DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection



Similar documents
Network Configuration Settings

Installation of the On Site Server (OSS)

Network setup and troubleshooting

Multi-Homing Dual WAN Firewall Router

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Owner of the content within this article is Written by Marc Grote

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc.

Central Administration QuickStart Guide

Using SonicWALL NetExtender to Access FTP Servers

Appendix C Network Planning for Dual WAN Ports

Cyclope Internet Filtering Proxy. - Installation Guide -

Chapter 5. Data Communication And Internet Technology

1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM

OfficeConnect Internet Firewall 25 Internet Firewall DMZ. QuickStart Guide (3C16770, 3C16771)

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support

ETRX2 and ETRX357 Wireless Mesh Networking Modules. Application Note Accessing Modules over the Internet

Cyclope Internet Filtering Proxy

Configuring a customer owned router to function as a switch with Ultra TV

The PostBase Connectivity Wizard

PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008

Wireless G Broadband quick install

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

Application Description

Installation and Connection Guide to the simulation environment GLOBAL VISION

Using a VPN with CentraLine AX Systems

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Using a VPN with Niagara Systems. v0.3 6, July 2013

Cisco Virtual Office Express

White Paper How to Remotely Access Ethernet I/O Over the Internet

Elluminate Live! Access Guide. Page 1 of 7

Linking 2 Sites Together Using VPN How To

Comtrend 1 Port Router Installation Guide CT-5072T

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Basic Network Configuration

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall

Chapter 8 Router and Network Management

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

Deployment for Network Proxy in Simpana Environment

Opera VoIP Networking Configuration Guide

Edgewater Routers User Guide

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

What is the Barracuda SSL VPN Server Agent?

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Central Administration User Guide

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Self Help Guide. Please read the following carefully; Synopsis: Requirements: A Computer with a working RJ45 LAN Port All Belkin Modem Routers

NETWORK SET UP GUIDE FOR

P-660HW-Tx v3. Quick Start Guide g Wireless ADSL 2+ 4-port Gateway. Version /2008 Edition 1

RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. AND TROUBLESHOOTING GUIDE. Tel:

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Elluminate Live! Access Guide. Page 1 of 7

DRO-210i LOAD BALANCING ROUTER. Review Package Contents

Using Cisco UC320W with Windows Small Business Server

A Guide to New Features in Propalms OneGate 4.0

Guide to Setting up Internet Connection Sharing for Windows

eircom advantage VoIP Netwrorking Configuration Guide

Part A:Background/Preparation

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Lab PC Network TCP/IP Configuration

BASIC CLASSWEB.LINK INSTALLATION MANUAL

DSL- G604T Frequently asked Questions.

Overview of WebMux Load Balancer and Live Communications Server 2005

PC-Duo Web Console Installation Guide

ewon-vpn - User Guide Virtual Private Network by ewons

Quick Guide of HiDDNS Settings (with UPnP)

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Starting a Management Session

Setup Guide: Server-side synchronization for CRM Online and Exchange Server

Reverse Proxy Guide. Version 2.0 April 2016

LAN TCP/IP and DHCP Setup

Citrix Access on SonicWALL SSL VPN

Owner of the content within this article is Written by Marc Grote

Edgewater Routers User Guide

(1) Network Camera

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point

Citrix Systems, Inc.

P-660R-TxC Series. ADSL2+ Access Router. Quick Start Guide

Chapter 1 Configuring Basic Connectivity

InTouch Access Anywhere

D-Link Central WiFiManager Configuration Guide

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Chapter 2 Preparing Your Network

Trouble Shooting SiteManager to GateManager access via a corporate Intranet

XenDesktop 5 with Access Gateway

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

RemotelyAnywhere Getting Started Guide

Savvius Insight Initial Configuration

ENDIAN Topologies Setup of different Network topologies with Endian Firewalls

Configuration Manual English version

Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3

Transcription:

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS Introduction I m InTouch is a personal remote access application that allows a user to access the data on his or her PC from a remote location, using the Internet. Access is achieved using any computer running a standard web browser or wireless device running a wireless browser. The PC running I m InTouch acts as a personal data server. This document provides an overview of configuring the I m InTouch service on computers in typical network environments. Basic Requirements I m InTouch will run on a number of Microsoft Windows platforms as shown below; Operating System Windows XP Home & Professional Windows 2000 Windows NT4 Workstation Windows Me Windows 98(Second Edition) During the installation of I m InTouch on a computer, a Secure Sockets Layer (SSL) certificate authored by 01 Communique and an Apache web server will be installed. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection Typical Environment: Home office DSL/ Cable modem I m InTouch software is installed directly on the computer. If Internet security software, typically referred to as a firewall, is installed on the computer (recommended), configure the software to operate as a Web server on the Internet accepting HTTP and HTTPS requests. Consult the firewall s vendor documentation to determine how to configure the firewall software to support the PC acting as a web server. 01 Communique Page 1 Network Environment_004-073002.doc

