GTA SSL Client & Browser Configuration



Similar documents
GB-OS Version 5.3. GTA SSL Sentinel. Tel: Fax Web:

GTA SSO Auth. Single Sign-On Service. Tel: Fax Web:

Configuring GTA Firewalls for Remote Access

GTA SSO Auth. Single Sign-On Service. Tel: Fax Web:

Installing the SSL Client for Linux

GB-OS. Certificate Management. Tel: Fax Web:

Installing the IPSecuritas IPSec Client

GB-OS Version 6.2. Configuring IPv6. Tel: Fax Web:

Installing the Shrew Soft VPN Client

Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall

Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO

Technical Document. Creating a VPN. GTA Firewall to Linksys Cable/DSL Router TDVPNLINKSYS

Technical Document. Creating a VPN. GTA Firewall to Cisco PIX 501 TDVPNPIX

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall

GNAT Box VPN and VPN Client

Release Notes for Version

Shrew Soft VPN Client Configuration for GTA Firewalls

Configuring Global Protect SSL VPN with a user-defined port

BASIC FIREWALL SERVICES

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

DameWare Server. Administrator Guide

CA Unified Infrastructure Management Server

Contents Notice to Users

SSL SSL VPN

Web Remote Access. User Guide

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Sophos UTM. Remote Access via SSL. Configuring UTM and Client

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

How to Create a Basic VPN Connection in Panda GateDefender eseries

HP Device Manager 4.7

Configuring SSL VPN on the Cisco ISA500 Security Appliance

axsguard Gatekeeper Open VPN How To v1.4

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

v6.1 Websense Enterprise Reporting Administrator s Guide

BlackBerry Enterprise Service 10. Version: Configuration Guide

Clientless SSL VPN Users

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Setup Guide Access Manager 3.2 SP3

Strong Authentication for Cisco ASA 5500 Series

Sample Configuration: Cisco UCS, LDAP and Active Directory

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

Overview. Author: Seth Scardefield Updated 11/11/2013

Installation Guide Supplement

Secure Web Service - Hybrid. Policy Server Setup. Release Manual Version 1.01

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

Web Security Firewall Setup. Administrator Guide

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

Setup Guide Access Manager Appliance 3.2 SP3

Interworks. Interworks Cloud Platform Installation Guide

2 Downloading Access Manager 3.1 SP4 IR1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

SSL VPN User Guide Access Manager 3.1 SP5 January 2013

CA Nimsoft Monitor Snap

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Installation Guide. SafeNet Authentication Service

Scan to FTP Guide. Version 0 ENG

Heroix Longitude Quick Start Guide V7.1

2X Cloud Portal v10.5

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series

Avalanche Remote Control User Guide. Version 4.1.3

Integrated Citrix Servers

WHITE PAPER Citrix Secure Gateway Startup Guide

NAS 323 Using Your NAS as a VPN Server

Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0

DIGIPASS Authentication for SonicWALL SSL-VPN

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Installing Management Applications on VNX for File

Citrix Access Gateway Plug-in for Windows User Guide

Setting Up Scan to SMB on TaskALFA series MFP s.

Server Installation Guide ZENworks Patch Management 6.4 SP2

CA Nimsoft Unified Management Portal

CA VPN Client. User Guide for Windows

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

User's Guide. Product Version: Publication Date: 7/25/2011

F-Secure Messaging Security Gateway. Deployment Guide

AIMS Installation and Licensing Guide

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

2X HTML5 Gateway v10.6


Cisco TelePresence Management Suite Provisioning

LumInsight CMS Installation Guide

SWsoft, Inc. Plesk VPN. Administrator's Guide. Plesk 7.5 Reloaded

Dell Statistica Statistica Enterprise Installation Instructions

Telephony System Integrator s Guide for ShoreTel. Citrix EasyCall Gateway 3.0

HP OpenView Adapter for SSL Using Radia

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

CA Spectrum and CA Embedded Entitlements Manager

TRITON - Web Security Help

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

CA Nimsoft Service Desk

2X SecureRemoteDesktop. Version 1.1

How To Configure SSL VPN in Cyberoam

Configuration Guide BES12. Version 12.2

Transcription:

GB-OS Version 6.1 GTA SSL Client & Browser Configuration SSL201203-02 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com

Table of Contents Introduction...3 Requirements 3... 4 Creating a Certificate Authority (CA) Certificate 4 Defining Bookmarks 4 Defining a Group for the SSL Client 5 Defining a User on the Firewall 6 Defining Remote Access Preferences 7 Enabling the SSL Client 9 Creating Security Policies for SSL Client Access 10 Log Messages... 11 Firewall 11 SSL Client 12 Troubleshooting...13 2 Table of Contents

Introduction The purpose of this document is to assist GB-OS users in the installation, configuration and use of the GTA Firewalls SSL Service. GTA s SSL Service has two components: Browser The SSL Browser provides client-less remote network access. Using a standard Web browser, users launch a customized Web portal (the SSL Browser) for access to files, applications and internal and external web sites. Supported protocols include http, https, ftp, ftps, and cifs. Client The SSL Client is a remote access VPN client that uses SSL to establish a secure, encrypted connection to the network firewall. Via the SSL Browser, the SSL Client is downloaded and installed to the authorized remote user s machine. Browser access for SSL users is determined by their group privileges. Some users may only have access to browse files and only use bookmarks. While other users may have access to browse any internal host using http, https, CIFS or ftp. In addition, users may be restricted to read only access for browsing or have upload and download access. Client access is also determined by group privileges. A user must have SSL Browser capability in order to have Client access. The SSL Client is downloaded via the SSL Browser interface for each user. Requirements GB-OS version 5.3.0 or higher Introduction 3

SSL has seven (7) configuration sections: 1. Creating a Certificate Authority (CA) Certificate 2. Defining Bookmarks 3. Defining Groups 4. Defining Users 5. Defining Remote Access Preferences 6. Enabling the SSL Client 7. Creating Security Policies for SSL Client Access Creating a Certificate Authority (CA) Certificate Create a Certificate Authority (CA) Certificate to sign all other Certificates. 1. Navigate to Configure>VPN>Certificates. 2. Set the section to default. The firewall will automatically generate a new CA and Remote Administration certificate, and assign them as CA, Remote Administration, and VPN certificate. Below is an example of the CA, Remote Administration, and VPN certificates. Figure 1: Creating Certificates Note See the GB-OS Users Guide for more information on creating firewall certificates. Defining Bookmarks Bookmarks are shortcuts for users when logged in to the SSL Browser. 1. Navigate to Configure>Objects>Bookmark Objects. 2. Edit an existing bookmark or create a new one. Figure 2: Defining Bookmarks 4 Table 1: Bookmarks Field Default Description Disable Unchecked Disables bookmarks. Name Blank Object name referenced in groups section and in other bookmarks. Description Blank Brief description of the bookmark object s purpose. Label Blank Bookmark label displayed to the user when logged into the SSL Browser interface.

Field Default Description Table 1: Bookmarks Bookmarks Object User Defined Set to <user define> to define the bookmark or reference other bookmarks. Icon None Select an icon to represent the bookmark object. Options include None, Browser, Document, Email, Folder, Network and Web. Label Blank Link label as displayed to the user in the SSL Browser. Type cifs Select the protocol to be used to connect to the URL. Specify http, https, ftp, or cifs. URL Blank IP address or host name. Description Blank User defined. Briefly description of the bookmark s purpose. Defining a Group for the SSL Client 1. Navigate to Configure>Accounts>Groups. 2. Create a New group, or edit an existing group. 3. Enable SSL. 4. Enable Bookmarks Only and Read Only as applicable. Bookmarks Only will authorize users to only access configured bookmarks and will not allow browsing of internal networks. Read Only will only allow users to download files, disabling the upload feature. 5. Select the group bookmarks authorized for the user in the Bookmarks pulldown. 6. Enable the Client to authorize SSL Client access for the configured group. Figure 3: Defining a Group Table 2: Defining Groups Field Default Description SSL Browser Enable Unchecked Enables SSL Browser access. Bookmarks Checked Displays only Bookmarks for SSL Browser access. Only Read Only Checked Read only access. Users can only download files via the browser. Bookmarks Not Selected Displays the defined bookmarks for the group. Client Enable Unchecked Allows SSL Client access. 5

Defining a User on the Firewall 1. Navigate to Configure>Accounts>Users 2. Select the SSL group previously configured. 3. Assign the SSL certificate previously defined or generate a new certificate. 4. Enter the password the user will use to login to both SSL Browser, and SSL Client. Figure 4: Defining a User Note User certificates used for the SSL Client MUST be signed by a CA. Field Default Description Table 3: Defining Users Disable Unchecked Disables the user. Identity Blank The name used to authenticate the connecting user. This must be a unique name. Minimum of 3 characters. Full Name Blank Name to identify the user. Minimum of three (3) characters. Description Blank User defined description for the user. Primary Group Users Primary group for specifying the type of access allowed for SSL. Also used in security policies for authentication. Certificate Generate Generate automatically creates a user certificate based on user definition, or select a predefined certificate. Authentication Password Blank Password for user to authenticate with the firewall. Minimum of four (4) characters. 6

Defining Remote Access Preferences GTA SSL Client & Browser 1. Navigate to Configure>VPN>Remote Access>Preferences 2. Enable an alternative port. By default, the SSL Browser is listening on TCP port 443. Administrators may choose to allow browser access on an alternate port and restrict 443 to firewall administrators only, or change the Administrator port. 3. Select and enable authentication methods LDAPv3 or RADIUS. 4. Select the encryption level to be used. 5. Define the time out range for the SSL Browser. Valid time out range is 5-1440 minutes. 6. Select the desired use of the virtual keyboard for logins. The virtual keyboard can be required, enabled to use or not use, or disabled and turned off. 7. Enable automatic policies as desired and select the zone and source address for connections. 8. Optionally, create a customized login screen for the Remote Access Portal displaying a title, logo and disclaimer message which will appear upon login. Figure 5: Enabling the SSL Browser Table 4: Remote Access Preferences Field Default Description Alternative Port Enable Unchecked Starts the SSL Browser service. Port 443 Port through which browser access will be allowed. Default is TCP port 1443. Authentication LDAP Unchecked Enables LDAP users. 7

Field Default Description Table 4: Remote Access Preferences RADIUS Unchecked Enables RADIUS users. Advanced Encryption High Level of encryption to be used. See table below for more information. Time out Sessions 10 minutes Define the time out range. Valid range is 5-1440 minutes. Virtual Keyboard Require Require: requires users to use the virtual keyboard for logins to the browser interface; Enable: allows users to use or not use the virtual keyboard; Disable: turn off the virtual keyboard Automatic Policies Enable Checked Allows the firewall to automatically create policies for SSL Browser access. Zone ANY Specifies the Zone which will be allowed to connect. Options are External, Protected, and PSN. Source Address ANY_IP Specifies the source address allowed to connect. Customization Login Title User Define Enter a customized title for the SSL Browser. Logo User Define Upload a logo to be displayed on the SSL login. Images must be 32 x 32 pixels and 100 KB or less. JPEG, PNG, or GIF formats are accepted. Disclaimer Enable Unchecked Enable the disclaimer message to appear upon login. Message User Define Enter a disclaimer, note or welcome to appear when users login to the SSL Browser. Characters Remaining Uneditable Character count field detailing the number of characters remaining for the disclaimer message. Maximum characters is 4095. Table 5: Encryption Levels Level Key Strength Description None N/A Disables SSL encryption All N/A Accepts low, medium and high levels of encryption Low 40-, 56-, 64-bit A low level SSL encryption Medium 128-bit A medium level SSL encryption High 168-bit A high level SSL encryption 8

Enabling the SSL Client Note GTA SSL Client & Browser 1. Navigate to Configure>VPN>Remote Access>SSL Client 2. Check the Enable check box to enable the SSL Client Service 3. For Accessible Network, select an object or enter a user defined address for the networks accessible through the SSL Client Tunnel 4. For Client DHCP Network, select an object or enter a user defined address for the network that will be used as the Client DHCP Address Pool. The first address in the range will be reserved and assigned to the firewall as tun0 interface. 5. Configure domain, DNS servers and WINS servers that will be assigned to the client. Figure 6: Enabling the SSL Client Table 6: SSL Client Field Default Description Enable Enabled Starts the SSL Client Service. Port 1194 Port for SSL Client access. Accessible Networks FW Network - Local Default Local Protected Networks. Client DHCP Network Pool - SSL Default DHCP range of 192.168.72.0/24 Domain User Define Domain assigned to SSL Client. Name Server IP Address User Define DNS server(s) pushed to SSL Client. WINS Server IP Address User Define WINS server pushed to SSL Client. Advanced Automatic Policies Enabled Creates an auto policy based on SSL port. Encryption Objects AES-192, sha1, grp2 Encryption used for SSL. Lifetime 480 minutes Re-key time, in minutes. Allow Duplicate CN Unchecked Allows duplicate certificates. Override Host Name Blank Allows an administrator to override default firewall host name, which is configured in Network Settings. Entry can be an IP address or a fully qualified host name. Redirect Client Gateway Unchecked Force all client connections via VPN. UDP Unchecked Use UDP instead of TCP for SSL connection. Use Compression Checked Disable to not use compression. Verbose Logging Unchecked Increase SSL logging for debug purposes. 9

