SSL VPN User s Guide for the Windows, Mac OS, Linux, and Unix Platforms Citrix Systems, Inc.

Size: px
Start display at page:

Download "SSL VPN User s Guide for the Windows, Mac OS, Linux, and Unix Platforms Citrix Systems, Inc."

Transcription

1 Citrix NetScaler Application Switch SSL VPN User s Guide for the Windows, Mac OS, Linux, and Unix Platforms Citrix Systems, Inc.

2 CITRIX SYSTEMS, INC., ALL RIGHTS RESERVED. NO PART OF THIS DOCU- MENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS OR USED TO MAKE DERIVATIVE WORK (SUCH AS TRANSLATION, TRANSFORMA- TION, OR ADAPTATION) WITHOUT THE EXPRESS WRITTEN PERMISSION OF CITRIX SYSTEMS, INC. ALTHOUGH THE MATERIAL PRESENTED IN THIS DOCUMENT IS BELIEVED TO BE AC- CURATE, IT IS PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IM- PLIED. USERS MUST TAKE ALL RESPONSIBILITY FOR THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS MANUAL. CITRIX SYSTEMS, INC. OR ITS SUPPLIERS DO NOT ASSUME ANY LIABILITY THAT MAY OCCUR DUE TO THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS DOCUMENT. INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITH- OUT NOTICE. COMPANIES, NAMES, AND DATA USED IN EXAMPLES ARE FICTITIOUS UNLESS OTHERWISE NOTED. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. Modifying the equipment without Citrix' written authorization may result in the equipment no longer complying with FCC requirements for Class A digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television communications at your own expense. You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the NetScaler Request Switch 9000 Series equipment. If the NetScaler equipment causes interference, try to correct the interference by using one or more of the following measures: Move the NetScaler equipment to one side or the other of your equipment. Move the NetScaler equipment farther away from your equipment. Plug the NetScaler equipment into an outlet on a different circuit from your equipment. (Make sure the NetScaler equipment and your equipment are on circuits controlled by different circuit breakers or fuses.) Modifications to this product not authorized by Citrix Systems, Inc., could void the FCC approval and negate your authority to operate the product. BroadCom is a registered trademark of BroadCom Corporation. Fast Ramp, NetScaler, and NetScaler Request Switch are trademarks of Citrix Systems, Inc. Linux is a registered trademark of Linus

3 Torvalds. Internet Explorer, Microsoft, PowerPoint, Windows and Windows product names such as Windows NT are trademarks or registered trademarks of the Microsoft Corporation. NetScape is a registered trademark of Netscape Communications Corporation. Red Hat is a trademark of Red Hat, Inc. Sun and Sun Microsystems are registered trademarks of Sun Microsystems, Inc. Other brand and product names may be registered trademarks or trademarks of their respective holders. Software covered by the following third party copyrights may be included with this product and will also be subject to the software license agreement: Copyright 1998 Carnegie Mellon University. All rights reserved. Copyright David L. Mills 1993, Copyright 1992, 1993, 1994, 1997 Henry Spencer. Copyright Jean-loup Gailly and Mark Adler. Copyright 1999, 2000 by Jef Poskanzer. All rights reserved. Copyright Markus Friedl, Theo de Raadt, Niels Provos, Dug Song, Aaron Campbell, Damien Miller, Kevin Steves. All rights reserved. Copyright 1982, 1985, 1986, , 1993 Regents of the University of California. All rights reserved. Copyright 1995 Tatu Ylonen, Espoo, Finland. All rights reserved. Copyright UNIX System Laboratories, Inc. Copyright 2001 Mark R V Murray. Copyright Eric Young. Copyright 1995,1996,1997,1998. Lars Fenneberg. Copyright Livingston Enterprises, Inc. Copyright 1992, 1993, 1994, The Regents of the University of Michigan and Merit Network, Inc. Copyright , RSA Data Security, Inc. Created Copyright 1998 Juniper Networks, Inc. All rights reserved. Copyright 2001, 2002 Networks Associates Technology, Inc. All rights reserved. Copyright (c) 2002 Networks Associates Technology, Inc. Copyright The Open LDAP Foundation. All Rights Reserved. Copyright 1999 Andrzej Bialecki. All rights reserved. Copyright 2000 The Apache Software Foundation. All rights reserved. Copyright (C) Robert A. van Engelen, Genivia inc. All Rights Reserved. Copyright (c) University of Cambridge. All rights reserved. Copyright (c) David Greenman. Copyright (c) 2001 Jonathan Lemon. All rights reserved. Copyright (c) 1997, 1998, Bill Paul. All rights reserved. Copyright (c) Matt Thomas. All rights reserved. Copyright 2000 Jason L. Wright. Copyright 2000 Theo de Raadt. Copyright 2001 Patrik Lindergren. All rights reserved. Part No. VPN-UG-JV Last Updated: December 2005