Multiple Computers Sharing an Internet Connection One Computer running I m InTouch Typical Environment: Home office, Small office Network Workstation DSL/ Cable modem Gateway/Router/Firewall [Port Forwarding to the I m InTouch computer] This is a common type of connection for a small office or small home network that provides Internet connection sharing for one or more computers, one of which will be running the I m InTouch service. Since the gateway machine /router/firewall will secure the network against incoming connections, it must be set up to allow incoming HTTP and HTTPS requests to enter through a port and then be forwarded to the computer running I m InTouch. A typical Home Gateway (shown as the Host Computer on the left) is a router or a PC with 2 Network Interface Cards (NIC). One NIC is connected to the Cable or DSL Internet service and the other NIC is connected to the Local Area Network (LAN). Consult the router/firewall s vendor documentation to determine how to configure the firewall software to open ports and direct HTTP/HTTPS requests through to the computer running I m InTouch. 01 Communique Page 2 Network Environment_004-073002.doc

Multiple Computers Sharing an Internet Connection Multiple Computer s running I m InTouch Typical Environment: Small office Network 01 PC Finder Computer Internet connection Gateway/Router COMPUTER_A COMPUTER_B It is possible to operate a number of I m InTouch computers on the same network by installing the 01 PC Finder application. This is a web-server based proxy that is able to forward I m InTouch HTTP/HTTPS connections to other web-servers in the local network. (01 PC Finder is a free download from ftp://01ftp.01com.com/pcfsetup.exe). In this case the gateway/router must be set up to allow the standard HTTP and HTTPS ports to be routed to the PC Finder computer. It is possible, but not required, to use the same PC for both 01PC Finder and as an I m InTouch station. 01PC Finder has a simple user interface application that allows the network administrator to identify the other I m InTouch computers on the network and set them up to be accessible. 01PCFinder is particularly easy to set up for a Windows networking environment. One further advantage of using PC Finder is that the Secure Socket Layer (SSL) certificate can be installed on this machine and it will provide SSL support for all the other I m InTouch servers in the network. More details on installing 01 PC Finder can be found at http://01com.com/docs/pcfquick.pdf. 01 Communique Page 3 Network Environment_004-073002.doc

Proxy Server exists in the Local Area Network Typical Environment: Department within a Corporation Network Proxy server Firewall/Router COMPUTER_A COMPUTER_B It is possible to operate I m InTouch PCs within a larger network environment that utilizes a proxy server. Some configuration of the proxy server in the network will be necessary to allow incoming Internet connections (HTTP/HTTPS requests) to reach the respective PCs running I m InTouch. The following describes the steps that are needed; - All I m InTouch computers must be configured to have outgoing access to the Internet, via one of a) the default gateway or b) a proxy client installed on the I m InTouch PC or c) by an explicit proxy setting in I m InTouch. This is very similar to setting up a browser, like Netscape or Internet Explorer. The following screen shows how the outgoing proxy connection is specified: 01 Communique Page 4 Network Environment_004-073002.doc

Proxy Server exists in the Local Area Network (continued) - Incoming web server connections (HTTP and/or HTTPS requests) arriving at the Firewall/Router must be forwarded to the Proxy Server. The Proxy Server must be set up to redirect these incoming connections based on a routing address in the URL. E.g. Address COMPUTER_A will result in the forwarding of packets to the internal IP address of I m InTouch computer A. This requires the network administrator to set this up on the Proxy Server for each I m InTouch PC and then inform the user of each PC so that the proxy directory can be provided to the I m InTouch configuration application. For details on how to setup Microsoft Proxy Server refer to www.01com.com/memberpage/proxy. - Finally, if the IP address for incoming Internet connections to the Proxy Server is not the same as the external IP address used for outgoing Internet connections, then the administrator must advise the I m InTouch users which address to use. This situation may arise when there are a number of gateways in the network and more than one external IP address. The users can then set I m InTouch up explicitly to route incoming connections to the correct Proxy Server. The following screen shows the I m InTouch setting for the incoming Proxy Directory and the incoming IP address to register. Testing I m InTouch Following the installation of I m InTouch, you can test your ability to connect over the Internet to your I m InTouch computer. This will provide verification that your configuration has been established correctly for your network environment. Go to https://locator.01com.com, (example page below), input your Computer Name that you chose during activation of the service, and if I m InTouch has been configured correctly, you will receive the Computer Login Page as identified below 01 Communique Page 5 Network Environment_004-073002.doc

01 Communique Page 6 Network Environment_004-073002.doc