Access Control and Monitoring for Campus Computer Labs
|
|
|
- Oswin Gilbert
- 10 years ago
- Views:
Transcription
1 Best Practice Document Produced by the MARNET-led working group on network security and monitoring Author: V. Ajanovski (FCSE, UKIM) April 2015
2 GEANT Association, All rights reserved. Document No: GN3plus-NA3-T2-CBPD MA1 Version / date: Version 1.0 / April 2015 Original language : English Original title: Access control and monitoring for campus computer labs Original version / date: Version 0.1 / November 2013 Contact: [email protected] MARnet bears responsibility for the content of the document. The work has been carried out by a MARnet led working group on Network Security and Monitoring at FCSE (Faculty of Computer Science and Engineering Skopje). Parts of the report may be freely copied, unaltered, provided that the original source is acknowledged and copyright preserved. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/ ) under grant agreement n , relating to the project 'Multi-Gigabit European Research and Education Network and Associated Services (GN3plus)'. ii
3 Table of Contents Executive Summary 1 1 Introduction 2 2 Use-cases and priorities 3 3 Use-case descriptions UC1: Admin Configures the monitoring and access control services UC2: Admin Defines new computer labs and new destinations UC3: Teacher Blocks all network access except to a chosen destination UC4: Teacher Activates recording of screen snapshots and running user processes UC5: Teacher Monitors all the students' screens at once UC6: Teacher Blocks network access to a list of destinations UC7: Teacher Monitors all students' processes at once UC8: Teacher Saves a snapshot of the activities of a student UC9: Teacher Saves a comparative snapshot across two students activities UC10: Teacher Prepares a set of computers for an exam UC11: Teacher Pulls all files from predefined locations from a list of computers UC12: Teacher Pushes a file to a predefined location on a list of computers UC13: Teacher Saves a video recording of student screen 10 4 Network architecture Initial architecture Proposed network architecture 12 5 Network access control Computer labs firewall FINKI-Firewall control application 14 iii
4 5.3 Network access profiles 15 6 Auditing of access to various services 16 7 Monitoring lab activities Recording services Screenshot service Info sending service Monitoring application Customising the application 19 8 Alternative solution for monitoring activities 21 References 22 Glossary 23 iv
5 Table of Figures Figure 2.1: Use-case diagram denoting all possibilities 3 Figure 4.1: Diagram of the usual network architecture employed per campuses 11 Figure 4.2: Diagram of the proposed network architecture to enable access control per computer lab 12 Figure 5.1: Screenshot of the FINKI-Firewall control application. 15 Figure 7.1: Screenshot of the Computer Lab Monitoring Application (*note that white places in the grid in the figure are computers that are not monitored.) 19 v
6 Executive Summary Computer labs at the universities are used in three general situations: practical demonstrations, individual work by students on projects and conducting exams. Depending on the special use-cases for each situation, different access permissions are required, different network setup is required, access to online resources should be permitted/denied, and in most situations such adjustments should be performed by the teacher, without any network administration knowledge and equipment access. This document should be considered as a reference and guide to possible simple solutions that can be used for such scenarios, based on many years of trials at computing departments within the Ss. Cyril and Methodius University, Skopje, Macedonia. The work is based on ideas from the current implementations at the Computer Labs of the Faculty of Computer Science and Engineering. Ideally, the whole solution is organised as a fully automated integrated information and control system building on top of several practices, tools and applications for network level access control and monitoring. In this document the design and organisational process development of such system is presented together with the tools that enable and ease the implementation of such process. Business-level use-cases are first presented, to understand the general level functional requirements that teachers and administrators place on the overall solution and further several non-functional requirements are discussed. Where the solution is not possible to be automated, a manual process is proposed. 1
7 1 Introduction Problem statement regarding access control The problem of affects the impact of which is a successful solution would be not being able to secure network access to specific destinations during classes and especially exams or to restrict network access fully. teachers in larger computer labs or in situations where the exams are being held online. playing games during classes and non-ethical conduct exchange of solutions during exams, plagiarism, etc. also network cables suffer because teachers that are not able to control network access via software, plug-out the cables from the computers. a system that enables the teacher to control and restrict the network access to specific destinations. Problem statement regarding observation The problem of affects the impact of which is a successful solution would be observing student activities during classes and exams. teachers in larger computer labs. increased amount of non-ethical conduct without being able to gather evidence to file a report. a system that enables the teacher to monitor students' activities and react on non-ethical conduct in a timely manner. 2
