Endpoint Security VPN for Windows 32-bit/64-bit
|
|
|
- Shon Hall
- 10 years ago
- Views:
Transcription
1 Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011
2 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS and FAR TRADEMARKS: Refer to the Copyright page ( for a list of our trademarks. Refer to the Third Party copyright notices ( for a list of relevant copyrights and third-party licenses.
3 Important Information Latest Software We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks. Latest Documentation The latest version of this document is at: For additional technical information, visit the Check Point Support Center ( For more about this release, see the home page at the Check Point Support Center ( Revision History Date Description 13 September 2011 First release of this document Feedback Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments (mailto:[email protected]?subject=feedback on Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide).
4 Contents Important Information... 3 Introduction to Endpoint Security VPN... 5 The Installation Process... 5 Receiving an Automatic Upgrade... 5 Getting Started... 6 Defining a Site... 6 Basic Operations... 8 Connect Window... 8 Client Icon... 9 Understanding the Firewall... 9 Disabling the Firewall... 9 Compliance...10 Setting up the Client Configuring Proxy Settings...11 Secure Domain Logon...11 Configuring VPN...11 Changing the Site Authentication Scheme...12 Certificate Enrollment and Renewal...13 Importing a Certificate into the CAPI Store...13 Authenticating with PKCS#12 Certificate File...13 SecurID...14 Challenge-Response...14 Secure Authentication API (SAA)...14 Collecting Logs... 16
5 Chapter 1 Introduction to Endpoint Security VPN Endpoint Security VPN is a remote access client for easy, secure connectivity to corporate resources over the internet, through a VPN tunnel. In This Chapter The Installation Process 5 Receiving an Automatic Upgrade 5 The Installation Process Important - To install a Remote Access client on any version of Windows, you need Administrator permissions. Consult with your system administrator. To install a Remote Access client: 1. Log in to Windows with a user name that has Administrator permissions. 2. Get the installation package from your system administrator, and double-click the installation package. 3. Follow the installation wizard. Note - On Windows Vista and Windows 7, there may be a prompt to allow access, depending on the UAC settings. 4. If your administrator did not include a specified Remote Access client in the installation package, you are prompted to choose a product to install. Your administrator might have instructed you which client to install. The options are: Endpoint Security VPN Check Point Mobile for Windows SecuRemote After installation, the Client icon appears in the system tray notification area. 5. Double-click the Client icon. If you are prompted to define a site, make a site with the IP address that your system administrator gave you. Receiving an Automatic Upgrade If you have a Check Point VPN Client, when you connect to a site you might receive an automatic upgrade to the latest version of Remote Access Clients. Follow instructions to complete the upgrade. Depending on the settings set by your administrator, you might not need to do anything. When you open your client from the client icon, you will see that it has a new name and looks different. Page 5
6 Chapter 2 Getting Started In This Chapter Defining a Site 6 Basic Operations 8 Connect Window 8 Client Icon 9 Understanding the Firewall 9 Compliance 10 Defining a Site You must have at least one site to connect to a VPN. If your system administrator pre-configured the client package, you can connect to the VPN site immediately. If not, you must define the site. Before you start, make sure you know how you will authenticate to the VPN and that you have the credentials (for example, password or certificate file). You might also require the gateway fingerprint, to make sure that the client is connecting to the correct gateway. Get this from your system administrator. To define a site: 1. Right-click the client icon and select VPN Options. The Options window opens. The first time you open the window, no sites are listed. 2. On the Sites tab, click New. Page 6
7 Defining a Site The Site Wizard opens. 3. Click Next. 4. Enter the name or IP address of the Security Gateway and click Next. Wait for the Client to identify the site name. 5. After the client resolves the site, a security warning might open: The site's security certificate is not trusted! While verifying the site's certificate, the following possible security risks were discovered: Ask your system administrator for the fingerprint of the server. If the server fingerprint matches the fingerprint in the warning message, you can click Trust and Continue. If there is no match, consult with your system administrator. 6. The Authentication Method window opens. Select an authentication method according to your system administrator's instructions. 7. Click Next and follow the instructions to enter your authentication materials. Getting Started Page 7
8 Basic Operations If you selected Secure Authentication API (SAA), an SAA window opens to select the type of SAA and a DLL file to use. See Secure Authentication API (SAA) (on page 14). 8. Click Finish. The client opens a prompt to connect you to the newly created site. 9. Click Yes to connect to the site, or No to save the site details and connect at a different time. Basic Operations Right-click the Client icon in the system tray to use basic operations. (Not all options appear for every client status and configuration.) To quickly connect to last active site, double-click the Client icon. To use other basic operations, right-click the Client icon and select an option. Option Connect Connect to VPN Options Register to Hotspot Show Compliance Report Show Client Shutdown Client Function Opens the main connection window, with the last active site selected. If you authenticate with a certificate, the client immediately connects to the selected site. Opens the main connection window. Opens the Options window to set a proxy server, choose interface language, enable Secure Domain Logon, collect logs, and select a DLL file for SAA Authentication. Lets you bypass the firewall to register to a hotspot. After you click this option, open a browser. It will open to the hotspot registration page. See if your computer is compliant with the Security Policy, and if not, why not and how to fix the issue. Open the Client overview. Closes the Client and the VPN connection. You can also see most of these options from the Client Overview. Connect Window In the Connect window you authenticate to the VPN. Based on the settings that your administrator configures, you might have options to choose a Site and Gateway, or only a Site. Getting Started Page 8
9 Client Icon In the Connect Window: 1. In Site, select the site to connect to. If you were not instructed differently by your administrator, connect to the default site. 2. You might have a Gateway field. If necessary select a gateway. If you were not instructed differently by your administrator, connect to the default gateway. 3. Enter authentication to connect to the VPN: If you have a Certificate, browse to the certificate file and enter the password. If you use SecurID, enter your PIN or passcode. If you get a key in response, copy it. If you use Username and Password, enter your username and password. If you use Challenge Response, enter the first key. When the challenge comes, enter the response. If you use SAA, click Connect and a new window opens for authentication. While you use the VPN resources, you might have to enter your authentication credentials again. This can occur if you try to access a resource that is on a different gateway and your credentials are not cached. Client Icon The Client icon in the system tray notification area shows the status of Remote Access Clients. Icon Status Disconnected Connecting Connected Encryption (encrypted data is being sent or received on the VPN) There is an issue that requires users to take action. You can also hover your mouse on the icon to show the client status. Understanding the Firewall When Endpoint Security VPN is installed on your computer, it includes a firewall. The firewall examines all network traffic that comes to your computer and asks: Where did the traffic come from and where is it addressed to? Do the firewall rules allow traffic to that address? Does the traffic violate global rules? Based on the answers to these questions, traffic is allowed or blocked. The administrator sets the policies and rules that control what traffic the firewall allows. Disabling the Firewall Your administrator can give you the option to disable the firewall on your computer. If you do have this option, when you right-click the Endpoint Security VPN icon in the system tray, one of the choices is Disable Security Policy. If you select this, the firewall is disabled. Depending on the compliance settings, you might not be able to connect to the VPN if your firewall is disabled. If the firewall is disabled, the option Enable Security Policy shows in the right-click menu of the Client icon. Select this to enable the firewall. Getting Started Page 9
10 Compliance Compliance Your administrator can configure checks for your computer or device to make sure it is compliant before you connect to the VPN site. Some examples of what these checks can include are: If your Operating System is supported. If you are logged in correctly. If you have an updated Anti-virus client. Your computer must be compliant with all checks to access the VPN. If your computer is not compliant, the Client icon looks like this: If your computer is found to be non-compliant based on one check, you cannot access the VPN. In the Client Overview window, it shows that you are not compliant and a message opens. If your computer does not comply based on multiple factors you can see multiple messages. Follow the instructions in the message to make your computer compliant. If you have questions, contact your administrator. You can see a compliance report that shows if your computer is compliant with the Security Policy, and if not, how to fix the issue. To get a compliance report, right-click the Client icon in the system tray and select Show Compliance Report. The compliance check always works in the background, if you are connected to the VPN or not. At any time it can report that your computer has failed a check and is not compliant. Getting Started Page 10
11 Chapter 3 Setting up the Client In This Chapter Configuring Proxy Settings 11 Secure Domain Logon 11 Configuring VPN 11 Changing the Site Authentication Scheme 12 Configuring Proxy Settings If you are at a remote site which has a proxy server, the client must be configured to go through the proxy server. Usually the client can find proxy settings automatically. If not, you can configure it. Before you begin, get the IP address of the proxy server from the local system administrator. Find out if the proxy needs a user name and password. To configure proxy settings: 1. Right-click the Client icon and select VPN Options. The Options window opens. 2. Open the Advanced tab. 3. Click Proxy Settings. The Proxy Settings window opens. 4. Select an option. No Proxy - Make a direct connection to the VPN. Detect proxy from Internet Explorer settings - Get the proxy settings from Internet Explorer > Tools > Internet options > Connections > LAN Settings. Manually define proxy - Enter the IP address port number of the proxy. If required, enter a user name and password for the proxy. 5. Click OK. Secure Domain Logon If the system administrator says that you must use SDL, enable Secure Domain Logon (SDL). To enable SDL on a client: 1. Right-click the Client icon and select VPN Options. 2. In Options > Advanced, select Enable Secure Domain Logon (SDL). 3. Click OK. 4. Restart the computer and log in. Configuring VPN You might have the option to go through the VPN for all your Internet traffic. This is more secure. Page 11
12 Changing the Site Authentication Scheme To configure VPN Tunneling: 1. Right-click the Client icon and select VPN Options. The Options window opens. 2. On the Sites tab, select the site to which you want to connect, and click Properties. The Properties window for the site opens. 3. Open the Settings tab. 4. In VPN tunneling, click Encrypt all traffic and route to gateway. 5. Click OK. Note - In SecuRemote, this option is disabled, If this option is disabled in Endpoint Security VPN or Check Point Mobile for Windows, consult your system administrator. Changing the Site Authentication Scheme If you have the option from your system administrator, you can change the method that you use to authenticate to the VPN. To change the client authentication method for a specific site: 1. Right-click the Client icon and select VPN Options. The Options window opens 2. On the Site tab, select the site and click Properties. The Properties window for the site opens. On the Settings tab, select an option from the Authentication Scheme drop-down menu. Username and password Certificate - CAPI Certificate - P12 SecurID - KeyFob SecurID - PinPad SecurID Software Token Challenge Response SAA - Username and Password SAA - Challenge Response Setting up the Client Page 12
13 Changing the Site Authentication Scheme Certificate Enrollment and Renewal A. To enroll a certificate: 1. Right-click the client icon in the system tray, and select VPN Options. 2. On the Sites tab, select the site from which you will enroll a certificate and click Properties. The site Properties window opens. 3. Select the Settings tab. 4. Choose the setting type you want, CAPI or P12, and click Enroll. The CAPI or P12 window opens. 5. For CAPI, choose the provider to which you will enroll the certificate. 6. For P12, choose a new password for the certificate and confirm it. 7. Enter the Registration Key that your administrator sent you. 8. Click Enroll. The certificate is enrolled and ready for use. B. To renew a certificate: 1. Right-click the client icon in the system tray, and select VPN Options. 2. On the Sites tab, select the site from which you will renew a certificate and click Properties. The site Properties window opens. The authentication method you chose is set and the certificate will be renewed accordingly. 3. Select the Settings tab. 4. Click the Renew button. The CAPI or P12 window opens. 5. For CAPI, choose the certificate you want to renew from the drop-down list. For P12, choose a P12 file and enter its password. 6. Click Renew. The certificate is renewed and ready for use. Importing a Certificate into the CAPI Store Before you can use the certificate to authenticate your computer, you must get: The certificate file. The password for the file. The name of the site (each certificate is valid for one site). If the system administrator instructed you to save the certificate on the computer, import it to the CAPI store. If not, the administrator will give you the certificate file on a USB or other removable media. Make sure you get the password. To import a certificate file to the CAPI store: 1. Right-click the client tray icon, and select VPN Options. 2. On the Sites tab, select the site and click Properties. 3. Open the Settings tab. 4. Make sure that Certificate - CAPI is selected in the Method list. 5. Click Import. 6. Browse to the P12 file. 7. Enter the certificate password and click Import. Authenticating with PKCS#12 Certificate File For security reasons, your system administrator might require you to authenticate directly with the PKCS#12 certificate and not from the certificate stored in the CAPI. For example, if you use several desktop workstations and laptops, you might not want to leave your certificate on different computers. If the PKCS#12 certificate is in the CAPI store and someone steals your laptop, they can use the client to connect Setting up the Client Page 13
14 Changing the Site Authentication Scheme to the site. For increased security, your administrator might instruct you to save the PKCS#12 certificate to a USB stick or other storage device.. To authenticate with a PKC#12 certificate file: 1. Configure the site to use "Certificate P12" for authentication. 2. Connect to the site. The Connect window opens. 3. In the Certificate File area, browse to the certificates stored on the floppy or USB disk. 4. In the Password field, enter the certificate password. 5. Click Connect. Note - If you selected the Always-Connect option, whenever communication between the site and client is closed, the user will be prompted to enter the certificate password. SecurID The RSA SecurID authentication mechanism consists of either hardware (FOB, USB token) or software (softid) that generates an authentication code at fixed intervals (usually one minute), with a built-in clock and encoded random key. The most common form of SecurID Token is the hand-held device. The device is usually a key FOB or slim card. The token can have a PIN pad, onto which a user enters a personal identification number (PIN) to generate a passcode. When the token does not have a PIN pad, a tokencode is displayed. A tokencode is the changing number displayed on the key FOB. The Remote Access Clients site wizard supports both methods, as well as softid. Remote Access Clients uses both the PIN and tokencode, or just the passcode, to authenticate to the gateway. Challenge-Response