Note Changes to the SSL Client configuration for port, encryption, override host name, and compression will require new client downloads. Creating Security Policies for SSL Client Access 1. Navigate to Configure>Security Policies>Policy Editor>VPN>SSL Client. 2. By default, all in and out is allowed and access to the firewall administration interface using https is denied. Pings to the firewall are also allowed. 3. The default SSL Client policies are displayed below. It is recommended that SSL policies are configured based on your corporate security policy. Figure 7: Creating Security Policies 10

Log Messages Firewall Licenses Exceeded messages OpenVPN client connections. Default user licenses is 2 users, additional user licenses may be requested via GTA sales. Sep 16 14:33:27 pri=3 msg= OpenVPN: MULTI: new incoming connection would exceed maximum number of clients (2) type=mgmt,vpn Close Tunnel OpenVPN: Sep 16 14:33:20 pri=5 msg= Close inbound, openvpn proto=53/udp src=192.168.72.3 srcport=48517 dst=192.168.71.9 dstport=53 rule=4 duration=22 sent=59 rcvd=130 pkts _ sent=1 pkts _ rcvd=1 Block Message Remote Access (Interface tun0 is SSL Client interface): Sep 16 14:23:17 pri=4 pol _ type=rap pol _ action=block count=12 msg= Block RAP duration=30 rule=6 proto=443/tcp src=192.168.72.2 srcport= 44323 (3), 44328 (3), 44362 (3), 44363 (3) dst=192.168.71.254 dstport=443 interface= tun0 attribute= alarm flags=0x2 User Login Failure: Sep 16 15:59:50 pri=3 msg= OpenVPN: 192.168.73.1:55642 TLS Auth Error: Auth Username/ Password verification failed for peer type=mgmt,vpn Compression is disabled on firewall and not in the client configuration. Compression is enabled or disabled in Configure>VPN>SSL Client>Advanced in firewall interface. The use compression option comp-lzo sets compression for the client. Sep 16 16:32:27 pri=4 msg= OpenVPN: 192.168.73.1:59205 WARNING: comp-lzo is present in remote config but missing in local config, remote= comp-lzo type=mgmt,vpn Compression is enabled on firewall and not in the client configuration. Compression is enabled or disabled in Configure>VPN>SSL Client>Advanced in firewall interface. The use compression option comp-lzo sets compression for the client. Sep 16 16:40:21 pri=4 msg= OpenVPN: 192.168.73.1:60094 WARNING: comp-lzo is present in local config but missing in remote config, local= comp-lzo type=mgmt,vpn Firewall and client have mis matched configuration options for Encryption. This is configured in Configure>VPN>SSL Client>Advanced, or by setting cipher option on the client. Sep 16 16:47:52 pri=4 msg= OpenVPN: 192.168.73.1:60939 WARNING: cipher is used inconsistently, local= cipher AES-128-CBC, remote= cipher AES-192-CBC type=mgmt,vpn Sep 16 16:47:52 pri=4 msg= OpenVPN: 192.168.73.1:60939 WARNING: keysize is used inconsistently, local= keysize 128, remote= keysize 192 type=mgmt,vpn Remote server the proxy is attempting to connect to has an invalid certificate. Sep 21 15:21:41 pri=3 msg= SSL: SSL certificate problem, verify that the CA cert is OK. Details:\\0Aerror:14090086:SSL routines:ssl3 _ GET _ SERVER _ CERTIFICATE:certificate verify failed type=mgmt proto=http/tcp user= support@ gta.com src=192.168.73.1 srcport=4869 dst=192.168.73.2 dstport=1443 duration=26 Log Messages 11

SSL Client User Login Failure: Verify the login credentials. Wed Sep 16 15:59:53 2009 AUTH: Received AUTH _ FAILED control message Compression is enabled on firewall and not in the client configuration. Compression is enabled or disabled in Configure>VPN>Remote Access>SSL Client>Advanced in firewall interface. The use compression option comp-lzo sets compression for the client. Wed Sep 16 16:40:22 2009 WARNING: comp-lzo is present in remote config but missing in local config, remote= comp-lzo Compression is disabled on firewall and not in the client configuration. Compression is enabled or disabled in Configure>VPN>Remote Access>SSL Client>Advanced in firewall interface. The use compression option comp-lzo sets compression for the client. Wed Sep 16 16:46:20 2009 WARNING: comp-lzo is present in local config but missing in remote config, local= comp-lzo Firewall and client have mis matched configuration options for Encryption. This is configured in Configure>VPN>Remote Access>SSL Client>Advanced, or by setting cipher option on the client. Wed Sep 16 16:50:22 2009 WARNING: cipher is used inconsistently, local= cipher AES-192-CBC, remote= cipher DES-EDE3-CBC Client is unable to resolve the address of the firewall. Confirm firewall has fully qualified host name configured in Network>Interface Settings>Host name field. The host name resolves correctly. Fri Sep 18 08:24:24 2009 RESOLVE: Cannot resolve host address: dbtest.gta.com: [HOST _ NOT _ FOUND] The specified host is unknown. SSL Client is unable to use the Self Signed Certificates. To resolve this issue you will need to make sure that both the Client and Firewall VPN Certificates have been signed by a CA. Certificates can be managed in Configure>VPN>Certificates. Wed Nov 18 14:43:46 2009 VERIFY ERROR: depth=0, error=self signed certificate: / emailaddress=support@gta.com/o=gta/c=us/cn=fw _ VPN _ CERTIFICATE 12 Log Messages

