ClickShare Network Integration
|
|
|
- Alan Anthony
- 10 years ago
- Views:
Transcription
1 ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network infrastructure. In a default stand-alone setup, the ClickShare Base Unit creates its own wireless access point (AP) which the ClickShare Buttons use to connect. These so-called rogue APs can become a nuisance in larger installations. Next to that, meeting participants who are sharing content from mobile devices have to switch networks to connect with the ClickShare Base Unit. This is where ClickShare Network Integration comes in. Once fully confi gured and enabled, the built-in AP of the Base Unit is disabled. The Button or the mobile devices can then connect to a wireless access point that is part of the corporate network. At this point, the Base Unit needs to be connected to the corporate network via the wired Ethernet interface so that the Buttons and mobile devices can share their content on the Base Unit. In the following sections of this application note, we discuss how all of this can be set up, and we explain a bit more about the inner details. 2 Security Modes There are 2 security modes supported by the Button to connect to the corporate network: The first one, which applies to a typical corporate network setup, is WPA2-Enterprise with 802.1X. As we also want to support smaller organizations, which might have a more traditional Wi-Fi setup, there is also support for WPA2-PSK, also known as WPA2-Personal. Both modes are based on Wi-Fi Protected Access (WPA). In this document, we talk about WPA2 an improved version of the original WPA standard which adds AES encryption to improve security. 2.1 WPA2-Enterprise with 802.1X WPA2-Enterprise relies on a server (using RADIUS) to authenticate each individual client on the network. To do this, authentication 802.1x is used (also known as port-based Network Access Control) x encapsulates the Extensible Authentication Protocol (EAP) for use on local area networks. This is also known as EAP over LAN or EAPoL. Using RADIUS, these EAPoL messages are routed through the network in order to authenticate the client device on the network which, in the case of ClickShare, are the Buttons. The i (WPA2) standard defi nes a number of required EAP methods. However, not all of them are used extensively in the fi eld, and some other ones (which are not in the standard) are used much more often. Therefore, we have selected the most widely used EAP methods. The list of EAP methods supported in the ClickShare system is: EAP-TLS PEAP EAP-TTLS More details on each of them, plus setup instructions, can be found further down in this application note.
2 3 Considerations When you choose to integrate the ClickShare system into your corporate network, there are a few things to consider up front. First of all, make sure that all your Base Units can be connected to your network via the wired Ethernet interface. Also, take into account the amount of bandwidth that each Button needs to stream the captured screen content to the Base Unit this is usually somewhere between 5 and 15 Mbps. So, prevent bottlenecks in your network (e.g. 100 Mbps switches) that could potentially degrade your ClickShare experience due to a lack of bandwidth. 4 Prerequisites Before rolling out ClickShare Network Integration, make sure your infrastructure meets the following prerequisites. 4.1 Network Once you enable the corporate network, the internal Wi-Fi access point of the ClickShare Base Unit is disabled. Make sure your Base Unit is connected to the corporate network via its wired Ethernet interface. 4.2 Firewall To ensure that you can successfully share content via the ClickShare Button, or from mobile devices, to the Base Unit, make sure the following ports are open on your network: Sender CSM Base Unit CSC Base Unit ClickShare Button TCP: ; 3268; 8080;UDP: TCP: 9876 ClickShare Presenter (ios) TCP/UDP: 9870 TCP/UDP: 9870 ClickShare Presenter (Android) TCP/UDP: 9870 TCP/UDP: 9870 AirPlay n/a TCP: 7000; 7100; 47000; ; UDP: 4100; VLAN A lot of corporate networks are divided into multiple VLANs for example, to separate BYOD (Bring Your Own Device) traffi c from the core corporate network. Take this into consideration when integrating ClickShare into your network. ClickShare Buttons connecting to your wireless infrastructure should be able to connect to the Base Units. Furthermore, if you want to use the mobile apps, these should also be able to reach the Base Units. 4.4 DNS For the Buttons to be able to stream their content to the Base Unit, they must be able to resolve the Base Unit s hostname within the network. 4.4 NTP When using EAP-TLS, you must also confi gure NTP on the Base Unit. This can be done via the Base Unit WebUI. The Base Unit must have the correct time to handle the certifi cates required for EAP-TLS. Preferably, you should use an NTP server with high availability on the local corporate network. Be advised that, when using an NTP server on the internet, the Base Unit cannot connect through a proxy server.