Challenge-response is an authentication protocol in which one party provides the first string (the challenge), and the other party verifies it with the next string (the response). For authentication to take place, the response is validated. Secure Authentication API (SAA) Secure Authentication API (SAA) lets you use third- party authentication technologies with your Remote Access client. To work, it requires a DLL file that is installed on your client. If your administrator instructs you to select Secure Authentication API (SAA) as the authentication method when you create a site, you need this information: The type of SAA authentication that you must select - one of these: Username and Password - Users enter a username and password. Challenge Response - Users enter a response to a challenge. You might need a DLL file. If your administrator already configured this, then you do not need it. Note - Only users with administrator permissions can replace the DLL. Setting up the Client Page 14
15 Changing the Site Authentication Scheme If you select SAA as the authentication in the site wizard, a new page opens where you select the type of SAA authentication and a DLL file, if required. Replacing the SAA DLL File Your administrator might instruct you to replace the DLL file on your client. Note - Only users with administrator permissions can replace the DLL. To replace the local DLL file: 1. Right-click the client icon and select Options. 2. In the Advanced tab, next to Use a Secure Authentication API File, browse to select the new DLL file. This file is used for SAA authentication. Connecting to a Site with SAA Usually, when you connect to a site, a login window opens and you enter your authentication information directly in that window. If SAA is the authentication method for the site, there are no fields for authentication information in the login window. You must click the Connect button in the window and a new window opens for authentication information. Setting up the Client Page 15
16 Changing the Site Authentication Scheme Collecting Logs If your system administrator or help desk asks for logs to resolve issues, you can collect the logs from your client. To collect logs: 1. Right-click the Client icon and select VPN Options. 2. Open the Advanced tab. 3. Click Enable Logging. 4. Reproduce the problem. 5. Click Collect Logs. Note - The logs are saved to %TEMP%\trac\trlogs_timestamp.cab. It opens after the logs are collected. This folder is sometimes hidden. If you need to locate this folder, in Control panel > Folder Options > View, select Show hidden files and folders. Collecting Logs Page 16
Endpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
Endpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Endpoint Security VPN for Mac
Endpoint Security VPN for Mac E75 Administration Guide 29 March 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation
Remote Access Clients for Windows
Remote Access Clients for Windows E80.60 Release Notes 3 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation
Endpoint Security VPN for Mac
Security VPN for Mac E80.41 Release Notes 16 January 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
DIS VPN Service Client Documentation
DIS VPN Service Client Documentation Background ------------------------------------------------------------------------------------------------ 1 Downloading the Client ---------------------------------------------------------------------------------
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Endpoint Security Client
Endpoint Security Client R80.10 User Guide 7 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Configuring VPN Using Windows XP
Configuring VPN Using Windows XP How to Create a VPN Connection What is VPN? Connecting to VPN Create a VPN Connection Connect to Your Work Computer Copying Files What is VPN? Virtual Private Networks
Aventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
VPN CLIENT USER S GUIDE
STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
CA VPN Client. User Guide for Windows 1.0.2.2
CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
For paid computer support call 604-518-6695 http://www.netdigix.com [email protected]
Setting up your vpn connection on windows 2000 or XP in continuation from installing x.509 certificate on windows (please do not continue if you have not installed your x.509 certificate): Instructions
Remote Access End User Guide (Cisco VPN Client)
Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED
WatchGuard Mobile User VPN Guide
WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
Kerio VPN Client. User Guide. Kerio Technologies
Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional
Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC
Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
Security Gateway R75. for Amazon VPC. Getting Started Guide
Security Gateway R75 for Amazon VPC Getting Started Guide 7 November 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2013 Akin Gump Strauss Hauer & Feld LLP Checkpoint VPN (Firm
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Getting Started - Client VPN
Getting Started - Client VPN Symantec Client VPN v9.0 This chapter includes the following topics: What is new in this release on page 2 System requirements on page 3 Documentation on page 3 Upgrading to
Sage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
AT&T Global Network Client User s Guide
Version 9.0.2 AT&T Global Network Client User s Guide 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual
Important Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
Remote Access End User Reference Guide for F5 Edge VPN Client Access
Remote Access End User Reference Guide for F5 Edge VPN Client Access Version 2.1 3/2/2015 This remote access end user reference guide provides an overview of how to download and install the F5 Edge VPN
LRDC Computing Services
LRDC Computing Services Remote Access to the LRDC Fileservers Windows XP* April 5, 2005 *While these instructions have been created for and tested on a Windows XP computer, they may also work for your
How To Backup a SmartCenter
How To Backup a SmartCenter 6 April 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing
Arkay Remote Data Backup Client Quick Start Guide
Arkay Remote Data Backup Client Quick Start Guide Version 6.1.56.27 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote
Dial-up Installation for CWOPA Users (Windows Operating System)
Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
RSA ACE/Agent 5.5 for Windows Installation and Administration Guide
RSA ACE/Agent 5.5 for Windows Installation and Administration Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland
Setup and Configuration Guide for Pathways Mobile Estimating
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista
Juniper NetScreen IPSec Dial Client Installation Guide for Windows 2000 Windows XP Windows Vista Revision 2.0 NetScreen is a registered trademark of Juniper, Inc. Windows is a registered trademark of Microsoft
Contents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
Sophos UTM. Remote Access via IPsec Configuring Remote Client
Sophos UTM Remote Access via IPsec Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
HOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
Verizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express
ArcGIS 9 Installation Guide: Workgroup for Microsoft SQL Server Express Copyright 2006 ESRI All Rights Reserved. Printed in the United States of America. The information contained in this document is the
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
If you have questions or find errors in the guide, please, contact us under the following e-mail address:
1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide
RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
Logging into Citrix (Epic) using an RSA Soft Token - New RSA User
Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Soft Token Installation and Logging into Citrix (Epic) using an RSA Soft Token A. For new RSA users: downloading & importing your RSA Soft
Windows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run.
Introduction These instructions are for Windows and MAC users ONLY. For Mobile devices (IOS/Android), use the Mobile Device document found on the portal Login Page. For Windows 8.x users: At this time,
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional
Information Services Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Amendment & Authorisation History Ver Date Changes Name Author A 29/3/05
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
1.6 HOW-TO GUIDELINES
Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: [email protected] Copyright
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
How to connect to the DGL Practice Manager Cloud Server from an Apple Mac
How to connect to the DGL Practice Manager Cloud Server from an Apple Mac Connecting to the DGL Practice Manager Hosted Servers requires the use of the "Microsoft Remote Desktop Client" application, which
User Manual. 3CX VOIP client / Soft phone Version 6.0
User Manual 3CX VOIP client / Soft phone Version 6.0 Copyright 2006-2008, 3CX ltd. http:// E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data
BorderGuard Client. Version 4.4. November 2013
BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED
E-Mail: [email protected] Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
DP-313 Wireless Print Server
DP-313 Wireless Print Server Quick Installation Guide TCP/IP Printing (LPR for Windows 95/98/Me/2000) Rev. 03 (August, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may
How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access)
1 How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access) San Antonio Community Hospital uses a strong authenticate method for remote access to ICIS. This
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
File and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates
Remote Access Services Microsoft Windows - Installation Guide
Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3
Defender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
VPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition
Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 9.0, Enterprise Edition Copyright and Trademark Notice Use of the product documented in
Diamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the
Remote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
SafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact [email protected] Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
MANAGED SOFTWARE CENTER USER S GUIDE
U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A MANAGED SOFTWARE CENTER USER S GUIDE JANUARY 2015 U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A 2015 UNIVERSITY OF SOUTHERN CALIFORNIA.
Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN
Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN October 2013 In order to access the LRDC file server remotely/off campus, or from Wireless Pittnet, you must first authenticate
Remote Access Portal (RAP) Installation and User Guide
Remote Access Portal (RAP) Installation and User Guide W:\data02\Helpdesk\Procedures\RAP\RAP Installation Guide 2015.doc Page 1 of 12 1. Introduction 3 2. Support 3 3. Technical Requirements 4 4. First
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Important Notes for WinConnect Server ES Software Installation:
Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
Network Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
LogMeIn Hamachi. Getting Started Guide
LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn
