxy as follows: 1. With the checkbox Bypass proxy server for local addresses active any address starting with an IP in the local network will not use the proxy. For Example: If the computer running Excel has the IP and the computer running the XMLA server has the IP , the address: will bypass the proxy. Similarly, the address will also bypass the proxy. However, if the XMLA server would have the IP (notice the different networks: /24 for the server and /24 for the client), then the address: will use the proxy as it is configured. 2. When the address is listed in the Exceptions (Fig. 2, in the bottom) list and the begging of the address matches the exception. For Example: If the Exceptions list contains the address then the address: :8080/mondrian/xmla will bypass the proxy. However the address :8080/mondrian/xmla will use the proxy as it starts in and not 3. For loopback addresses when <-loopback> is present in the Exceptions. For example: With the configuration as shown in Fig. 2 when the server runs on the same machine as the client. The address: will bypass the proxy. Similarly, an address as follows: will also bypass the proxy. Page 6 of 8
7 Automatic configuration With respect to Fig. 1, if Using automatic configuration script is checked then the provider will download and use the proxy auto-config file specified in Address. Using this option overrides all the other settings enumerated before. For details about PAC files read the following (for example). The current version of provider has support for interpreting the following specific functions Pos Function 1 isinnet 2 isplainhostname 3 dnsdomainis 4 shexpmatch 5 dnsresolve 6 myipaddress 7 isresolvable Authoritative Proxy This feature allows bypassing the entire Windows configuration with respect to proxy. In order to enable this the following key should be present in the registry: [HKEY_CURRENT_USER\Software\Arquery\ODBO] Under this key a string value as follows control the proxy override: Name AUTHORITATIVE_PROXY Value address:port The figure below shows the system configured for a proxy on listening on port 80: Fig. 4 Page 7 of 8
8 SSL Support The XMLA Connector works seamless with SSL servers. Prefixing the server address with will switch to SSL communication. By default, the connector does validate the server certificate. This means that self-signed certificates will be rejected. In order to bypass the validation and allow working with self-signed server certificate the following key should be present in the registry: [HKEY_CURRENT_USER\Software\Arquery\ODBO] Under this key a DWORD value as follows controls the proxy override: Name Value SOAP_SSL_SKIP_HOST_CHECK 1 Write here any value different of 0 to bypass the validation. Check the next figure for an example: Fig. 5 Please note: Disabling server validation exposes the client to man in the middle attacks. This feature should be used with care. The recommended way of working with a given self-signed certificate is the following option: An alternate way of using a self-signed certificate is by importing it in the Windows certificate store. For details about importing a certificate read here: The provider honors the trust exactly as it is honored by Windows. With respect to trusted Root CA the provider implements a mixed model: The most common CA certificated are preregistered with the provider. In addition to this the provider registers all the certificates on the Windows Trusted Root Certificate Authorities list. Page 8 of 8
PAC File Best Practices with Web Security Gateway and Web Security Gateway Anywhere
PAC File Best Practices with Web Security Gateway and Web Security Gateway Anywhere PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x This article examines Proxy Auto-Configuration (PAC)
Configuring Network Load Balancing with Cerberus FTP Server
Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012
Windows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Apache JMeter HTTP(S) Test Script Recorder
Apache JMeter HTTP(S) Test Script Recorder This tutorial attempts to explain the exact steps for recording HTTP/HTTPS. For those new to JMeter, one easy way to create a test plan is to use the Recorder.
What s new in ProactiveWatch 2.1!