8 2 Use-cases and priorities Ideally, the solution would be completely automated and work as a part of an integrated information and control system, so this document is presented from the viewpoint of the design and development of such a system. Business-level use-cases are first presented, to understand the general level functional requirements and further several non-functional requirements are added. Where the solution cannot be automated, a manual process will be implemented for the same use-case scenario. Figure 2.1: Use-case diagram denoting all possibilities Must have: UC1: Admin Configures the monitoring and access control services. UC2: Admin Defines new computer labs and new destinations. UC3: Teacher Blocks all network access except to a chosen destination. UC4: Teacher Activates recording of snapshots of the computer screen and running user processes. UC5: Teacher Monitors all the students' screens at once. 3
9 Should have: UC6: Teacher Blocks network access to a list of destinations. UC7: Teacher Monitors all students' processes at once. UC8: Teacher Saves a snapshot of the activities of a student Could have: UC9: Teacher Saves a comparative snapshot across two students activities. Won't have (other use-cases): UC10: Teacher Prepares a set of computers for an exam. UC11: Teacher Pulls all files from predefined locations from a list of computers. UC12: Teacher Pushes a file to a predefined location on a list of computers. UC13: Teacher Saves a video recording of student screen. 4
10 3 Use-case descriptions The functional requirements, written in the form of use-cases, are given in the following paragraphs. 3.1 UC1: Admin Configures the monitoring and access control services 1. The admin access the monitoring service. 2. The admin configures the default timeouts for resetting the firewall rules in each computer lab. 3. The admin configures the scheduler for automatic invocation of the resetting process 3.2 UC2: Admin Defines new computer labs and new destinations At present, this use-case depends heavily on network configuration and connections, so the profiles necessary for new labs and new destinations cannot be created automatically. The administrator manually creates groups of firewall rules that can be applied in order to allow or block access, as needed by teachers. These rules are stored as pieces of source code and are included when choosing the destinations and type of access by the teacher. 3.3 UC3: Teacher Blocks all network access except to a chosen destination The teacher starts an exam or an activity in a lab, and depending on the exam requirements, allows access to only certain predefined network destinations (e.g. the course management server, e-testing server, code programming server, etc). All communication to other destinations originating from that computer lab are usually blocked. 1. The teacher access the labs access control system. 2. The teacher chooses the lab in question. 3. The teacher marks all the needed destinations. 5
11 4. The teacher sets a timeout period in minutes, after which the block is removed. 5. Firewall rules to allow access to each of the needed destinations are set up, and a follow-up rule to block all the other traffic originating from the chosen lab. 6. All teacher actions and choices are recorded in a log. 3.4 UC4: Teacher Activates recording of screen snapshots and running user processes The recorder is a hidden service running on each computer in a computer lab that records current activities and stores them on the file server, and it is setup to run during certain time periods. Whether it records activities and stores them locally, or stores activities on the file server, depends on the contents of a configuration file stored in a local path that is only accessible to administrators. When the teacher prepares a computer lab for exams/recording, this file is configured at each computer. 1. When scheduled, the recorder checks the contents of the local configuration file. 2. If instructed to not record, jump to the final step in this sequence. 3. If instructed to record, a screen snapshot is saved locally with a file listing the running processes. 4. If instructed to store locally, connection to the file server is checked and if still open it is closed. After that, jump to the final step. 5. If instructed to store on the file server, connection to the file server is checked and opened if necessary and the recorded files are copied on the server in a special location/filename for the specific lab and computer (for example: /snapshots/labname/computername-screen.png, /snapshots/labname/computername-processes.txt) 6. Reschedule the next execution based on the parameter in the configuration file. 3.5 UC5: Teacher Monitors all the students' screens at once The idea is to enable the teacher to view all the students screens at once, in a layout that corresponds to the physical layout of the computers in the room. This helps in observing how the students perform their assignments in general and how a pair of students sitting at neighbouring workstations collaborate. 1. The teacher accesses the lab s monitoring system. 6
12 2. The teacher chooses the lab to monitor. 3. The system displays a map of the layout of the room, with a thumbnail of the last saved screenshot from each computer in the lab in its place in the layout. 4. (Optionally) The teacher can click on a certain screen and start UC8: to view details of a selected student s computer. 5. (Optionally) The teacher can mark two computers and invoke UC9: to view a comparison of activities. 6. The system refreshes the display (go to step 3) if no activity from the teacher is detected in a certain configurable period. 3.6 UC6: Teacher Blocks network access to a list of destinations The teacher starts an exam or an activity in a lab, and depending on assignment requirements may wish to stop access to certain predefined network destinations (file management server,...). Communication to other destinations is allowed. 1. The teacher accesses the lab s access control system. 2. The teacher chooses the lab in question. 3. The teacher marks all the destinations to be blocked. 4. The teacher sets a timeout period in minutes, after which the block is removed. 5. Firewall rules to block access to each of the selected destinations are set up, and a follow up rule to allow all the other traffic originating from the chosen lab. 6. All teacher actions and choices are recorded in a log. 3.7 UC7: Teacher Monitors all students' processes at once 1. The teacher accesses the lab s monitoring system. 2. The teacher chooses the lab to monitor and clicks on tab processes. 3. The system displays a map of the layout of the room, with a small frame for each computer in the lab in its place in the layout. 4. Inside each computer s frame, the system presents the last-saved list of the executed processes. 7
13 5. The system refreshes the display (go to step 3) if no activity from the teacher is detected in a certain configurable period. 3.8 UC8: Teacher Saves a snapshot of the activities of a student This is an extension of UC5. 1. When in UC5, the teacher decides to view the current activities of a certain student in more detail; the thumbnail screenshot of the student's computer is clicked on. 2. The system presents a full-size image of the last-saved screenshot of the student s computer. 3. The system presents a list of the last-saved user-activated processes under the image. 4. The system shows the exact time of the last-saved information. 5. The teacher can choose to save the presented information as an off-line document, to be used as a record of how the student performed the assignment. 3.9 UC9: Teacher Saves a comparative snapshot across two students activities This is an extension of UC5. 1. When in UC5 the teacher decides to view activities in more detail and compare the current activities of a pair students, the checkmarks besides the screens are selected before selecting Compare. 2. The system splits the screen in two partitions. 3. The system invokes UC8 for each of the two selected computers, each in a separate part of the screen UC10: Teacher Prepares a set of computers for an exam 1. The teacher accesses the monitoring system. 2. The teacher chooses the computer lab in question. 8
14 3. The teacher chooses the predefined location for the students work (for example, directory "/exam"). 4. The teacher configures the frequency for taking screen and process snapshots by the monitoring system. 5. The system traverses all computers in the lab and clears the predefined location. 6. The system configures the scheduler for taking screen and process snapshots at the configured frequency UC11: Teacher Pulls all files from predefined locations from a list of computers 1. The teacher accesses the monitoring system. 2. The teacher chooses the computer lab in question. 3. The system traverses all computers in the selected lab, and packs all of the contents in a predefined configurable location at each computer (for example, the directory "/exam"). 4. The system puts all such packages in a specific location at the lab file server (for example, into the directory "/teacherusername/yyyy-mm-dd/labshortname"). 5. The system presents download links to the teacher UC12: Teacher Pushes a file to a predefined location on a list of computers 1. The teacher uploads a file to the file server, and records the link. 2. The teacher accesses the monitoring system. 3. The teacher chooses the computer lab in question. 4. The system traverses all computers in the selected lab, and copies the file from the link to a predefined configurable location at each computer (for example, the directory "/exam"). 9
15 3.13 UC13: Teacher Saves a video recording of student screen This functionality can be useful on some occasions, but requires additional processing and recording power, so it is not discussed in the first version of the document and proposed solutions. An alternative is to save snapshots every few seconds, so that a stop-motion video can be constructed. 10
16 4 Network architecture 4.1 Initial architecture Usually campuses employ a network architecture similar to the one shown in Figure 4.1. On the left is the network block with all computer labs, on the right is the publicly accessible servers block. All computer labs usually have a separate L2 switch that might be located in the room or in a network concentration point/rack/closet/room. On occasions L3 switches are used. In order to save assigned public IP address space and protect from direct outside attacks, the labs are usually behind a small router/firewall that uses NAT/PAT, which then joins them into the campus network. Sometimes, campuses isolate the labs in separate VLANs, if they have support for this in the upstream network and the main lab s router/firewall. Figure 4.1: Diagram of the usual network architecture employed per campuses There are several issues with the usual networking architecture, which prevent some of the use-cases we have as requirements: 11
