Aruba VIA 2.1.x. User Guide

Size: px
Start display at page:

Download "Aruba VIA 2.1.x. User Guide"

Transcription

1 Aruba VIA 2.1.x User Guide

2 Copyright Information Copyright 2015 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public License, the GNU Lesser General Public License, and/or certain other open source licenses. A complete machine-readable copy of the source code corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett- Packard Company. To obtain such source code, send a check or money order in the amount of US $10.00 to: Hewlett-Packard Company Attn: General Counsel 3000 Hanover Street Palo Alto, CA USA Please specify the product and version for which you are requesting source code. You may also request a copy of this source code free of charge at dl-gplquery@arubanetworks.com. Revision 01 (Undefined variable: ArubaFrameStyles.Release Date) Aruba VIA 2.1.x User Guide

3 Contents Contents 3 About this Guide 5 Intended Audience 5 Related Documents 5 Conventions 5 Contacting Support 6 Overview 8 VIA Connection 8 Compatibility Matrix 10 VIA Client 11 VIA Client for Microsoft Windows 11 VIA Client for MacOS 23 VIA Client for Linux 28 VIA Client for Android 33 VIA Client for ios 36 VIA System Tray Icon Behavior 38 VIA Configuration 39 Before you Begin 39 Authentication Mechanisms Supported in VIA 39 Configuring VIA Settings 40 Troubleshooting VIA 55 Troubleshooting VIA on Windows 55 Troubleshooting VIA on Linux 57 IPsec 62 Certificate Operations 64 Aruba VIA 2.1.x User Guide Contents 3

4 4 Contents Aruba VIA 2.1.x User Guide

5 About this Guide This document describes the features supported by Aruba Virtual Intranet Access (VIA) and provides detailed instructions on configuring and using VIA in your network. See the Virtual Private Networks chapter in the latest ArubaOS User Guide for information on configuring VPN settings on the controller. Intended Audience This guide is intended for the following audience: System administrators who configure and maintain Aruba controllers and VIA clients for users Corporate users who use VIA client to connect to their corporate network Related Documents In addition to this document, the VIA product documentation includes the following: Aruba VIA Windows Edition Release Notes Aruba VIA Mac Edition Release Notes Aruba VIA Linux Edition Release Notes Aruba VIA ios Edition Release Notes Aruba VIA Android Edition Release Notes Conventions The following conventions are used throughout this manual to emphasize important concepts: Table 1: Typographical Conventions Type Style Italics System items Description This style is used to emphasize important terms and to mark the titles of books. This fixed-width font depicts the following: Sample screen output System prompts File names, software devices, and specific commands when mentioned in the text. Commands In the command examples, this style depicts the keywords that must be typed exactly as shown. Aruba VIA 2.1.x User Guide About this Guide 5

6 Type Style <Arguments> Description In the command examples, italicized text within angle brackets represents items that you should replace with information appropriate to your specific situation. For example: # send <text message> In this example, you would type send at the system prompt exactly as shown, followed by the text of the message you wish to send. Do not type the angle brackets. [Optional] {Item A Item B} Command examples enclosed in brackets are optional. Do not type the brackets. In the command examples, items within curled braces and separated by a vertical bar represent the available choices. Enter only one choice. Do not type the braces or bars. The following informational icons are used throughout this guide: Indicates helpful suggestions, pertinent information, and important things to remember. Indicates a risk of damage to your hardware or loss of data. Indicates a risk of personal injury or death. Contacting Support Table 2: Contact Information Main Site Support Site Airheads Social Forums and Knowledge Base North American Telephone International Telephone Software Licensing Site End-of-life Information Security Incident Response Team (SIRT) (Toll Free) Support Addresses Americas, EMEA, and APAC Security Incident Response Team (SIRT) support@arubanetworks.com sirt@arubanetworks.com 6 About this Guide Aruba VIA 2.1.x User Guide

7 Aruba VIA 2.1.x User Guide About this Guide 7

8 Chapter 2 Overview VIA is a part of the Aruba remote networks solution intended for teleworkers and mobile users. VIA detects the network environment (trusted and untrusted) of the user and connects the users to the enterprise network. Trusted networks refers to a protected office network that allows users to directly access the corporate intranet. Untrusted networks are public Wi-Fi hotspots such as airports, cafes, or home network. The VIA solution includes the VIA client and controller configuration. VIA client Remote workers and mobile users can install VIA on their computers and smart devices (ios and Android) to connect to their enterprise network from remote locations (see VIA Client on page 11). Controller configuration To setup VIA for remote users, configure the controller with user roles, authentication profile, and connection profile. Use either the WebUI or CLI to configure the controller (see Configuring VIA Settings on page 40). VIA requires the PEFV license and is supported on M3, 3000 Series, 600 Series, 7200 Series, and 7000 Series controllers. Figure 1 VIA Topology VIA Connection VIA provides a seamless connectivity experience to the users when accessing an enterprise or corporate resource (example: workstation, server) from an untrusted or trusted network connection. By default, VIA is launched automatically when you log in to your system and establishes a remote connection. Aruba VIA 2.1.x User Guide Overview 8

9 The following table explains the typical behavior of VIA: The sequence of events described in Table 3 does not always happen in the order shown in the table. Table 3: VIA Connectivity Behavior User Action/Environment The client or user moves from a trusted to untrusted environment. For example, from office to a public hotspot. The client moves from an untrusted to a trusted environment. While in an untrusted environment, user disconnects the remote connection. User moves to a trusted environment. User moves to an untrusted environment User clicks the Reconnect button. In an untrusted environment, user restarts the system. In an untrusted environment, user shuts down the system. Moves to a trusted environment and restarts system. VIA Behavior Automatically launches and establishes connection to the remote network. Automatically launches and stays idle. VIA does not establish remote connection. However, you can manually connect to a network by selecting an appropriate connection profile from the Settings tab. Disconnects from the network. Stays idle and does not connect. Stays idle and does not connect. This usually happens, if the user has in a previous occasion disconnected a secure connection by clicking Disconnect in VIA. Users can manually connect using one of the following ways: Right-click on the VIA icon in the system tray and select the Restore option, and then select the Connect option to connect using the default connection profile. Right click on the VIA icon in the system tray and select the Connect option. Establishes remote connection. Auto-launches and establishes remote connection. Auto-launches and stays idle. 9 Overview Aruba VIA 2.1.x User Guide

10 Compatibility Matrix The following table shows the compatibility of different versions of VIA with ArubaOS. Table 4: VIA Compatibility Matrix ArubaOS Version Microsoft Windows (32/64 bit) Vista, Windows 7, 8, 8.1 Apple Mac OS 10.7, 10.8, 10.9, Apple ios 4.x, 5.x, 6.x, 7.x, 8.0, 8.1 Android 4.x, 5.0 Linux (32/64 bit) Ubuntu 12.04, 14.4, RHEL 6, CentOS 6 ArubaOS 5.0.x ArubaOS 6.0.x ArubaOS 6.1.x and later ArubaOS 6.2.x ArubaOS 6.3.x ArubaOS 6.4.x 2.0.x.x, x 2.0.x 2.0.x, 2.1.x 2.0.x.x, 2.1.x.x, 2.2.x 2.0.x.x, x 2.0.x 2.0.x, 2.1.x 2.0.x.x, 2.1.x.x, 2.2.x 2.0.x.x, x 2.0.x 2.0.x, 2.1.x 2.0.x.x, 2.1.x.x, 2.2.x 2.0.x.x, x 2.0.x 2.0.x, 2.1.x 2.0.x.x, 2.1.x.x, 2.2.x 2.0.x.x, x 2.0.x 2.0.x, 2.1.x 2.0.x.x, 2.1.x.x, 2.2.x 2.0.x.x, x 2.0.x 2.0.x, 2.1.x 2.0.x.x, 2.1.x.x, 2.2.x 2.0.x, x, x, x, x, x, 2.1 Aruba VIA 2.1.x User Guide Overview 10

