Accessing the Mercy Remote Access Portal (SSL VPN)

Similar documents
How to Use Remote Access Using Internet Explorer

Windows and MAC User Handbook Remote and Secure Connection Version /19/2013. User Handbook

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access)

IMS Health Secure Outlook Web Access Portal. Quick Setup

Remote Access: Internet Explorer

How do I use Citrix Staff Remote Desktop

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

DIS VPN Service Client Documentation

Virtual Desktop and SSL VPN access with OnDemand tokencode. User Guide

Remote Access End User Reference Guide for SHC Portal Access

This document shows new Citrix users how to set up and log in to their Citrix account.

my.airproducts.com Windows Vista Client Configuration

Web Meetings through VPN. Note: Conductor means person leading the meeting. Table of Contents. Instant Web Meetings with VPN (Conductor)...

Access to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop.

Citrix Remote Access Work Instructions

Logging into Citrix (Epic) using an RSA Soft Token - New RSA User

UMMS SSL VPN Instructions

CWOPA Broadband Users. Windows Operating System

REMOTE ACCESS USER GUIDE

Microsoft Windows Installation and Troubleshooting Guide

extranet.airproducts.com Windows XP Client Configuration

Installing the Citrix Online Plug-In

Allianz Global Investors Remote Access Guide

MRU Secure Remote Access Service (SRAS) External User Guide

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC

Allianz Global Investors Remote Access Guide

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide

Instructions for installing Citrix Receiver

Mercy s Remote Access Instructions

WMC Cerner Millennium Application Portal User guide

1. Accessing the LONZA network from a private PC or Internet Café

Connecting to Pitt s SRemote VPN Using Windows Vista / Windows 7 January 2012

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0

Access to Webmail services via a Non Trust Computer

Remote Access: Citrix Client Setup

mystanwell.com Installing Citrix Client Software Information and Business Systems

These instructions will allow you to configure your computer to install necessary software to access mystanwell.com.

Dial-up Installation for CWOPA Users (Windows Operating System)

Installing the Cisco AnyConnect YSU VPN Client Windows XP or later

Manufacturing Representative SSL VDM Login User s Guide

Using the FDO Remote Access Portal

Citrix Client Install Instructions

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

MY HELPDESK - END-USER CONSOLE...

Installing/Using OnsiteHealth on a Windows XP PC. 4. Accessing the Metaframe/Citrix Desktop via the VPN. Introduction

Install and End User Reference Guide for Direct Access to Citrix Applications

VPN User Guide. For PC

Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN

OCS Client Installation - Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007

How To Use The Syndicate Bank Rsa Security Token For Internet Banking On Pc Or Mac Or Mac (For A Web Browser) For A Long Time (For An Ipad) For Free (For Free) For An Unlimited Time) For Your

SSL VPN INSTALLATION, UPGRADE, USAGE INSTRUCTIONS Windows XP

Accessing the Media General SSL VPN

Information Technology Department. Miller School of Medicine New User Guide

Barbara Ann Karmanos Cancer Institute. Instructions for Installing Cisco Systems VPN Client

SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here:

Instructions for Using Secure . (SMail) via Outlook Web Access. with an RSA Token

EURECOM VPN SSL for students User s guide

LSGMI REMOTE DESKTOP SERVICES.

RSA SecurID Ready Implementation Guide

MetroHealth Information Services

Accessing TP SSL VPN

Secure Global Desktop (SGD)

Remote Access End User Guide (Cisco VPN Client)

Coillte IT has recently upgraded the Remote Access Solution to a new platform.

Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet

VPN Web Portal Usage Guide

Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)

IT Handbook. Contents

USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP)

MRU Secure Remote Access Service (SRAS) External User Guide

Contents. VPN Instructions. VPN Instructions... 1

How to Set Up SSL VPN for Off Campus Access to UC eresources

CITRIX TROUBLESHOOTING TIPS

SSL VPN Setup for Windows

Installation Guide for CMSNet Remote Users. December 15, 2014

Helpdesk

Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN

OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL

MySabre with Sabre VPN

Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7

A Guide to the Tufts Network School of Arts and Sciences School of Engineering Fletcher School of Law and Diplomacy

Microsoft Office 365 with MailDefender

UMass Amherst Secure Access Service Juniper and Junos VPN

Using the FDO Remote Access Portal

Remote Access Services Microsoft Windows - Installation Guide

How to Remotely Access the C&CDHB Network from a Personal Device

Tips & Tricks SSL VPN - Windows

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Software Installation Requirements

How To Use A Pvpn On A Pc Or Mac Or Ipad (For Pc) With A Password Protected (For Mac) On A Network (For Windows) On Your Computer (For Ipad) On An Ipad Or Ipa

Windows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run.

Load Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL

User Guide Microsoft Exchange Remote Test Instructions

IMAP and SMTP Setup in Clients

MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB

Verizon Remote Access User Guide

Transcription:

MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote Access Portal, you will need to complete the following steps. ** Important: If you are running Microsoft Windows XP SP2, or Microsoft Windows Vista, you will need to install the appropriate software by clicking the links in the corresponding section of the page shown below.** 1.) Establish Internet Connectivity. Verify that you can access http://www.google.com This must be completed before continuing to step 2. Without Internet Connectivity you will not be able to access the Mercy s Remote Portal. 2.) Using your web browser, connect to http://remote.mercy.net. This will take you to a page similar to the following: MERCY INFORMATION SECURITY TEAM

3.) **Notice for Windows Vista and Windows XP SP2 Users*** o Windows Vista Users should install the Trust Mercy Domains (trustmercy.exe) application, the Juniper Installer Service for Non-Mercy/Open Access Machines, and the Network Connect Client prior to authenticating. o Windows XP Users should install the Microsoft Windows XP SP2 Patch prior to authenticating. *** These files can be found in the corresponding sections of the login page. *** 4.) Enter your Username in the Username box and enter your Password in the Password box. o If you are using an RSA SecurID Token for authentication, please enter your pin + your RSA Tokencode in the Password box. For example, if your Pin number is 1234 and the current RSA Tokencode is 234836, then your password would be 1234234836. The Pin number will always stay the same, while the RSA Tokencode will change every minute. Important: For first time use, there is no PIN number. Just enter the tokencode. You will be prompted to create a 4-8 character alpha-numeric PIN, reenter that PIN and then you will be logged out of the system. Repeat steps 3 and 4 to gain access. o If you are using Microsoft s Active Directory for Authentication then enter your Active Directory password in the Password box. Important: This password must meet length and complexity requirements to be used for access from the internet. If your password does not meet the requirements, you will be redirected to a web page that outlines the requirements. Once your password meets the requirements and has been successfully audited, you will be allowed to use it for authentication. Your password must be at least 7 characters long Your password should not appear in any dictionary Your password must contain both numbers and letters Your password must contain at least one special character Your password must be changed every 45 days MERCY INFORMATION SECURITY TEAM 2

4.) Please choose your authentication method from the drop-down box (Most Coworkers will choose SMRCY.COM) 5.) Please choose the appropriate role from the list displayed. The role determines which bookmarks, connection tools, etc. will be available to you. This list and the order of its contents may change as more roles are added. MERCY INFORMATION SECURITY TEAM 3

6.) If you see a yellow bar appear across the top of your web browser window, just below the address bar, please click the bar and allow the activex application to install. MERCY INFORMATION SECURITY TEAM 4

7.) Click on the Yes button if any of the following Windows pop up regarding the installation of NeoterisSetup.cab, Network Connect, Secure Application Manager, or Secure Meeting from Juniper Networks 8.) You may see the following Window. Please wait. MERCY INFORMATION SECURITY TEAM 5

9.) Once the installation of the Network Connect application is complete you will arrive at a screen similar to the screen displayed below. You are now connected to the Remote Access Portal. You will be able to click on the bookmarks to browse web enabled applications. The column on the left gives you access to other applications such as Terminal Sessions, and Terminal Services Sessions. As long as the Network Connect Application is running (Circled Above), you will be able to launch the native Outlook client to get to your email, run locally installed applications, browse network file shares, etc. If you are not using your corporate laptop you will need to access your email through the appropriate Webmail bookmark. MERCY INFORMATION SECURITY TEAM 6

XP SP2 Instructions Only applicable to Windows XP Service Pack 2 users. Click on the link from the Login Page for the Microsoft Windows XP SP2 Patch Follow the link and download the file. Save the file to your pc MERCY INFORMATION SECURITY TEAM 7

Click on the file that you just saved and click on the RUN When the file finishes the install, it may ask you to reboot. After rebooting, you should now be ready to login to Neoteris. (Go back to Step #1 of this document) MERCY INFORMATION SECURITY TEAM 8

Windows Vista and/or IE8 users Instructions Only applicable to Windows Vista and/or IE8 users. 1. Download and install the Juniper Installer Service with Mercy Trusted Sites referenced under the Help button on the remote.mercy.net login page. 2. Download and and install the appropriate Network Connect Client for the version of the Windows operating system that you are running. 3. Browse back to the main portal page and logon/authenticate normally. 4. If a message similar to the following comes up, this means that Windows Vista s User Access Control (UAC) is enabled on your machine and your computer is asking for permission to install an add-on component. Please allow this component to install by clicking Continue. MERCY INFORMATION SECURITY TEAM 9