17 If VLANs are not used per lab, computers from different labs can communicate with each other, and in this way there is no isolation of one lab from another which is important when having computer exams in one lab and having the other lab open for all students to use. In such a situation a student in the open lab can communicate and help another student taking an exam in the other lab. When having some specialised classes for example a course on Computer network design or a System services course the students in one lab can activate a DHCP server or create loops in the network or open other conflicting services with the rest of the infrastructure. The Course management system / e-testing system does not know the exact IP addresses of the users accessing it from computer labs, which might be crucial when there are exams and deadlines. All access control is a fixed configuration usually implemented as static access lists on the routers. Teachers cannot activate or deactivate certain networking services or control access to network resources on the outside. 4.2 Proposed network architecture Figure 4.2: Diagram of the proposed network architecture to enable access control per computer lab 12
18 This architecture is based on the following premises: The network is again split in two blocks o Inside a privately-addressed computer labs block, with a separate VLAN and IP class for each computer lab (coloured lines). o Outside publicly-addressed servers block (black lines). The Labs firewall that is based on Linux has the following responsibilities: o it is a static router among different parts of the computer labs block. o NAT/PAT hiding the inside network from the public internet. o Hosts a custom software solution for switching on/off access to various network destinations chosen by teachers. o DNS server for resolving the server names present in the inside block, so that all computers in the labs will get only an internal IP for them. Computer labs have a presence only in the inside block; each lab is in a separate VLAN. Some servers can have presence in both blocks, the reason is: o Computers in the labs should be able to access such servers even if Internet access is disabled. o The servers should know the address of each lab computer that is accessing it. Access from the inside block to the outside block is only via the Linux-based labs firewall. 13
19 5 Network access control 5.1 Computer labs firewall A Linux-based server is used for the purpose of a firewall, running the ClearOS distribution. It is setup on a virtual server, with many virtual interfaces connected to various parts of the network and the respective VLANs (as seen in Figure 4.2). This enables easier manipulation of the rules of the NAT and the router in order to achieve the described use-case scenarios, by modification of the ipchains tables. Although such configurations can be prepared and loaded manually by the administrator, a special application called Finki-Firewall ( can be used, to present an easy-to-use web interface accessible to all the teachers. With this application, teachers can introduce/remove some specific rules in the routing tables without any system administration skills or Linux knowledge. 5.2 FINKI-Firewall control application FINKI-Firewall is a Tapestry5-based Java web application created by Dragan Sahpaski for use at the Faculty of Computer Science and Engineering in Skopje. This applicaiton is intended to be used by teachers, enabling them to control and block network traffic in the computer labs. The application was originally created with a focus mostly on UC1 and UC3. Source: The application is under further development to integrate with the recording and monitoring services. The idea is simple: ready-made snippets of ipchains rules are defined in configuration files by the system administrator and depending on the choice made by teachers these rules are injected into the ipchains list and as such, modify the firewall behaviour to block or pass traffic from some sources to some destinations. These rules are called profiles and they are presented as simple choices for the teacher in the control application. 14
20 Figure 5.1: Screenshot of the FINKI-Firewall control application. 5.3 Network access profiles The application for network access control uses predefined profiles, that are in fact iptables script snippets and are defined in a JSON file. The following example shows a simple profile: {"name" : "Profile", "description" : "Access to SITE only", "iptables" : [ "iptables -I FORWARD -s ${ipclass} -j DROP", "iptables -I FORWARD -s ${ipclass} -d SITE.ADDRESS -j ACCEPT", "iptables -I FORWARD -s ${ipclass} -d DOMAIN.CONTR.INTERN.ADDR -j ACCEPT", "iptables -I FORWARD -s ${ipclass} -d MONITOR.SERVER.INTERN.ADDR -j ACCEPT", "iptables -I FORWARD -s ${ipclass} -d FW.INTERNAL ADDR -j ACCEPT" ]}, ${ipclass} is a variable in the script that the application changes to the class of IPs of the selected computer lab. The application is also customisable to support many computer labs, that are also configured inside a json file. Many such rule-sets can be prepared by the network administrator and system administrator of the labs firewall, and can be configured inside the JSON configuration file. One of the profiles is also the set of rules for unrestricted internet access that will change. When applying any profile, any previous rules are overwritten by new ones. 15
21 6 Auditing of access to various services The DNS server in the lab s firewall resolved the names of all services that have a presence in the inside block, so that request for resolution of such servers will result in a private IP address from the inside block. All servers are connected via trunk links, so that they have presence and IP address in all computer lab VLANs in the inside block. In that way it is ensured that: Access to any secured service from within the computer labs in the inside block, will be served by the server daemon (service) running on an internal IP address and will be logged by the relevant service as an access from an internal IP address of the exact lab computer, without hiding behind the NAT/PAT public address. Access to inside services will not get routed through the firewall, so will be faster. 16
22 7 Monitoring lab activities 7.1 Recording services There are two services that have to be installed on each computer in the classroom: Screenshot service it is started as each user is logged in, with the privileges of that user. Info sending service running with higher privileges as a system service. The reason for having two services are based on security restrictions. In general it is not allowed to directly access the screen of another operating system user. So, the service responsible for taking a screenshot has to run as the user itself. On the other hand, the information-sending service runs as a privileged user because it has to have configuration data for accessing remote services and has to have higher privileges to be able to extract some system information and send it to the monitoring server Screenshot service Initial code: It is a simple service, that when run by a desktop user, executes every 10 seconds and takes a screenshot and stores it to a file in a preconfigured location. The necessity to run as a user complicates configuration, since there has to be a wrapper service that will do the checking and controlling when and how the service runs. Such a setup is maintained with the help of the wrapper service software YAJSW (Yet Another Java Service Wrapper) which is generally used for wrapping all types of services and doing it in a platform-independent way (since it is based on Java). In this special circumstance it helps to detect a user has logged in, and to run the wrapped service in the logged-in user session Info sending service Initial code: This service can be run as a regular service and is intended to run as a normal user, unless some special system information is gathered that requires elevated privileges It runs every 10 seconds, records data about some system information (for example: logged-in username, cpu usage, temperature, list of processes) to a local file and uploads this file via SFTP to a 17
23 configured location. If the screen shot service is running it can also upload the file with the current screenshot via SFTP. This service takes the local files with local names, but uploads them to the remote location renamed to the names <computername>.txt and <computername>.jpg where <computername> is the recorded local computer name or host name. This might create a conflict if the same computer name is used in several domains and all use a single monitoring server and a single location, but this is a very rare circumstance and in such an occasion the code should be customised. This practice gives the possibility for easy monitoring of the activities in the classrooms even without a special monitoring software, and plug-ins can easily be built for many of the existing monitoring platforms. As best practice, we recommend the upload location to be inside the network (so as not to waist routing and firewall resources) and to be setup as a CHROOT-ed SFTP account. Otherwise, the network access profiles should always allow this traffic to pass through. 7.2 Monitoring application A simple application that was created by members of the FCSE can be used to help with monitoring student activities while doing assignments/exams. The tool is a web-based JSP application, so it requires any Java web application server to operate (FCSE uses Apache Tomcat). Initial code: It is up to the web administrator what kind of access protection to employ, and to what extent. In general access to the public should be prohibited. Only certified teachers should be able to access the application, and only for official purposes for teaching or exams. Otherwise, if misused and if the students are not properly informed, it might pose a major privacy concern. At the FCSE, this is set up with a consent form for students when logging onto computers, and the access is controlled via JASIG CAS (a single-sign on service, see where only specific teachers are allowed access to this application and view the students' activities. Because of privacy concerns, all the activities of the teacher are also logged for future inspection purposes. The web application analyses the recorded files on the capturing server and presents the latest screenshots of all the workstations in one computer lab in a simple layout that corresponds to the physical plan in the room. This is the main interface that teachers can use to monitor students activities. An example is shown in Figure 7.1 below. Computers that are not in use, or have been turned off for an extended period of time are marked with a special icon to indicate their status. 18
24 Figure 7.1: Screenshot of the Computer Lab Monitoring Application (*note that white places in the grid in the figure are computers that are not monitored.) The teacher can click on any screen in order to view details, and can observe the full screenshot, details on logged on user, process list executed by the user, etc. The application only shows the latest records, but a special configuration can be made, for example to have a history of last 10 records, which is beneficial for monitoring the results of assessments that are not just static screens but dynamic in nature. Since records are created every 10 seconds, this can span a time period of a minute and a half Customising the application The sources are given as templates, and being JSP files they can be easily modified even live in production, to tweak the layout to match the floor plan of any computer lab. This requires very basic HTML knowledge; for more advanced customisation, basic Java knowledge is required. The part of the file within the <!-- editable --> block defines the layout of the table of workstations (see image above). It is all HTML code (tables) and uses only the JSP tag <%=wks(computername)%> } to indicate that the application should generate a template for the computer workstation. 19
25 For example the following code creates a plan for this layout: Workstation 1 Workstation 2 Workstation 3 Workstation 4 Workstation 5 Workstation 6 Workstation 7 Workstation 8 <table> <tr> <td><%=wks("computernamewks1")%></td> <td><%=wks("computernamewks2")%></td> <td><%=wks("computernamewks3")%></td> <td><%=wks("computernamewks4")%></td> </tr> <tr> <td><%=wks("computernamewks5")%></td> <td><%=wks("computernamewks6")%></td> <td><%=wks("computernamewks7")%></td> <td><%=wks("computernamewks8")%></td> </tr> </table> 20
26 8 Alternative solution for monitoring activities italc - Intelligent Teaching And Learning with Computers ( is an opensource software that enables most of the monitoring and file-sharing scenarios described previously. On the other hand, it also has many more features that are superfluous to supporting the requested functionalities. There are many similar commercial and open-source solutions available, but this is one of the most advanced and open at the moment of writing. Being open-source, it enables the implementers with coding experience to program special customisations. So in general there are two possibilities: Disregard italc and create a minimal solution for monitoring and file-sharing that will enable only the requested functionalities, and nothing more, but that will tightly integrate the monitoring and access control facilities that are required Use the advanced features of italc and modify its behaviour in order to support all the requested functionalities for monitoring and file-sharing, as proposed. This will better integrate with the requested scenarios and integrate better with the other solution for access control facilities If the implementer has coding experience, both options are viable certainly for a startup prototype and to evaluate the usefulness of the whole solution. In order to help new implementers, FCSE provides a sample solution suitable, in the first case with minimal source codes and templates are working in certain typical scenarios (as used at the time of writing at the FCSE). After evaluation of a minimal prototype solution that is both easy to understand and simple to install, the implementer can further decide on which route to take. At FCSE steps were taken using the first of the two possibilities. 21
27 References [FINKI-Firewall] [ClearOS] [Tapestry5] [FCCAPPS] [CAS] [YAJSW] [italc] [Tomcat] ClearFoundation ClearOS Apache Tapestry 5 project Faculty of Computer Science and Engineering Computing Center Repository of open-source tools and small apps Apereo Foundation Central Authentication Service (known as JASIG CAS in the past) Yet Another Java Service Wrapper Intelligent Teaching And Learning with Computers Apache Tomcat 22
28 Glossary FCSE FINKI UC VLAN DHCP IP NAT PAT DNS JSON CHROOT HTML JSP CAS JASIG Faculty of Computer Science and Engineering, University Ss Cyril and Methodius, Skopje, Macedonia Acronym of the FCSE official name in Macedonian language Use-case Virtual Local Area Network Dynamic Host Configuration Protocol Internet Protocol (used as IP address) Network Address Translation Protocol Address Translation Domain Name System JavaScript Object Notation On the Unix operating systems, chroot is an operation that changes the apparent root directory for the current running process and its children Hyper Text Markup Language Java Server Pages Central Authentication Service, a single sign-on open-source software originally by JASIG, today Apereo. Java in Administration Special Interest Group 23
29
30 Complete BPDs are available at
Network Services Application to Controlling and Develop Institute Computer LABs
Network Services Application to Controlling and Develop Institute Computer LABs Majzoob Kamal Aldein Omer Abstract The research aims to develop a system that helps the use of computer labs devices in the
Cloud Implementation using OpenNebula
Cloud Implementation using OpenNebula Best Practice Document Produced by the MARnet-led working group on campus networking Authors: Vasko Sazdovski (FCSE/MARnet), Boro Jakimovski (FCSE/MARnet) April 2016
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Integration of Office 365 with existing faculty SSO
Integration of Office 365 with existing faculty Best Practice Document Produced by the MARnet-led working group on campus wireless infrastrucure and security Authors: Vasko Sazdovski (MARnet), Boro Jakimovski
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Installation of the On Site Server (OSS)
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
QuickStart Guide for Client Management. Version 8.7
QuickStart Guide for Client Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Installation and Configuration Guide
Installation and Configuration Guide Overview This document is designed to provide a quick installation and configuration guide for WinGate using the client NAT connection. WinGate Internet Gateway and
VMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....
Citrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
VPN Configuration Guide. Dell SonicWALL
VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
Installation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011
Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...
TABLE OF CONTENTS WELCOME TO EXCHANGE REPORTER PLUS... 4 CONTACT ZOHO CORP.... 5 GETTING STARTED... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OF EXCHANGE REPORTER PLUS... 9 HOW EXCHANGE REPORTER PLUS WORKS...
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Software Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
athenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011
Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Solution Overview... 3 Network Topology... 4 Network Configuration...
QuickStart Guide for Managing Computers. Version 9.2
QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
Web based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install:
Software V NO. 1.7 Date 9/06 ROI Configuration Guide Before you begin: Note: It is important before beginning to review all installation documentation and to complete the ROI Network checklist for the
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
VPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router
VPN Configuration Guide Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router 2014 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
Application Note Startup Tool - Getting Started Guide
Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Cisco Router and Security Device Manager (SDM)
Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
iboss Enterprise Deployment Guide iboss Web Filters
iboss Enterprise Deployment Guide iboss Web Filters Copyright Phantom Technologies, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer
Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer March 2014 Last updated: September 2015 (revisions) Table of Contents Abstract... 3 What We ll Cover...
Host Access Management and Security Server
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
Best Practices: Pass-Through w/bypass (Bridge Mode)
Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based
Microsoft 10969 - Active Directory Services with Windows Server
1800 ULEARN (853 276) www.ddls.com.au Microsoft 10969 - Active Directory Services with Windows Server Length 5 days Price $4070.00 (inc GST) Version B Overview Get hands-on instruction and practice administering
Automating Server Firewalls
Automating Server Firewalls With CloudPassage Halo Contents: About Halo Server Firewalls Implementing Firewall Policies Create and Assign a Firewall Policy Specify Firewall-Related Components Managing
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
NetPortal All your documents, direct to your iphone
Copyright Stratospherix 2010 Apple, the Apple logo, ipod, ipod touch, and itunes are trademarks of Apple Inc., registered in the U.S. and other countries. iphone is a trademark of Apple Inc. App Store
Parallels Plesk Automation. Customer s Guide. Parallels Plesk Automation 11.5
Parallels Plesk Automation Customer s Guide Parallels Plesk Automation 11.5 Last updated: 17 March 2015 Contents Quick Start with Hosting Panel 4 Set Up Your First Website... 4 1. Create Your Site... 5
Protecting the Home Network (Firewall)
Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
RackConnect User Guide
RackConnect User Guide Updated: November 8, 2011 RackConnect User Guide Page 2 of 15 DISCLAIMER This RackConnect User Guide (the Guide ) is for informational purposes only and is provided AS IS. The information
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
FileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning
VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning SonicOS Enhanced equinux AG and equinux USA, Inc. 2008 equinux USA, Inc. All rights reserved. Under the copyright laws, this
Provisioning Server Service Template
Provisioning Server Service Template Provisioning Server 7.1 Service Template Technology Preview for System Center - Virtual Machine Manager The Citrix Provisioning Server System Center - Virtual Machine
Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)
Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
W3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
Invest in your business with Ubuntu Advantage.
Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape
VPN Configuration Guide. Dealing with Identical Local and Remote Network Addresses
VPN Configuration Guide Dealing with Identical Local and Remote Network Addresses equinux AG and equinux USA, Inc. 2009 equinux USA, Inc. All rights reserved. Under the copyright laws, this manual may
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
VPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
6.0. Getting Started Guide
6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License
Meraki MX50 Hardware Installation Guide
Meraki MX50 Hardware Installation Guide January 2011 Copyright 2010, Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Copyright: 2010
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE
RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.
Installation and Configuration Manual
Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview
Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be
P-3202H-Bb. G-PON VoIP IAD DEFAULT LOGIN DETAILS. Firmware v1.0 Edition 1, 09/2009. IP Address: http://192.168.1.1. Password: 1234
P-3202H-Bb G-PON VoIP IAD Firmware v1.0 Edition 1, 09/2009 DEFAULT LOGIN DETAILS IP Address: http://192.168.1.1 User Name admin Password: 1234 Copyright 2009 Device Panels POWER PON ETHERNET 1~4 PHONE
