VI. Corente Services Client

Size: px
Start display at page:

Download "VI. Corente Services Client"

Transcription

1 VI. Corente Services Client Corente Release 9.1 Manual Copyright 2014, Oracle and/or its affiliates. All rights reserved.

2 Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration... 7 Planning for Corente Clients... 7 Chapter 1. Location Gateway Configuration... 9 User Remote Access Tab of the Location Form... 9 Network Tab Backhaul Chapter 2. DHCP Server for Corente Clients Chapter 3. External Authentication (RADIUS or LDAP) RADIUS Authentication LDAP Authentication III. Adding a Corente Client User Account Chapter 1. Planning Ahead Administrator activities End user activities Chapter 2. Creating Corente Client Accounts Things to consider before adding Client Accounts Chapter 3. Add a New Corente Client Account Chapter 4. Add a Client Group Chapter 5. Partnering Corente Clients with Locations Before You Begin User Groups and Applications Partner Client Groups IV. Obtaining and Installing the Corente Client Software Hardware and Software Requirements Installing the Software Package Already Installed? Chapter 1. Configuring the Corente Client Before You Begin Steps During Configuration V. Starting the Corente Client Software Chapter 1. Connect to Access Location Partners Disconnecting Chapter 2. Changing the Password (Local Authentication Only) Forgotten Password? Copyright 2014, Oracle and/or its affiliates. 2 Corente Services Client

3 Chapter 3. Client Expiration Chapter 4. Upgrade Notification When the Upgrade Due Date Expires VI. Using the Corente Client Software Chapter 1. The Tray Icon Menu Items Displaying the Tray Icon in Windows Chapter 2. Corente Control Panel Chapter 3. Status Tab Connection Activity Notes Chapter 4. Preferences Tab Chapter 5. About Tab Client Information Client Upgrade Chapter 6. Advanced Client Logging Client Connection Client Reset Chapter 7. Connect to Remote Computers Tube to Gateway Viewer No NATing for Corente Clients When Corente Clients are not Backhauled Appearing on the Local Network page of Gateway Viewer Chapter 8. Log Viewer Send Log Send Registry Dump Close the Log VII. Accessing Corente Clients from the Corente Virtual Services Gateway LAN Chapter 1. Network Requirements on the Corente Virtual Services Gateway LAN Routing to a Corente Client from Behind a Firewall Remote Proxy Servers Chapter 2. Access Corente Clients with Gateway Viewer Listing Corente Clients on Gateway Viewer VIII. Special Configurations Chapter 1. Log into a Remote Windows Domain To log onto a Windows domain Logging on with Dial-Up IX. Uninstalling the Corente Client Software Windows 7, Windows 8, and Windows Copyright 2014, Oracle and/or its affiliates. 3 Corente Services Client

4 X. Troubleshooting Error Messages Index Additional Support Oracle Legal Notices Copyright 2014, Oracle and/or its affiliates. 4 Corente Services Client

5 Preface With the Corente Client Software and an Internet connection, you can create a secure connection via the Internet between a remote PC and any of your Corente Virtual Services Gateway Locations, even if that remote computer is connecting from a new location every day. The Corente Client is the software-based remote access client for Corente. This manual contains technical information related to the installation and use of the Corente Client. Conventions All hyperlinks are shown in blue, underlined text. They can be used to navigate through the guide or the procedures related to an overall activity, or to jump to a cross-referenced topic or Internet URL. Systems supported This guide supports the Corente Client Software, version 9.1. Technical Support For technical support to assist you with any problems or to answer any questions pertaining to function, installation, and management of the Corente Services, please go to Related reading Corente provides several additional manuals: I. Corente Services Planning II A. Corente Virtual Services Gateway Hardware Preparation and Deployment II B. Corente Services Policy Definition and Provisioning III. Corente Services Administration IV. Corente Services Troubleshooting Guide V. Corente Virtual Services Gateway Virtual Edition VII. Corente Services SSL Client VIII. Corente Services Mobile User To obtain these manuals, please visit the Corente web site at Copyright 2014, Oracle and/or its affiliates. 5 Corente Services Client

6 I. Introduction The Corente Client Software supplies remote and traveling users with secure access to resources at your main office locations. Corente offers two types of access to the Corente network for remote users: the Corente Client (software-based IPSec remote access) and the Corente SSL Client. The SSL Client provides more limited access than the Corente Client, but the SSL Client does not require the Windows operating system or specialized software to be installed on users computers. While the SSL Client allows users to retrieve and send via your company s mail servers, browse intranet web sites, and download and upload files onto servers via a variety of different browsers, the Corente Client can handle all types of traffic between remote computers and computers at a central site. When remote users require access for more than just or file/web browsing, you should provide them with the Corente Client Software. Corente Client (software-based Corente Client) Corente SSL Client (SSL client) X X File Share X X Web (HTTP) X X Desktop Access (VNC) X X Telnet X X SSH X X Client-Server Applications Proprietary Software Session-Oriented Applications X X X X For more information on how these remote access solutions compare, please refer to the document entitled Choosing a Corente Remote Access Solution. Copyright 2014, Oracle and/or its affiliates. 6 Corente Services Client

7 II. Corente Client Configuration To begin adding Corente Clients to your domain, you must configure your Corente Virtual Services Gateways to accept the Corente Clients and configure devices on your LAN to serve the Corente Clients. This requires certain screens in App Net Manager to be completed for each Location. Planning for Corente Clients A Corente Client (occasionally known as a RAS Client) connects to one Corente Virtual Services Gateway at a time. It is layer 2 bridged onto the LAN of that Location gateway, which allows the Corente Client to function as if it were a computer directly plugged into the LAN. This simplifies administration for remote access and provides greater functionality. After connecting to its Corente Virtual Services Gateway (its host Location), the Corente Client can connect to the partners of the host Location and access resources on servers in other Locations. With this method, remote access clients can easily connect to multiple Locations both inside your Corente network and in your extranets. Before attempting to add any Corente Clients, you must determine your strategy for providing Corente network access to Corente Client users. Corente Clients can be bridged to only one partner at a time and only to those Corente Virtual Services Gateways that have been RAS-enabled. Therefore, only RAS-enabled Location gateways can be host Locations for Corente Clients. However, Corente Clients can connect to any other Location in your Corente network (and your extranet) if that Location is a partner of the host Location. To begin, you must first identify the Location gateways in your Corente network that will be Corente- Client-enabled. To support the Corente Client population, you can use existing Location gateway(s) or deploy new ones. Your decision will be influenced by: The number of users that a gateway must support The access you will need to provide for client users The number of tunnels that your current hub gateways may already be supporting Additionally, you must decide if you want to have a primary/backup set up for users. If A Corente Client is partnered to more than one Corente-Client-enabled Location gateway, when the client is started, the user will be asked to select the host Location for that session. Partnering the Corente Client with more than one Location means that an alternative access point to the Corente network is provided if the primary Location used for Corente Client access cannot be reached. If the user selects the primary Location from the list and the tunnel cannot be built to that Location, the user can restart the software and select another Location from the list. Furthermore, if your user travels and there are Corente-Client-enabled Location gateways in close proximity to the location he is visiting, then it may be advantageous (from a latency and performance perspective) to connect to a local Location gateway for a connection back to the home office. This example is particularly relevant for international travelers. Copyright 2014, Oracle and/or its affiliates. 7 Corente Services Client

8 In addition to planning out which Location gateways will be host Locations, you must also plan out the Location partners and the User Groups/applications for each host Location, so that each Corente Client user will be able to access necessary resources across the Corente network. Copyright 2014, Oracle and/or its affiliates. 8 Corente Services Client

9 Chapter 1. Location Gateway Configuration When you have selected the Location gateways that will serve as host Locations for Corente Clients, you must access their Location form in order to capture the appropriate settings. Configuration for Corente Clients requires modifications to several screens in this form. User Remote Access Tab of the Location Form Most configurations for connecting Corente Clients to a Location will take place on the User Remote Access tab of the Location form. A Location form stores personality information and feature preferences for each Location gateway in your Corente domain. To access this form for a Location: Right-click on the Location icon in the map or domain directory and select Edit. Double-click the Location name in the domain directory. Select the Location name in the domain directory and then select the Edit option from the tool bar or the Edit menu. The Location form will be displayed. You can jump to a particular screen on the form by selecting one of the tabs displayed across the top. Select the User Remote Access tab. Copyright 2014, Oracle and/or its affiliates. 9 Corente Services Client

10 Figure 1: User Remote Access Tab This tab captures personality information for this Location gateway for all types of Corente remote access (IPSec, SSL, and Mobile Users). Complete the following steps to allow this Corente Virtual Services Gateway to serve as a host Location for Corente Clients: 1. In the Client Settings section, select the following option: Enable Client access to this Location: This Location gateway will serve as a host for Corente Clients. When you select this option, the Location form will automatically enable this Location gateway as a Backhaul Server (if it has not already been configured as such). For more information about backhaul, refer to the section of the II B. Corente Services Policy Definition and Provisioning manual about the Network tab of the Location form. Copyright 2014, Oracle and/or its affiliates. 10 Corente Services Client

11 2. All Corente Clients that connect to the LAN of this Location gateway must be provisioned by DHCP. If you already have a DHCP server on your LAN, you can use this device to provision your Corente Clients as well. However, if you would like to use the native DHCP server in this Corente Virtual Services Gateway to provision Corente Clients, click the DHCP Server Support Configure button to configure this DHCP server. The Edit RAS Client DHCP Server page is described in Chapter 2. DHCP Server for Corente Clients (p. 13). 3. If you would like to use a RADIUS or LDAP server for the authentication of Corente Clients (instead of a simple username/password algorithm stored at the SCP), the External Authentication Servers section at the bottom of the window allows you to configure these servers. Only one server of each type can be used with your Corente Virtual Services Gateway. (The same settings for each type of server will be used for both Corente Clients and SSL Clients.) RADIUS Server Configure: Select this button to enable a RADIUS server on your LAN to provide authentication for Corente Client users. The RADIUS Server Authentication screen will be displayed and will allow you to capture settings for this server. For information about this screen, refer to RADIUS Authentication (p. 18). LDAP Server Configure: Select this button to enable an LDAP server on your LAN to provide authentication for Corente Client users. The LDAP Server Authentication screen will be displayed and will allow you to capture settings for this server. For information about this screen, refer to LDAP Authentication (p. 20). 4. After capturing information about the authentication server you would like to use (if applicable), the Authentication Type radio buttons in the Client Settings section allow you to select how Corente Clients will be authenticated to this Location gateway. Password: Select this option if you would like to authenticate Corente Clients using a simple username and password combination that is stored at the SCP. External Authentication (RADIUS): Select this option if you have a RADIUS server on your LAN, captured the information about this server on the RADIUS Server Authentication window (in Step 4), and would like to use this server to authenticate your Corente Clients. Note that if you use a RADIUS server for authentication, you must configure accounts for these Corente Client users on the RADIUS server itself. External Authentication (LDAP): Select this option if you have an LDAP server on your LAN, captured the information about this server on the LDAP Server Authentication window (in Step 4), and would like to use this server to authenticate your Corente Clients. Note that if you use an LDAP server for authentication, you must configure accounts for these Corente Client users on the LDAP server itself. 6. When you are finished, select the OK button on the Location form. In order for your changes to go into effect, you must Save your changes by selecting the Save button in the App Net Manager tool bar. Copyright 2014, Oracle and/or its affiliates. 11 Corente Services Client

12 Network Tab Backhaul Corente Clients can participate in Corente s backhaul feature. All IP traffic (both Internet and Corente network) from A Corente Client must be backhauled to its host Location across the secure Corente network tunnel. The split tunnel model (where the Corente network traffic is sent across the tunnel and the Internet traffic is sent directly to the Internet) can be enabled for specific Corente Client accounts, but it is generally recommended that all Corente Clients are backhauled. For more information about enabling or disabling backhaul for a client, refer to Chapter 3. Add a New Corente Client Account (p. 25). All Corente-Client-enabled Corente Virtual Services Gateways must function as Backhaul Servers. When you select the Enable Client access to this Location option, the Location form will automatically enable the Backhaul Server option as well. To verify backhaul settings, go to the Network tab and review the Backhaul section. The Backhaul Server option should be selected. When the Backhaul Server option is selected, in addition to receiving the backhauled traffic of its Corente Client partners, the Location gateway can also receive backhauled IP traffic from Locations designated as Backhaul Clients. Refer to the II B. Corente Services Policy Definition and Provisioning manual for more information on Corente Virtual Services Gateways designated as Backhaul Clients. If you would like, you can use the following option: Optional Default Gateway: When the Backhaul Server option is selected, you can supply an IP address or DNS name of a server on the LAN where this Corente Virtual Services Gateway will send all of the Internet traffic that has been routed to it. This allows you to specify the server that the traffic will be sent to and received from for filtering and Internet access rules, so that you do not have to change the default Internet Gateway for this Corente Virtual Services Gateway in the Network Interfaces section of the Network tab. Note: Because of backhaul, Corente Clients will access the Internet through their host Location when connected to the Corente network. Therefore, you must make sure that the appropriate configuration is completed on Corente Clients so that they can access the Internet at that location. In particular, if your users in your host Location s site have to employ a proxy setting to reach the Internet, Corente Client users will also have to employ that same proxy setting because Internet access for the client is being backhauled through the office tunnel. Under normal circumstances, to protect the Corente network, the Corente Client will not be able to communicate outside the Corente network tunnel. This means that all communication between A Corente Client and its own local network to which it is actually connected (for example, a small Home network) is blocked while it is bridged to the LAN of its host Corente Virtual Services Gateway. However, when you configure A Corente Client account, you can select the Allow access to the local network option. When this option is selected, this Corente Client will be allowed to access computers on its own LAN in addition to computers across the Corente network on the host Location s LAN. However, the Corente Client s Internet traffic will not be backhauled. For more information, refer to Chapter 3. Add a New Corente Client Account (p. 25). Copyright 2014, Oracle and/or its affiliates. 12 Corente Services Client

13 Chapter 2. DHCP Server for Corente Clients When connected to the Corente network, Corente Clients must be provisioned by a DHCP server located on the LAN of their host Location. The DHCP server must serve each of the Corente Clients an IP address, network mask, and default gateway address, as well as DNS server and WINs server settings. You will not be able to create reservations for Corente Clients based on MAC address, since the MAC address used over the Corente network is not the actual MAC address used in each physical client machine it is obtained via proxy. A DHCP server simplifies administration of remote access clients enormously. Because it provides an IP address on the same subnet as the Location gateway, it enables users to access and use resources exactly as they would if their machine was plugged into the LAN itself. All of the domain security functions for users at work (logon scripts, automatic drive mappings, etc.) will now work easily over the Corente network connection for remote access users. If you are already using a third-party DHCP server to provision computers on the Location gateway s LAN, you should also use this server to provision Corente Clients. However, if you do not have a DHCP server on the Location gateway s LAN, the Corente Virtual Services Gateway itself can be configured to handle this task for Corente Clients. The address assignments served by the native DHCP server on the Location gateway will last for the duration of the Corente Client's session while it is connected to this Location. Perform the following steps to configure how addressing information will be served to Corente Clients on the Edit RAS Client DHCP Server screen of the Location form. 1. On the User Remote Access tab of the Location form, select the DHCP Server Support Configure button. The Edit RAS Client DHCP Server screen will be displayed. Copyright 2014, Oracle and/or its affiliates. 13 Corente Services Client

14 Figure 2: DHCP Server Settings 2. Select the Enable RAS Client DHCP Server option to enable the DHCP server for Corente Clients. 3. If you would like, enter a DNS Suffix to be served to computers by DHCP. When these computers submit a name for DNS name resolution, this DNS suffix will be appended to that name. 4. Select either of the following options, if you would like: Serve DNS with DHCP: This option allows you to select whether or not to pass DNS Server IP addresses with the DHCP leases. When this box is selected, Corente Clients will be served the DNS server addresses that you supplied in the Network tab of this Location form. Serve WINS with DHCP: This option allows you to select whether or not to pass WINS Server IP addresses with the DHCP leases. (WINS is the network protocol used in Windows networking; the computer names you see in Network Neighborhood are all resolved into IP addresses, and vice versa, using WINS.) When this box is checked, you must enter the IP address(es) of the WINS server(s) on your network that will be served to Corente Clients: Copyright 2014, Oracle and/or its affiliates. 14 Corente Services Client

15 Primary WINS: Enter the IP address of the primary WINS server used to resolve WINS names on your local network. Secondary WINS: Enter the IP Address of the secondary WINS server that will be used to resolve names if the primary WINS server does not respond. You cannot enter a Secondary WINS address if you have not entered a Primary WINS entry. Note: When creating a Corente Client account (see Chapter 3. Add a New Corente Client Account, p. 25), if the Backhaul All Traffic option is not selected, the Corente Client will not receive WINS and DNS server addresses when served its IP address by DHCP. 5. When you select the Address Ranges tab at the bottom of the screen, this section allows you to create the address pools that will be served by the Location gateway. You can Edit or Delete any existing range in this section. To begin creating address pools for Corente Clients, select the Add button. 6. The Add DHCP Address Range window will be displayed. Figure 3: Add DHCP Address Range Fill out this window as follows: Include Address Range or Exclude Address Range: To start, make sure that the Include Address Range option is selected. This option indicates that the entire range you enter will be served by DHCP. Start Address: Enter the lowest value of the address range in this field. End Address: Enter the highest value of the address range in this field. If the address pool you would like to create contains only one IP address, you do not have to enter anything in this field. 7. Select the OK button to save this pool. The range will be listed in the Address Ranges section. 8. If you would like to exclude certain addresses from any of the address pools you have added, you can exclude these addresses by Adding another range and selecting the Exclude Address Range option. Then, enter the range of IP addresses that you would like to exclude in Copyright 2014, Oracle and/or its affiliates. 15 Corente Services Client

16 the Start Address and End Address fields, as described in Step 6. The address of the Location gateway is automatically excluded and does not need to be entered here. 9. Complete Steps 5 to 8 to enter as many address ranges as you would like the Location gateway to serve. 10. When you select the Reservations tab at the bottom of this screen, you can reserve specific IP addresses for Corente Clients that receive their addressing from the Location's DHCP server. You can Edit or Delete any existing reservation in this section. To add a reservation, select the Add button. 11. The Add DHCP Reservation screen will be displayed. Fill out this screen as follows: Figure 4: Add DHCP Reservation Client Name: Enter the name of the Corente Client. IP Address: Enter the IP address that will be reserved by the Location's DHCP server for use by this Corente Client only. The Client will always receive this address from the DHCP server. Reserved: When this checkbox is selected, the IP address you entered will be saved and assigned to the Corente Client whenever it receives its addressing via the Location's DHCP server. 12. Select the OK button to save this reservation. The range will be listed in the Reservations section. 13. Complete Steps 10 to 12 to enter as many reservations as you would like the Location gateway to serve. 14. When you have finished defining the address ranges and reservations to be served by DHCP, click the OK button. You will return to the User Remote Access tab. Note: A DHCP Server saves you from the task of manually assigning IP addresses to computers. However, each user computer must be configured to obtain IP addresses automatically. In Copyright 2014, Oracle and/or its affiliates. 16 Corente Services Client

17 Windows, for example, this can be accomplished easily using the network option in the Control Panel. Copyright 2014, Oracle and/or its affiliates. 17 Corente Services Client

18 Chapter 3. External Authentication (RADIUS or LDAP) If using an external server (either RADIUS or LDAP) for authentication of Corente Clients, you must capture the configuration for the server on a window in the Location form, accessible from the User Remote Access tab (see User Remote Access Tab of the Location Form, p. 9). Complete this window after you have created user accounts on the server. The window will capture the settings that are being used for the authentication server on your LAN, so that your Location gateway will be able to query the server appropriately. At the bottom of the User Remote Access tab, click the Configure button for either RADIUS Server or the LDAP Server to display the appropriate window. You can only capture one set of information for a RADIUS server and one set of information for an LDAP server. Therefore, if you have already captured RADIUS or LDAP server information on the Location form for the authentication of Corente SSL Clients, your Location gateway must also use these settings for authentication of Corente Clients. RADIUS Authentication When you click the Configure button to configure RADIUS Server settings, the RADIUS Authentication Settings screen will appear. Use this screen to capture the settings that the Corente Virtual Services Gateway will use to contact the RADIUS server on your LAN for authentication of Corente Clients. Copyright 2014, Oracle and/or its affiliates. 18 Corente Services Client

19 Figure 5: RADIUS Server Authentication Settings RADIUS is an authentication protocol commonly used to provide secure authentication for users. It is often used to provide centralized authentication, authorization, and accounting. The Edit RADIUS Server window allows you to administer the settings that the Corente Virtual Services Gateway will use to contact the RADIUS server. After selecting Enable RADIUS Server, complete the following fields on this screen: IP Address: Enter the IP address of the RADIUS server on your LAN. This address must be included in the Default User Group of this Corente Virtual Services Gateway. Port: Enter the port number on the RADIUS server that the Location gateway will contact to authenticate remote users. The default port number used will be 1831, but this number can be changed if the port is already in use. Secret: Enter the secret that the Location gateway will use to authenticate itself with the RADIUS server. Confirm Secret: Re-enter the secret you entered in the Secret field to avoid any mistakes. Timeout: Select the timeout interval for how long the Location gateway will wait for the RADIUS server to respond to its request to authenticate a remote user. You may select any interval between 1 and 30 seconds. The default interval is 4 seconds. Retries: Select how many retries the Location gateway will attempt in order to contact the RADIUS server for an authentication. For each attempt, the Location gateway will wait for the Copyright 2014, Oracle and/or its affiliates. 19 Corente Services Client

20 interval you have selected with the Timeout option. You may select between 1 and 10 retries. The default number of retries is 2. Login Prompt: Enter the login prompt for users. Password Prompt: Enter the password prompt for users. Click OK once you have provided the appropriate information. LDAP Authentication When you click the Configure button to configure LDAP Server settings, the Edit LDAP Server window will appear. Use this window to capture the settings that the Corente Virtual Services Gateway will use to contact the LDAP server on your LAN for authentication of Corente Clients. Figure 6: LDAP Server Settings LDAP is an open-standard protocol for accessing X.500 directory services. A directory is a specialized database optimized for reading, browsing and searching. LDAP is used to authenticate users based on entries in the directory. Corente uses the standard implementation of Open LDAP. Copyright 2014, Oracle and/or its affiliates. 20 Corente Services Client

21 Complete the following fields on this screen: IP Address or DNS Name: Select the appropriate option and enter either the IP address or DNS name of the LDAP server on your LAN. If an IP address is entered, it must be included in the Default User Group of this Corente Virtual Services Gateway. Port: Enter the port number on the LDAP server that the Location gateway will contact to authenticate remote users. The default port number used will be 389, but this number can be changed if the port is already in use. Backup IP Address or DNS Name: Select the appropriate option and enter either the IP address or DNS name of the backup LDAP server on your LAN. If an IP address is entered, it must be included in the Default User Group of this Location gateway. Backup Port: Enter the port number on the backup LDAP server that the Location gateway will contact to authenticate remote users. User Name: Enter the username that this Location gateway will use to log into the LDAP server in order to authenticate remote users. Password: Enter the password that this Location gateway will use to log into the LDAP server in order to authenticate remote users. Timeout: Select the timeout interval for how long the Location gateway will wait for the LDAP server to respond to its request to authenticate a remote user. You may select any interval between 1 and 30 seconds. The default interval is 4 seconds. Base: Enter the user name at which to start the directory search. This setting provides controls on how a query to the LDAP server is performed. Scope: Select the integer that will indicate the scope of the directory search. Options available in the pull-down menu are LDAP_SCOPE_BASE, LDAP_SCOPE_ONELEVEL, and LDAP_SCOPE_SUBTREE. This setting provides controls on how a query to the LDAP server is performed. Filter: Enter a filter string for the search. This setting provides controls on how a query to the LDAP server is performed. Attributes: Enter the sub-fields that you would like retrieved from the database. Each entry in this field should be space-separated. This setting provides controls on how a query to the LDAP server is performed. Click OK once you have provided the appropriate information. For more information about any of the fields or options on this screen, refer to the LDAP documentation. Copyright 2014, Oracle and/or its affiliates. 21 Corente Services Client

22 III. Adding a Corente Client User Account This chapter outlines the procedure for adding a new Corente Client user account to your Corente domain. After ordering the Corente Client service, you must add a user account in App Net Manager for each new remote access client. This procedure involves using the User Remote Access Clients feature. You should add the new accounts before users install the Corente Client Software on their computers. Copyright 2014, Oracle and/or its affiliates. 22 Corente Services Client

23 Chapter 1. Planning Ahead Installation of Corente Clients requires certain steps to be completed by the network administrator and certain steps to be completed by each Corente Client end user. Before adding accounts, you should review the installation procedure. Administrator activities It is the administrator s responsibility to: Design the appropriate Corente network architecture so that users will be able to access the servers and resources that they need Plan a logical convention for naming the user accounts Create a client personality for each end user with the App Net Manager application Assign each Corente Client to the appropriate Corente Virtual Services Gateway partner(s) Make sure that the Corente Client Software is installed on the appropriate PCs Provide users with their Corente Client passwords Remind users to change their initial passwords as soon as possible for security purposes (if applicable) Provide users with the appropriate instructions concerning domain login (if desired) End user activities It is the end user s responsibility to: Obtain the Corente Client Software package and install it on the PC (unless you have already installed the software for them) Start the Corente Client Software and download the personality file Change the initial Corente Client password as soon as possible for security purposes (if applicable) Copyright 2014, Oracle and/or its affiliates. 23 Corente Services Client

24 Chapter 2. Creating Corente Client Accounts In App Net Manager, the Client Administration feature of App Net Manager allows you to create and manage user accounts for Corente Clients. You can create, modify, and delete Corente Client accounts with this feature, as well as specify the client groups to which each particular Corente Client belongs. This feature is available when you open the Global Intranet Settings category in the domain directory, and then open the User Remote Access subcategory. Things to consider before adding Client Accounts Before you begin adding client accounts, complete the following preparations: Plan the convention you will use to name your Corente Client accounts. You need to provide each Corente Client user with a unique name. Most Corente Client accounts are created for individual users, so the Client Names are typically some combination of the user's name (for example: JDoe). Obtain the address for each Corente Client user. When you create A Corente Client account, an message is sent to notify the user that you have created this file along with other important information. Decide how each of your Corente Client users is going to obtain the Corente Client Software. You can either download the software and distribute it to the users yourself, or you can let the users download it to their own computers. Determine how client accounts will be grouped together to provide the appropriate Corente network access. Copyright 2014, Oracle and/or its affiliates. 24 Corente Services Client

25 Chapter 3. Add a New Corente Client Account To begin adding a new account, open the Client Administration category in the domain directory. When you open the Clients subcategory, the domain directory lists each Client account you have configured. When you open a Client account, all the Client Groups of which it is a member will be displayed. For more information about Client Groups, refer to Chapter 4. Add a Client Group (p. 31). Figure 12: Clients When you select Clients, all Corente Client accounts that have been configured in this domain will be displayed in a table to the right of the domain directory. This table displays: Client: the Client account name Version: the version of the software that the user has downloaded Target: the target software version that has been set for the user by the SCP Operator Created: the date that the Client account was created First Contact: the first time the account contacted the SCP for activation Last Contact: the last time that the account connected and contacted the SCP Visible IP: the Visible IP address of the Corente Client You can view the current status of each Corente Client at a glance in either the domain directory or the Clients table, by viewing the Corente Client's icon. Copyright 2014, Oracle and/or its affiliates. 25 Corente Services Client

26 Icon Status Meaning Download This account has been added by an administrator, but has not yet downloaded the Corente Client personality file. Downloaded Active Disconnected Upgrade Pending The Corente Client personality file has been downloaded, but the computer has not yet established a secure tunnel to the SCP. The computer has established a secure tunnel to the SCP and is currently active on the Corente network. The computer has established a secure tunnel to the SCP at least once, but does not currently have a SCP connection. The Corente Client Software may not be in use. When a purple triangle appears on the icon, the Corente Client is scheduled for a software upgrade. You can Edit or Delete any existing Corente Client account. Once saved with the Save button in the App Net Manager tool bar, any changes made to an existing Corente Client will be distributed automatically and immediately if that Corente Client is currently connected. If the Corente Client is currently disconnected, the changes will be applied the next time the Corente Client contacts the SCP. If you delete A Corente Client currently in use, that Corente Clients session will be terminated. To add a new Corente Client account, make sure Clients is selected in the domain directory and: Select the New button in the tool bar. From the File menu, select Add Client. Right-click Clients in the domain directory and select Add Client. You will be taken to a blank Add Client window. Copyright 2014, Oracle and/or its affiliates. 26 Corente Services Client

27 MyCompany : Add Client Fill out this window as follows: Figure 13: Add Client Name: Enter the alphanumeric identifier for the Corente Client account that you are creating. You may use up to 50 alphanumeric characters. Hyphens and underscores are allowed, but do not use tabs, spaces, or punctuation marks when creating this name. This name must be unique from any Location names in your domain. Note that this name can have the same name as an existing SSL Client account. Enter the address of the Corente Client user. The user will receive an message shortly after you complete this screen, notifying them that you have set up this account. The will also contain the URL where the user can obtain the Corente Client Copyright 2014, Oracle and/or its affiliates. 27 Corente Services Client

28 Software. If you have already downloaded the software from the Administration Homepage (see IV. Obtaining and Installing the Corente Client Software, p. 40), make sure you notify the user so that s/he can obtain the software package from you rather than by using this hyperlink. Password: Create an alphanumeric password for this Corente Client account. This password must contain at least one uppercase, one lowercase, and one numeric character. This password will not be sent in the automatic message; for security purposes, you must supply the password to the user yourself. You should remind the user to change this password as soon as possible in order to maintain security for your domain. Confirm Password: Re-enter the password you created in the Password field to avoid any mistakes. Notes: If you would like to add additional information to keep track of this Client account, enter your notes here. You can enter up to 250 characters. Access Settings: The options in the Access Settings section allow you to select how this client account will use the Corente Client Software to connect to your Corente network. o o Allow access to local Network: Select this option if you would like to allow the Corente Client to contact and be contacted by machines on its own LAN while it is connected to its Location partner. You should not select this option if this machine will be accessible by untrusted devices (i.e., if the client connects to an ISP via dial-up). When this option is not selected, while the software is in use, the Corente Client will only be able to contact and be contacted by machines via the Location partner. This option will be unselected by default. Backhaul All Traffic: Select this option if you would like all traffic (both traffic destined for the Location partner and traffic destined for other places, such as the Internet) to travel inside the secure tunnel and be routed to the Location partner. The Location partner receives all of the traffic and then routes it appropriately. By default, this option will be selected. When this option is not selected, no traffic will be backhauled. This means that the Corente Client: will not be able to use any WINS or DNS servers whose addresses have been served to it by a DHCP server over the domain (either by the Location gateway s DHCP server or by an external DHCP server). will be able to access only the computers on the LAN of the Location to which it is connected. will not be able to access the partners of its Location partner. The partners and computers behind those partners will be visible to the Corente Client user in Gateway Viewer, but will be inaccessible. For more information, refer to When Corente Clients are not Backhauled (p. 68). Authentication Type: This section allows you to select the method that this Corente Client will use to authenticate to its Location partner(s). In addition to all of these methods, all Corente Clients are authenticated with digital certificates. Copyright 2014, Oracle and/or its affiliates. 28 Corente Services Client

29 Password: Select this option and this Corente Client will authenticate with the username and password that you supply on this screen. The password can be changed later by the user. External: Select this option and this Corente Client will authenticate to its Location partner with either RADIUS or LDAP, depending on the type of external authentication that has been enabled on the Location gateway (see Chapter 3. External Authentication (RADIUS or LDAP), p. 18). The user must supply the username and password that you have entered on this screen to obtain the personality file for this client, but must use the username and password for the RADIUS/LDAP server to connect to the client's Location partner. Note: If no External Authentication server has been enabled on the Location gateway, the Corente Client will be unable to connect to the Location when its Authentication Type is External. No Authentication: Select this option and this Corente Client will not be required to authenticate with any other method but digital certificates. The user must supply the username and password that you have entered on this screen to obtain the personality file for this client, but a username and password will not be required when starting the software. Client Expiration: If you would like to create a temporary Client account for a user, you can use the Client Expiration feature to specify the length of time (in days) that the Client will be permitted to connect to its partner(s). When the subscription period has ended, the Client will immediately be disconnected by the SCP when the user attempts to start up the Client software and connect to partners. An expired Client account will remain listed in App Net Manager so that you are able to modify the Client Expiration settings and renew the Client subscription, easily rendering the Client account usable again. No Expiration: When this option is selected, the subscription for this Client will not expire. The Client will be permitted to connect to its partner(s) until you delete this Client account or change the Client Expiration settings. By default, this option will be selected. Expires In: When this option is selected, the Client subscription will endure for the time period that is specified in the adjacent field. When the end of the time period approaches, the Client user will be notified of the impending expiration during initial Client startup. (The user can also view the length of time until client expiration at any time by placing their cursor over the Client system tray icon to view the 'tool tip'.) When the time period has ended, this Client will no longer be permitted to connect to its assigned partner(s) until you change the Client Expiration settings. The default time period is 30 days. Expired: When this option is selected, the subscription for this Client has expired. The Client will not be permitted to connect to its assigned partner(s) unless you renew the subscription by selecting either the No Expiration or Expires In option and save your changes. Copyright 2014, Oracle and/or its affiliates. 29 Corente Services Client

