ARCHITECTURE OF SEMI-VIRTUAL CAMPUS FOR EDUCATION IN DISTRIBUTED DATA NETWORK LABORATORY

Size: px
Start display at page:

Download "ARCHITECTURE OF SEMI-VIRTUAL CAMPUS FOR EDUCATION IN DISTRIBUTED DATA NETWORK LABORATORY"

Transcription

1 ARCHITECTURE OF SEMI-VIRTUAL CAMPUS FOR EDUCATION IN DISTRIBUTED DATA NETWORK LABORATORY Petr Grygárek et al. Department of Computer Science, Faculty of Electrical Engineering and Computer Science Technical University of Ostrava, Tř. 17. listopadu, Ostrava, Czech Republic Tel.: (+420) , Fax: (+420) Abstract. The article presents architecture of semivirtual campus technical infrastructure for Edinet project. Its aim is to integrate data network laboratories of multiple partners into single unified system accessible by students remotely via Internet. The architecture is defined to integrate various existing remotely accessible networking laboratories and education approaches. The intent was to reach maximum flexibility to support efficient sharing of lab equipment including a possibility to create temporary distributed lab topologies spanning multiple partners. Keywords: collaborative learning, distance education, distributed learning, interactive learning, network, infrastructure, virtual laboratory 1. INTRODUCTION To improve efficiency of practical training in the field of computer networking, it proved very useful to provide remote access to networking laboratories. Because of high cost of special laboratory equipment it also makes sense to join effort of multiple educational institutions to share equipment with other partners which allows individual partners to specialize of particular special technology and utilize lab equipment for other technologies owned by other partners. The result of that cooperation is a virtual campus which allows student to work with real network devices of any partner, so we call it semivirtual to emphasize the fact that students get real practical experience which cannot be reached using of any kind of device simulators. Because of advantages of participation in such semivirtual campus (SVC) environment, we joined the European Union project called Education in Distributed Data Network Laboratory (EdiNet) operated under EU Lifelong Learning Programme. Our responsibility in scope of Edinet project is the architecture design and implementation of semivirtual campus technical infrastructure. In the following article, we want to share our experience with definition of a such architecture. Our results seem to be general enough to suit rather diverse needs of individual partners and all potential usage patterns and pedagogical approaches which are planned to be tested in the implemented semivirtual campus. The first step of the architecture definition was the thorough investigation of existing partners' remote access solutions, which were rather diverse. Although almost all partners took one of the two possible approaches (i.e. VPN-based approach or solution with exposed terminal server), individual solutions varied considerably in the level of reservation system implementation and overall flexibility of the remote laboratory usage. The SVC architecture proposal was defined so that necessary changes of existing partner labs were minimized. It was necessary because of the fact that many partners currently use their labs in real student education and the process of migration to the common SVC has to be as easy as possible. On the other hand, we wanted to develop a consistent system with clear and well-defined architecture which may be easily extended in the future, so the pure encapsulation of existing solutions was not a wise option. We also needed to minimize cost of new required hardware and software licences so that free opensource technologies were chosen for SVC implementation. This approach also corresponds well with the academic nature of the whole project. During design phase of the overall SVC architecture we took into account many years of our experience with development of remote access lab solutions [1],[2], distributed virtual laboratory architectures [4] and real operation of both nondistributed [3] and distributed [5] semi-virtual education environment. Because the time to implement SVC and prepare the whole distributed environment for piloting was only a couple of months, we decided to defer utilization of advanced features fieldproven in our Distributed Virtlab [5] to the later stages. Our experience with piloting Distributed Virtlab revealed that handling of such features as dynamic creation of distributed virtual topologies with dynamic search of lab devices suitable for particular reservation is rather demanding to organize even in scope of Northern Moravia Distributed Virtlab installation. It would be very risky to try to implement it in such short time in a large-extent SVC covering multiple very distant universities. On the other hand, our goal was to develop an architecture that will be flexible and adaptable enough to allow mutual sharing of partners' lab equipment as effectively as possible. Our politics is that all partners will have equal access to resources of other partners, including both lab devices and 1

2 lab manuals or other educational documents. There was also a requirement to support statically preconfigured distributed virtual topologies spanning multiple partner's labs. The main parts of the architecture that had to be designed were common remote access system, reservation system which reasonably organizes tasks and lab pods and common authentication and authorization (AAA) infrastructure. The general philosophy of all of the mentioned parts will be described in the following sections. 2. COMPONENTS OF THE ARCHITECTURE The SVC distributed architecture is composed of Common Portal, Local AAA Servers and VPN Gateways to Lab Management Networks of individual partners labs, as shown of figure 1. Figure 1: Overall Architecture of the SVC The Common Portal acts as the main SVC WWW portal. It hosts databases of tasks and lab devices, reservation database and database of user groups (see later). Local AAA servers authenticate users of respective partner and maintain local user databases. VPN Gateways provide remote access to Lab Management Network of individual partners labs, as will be described in the next section. 3. THE INTEGRATED REMOTE ACCESS SOLUTION The remote access solution is designated with primary intent to support all kinds of management interfaces of lab network devices used up to now by partners or considered in the future. Currently, we need access to lab networking devices' RS232 consoles and Telnet/SSH/Remote Desktop access to manage lab PCs. In the future, it is expected that a lot of networking devices will be manageable primarily using Web interface. There is also lot of manufacturers who implement their own L2/L3 management protocol and proprietary (commonly Windows-based) management applications. We plan to manage such devices from lab PCs with appropriately configured Web browser and all necessary proprietary management applications preinstalled. To integrate access to RS232 consoles with both text-based and GUI-based access to lab PCs into one technical solution, we have chosen to implement an VPN-based access for remote management of lab equipment (see Figure 2). Lab PCs will have one NIC card connected to the Lab Network and another one connected to so called Lab Management Network. Lab Network contains lab devices used by students to solve tasks, while Lab Management Network is used to access management interfaces of lab PCs and Terminal Servers, which makes RS232 consoles of lab networking devices available to the remote user using reverse Telnet. Various kinds of terminal servers may be utilized (either commercial or partner's own hardware prototype). Figure 2: Basic remote access architecture 2

3 To allow integration of remote desktop clients into remote user s GUI, it is desirable do unify methods of lab PC access over all partners. At the time of writing of this article, TightVNC [8] was chosen as the most suitable open, bandwidth-efficient and cross-platform solution. In the real lab implementations we do not really expect wide usage of "real" lab PCs. To simplify and automatize lab management, reduce cost, power consumption and required space, we expect that partners will want to use some sort of virtualization technology to simulate multiple lab PCs using single server. It will also simplify resetting of PC configurations/filesystems to the known state at the beginning of every reserved timeslot. As can be seen from Figure 2, remote user's PC is used only for management of lab equipment, including lab PCs. It is never incorporated directly to the Lab Network. To manage lab network devices by mean other than RS232 console, the user first accesses some lab PC and then uses software preinstalled on that PC to manage lab network devices. Because the configuration of lab PCs' operating system, WWW browser and other software is completely known to and under control of local lab administrator, we do not have to solve problems with poorly installed or malicious software on remote user's PC as we would have in case if we would have been used remote user's PC as a part of the Lab Network. Every lab is equipped with Linux-based VPN gateway connected both to the local Lab Management Network and to the Internet. It allows remote (VPN) access to the Lab Management Network. After successful authentication, 3.1 Lab Interconnection In some situations, partners may want to interconnect lab devices from multiple labs into distributed virtual topology and provide the resulting (even preconfigured) lab pod for remote access for a limited period of time. The technical solution how it will be implemented is depicted on Figure 3. Both Lab Networks and Lab Management Networks of partners' labs involved in distributed virtual topology have to be virtually connected together. For location-independent access to management interfaces of lab devices spread across labs of multiple partners, Lab Management Networks of all partners will be connected together with VPN tunnels (green dashed line on Figure 3). In the first piloting environment we plan to implement full mesh of tunnels among partners and utilize static routing. If more partners join our environment later, topology may be optimized and suitable dynamic routing protocol implemented. By interconnection of Lab Management Networks, the distributed nature of the virtual topology becomes completely transparent to the user. Controls of Web pages providing access to lab devices' management interfaces may just operate with IP addresses of management interfaces of lab PCs and terminal serves regardless of in which partner's laboratory they are actually located. Tunnels between Lab Networks of partners participating in particular distributed virtual topology (yellow dashed line(s) on Figure 3) will be preconfigured manually when needed. authorization and creation of VPN tunnel, remote user's PC becomes virtually part of respective Lab Management Network. An access list (ACL) will be dynamically applied on the VPN gateway to allow remote user to access only management interfaces of those lab devices which the user previously reserved for a current timeslot. The access is authenticated using one-time passwords generated by Common Portal. Those passwords are passed to remote clients which launch OpenVPN [9] client transparently via HTTPS. Details can be found at [6]. Figure 3: Interconnection of multiple partner's labs We plan to use OpenVPN [9] SSL VPN because we need to be able to create multiple parallel virtual links between a pair of Topology VPN gateways in many distributed virtual topologies. SSL VPN allows to differentiate them using TCP/UDP ports. To ensure OSI layer 3 protocol independence and to allow layer 2 control protocols to pass through virtual links, virtual topology tunnels will be implemented as Layer 2 tunnels. More detailed example of implementing distributed virtual topology in the described way may be found in [8]. 3

4 4. RESERVATION SYSTEM Our general goal during design of the reservation system was to develop a system which allows to share lab equipment in dynamically changing environment and with reasonable level of flexibility. To optimize usage of the whole SVC and thus gain maximum pedagogical effect, we stated the following requirements for the organization of the SVC: There must be a possibility to offer lab pods to solve tasks which require various network topologies. For some tasks, lab devices have to be preconfigured as required for that particular task. There must be a method to offer multiple alternative lab pods suitable to solve particular task in parallel (either by the same or by multiple partners' labs). It is ineffective to dedicate every lab pod for solution of only single fixed task. Lab admins will want to change lab pod topologies over time. Our reservation system is based on the global system noticeboard. Lab administrators advertise lab pods with various topologies and device preconfiguations as available for some time period on the global noticeboard maintained at Common Portal. The description of every task specifies requirements of lab pod on which it can be solved. These requirements include specification of lab devices which may be utilized, device interconnection topology and eventually required preconfiguration of individual devices. When student selects a task to reserve, Common Portal offers him/her those lab pods which can be used to solve required task and times when they are available. The student then reserve a timeslot on particular lab pod. There are no fixed timeslots, students may reserve any timeslot which fits into period during which particular preconfigured lab pod is available, according to the advertisement on the Noticeboard. Using that paradigm, we were able to reach complete decoupling of tasks from preconfigured lab pods and increase flexibility of lab pods usage considerably. Every task just specifies (using so called Preconfiguration Description) requirements for the lab pod suitable to solve the task. At the same time, lab administrators advertise their Preconfiguation Implementations (i.e. lab pods preconfigured according to some Preconfiguration Description) on the global noticeboard. It allows various alternative tasks (with the same topology and preconfiguration requirements) to be solved on the same lab pod. The whole philosophy of is depicted at Figure 4. With regard to various and potentially very different planned usages of the SVC (individual remote work, teacher-controlled work of student's group from the classroom and others), we decided to take group-based reservation approach. It means that timeslots are reserved for groups of users, not for users as individuals. Figure 4: Reservation system philosophy User may create user groups by themselves by listing other users, potentially from multiple partner sites. The creator of the group becomes its owner and may modify or delete it. Group owner may make reservation for his group and all members of the group may equally access the reserved task during the reserved timeslot. Teacher may reserve additional time for checking of students configurations after the end of the timeslot. Every user may also reserve timeslot exclusively for himself/herself, because separate group is automatically created for every single user. Individual remote work is thus handled as a special case of more general group-based reservation paradigm. Reservations are maintained in Reservation Database on the Common Portal. 5. AAA INFRASTRUCTURE To simplify user administration process, we decided to avoid any central authority which manages all user accounts. Instead of that, every partner maintains it's own user database which is accessible to the rest of SVC via Local AAA Server. Using that concept, every partner is responsible for management of his own user accounts. The another advantage is that partners may easily integrate Edinet user databases with existing local user databases and authentication mechanisms, like institution's LDAP or RADIUS servers. Lab admins may also easily perform offline imports of users accounts exported from institutional information systems directly to the Edinet local user database by themselves. Although we assessed usage of PKI and user certificates first, we finally decided to use username/password 4

5 approach to authenticate users to eliminate overhead of handling certificates on both user and SVC side. Working with user certificates would be very difficult on shared classroom computers because of limited students' operating system privileges and potential risk of stealing of student's certificate. Another advantage is that users may even use the same passwords as they use in their home institution for other purposes. Users are assigned names in the format, so usernames are scoped. Users are authenticated in their "home" institutions (implied by realm part of their username) by Local AAA Servers. Together with result of the authentication (true/false), the local AAA server will also return a set of user's attributes (name-value pairs) from local user database. As soon as the user is authenticated, it is allowed to log in to the Common Portal. His/her authorization to perform particular operations is based on the user's roles stored in user database and provided as user attributes by local AAA servers. Shibboleth [10] was chosen as global AAA middleware. 6. SUPPORTING LAB MAINTENANCE SYSTEMS To allow SVC to be operated without constant administrators' interaction, it is necessary to be able to return configurations of lab devices into original preconfigurations before each reserved timeslot automatically. Because of the diversity of utilized lab devices, their configuration interfaces and ways of resetting them to factory defaults, it is not possible to develop a system which will solve this task in genereal. For that reason, we decided to define a SVC component named Configuration Clearing Server, which will be implemented by each partner by himself and will provide unified software interface to the rest of SVC to request reset of individual local lab devices. The real implementation of the cleaning method is left to local administrators. Currently, we expect usage of various power switches to simply power networking device off and on and a system of Shell scripts to reload instances of simulated PCs. We foresee that this mechansm will have to be accompanied by another security measures, such as disallowing users to store configurations into lab devices FLASH, as we do in Virtlab [2]. Power switch may also be optionally made available to students who solve particular task. From students' point of view, switching power of individual lab devices is accomplished using controls of WWW page which makes management interfaces of individual lab devices available to him/her. Since we need to limit user to control power of only those devices that are reserved by him/her during the current timeslot and handle power switches of all manufacturers uniformly, we created a software component called Power Switch Controller which acts as a proxy between user and any kind of real power switch. 7. CONCLUSIONS The SVC architecture presented in the article is now being implemented by Edinet SVC development team of VSB-TU Ostrava. It will be ready during summer 2008 and after period of internal testing and adaptation of partners' labs it will be released for piloting in real distributed teaching environment starting at October The outcomes of the piloting phase will be published. 8. REFERENCES [1] Grygárek, P., Seidl, D., Němec P.: Virtual Network Laboratory for CNAP. Annual Conference of Cisco Networking Academy Program, Brno Available at [April 2007]. [In Czech] [2] Grygárek, P., Seidl, D., Němec, P.: Enabling Access to Equipment of Computer Network Laboratory for Practical Trainging via the Internet. Proceedings of Technologies for E-Learning conference, FEL ČVUT Praha, 2005, ISBN , pp [In Czech] [3] Grygárek, P., Practical Experience with Implementiation of Virtual Computer Network Laboratory and Proposed Ways of its Further Development. Proceedings of Technologies for E-Learning conference, FEL ČVUT Praha, 2006, ISBN , pp [In Czech] [4] Grygárek, P., Milata, M., Vavříček, J.: The Fully Distributed Architecture of Virtual Network Laboratory. Proceedings of ICETA, Stara Lesna, High Tatras, Slovakia, 2007, ISBN [5] Grygárek,P., Milata, M.: Piloting Environment of Distributed Virtual Networking Laboratory. Proceedings of Virtual University, Bratislava, Slovakia, 2007, ISBN , pp [6] Edinet SVC Technical Infrastructure Architecture Design/Remote Access and Lab Interconnection [online], 2005, [cite ], Available at WWW: < Lab_Interconnection>. [7] Edinet Lab Interconnection Implementation Example [online], 2008, [cite ], Available at WWW: < Lab_Interconnection#Lab_Interconnection_Implementati on_example>. [8] TightVNC: VNC-Based Free Remote Control Solution [online], 2007, [cite ], Available at WWW: < [9] OpenVPN - The Open Source VPN [online], 2008, [cite ], Available at WWW: < [10] Shibboleth Project - Internet2 Middleware [online], 2008, [cite ], Available at WWW: < 5

6 THE AUTHOR(S) Petr Grygárek (Ph.D, Msc.) is a professorassistant at Department of Computer Science at VŠB-TU Ostrava. His professional interest is focused on computer networking, distributed systems and computer hardware. He has a couple of years of experience with development of virtual networking laboratory architectures and is a main responsible for semivirtual campus design and its implementation in scope of Edinet project. He is also a coordinator and instructor (CCNP,NS,CCNA) of Regional Cisco Networking Academy at VSB-TU Ostrava. The ideas presented in the article were developed jointly by Edinet WP3 SVC Development Team under supervision of Petr Grygárek. Persons who contributed most to the architecture definition were Ivan Doležal, Jiří Grygárek, Adam Janošek, Tomáš Kučera, Marek Malysz and Martin Milata (in alphabetical order). All of them are empleyees or students of VŠB-TU Ostrava. ACKNOWLEDGEMENT This work presented here is supported by EU Lifelong Learning Programme project E-learning in Distributed Data Network Laboratory (EdiNet). 6