11 Chapter 3 VIA Client If a user is connected from a remote location outside the enterprise network, VIA automatically classifies the environment as untrusted and creates a secure IPsec connection between the user and the enterprise network. After the user moves to a trusted network, VIA detects the network type and moves to idle state by dropping the IPsec connection. The users can download VIA for ios and Android using any of the following methods: From a URL provided by their local system administrators From the respective app stores Alternatively, administrators can install VIA by using a system management software. This chapter includes the following sections: VIA Client for Microsoft Windows on page 11 VIA Client for MacOS on page 23 VIA Client for Linux on page 28 VIA Client for Android on page 33 VIA Client for ios on page 36 VIA System Tray Icon Behavior on page 38 VIA Client for Microsoft Windows This section includes the following topics: Prerequisites on page 11 Downloading VIA on page 12 Installing VIA on page 12 Upgrading VIA on page 14 Using VIA on page 15 Uninstalling VIA on page 22 Prerequisites Ensure that the end-user system meets the following prerequisites: Supported Operating Systems Microsoft Windows Vista (32-bit and 64-bit) Microsoft Windows 7 (32-bit and 64-bit) Microsoft Windows 8 and 8.1 (32-bit and 64-bit) In Windows 8 and 8.1, for DPC with machine credentials to work, install KB Administrator privileges on the computer A computer connected to a working wired or wireless network Aruba VIA 2.1.x User Guide VIA Client 11

12 Downloading VIA The users can download VIA using one the following methods: From a URL provided by their local system administrators From the support site by downloading the installer set up file The following figure shows the downloading VIA from the URL, Figure 2 Login to Download VIA Figure 3 Downloading VIA Set Up File After Authentication Installing VIA You can install Windows VIA client by using one of the following methods: Executing the installer file provided by the administrator. Using the command line. Executing the remotely provided software by an administrator. A Windows domain administrator can provide VIA client software to all the computers administered by him, using remote software installation tools such as Microsoft System Center Configuration Manager (SCCM) or Dell KACE. To install VIA through the URL provided by the administrator, perform the following steps: 1. Download the installer (ansetup32 msi, or ansetup64.msi) as shown in Figure On the welcome screen, click Next, as shown in Figure VIA Client Aruba VIA 2.1.x User Guide

13 Figure 4 VIA Setup- Welcome Screen 3. On the End-User License Agreement screen, select the checkbox to accept the License Agreement. Click Next, as shown in Figure 5. Figure 5 VIA Setup- End-User License Agreement Screen 4. On the destination folder screen, browse and select the destination folder, click Next, as shown in Figure 6 Figure 6 VIA Setup- Destination Folder Screen Aruba VIA 2.1.x User Guide VIA Client 13

14 5. On the Ready to install Aruba Networks VIA screen, click Install, as shown in Figure 7. Figure 7 VIA Setup- Install Screen 6. After the installation is complete, you are prompted to enter the following, as shown in Figure 8: a. Remote Server Controller IP Address or FQDN. b. Username The domain user name c. Password The domain password Figure 8 VIA Login Screen If the VIA Web authentication lists more than one VIA authentication profile, the user can choose a VIA authentication profile. After successful authentication, the VIA client downloads the appropriate VIA connection profile. 7. Click Login. 8. Click Connect to initiate a secure VIA connection. VIA will minimize to the system tray after a secure connection is established. Upgrading VIA VIA checks for upgrade requirements during the login phase. Upgrade is initiated in VIA when certain components of the client are enhanced and bugs are fixed or when changes are made to the underlying network drivers. 14 VIA Client Aruba VIA 2.1.x User Guide