30 Client Group Assignments: Corente Clients are combined into groups to make partner administration easier. Client Groups are created using the Client Groups feature, as described in Chapter 4. Add a Client Group (p. 31). To include A Corente Client in a group, simply select the checkbox beside the group name. You may add A Corente Client to as many groups as you would like. A Client Group may contain up to 100 Corente Clients. If A Corente Client is member of multiple groups or partnered with multiple Location partners, when the user signs onto the service, s/he will be asked to select a Location for that session. Corente Clients can connect to only one Location at a time. Note: Corente Clients cannot be partnered with each other. Additionally, Corente Clients can only partner with Locations that are reachable on TCP or UDP port 551. This means that a client cannot connect to any Location behind firewall or proxy server unless that device has been modified appropriately. Click OK when you have completed this form for adding a new Corente Client account. The new Client Name will now appear in your Client List. You may repeat this process to add other Corente Client accounts to your domain. You must Save your changes with the Save button on the App Net Manager tool bar in order for them to take effect. Once saved, the introductory message will automatically be sent to the address that you entered in this profile. After you have added Corente Client accounts in App Net Manager, you must remember to supply each user with: the password for their Corente Client account; and the URL or server from which they can download the personality file that you created for them with this feature. For security purposes, the password is not supplied to the user in any automatic message. You must contact the user yourself. You should also remind the user to change the password as soon as possible, and notify the user whether to obtain the Corente Client Software from you or directly via the notification . Copyright 2014, Oracle and/or its affiliates. 30 Corente Services Client

31 Chapter 4. Add a Client Group Corente Clients are combined into groups to make partner administration easier. When you select Client Groups in the domain directory, all Client Groups that have been configured in this domain will be displayed in a table to the right of the domain directory. This table displays the Client Group names and the number of members of each group. To view the members of an existing Client Group, open the Client Group's branch in the domain directory. Figure 14: Client Groups You can Delete any Client Group in this list. If the group is currently in use by any Corente Client, the Corente Client will no longer be able to contact any Locations partnered with that group. To create a new client group, make sure Client Groups is selected in the domain directory and: Select the New button in the tool bar. From the File menu, select Add Client Group. Right-click Client Groups in the domain directory and select Add Client Group. You will be taken to a blank Add Client Group window. Copyright 2014, Oracle and/or its affiliates. 31 Corente Services Client

32 MyCompany : Add Client Group Figure 15: Add Client Group Fill out this window as follows: Client Group Name: Enter a new group name and click OK. Once you save with the Save button in the App Net Manager tool bar, your new Client Group will appear in the list of Client Groups. To add members to a group, select that group while adding or editing A Corente Client account with the Clients feature. Copyright 2014, Oracle and/or its affiliates. 32 Corente Services Client

33 Chapter 5. Partnering Corente Clients with Locations After creating Corente Client accounts and placing them in Client Groups, you must partner each Client Group with the appropriate Location partners. Before You Begin Corente Clients can only connect to one Location partner at a time. That Location partner serves as a host Location. When the host Location is partnered to other Locations (or Corente Clients), the Corente Clients of the host Location will be able to access its partners as well. In this way, one Corente Virtual Services Gateway can provide complete Corente network access for all Corente Clients. Additionally, Corente Clients can only be partnered with Locations that have the Enable Client Access to this Gateway option enabled on the User Remote Access tab of their Location form. For more information about planning partners for Corente Clients, refer to II. Corente Client Configuration (p. 7). User Groups and Applications Each Location partner of a Corente Client can limit: the computers and/or application servers on the LAN that the Corente Client can access the computers and/or application servers on the LAN that can access the Corente Client the programs and services that can be used between the Corente Client and the computers on the LAN This permission configuration is accomplished by configuring tubes between the Location and each of its Client Group partners. Tubes provide access control between locations. (For more information on tubes, see Step 4 in the procedure below.) To configure tubes, you must access the Location form for the Location partner and register applications and/or create User Groups containing the computers that you would like Corente Clients to communicate with. For more information on registering applications and configuring User Groups, refer to the II B. Corente Services Policy Definition and Provisioning manual. Each Corente Client has the ability to connect to its Location partner s Corente network partners (when Backhaul All Traffic is enabled in the Corente Client s Client Account. For more information, refer to Chapter 3. Add a New Corente Client Account, p. 25). To connect to a Location s partner, the IP address of the Corente Client must be included in a User Group that the Location is sharing with the partner via a tube. Because a Location can be partnered with both Locations and Corente Clients, the Corente Client may be able to access Locations both in your Intranet and in your Extranet, as well as other Corente Clients. Copyright 2014, Oracle and/or its affiliates. 33 Corente Services Client

34 Partner Client Groups To partner Client Groups with a Location: 1. Access the Location form for a Corente Virtual Services Gateway: Right-click on the Location icon in the map or domain directory and select Edit. Double-click the Location name in the domain directory Select the Location name in the domain directory and then select the Edit option from the tool bar or the Edit menu. The Location form will be displayed in a new window. 2. On the Location form, click the Partners tab. This tab is used to select the Locations (both Intranet and Extranet) and Corente Clients that will partner with this Location. Figure 16: Partners Tab The main Partners tab presents a table of all partners that you have already added. You may Edit or Delete any partner listed in the table. Client Group partners are designated by the symbol. 3. To add a new Client Group partner, select the Add button on the main Partners tab. The Add Partner screen will be displayed. Copyright 2014, Oracle and/or its affiliates. 34 Corente Services Client

35 Figure 17: Add Partner 4. Begin by filling out the Connection to Partner section. This section allows you to choose a partner for this Location. To begin, choose Client Group as the partner type. Then, select a Client Group from the adjoining pull-down menu. 5. The only option that is available to configure for Location-to-client partnerships is the Tubes section. Using tubes, you can organize the tunnel between a Corente Virtual Services Gateway and a Client Group into logical tubes that regulate the access of each machine on the Location s LAN to members of the Client Group, and vice versa. A tube is a combination of a Local User Group and a Remote User Group, with a Firewall Policy assigned between them that defines both the inbound and outbound traffic that the Location gateway will allow over the connection. Note that a tube does not create a distinct IPSec tunnel for the traffic; rather, a tube provides fine-grained control over a site-to-site tunnel. The Tubes table on the Partners tab lists all of the tubes that you have already configured for this Location in the partnership. If you have multiple tubes, you can rearrange the order in which they are applied to traffic by using the Up and Down buttons. Traffic will attempt to use the tubes in the specific order in which they appear on this table. Copyright 2014, Oracle and/or its affiliates. 35 Corente Services Client

36 Notes: To allow members of the Client Group to use Gateway Viewer for browsing the resources that they are permitted to access on this Location's LAN, you must create a local Gateway LAN Address to remote Default User Group tube that allows the gateway_viewer Firewall Service. Otherwise, the members must use Microsoft networking to access the resources. If the members' traffic is being backhauled (default) and they are being served DNS and/or WINs addresses via DHCP, the Location gateway will automatically allow this traffic through the tunnel. The Location gateway will always allow broadcast traffic from the members of the group to reach its LAN. You can Edit or Delete any existing tube. To add a new tube, select the Add button. The Add Tube window will be displayed. Copyright 2014, Oracle and/or its affiliates. 36 Corente Services Client

37 Figure 18: Add Tube 6. The Local Side of the Tube section defines the local side of the tube. User Group: Select User Group if you would like a local User Group to participate in this tube. Choose the User Group from the adjacent pull-down menu. Copyright 2014, Oracle and/or its affiliates. 37 Corente Services Client

38 Note: If you are creating this tube to allow a remote User Group to allow access the local Location gateway with Gateway Viewer, select the Location LAN Address option from the User Group pull-down menu. When selecting a Firewall Policy for this tube, make sure that if you are providing remote access to Gateway Viewer, the gateway_viewer Firewall Service must be allowed in this Firewall Policy When the User Group option is selected, you can define what traffic you will allow to enter and leave your LAN between the local and remote side. The following Firewall Policy option will be enabled: Firewall Policy on Tube: Select a Firewall Policy that you would like to apply to traffic traveling between this User Group and the remote side of the tube. Below this option will be two additional fields: Firewall Policy on User Group: If there is a Firewall Policy that was enabled when defining the selected User Group and always applies to this User Group, the Firewall Policy will be displayed in this field. Default Firewall Policy: The default firewall policy for this type of connection will be displayed in this field (i.e., LAN to Client). All three Firewall Policies are listed here to remind you that Firewall Policies will be enforced on the connection in this order: Tube Firewall Policy, User Group Firewall Policy, and then Default Firewall Policy. Application: Select Application if you would like a local application to participate in this tube. Choose the application from the adjacent pull-down menu. 7. The Remote Side of Tube section defines the remote side of the tube. User Group: Select User Group and choose the Default User Group from the pulldown menu. The Default User Group contains the addresses of all Corente Clients within the Client Group. 8. When you have finished defining the tube, select OK to store your changes or Cancel to close the screen and discard your changes. The new tube will appear in the Tubes table. Add as many tubes as you would like. For more instructions on creating tubes and information about the behavior of tubes, refer to the Partners section in the II B. Corente Services Policy Definition and Provisioning manual. The major difference between partnering a Client Group with a Location and partnering two Location together is that all rules are enforced on the Location side only. In other words, you cannot define tunnels or Firewall Policies on the Corente Client side of the connection. Also, note that you will not be able to specify any Quality of Service (QoS) options for Corente Client tubes. Copyright 2014, Oracle and/or its affiliates. 38 Corente Services Client

39 9. When you are finished with the Partners tab, select the OK button and save your changes with the Save button in the App Net Manager tool bar. All members of the Client Group will now be partners with the Corente Virtual Services Gateway. Copyright 2014, Oracle and/or its affiliates. 39 Corente Services Client

40 IV. Obtaining and Installing the Corente Client Software After you have created Corente Client accounts for the appropriate remote users, they will each receive a notification . This will contain a hyperlink and instructions for downloading and installing the Corente Client Software. You can either: allow users to download the software package themselves via the hyperlink contained in the ; or download the package via the Client Software Package hyperlink on the Corente Administration Homepage at Figure 19: Corente Administration Homepage If you decide to download the software yourself from the homepage, you must decide how to distribute and/or install the software. You can store the package on a central file server and allow users to obtain the package from the server, or you can load and install the software on each computer yourself. Hardware and Software Requirements The Corente Client Software requires: Copyright 2014, Oracle and/or its affiliates. 40 Corente Services Client