3 5 Setup To facilitate the setup, we have opted for a wizard in the ClickShare WebUI. This wizard will guide you through the process according to the security mode you select. Further down, you will fi nd an overview and explanation of each supported security mode and the input that is required to get everything integrated and working. 5.1 Activation Due to the complexity of the ClickShare Network Integration feature, you must activate it fi rst. To do this, go to the Corporate Network tab in the Base Unit s WebUI, and click on the button which brings you to a request page. Enter the details regarding your ClickShare deployment and network confi guration. After receiving your request, we check whether or not the feature can be enabled in your environment. If so, you will receive an activation code that you enter in the Base Unit s WebUI to get access to this feature.
4 5.2 Security methods The next 4 sections describe each of the supported security methods in further detail. Please refer to the one that applies to your environment. 5.3 Post Setup Please note that you must re-pair all of the ClickShare Buttons after completing the setup wizard. Before re-pairing, the old standalone mode is still active on the Base Unit and you will be unable to share. 5.2 Apps Once integrated into the network, any mobile device connected to the corporate network will be able to share content with any Base Unit on the network. (If so desired, you can prohibit sharing from mobile devices via the Base Unit s WebUI.) 6 EAP-TLS EAP-TLS (Transport Layer Security) is an EAP method based on certifi cates, which allows mutual authentication between client and server. It requires a PKI (Public Key Infrastructure) to distribute server and client certifi cates. (If this is too big of a hurdle for your organization, EAP-TTLS and PEAP provide good alternatives.) Even though an X.509 client certifi cate is not strictly required by the standard, it is mandatory in most implementations, including ours. When implemented using client certifi cates, EAP-TLS is considered to be one of the most secure EAP methods. The only minor disadvantage, compared to PEAP and EAP-TTLS, is that the user s identity is transmitted in the clear before the actual TLS handshake is performed. EAP-TLS is supported via SCEP or manual certifi cate upload.
5 6.1 SCEP The Simple Certifi cate Enrolment Protocol (SCEP) enables issuing and revoking certifi cates in a scalable way. We have included SCEP support to allow for quicker and smoother integration of the ClickShare Base Unit and Buttons into the corporate network. Because most companies use Microsoft Windows Server and its active directory (AD) to manage users and devices, our SCEP implementation is specifi cally targeted at the Network Device Enrolment Service (NDES), which is part of Windows Server 2008 R2 and At this time, no other SCEP server implementations are supported NDES The Network Device Enrolment Service is Microsoft s server implementation of the SCEP protocol. If you want to enable EAP-TLS using SCEP, make sure NDES is enabled, confi gured and running on your Windows Server. For more details about setting up NDES, please visit the Microsoft website 1. SCEP uses a so-called challenge password to authenticate the enrollment request. For NDES, this challenge can be retrieved from your server at: http(s)://[your-server-hostname]/certsrv/mscep_admin. When you enter the necessary credentials into the setup wizard, the Base Unit automatically retrieves this challenge from the web page and uses it in the enrollment request thereby fully automating the process Provide certificates manually If your current setup doesn t support SCEP, or if you prefer not to use it but you still want to benefi t from the mutual authentication EAP-TLS offers, you can also upload the necessary certifi cates manually. SCEP Server IP / Hostname SCEP Username SCEP Password Domain Identity Corporate SSID For a detailed explanation of each setting, please go to section 10: Confi guration details. 1 NDES White Paper: network-device-enrollment-service-ndes-in-active-directory-certifi cate-services-ad-cs-en-us.aspx
6 6.2 Provide certificates manually If your current setup doesn t support SCEP, or if you prefer not to use it but you still want to benefi t from the mutual authentication EAP-TLS offers, you can also upload the necessary certifi cates manually Client Certificate The client certifi cate you provide should be signed by the authoritative root CA in your domain and should be linked to the user you specify in the Identity fi eld. Also, make sure that the client certifi cate you provide contains the private key this is necessary to set up the TLS connection successfully CA Certificate The CA certifi cate is the certifi cate of the authoritative root CA in your domain that is used in setting up the EAP-TLS connection. During the wizard, the Base Unit ensures that it can validate the chain of trust between the Client and the CA certifi cates you provide Input To successfully set up an EAP-TLS confi guration using SCEP, the following data is required: Client Certificate CA Certificate Domain Identity Corporate SSID For a detailed explanation of each setting, please go to section 10: Confi guration details.
