Monitoring Open VPN Access Server
|
|
|
- Deborah Miles
- 10 years ago
- Views:
Transcription
1 Monitoring Open VPN Access Server eg Enterprise v6
2 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or disclosed to others without the prior permission of eg Innovations Inc. eg Innovations Inc. makes no warranty of any kind with regard to the software and documentation, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Trademarks Microsoft Windows, Windows NT, Windows 2000, Windows 2003 and Windows 2008 are either registered trademarks or trademarks of Microsoft Corporation in United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Copyright 2014 eg Innovations Inc. All rights reserved.
3 Table of Contents MONITORING THE OPENVPN ACCESS SERVER Prerequisites for monitoring the Open VPN Access server The OpenVPN Service Layer OpenVPN Users Test OpenVPN User License Test OpenVPN User Details Test CONCLUSION... 11
4 Table of Figures Figure 1: The OpenVPN Access server topology... 2 Figure 2: Login to Putty... 3 Figure 3: The default user privileges... 4 Figure 4: Creating a new user with the default user privileges... 5 Figure 5: Creating a new user with limited user privileges required for monitoring the server... 6 Figure 6: The layer model of the OpenVPN Access server... 7 Figure 7: The s mapped to the OpenVPN Service layer... 7
5 Monitoring the OpenVPN Access Server OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, Linux, Android, and ios environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control. An OpenVPN Access Server deployment consists of one server, many clients and many users, as depicted in Figure 1. Each client machine in this topology uses the public IP network (the Internet) to communicate with the OpenVPN Access Server and thereby gains VPN-protected access to the private IP Network connected (if present). Figure 1: The OpenVPN Access server topology If adequate licenses are not available in the OpenVPN Access server, then the users will not be able to connect to the Private IP Network. Also sometimes, a particular user may hog the bandwidth of the network by transmitting/ receiving large chunks of data through the server. It is therefore imperative that the OpenVPN Access server is monitored periodically for assessing the license utilization and the user details. 2
6 1.1 Prerequisites for monitoring the Open VPN Access server To monitor the Open VPN Access server, you should provide certain user privileges that are required to execute the commands for monitoring the Open VPN Access server. To provide the user with the necessary privileges, do the following: 1. Login to the Open VPN Access server host through putty.exe. Figure 2: Login to Putty 2. Upon logging in, navigate to the /etc/sudoers file of the Open VPN Access server. By default, certain user privileges are required to execute the commands for monitoring the Open VPN Access server. The default user privileges to the server will be ALL (see Figure 3). 3
7 Figure 3: The default user privileges 3. If the target environment does not allow the eg Enterprise suite to use the default user for monitoring, then you need to create a new user with the default user privileges. You can do so by including the new user below the default user available under the User privilege specification section (see Figure 3). If you wish to create a new user for e.g., eguser with the default user privileges, then do so as shown in Figure 4. 4
8 Figure 4: Creating a new user with the default user privileges By providing the default user privileges, eguser acquires the entire monitoring rights of the Open VPN Access server. 4. If the administrator of the target environment does not wish to provide the default user privileges to the eguser, then you can limit the user privileges to monitor only the s that need to be executed by the eg Enterprise suite. To do so, specify the following command (see Figure 5). eguser ALL=(ALL:ALL) NOPASSWD:/usr/local/openvpn_as/scripts/sacli VPNSummary,/usr/local/openvpn_as/scripts/sacli VPNStatus 5
9 Figure 5: Creating a new user with limited user privileges required for monitoring the server 5. Once the necessary user privileges are provided, the target Open VPN Access server is ready for monitoring by the eg Enterprise suite. eg Enterprise has designed a specialized OpenVPN Access server monitoring model (see Figure 6), which periodically monitors the server and reports the administrators with effective pointers to the utilization of the licenses, and the users who are currently connected to the server and their data transmission. The following queries too can be easily clarified by monitoring the server: How many users are actually connected to the OpenVPN Access server? Are there adequate licenses available for users? If so, How many are available totally and how many are left for users in future? How long has a user been active over the network through the OpenVPN Access server? Which user is hogging the bandwidth of the network when data is transmitted/received? 6
10 Figure 6: The layer model of the OpenVPN Access server Since the s pertaining to the Operating System, Network, TCP and Application Processes layer of the OpenVPN Access Server model have been dealt with in the Monitoring Unix and Windows Servers document, Section 1.2 focuses on the OpenVPN Service layer. 1.2 The OpenVPN Service Layer This layer tracks the number of users who are concurrently connected to the server, the license utilization of the server, the time duration for which a user was active and the amount of data that is transmitted/received by the user. Figure 7 lists the s that are currently mapped to the OpenVPN Service layer. Figure 7: The s mapped to the OpenVPN Service layer OpenVPN Users Test Administrators may constantly wish to be alerted on the number of users who are currently connected to the OpenVPN Access server so that they can monitor the user login patterns at any given time. The OpenVPN Users exactly does the same! This continuosly tracks the number of users who are currently connected to the server so that the administrator can rapidly detect a sudden surge in the number of users connecting to the server. Purpose Target of the Agent deploying the Continuously tracks the number of users who are currently connected to the server An OpenVPN Access Server An internal/remote agent 7