41 A network card, modem (minimum 56-Kbps), or WiFi adapter with Internet access A local login account with administrator permissions Supported Operating Systems The software works only with the following operating systems: Windows 7 Professional, Enterprise, or Ultimate Edition (32 or 64 bit) Windows 8 (32 or 64 bit) Windows 8.1 (32 or 64 bit) Compatibility with Pre-Existing Network Devices The Corente Client will work on LANs behind NAT devices and firewalls. However, it cannot connect to the Corente network from behind a proxy server. IP Addresses The computer running the Corente Client software must never be assigned any IP address within the 10.x.x.x address range that has a network mask less than 9 bits (i.e., ). Corente uses this range of addresses for Virtual IP (VIP) addressing. This reserved address space covers 16 million addresses that can potentially be served as VIP addresses to Corente Virtual Services Gateways or Corente Client virtual adapters. These addresses are used so that all Corente network traffic is routed to the appropriate location. If your network includes any subnets that fall into this address space, there may be some conflicts between this address space and your Corente Clients. However, the subnet that is used for the VIPs of Corente Clients in your Corente network is minimized by a netmask to hold the smallest number of IP addresses possible, so that there is as little conflict with other 10.x.x.x networks as possible. Additionally, the entry for the virtual adapter will be hidden when the software is stopped. It will only be enabled when the software has been started. This ensures that the Corente Client can connect to machines in the local network with addresses in the 10.x.x.x address pool without conflicts when the software is not running. Internet Connection Sharing (ICS) The Corente Client Software provides Corente network connectivity for a single computer. You cannot run the Corente Client Software on a Windows machine with ICS enabled and have the machines behind it participate in the Corente network. The Corente Client does not route packets to the Corente network on behalf of other machines. Personal Firewalls Corente recommends the use of a personal firewall on all computers running the Corente Client Software. You must make sure that the firewall s permissions are set to allow the Corente Client Copyright 2014, Oracle and/or its affiliates. 41 Corente Services Client

42 Software to connect to the Internet. Netware If you are using Novell s Netware on your system, the Corente Client Software will work only with Netware v5.0 and later running native TCP/IP. It is not compatible with earlier versions of Netware. Resolving Standard Windows Networking Issues DNS and WINS for Corente Clients will function similarly to how it functions for computers on the LAN of the Corente Virtual Services Gateway. To provide name resolution, the addresses of DNS and WINS servers on the host Location s LAN must be served to Corente Clients via DHCP. For more information about serving addressing information to Corente Clients via DHCP, refer to Chapter 2. DHCP Server for Corente Clients (p. 13). Installing the Software Package If you currently have an active connection via a dial-up modem, disconnect from it before installing the software. The Corente Client Software package is a self-extracting package used to install the Corente Client Software. After the package (named CorenteClient.exe ) has been loaded onto the user s PC, doubleclick it to extract the software. Note that the same executable is used to install both the 32 and 64-bit versions of the Corente Client; the installer will automatically detect which type your operating system requires. A standard installation results when you accept the defaults to all questions. Depending upon the operating system on the PC, the installation procedure will vary. In general, the installation procedure requires the following: A reboot If the operating system is not stored on the PC s hard disk, access to the operating system CD-ROM If the user has administrative privileges on his/her local computer or the domain, then he/she can install the Corente Client Software. However, if your company does not grant administrative permissions on the local computer or domain to every user, then an administrator must install and configure the Corente Client Software on each computer that will become a remote access client. To install and configure the Corente Client Software, the installer must be logged on with a user account that has administrative privileges over either the domain or the local computer. This means that a new Corente Client user will not be able to install and configure the software if his user account does not allow him administrative privileges. Copyright 2014, Oracle and/or its affiliates. 42 Corente Services Client

43 Installing on Windows 7, Windows 8, and Windows 8.1 Windows 7, Windows 8, and Windows 8.1 may cause certain issues with the Corente Client software when User Account Control (UAC) is enabled on the computer (it is enabled by default). No matter what type of account you are logged into, applications will always run with regular user permissions on Windows 7, Windows 8, and Windows 8.1 when you attempt to access them in the normal way (e.g., by double-clicking the desktop icon or system tray icon). To perform installation of the Corente Client software, download the client's personality file, or upgrade the software while UAC is enabled, you must open the Corente Client application (or installation executable) with administrator permissions. To do this, you must begin by exiting the Corente Client application, if you have already started it; right-click the tray icon and select Exit. Next, right-click the desktop icon and select Run as administrator from the menu that is displayed. On the confirmation screen, select Allow (or, alternatively, if your current login account does not have administrative privileges, enter the username/password of an account that does). The application will launch and allow you to perform installation, configuration, and/or upgrades. To remind you what type of permissions you used to launch the application, when you open the Corente Control Panel, a hint will be displayed in the title bar of the application: if administrator privileges were used, the title bar will read "Administrator: Corente Control Panel". If administrator privileges were not used, the title bar will simply read "Corente Control Panel". During installation on Windows 7, Windows 8, and Windows 8.1, UAC may request your permission to install "Corente Network adapters". Select Install to continue with the installation, as these adapters are a necessary component of the Corente software. On Windows 7, the Client tray icon will be hidden and will not appear automatically in the system tray after you install the software. The tray icon provides an easy method of monitoring, controlling, and accessing the Client application. If you would like the icon to appear, you must customize the system tray and add the Client icon yourself. For instructions on how to display the tray icon, please refer to Displaying the Tray Icon in Windows 7 (p. 57). Already Installed? End users can determine whether the Corente Client Software has already been installed on their system by selecting: Start > Control Panel > Programs and Features If the Corente Client Software appears in the resulting panel, it has already been installed. Copyright 2014, Oracle and/or its affiliates. 43 Corente Services Client

44 Chapter 1. Configuring the Corente Client Use this procedure to download the Corente Client personality file for an installation of the Corente Client Software. The personality file contains the information that you entered in the user s Corente Client account. Before You Begin Before the user configures the Corente Client Software, verify the following: The user has received the automatic notification from Corente that explains the Corente Client personality file. The Corente Client Software is installed on the PC. The user has obtained the Corente Client password that you entered for him/her on the Add Client interface in App Net Manager. The user has obtained the appropriate URL or server address from which the personality file can be downloaded. Steps To configure the Corente Client, the user should perform the following steps: 1. Connect to the Internet. If connecting to the Internet via dial-up, dial the Internet provider. If connecting to the Internet via Ethernet, cable, WiFi, or DSL, no action is required. 2. Locate the Corente Client tray icon in the status area of the task bar (the lower right hand corner of the display). Double-click your left mouse button on this icon or right-click the icon and select Download Configuration. 3. The Corente Client Configuration screen will be displayed. This screen will capture information regarding your Corente Client account and access the client personality file that your network administrator created for you. Copyright 2014, Oracle and/or its affiliates. 44 Corente Services Client

45 Administrator : Corente Client Configuration Enter Corente Client account information to download the configuration that has been created for you by your network administrator. Domain: 4. Complete this screen as follows: Figure 21: The Corente Client Configuration Download Screen Domain: Enter the official domain name of the Corente network. Client Name: Enter the unique identifier assigned to the Corente Client account. Password: Enter the password that you have assigned to this particular Corente Client account when it was created. For security reasons, this information is not included in the Corente Client Configuration Notification received via . You must supply the user with this password. Server (or URL) Enter the server (DNS name or IP address) or URL from which the computer will download the Corente Client's personality file. Note: As you type, the full path to the file will appear below the Server (or URL) field. If you do not preface the server or URL with the path to the file will be filled in automatically after the domain. If you do preface the server or URL with you must enter the full path yourself. 2. Select Download. The system will retrieve and download the personality file. This will take a few moments. A message will be displayed if the download is successful. Copyright 2014, Oracle and/or its affiliates. 45 Corente Services Client

46 3. When the download is complete, your computer must be rebooted. 4. After reboot, you can Connect to the Location partner. During Configuration When the Corente Client account is created and added to the Corente SCP, a unique shared secret and a VIP address for the account are generated. This information constitutes the Corente Client personality file. It will be stored in the SCP until downloaded by the Corente Client user. After the configuration file has been downloaded, the user can start the Corente Client Software using the Connect option. The first time this option is selected and the computer successfully contacts the SCP, the SCP is given the public key of this Corente Client so that the SCP can distribute it to the Location partners. Corente will NEVER see the private key. From now on, the user can view the VIP address of the Corente Client on the About tab of the Corente Client interface. Copyright 2014, Oracle and/or its affiliates. 46 Corente Services Client

47 V. Starting the Corente Client Software This chapter describes how the user will start the Corente Client Software and connect to Corente Virtual Services Gateway Location partners on the Corente network. Additional operations can be performed during startup. For example, a user might receive an upgrade notification during software startup or might need to change the Corente Client password. Copyright 2014, Oracle and/or its affiliates. 47 Corente Services Client

48 Chapter 1. Connect to Access Location Partners Before connecting, the user should verify that the computer has access to the Internet (via either a dial-up, WiFi, or Ethernet/cable/DSL connection). Once the user is connected to your Corente network through WiFi or Ethernet/cable/DSL, the user cannot have an active dial-up connection. Note: If the user s computer currently has connections to the Internet on multiple network interfaces, the user will be asked to select an interface to use for Corente network transactions. If the user has not set the Corente Client Software to connect automatically when logging into his/her computer (using the Reconnect At Login option see Chapter 4. Preferences Tab, p. 61), the user must connect manually in one of two ways: Double-click the desktop shortcut named Corente-Client. Locate the Corente Client tray icon in the status area of the task bar (the lower right hand corner of the display) and either: o o Place the cursor over this icon and double-click the left mouse button. The Corente Control Panel will be displayed. Click the Connect button. Place the cursor over this icon, right-click the mouse button, and select Connect from the menu that appears. A dialog box will appear that requests the password. Depending on the type of authentication that you have enabled for the client, one of the following dialog boxes may appear: Password Authentication: The user should enter his/her password and click OK. Enter Password Figure 22: Login Local Authentication If the password has expired, the user will be asked to supply a new password before he/she can connect. This new password must contain at least one uppercase, one lowercase, and Copyright 2014, Oracle and/or its affiliates. 48 Corente Services Client

49 one numeric character. For more information on changing passwords, refer to Chapter 2. Changing the Password (Local Authentication Only) (p. 50). RADIUS or LDAP Server Authentication: The user should enter his/her RADIUS or LDAP login and password and click OK. Figure 23: Login RADIUS or LDAP Authentication If you have specified No Authentication for this client, the user will not be asked to supply a login or password. If the user has not selected to Always Connect to this Location (see Chapter 4. Preferences Tab, p. 61), the user will be asked to choose one of his/her Location partners to which a connection will be made. The user should choose a partner from the list and click OK. The connection will be established. Disconnecting When the user is finished with the Corente Client Software, the user can select Disconnect from either the tray icon menu or the Corente Control Panel. Note: If the Corente Client remains idle for longer than the Automatically Disconnect Corente Client After threshold that the user supplied on the Preferences tab (see Chapter 4. Preferences Tab, p. 61) or the computer enters Standby or Power Save mode while the Corente Client is connected, the Corente Client will automatically be disconnected. Copyright 2014, Oracle and/or its affiliates. 49 Corente Services Client