15 VIA downloads the upgrade binary from the controller and displays a message after the upgrade process is completed and the connection is terminated. The user can choose to proceed or cancel the upgrade process. If the user chooses to upgrade, a system reboot is automatically executed. If the user cancels the upgrade, VIA will prompt the user for an upgrade every time the user terminates a VIA session. Using VIA The VIA UI has the following tabs: Connection Details Diagnostics Settings Connection Details Tab This tab provides all the required details about your remote connection, as shown in the following figure: Figure 9 Connection Details Tab After a successful connection, you can see the assigned IP from your remote server, the profile used for the connection, and other network related information. The Connection Details tab has the following buttons: Connect/Disconnect Allows you to connect/disconnect the current remote connection. If you choose to manually disconnect, you are required to manually connect to establish a remote session. Change Opens the Settings tab with Connection Profile automatically selected in Select Settings Type. Select an alternate connection profile from the drop-down options to connect. Connection Log Opens the Diagnostics tab with Connection Log automatically selected in Diagnostic Type. Connection log displays the most recent sequence of events after VIA was launched. Send Logs Attaches a log file that contains all the logs collected by VIA to your default address, so that you can send the logs to your help desk. Aruba VIA 2.1.x User Guide VIA Client 15

16 Select Certificate Dialog If VIA connection profile is configured to use a certificate, then a dialog appears to select a certificate, as shown in the following figure: Figure 10 Select Certificate Dialog Diagnostic Tab This tab provides different diagnostic options, as shown in the following figure: Figure 11 Diagnostic Details Tab 16 VIA Client Aruba VIA 2.1.x User Guide

17 The Diagnostic Type options are as follows: Connection Log Displays the most recent sequence of events after VIA launches, as shown in the following figure: Figure 12 Diagnostic Tab- Connection Log Send Logs Displays all the log files, as shown in the following figure. The Send button attaches the selected log file to your default address, so that you can send the logs to your help desk. The Open Folder button opens the folder that contains all the log files. Figure 13 Diagnostic Tab- Send Logs Aruba VIA 2.1.x User Guide VIA Client 17

18 View System Info Displays the basic information about your computer, as shown in the following figure: Figure 14 Diagnostic Tab- View system Info Advanced Info Displays detailed information about your system configuration, as shown in the following figure: Figure 15 Diagnostic Tab- Advanced Info 18 VIA Client Aruba VIA 2.1.x User Guide

19 Detected Networks Displays the wireless access points in the surrounding and allows you to select a different wireless network, as shown in the following figure: Figure 16 Diagnostic Tab- Detected Networks Connectivity Tests Allows you to perform basic network tests to check your network connectivity by entering a valid server FQDN or IP address, as shown in the figure below: Figure 17 Diagnostic Tab- Connectivity Tests Aruba VIA 2.1.x User Guide VIA Client 19

20 Application Compatibility Displays the compatibility between VIA other related applications detected in your system, as show in the following figure: Figure 18 Diagnostic Tab- Application Compatibility About Displays details of the VIA client, as show in the following figure: Figure 19 Diagnostic Tab- About 20 VIA Client Aruba VIA 2.1.x User Guide

21 Settings Tab This tab provides different settings type options, as shown in the following figure: Figure 20 Settings Tab Connection Profile Displays the profile settings of the connection. VIA uses the default connection profile configured by your administrator. However, if you wish to override, you can select an alternate profile from the list. The Clear Profile button removes all profiles from your system. You can then download profiles by clicking the Download button in the Connection Details tab. Log Settings Allows collecting logs for different log level, such as, Critical, Warning, Error, Info, Debug, and Trace. If you do not want to collect logs, change the Log Level to None. The Clear Logs buttons clears all the previously saved log files. Aruba VIA 2.1.x User Guide VIA Client 21

22 Figure 21 Settings Tab- Log Settings Proxy Settings Allows you to set your proxy connection, if required. Figure 22 Settings Tab- Proxy Settings Uninstalling VIA Follow the steps below to uninstall VIA from your system: 1. Go to Control Panel -> Add or Remove Programs. 2. Select Aruba Networks Virtual Intranet Agent. 3. Click Remove and follow the instructions. 22 VIA Client Aruba VIA 2.1.x User Guide