What s new in ProactiveWatch 2.1! 1. ProactiveWatch 2.1 brings tighter integration with the RemoteCommand (FreeMyIT) system, providing new Task Manager -like features available from Manage Computers, including
Validating Digital Signatures in Adobe
Validating Digital Signatures in Adobe Table of Contents Validating Digital Signatures in Adobe...1 1. Validate the Signature using Windows Integration...3 2. Add the Root Certificate on Adobe Trusted
How-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx
Securepoint Security System Version 2007nx HTTP proxy authentication with radius to a Windows 2003 server The Remote Authentication Dial-In User Service (RADIUS) is a client-server-protocol which is used
1 OVERVIEW... 1 2 IUCLID SERVER CONFIGURATION... 2 3 IUCLID CLIENT CONFIGURATION... 3 4 PERSPECTIVE... 4 5 RESTRICTIONS... 6
Table of Contents 1 OVERVIEW... 1 2 IUCLID SERVER CONFIGURATION... 2 3 IUCLID CLIENT CONFIGURATION... 3 4 PERSPECTIVE... 4 5 RESTRICTIONS... 6 1 Overview If the IUCLID client pc and the IUCLID server pc
Prerequisites. Creating Profiles
Prerequisites Make sure you have the following prerequisites completed: Determine what the FQDN will be and what virtual IP Address will be used. Add the FQDN and virtual IP into your company's DNS. Create
Setup Guide for Exchange Server
Setup Guide for Exchange Server Table of Contents Overview... 1 A. Exchange Server 2007/2010 Inbound Mail... 2 B. Exchange Server 2007/2010 Outbound Mail (optional)... 8 C. Exchange Server 2003/2000 Inbound
App Orchestration 2.5
App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
SBBWU PROXY SETTING IT CENTRE How to Set a Proxy Server in All Major Internet Browsers for Windows
SBBWU PROXY SETTING IT CENTRE How to Set a Proxy Server in All Major Internet Browsers for Windows If you take your laptop to lots of places, including corporate networks that use proxy servers, you need
Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide
Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5
Installation Procedure SSL Certificates in IIS 7
Installation Procedure SSL Certificates in IIS 7 This document will explain the creation and installation procedures for enabling an IIS website to use Secure Socket Layer (SSL). Check IIS for existing
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
TELNET CLIENT 5.11 SSH SUPPORT
TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet
Guide to Setting up Internet Connection Sharing for Windows
Guide to Setting up Internet Connection Sharing for Windows Document Date: December 20, 2005 Document Version: Version: 1.0 Disclaimer: Please note that this document is provided on an as is where is basis
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
NAS 224 Remote Access Manual Configuration
NAS 224 Remote Access Manual Configuration Connect to your ASUSTOR NAS through the Internet A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Configure
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
Outlook Web Access Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate
Outlook Web Access Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate Copyright. All rights reserved. Trustis Limited Building 273 New Greenham Park Greenham Common Thatcham
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
PULSE. Pulse for Windows Phone Quick Start Guide. Release Published Date
PULSE Pulse for Windows Phone Quick Start Guide Release Published Date 1.0 July 2015 Contents PART 1 Pulse for Windows Phone 4 CHAPTER 1 5 Introducing Pulse for Windows Phone 5 Pulse for Windows Phone
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014
S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: October 08, 2014 Installing the Online Responder service... 1 Preparing the environment...
How to recover IE Client
HIKVISION EUROPE B.V. How to recover IE Client (WebClientActiveX Control) Name: WebClientActiveX Control Publisher: HANGZHOU HIKVISION DIGITAL TECHNOLOGY CO.,LTD. Type: ActiveX Control Version: 2.4.0.56
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
Cyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
GUIDE for Authentication
Web Filter USER GUIDE for Authentication Release 4.0.00 Manual Version 1.01 ii M86 SECURITY USER GUIDE M86 WEB FILTER AUTHENTICATION USER GUIDE 2010 M86 Security All rights reserved. Version 1.01, published
FTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
The PostBase Connectivity Wizard
The PostBase Connectivity Wizard The PostBase Connectivity Wizard allows you to easily set up your PostBase postage machine to suit your organization s arrangements. This document will guide you through
Virtual Server in SP883
Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
ICONICS Using the Azure Cloud Connector
Description: Guide to use the Azure Cloud Connector General Requirement: Valid account for Azure, including Cloud Service, SQL Azure and Azure Storage. Introduction Cloud Connector is a FrameWorX Server
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Designing and implementing effective PAC file solutions
Designing and implementing effective PAC file solutions Copyright 2006 ScanSafe. All Rights Reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced
UBS KeyLink Quick reference WEB Installation Guide
ab UBS KeyLink Quick reference WEB Installation Guide Table of contents 1. Introduction 3 1.1. Why is an Installation needed? 3 1.2. Is UBS KeyLink secure? 3 1.3. Information about Secure Sockets Layer
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE
Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE A comprehensive excerpt from Jeff Schertz s Lync Server MVP Blog Lync Web Services Load Balancing with KEMP VLM This article addresses a standard DNS Load Balanced
Using Microsoft Internet Explorer 6 (Windows 2000/ Windows XP/ Windows Server 2003)
Security Alert Dialog Box When installing the program with SSL selected, a Windows security alert dialog box may appear each time you open Internet Explorer. This section describes how to prevent the display
Microsoft Exchange Mailbox Email Software Setup Guide
Microsoft Exchange Mailbox Email Software Setup Guide Microsoft Exchange Mailbox Setup Guide Setting up a Microsoft Exchange mailbox only takes a few minutes. You can set up any email software to send
Steps to be taken when you are unable to get the license in Tally.ERP 9
Steps to be taken when you are unable to get the license in Tally.ERP 9 What is this document about? This document will guide you through step by step troubleshooting process when Tally.ERP 9 starts up
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
EyeSoft Quick Setup Guide For latest software update / manual, please see www.bikal.co.uk/support.html. Please see Manual for detailed instructions.
EyeSoft Quick Setup Guide For latest software update / manual, please see www.bikal.co.uk/support.html. Please see Manual for detailed instructions. How-to: Connect to a capture card or USB-Webcam How-to:
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer
SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort
Knowledgebase Article
How to detect Internet Explorer version using Custom Scan Company web site: Support email: Support telephone: +44 20 3287-7651 +1 646 233-1163 2 The Internet Explorer application is not
Configure Managed File Transfer Endpoints
Configure Managed File Transfer Endpoints 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Talk-101 User Guides Web Content Filter Administration
Talk-101 User Guides Web Content Filter Administration Contents Contents... 2 Accessing the Control Panel... 3 Proxy User Management... 4 Adding a new Proxy User... 5 Modifying an existing Proxy User...
Certificate Management for your ICE Server
Certificate Management for your ICE Server Version 2.23.301 Contact: [email protected] +1-613-591-9002 x3000 TRADEMARKS InGenius, InGenius Connector Enterprise and the InGenius logo are trademarks of
Asia Web Services Ltd. (vpshosting.com.hk)
. (vpshosting.com.hk) Getting Started guide for VPS Published: July 2011 Copyright 2011 Table of Contents Page I. Introduction to VPS 3 II. Accessing Plesk control panel 4 III. Adding your domain in Plesk
PART 1 CONFIGURATION 1.1 Installing Dashboard Software Dashboardxxx.exe Administration Rights Prerequisite Wizard
Omega Dashboard 1 PART 1 CONFIGURATION 1.1 Installing Dashboard Software Find the Dashboardxxx.exe in the accompanying CD or on the web. Double click that to install it. The setup process is typical to
NAS 109 Using NAS with Linux
NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on
Configuring the NetBackup 7.7 Cloud Connector for use with StorReduce
Configuring the NetBackup 7.7 Cloud Connector for use with StorReduce Introduction This document explains how to configure the NetBackup 7.7 Cloud Connector to work with StorReduce. Prerequisites A functioning
HTTP Reverse Proxy Scenarios
Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information
1 Requirements. 2 Configuration. Axis-compatible Camera Application Integration. www.exacq.com
Requirements The purpose of this integration guide is to explain how to install and set up an Axis-compatible application that can be integrated with an exacqvision VMS system. This guide focuses on serial
Setup Instructions for Secure Hummingbird FTP
Setup Instructions for Secure Hummingbird is the terminal emulation software that allows users to connect their pc to the mainframe in a secure environment. For example, this allows users to connect to
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
Install and Configure Oracle Outlook Connector
Install and Configure Oracle Outlook Connector To install and configure Oracle Outlook Connector for Outlook to send and receive e-mail and to access your TechTime TM calendar, do the following. 1. Run
How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950
How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950 Requirements Windows Server 2008, or Windows Vista SP1 Local Certificate (a online CA server on the Internet is required for some situation
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
ECA IIS Instructions. January 2005
ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
DAP Proxy Server Configuration. Technical Note
DAP Proxy Server Configuration Technical Note The software described in this manual is furnished under license and may only be used or copied in accordance with the terms of the license. Manual release
To Configure Network Connect, We need to follow the steps below:
Network Connect Abstract: The Network Connect (NC) provides a clientless VPN user experience, serving as an additional remote access mechanism to corporate resources using an IVE appliance. This feature
Email client configuration guide. Business Email
Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server
www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3
800 782 3762 www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3 Contents 1 INTRODUCTION... 2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION... 3 2.1 Supported
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
How to Migrate to MailEnable using the Migration Console
How to Migrate to MailEnable using the Migration Console Contents 1. OVERVIEW... 2 2. MAILENABLE MIGRATION CONSOLE... 2 3. SELECT THE MIGRATION APPROACH... 2 Server Migration... 2 Domain Migration... 3
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
How to Use Certificates for Additional Security
Global VPN Client How to Use Certificates for Additional Security The usage of certificates is not a subject one should not think of lightly. There are multiple ways to implement certificates for additional
etoken Enterprise For: SSL SSL with etoken
etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the
Configuring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Global Protect SSL VPN Overview This document gives you an overview on how to configure
Smart Policy - Web Collector. Version 1.1
Smart Policy - Web Collector Version 1.1 Prepared by: "Vincent Le Toux" Date: 29/05/2014 1 Table of Contents Table of Contents Revision History Overview Requirements... 5 Overview... 5 Check that a certificate
Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console
Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring
Cyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
CA NetQoS Performance Center
CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,