50 Chapter 2. Changing the Password (Local Authentication Only) Each time the user starts the Corente Client application, the user will be prompted to login. When Local Authentication is used for a Corente Client, the initial password will be the one that you created for the user on the Clients interface in App Net Manager. The user can change this password at any time while starting the Corente Client Software. To change the password, the user must enter the current password in the dialog box and click Change. Enter Password Figure 24: Enter password In the next dialog box that follows, the user should enter the new password twice. The new password must contain at least one each of the following: 1 numeric character 1 uppercase character 1 lowercase character Once the new password has been entered twice, click OK. Enter New Password Figure 25: Enter new password The software will contact Corente and the password will be changed. The user must use the new password the next time the user selects Connect. Copyright 2014, Oracle and/or its affiliates. 50 Corente Services Client

51 Forgotten Password? If the user cannot remember his/her password, you can change their password using the App Net Manager application, by editing their Client Account. When you access the Edit Client screen for that user, you can re-enter a new password in the Password and Confirm Password fields. Copyright 2014, Oracle and/or its affiliates. 51 Corente Services Client

52 Chapter 3. Client Expiration If you have configured a Corente Client account to expire (see Chapter 3. Add a New Corente Client Account, p. 25), the user will eventually connect and receive a notification similar to the one below: Figure 26: Client Expiration Alert When the time period specified in this notification has elapsed, the user will no longer be able to connect to Location partner(s) with the Corente Client. The user can view the length of time left before client expiration at any time when the user is connected by placing the cursor over the Corente Client tray icon to view the tool tip: Figure 27: Client expiration tool tip If the user attempts to start the Corente Client when the subscription has expired, the client will notify the user of the expiration and immediately disconnect the user from the service. The client subscription must be renewed to allow the user to access the partner(s) once again. An expired Client account will remain listed in App Net Manager so that you can modify the Client Expiration settings and renew the Client subscription, easily rendering the Client account usable again. To renew the expired client in App Net Manager, simply edit the user s Client account (see Chapter 3. Add a New Corente Client Account, p. 25). On the Client account window, simply change the Client Expiration settings and save your changes. The user will immediately be able to use the Client account again once your changes have been saved. Copyright 2014, Oracle and/or its affiliates. 52 Corente Services Client

53 Chapter 4. Upgrade Notification If there is an upgrade available for the Corente Client Software, a Required Upgrade Available note will be displayed on the Status tab of the Corente Control Panel (see Chapter 3. Status Tab, p. 59). To download the upgrade, access the About tab and click the Upgrade button. For more information, refer to Chapter 5. About Tab (p. 63). On the About tab, if there is an upgrade available for the Corente Client Software, the following message will be displayed: "An upgrade of the Corente Client Software is available. To download and install this upgrade, choose the 'Upgrade' button. The upgrading process may take several minutes and require you to restart your computer." Select the adjacent Upgrade button to download and install the upgrade. This message will include a due date by which the user must upgrade the software: "To ensure proper functioning of your Corente Client, you should upgrade before <expiration date and time>." If the Corente Client is currently disconnected, the message will also state: "To continue without upgrading, choose the 'Status' tab and then click the 'Connect' button." Each time the user connects with the Corente Client when an upgrade is available, the user will be notified about the available upgrade with a tool tip bubble alert and a note at the bottom of the Status tab. If the user chooses to upgrade, the new software will be downloaded to the system and installed automatically. The user will be asked to reboot the computer, but will not have to complete the installation process again or reconfigure the software. Note that the upgrade procedure does not have to be completed with a local Windows login account that has administrative permissions on the computer. The user can begin to use the new version of the software the next time the software is started. Note: The user must be able to use HTTP to access the Internet in order to perform the upgrade. Upgrades may require a reboot of the computer. When the Upgrade Due Date Expires If the due date has passed and the user has still not upgraded the Corente Client software, he user will be given a thirty (30) day grace period beyond the due date, after which the user must upgrade the software in order to continue using the Corente Client. A message on this tab will state: "You have X days to continue using your current software version before you must install the upgrade." If the Corente Client is currently disconnected, the message will also state: "To continue without upgrading, choose the 'Status' tab and then the 'Connect' button." Each time the user connects with the application, a tool tip bubble alert will be displayed that indicates the number of days the user has left in the grace period. The number of remaining days will also be displayed on this tab. Copyright 2014, Oracle and/or its affiliates. 53 Corente Services Client

54 When the grace period has ended, a message on this tab will state: "The software version you are currently using has expired. You must upgrade the software to continue using the Corente Client." In addition, the Connect button will be grayed out and the user will be unable to use the application until the user has clicked Upgrade to upgrade the software. Copyright 2014, Oracle and/or its affiliates. 54 Corente Services Client

55 VI. Using the Corente Client Software Once the Corente Client has started, the user will be able to access resources from computers behind its Corente Virtual Services Gateway partners. This chapter describes how to use the features of the Corente Virtual Services Gateway Software to access resources and manage the software. Copyright 2014, Oracle and/or its affiliates. 55 Corente Services Client

56 Chapter 1. The Tray Icon When the Corente Client Software is installed, the Corente Client tray icon will appear in the status area of the task bar (usually located in the lower right corner of the Windows desktop). The icon will change color to reflect the current status of the connection with a partner Location. Grey Icon: Windows 7 only. This icon will appear in the system tray when the computer is starting up, to indicate that the Windows firewall is currently loading. Once it has loaded, this grey icon will become the red icon (see below). Until the icon becomes red, the user will not be able to use the Corente Client software. Red Icon: The tunnel connection between the computer and its partner is down. Green Icon: The tunnel connection between the computer and its partner is up and active. Flashing Yellow Icon: The connection is being established. Use the Corente Control Panel to determine the current status of the connection (refer to Chapter 3. Status Tab, p. 59). Menu Items Place the cursor over the tray icon and click the right mouse button. The following menu is displayed: Figure 28: Tray Icon Menu Left-button click on any menu item. Note: The contents of the menu in the display change based upon the state of the Corente Client Software. Prior to downloading the personality file for the Corente Client Software, the menu will contain the Download Configuration item. After the user has downloaded the Corente Client personality file, the menu will contain the Connect item. When the Corente Client Software is running, the menu will contain the Disconnect item. Copyright 2014, Oracle and/or its affiliates. 56 Corente Services Client

57 Displaying the Tray Icon in Windows 7 After installation on Windows 7, the Corente Client icon will be hidden and will not appear automatically in the system tray. To display the tray icon, the user must either: Click the arrow in the system tray and select the Customize option. Access the Control Panel and select Appearance and Personalization. On the window that is displayed, find the Taskbar and Start Menu headline. Under this headline, click the Customize the taskbar option. On the window that is displayed, find the entry for the Corente Client. Click the pull-down menu adjacent to the entry and select the Show Icon option. Click OK to save the changes. The Corente Client icon will now appear in the system tray. Copyright 2014, Oracle and/or its affiliates. 57 Corente Services Client

58 Chapter 2. Corente Control Panel The Corente Control Panel allows the user to control the Corente Client and provides the user with connection status. To access the Corente Control Panel, the user has two options: Double-click the tray icon. Select Corente Control Panel from the tray icon menu Copyright 2014, Oracle and/or its affiliates. 58 Corente Services Client

59 Chapter 3. Status Tab The Status tab on the Corente Control Panel allows the user to view connection status and activity at a glance. Connection Figure 29: Status Tab This section displays the connection status of the Corente Client. Partner: The name of the Location to which the user are currently connected. Duration: The duration of the current session. Latency: The latency (in milliseconds) that traffic packets are experiencing on the connection. Copyright 2014, Oracle and/or its affiliates. 59 Corente Services Client

60 Activity This section displays the number of bytes both sent and received during the current session so far and provides a graphic representation of the connection. Notes Required Upgrade Available: If there is an upgrade available for the Corente Client Software, this note will be displayed in the lower left corner. To download the upgrade, access the About tab and click the Upgrade button. For more information, refer to Chapter 4. Upgrade Notification (p. 53). Connected to Admin: This note at the bottom of the screen lets the user know whether or not the Corente Client has an active connection to the Services Control Point (SCP). This connection allows the Corente Client to check for software updates and download them, as well as access the App Net Manager (if the user is a network administrator connecting remotely through A Corente Client). Occasionally, the Corente Client may not be able to establish a connection to the SCP, but this should not prevent the Corente Client from connecting to its Location partner(s). Copyright 2014, Oracle and/or its affiliates. 60 Corente Services Client

61 Chapter 4. Preferences Tab The Preferences tab on the Corente Control Panel allows the user to store preferences for the behavior of the Corente Client. Figure 30: Preferences Tab Connect to Selected Location: This list displays all of the Locations to which the user has been permitted to connect. If the user is currently connected, the Location to which the user is connected will be highlighted. Note that if the user is currently connected to a Location and wants to connect to a new Location, the user must first Disconnect. Always Connect to this Location: If there are multiple Locations in the list and the user would like to access the same one each time, the user should select the Location and then select this checkbox. If this checkbox is not selected, the user will be asked to select a Location each time the user starts the Corente Client. Reconnect at logon: If the user has selected the Always Connect to this Location checkbox, the user can select this option. If this checkbox is selected, the user will automatically connect to the specified Location when the user logs onto the computer. Copyright 2014, Oracle and/or its affiliates. 61 Corente Services Client

62 Use Selected Network Connection: This list will display all of the network interfaces on the computer that currently have connections to the Internet. If there are multiple network connections in this list, the user will be asked to select one when the user first connects (unless the user has already selected Always use this network connection). If the user is currently connected with the Corente Client, the network connection that the user is using will be highlighted. Note: Once the user is connected with the Corente Client through WiFi or Ethernet/cable/DSL, the user cannot establish an active dial-up connection to the Internet. Always use this network connection: If there are multiple network connections in the list and the user would like to use the same one (whenever it is available) each time the user connects with the Corente Client, select the network connection and then select this checkbox. If this checkbox is not selected, the user will be asked to select a network connection each time he/she starts the Corente Client. Automatically Disconnect Corente Client: If the user would like to automatically disconnect the Corente Client after a specified period of keyboard or mouse inactivity, the user should select an option from this pull-down menu. The default is Never. The user can also choose from After 10 minutes, After 30 minutes, After 1 hour, and After 2 hours. Note: If the computer enters Standby or Power Save mode while the Corente Client is connected, the Corente Client will automatically be disconnected. Copyright 2014, Oracle and/or its affiliates. 62 Corente Services Client

63 Chapter 5. About Tab The About tab on the Corente Control Panel allows the user to view information regarding the identity of the Corente Client and the version of the software that the user is currently running. Figure 31: About Tab Client Information This section displays identity information about the Corente Client. Name: The name of your company's domain and the name that has been assigned to the Corente Client account (i.e., domainname.clientname). VIP: The Virtual IP Address of the Corente Client. Version: The version of the software that the user is currently running. Client Upgrade If there is an upgrade available for the Corente Client Software, this section will display the following message with a due date by which the upgrade should be performed: Copyright 2014, Oracle and/or its affiliates. 63 Corente Services Client

