pinbox Manual Version 1.2
|
|
- Joan Briggs
- 5 years ago
- Views:
Transcription
1 Manual Version 1.2
2 Table of contents 1 Introduction Setting up Scope of delivery and device features Security Hardware Installation Software installation Determine IP address About "Detection Tool" About the DOS box Opening the admin tool Quick test Access via internet Setting up a domain Public IP Dynamic DNS service Integrated DynDNS services Router Port authorisation Configuring encryption Let's Encrypt Own certificate Configuring direct access Target computer Determine IP address Allowing access to PCs Link generation Two-Factor Authentication By Via Google Authenticator Two-Factor Authentication Google Authenticator Active Directory Notification System Display language Access via internet System logging Static IP Address Restart Print Licensing Change password Info Log out Using Technical Data Miscellanea System requirements Copy protection... 39
3 18.3 Legal information Disposal... 39
4 1 Introduction The is a hardware box based on ARM technology (Raspberry Pi). It is connected to a local area network, usually to a router or a switch. Appropriate port authorisations in the router/firewall will allow access to any PC in the network via a browser. Unlike a so-called VPN, the does not require any installations or configurations on the user side. Moreover, it needs no browser extensions or other tools. The combination of HTML5 technology and the Internet allows access -provided Internet is available - to PCs, mobile devices and desktops of all operating systems. You just need a browser. Access security is based on Internet standards such as HTTPS/SSL and the use of certificates. The supports the free certificate system "Let's Encrypt" for free certificates. Furthermore, it also supports the so-called two-factor authentication via or Google Authenticator.
5 2 Setting up It is necessary to install the hardware and the software for the initial setup of the. 2.1 Scope of delivery and device features The package includes the hardware box, a network cable and a power adaptor. 2.2 Security Please note the following safety instructions: - Operate the in a dust-free and dry place away from direct sunlight with adequate ventilation - The may only be operated inside buildings. Ensure that liquids do not enter the device - The must not be opened, as you may endanger yourself by improper opening
6 2.3 Hardware Installation 1.) Remove the from the packaging and connect it to a router, hub or switch using the network cable. 2.) Connect the power adapter to the and the mains electricity supply. Switch on the device. 3.) Wait approx. 2-3 minutes until the system is ready for operation.
7 2.4 Software installation Determine IP address In order to access the web interface, the IP address must first be determined About "Detection Tool" Download the Detection Tool from the Pintexx Home Page. The tool detects all corresponding networks and then starts to determine the IP address. If a system is found, a link with the IP address is displayed which allows direct access to the web interface About the DOS box Open a DOS box (right-click on Windows icon, run, "cmd" and enter "nslookup pinbox" in the box. The IP address should then be displayed Opening the admin tool If the IP address is known, the system can be retrieved via http: // <IP address> in a browser. The first time you log in, the setup wizard appears:
8 Enter an appropriate password here and repeat it. The password must be at least 8 characters long and contain at least one uppercase letter. Warning: Please note the password, otherwise access to the system is no longer possible. Thereafter, the system is restarted, and the login screen is displayed.
9 Enter the password to access the Admin area.
10 Overview of the administration interface:
11 3 Quick test Enter "gwdemo.pintexx.com" in the "Direct access" menu as RDP host / IP and go to "Generate link" at the bottom. Then open the desktop connection with "open link". In the login dialog, enter "testuser1" as the login and " " as the password. You should then be able to log in to the desktop. When you log out of the desktop, the window should be closed automatically.
12 4 Access via internet Warning: The should always communicate via an encrypted line. 4.1 Setting up a domain To set up an encrypted connection, a so-called domain is required. e.g. or Domains can be obtained from well-known Internet providers. The domain must then point to a public IP address of the router. Example:
13 4.1.1 Public IP You need a public IP address to connect to the Internet. This is visible in the router. Example: The domain must point to this IP address. Warning: If your Internet provider does not provide a static IP address, the IP changes constantly. This means that the outside access will stop working after a change, because the domain will point to the wrong IP address. A so-called dynamic DNS service (DYNDNS) might be suitable in this situation. See 4.1.2
14 4.2 Dynamic DNS service If the Internet provider does not provide a static IP address, you can also use a dynamic DNS service. The service can be configured in or in router Integrated DynDNS services From version 1.2 dynamic DNS services can be directly used inside. The following services are available: DynDNS No IP Dynu DNS Free DNS An account is required for the corresponding service. For each service a login/password as well as the domain hast o be entered. By pressing IP Update the current IP can be manually updated. Warning: It can take some minutes until the service is available!
15 4.2.2 Router This service always "connects" a domain to the current IP address of the provider. Example: 4.3 Port authorisation Once the domain has been set up, access to the from the outside must be possible. To that end, set up a so-called port authorisation. This "connects" the corresponding ports with the IP address of the. Please ensure that ports 80 and 443 remain available for setup should you wish to use the free certificate system "Let's Encrypt". If, conversely, you intend to use your own certificates, only port 443 is required. Example:
16 5 Configuring encryption Access to should definitely be done via an encrypted connection. PinBox supports its own certificate as well as the free certificate system "Let's Encrypt". 5.1 Let's Encrypt The free certificate system "Let's Encrypt" provides free certificates. In order to use Let's Encrypt, must be accessible via a domain such as.pintexx.com. Only in this situation will the installation be authorised. Furthermore, ports 80 and 443 must be accessible over the Internet to allow installation. Finally, the option "Allow Internet access" in the menu "System" must be enabled. If these conditions are met, you may install a Let's Encrypt certificate. 1) Access via the domain e.g., pinbox.mydomain.co.uk 2) Log in to the
17 3) Go to tab "SSL" 4) Press on Install "Let's Encrypt" 5) Provide your address. This serves informational purposes alone, e.g., when the certificate has expired. 6) Wait until Status shows: Installed 7) Log out 8) Access at From now on, all traffic to and from will be encrypted. 5.2 Own certificate A separate certificate should be available in P12 or PFX format. This file must be selected via "Browse". The certificate password must also be specified. Afterwards, you may activate the certificate with "Install certificate". Once the certificate is successfully installed, the can be accessed at
18 6 Configuring direct access Access to a PC is achieved by generating a link. The link is encrypted and can only be decrypted by the. The link contains NO passwords. The link will then be sent to the respective user. Warning: Please ensure that the link does not fall into the wrong hands! The direct access function generates a link for the user.
19
20 Users access the link through their browser. If a cookie is used, a login dialogue appears on the first access (depending on the setting in "Cookie Duration"): At this point, users must enter their desktop credentials. If a domain is available, the domain name + "\" + login must be specified. Using this information, the system attempts to connect to the desktop. If the Cookie Duration is > 0, the credentials are stored in a cookie that is valid for the specified time. In this case, no further credentials must be provided for this period. If the Cookie Duration is set 0, you must always log in. If no cookie is used, the Windows login screen appears.
21 The following options are available for link configuration: Option Use cookie Description If this option is activated, a so-called cookie is created during the first execution of the access link that stores the login and password information. This enables the options "cookie duration" and "cookie reset link". If no cookie is used, a login on the target computer is ALWAYS necessary. Cookie duration Cookie Reset Link RDP Host/IP Load Balance Info Determines the duration of the cookie storing the credentials. If the duration is set to 0, you must always log in. Users can access this link to delete the cookie from their computer The address of the desktop to be accessed. This can be specified as an IP address or a host name. If a terminal server with load balancing is used, enter the load balance information here. This has the following format: tsv://ms Terminal Services Plugin.1.<Name of collection> Languages Keyboard Upload/Download Clipboard Print Sound WakeOnLAN Display the Toolbar Mobile keyboard Min. Width Min. Height Setting for the message display language Keyboard layout setting Enables/disables the upload/download function via the toolbar Enables/disables access to the clipboard This option is available only when printing is enabled in the Print menu. Enables/disables the print function. Enables/disables the sound function. If this function is enabled, the MAC address of the destination computer must be entered. Then can automatically start the target computer before establishing a connection. The WakeOnLAN function must be activated in the BIOS of the target computer. Once the desktop connection has been established, the toolbar can be displayed by moving the mouse to the top. The toolbar displays an icon for displaying an on-screen keyboard. Sets the minimum width of the desktop on mobile devices. This allows increasing the display width. Sets the minimum height of the desktop on mobile devices. This allows increasing the display height.
22 Colours RDP Background RDP Topics RDP character smoothing RDP window content RDP window animation RDP desktop design Sets the colour depth in bits Optimizes the background display Optimizes the topic display Optimizes the display of text characters If a window is moved, the entire window content moves Allows window animation The desktop design represents the user interface elements of Windows Aero, such as Windows Vista. For example, transparent windows are available for Remote Desktop sessions
23 6.1 Target computer The target computer is the PC or VM to be accessed from outside Determine IP address The unique identifier in the network is the so-called IP address. This is entered in the "RDP IP/Host" field in the "Direct access" menu. The IP address can be determined as follows: - Run the command prompt on the target computer - Run the ipconfig command The IP address consists of 4 individual numbers, separated by a dot. In the example: " " Allowing access to PCs This access must be allowed for to access PCs. To do so, go to the "System and Security" section of the Control Panel and click on "Allow remote access".
24 Then, click on the option "Allow connection of computers on which..." for Windows 7. For Windows 10 "Allow remote connection to this computer". Confirm with "OK". This allows remote access to the PC and the access link can now be generated.
25 6.2 Link generation Click on "Generate link" to display the corresponding link. The link can be copied to the clipboard or opened directly. 6.3 Two-Factor Authentication By If two-factor authentication via has been configured in the "Two-Factor" menu, an address must be specified when configuring the link. A numeric code is sent to this address, which must be entered before the connection is established. Correct notification settings are required to use 2FA by Via Google Authenticator If two-factor authentication via Google Authenticator has been configured in the "Two-Factor" menu, the login and domain (optional) information must be provided when configuring the link.
26 If the link is generated, a link to the QR code and the code itself will also be generated. The QR code link should be sent to the user who then executes it in the browser. The code can then be scanned using the Google Authenticator app.
27 7 Two-Factor Authentication Two-factor authentication provides another security level. Further to logging in using login and password, users must specify another number that is known only to them. Whilst not strictly necessary, its use is highly recommended. You can choose from " " and "Google Authenticator" If the user chooses " ", a corresponding code word is sent to their address. This code must be entered before the connection is established. 7.2 Google Authenticator If the user chooses "Google Authenticator", the Google Authenticator app must first be installed on the user's smartphone. The URL of the QR code or the code is displayed directly when creating the direct access link. This QR code must be scanned by the user through the Google Authenticator app. The app then generates a code that must be entered before the connection is established. Warning: The time of the smartphone and the time of the system must be roughly the same.
28 8 Active Directory If an Active Directory is used, it is possible to perform a logon data verification before the connection is established. The AD domain can be specified If is part of the domain. Otherwise, the IP address should be used. Using this feature is recommended when an AD is available because it provides an extra security layer.
29 9 Notification The "Notifications" section allows setting up parameters for submission. The notification function is required if you use two-factor authentication via . These are required for general system information and when using two-factor authentication via .
30 10 System The system area allows various actions and settings Display language The display language can be set to "German" or "English" Access via internet Access via the Internet can be allowed. This option should be enabled as long as the system is configured. Internet access should be switched off when the configuration is completed. At that point, only access via the local network is possible System logging System logging can be activated and the system log displayed as required. This is needed for any support cases.
31 10.4 Static IP Address The system is configured from the start so that the IP address is received from a DHCP server. Alternatively, you may set up a static IP address. If this is entered in the "Static IP address" field, then further values can be set for Gateway and DNS. The "Set" option carries out the data transfer. The "Switch off" option switches back to DHCP Restart The "Restart" option restarts the system.
32 11 Print This function requires additional software. This can be automatically installed by activating the "Print" box. License conditions are recognized upon activation.
33 12 Licensing The is licensed using the so-called "concurrent users" metric, i.e. a 2-user license allows two users to access a PC simultaneously. The is either already delivered with a valid license or the license key is pending installation. If the license information contains "Evaluation", then a license key is required. Otherwise "Release" should be displayed. If a license file must be installed, you will receive the license file upon purchase. Select it by clicking "Browse" and press "Install". This will install the license on the system and reboot the system. License information about the validity of the license will be displayed afterwards.
34 13 Change password You can change the access password on the "Change Password" page. The password has a minimum length of 8 characters and should contain a capital letter, a lowercase letter, and a number.
35 14 Info The info area provides information about the version status as well as a link to additional information on our home page.
36 15 Log out You can log out from the admin tool via the "Logout function".
37 16 Using When using the to access a PC over the internet, you should observe the following advice: - ALWAYS use encrypted access to the. If not, your credentials (login, password) will be transmitted unencrypted and can be spied on by hackers! - Use a two-factor authentication This gives you another level of security and therefore increased security! - Switch off external access to the admin area Disabling the "Allow Internet access" option in the "System menu" prohibits access to the admin area via the Internet. You can still access the local network.