4

5 Contents Chapter 1 - SSL VPN Overview SSL VPN : Architecture SSL VPN : Key Features Chapter 2 - Getting Started with SSL VPN System Requirements Starting a SSL VPN Session Using the SSL VPN Browser Plug-in Accessing Client/Server Applications Using Web-based Applications Accessing a Remote File System Accessing Internal Web Sites Using Portal Tools Terminating the SSL VPN Session Chapter 3 - Troubleshooting the SSL VPN Browser Plug-in Debugging the SSL VPN Browser Plug-in SSL VPN Session Error Codes SSL VPN User s Guide i

6 Contents ii SSL VPN User s Guide

7 Chapter 1 SSL VPN Overview The SSL VPN is a secure remote access solution that provides point-to-point communication between remote users, such as mobile employees, partners, or resellers, and a private enterprise network. It does so by creating a secure SSL-based tunnel between a standard Web browser and a system. This allows authorized remote users to gain access to critical business resources such as corporate intranets, shared file systems, native client/server applications, and terminal services. This chapter provides an overview of the SSL VPN features. The following topics are described in this chapter: SSL VPN : Architecture SSL VPN : Key Features 1.1 SSL VPN : Architecture When you log on to a Web site that is secured by the SSL VPN, the system instructs the browser to download the SSL VPN browser plug-in onto your computer. The plug-in is a Java applet that creates a secure channel of communication between your browser and the system, thus allowing you to remotely access those resources you are authorized to use. Before the plug-in is downloaded, you will be prompted to permit it to execute. The plug-in first initializes itself by fetching the intranet applications, it supports, from the system. The network administrator configures the system with these applications. Once initialized, the plug-in listens on preconfigured ports. When it receives a request from the client, it opens a server-side connection, authenticates that connection with the user's credentials, and then tunnels subsequent data packets between the client and the server across the connection. This is illustrated in the following figure. SSL VPN User s Guide 1-1

8 SSL VPN Overview Figure 1-1 SSL VPN browser plug-in architecture The following section provides a step-by-step description of the preceding diagram. 1. The client application looks up the Hosts file for the address of the server. 2. The Hosts file points to localhost. The plug-in listens for requests, from the client application, on preconfigured ports. 3. The client application sends a request to the plug-in. 4. The plug-in forwards the request to the SSL VPN gateway. 5. The SSL VPN gateway forwards the request to the Application server. 6. The Application server responds to the SSL VPN gateway. 7. The SSL VPN gateway replies to the plug-in. 8. The plug-in replies to the client application. 1.2 SSL VPN : Key Features The SSL VPN supports: SSL 3.0 and TLS bit encryption Most TCP-based applications Windows, Linux, and Mac OSX 1-2 SSL VPN User s Guide

9 Chapter 2 Getting Started with SSL VPN The preceding chapter covered the architectural details of the SSL VPN browser plug-in. In this chapter, you will learn to use the plug-in. This chapter begins with a brief introduction to the system requirements for the plug-in. This is followed by detailed instructions on downloading and running the plug-in. The final section covers the various controls of the user interface. The following topics are described in this chapter: System Requirements Starting a SSL VPN Session Using the SSL VPN Browser Plug-in 2.1 System Requirements The minimum system requirements are: Windows Platform Web browsers: Internet Explorer 5.0+, Netscape 7.1, Mozilla 1.2+ Java Plug-in: JRE1.3.1 or greater Macintosh (MacOSX) Web browsers: Safari v1.2(v125) Java Plug-in: JRE1.4.2 Linux Platform Web browsers: Mozilla Java Plug-in: JRE1.3.1 or greater Note You can download the Java Runtime Environment (JRE) from Sun Microsystem s Java website if needed. Browse to to find the JRE for your operating system. 2.2 Starting a SSL VPN Session As mentioned earlier, the SSL VPN has been designed to provide remote users access to authorized resources on a private network, over a secure connection. SSL VPN User s Guide 2-1

10 To establish a secure connection, you must first log on to the SSL VPN Web site. Contact your system administrator for the URL to this Web site, and the login credentials. The typical format for such a URL is as follows: To log on to your company s SSL VPN Web site 1. Open a Web browser and enter the URL of the SSL VPN Web site. If your administrator has not configured a proper SSL certificate that identifies the server, the operating system will prompt you with a Security Alert window asking your permission to access the SSL VPN login window. Figure 2-1 Security Alert window The security alert indicates that there might be discrepancies in the certificate. For example: the certificate has expired. the domain name in the certificate does not match the domain name of the server. the certificate is not trusted. Click the Cancel button and contact the system administrator. 2. The SSL VPN login page is displayed. 2-2 SSL VPN User s Guide

11 Figure 2-2 SSL VPN login page 3. Enter your Login name and Password. 4. Click Go. When you log on to the SSL VPN for the first time, a security warning is displayed as shown in the following figure. This warning prompts you to download the SSL VPN browser plug-in. SSL VPN User s Guide 2-3

12 Figure 2-3 Security warning Note The appearance of these dialog boxes may differ across platforms and browsers. 5. Click the Grant this session or Grant always button. It is recommended that you click the Grant always button. The Proxy Configuration alert is displayed. Figure 2-4 Proxy Configuration alert Note This alert will not be displayed when you use Internet Explorer on Windows. For details on configuring the proxy settings of your Web browser, refer to the section of this chapter. 6. Click the OK button. The Secure Remote Access Session window and the services page are loaded as shown. 2-4 SSL VPN User s Guide