7 7 PEAP PEAP (Protected Extensible Authentication Protocol) is an EAP implementation co-developed by Cisco Systems, Microsoft and RSA Security. It sets up a secure TLS tunnel using the server s CA certifi cate, after which actual user authentication takes place within the tunnel. This way of working enables to use the security of TLS while authenticating the user, but without the need for a PKI. The standard does not mandate which method is to be used to authenticate within the tunnel. But in this application note, with regard to PEAP, we are referring to PEAPv0 with EAP-MSCHAPv2 as the inner authentication method. This is one of the two certifi ed PEAP implementations in the WPA and WPA2 standards and by far the most common and widespread implementation of PEAP. 7.1 Input Domain Identity Password Corporate SSID For a detailed explanation of each setting, please go to section 10: Confi guration details.
8 8 EAP-TTLS EAP-TTLS (Tunneled Transport Layer Security) is an EAP implementation by Juniper 2 networks. It is designed to provide authentication that is as strong as EAP-TLS, but it does not require issuing a certifi cate to each user. Instead, only the authentication servers are issued certifi cates. User authentication is performed by password, but the password credentials are transported in a securely encrypted tunnel based on the server certifi cates. User authentication is performed against the same security database that is already in use on the corporate LAN: for example, SQL or LDAP databases, or token systems. Because EAP-TTLS is usually implemented in corporate environments without a client certifi cate, we have not included support for this. If you prefer to use client certifi cates per user, we suggest using EAP-TLS instead. 8.1 Input Domain Identity Password Corporate SSID For a detailed explanation of each setting, please go to section 10: Confi guration details. 2
9 9 WPA-PSK WPA2-PSK does not distinguish between individual users there is 1 password (PSK Pre-Shared Key) for all clients connecting to the wireless infrastructure. This makes setup very straightforward. Once connected, all data transmitted between client and AP is encrypted using a 256-bit key. 9.1 Input Corporate SSID Pre-Shared Key For a detailed explanation of each setting, please go to section 10: Confi guration details. 10 Configuration details You can use this section as a quick reference guide it describes the different settings you can encounter in the setup wizard in more detail SCEP Server URL / Hostname This is the IP or hostname of the Windows Server in your network running the NDES service. Since Internet Information Services (IIS) supports both HTTP and HTTPS, specify which of the two you want to use. If not specifi ed, we default to HTTP. Examples: or or server.mycompany.com (will use http) 10.2 SCEP Username This is a user in your Active Directory which has the required permission to access the NDES service and request the challenge password. To confi rm this, the user should be part of the CA Administrators group (in the case of a stand-alone CA) or have enroll permissions on the confi gured certifi cate templates SCEP Password This is the password of the User Account used as SCEP Username. The password is never stored on the Base Unit it is kept in memory just long enough to request the Challenge Password from the server, and then it is immediately removed from memory.
10 10.4 Domain The company domain for which you are enrolling should match the one defi ned in your Active Directory Identity The identity of the user account in the Active Directory, which the ClickShare Buttons use to connect to the corporate network. When using 10.6 Password The corresponding password for the identity that you are using to authenticate on the corporate network. Per Base Unit, every Button uses the same identity and password to connect to the corporate network Corporate SSID The SSID of your corporate wireless infrastructure to which the ClickShare Buttons connect Client Certificate We support 2 formats for uploading a client certifi cate: PKCS#12 (.pfx) An archive file format for storing multiple cryptography objects. Privacy Enhanced Mail (.pem) A Base64 encoded DER certificate stored between 2 tags: -----BEGIN CERTIFICATE----- and -----END CERTIFICATE When the provided PKCS#12 fi le also contains the necessary CA certifi cate, the Base Unit extracts it and verifi es the chain of trust, so that you do not have to provide the CA certifi cate separately CA Certificate We support the common.crt fi le extension, which can contain a Base64 encoded DER certifi cate Pre-Shared Key The key used in WPA2-PSK to authenticate onto the wireless infrastructure. This can be a string of 64 hexadecimal digits or a passphrase of 8 to 63 printable ASCII characters. 11 Troubleshooting Even though the Base Unit does its best to validate the provided confi guration input, it is still possible that the Button will not be able to connect to your corporate network. There are several potential root causes for this, including but not limited to: incorrect SSID, SSID not available, incorrect EAP Identity / Password, fi rewall settings, VLAN confi guration, To receive feedback from the Button when it is trying to connect to your corporate network, please look at the ClickShare Client log. This log can be enabled by pressing the Shift key when starting the Client executable. Look for the lines EDSUSBDongleConnection::mpParseDongleMessages. An error code and a short summary of the issue should be logged.