EdiNet (E-learning in Distributed Data Network Laboratory) EU Life Long Learning programme Erasmus / Virtual Campuses 10/2007-9/2009

EdiNet (E-learning in Distributed Data Network Laboratory) EU Life Long Learning programme Erasmus / Virtual Campuses 10/2007-9/2009 EdiNet (E-learning in Distributed Data Network Laboratory) EU Life Long Learning programme Erasmus / Virtual Campuses 10/2007-9/2009 Objectives and outcomes Create common project tools WEB-pages: http://svc-edinet.eu/

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Campus VPN. Version 1.0 September 22, 2008

Campus VPN. Version 1.0 September 22, 2008 Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several

More information

NAC Guest. Lab Exercises

NAC Guest. Lab Exercises NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise

More information

Scenario: IPsec Remote-Access VPN Configuration

Scenario: IPsec Remote-Access VPN Configuration CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create

More information

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Cisco ASA. Administrators

Cisco ASA. Administrators Cisco ASA for Accidental Administrators Version 1.1 Corrected Table of Contents i Contents PRELUDE CHAPTER 1: Understanding Firewall Fundamentals What Do Firewalls Do? 5 Types of Firewalls 6 Classification

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem

More information

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

Virtual and Virtualization Technologies in Computer Networks Education

Virtual and Virtualization Technologies in Computer Networks Education Virtual and Virtualization Technologies in Computer Networks Education Agáta Bodnárová, Martin Hátaš, Kamila Olševičová, Vladimír Soběslav, Jaroslav Štefan Abstract We discuss benefits of different virtual

More information

Scenario: Remote-Access VPN Configuration

Scenario: Remote-Access VPN Configuration CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

Disaster Recovery White Paper

Disaster Recovery White Paper Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase

More information

By Masaya NORIFUSA* ABSTRACT. SAFEBORDER is an SSL VPN appliance product that offers a unique remote access solution to

By Masaya NORIFUSA* ABSTRACT. SAFEBORDER is an SSL VPN appliance product that offers a unique remote access solution to Papers on UNIVERGE Hardware SAFEBORDER as SSL VPN Uniquely Enables New Style of Business Communications by Connecting Corporate Intranets and the Internet Seamlessly By Masaya NORIFUSA* SAFEBORDER is an

More information

What is the Barracuda SSL VPN Server Agent?

What is the Barracuda SSL VPN Server Agent? The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server Application Note: Integrate Juniper SSL VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

Stealth OpenVPN and SSH Tunneling Over HTTPS

Stealth OpenVPN and SSH Tunneling Over HTTPS Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions

More information

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot, Inc. 1/27/2015 Cisco ASA and Workspot Overview The Cisco Adaptive Security Appliance (ASA) provides organizations with secure,

More information

Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team

More information

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

(Discovery 2) Credit value: 10 Guided learning hours: 80. Aim and purpose. Unit introduction. Learning outcomes

(Discovery 2) Credit value: 10 Guided learning hours: 80. Aim and purpose. Unit introduction. Learning outcomes Unit 102: CCNA Working at a Smallto-Medium Business or ISP (Discovery 2) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose D/601/6820 BTEC in IT This unit prepares students

More information

Quidway SVN3000 Security Access Gateway

Quidway SVN3000 Security Access Gateway Quidway SVN3000 Security Access Gateway SSL/IPSec VPN Access Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview With the rapid development and popularization of the Internet, informatization of enterprise

More information

VPN_2: Deploying Cisco ASA VPN Solutions

VPN_2: Deploying Cisco ASA VPN Solutions VPN_2: Deploying Cisco ASA VPN Solutions Description Deploying Cisco ASA VPN Solutions (VPN) 2.0 is the latest update to the Cisco Certified VPN Training that aims at providing network security engineers

More information

Backing Up and Restoring Data

Backing Up and Restoring Data Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc. SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification

More information

Elluminate Live! Access Guide. Page 1 of 7

Elluminate Live! Access Guide. Page 1 of 7 This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document

More information

NAS 323 Using Your NAS as a VPN Server

NAS 323 Using Your NAS as a VPN Server NAS 323 Using Your NAS as a VPN Server Use your NAS as a VPN Server and connect to it using Windows and Mac A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able

More information

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

CareGiver Remote Support Information Technology FAQ

CareGiver Remote Support Information Technology FAQ CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

PassTest. Bessere Qualität, bessere Dienstleistungen!

PassTest. Bessere Qualität, bessere Dienstleistungen! PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : JN0-314 Title : Junos Pulse Access Control, Specialist (JNCIS-AC) Version : Demo 1 / 6 1.A customer wants to create a custom Junos Pulse

More information

Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN

Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Objective Scenario Topology In this lab, the students will complete the following tasks: Enable policy lookup via authentication, authorization,

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X QUICK START GUIDE Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X 1 Package Contents 1 Powering On the ASA 2 Connecting Interface Cables and Verifying Connectivity

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Virtualized Open-Source Network Security Appliance

Virtualized Open-Source Network Security Appliance Virtualized Open-Source Network Security Appliance By Daniel Secrist Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN

Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team In this lab, the student will learn the

More information

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved. Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Elluminate Live! Access Guide. Page 1 of 7

Elluminate Live! Access Guide. Page 1 of 7 This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Email Proxy POP3S. then authentication occurs. POP3S is for a receiving email. IMAP4S. and then authentication occurs. SMTPS is for sending email.

Email Proxy POP3S. then authentication occurs. POP3S is for a receiving email. IMAP4S. and then authentication occurs. SMTPS is for sending email. Email proxies extend remote email capability to users of Clientless SSL VPN. When users attempt an email session via email proxy, the email client establishes a tunnel using the SSL protocol. The email

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Manažment v teórii a praxi 3/2007

Manažment v teórii a praxi 3/2007 SECURITY AND FINANCIAL VIABILITY OF MIXED NETWORKS CONSISTING OF PRODUCTION AND TEST ENVIRONMENTS Dominik VYMĚTAL ABSTRACT Companies using both and test networks in order to present their products and

More information

SSL-Based Remote-Access VPN Solution

SSL-Based Remote-Access VPN Solution Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated

More information

CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions

CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions Overview The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure,

More information

Benefits of the Integrated Firewall in Anonyproz OpenVPN GUI Client

Benefits of the Integrated Firewall in Anonyproz OpenVPN GUI Client HOW TO FORCE ALL APPLICATIONS ON WINDOWS TO CONNECT TO INTERNET ONLY THROUGH OPENVPN USING ANONYPROZ CUSTOMIZED OPENVPN GUI CLIENT -Anonyproz OpenVPN Client Installer Keeps You From Blowing Your Anonymity

More information

Using ipass Secure Anywhere. Secure Remote Access for Hallmark Independent Retailers

Using ipass Secure Anywhere. Secure Remote Access for Hallmark Independent Retailers Secure Remote Access for Hallmark Independent Retailers ipass Inc. Managed Network Services 125 Technology Drive, Suite 100 Irvine, CA 92618 USA www.ipass.com +1 949-681-5076 +1 949-681-5114 fx TABLE OF

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Acellus Lab Cart. User s Manual. Version 4B. Acellus Corporation www.acellus.com. Copyright 2010 Acellus Corporation. All Rights Reserved.

Acellus Lab Cart. User s Manual. Version 4B. Acellus Corporation www.acellus.com. Copyright 2010 Acellus Corporation. All Rights Reserved. Acellus Lab Cart User s Manual Version 4B Acellus Corporation www.acellus.com 1 Table of Contents Using Acellus... 3 Acellus Lab Cart and Server... 3 Acellus Laptops... 3 Acellus Updates... 4 Accessing

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

DualShield Authentication Platform

DualShield Authentication Platform Quick Start Guide (Version 5.7) Copyright 2013 Deepnet Security Limited Copyright 2013, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,

More information

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved. Cisco ASA Implementation Guide (Version 5.4) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,

More information

Cisco SSL Encryption Utility

Cisco SSL Encryption Utility About SSL Encryption Utility, page 1 About SSL Encryption Utility Unified ICM web servers are configured for secure access (HTTPS) using SSL. Cisco provides an application called the SSL Encryption Utility

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

SSL VPN A look at UCD through the tunnel

SSL VPN A look at UCD through the tunnel SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Data Sheet Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access

More information

SAML 2.0 SSO Deployment with Okta

SAML 2.0 SSO Deployment with Okta SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment

More information

SANGFOR SSL VPN. Quick Start Guide

SANGFOR SSL VPN. Quick Start Guide SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

Device Interface IP Address Subnet Mask Default Gateway

Device Interface IP Address Subnet Mask Default Gateway Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information