13 Figure 2-5 Secure Remote Access Session window and services page Note The Secure Remote Access Session window may take a few seconds to appear. If your computer using Netscape Navigator was was unable to fully load the smaller secure remote session window shown in the figure above, Netscape Navigator may not have been installed with Sun Java 2 support. You may need to rerun the Netscape Navigator installer, ensuring that Sun Java 2 support is selected. Note Update the proxy settings of the your Web browser to the values displayed on the Proxy Configuration alert or the Secure Remote Access Session window. This will enable you to access Web-based applications. 2.3 Using the SSL VPN Browser Plug-in The Secure Remote Access Session window is the graphical user interface to the browser plug-in. It allows you to securely access intranet portals, corporate applications, file systems, or mail on a private network. Closing the SSL VPN Session window will end the session. As a result, you will be disconnected from the private network. SSL VPN User s Guide 2-5

14 Figure 2-6 Secure Remote Access Session window The components of the Secure Remote Access Session window are described as follows: Proxy: The IP address and port number that the Web browser s proxy that enables Web access. Bytes sent: The quantity of data sent through the plug-in from the client to the server. Bytes received: The quantity of data received through the plug-in from the server to the client. Applications: Click this button to view the list of intranet applications configured on the system. Services: Click this button to view the services page. This page provides links to commonly accessed Web sites on the corporate network. File Transfer: Click this button to download/upload files, from the network, via the Web-based interface. Logout: Click this button to log off from the SSL VPN session. The message displayed on the Secure Remote Access Session window, indicates that the SSL VPN session will be terminated if you close the window. To gracefully terminate the session, click the Logout button. Otherwise, changes to the Hosts file on the client computer and the proxy settings will not be rolled back. The following sections cover the various tasks that you can perform with the plug-in Accessing Client/Server Applications As a remote user, you are authorized to access and use a limited set of client/ server applications on your company s intranet. The administrator configures these client/server applications on the system. To view these applications, 2-6 SSL VPN User s Guide

15 click the Applications button on the Secure Remote Access Session window. The Intranet Applications window, listing all the applications, is displayed. Figure 2-7 Intranet Applications window During a SSL VPN session, you will access these applications via the plug-in. There are two methods for doing so. The methods are: Hosts File Modification Method SourceIP and SourcePort Method These methods are explained in the following sections Hosts File Modification Method In this method, the plug-in adds an entry, corresponding to the applications configured by the VPN administrator, in the Hosts file. Note however that you must be logged in with root or administrative privileges in order for the plug-in to be able to modify this file. If you are not logged in to the system with the adequate privileges, you will need to manually edit the file yourself, adding the appropriate entries to the Hosts file as discussed in the following section. Consider a scenario where you need to open a Telnet session to a remote system from your laptop. You use the laptop to work both within your company s intranet and remotely. To ensure connectivity to the remote system from both within and outside your company s intranet 1. Add an entry telnet1 in the Hosts file on your computer. This entry consists of the IP address of the remote system and it s host name. SSL VPN User s Guide 2-7

16 Note On a computer that hosts the Windows platform, the Hosts file is located at %SYSTEMROOT%\system32\drivers\etc. On a computer that hosts the Mac and Linux operating systems, this file is located at /etc/hosts. To access the remote system from within your company s intranet 1. Initiate a Telnet session. 2. Type Open telnet1. The login prompt of the remote system is displayed. To access the remote system outside your company s intranet 1. Log on to the SSL VPN Web site. 2. Initiate a Telnet session. 3. Type Open telnet1. The login prompt of the remote system is displayed SourceIP and SourcePort Method If you do not possess administrative rights on your computer, the plug-in will not update the Hosts file. As a result, you need to manually configure the client/server applications using the source IP address and port values indicated on the Intranet Applications window. Within your company's intranet, use the destination IP address and destination port values corresponding to the application to be accessed. When using SSL VPN to access an application, use the source IP address and port values. These values are highlighted in the following figure. Figure 2-8 Details of the telnet1 application in the Intranet Applications window Consider the example in the previous section. To access the remote system from within your company s intranet 1. Initiate a Telnet session. 2-8 SSL VPN User s Guide

17 2. Type Open The login prompt of the remote system is displayed. Note is the DestIP value corresponding to telnet1. To access the remote system 1. Log on to the SSL VPN Web site. 2. Initiate a Telnet session. 3. Type Open The login prompt of the remote system is displayed. Note is the SourceIP value corresponding to telnet Using Web-based Applications The SSL VPN solution follows the Forward Proxy model to access intranet portals. All Web-based traffic is tunneled through the plug-in. When Internet Explorer is used to access the SSL VPN login page, the plug-in changes the proxy settings to reflect the proxy server indicated on the Secure Remote Access Session window. These changes are rolled back when the user logs off. This behavior is restricted to Internet Explorer on Windows. Other browsers need to be configured manually Using SSL VPN on Netscape and Mozilla You need to manually configure the proxy server settings of Netscape and Mozilla. The following procedure lists the steps to do so. To configure the proxy settings on Netscape and Mozilla 1. Select the Preferences option from the Edit menu. The Preferences window is displayed. SSL VPN User s Guide 2-9