23 You need administrative privileges for uninstalling VIA. VIA Client for MacOS This section includes the following topics: Prerequisites on page 23 Downloading VIA on page 23 Installing VIA on page 24 Upgrading VIA on page 27 Using VIA on page 27 Uninstalling VIA on page 28 Prerequisites Ensure that the end-user system meets the following prerequisites: Supported Operating System: MacOS 10.6, 10.7, 10.8, 10.9, and Administrator privileges on the computer to install VIA A computer connected to a working wired or wireless network VIA has been tested only with English-language versions of MacOSX. Downloading VIA The users can download VIA using one the following methods: From a URL provided by their local system administrators From the support site by downloading the installer set up file The following figure shows the downloading VIA from the URL, after entering your corporate credentials. Figure 23 Login to Download VIA Aruba VIA 2.1.x User Guide VIA Client 23

24 Figure 24 Downloading VIA Setup File after Authentication Installing VIA Ensure that you have met the prerequisites before proceeding with the installation. To install VIA on Apple MacOS X system, perform the following steps: 1. Double-click the downloaded set up file macviainstaller.pkg or macviainstallersigned.pkg to start the installation process. The Welcome page of the VIA Installation wizard is displayed. Figure 25 Welcome Page for Installation 2. Click Continue. The License Agreement page appears. Figure 26 License Agreement 24 VIA Client Aruba VIA 2.1.x User Guide

25 3. Click Continue. The License Agreement prompt appears. Figure 27 License Agreement Prompt 4. Click Agree. The Standard Install page appears. Figure 28 Standard Install 5. Click Install. After the successful installation, the page indicating successful installation appears. Aruba VIA 2.1.x User Guide VIA Client 25

26 Figure 29 Install Success Page 6. Click Close to complete the installation. After the installation is complete, the Connection Details pop-up window appears. Figure 30 Connection Details 7. Enter the following details: a. Remote Server Controller IP Address or FQDN provided by the administrator b. Username The domain user name c. Password The domain password If the VIA Web authentication list has more than one VIA authentication profile, the user can choose a VIA authentication profile. After successful authentication, the VIA client downloads the appropriate VIA connection profile. 8. Click OK to initiate a secure VIA connection. 26 VIA Client Aruba VIA 2.1.x User Guide

27 Upgrading VIA VIA does not upgrade automatically. You can manually upgrade using the latest installer. Using VIA The VIA UI has the following tabs: Connection Details Diagnostics Connection Details Tab This tab provides all required details about your remote connection, as shown in the following figure: Figure 31 Connection Details Tab After a successful connection, you can see the assigned IP from your remote server, the profile used for the connection and other network related information. Disconnect/Connect Allows you to connect/disconnect the current remote connection. If you choose to manually disconnect, you are required to manually connect to establish a remote session. Connection Profile The drop-down options allows you to select an alternate connection profile. Download/Clear Profile The Clear Profile button removes all profiles from your system. You can then download profiles by clicking the Download Profile button. This button switches between Clear Profile and Download Profile based on the profile you select in Connection Profile. If you have selected a profile in Connection Profile, this button reads as Clear Profile. If you have not selected a profile in Connection Profile, this button reads as Download Profile. Send Logs Attaches a log file that contains all the logs collected by VIA to your default address, so that you can send the logs to your help desk. Aruba VIA 2.1.x User Guide VIA Client 27

28 Diagnostics Tab This tab displays the most recent sequence of events after VIA launches, as shown in the following figure:. Figure 32 Diagnostics Tab Uninstalling VIA Follow the steps below to uninstall VIA: 1. Launch the Terminal app. 2. Run the /usr/local/bin/macviauninstaller.sh command. You need administrative privileges to run this command. VIA Client for Linux This section includes the following topics: Prerequisites on page 28Prerequisites on page 28 Downloading VIA on page 29 Installing VIA on Linux on page 29 Using VIA on page 29 Uninstalling VIA on page 33 Prerequisites Make sure you uninstall previously installed VIA versions before installing a VIA package. For information on the uninstallation steps, see Uninstalling VIA on page 33. Ensure the system is up-to-date. Execute the following commands for Ubuntu: sudo apt-get update sudo apt-get upgrade Execute the following command for Red Hat Enterprise Linux (RHEL) and CentOS: yum update 28 VIA Client Aruba VIA 2.1.x User Guide