38 17 Technical Data Option Dimensions: Operating voltage: Operating temperature: Active power (max): Active Power (average): Weight: Network connection: Description 105mm * 75mm * 35mm 230V, 50Hz A / C degrees Celsius 3.7 W 2.4 W 100g Via RJ45 socket
39 18 Miscellanea 18.1 System requirements For correct operation, the requires a connection to a network, usually to the Internet. This is done by connecting to a network router, hub or switch Copy protection The has copy protection on the SD Card. Therefore, to check the correct version, it will run read-only access to Pintexx servers Legal information It is forbidden to make a copy of the enclosed SD Card. CE- Declaration of Conformity Pintexx GmbH hereby declares that the device complies with the essential requirements of EU directives. The full CE Declaration of Conformity can be found at Disposal The, the power adaptor and the cable must not be disposed of with household waste in accordance with the German Electrical and Electronic Equipment Act (ElektroG). Please contact your local authority regarding disposal.
pinremote Manual Version 4.0
pinremote Manual Version 4.0 Page 1 Table of content 1 Introduction... 4 2 Setup... 5 2.1 Requirements server... 5 2.2 Requirements client... 5 2.3 Setup process... 6 2.3.1 Single Server... 8 2.3.2 Cluster...
More informationKerio VPN Client. User Guide. Kerio Technologies
Kerio VPN Client User Guide Kerio Technologies 2012 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.3 for Windows. All additional
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationConfiguring Remote Access using the RDS Gateway
Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...
More informationUser Guide for Client Remote Access. Version 1.2
User Guide for Client Remote Access Version 1.2 Table of Contents PAGE Introduction... 2 Microsoft Multi-Factor Authentication Introduction... 3-4 User Enrollment... 5-8 Accessing Remote Resources Windows
More informationNetExtender for SSL-VPN
NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following
More informationAirCruiser G Wireless Router GN-BR01G
AirCruiser G Wireless Router GN-BR01G User s Guide i Contents Chapter 1 Introduction... 1 Overview...1 Features...1 Package Contents...2 AirCruiser G Wireless Router Rear Panel...2 AirCruiser G Wireless
More informationBROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017
BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...
More informationConfiguring the SMA 500v Virtual Appliance
Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance
More informationContents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing...
CSEC 640 Lab Access Contents Overview... 2 Part I Connecting to the VPN via Windows OS... 2 Accessing the Site with the View Client... 2 Installing... 3 Launching Your Client... 4 Part II Windows Access
More informationUnified-E App Manager
Unified-E App Manager Software Version 1.9.5.0, Last Update: June 2018 Content 1 General... 3 2 Communication with Smartphones... 3 2.1 Gateway Login... 3 2.1.1 Purchase Gateway License... 3 2.1.2 Online
More informationOdette CA Help File and User Manual
How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an
More informationCE APPROVED.4 INTRODUCTION.5 PACKAGE CONTENTS. 6 PRE - INSTALLATION CHECKLIST. 6 SYSTEM REQUIREMENTS. 6 FEATURES AND BENEFITS.11 SETUP WIZARD.
Web Edition Dec. 2002 Contents CE APPROVED...4 INTRODUCTION...5 PACKAGE CONTENTS... 6 PRE - INSTALLATION CHECKLIST... 6 SYSTEM REQUIREMENTS... 6 FEATURES AND BENEFITS... 7 4 - PORT CABLE/XDSL ROUTER...9
More informationUCON-IP-NEO Operation Web Interface
UCON-IP-NEO Operation Web Interface copyright G&D 25/01/2012 Web Interface version 2.30 Subject to possible errors and technical modifications License notes G&D license Copyright G&D GmbH 2003-2012: All
More informationEveryonePrint. Mobile Gateway 4.2. Installation Guide. EveryonePrint Mobile Gateway Installation Guide Page 1 of 30
EveryonePrint Mobile Gateway 4.2 Installation Guide EveryonePrint Mobile Gateway Installation Guide 2016.09.01 Page 1 of 30 1. Introduction... 3 1.1 Multiple networks (using Multicast Bonjour AirPrint)...
More informationVI. Corente Services Client
VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...