18 Figure 2-9 Preferences window 2. Expand the Advanced option in the Category pane and select the Proxies option. The Proxies pane is displayed. Figure 2-10 Proxies pane 3. Select the Manual proxy configuration option SSL VPN User s Guide

19 4. Enter the IP and port address, displayed on the Secure Remote Access Session Window, in the HTTP Proxy and SSL Proxy fields respectively. 5. Click OK to save the changes Using SSL VPN on Safari When accessing the SSL VPN from the Mac OS X Safari web browser, the appropriate proxy settings are automatically configured for the session by the plug-in. No proxy configuration is necessary by the user Accessing a Remote File System To access the remote file system, click the File Transfer button on the Secure Remote Access Session window. The SSL VPN: Remote Secure File System Access page is displayed. This page allows you to log on to the intranet and access shared resources. The following figure illustrates the various components of this page. Figure 2-11 Remote Secure File System Access page. The following sections cover the various components of the SSL VPN: Remote Secure File System Access page. SSL VPN User s Guide 2-11

20 Top Panel The top panel of the SSL VPN: Remote Secure File System Access page displays the buttons, which allow you to perform various tasks, pertaining to the storage and transfer of files. Click this button to log on to the corporate network or a specific computer on that network. Click this button to navigate to the preceding folder in the folder tree. Click this button to refresh the contents of the active folder. Click this button to create a subfolder within the folder that is selected. Click this button to download the file from the remote server. Click this button to upload the file from the local client computer to a folder in the remote file server. Click this button to delete the file from the remote server. Click this button to change the name of a file or folder, which is selected. Click this button to disconnect from the remote server Left Panel The servers, their directories, and the directory structure are displayed in a tree format in the left panel as shown in the following figure. Click the + icon to view a subfolder SSL VPN User s Guide

21 Figure 2-12 Left panel Right Panel The right panel displays the Login Server window. Use this window to log on to the file system on the intranet or an appropriate file server. To access the file system, leave the Login Server field blank or click the Network Neighborhood link in the left panel. Note If you are not using Internet Explorer on Windows, ensure that you have modified the proxy settings of your Web browser. For details, refer to the section Using Web-based Applications, of this chapter. To log on to a file server 1. Enter the IP address or the name of the server in the Address field. Note If you leave this field blank, you will be logged on to the file system on the intranet. Alternately, if you type \\servername\c$, you can access the hidden shared folders on the server. 2. Enter your Login ID in the Login field. SSL VPN User s Guide 2-13

22 3. Enter your password in the Password field. If you do not have a password, leave the field blank. 4. Enter a valid domain name. If you have not been assigned a domain, leave the field blank. The right panel now displays the subfolders and files as shown in the following figure. The location of the active folder is displayed in the Address field. Figure 2-13 Right panel To download a file from a remote server 1. Select the file. 2. Click the Download icon. The File Download window is displayed SSL VPN User s Guide

23 Figure 2-14 File Download window 3. Click the Save button. The Save As dialog box is displayed as shown in the following figure. Figure 2-15 Save As dialog box 4. Navigate to the appropriate folder, and click the Save button to save the file. To upload a file to the remote server 1. Select the file in the local machine. SSL VPN User s Guide 2-15

24 2. Click to upload the file to the remote server. To remove a folder, a subfolder, or a file 1. Select the file, folder, or subfolder. 2. Click the Delete icon. The file is deleted from the local file system. Note A parent folder that contains subfolders cannot be removed. To delete a parent folder with subfolders, you need to delete the subfolders first and then delete the parent folder Accessing Internal Web Sites Most corporations host internal Web sites for sharing information. You can use the plug-in to access Web sites that are hosted on your intranet. To view these Web sites, click the Services button on the Secure Remote Access Session window. The Portal page is displayed below. The Portal page is created based on the data configured by the administrator. This page lists the most commonly accessed intranet Web sites. The administrator needs to configure this page manually SSL VPN User s Guide

25 Figure 2-16 Portal page Using Portal Tools The Portal page has several built in tools to assist you in using the SSL VPN. These tools include a ping interface for checking the accessibility of network hosts, tips, the SSL VPN User s guide, the SSL VPN file transfer utility and the SSL VPN themes utility. These tools have been placed under the home, file transfer and themes tabs on the SSL VPN portal page Home The tools under this tab help you navigate your way through the SSL VPN. This page can be customised by the SSL VPN adminstrator by providing themes that VPN users can apply for themselves. The individual tools are described below SSL VPN User s Guide 2-17