64 "An upgrade of the Corente Client Software is available. To download and install this upgrade, choose the 'Upgrade' button. The upgrading process may take several minutes and require you to restart your computer." Select the adjacent Upgrade button to download and install the upgrade. For more information on automatic software upgrades and notifications, refer to Chapter 4. Upgrade Notification (p. 53). Copyright 2014, Oracle and/or its affiliates. 64 Corente Services Client

65 Chapter 6. Advanced The Advanced button at the bottom of the About tab displays the Advanced Settings tab. Client Logging Figure 32: Advanced Tab This section allows the user to choose a debug option for the Client Logs. Debug Setting: Choose a level of detail from the pull-down menu. This will affect the amount of data that is captured on the Log Viewer interface. For more information about Log Viewer, refer to Chapter 8. Log Viewer (p. 69). Client Connection This section allows the user to change the default connection type for the client. The Disable UDP Connection option should be selected by the user only if Corente technical support advised you to select this option for this particular Corente Client. Copyright 2014, Oracle and/or its affiliates. 65 Corente Services Client

66 Client Reset Occasionally, the user may need to re-synchronize the Corente Client's personality file with what is stored by the Corente network service. To perform this re-synchronization, the user should select the Reset Client Configuration option and then click OK. The Corente Client personality will be reset the next time the user connects to the Corente network. Copyright 2014, Oracle and/or its affiliates. 66 Corente Services Client

67 Chapter 7. Connect to Remote Computers Corente Client users connect to remote computers on the Corente network as if they were connecting to the Corente network from the LAN of their host Location. Users can browse remote servers on the Corente network using either Network Neighborhood or the Corente Gateway Viewer. To access Gateway Viewer, users must type the LAN IP address of the Location partner into the location bar of their web browser. Figure 33: Gateway Viewer Users will be able to access computers on the same LAN as the Corente Virtual Services Gateway on the Local Network page. To access any Corente network partners that they have been given permission to access in the User Group, they will use the Remote Networks page. Help for Gateway Viewer is provided to users in the Gateway Viewer application itself. The application is also described in the III. Corente Services Administration manual. Tube to Gateway Viewer To allow a Corente Client user to access Gateway Viewer for browsing resources, you must create a tube between that user s Client Group and the Location partner that defines a local Gateway LAN Address to remote Default User Group pairing, with a Firewall Policy that allows the gateway_viewer Firewall Service. Otherwise, the user must use Microsoft networking to access the resources. For more information, refer to Chapter 5. Partnering Corente Clients with Locations (p. 33). No NATing for Corente Clients Because they are bridged to the Location s LAN, Corente Clients of this Location will not see the NATed IP addresses of computers on the local network. Therefore, any subnets in the Location partner s User Group that are NATed with Outbound NAT will not appear NATed to Corente Clients. Corente Clients will connect to local computers using those computers' real IP addresses. Copyright 2014, Oracle and/or its affiliates. 67 Corente Services Client

68 When Corente Clients are not Backhauled If you have not selected the Backhaul All Traffic option when adding a new Corente Client account (see Chapter 3. Add a New Corente Client Account, p. 25), the Corente Client will not receive WINS and DNS server addresses when served its IP address by DHCP (either from the Corente Virtual Services Gateway DHCP server or an external server). Additionally, it will not be able to access and browse the computers behind the Corente network partners of its Location partners. The Corente network partners will appear in Gateway Viewer, but will be inaccessible. Appearing on the Local Network page of Gateway Viewer Windows computers announce themselves to the network automatically. When the Corente Client is able to announce itself, it will be listed on the Local Network page of Gateway Viewer as if it were a computer on the LAN of the Location gateway. Because of the nature of Microsoft networks, the amount of time that A Corente Client takes to appear on the Local Network page may vary. Copyright 2014, Oracle and/or its affiliates. 68 Corente Services Client

69 Chapter 8. Log Viewer The Log Viewer displays the communications log, a diagnostic tool that lists the IKE negotiations that occur during Authentication Phase 1. If a problem has occurred with the user s software or Corente network connection, it can indicate where this problem has occurred. This tool allows the user to send the log or the Registry Dump to Customer Care for diagnostic purposes. To use the Log Viewer feature, complete the following procedure. 1. On the Corente Control Panel, select View Log from the About tab. 2. The Log Viewer window will appear, like the one shown below. Send Log Figure 34: Log Viewer This command allows the user to send the entire contents of the orlog.txt file to Customer Care for diagnostic purposes, if it has been requested. This feature will work with any MAPI compliant program, including the following: Outlook, Outlook Express, and Netscape. Important: To use the Send Log feature, the software requires that the user s computer is disconnected from the Corente network. However, for remote WiFi clients, once the Corente network connection is down, the user s computer can no longer access the user s mail server(s) and, therefore, the created by Send Log cannot be sent until the user is reconnected to the Corente network. The user must either send the once reconnected to the Corente network or copy the orlog.txt file to another machine that has access to the mail server(s). From this machine, the user can create a new (with this file attached) to send to Customer Care. Copyright 2014, Oracle and/or its affiliates. 69 Corente Services Client

70 To send the log: 1. On the Log Viewer window, open the File menu and select Send Log. 2. This command will open the user s program and create a new message with a compressed version of the log file attached. The To address of the message will be filled in with the address of Customer Care, but the user may change this address if necessary. 3. Enter a message in the , if desired, and send it. Send Registry Dump The registry dump includes information about the user s installation of the Corente Client software, the client's personality file, and the current settings for the program. This command allows the user to send the contents of the registry dump to Customer Care for diagnostic purposes, if it has been requested. This feature will work with any MAPI compliant program, including the following: Outlook, Outlook Express, and Netscape. Important: If the user is using a remote WiFi client and attempts to use the Send Registry Dump feature while the Corente network connection is down, the created by Send Registry Dump cannot be sent until the user is reconnected to the Corente network because the computer can no longer access the user s mail server(s). Therefore, the user must either send the once reconnected to the Corente network or copy the hklm.r_g.gz file to another machine that has access to the mail server(s). From this machine, the user can create a new (with this file attached) to send to Customer Care. To send the registry dump: 1. On the Log Viewer window, open the File menu and select Send Registry Dump. 2. This command will open the user s program and create a new message with a compressed version of the registry dump file attached. The To address of the message will be filled in with the address of Customer Care, but the user may change this address if necessary. 3. Enter a message in the , if desired, and send it. Close the Log In the Log Viewer window, click the Close button. Note: This button merely closes the Log Viewer window. It does not affect connections or alter the information displayed in any way. Copyright 2014, Oracle and/or its affiliates. 70 Corente Services Client

71 VII. Accessing Corente Clients from the Corente Virtual Services Gateway LAN To access resources on a Corente Client from a computer on the LAN behind a Corente Virtual Services Gateway, some preparation may be required. The preparation includes some minor network configuration, as described in this chapter. Copyright 2014, Oracle and/or its affiliates. 71 Corente Services Client

72 Chapter 1. Network Requirements on the Corente Virtual Services Gateway LAN The following are adjustments you may need to make to the LAN of a Corente Virtual Services Gateway before the computers can share and access files on the Location s Corente Client partners. Routing to a Corente Client from Behind a Firewall To connect to a Corente Client from behind a firewall, it is important to ensure that any firewalls that protect the local Corente Virtual Services Gateway meet the mandatory firewall configuration as outlined in Firewalls, Security, and Port 551: Mandatory Firewall Settings in the I. Corente Services Planning manual. Remote Proxy Servers A Corente Virtual Services Gateway that is behind a SOCKS-capable proxy server can establish a tunnel with a Corente Client, provided that the proxy server allows the inbound connection to be mapped to the internal address of the Location gateway. Copyright 2014, Oracle and/or its affiliates. 72 Corente Services Client

73 Chapter 2. Access Corente Clients with Gateway Viewer Computers behind a Location gateway will be able to access the Corente Client partners of that Location when they are given the appropriate tube permissions. Users can use the Local Network page of Gateway Viewer to connect to these remote machines. In general, only Corente Clients that have been configured as file/print servers will be listed in Gateway Viewer. These computers can be accessed and browsed like any computer on the local network. For more information on browsing servers, refer to the section entitled Browsing computers on each remote network in the III. Corente Services Administration manual. A Corente Client that is configured as a client (i.e., cannot share resources) will not be visible in Gateway Viewer. Listing Corente Clients on Gateway Viewer All Corente Clients that connect to a Location will appear as if they are computers plugged into the Location gateway s LAN. Therefore, they will be listed on the Local Network page for that Location. Windows computers announce themselves to the network automatically. The Corente Client will appear on the Local Network page when it is able to announce itself. Because of the nature of Microsoft networks, the amount of time that A Corente Client takes to appear on the Local Network page may vary. Note: Corente Client Name Figure 35: Local Network page The Corente Client will be listed to users of the Gateway Viewer application as the host name of the computer. (On the computer, the host name can be viewed in the Network control panel.) However, when you use App Net Manager to manage the remote clients, the Corente Client will be listed by the Client Name that was assigned to it with the Client Manager tool. Copyright 2014, Oracle and/or its affiliates. 73 Corente Services Client

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Oracle Corente Services. Corente Services Administration Manual for Release 9.2

Oracle Corente Services. Corente Services Administration Manual for Release 9.2 Oracle Corente Services Corente Services Administration Manual for Release 9.2 E5995-1 February 215 Table of Contents Preface... vii 1 Domain Administration with App Net Manager... 1 1.1 App Net Manager...

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0:

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0: GVC SonicWALL Global VPN Client 4.0.0 Contents Pre-installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Known Issues... 4 Troubleshooting... 5 Pre-installation

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Copyright NeoAccel Inc. SSL VPN-Plus TM. NeoAccel Management Console: Network Extension version 2.3

Copyright NeoAccel Inc. SSL VPN-Plus TM. NeoAccel Management Console: Network Extension version 2.3 Copyright 2005-2009. NeoAccel Inc. SSL VPN-Plus TM NeoAccel Management Console: Network Extension version 2.3 NeoAccel makes no warranty of any kind with regard to this manual, including, but not limited

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

User Manual. SSV Remote Access Gateway. Web ConfigTool

User Manual. SSV Remote Access Gateway. Web ConfigTool SSV Remote Access Gateway Web ConfigTool User Manual SSV Software Systems GmbH Dünenweg 5 D-30419 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ssv-embedded.de Document Revision:

More information

Broadband Router DC-202. User's Guide

Broadband Router DC-202. User's Guide Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

UIP1869V User Interface Guide

UIP1869V User Interface Guide UIP1869V User Interface Guide (Firmware version 0.1.8 and later) Table of Contents Opening the UIP1869V's Configuration Utility... 3 Connecting to Your Broadband Modem... 5 Setting up with DHCP... 5 Updating

More information

PAN 802.1x Connector Application Installation Guide

PAN 802.1x Connector Application Installation Guide PAN 802.1x Connector Application Installation Guide Version 1.2 "Copyright CodeCentrix. All rights reserved 2015. Version 1.2 Contact Information CodeCentrix www.codecentrix.co.za/contact Email: info@codecentrix.co.za

More information

Sophos Connect. help

Sophos Connect. help help Contents About... 1 Installing...1 Uninstalling... 1 Connections...3 Import connection... 3 Connect...4 Connection options...7 Events...9 Troubleshooting events... 10 General troubleshooting... 13

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Business Connect Secure Remote Access Service (SRAS) Customer Information Package

Business Connect Secure Remote Access Service (SRAS) Customer Information Package Business Connect Secure Remote Access Service (SRAS) Customer Information Package Table of Contents 1.0 Introduction... 1 1.1 Overview... 1 1.2 Scope and Audience... 1 1.3 Design Deliverables... 1 1.4

More information

Wavelink Avalanche Site Edition Java Console User Guide. Version 5.3

Wavelink Avalanche Site Edition Java Console User Guide. Version 5.3 Wavelink Avalanche Site Edition Java Console User Guide Version 5.3 Revised 04/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

Configuring the VPN Client

Configuring the VPN Client Configuring the VPN Client This chapter explains how to configure the VPN Client. To configure the VPN Client, you enter values for a set of parameters known as a connection entry. The VPN Client uses

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

NetConnect to GlobalProtect Migration Tech Note PAN-OS 4.1

NetConnect to GlobalProtect Migration Tech Note PAN-OS 4.1 NetConnect to GlobalProtect Migration Tech Note PAN-OS 4.1 Revision A 2011, Palo Alto Networks, Inc. Contents Overview... 3 GlobalProtect Overview... 3 LICENSING... 3 UPGRADE... 3 Understanding the Migrated

More information

Receiver for BlackBerry 2.2

Receiver for BlackBerry 2.2 Receiver for BlackBerry 2.2 2015-04-19 05:21:53 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver for BlackBerry 2.2... 3 About This Release...