Troubleshooting If your question is not answered below, please contact GTA Support for more information. Q: When attempting to download the client I get the message, Error: Unable to create SSL Client configuration bundle. Check that the Override Host Name in Configure>VPN>Remote Access>SSL Client is a single IP or name and not a network. Figure 1: Client Error Message Q: When attempting to download the configuration file, a user gets the message Error: Unable to create SSL Client configuration bundle. User has a self signed certificate or the firewall certificate is self signed. Re-create the firewall VPN, users or both certificates using the firewall CA. See the GB-OS Users Guide for more information on certificate maintenance. Q: The firewall logs the following message when users attempt to download the configuration bundle: Mar 12 15:57:26 pri=3 msg= SSL: VPN certificate VPN, must be signed by the CA certificate gb-2000x-10-10-1 CA type=mgmt user= gtauser src=199.201.225.20 srcport=55193 dst=199.120.225.80 dstport=1443 duration=5 Mar 12 15:57:26 pri=3 msg= SSL: User certificate gtauser, must be signed by the CA certificate gb-2000x-10-10-1 CA type=mgmt user= gtauser src=199.201.225.20 srcport=55193 dst=199.120.225.80 dstport=1443 duration=5 User has a self signed certificate or the firewall certificate is self signed. Re-create the firewall VPN, users or both certificates using the firewall CA. See the GB-OS Users Guide for more information on certificate maintenance. Troubleshooting 13

Copyright 1996-2012, Global Technology Associates, Incorporated (GTA). All rights reserved. Except as permitted under copyright law, no part of this manual may be reproduced or distributed in any form or by any means without the prior permission of Global Technology Associates, Incorporated. Technical Support GTA includes 30 days up and running installation support from the date of purchase. See GTA s Web site for more information. GTA s direct customers in the USA should call or email GTA using the telephone and email address below. International customers should contact a local Authorized GTA Channel Partner. Tel: +1.407.380.0220 Email: support@gta.com Disclaimer Neither GTA, nor its distributors and dealers, make any warranties or representations, either expressed or implied, as to the software and documentation, including without limitation, the condition of software and implied warranties of its merchantability or fitness for a particular purpose. GTA shall not be liable for any lost profits or for any direct, indirect, incidental, consequential or other damages suffered by licensee or others resulting from the use of the program or arising out of any breach of warranty. GTA further reserves the right to make changes to the specifications of the program and contents of the manual without obligation to notify any person or organization of such changes. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation for their use. GTA assumes no responsibility with regard to the performance or use of these products. Every effort has been made to ensure that the information in this manual is accurate. GTA is not responsible for printing or clerical errors. Trademarks & Copyrights GB-OS, Surf Sentinel, Mail Sentinel and GB-Ware are registered trademarks of Global Technology Associates, Incorporated. GB Commander is a trademark of Global Technology Associates, Incorporated. Global Technology Associates and GTA are service marks of Global Technology Associates, Incorporated. Microsoft, Internet Explorer, Microsoft SQL and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Adobe and Adobe Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. UNIX is a registered trademark of The Open Group. Linux is a registered trademark of Linus Torvalds. BIND is a trademark of the Internet Systems Consortium, Incorporated and University of California, Berkeley. WELF and WebTrends are trademarks of NetIQ. Sun, Sun Microsystems, Solaris and Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and/or other countries. Java software may include software licensed from RSA Security, Inc. Some products contain software licensed from IBM are available at http://oss.software.ibm.com/icu4j/. Some products include software developed by the OpenSSL Project (http://www.openssl.org/). Mailshell and Mailshell Anti-Spam is a trademark of Mailshell Incorporated. Some products contain technology licensed from Mailshell Incorporated. All other products are trademarks of their respective companies. Global Technology Associates, Inc. 3505 Lake Lynda Drive, Suite 109 Orlando, FL 32817 USA Tel: +1.407.380.0220 Fax: +1.407.380.6080 Web: http://www.gta.com Email: info@gta.com 14 Copyright