26 The Ping Tool The ping tool is used to check the accessibility of other computers on your intranet and on the Internet. This feature can help you troubleshoot connectivity issues if any, with your SSL VPN session in addition to determining availibility of a server hosting a resource on the network. Enter the IP address or hostname of the computer you which to ping and click the Ping button. The result of the ping query will be displayed immediately below the entry box. Figure 2-17 The Ping Tool The Tip and Help Tools The Tip tool offers helpful hints on using the SSL VPN and its various features. The Help tool is used to access the SSL VPN User s Guide. The User s Guide includes not only instructions on using the SSL VPN but also lists error code explanations and provides other troubleshooting assistance. The Bookmarks tool The SSL VPN Portal allows you to create your own set of links to commonly accessed resources. These bookmarks may be links to either intranet or Internet web sites or network accessible file systems on the intranet. Create a bookmark To create these bookmarks, click on the add links on the right side of the page. Figure 9 below shows the new page. In the Name field, enter the label to be used for your new link. In the Address Field enter either the uniform resource locator (URL) of the website or the network path to the fileserver. In the Description field, enter a short description for the created link. Once done, select the Add button to apply the new link or Cancel to exit the window without making any changes. Note A link to a website should contain the protocol specifier for example for web pages, for secure sites etc SSL VPN User s Guide

27 Figure 2-18 Add Bookmark Page The bookmark added here will be listed under the personal bookmarks on the SSL VPN home page as shown below. SSL VPN User s Guide 2-19

28 Figure 2-19 Personal bookmark Note The system automatically differentiates between website addresses (URLs) and network file system paths based on the format in which they are entered. Hence you do not need to specify which type of resource your link is for when you create it. Remove a bookmark To remove a personal bookmark, click on the remove button on the right side of the page. The Remove Bookmark page is displayed as shown in the figure. Select the bookmark you want to remove and click on the Remove button to confirm removal or click on the Cancel button to exit the window without making any changes SSL VPN User s Guide

29 Figure 2-20 Remove bookmark page Note You can remove only bookmarks listed under the Personal column and not those under the configured column File transfer For details, refer to the Accessing a Remote File System section Themes You can select themes that have been made available by the SSL VPN administrator for use with your SSL VPN session. The theme selected will be applied across all pages on the SSL VPN portal. If there are no themes configured by the VPN administrator then, on the Themes tab of the portal page, an error message is displayed as shown in the figure below. SSL VPN User s Guide 2-21

30 Figure 2-21 No themes configured Selecting a theme for the SSL VPN session Under the Themes tab on the SSL VPN portal, you can see the themes that the VPN administrator has made available for use. Click on the Select button next to the theme name for the theme to be applied for your current VPN session and all further VPN sessions SSL VPN User s Guide

31 Figure 2-22 Themes for the SSL VPN Portal Customizing your theme You can click on the customise button next to the theme name and change individual parameters used in the theme. The changes made are stored in a theme called Current Custom Theme and applied to the current theme. SSL VPN User s Guide 2-23

32 Figure 2-23 Customize your theme. Select the colors you want for each item on the SSL VPN portal page, the font stye and size and then click the Save Preferences button. The customized theme will now replace the old theme on the portal page. Note You can restore the default theme for the portal page by clicking on the Reset to site defaults button on the Themes tab Terminating the SSL VPN Session To log off from the SSL VPN session, click the Logout button. Note If you close the Secure Remote Access Session window (by clicking the Close button or by pressing Alt+F4), the changes to the Hosts file on the client computer and the proxy settings will not be rolled back SSL VPN User s Guide

33 Chapter 3 Troubleshooting the SSL VPN Browser Plug-in This chapter covers the troubleshooting of the SSL VPN browser plug-in. The following topics are described in this chapter: Debugging the SSL VPN Browser Plug-in SSL VPN Session Error Codes 3.1 Debugging the SSL VPN Browser Plug-in By default, the plug-in maintains a log of all of its activities in a separate ASCII file. This ASCII file, also known as a log file, is stored in the file system by the name mpsslvpn. On a computer that runs the Windows operating system, this file is stored in the root directory. For example, if the operating system resides on a partition labeled C of the hard disc, the log file is generated in the root (C:\)of this partition. On Mac OSX and Linux, the log file is generated in the /tmp directory. 3.2 SSL VPN Session Error Codes The following table lists the error codes displayed by the SSL VPN session. It also provides a description of these error codes. Table 3-1 Specific error codes displayed by the SSL VPN session Message Explanation Action Hosts file update failed. This message indicates that the plug-in has been unable to update the Hosts file on the client computer. Log on to the computer as an administrator. This will ensure that the Hosts file is updated. Alternately, follow the procedure outlined in the section SourceIP and SourcePort Method in chapter 2 of this guide. SSL VPN User s Guide 3-1

34 Troubleshooting the SSL VPN Browser Plug-in 3-2 SSL VPN User s Guide

Citrix NetScaler Quick Start Guide: Platform. Citrix NetScaler 9.1

Citrix NetScaler Quick Start Guide: Platform. Citrix NetScaler 9.1 Citrix NetScaler Quick Start Guide: 10010 Platform Citrix NetScaler 9.1 Copyright and Trademark Notice CITRIX SYSTEMS, INC., 2009. ALL RIGHTS RESERVED. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Citrix NetScaler Application Switch

Citrix NetScaler Application Switch Citrix NetScaler Application Switch Release Notes Release 6.1 Citrix Systems, Inc. CITRIX SYSTEMS, INC., 2005. ALL RIGHTS RESERVED. NO PART OF THIS DOCU- MENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM

More information

Addendum to Cisco Physical Security Operations Manager Documentation, Release 6.1

Addendum to Cisco Physical Security Operations Manager Documentation, Release 6.1 Addendum to Cisco Physical Security Operations Manager Documentation, Release 6.1 January 31, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

WorkPlace. User Guide Version 10.5

WorkPlace. User Guide Version 10.5 WorkPlace User Guide Version 10.5 2009 SonicWALL, Inc. All rights reserved. SonicWALL is a registered trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered

More information

Aventail WorkPlace. User s Guide Version 8.7.0

Aventail WorkPlace. User s Guide Version 8.7.0 Aventail WorkPlace User s Guide Version 8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile, Aventail Connect Tunnel,

More information

Citrix NetScaler 10 Quick Start Guide: MPX 5500 Platform

Citrix NetScaler 10 Quick Start Guide: MPX 5500 Platform Citrix NetScaler 10 Quick Start Guide: MPX 5500 Platform Citrix NetScaler 10 Copyright and Trademark Notice CITRIX SYSTEMS, INC., 2012. ALL RIGHTS RESERVED. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR

More information

Web Client Manual. for Macintosh and Windows. Group Logic Inc Fax: Internet:

Web Client Manual. for Macintosh and Windows. Group Logic Inc Fax: Internet: Web Client Manual for Macintosh and Windows Group Logic Inc. 703-528-1555 Fax: 703-527-2567 Email: info@grouplogic.com Internet: www.grouplogic.com Copyright (C) 1995-2007 Group Logic Incorporated. All

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 71 CHAPTER This section is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

Citrix NetScaler MAS NITRO API Getting Started Guide. Citrix NetScaler MAS 12.1

Citrix NetScaler MAS NITRO API Getting Started Guide. Citrix NetScaler MAS 12.1 Citrix NetScaler MAS NITRO API Getting Started Guide Citrix NetScaler MAS 12.1 Copyright and Trademark Notice CITRIX SYSTEMS, INC., 2018. ALL RIGHTS RESERVED. NO PART OF THIS DOCUMENT MAY BE REPRODUCED

More information

SSL VPN User Guide. Access Manager Appliance 3.2 SP2. June 2013

SSL VPN User Guide. Access Manager Appliance 3.2 SP2. June 2013 SSL VPN User Guide Access Manager Appliance 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Security Threat Response Manager NSM Plug-In Users Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2010-11-16 Copyright

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

CommandCenter Secure Gateway User Guide Release 5.2

CommandCenter Secure Gateway User Guide Release 5.2 CommandCenter Secure Gateway User Guide Release 5.2 Copyright 2011 Raritan, Inc. CC-0U-v5.2-E July 2011 255-80-3100-00 This document contains proprietary information that is protected by copyright. All

More information

Clientless SSL VPN Remote Users

Clientless SSL VPN Remote Users This chapter summarizes configuration requirements and tasks for the user remote system. It also helps users get started with Clientless SSL VPN. It includes the following sections: Make sure that the

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

GO-GLOBAL. Gateway API Sample. Version 4.8.2

GO-GLOBAL. Gateway API Sample. Version 4.8.2 GO-GLOBAL Gateway API Sample Version 4.8.2 COPYRIGHT AND TRADEMARK NOTICE Copyright 1997-2015 GraphOn Corporation. All Rights Reserved. This document, as well as the software described in it, is a proprietary

More information

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM Document ID: 70791 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Configure

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) CHAPTER 2 Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter contains information on the following topics: HTTPS Overview, page 2-1 HTTPS for Cisco Unified IP Phone Services,

More information

Contents. Platform Compatibility. New Features. Secure Remote Access SonicWALL SSL VPN 2.5 Early Field Trial (EFT) for SSL-VPN 200

Contents. Platform Compatibility. New Features. Secure Remote Access SonicWALL SSL VPN 2.5 Early Field Trial (EFT) for SSL-VPN 200 Secure Remote Access SonicWALL SSL VPN 2.5 Early Field Trial (EFT) for SSL-VPN 200 Contents Platform Compatibility New Features Known Issues Resolved Issues Upgrading SonicWALL SSL VPN Software Procedures

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1

Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1 Quick Start Guide Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1 Introduction 2 About the CWI 3 Getting Started 4 Setting Up the Router and CWI Client 5 Getting Started

More information

Novell Access Manager

Novell Access Manager SSL VPN User Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP1 March 17, 2010 www.novell.com Novell Access Manager 3.1 SSL VPN User Guide Legal Notices Novell, Inc., makes no representations

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Novell Identity Manager

Novell Identity Manager Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity

More information

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc.