11 Configurable parameters for the 1. TEST PERIOD - How often should the be executed 2. HOST The host for which the is to be configured. 3. PORT The port at which the specified host listens. By default, this is NULL. 4. Outputs of the Measurements made by the One set of results for the OpenVPN Access server that is to be monitored Active users: Measurement Indicates the number of users who are currently connected to the server. Measurement Unit Number Interpretation An abnormally high value for this measure indicates a malicious attack on the server which is a cause of concern OpenVPN User License Test A license is always required for the OpenVPN Access server installation. It can either be a free license or a purchased license. Once the server is installed, each license carries a maximum number of concurrent users who will be able to connect to the server. Depending on the number of users connecting to the OpenVPN Access servers, multiple licenses can be obtained. In case of purchased licenses, the maximum number of concurrent user count is additive and in the case of free licenses, the user count is not additive. If multiple free licenses are activated, then the user count will be the maximum of the individual user counts for each free license. Administrators may constantly need to track the utilization and availability of the licenses so that end user experience in connecting to the OpenVPN Access server would not be affected at all! This is where the OpenVPN User License helps! This monitors how well the licenses are managed by the OpenVPN Access server. This way, the administrators can figure out from a single glance the total number of licenses, the licenses that are already exhausted and the licenses that are available for future use. Purpose Target of the Agent deploying the Configurable parameters for the Monitors how well the licenses are managed by the OpenVPN Access server. An OpenVPN Access server An internal/remote agent 1. TEST PERIOD - How often should the be executed 2. HOST The host for which the is to be configured. 3. PORT The port at which the specified HOST listens. By default, this is NULL. 4. Outputs of the Measurements made by the One set of results for the OpenVPN Access server that is to be monitored Measurement Measurement Unit Interpretation 8
12 Total licenses: Indicates the total number of licenses that are available for this server. Number The value of this measure is the sum of the Licenses used and the Available licenses measure. Licenses used: Indicates the number of licenses that are currently in use. Available licenses: Indicates the number of licenses that are currently available for use. Number Number If the Licenses used measure is equal to the Total licenses measure, then the Available licenses measure would be 0 which clearly indicates that all the licenses are already exhausted. This would terribly affect the user experience with the OpenVPN Access server. Therefore, administrators may want to be alerted when the Licenses used measure reaches close to the Total licenses, so that they may marginally increase the number of licenses. 9
13 1.2.3 OpenVPN User Details Test In secure environments where users connect to the target IP network through the OpenVPN Access server, administrators may want to figure out the duration of the time a user has spent over the network accessing the network resources. Similarly, administrators may also want to monitor the data transmission for each user through the server so that they can figure out the user who has hogged the bandwidth limit of the network while transmitting/receiving the maximum amount of data. This is where the OpenVPN User Details helps! For each user accessing the OpenVPN Access server, this monitors the data transmitted and received by the user while accessing the resources of the network through the OpenVPN Access server and the time duration for which the user was active on the network. This way, administrators can figure out the user who has been very active over a period of time! Purpose Target of the Agent deploying the Configurable parameters for the For each user accessing the OpenVPN Access server, this monitors the data transmitted and received by the user while accessing the resources of the network through the OpenVPN Access server and the time duration for which the user was active on the network An OpenVPN Access server An internal/remote agent 1. TEST PERIOD - How often should the be executed 2. HOST The host for which the is to be configured. 3. PORT The port at which the specified HOST listens. By default, this is NULL. Outputs of the Measurements made by the One set of results for each user of the OpenVPN Access server that is to be monitored Measurement Data transmitted: Indicates the amount of data transmitted by this user. Data received: Indicates the amount of data received by this user. Measurement Unit KB KB Interpretation Comparing the value of these measures across the users helps you in identifying the VPN user who is hogging the bandwidth of the network by transmitting/receiving the maximum amount of data. Active session duration: Indicates the time duration for which this user was active. Mins Comparing the value of this measure across the users reveals the most active user on the server. 10
14 C o n c l u s i o n Conclusion This document has described in detail the monitoring paradigm used and the measurement capabilities of the eg Enterprise suite of products with respect to the OpenVPN Access server. For details of how to administer and use the eg Enterprise suite of products, refer to the user manuals. We will be adding new measurement capabilities into the future versions of the eg Enterprise suite. If you can identify new capabilities that you would like us to incorporate in the eg Enterprise suite of products, please contact [email protected]. We look forward to your support and cooperation. Any feedback regarding this manual or any other aspects of the eg Enterprise suite can be forwarded to [email protected]. 11
Monitoring Nginx Server
Monitoring Nginx Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Configuring and Monitoring SharePoint Servers
Configuring and Monitoring SharePoint Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
How To Configure A Microsoft Virtual Server 2005 2005 On A Microsoul.Com (Windows) 2005 (Windows 2005) (Windows Vvirtual) (Powerpoint) (Msof) (Evil) (Microsoul) (Amd