5. Once the necessary Juniper components have installed, your portal will be available. MERCY INFORMATION SECURITY TEAM 10

Click on Mercy Connect MercyConnect Instructions The following screen will be displayed. If you need to install a Citrix Web client, then you will get the following Window. Click on the Yes button. MERCY INFORMATION SECURITY TEAM 11

If a new Citrix Web client is installed for you, then the following Window will pop up. Click on the OK button. Type in your network username and network password, and choose your domain. Then click on the Submit button. (The Enter key doesn t work on this page) Mercy Connect will show a web view of Citrix Program Neighborhood. Click on the icon that you need, or click on one of the subfolders to bring up other icons. MERCY INFORMATION SECURITY TEAM 12

MERCY INFORMATION SECURITY TEAM 13

Utilizing Web Conference Software built into Neoteris. * Note: There is a 25 user and 10 simultaneous meeting limit on the software. * This software is intended for several purposes. Mercy Employees who need to host a meeting with external contacts (vendors or traveling employees) Mercy Helpdesk to aid in troubleshooting application and connectivity issues. Mercy Employees who need to troubleshoot application issues with vendors. There are four parts to this instruction sheet. Setting up a meeting New Meeting Instructions. Instant Meeting Instructions. How to operate Meeting Software. MERCY INFORMATION SECURITY TEAM 14

Setting Up a Meeting Connect to the SSL VPN (http://remote.mercy.net) and successfully authenticate. From the Neoteris welcome screen seen below. Click on Secure Meeting Only (Circled) This will bring you to the following screen. Click Meetings (Cricled) MERCY INFORMATION SECURITY TEAM 15

This page displays meetings which are currently scheduled on the Neoteris. From this page you can schedule an upcoming meeting (New Meeting) or an Instant Meeting. MERCY INFORMATION SECURITY TEAM 16

New Meeting Instructions: After clicking on New Meeting you will be greeted with the following screen. You must fill out the form to schedule the meeting. Verify that your email is recognized in the email window (Circled). It should read your email back to you, and not <email missing>. You can fix this by clicking Set Email and adding your email address. Click Finish. A meeting will appear in the Neoteris window confirming your meeting, and an automatic email will be sent to your email address. This email will detail the confirmed meeting. Forward this on to all other attendees using Outlook. Example of the meeting invitation to be forwarded is below. MERCY INFORMATION SECURITY TEAM 17

MERCY INFORMATION SECURITY TEAM 18

Instant Meeting Instructions: Click on Instant Meeting You will be taken to the following screen. Take note of the Meeting URL and Password Fields. You will need to pass these on to other attendees. There is no email generated for an Instant Meeting. If you start the meeting without the noted fields you can view them again by clicking on Meeting and then selecting details on the Neoteris screen (Circled below). MERCY INFORMATION SECURITY TEAM 19

The details screen will look similar to the screen below. The attendees will go to http://remote.mercy.net/meeting and enter the meeting ID (Circled) and password (Circled). MERCY INFORMATION SECURITY TEAM 20

How to Operate Meeting Software. From the meeting software window you can perform several options. Determine who is in control of the Meeting. These are all initially controlled by the meeting organizer, but can be passed on to attendees. Controller Determines who is in control of the applications currently on the screen. Presenter Determines who is in control of the presentation. Conductor Determines who controls actions within the meeting. Request Control Others can request control of the applications after they are shared. Remove Kicks users out of the meeting. There is also a toolbar which will be running across the top of the screen which will allow the same and additional functions. You can hide this toolbar by selecting the thumbtack on the top left. Sharing - This is an integral part of Meeting. This option allows users to share their applications and/or desktop with others. To share applications click Sharing. You will be prompted with the following screen. MERCY INFORMATION SECURITY TEAM 21

You can share applications by placing a check box in the appropriate squares. By clicking on Share Desktop and All Applications you will give other attendees the ability to view everything currently running on your PC. After sharing applications you can release control to other users by using the buttons described above. ** Be very careful with this functionality, users will have control of applications running on your PC. ** Chat Gives the ability to text chat with other meeting attendees. To chat, click inside the box (Circled Below), type in your message, and click Send. Drawing Gives you the ability to highlight specific items on the screen by drawing shapes or adding text. For example in the following screen I have highlighted the meeting URL and password in yellow. MERCY INFORMATION SECURITY TEAM 22

** If you turn on drawing you will freeze the screen. In order to regain control of the applications you will need to turn off drawing** MERCY INFORMATION SECURITY TEAM 23