29 Downloading VIA The following steps guide you to download the installer setup file: 1. Download the installer setup file from the Aruba Support Site. 2. Select the installer that is appropriate for your operating system and architecture. The installer setup file format is via-<version>.<osname><architecture>.<ext> and the supported file extensions are.deb and.rpm. For example, for RHEL and CentOS the setup file name can be via rhel6.i386.rpm. Installing VIA on Linux The following steps guide you to install VIA on Linux platforms: 1. Download the installer file from the support site or use the installer file provided by the administrator. For more information, see Downloading VIA. 2. Mark the file as executable before installing: a. Right-click on the installer file. b. Click Permissions tab. c. Check the option Allow executing file as program and click Close. You can also run the command chmod +x filename to mark the downloaded file as an executable file. 3. Double-click on the installer file. 4. Follow the instructions to complete the installation. Using VIA When VIA is launched for the first time after successful VIA installation, you will prompted to perform the following steps to connect to VIA: 1. Enter the remote server name, username, and password. If the VIA Web authentication list has more than one VIA authentication profile, the user can choose a VIA authentication profile from the available ones. After successful authentication, the VIA client downloads the appropriate VIA connection profile. Figure 33 Profile Download 2. Click Connect to establish the IPsec connection if the you are connected to an untrusted network. Aruba VIA 2.1.x User Guide VIA Client 29

30 Figure 34 Connection Status - Connecting After the successful connection, you will see the connection status as Established as shown in the following figure: Figure 35 Connection Status - Established The VIA UI has the following tabs: Connection Details Diagnostics Settings VIA Cert Store Connection Details Tab The Connection Details tab has the following buttons: Connect/Disconnect Allows you to connect/disconnect the current remote connection. If you choose to manually disconnect, you are required to manually connect to establish a remote session. 30 VIA Client Aruba VIA 2.1.x User Guide

31 Change Opens the Settings tab with Connection Profile automatically selected in Select Settings Type. Select an alternate connection profile from the drop-down options to connect.this button is enabled only if your administrator has configured more than one connection profile. This button toggles to Download Profile, if you clear your profile from the Settings tab. Connection Log Opens the Diagnostics tab with Connection Log automatically selected in Diagnostic Type. Connection log displays the most recent sequence of events after VIA was launched. Send Logs Attaches a log file that contains all the logs collected by VIA to your default address, so that you can send the logs to your help desk. Figure 36 Connection Details Tab Diagnostics Tab The Diagnostics tab provides information and tools for troubleshooting your connectivity issues. Select a diagnostic tool from this tab for more information. Diagnostics Tools Send Logs List of log files collected by VIA. You can send this to your technical support when required. Click Send Logs to send the log files archive using your default client. Connectivity tests Basic tests (ping and trace-route) to verify your network connection. Aruba VIA 2.1.x User Guide VIA Client 31

32 Figure 37 Diagnostics Tab Settings Tab This Settings tab allows you to configure extra settings required to collect log, use a different connection profile and set up proxy server details. Connection Profile allows you to select and connect to a different connection profile. This is usually useful if you are in remote location and you need to connect to your corporate (secure) network. In such situation, you can select a profile that uses the nearest remote server to provide secure connection to your network. Alternate connection profiles are available only if it is configured by your IT administrator. Figure 38 Settings 32 VIA Client Aruba VIA 2.1.x User Guide