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc. Getting Started Citrix Secure Gateway Version 1.0 Citrix Systems, Inc. Copyright and Trademark Notice Information in this document is subject to change without notice. Companies, names, and data used in

More information

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft Light Mesh AP User s Guide 2009/2/20 v1.0 draft i FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent

More information

Cambium Wireless Manager

Cambium Wireless Manager Cambium Wireless Manager Client Setup Guide System Release 4.2 and Later Issue 1 November 2014 2014 Cambium Networks. All Rights Reserved. Accuracy While reasonable efforts have been made to assure the

More information

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN Create and Apply Clientless SSL VPN Policies for Accessing Resources, page 1 Connection Profile Attributes for Clientless SSL VPN, page 1 Group Policy and User Attributes for Clientless SSL VPN, page 3

More information

IT Access Portal User Guide (Employees)

IT Access Portal User Guide (Employees) IT Access Portal User Guide (Employees) Introduction The University of Salford IT Access Portal provides University employees with secure, off-campus access to core IT applications and resources; for example:

More information

Authorized Send Installation and Configuration Guide Version 3.5

Authorized Send Installation and Configuration Guide Version 3.5 Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5

More information

AUSTRALIAN DEALER ACCESS

AUSTRALIAN DEALER ACCESS AUSTRALIAN DEALER ACCESS SSL VPN Ver: V2.0 Date: 26/01/11 Author: Nick Bourne - GEOPS Page 1 1.0 OVERVIEW...3 1.1 Aim of Document... 3 1.2 Initial Connectivity... 3 2.0 MAKING A CONNECTION...4 3.0 FIRST

More information

Connection Broker Advanced Connections Management for Multi-Cloud Environments

Connection Broker Advanced Connections Management for Multi-Cloud Environments Connection Broker Advanced Connections Management for Multi-Cloud Environments Using Leostream with the VMware Horizon View Direct- Connection Plug-in Version 8.2 December 2017 Contacting Leostream Leostream

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN Remote Access virtual private network (VPN) allows individual users to connect to your network from a remote location using a laptop or desktop computer connected to the Internet. This allows mobile workers

More information

AT&T Global Network Client for Mac User s Guide Version 1.7.3

AT&T Global Network Client for Mac User s Guide Version 1.7.3 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Cisco Unified Communications Manager (formerly Cisco Unified CallManager) serves as the software-based call-processing component of the Cisco Unified Communications family of products. A wide

More information

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition BLUEPRINT TEAM REPOSITORY Installation Guide for Windows For Requirements Center & Requirements Center Test Definition Table Of Contents Contents Table of Contents Getting Started... 3 About the Blueprint

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Juniper Secure Analytics Release 2014.3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-10-15 Copyright Notice Copyright 2014 Juniper

More information

MBNL UAD CITRIX FTP Solution

MBNL UAD CITRIX FTP Solution MBNL UAD CITRIX FTP Solution Introduction Serv-U Managed File Transfer (MFT) Server is a secure FTP server software that provides comprehensive security, automation, and centralized control for file transfers

More information

BIG-IP Access Policy Manager and F5 Access for Android. Version 3.0.4

BIG-IP Access Policy Manager and F5 Access for Android. Version 3.0.4 BIG-IP Access Policy Manager and F5 Access for Android Version 3.0.4 Table of Contents Table of Contents Legal Notices...5 Legal notices...5 Overview: F5 Access for Android...7 F5 Access and mobile devices...7

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers MDQS-6-3639 Rev 4.0 Revised June 13, 2017. PS Suite EMR software and related products and services are owned by TELUS. PS Suite EMR and

More information

Azure MFA Integration with NetScaler

Azure MFA Integration with NetScaler Azure MFA Integration with NetScaler This guide focuses on describing the configuration required for integrating Azure MFA (Multi-Factor Authentication) with NetScaler. Citrix.com 1 NetScaler is a world-class

More information

UNT System Campus VPN Guide

UNT System Campus VPN Guide Contents Introduction... 3 SSL Web Portal... 4 Installing AnyConnect VPNClient... 12 Connecting AnyConnect VPN client... 16 IPSec Client Configuration... 18 Apple OS X Configuration... 21 Android Configuration...

More information

Citrix User Guide Version 2.2. Table of Contents. Citrix on a PC... 1

Citrix User Guide Version 2.2. Table of Contents. Citrix on a PC... 1 Citrix User Guide Table of Contents Citrix on a PC... 1 Installing Browser Plug-ins... 1 Notes for Windows XP Service Pack 2 Users... 3 Logging In... 3 Accessing Applications... 4 Logging Off... 6 Citrix

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

By Anthony di Donato. Citrix Systems, Inc.

By Anthony di Donato. Citrix Systems, Inc. How to install NFuse Components and Web Extensions on the same Server? By Anthony di Donato Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION

More information

SonicWALL SSL VPN 2.5 Early Field Trial

SonicWALL SSL VPN 2.5 Early Field Trial Secure Remote Access Contents Platform Compatibility New Features Known Issues Resolved Issues Upgrading SonicWALL SSL VPN Software Procedures Related Technical Documentation Platform Compatibility The

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Quick Start Using Leostream with Citrix XenDesktop 7 and HDX Version 8.1 January 14, 2016 Contacting

More information

Upgrading from Call Center Reporting to

Upgrading from Call Center Reporting to Upgrading from Call Center Reporting to Reporting for Call Center Upgrade Document Reporting for Call Center Release 2.2.1xx Document Number: 200-0400-110 Document Status: Standard Document Version: 3.02

More information

CFS Browser Compatibility

CFS Browser Compatibility CFS Browser Compatibility This document outlines the requirements for browsers certified by Oracle, for use with our current version of CFS. The information contained here has been consolidated from documents

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-07-19 Copyright Notice Copyright 2013

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

TrafficShield Installation and Configuration Manual. version 3.2 MAN

TrafficShield Installation and Configuration Manual. version 3.2 MAN TrafficShield Installation and Configuration Manual version 3.2 MAN-0141-00 Service and Support Information Service and Support Information Product Version This manual applies to product version 3.2 of

More information

Practice Labs User Guide

Practice Labs User Guide Practice Labs User Guide This page is intentionally blank Contents Introduction... 3 Overview... 3 Accessing Practice Labs... 3 The Practice Labs Interface... 4 Minimum Browser Requirements... 5 The Content

More information

Novell Access Manager

Novell Access Manager SSL VPN User Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.0 SP4 September 16, 2008 www.novell.com Novell Access Manager 3.0 SP4 VPN User Guide Legal Notices Novell, Inc., makes no representations

More information

Using ZENworks with Novell Service Desk

Using ZENworks with Novell Service Desk www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide Document Control Number: 7055011 Contract Number: DMS-13/14-024 Prepared for: Florida Department of Management Services Division of Departmental

More information

Service Portal User Guide

Service Portal User Guide FUJITSU Cloud Service K5 IaaS Service Portal User Guide Version 1.4 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2016 K5IA-DC-M-005-001E Preface Purpose of This Manual This manual

More information

SecureTransport Version May Web Client User Guide

SecureTransport Version May Web Client User Guide SecureTransport Version 5.3.6 9 May 2018 Web Client User Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway SecureTransport 5.3.6 No part of

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

Multi-Sponsor Environment. SAS Clinical Trial Data Transparency User Guide

Multi-Sponsor Environment. SAS Clinical Trial Data Transparency User Guide Multi-Sponsor Environment SAS Clinical Trial Data Transparency User Guide Version 6.0 01 December 2017 Contents Contents 1 Overview...1 2 Setting up Your Account...3 2.1 Completing the Initial Email and

More information

3.1 Getting Software and Certificates

3.1 Getting Software and Certificates 3 Configuring the Remote Client On the remote client you have to download the Sophos SSL VPN Client software including configuration data from the UTM User Portal. Then you install the software package

More information

Dell SonicWALL Aventail Connect Tunnel User s Guide

Dell SonicWALL Aventail Connect Tunnel User s Guide Dell SonicWALL Aventail 10.6.2 Connect Tunnel User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

estatement User Guide Open Solutions Inc

estatement User Guide Open Solutions Inc Open Solutions Inc Digital Document Systems http://www.cowww.com estatement User Guide What is estatements?... 3 How Can I Access My estatement?... 3 estatement Access Requirements... 3 Viewing Your estatement

More information

SecureTransport Version September Web Client User Guide

SecureTransport Version September Web Client User Guide SecureTransport Version 5.3.1 15 September 2017 Web Client User Guide Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway SecureTransport 5.3.1 No

More information

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

School Installation Guide ELLIS Academic 5.2.6

School Installation Guide ELLIS Academic 5.2.6 ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,

More information

Pulse Secure Client for Chrome OS

Pulse Secure Client for Chrome OS Pulse Secure Client for Chrome OS Quick Start Guide Published March, 2018 Release 5.2r1 Version 1.6 2018 by Pulse Secure, LLC. All rights reserved 1 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose,

More information

Real-Time Monitoring Configuration

Real-Time Monitoring Configuration CHAPTER 7 This chapter contains the following information for configuring the Cisco Unified Presence Server Real-Time Monitoring Tool (RTMT). Some options that are available in the current version of the

More information

Perceptive TransForm E-Forms Manager

Perceptive TransForm E-Forms Manager Perceptive TransForm E-Forms Manager Installation and Setup Guide Version: 8.x Date: February 2017 2016-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered

More information

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver LevelOne FBR-1416 1W, 4L 10/100 Mbps ADSL Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 FBR-1416 Features... 1 Package Contents... 3 Physical Details... 3 CHAPTER 2

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Server Installation Guide

Server Installation Guide Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

User Guide. DOCSIS 3.0 High Speed Cable Modem TC7650 REV

User Guide. DOCSIS 3.0 High Speed Cable Modem TC7650 REV User Guide DOCSIS 3.0 High Speed Cable Modem TC7650 REV1.1.0 1910011895 Contents About This Guide..................................................... 1 Chapter 1. Get to Know Your Modem................................

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

Clearspan Hosted Thin Call Center R Release Notes JANUARY 2019 RELEASE NOTES

Clearspan Hosted Thin Call Center R Release Notes JANUARY 2019 RELEASE NOTES Clearspan Hosted Thin Call Center R22.0.39 Release Notes JANUARY 2019 RELEASE NOTES NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by

More information

Sage Installation and System Administrator s Guide. March 2019

Sage Installation and System Administrator s Guide. March 2019 Sage 100 2019 Installation and System Administrator s Guide March 2019 2019 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product and service names mentioned herein

More information

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC. FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU

More information