Configuring and Monitoring Virtual Server 2005 eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Configuring and Monitoring SNMP Generic Servers. eg Enterprise v5.6
Configuring and Monitoring SNMP Generic Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Monitoring the NTP Server. eg Enterprise v6.0
Monitoring the NTP Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Configuring and Monitoring FTP Servers
Configuring and Monitoring FTP Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
Monitoring DoubleTake Availability
Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6
EMC Configuring Clariion and SAN and Monitoring Monitoring storage an system EMC an eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 Restricted Rights Legend The information contained
Configuring and Monitoring Event Logs
Configuring and Monitoring Event Logs eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
Configuring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
Monitoring IBM HMC Server. eg Enterprise v6
Monitoring IBM HMC Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6
Configuring and Monitoring Citrix Access Gateway-Linux Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice.
Configuring and Monitoring the Xen Desktop Broker. eg Enterprise v5.6
Configuring and Monitoring the Xen Desktop Broker eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Configuring and Monitoring HP EVA StorageWorks Array
Configuring and Monitoring HP EVA StorageWorks Array eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
Configuring and Monitoring SiteMinder Policy Servers
Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
Monitoring QNAP NAS system
Monitoring QNAP NAS system eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Monitoring the HP Blade Servers
Monitoring the HP Blade Servers eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
Configuring and Monitoring Bluecoat AntiVirus
Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Monitoring Symantec Backup Server. eg Enterprise v6
Monitoring Symantec Backup Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
Monitoring MSDynamix CRM 2011
Monitoring MSDynamix CRM 2011 eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
Configuring and Monitoring Hitachi SAN Servers
Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Monitoring the Citrix Provisioning Server. eg Enterprise v6.0
Monitoring the Citrix Provisioning Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
Configuring and Monitoring the Client Desktop Component
Configuring and Monitoring the Client Desktop Component eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
Monitoring App V eg Enterprise v6
Monitoring App V eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or
Microsoft Dynamics NAV
Microsoft Dynamics NAV eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Monitoring Network Elements
Monitoring Network Elements eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
Configuring and Monitoring Database Servers
Configuring and Monitoring Database Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Monitoring XenApp Server v7 (and above)
Monitoring XenApp Server v7 (and above) eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
Veeam Task Manager for Hyper-V
Veeam Task Manager for Hyper-V Version 1.0 User Guide July, 2014 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Monitoring the BlackBerry Enterprise Server
Monitoring the BlackBerry Enterprise Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Dell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.
simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.com Legal Notices Simplify Monitoring s Configuration for Citrix
Monitoring the Oracle VDI Broker. eg Enterprise v6
Monitoring the Oracle VDI Broker eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
CA APM Cloud Monitor. Scripting Guide. Release 8.2
CA APM Cloud Monitor Scripting Guide Release 8.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Installation and Administration Guide
Installation and Administration Guide BlackBerry Collaboration Service Version 12.1 Published: 2015-02-25 SWD-20150225135812271 Contents About this guide... 5 Planning a BlackBerry Collaboration Service
5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
NetIQ Privileged User Manager
NetIQ Privileged User Manager Performance and Sizing Guidelines March 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0
Parallels Plesk Panel VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide Revision 1.0 Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Configuring and Monitoring Citrix Environments
Configuring and Monitoring Citrix Environments eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Monitoring Siebel Enterprise
Monitoring Siebel Enterprise eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
MS Skype for Business and Lync. Integration Guide
MS Skype for Business and Lync Integration Guide June 03, 2016 Contents Introduction 4 How to use StarLeaf with Microsoft Skype for Business 2015 Server 5 Pre-requisites 5 Step One: Federate between the
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4
Monitoring the Oracle VM Server
Monitoring the Oracle VM Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX,
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
Goliath Performance Monitor Prerequisites v11.6
v11.6 Are You Ready to Install? Use our pre-installation checklist below to make sure all items are in place before beginning the installation process. For further explanation, please read the official
Monitoring Quality Virtual Desktop
Monitoring Quality Virtual Desktop eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
Flexible Routing and Load Control on Back-End Servers. Controlling the Request Load and Quality of Service
ORACLE TRAFFIC DIRECTOR KEY FEATURES AND BENEFITS KEY FEATURES AND BENEFITS FAST, RELIABLE, EASY-TO-USE, SECURE, AND SCALABLE LOAD BALANCER [O.SIDEBAR HEAD] KEY FEATURES Easy to install, configure, and
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide VMware NSX Last Modified: Friday, March 13, 2015 Event Source Product Information: Vendor: VMware Event Source: VMware NSX Version: 6.1.2 RSA
RealShot Manager Compression Server software
RealShot Manager Compression Server software User Guide Software Version 1.0 RealShot Manager 2004 Sony Corporation Copyright Notice 2004 Sony Corporation. All rights reserved. This manual may not be reproduced,
Course Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion.