More informationUsing VMware View Client for Mac
May 2012 View Client for Mac This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationCisco Unified Serviceability
Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified
More informationKaseya 2. Installation guide. Version R8. English
Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Windows User's Guide v16.1 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationCLEARVIEW KIT INSTALLATION GUIDE
CLEARVIEW KIT INSTALLATION GUIDE Kit contents 1. Recorder with power supply 2. Camera Cables 3. Cameras 4. Mouse ** Display monitor and HDMI cable not included Remove recorder from the Kit and look over
More informationLink Platform Manual. Version 5.0 Release Jan 2017
Version 5.0 Release 4.1.1 Jan 2017 Link Platform Manual Copyright 2017 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationMigrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server
Parallels Remote Application Server Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Contents 1. Introduction a. Why Should You Migrate from Citrix to Parallels RAS b. Overview
More informationAuthlogics Forefront TMG and UAG Agent Integration Guide
Authlogics Forefront TMG and UAG Agent Integration Guide With PINgrid, PINphrase & PINpass Technology Product Version: 3.0.6230.0 Publication date: January 2017 Authlogics, 12 th Floor, Ocean House, The
More informationAPP-J: WHAT IS APPLICATION JUKEBOX?
APP-J: WHAT IS APPLICATION JUKEBOX? Use Application Jukebox (App-J) to run University software on any Windows PC or laptop. Launch apps from the Application Jukebox web page Install the Application Jukebox
More informationManual. Software Protection. TwinCAT 3. Version: Date:
Manual Software Protection TwinCAT 3 Version: Date: 1.7 2018-10-25 Table of contents Table of contents 1 Foreword... 5 1.1 Notes on the documentation... 5 1.2 Safety instructions... 6 2 Introduction...
More informationNETOP GUEST FOR ANDROID GUIDE
31.01.2017 NETOP GUEST FOR ANDROID GUIDE Contents 1 Introduction... 2 1.1 Document Scope... 2 2 Installing the Netop Guest... 3 2.1 Enter the Netop Guest license key... 3 3 Using the Netop Guest... 5 3.1
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Chrome User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationMicrosoft Dynamics GP Web Client Installation and Administration Guide For Service Pack 1
Microsoft Dynamics GP 2013 Web Client Installation and Administration Guide For Service Pack 1 Copyright Copyright 2013 Microsoft. All rights reserved. Limitation of liability This document is provided
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSoftBank Wireless Assistant Desktop Assistant Client User's Guide
SoftBank Wireless Assistant Desktop Assistant Client User's Guide Ver.5.5 Rev.1.1 3 Contents Preface Introduction... 4 1 The Personal Edition Desktop Assistant... 4 2 Requirements... 4 Chapter 1 Checking
More informationOutdoor User Manual. ios Application Android Application PC Setup
Outdoor User Manual ios Application Android Application PC Setup Please read all instructions carefully before use to get the most out of your Outdoor Wireless Surveillance Camera. The design and features
More informationXerox App Gallery App Gallery User Guide. Version 5.0 September P06709
Xerox App Gallery App Gallery User Guide Version 5.0 September 2018 702P06709 2018 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ConnectKey, VersaLink, AltaLink, Xerox Extensible Interface
More informationMYPLACE USER GUIDE User Guide for myplace.hexagon.com March 08, 2017
MYPLACE USER GUIDE User Guide for myplace.hexagon.com March 08, 2017 General Contents General... 3 1 Requirements... 4 1.1 Citrix client... 4 1.2 Citrix NetScaler (Access Gateway) plugin... 4 1.3 SMS Passcode...
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Windows User's Guide v15.5 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationMedia Server Installation & Administration Guide
Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)
More informationConnectivity options configuration
Global Connection Settings dialog box, page 1 Connectivity options access, page 5 Advanced details about ICA and RDP connections, page 18 Global Connection Settings dialog box While it is not recommended
More informationHome Automation Gateway HA102
USER MANUAL Home Automation Gateway HA102 TABLE OF CONTENTS 1. IMPORTANT SAFETY INFORMATION... 4 2. DEVICE DESCRIPTION... 5 3. INSTALLATION OF THE SCHWAIGER GATEWAY... 6 3.1 WIFI CONFIGURATION OF THE
More informationSymmetryCRM: Outlook Mail Application Tool
SymmetryCRM: Outlook Mail Application Tool Overview The Symmetry Outlook application allows smooth integration of inbound and outbound email When sending an email to one or more people, a user has the
More informationAmcrest 650 TVL DVR Quick Start Guide
Amcrest 650 TVL DVR Quick Start Guide Version 1.0.2 Revised May 9 th, 2016 Welcome Thank you for purchasing our Amcrest 650 TVL DVR! This quick start guide will help you become familiar with our DVR in
More informationSIGNATUS USER MANUAL VERSION 2.5
SIGNATUS USER MANUAL VERSION 2.5 CONTENTS 1 INTRODUCTION... 3 1.1 Launching SIGNATUS... 4 1.1.1 Launching SIGNATUS for the 1 st time... 4 1.1.2 Update your SIGNATUS License... 5 1.2 Main Menu... 6 2 SETTINGS...
More informationHSIP2 User Manual. ios Application Android Application PC Setup
HSIP2 User Manual ios Application Android Application PC Setup Please read all instructions carefully before use to get the most out of your HSIP2 Wireless Surveillance Camera. The design and features
More informationLoad testing with WAPT: Quick Start Guide
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
More informationSAMSUNG ALL-IN-ONE SECURITY SYSTEM
Quick Start Guide KIT MODEL SDH-B74041/SDH-B74081 DVR MODEL SDR-B74301 SAMSUNG ALL-IN-ONE SECURITY SYSTEM Thank you for purchasing the Samsung DVR Security System. Follow the simple steps in this guide
More informationOUTDOOR IR NETWORK CAMERA Series
OUTDOOR IR NETWORK CAMERA Series INSTALLATION GUIDE Please read instructions thoroughly before operation and retain it for future reference. 1. OVERVIEW 1.1 Package Content Network camera Installation
More informationHSIP2 User Manual. ios Application Android Application PC Setup
HSIP2 User Manual ios Application Android Application PC Setup Please read all instructions carefully before use to get the most out of your HSIP2 Wireless Surveillance Camera. The design and features
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Android User's Guide v16.2 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationUser Manual PDUTracker
User Manual PDUTracker Management Software for PDU Table of Contents 1. Overview... 1 1.1. Introduction... 1 1.2. Features... 1 2. Install and Uninstall... 1 2.1. System Requirement... 1 2.2. Software
More informationSIMATIC NET. Industrial Ethernet Security SCALANCE S615 Getting Started. Preface. Connecting SCALANCE S615 to the WAN 1
Preface Connecting SCALANCE S615 to the WAN 1 SIMATIC NET VPN tunnel between SCALANCE S615 and 2 SINEMA RC Server Industrial Ethernet Security Getting Started 07/2017 C79000-G8976-C390-02 Legal information
More informationMFA (Multi-Factor Authentication) Enrollment Guide
MFA (Multi-Factor Authentication) Enrollment Guide Morristown Medical Center 1. Open Internet Explorer (Windows) or Safari (Mac) 2. Go to the URL: https://aka.ms/mfasetup enter your AHS email address and
More informationCockpit Main Gateway Ordering Code: CKNOAD1
Cockpit Main Gateway Ordering Code: CKNOAD1 Table of contents 1. IMPORTANT SAFETY INFORMATION... 4 2. DEVICE DESCRIPTION... 5 3. INSTALATION OF THE COCKPIT GATEWAY... 6 3.1. WIFI CONFIGURATION OF THE
More informationNM6000 User's guide v1.2
USER S GUIDE NM6000 WLAN Clientt http://www.wiznet.co.kr Copyright 2004 WIZNET Inc. All Rights Reserved. 1 Table of Contents 1 INSTALLATION...3 1.1 POINTS TO REMEMBER BEFORE INSTALLATION...3 1.2 ACCESSING
More informationAmcrest 960H DVR Quick Start Guide
Amcrest 960H DVR Quick Start Guide Version 2.0.2 Revised July 22, 2015 Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very
More informationVIRTUALIZATION MANAGER ENTERPRISE EDITION GETTING STARTED GUIDE. Product: Virtual Iron Virtualization Manager Version: 4.2
VIRTUALIZATION MANAGER ENTERPRISE EDITION GETTING STARTED GUIDE This manual provides a quick introduction to Virtual Iron software, and explains how to use Virtual Iron Virtualization Manager to configure
More informationWA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.
WA2592 Applied Data Science and Big Data Analytics Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements
More informationThe Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING. VPN Web Portal Usage Guide
The Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING
More informationAccess Gateway 9.3, Enterprise Edition
Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...
More informationUsing SpringPeople Virtual Labs
Using SpringPeople Virtual Labs Each participant will be assigned a separate, dedicated, Virtual Lab computer for the entire duration of the training + a week for completing assigned development project.
More informationRelease Notes. Dell SonicWALL SRA Release Notes
Secure Remote Access Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 1 Important Differences Between the SRA Appliances...
More informationSecure Web Appliance. Basic Usage Guide
Secure Web Appliance Basic Usage Guide Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Description of the
More informationIN-SESSION ROOM SCHEDULER
SETUP GUIDE: COMMON SETTINGS RS-TOUCH SERIES IN-SESSION ROOM SCHEDULER 24/7 AT OR BLACKBOX.COM TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1 Description... 3 1.2 Network Infrastructure Requirements... 3 1.3
More informationIoT GSC-100 GSC-100. Table of Contents. SETUP GUIDE. GSC-100 Connection Overview. Version 1.0
SETUP GUIDE GSC-100 Version 1.0 Table of Contents GSC-100 Connection Overview... 1 GSC-100 Initial Setup... 2 Setup Wizard... 4 Silent Edge Connection... 5 GoSilent Server Connection... 6 Managing GSC-100
More informationCovene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management October 25, 2016 Version 3.3 Revision 1.
Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management October 25, 2016 Version 3.3 Revision 1.0 Table of Contents 1. Overview... 3 2. Upgrading an Existing Installation...
More informationPrivileged Access Agent on a Remote Desktop Services Gateway
Privileged Access Agent on a Remote Desktop Services Gateway IBM SECURITY PRIVILEGED IDENTITY MANAGER User Experience and Configuration Cookbook Version 1.0 November 2017 Contents 1. Introduction 5 2.
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationDevice LinkUP + VIN. Service + Desktop LP Guide RDP
Device LinkUP + VIN Service + Desktop LP Guide RDP Version 3.0 May 2016 Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationSophos Mobile Control Administrator guide. Product version: 5.1
Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this
More informationRicoh Managed File Transfer (MFT) User Guide
Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN
More informationXIA Configuration Server
XIA Configuration Server XIA Configuration Server v6 Cloud Services Quick Start Guide Tuesday, 20 May 2014 1 P a g e X I A C o n f i g u r a t i o n C l o u d S e r v i c e s Contents Overview... 3 Creating
More informationIT560 VPN router IT560. Commissioning
Issue 2018-02-22 Datasheet 4.30-50.560-11-EN VPN router pplication is a VPN router with server functionality and customized software that enables the secure transfer of encrypted data between controllers
More informationVMware Horizon Client for Linux User Guide. Modified on 4 JAN 2018 VMware Horizon Client for Linux 4.7
VMware Horizon Client for Linux User Guide Modified on 4 JAN 2018 VMware Horizon Client for Linux 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSoftware Description Application Software OTT Hydras 3 net
English Software Description Application Software OTT Hydras 3 net We reserve the right to make technical changes and improvements without notice! Table of contents 1 Overview of OTT Hydras 3 net 5 2 Data
More informationBIG-IP Access Policy Manager : Portal Access. Version 12.1
BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7
More informationKerio Control. User Guide. Kerio Technologies
Kerio Control User Guide Kerio Technologies 2017 Kerio Technologies s.r.o. Contents Viewing activity reports in Kerio Control Statistics......................... 5 Overview..................................................................
More informationThis reference guide provides troubleshooting information for our DAG/Citrix User Community.
Overview This reference guide provides troubleshooting information for our DAG/Citrix User Community. Important Information about your Digital Certificates Users cannot mix and match certificates Users
More informationWINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server
WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software
More informationCircuit Circuit Meeting Room V1, Configuration Guide. Administrator Documentation P31003-A4000-M A9
Circuit Circuit Meeting Room V1, Configuration Guide Administrator Documentation P31003-A4000-M100-02-76A9 Provide feedback to further optimize this document to edoku@unify.com. As reseller please address
More informationTable of Contents. HotSpot Installation. Windows 7, 8.1 and 10. Windows Server OS. DNS Web Filter Setup. Windows Configuration. Antamedia HotSpot?
Contents Table of Contents Part 1 1 Part 2 1 2 3 1 Introduction 1 What is... Antamedia HotSpot? 2 Requirements... 3 Pre-installation Steps... 4 Network Adapters Setup... 9 Network Topology Examples Part
More informationMAC HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your Mac computer
MAC HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your Mac computer WiseMo develops software for
More informationMFA Pilot Instructions
MFA Pilot Instructions Getting Started You will need the following: Your smartphone, a computer, and Internet access. Before using MFA your computer will need to be running Office 2016. If you are still
More informationC1002 IP Camera. Quick Installation Guide. Solwise Ltd., 1
C1002 IP Camera Quick Installation Guide Solwise Ltd., www.solwise.co.uk, sales@solwise.co.uk 1 Trademarks and/or registered trademarks are the property of their respective owners The information presented
More informationALL-IN-ONE SECURITY SYSTEM
DO NOT OPEN CAUTION : TO REDUCE THE RISK OF ELECTRICAL SHOCK DO NOT OPEN COVERS. NO USER SERVICEABLE PARTS INSIDE. REFER SERVICING TO QUALIFIED SERVICE PERSONNEL. WARNING : TO PREVENT FIRE OR SHOCK HAZARD.
More informationWA2393 Data Science for Solution Architects. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2393 Data Science for Solution Architects Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements
More informationSophos Mobile Control startup guide. Product version: 7
Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More information1. Install the DANALE app. 2. Create an account
USER S MANUAL EN 1. Install the DANALE app For Android users On your Google Play Store, search for Danale and then install the app on your phone. For ios users Please open your App Store, search for Danale
More informationEM4597 Concurrent AC1200 Dual Band Wi-Fi Repeater and Access point
EM4597 Concurrent AC1200 Dual Band Wi-Fi Repeater and Access point 2 ENGLISH EM4597 - Concurrent AC1200 Dual Band Wi-Fi Repeater and Access point Table of contents 1.0 Introduction... 2 1.1 Packing contents...
More informationCube LAN Gateway. Operating manual BC-LGW-O-TW
Cube LAN Gateway Operating manual BC-LGW-O-TW Package contents Package contents Quantity Item 1x MAX! Cube LAN Gateway 1x 1x 1x 1x 1x 3x Plug-in USB power supply USB cable Network cable Mounting accessories
More informationexacqvision Web Service Configuration User Manual Version 9.4
exacqvision Web Service Configuration User Manual Version 9.4 www.exacq.com 1 of 12 June 12, 2018 Information in this document is subject to change without notice. Copyright 2008-2018, Exacq Technologies,
More informationUser s Guide [Security Operations]
User s Guide [Security Operations] 007. 3 Ver. 1.04 Contents Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST...
More informationRemote Access Application Viewer User Guide. Version 2.5
Remote Access Application Viewer User Guide Version 2.5 Table of Contents Table of Contents... 2 Logging into Application Viewer... 4 Setting up your browser for the first time... 8 Internet Explorer...
More informationFUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.
FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document
More informationUser Manual. HOPPECKE sun powerpack premium. service software
User Manual HOPPECKE sun powerpack premium service software Contents 1. INTRODUCTION 4 2. TARGET GROUP 4 3. MEANS OF REPRESENTATION 4 4. BASIC INFORMATION FOR APPLICATION USE 5 4.1. System requirements
More informationGigaset Router / en / A31008-E105-B / cover_front_router.fm / s Be inspired
s Be inspired Table of Contents Table of Contents Safety precautions........................... 3 The Gigaset Router........................... 3 Features and Benefits..................................................
More informationHOL122 Lab 1: Configuring Microsoft Windows Server 2003 RPC Proxy
HOL122 Lab 1: Configuring Microsoft Windows Server 2003 RPC Proxy Objectives After completing this lab, you will be able to: Install remote procedure call (RPC) over Hypertext Transfer Protocol (HTTP)
More informationVMware Horizon Client for Chrome OS User Guide. 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7
VMware Horizon Client for Chrome OS User Guide 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationLab - Connect to a Router for the First Time
Introduction In this lab, you will configure basic settings on a wireless router. Recommended Equipment A computer with Windows installed An Ethernet NIC installed Wireless router Ethernet patch cable
More informationPMS 138 C Moto Black spine width spine width 100% 100%
Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of
More informationManual Download. Please visit SUNIX website by searching keyword isafe or KEY-256UN1 for detail.
Manual Download Please visit SUNIX website http://www.sunix.com by searching keyword isafe or KEY-256UN1 for detail. 1 User s Manual Copyright Copyright 2014 SUNIX Co., Ltd. All Rights Reserved. No part
More information