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
Technical Certificates Overview
Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
802.1X Authentication
OS X 10.7.3 and ios 5.1 May 25, 2012 Contents About 802.1X... 3 Apple Product Compatibility with 802.1X... 7 Configuring 802.1X Settings... 10 Resources... 17 Appendix A: Payload Settings for 802.1X...
Implementing Security for Wireless Networks
Implementing Security for Wireless Networks Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important:
Application Note. Onsight Device Certificate Management
Application Note Onsight Device Certificate Management ONSIGHT DEVICE CERTIFICATE MANAGEMENT...3 Supported Certificate Formats:... 3 Stores List... 3 Importing Certificates:... 3 CERTIFICATE PACKAGES USING
Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database
Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database Table of Contents: INTRODUCTION:... 2 GETTING STARTED:... 3 STEP-1: INTERFACE CONFIGURATION... 4 STEP-2:
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
How to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
Eduroam wireless network Windows Vista
Eduroam wireless network Windows Vista university for the creative arts How to configure laptop computers to connect to the eduroam wireless network Contents Contents Introduction Prerequisites Instructions
vwlan External RADIUS 802.1x Authentication
6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Connecting to Secure Wireless (iitk-sec) on Fedora
Connecting to Secure Wireless (iitk-sec) on Fedora Go to System Preferences Network Connections. Click on Wireless tab and then Add button. Check Connect automatically and Available to all users. Set SSID
WLAN Authentication and Data Privacy
WLAN Authentication and Data Privacy Digi Wi-Point 3G supports various Wi-Fi security options, including WEP-40/WEP-104 and WPA- PSK and WPA2-PSK. To configure WLAN security on DIGI WI-POINT 3G, you may
Security Guide. BES12 Cloud. for BlackBerry
Security Guide BES12 Cloud for BlackBerry Published: 2015-03-31 SWD-20150317085646346 Contents Introduction... 7 About this guide...8 What is BES12 Cloud?... 9 Key features of BES12 Cloud...10 Security
Certificate Management
Certificate Management This guide provides information on...... Configuring the GO!Enterprise MDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Eduroam wireless network - Windows 7
Eduroam wireless network - Windows 7 How to configure laptop computers and tablets to connect to the eduroam wireless network. Contents Introduction 1 Instructions for Windows 7 Devices 2 Technical Information
Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)
Introduction En Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a computer for transmission
Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents
Contents 4 Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager Contents Overview...................................................... 4-3 RADIUS Overview...........................................
Configuring the WT-4 for ftp (Infrastructure Mode)
Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Belnet Networking Conference 2013
Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda
Wireless Network Configuration Guide
CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Deploying iphone and ipad Virtual Private Networks
Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Wi-Fi in Healthcare:
Wi-Fi in Healthcare: Security Solutions for Hospital Wi-Fi Networks Wi-Fi Alliance February 2012 The following document and the information contained herein regarding Wi-Fi Alliance programs and expected
LifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones Polycom s SpectraLink 8400 Series wireless phones meet the highest security requirements. By the time you deploy
Administrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
The back story of our Wireless (reading will help you understand what is going on in the building):
Wireless Network The back story of our Wireless (reading will help you understand what is going on in the building): At Robeson we have a non-broadcasting wireless network. This means that if you are using
TrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Case Study - Configuration between NXC2500 and LDAP Server
Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
GlobalProtect Configuration for IPsec Client on Apple ios Devices
GlobalProtect Configuration for IPsec Client on Apple ios Devices Tech Note PAN-OS 4.1 Revision D 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com CONTENTS OVERVIEW... 3 PREREQUISITES... 3 GLOBALPROTECT
Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18
Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available
Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for BlackBerry Version 12.0 Published: 2014-11-12 SWD-20141106140037727 Contents Introduction... 7 About this guide...8 What is BES12?...9 Key features of
Setting up a WiFi Network (WLAN)
Setting up a WiFi Network (WLAN) How to set up Wi-Fi on your Huawei E960 InZone Step 1: In the address field on your internet browser, type http://192.168.1.1/ Step 2: Type admin into the Password box
User Guide for eduroam
User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo
Deployment Guide. AX Series with Microsoft Office SharePoint Server
Deployment Guide AX Series with Microsoft Office SharePoint Server Table of Contents DEPLOYMENT GUIDE AX Series with Microsoft Office SharePoint Server Introduction... 1 Prerequisites & Assumptions...
Wireless Security for Mobile Computers
A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker
Massey University Wireless Network - Client
Massey University Wireless Network - Client Configuration Windows Mobile 5/6 Windows Mobile wireless network Requirements Information Technology Services You must have an active Massey network account,
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
WiFi troubleshooting. How s your WiFi signal? Android WiFi settings. ios WiFi settings
1 WiFi troubleshooting How s your WiFi signal? If your connection appears to keep dropping off: check in your WiFi settings that you added @kent.ac.uk to your username, and entered your password correctly.
Installation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or
Wireless Configuration Guide: Windows 7 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, 8, Mac OS X, Linux, and other Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA
How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA You can secure your wireless connection using one of the methods
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
Certificate Management
www.novell.com/documentation Certificate Management ZENworks Mobile Management 3.1.x August 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Connecting to and Setting Up a Network
Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
Sophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)
Page 1 of 25 Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) Windows 7 Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) This document provides basic instructions
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)... 43.
Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 6 Hardware Overview...7 Connections... 7 LEDs...8 Configuration...9 Web-based
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops
Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops A wireless network for Faculty and Staff to use with their personal laptops, is available throughout campus with
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
Authentication. Authentication in FortiOS. Single Sign-On (SSO)
Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
How to connect to the diamonds wireless network with Vista.
How to connect to the diamonds wireless network with Vista. This configuration guide requires the use of Windows to configure the wireless settings. 1. Click on the START menu and click the Control Panel.
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication
ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual
ALL1682511 500Mbits Powerline WLAN N Access Point User s Manual Contents 1. Introduction...1 2. System Requirements...1 3. Configuration...1 4. WPS...9 5. Wireless AP Settings...9 6. FAQ... 15 7. Glossary...
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
Step-by-Step Secure Wireless for Home / Small Office and Small Organizations
Step-by-Step Secure Wireless for Home / Small Office and Small Organizations Microsoft Corporation Published: October 2005 Author: Brit Weston Editor: Allyson Adley Abstract This white paper presents two
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device
Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device Prerequisites An activated MyID account is required to use ResNet s wireless network. If you have not activated your MyID account,
Bluesocket virtual Wireless Local Area Network (vwlan) FAQ
Bluesocket virtual Wireless Local Area Network (vwlan) FAQ Updated 11/07/2011 Can I disable https on the login page of the BSC or vwlan and use http instead so I do not get a certificate error? No, https
Massey University Wireless Network Client Configuration Windows 7
Massey University Wireless Network Client Configuration Windows 7 Windows 7 wireless network Requirements You must have an active Massey network account, i.e. you should already be able to log onto the
Setting up SJUMobile (Wireless Internet Access for personal devices)
Setting up SJUMobile (Wireless Internet Access for personal devices) St. John s University provides wireless internet access to personal devices for all current registered students. To setup a connection,
How to Configure Certificate Based Authentication for WorxMail and XenMobile 10
How to Configure Certificate Based Authentication for WorxMail and XenMobile 10 This article describes how to configure certificate based authentication using Microsoft Certificate Services (PKI) for WorxMail
Deploying and Configuring Polycom Phones in 802.1X Environments
Deploying and Configuring Polycom Phones in 802.1X Environments This document provides system administrators with the procedures and reference information needed to successfully deploy and configure Polycom
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Product Summary RADIUS Servers
Configuration Guide for Cisco Secure ACS with 802.1x Authentication for Avaya 3631 Wireless Telephone This document details how to configure the Cisco Secure ACS (Access Control Server) v3.3 with 802.1x