Key Data Course #: 2553A Number of Days: 3 Format: Instructor-Led This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and
CA Unified Infrastructure Management
CA Unified Infrastructure Management Probe Guide for IIS Server Monitoring iis v1.7 series Copyright Notice This online help system (the "System") is for your informational purposes only and is subject
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
SANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0
Avaya Solution & Interoperability Test Lab Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0 Abstract These Application Notes describes a procedure for
CA Nimsoft Monitor. Probe Guide for IIS Server Monitoring. iis v1.5 series
CA Nimsoft Monitor Probe Guide for IIS Server Monitoring iis v1.5 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and
CA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
CA Workload Automation Agent for Microsoft SQL Server
CA Workload Automation Agent for Microsoft SQL Server Release Notes r11.3.1, Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
2X HTML5 Gateway v10.6
2X HTML5 Gateway v10.6 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series
CA Nimsoft Monitor Probe Guide for URL Endpoint Response Monitoring url_response v4.1 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject
Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
How To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
SWsoft, Inc. Plesk VPN. Administrator's Guide. Plesk 7.5 Reloaded
SWsoft, Inc. Plesk VPN Administrator's Guide Plesk 7.5 Reloaded (c) 1999-2004 ISBN: N/A SWsoft Inc 13800 Coppermine Drive Suite 112 Herndon VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright
Privileged Account Access Management: Why Sudo Is No Longer Enough
Access Control Excellence Privileged Account Access Management: Why Sudo Is No Longer Enough The new privileged access management solutions available on the market today provide highly efficient and effective
An Oracle White Paper September 2013. Oracle WebLogic Server 12c on Microsoft Windows Azure
An Oracle White Paper September 2013 Oracle WebLogic Server 12c on Microsoft Windows Azure Table of Contents Introduction... 1 Getting Started: Creating a Single Virtual Machine... 2 Before You Begin...
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003
Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...
Installing the SSL Client for Linux
Linux Install Installing the SSL Client for Linux SSLLinux201502-01 Global Technology Associates 3361 Rouse Road, Suite 240 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected]
CA Cloud Service Delivery Platform
CA Cloud Service Delivery Platform Customer Onboarding Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation
TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
CA Nimsoft Monitor Snap
CA Nimsoft Monitor Snap Configuration Guide for IIS Server Monitoring iis v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change
Navigate v1.0.70 Installation & Configuration Notes
Navigate v1.0.70 Installation & Configuration Notes WARNING: When upgrading Navigate IP Softphone/Phone Partner to v1.0.70 the following SpliceCom system components must also be simultaneously upgraded
Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3.
Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0 Table of Contents Lab 1: Configuring and Managing WSS 3.0 1 Information in this document, including URL and other Internet
Integrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without
Centrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet
Data sheet HP Intelligent Management Center Enterprise Software Platform Key features Highly flexible and scalable deployment options Powerful administration control Rich resource management Detailed performance
Sophos UTM. Remote Access via SSL Configuring Remote Client
Sophos UTM Remote Access via SSL Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
BMC Performance Manager Windows Security White Paper DCOM / WMI
BMC Performance Manager Windows Security White Paper DCOM / WMI Problem The IT department delivers user IT services to their internal and external customers. The IT department wants to maintain control
GTA SSL Client & Browser Configuration
GB-OS Version 6.1 GTA SSL Client & Browser Configuration SSL201203-02 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected]
CA Nimsoft Monitor. Probe Guide for Performance Collector. perfmon v1.5 series
CA Nimsoft Monitor Probe Guide for Performance Collector perfmon v1.5 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject