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

VMware Horizon Session Recording Fling:

VMware Horizon Session Recording Fling: VMware Horizon Session Recording Fling: The VMware Horizon Session Recording fling allows administrators to record VMware Blast Extreme sessions to a central server for playback. These recordings can be

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

Identity Firewall. About the Identity Firewall

Identity Firewall. About the Identity Firewall This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

Sophos Mobile. super administrator guide. Product Version: 8

Sophos Mobile. super administrator guide. Product Version: 8 Sophos Mobile super administrator guide Product Version: 8 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...

More information

Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 2 Resolved Issues... 3 Troubleshooting...

Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 2 Resolved Issues... 3 Troubleshooting... Global VPN Client SonicWALL Global VPN Client 4.6.4 Contents Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 2 Resolved Issues... 3 Troubleshooting...

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

CertGuaranteed. Study Hard and Pass Your Exam

CertGuaranteed. Study Hard and Pass Your Exam Topic 6, Implementing, Managing, and Troubleshooting Network Protocols and Services (29 questions) Section 1: Configure and troubleshoot the TCP/IP protocol. (10 question) QUESTION 1 You are the administrator

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

Oracle Corente Cloud Services Exchange. Corente Services Gateway Deployment Guide for Release 9.4.3

Oracle Corente Cloud Services Exchange. Corente Services Gateway Deployment Guide for Release 9.4.3 Oracle Corente Cloud Services Exchange Corente Services Gateway Deployment Guide for Release 9.4.3 E80339-03 May 2017 Oracle Legal Notices Copyright 2016, 2017, Oracle and/or its affiliates. All rights

More information

Comodo One Software Version 3.8

Comodo One Software Version 3.8 rat Comodo One Software Version 3.8 Dome Cloud Firewall Quick Start Guide Guide Version 1.1.061118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Dome Cloud Firewall Quick Start This

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

SonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide

SonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide SonicWALL Security Appliances SonicWALL SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide This Getting Started Guide contains installation procedures and configuration

More information

AT&T Cloud Web Security Service

AT&T Cloud Web Security Service AT&T Cloud Web Security Service Troubleshooting Guide Table of Contents 1 Summary... 3 2 Explicit Proxy Access Method... 4 2.1 Explicit Proxy Flow Diagram... 4 3 Proxy Forwarding Access Method... 6 3.1

More information

Version 5.0 September P Xerox App Gallery. App Gallery User Guide

Version 5.0 September P Xerox App Gallery. App Gallery User Guide Version 5.0 September 2018 702P06709 Xerox App Gallery App Gallery User Guide 2018 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ConnectKey, VersaLink, AltaLink, Xerox Extensible Interface

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All

More information

Broadband Router DC 202

Broadband Router DC 202 Broadband Router DC 202 Full Manual Table of Contents DC-202 xdsl/cable Broadband router REQUIREMENTS...4 INTRODUCTION...4 DC-202 Features...4 Internet Access Features...4 Advanced Internet Functions...5

More information

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.1.0:

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.1.0: GVC SonicWALL Global VPN Client 4.1.0 Contents Pre-installation Recommendations Platform Compatibility New Features Known Issues Resolved Known Issues Troubleshooting Pre-installation Recommendations SonicWALL

More information

Firepower Threat Defense Remote Access VPNs

Firepower Threat Defense Remote Access VPNs About, page 1 Firepower Threat Defense Remote Access VPN Features, page 3 Firepower Threat Defense Remote Access VPN Guidelines and Limitations, page 4 Managing, page 6 Editing Firepower Threat Defense

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

Yong Peng High School System Documentation PC Section

Yong Peng High School System Documentation PC Section Yong Peng High School System Documentation PC Section Kent Ong Date: 26 May 2008 System Engineer Revision 1 Liew Toh Seng System Consultant Table of Contents Preface...1 Network Configuration (Manual Configuration)...1

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

JabberNow Release Notes

JabberNow Release Notes JabberNow Release Notes Product Version: JabberNow 1.1 Document Version: A May 2006 Disclaimers Copyright 2006 Jabber, Inc. The information contained in this document is proprietary to Jabber, Inc. This

More information

CYAN SECURE WEB Installing on Windows

CYAN SECURE WEB Installing on Windows CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy

More information

SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0

SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0 SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0 Before you Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card installed

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.2

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.2 Wavelink Avalanche Mobility Center Java Console User Guide Version 5.2 Revised 27/09/2011 ii Copyright 2011 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

RealPresence Access Director System Administrator s Guide

RealPresence Access Director System Administrator s Guide [Type the document title] Polycom RealPresence Access Director System Administrator s Guide 2.1.0 March 2013 3725-78703-001A Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces.

More information

Infoblox Authenticated DHCP

Infoblox Authenticated DHCP Infoblox Authenticated DHCP Unified Visitor Management amigopod Technical Note Revision 1.1 5 July 2010 United States of America +1 (888) 590-0882 Europe, Middle East & Asia +34 91 766 57 22 Australia

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

SonicWALL / Toshiba General Installation Guide

SonicWALL / Toshiba General Installation Guide SonicWALL / Toshiba General Installation Guide SonicWALL currently maintains two operating systems for its Unified Threat Management (UTM) platform, StandardOS and EnhancedOS. When a SonicWALL is implemented

More information

Troubleshooting Cisco DCNM

Troubleshooting Cisco DCNM 18 CHAPTER This chapter describes some common issues you might experience while using Cisco Data Center Network Manager (DCNM), and provides solutions. Note For troubleshooting Cisco DCNM server installation

More information

BIG-IP Access Policy Manager : Network Access. Version 13.0

BIG-IP Access Policy Manager : Network Access. Version 13.0 BIG-IP Access Policy Manager : Network Access Version 13.0 Table of Contents Table of Contents About Network Access...7 What is network access?... 7 Network access features...7 About network access traffic...

More information

Frequently Asked Questions About Performance Monitor

Frequently Asked Questions About Performance Monitor APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,

More information

Yealink VCS Network Deployment Solution

Yealink VCS Network Deployment Solution Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

Cisco Modeling Labs OVA Installation

Cisco Modeling Labs OVA Installation Prepare for an OVA File Installation, page 1 Download the Cisco Modeling Labs OVA File, page 2 Configure Security and Network Settings, page 2 Deploy the Cisco Modeling Labs OVA, page 12 Edit the Virtual

More information

Yealink VCS Network Deployment Solution

Yealink VCS Network Deployment Solution Yealink VCS Network Deployment Solution Jul. 2016 V21.15 Yealink Network Deployment Solution ii Table of Contents Table of Contents... iii Network Requirements Overview... 1 Bandwidth Requirements... 1

More information

Link Platform Manual. Version 5.0 Release Jan 2017

Link Platform Manual. Version 5.0 Release Jan 2017 Version 5.0 Release 4.1.1 Jan 2017 Link Platform Manual Copyright 2017 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

MRD-310 MRD G Cellular Modem / Router Web configuration reference guide. Web configuration reference guide

MRD-310 MRD G Cellular Modem / Router Web configuration reference guide. Web configuration reference guide Web configuration reference guide 6623-3201 MRD-310 MRD-330 Westermo Teleindustri AB 2008 3G Cellular Modem / Router Web configuration reference guide www.westermo.com Table of Contents 1 Basic Configuration...

More information

Desktop App User Guide

Desktop App User Guide BlackBerry AtHoc Networked Crisis Communication Desktop App User Guide Microsoft Windows and Apple macos Platforms Release 7.0.0.2, July 2017 Copyright 2017 BlackBerry Limited. All Rights Reserved. This

More information

2 Click RoomWizard Setup.

2 Click RoomWizard Setup. The Subnet Mask is determined automatically by DHCP, or you may assign it here manually, if Use DHCP to get these is not selected. Use a class C setting for maximum security. The class C setting is 255.255.255.0.

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

CopperCube. Setup Guide

CopperCube. Setup Guide CopperCube Setup Guide Table of Contents Set up your CopperCube...1 of 13 Before You Start...1 of 13 Onboarding Forms...1 of 13 Equipment...1 of 13 Site Names and Device Ranges...1 of 13 CopperCube Redundancy...2

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

4-Port Broadband user manual Model

4-Port Broadband user manual Model 4-Port Broadband Router user manual Model 524537 INT-524537-UM-0309-02 introduction Thank you for purchasing the INTELLINET NETWORK SOLUTIONS 4-Port Broadband Router, Model 524537. Combining a router,

More information

Installation Procedure Windows 2000 with Internet Explorer 5.x & 6.0

Installation Procedure Windows 2000 with Internet Explorer 5.x & 6.0 Installation Procedure Windows 2000 with Internet Explorer 5.x & 6.0 Printer Friendly Version [ PDF 266K ] Before You Begin Before proceeding with the installation of a SOHO 6 appliance, you must have

More information

Supporting Networked Computers

Supporting Networked Computers CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

Yealink VCS Network Deployment Solution

Yealink VCS Network Deployment Solution Yealink VCS Network Deployment Solution Aug. 2016 V21.20 Yealink Network Deployment Solution ii Table of Contents Table of Contents... iii Network Requirements Overview... 1 Bandwidth Requirements... 1

More information

Connecting CoovaAP 1.x with RADIUSdesk - Basic

Connecting CoovaAP 1.x with RADIUSdesk - Basic 2017/05/17 21:58 1/13 Connecting CoovaAP 1.x with RADIUSdesk - Basic Connecting CoovaAP 1.x with RADIUSdesk - Basic Introduction CoovaAP is a sub-project of Coova.org. It is custom firmware which can be

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 CONTENTS Introduction... 5 MSM and AP Deployment Options... 5 MSM User Interfaces... 6 Assumptions... 7 Network Diagram...

More information