33 VIA Cert Store Tab This VIA Cert Store tab allows you to import and use certificates on Linux platforms. Figure 39 VIA Cert Store Uninstalling VIA This section mentions the paths to uninstall VIA application on CentOS, RHEL, and Ubuntu platforms: RHEL and CentOS 1. Navigate to System > Administration > Add/Remove software. 2. Uncheck VIA and click Clear. Ubuntu 1. Navigate to Ubuntu Software Center. 2. Select the application and click Remove. You can also uninstall the VIA application using the CLI. Execute the command sudo apt-get purge via. VIA Client for Android This section includes the following topics: Prerequisites on page 33 Downloading VIA on page 34 VIA Client for Android on page 33 Using VIA on page 35 Uninstalling Android VIA Client on page 36 Prerequisites Ensure that the system meets the following pre-requisites: Device is running Android 4.x or 5.0. The device is connected to a network. Aruba VIA 2.1.x User Guide VIA Client 33

34 Downloading VIA Open PlayStore to download Aruba VIA. Figure 40 Downloaing VIA from PlayStore Installation is performed automatically once VIA is downloaded. Enter the following details: a. Server URL Obtain this URL from the system administrator. b. Username Domain user name of the user. c. Password Domain password of the user. 34 VIA Client Aruba VIA 2.1.x User Guide

35 Figure 41 Login Screen Using VIA The following figure shows the VIA UI in Android: Figure 42 VIA UI Aruba VIA 2.1.x User Guide VIA Client 35

36 The VIA UI has the following buttons: Send Logs: Clicking this button attaches a log file that contains all the logs collected by VIA to your default mail to it send to your help desk. Options: Clicking this button provides you more information like About, Diagnostics, Log Settings, and Certificate Storage. Figure 43 Options Button Uninstalling Android VIA Client You can uninstall VIA from the running application tab in Android. VIA Client for ios Pre-requisites Ensure that the system meets the following pre-requisites: VIA can be installed on systems running: ios 4.2, 5.0, 6.0, 7.0 and 8.0. The device is connected to a wired or wireless network. Downloading ios VIA Client Aruba VIA is available for download in AppStore. Installing ios VIA Client VIA automatically installs this on the device after the download is complete. Enter the following details: a. Server URL Obtain this URL from the system administrator. b. Username Domain user name of the user. c. Password Domain password of the user. 36 VIA Client Aruba VIA 2.1.x User Guide

37 Figure 44 Login Screen Using VIA The following figure shows the VIA UI : The VIA UI has the following buttons: Send Logs: Attaches a log file that contains all the logs collected by VIA to your default mail to it send to your helpdesk. Options: Provides you more information like Diagnostics and Log Settings. Uninstalling ios VIA Client Press and hold the VIA icon for a few seconds, and click the 'x" to uninstall. Aruba VIA 2.1.x User Guide VIA Client 37

38 VIA System Tray Icon Behavior This section is applicable only for VIA clients running in Windows, Linux, and MacOS. After VIA client is installed, this icon appears in the system tray of your system. VIA Tray Icon Color Indicator The VIA tray icon color indicates the current status of the network connectivity. Gray VIA is initializing, VIA is disconnected, or VIA is waiting for the network connectivity. Cyan System is connected to a trusted network and a VPN connection is not required. Green blinking VIA can reach the controller and is trying to negotiate a VPN connection. Green VIA has established a VPN connection. Red VIA has failed to download profile or establish connection. VIA Tray Icon Menu Right-click the VIA tray icon for the tray menu. This menu provides the following operations: Restore Brings VIA on top. About Displays information about VIA. Send Logs Attaches the log file that contains all the logs collected by VIA to your default mail to it send to your helpdesk. Connect Allows you to connect to the current remote connection. Disconnect Allows you to disconnect from the current remote connection. Exit Removes VIA tray icon. 38 VIA Client Aruba VIA 2.1.x User Guide

39 Chapter 4 VIA Configuration Before configuring VIA, ensure that you configure the VPN settings. See the Virtual Private Networks chapter in the latest ArubaOS 6.4.x User Guide for information on configuring VPN settings on your controller. Before you Begin The following ports must be enabled before configuring the VIA controller. TCP During the initializing phase, VIA uses HTTPS connections to perform trusted network and captive portal checks against the controller. It is mandatory that you enable port 443 on your network to allow VIA to perform these checks. UDP This port is used for NAT-Traversal. Authentication Mechanisms Supported in VIA VIA supports the following authentication methods in IKEv1: 1. Pre-shared key 2. Certificate based authentication (RSA certificates only) In IKEv1 phase 1 authentication, which authenticates the VPN client, can be performed using either a preshared key or an X.509 certificate (the X.509 certificate must appear in the operating system s user certificate store.). If certificates are used for IKE phase 1 authentication, it must be followed by username and password authentication. If xauth is used for phase 2 authentication phase, it again requires a username and password. The username and password is authenticated against the controller s internal database, a RADIUS server, or an LDAP server. If a RADIUS server is used, it must support the PAP or MSCHAPv2 protocol. Support for two-factor authentication is provided in VIA. Token product like RSA tokens and other token cards are also supported. This includes support for new-pin and next-pin. VIA supports the following authentication methods in IKEv2: 1. Certificates based authentication (RSA and ECDSA certificates with termination on controller). 2. EAP (Extensible Authentication Protocol) including EAP-TLS (RSA and ECDSA certificates with termination on RADIUS server) and EAP-MSCHAPv2. IKEv2 is an updated version that is faster and supports a wider variety of authentication mechanisms. IKEv2 has only single phase authentication process. VIA IKEv2 supports both RSA and ECDSA certificate based authentication. VIA will look for an X.509 certificate in the operating system s certificate store. Smart cards that support a Smart Card Cryptographic Provider (SCCP) API within the operating system. A smart card supporting SCCP (for Windows) or OpenSC (for Linux) causes the certificate embedded within the smart card to automatically appear in the operating system s certificate store. Controllers running ArubaOS 6.1 or greater support OCSP for the purpose of validating a certificate that has not been revoked. Aruba VIA 2.1.x User Guide VIA Configuration 39

40 Configuring VIA Settings The following steps are required to configure your controller for VIA. VIA can be configured either using WebUI or CLI. These steps are described in detail in the following subsections: 1. Configure Pre-Shared Key (PSK) on page Upload Certificates for Certificate Based Authentication on page Enable VPN Server Module on page Create VIA User Roles on page Create VIA Authentication Profile on page Create VIA Connection Profile on page Associate VIA Connection Profile to User Role on page Configure VIA Web Authentication on page Configure VIA Client WLAN Profiles on page Re-branding VIA (Windows and MacOS) on page Uploading VIA Installers on page Downloading VIA Installer on page 53 Configuring VIA using the WebUI Perform that following steps to configure VIA using the controller WebUI. Configure Pre-Shared Key (PSK) ArubaOS allows you to configure PSK authentication method for VIA. To configure PSK for VIA, perform the following steps: 1. Navigate to Configuration > Advanced Services > VPN Services. 2. In the IPSEC tab, under the IKE Shared Secrets section, click Add. 3. Enter the IKE Shared Secret text box and re-enter the same secret key in the Verify IKE Shared Secret text box. 4. Click Done. Upload Certificates for Certificate Based Authentication To upload certificates and select the server certificate for certificate based authentication for VIA, perform the folowing steps: 1. Navigate to Configuration > Management > Certificates. 2. In the Upload tab, under the Upload a Certificate section, upload certificates for the Certificate Type parameter Server Cert and Trusted CA. 3. Navigate to Configuration > Advanced Services >VPN Services. 4. In the IPSEC tab, under the IKE Server Certificate section, select a IKE server certificate assigned for VPNclient from the dropdown list. 5. Under the CA Certificate Assigned for VPN-Clients section, click Add and select a CA certificate from the dropdown list. 6. (Optional) Under the Certificate Groups for VPN-Clients section, select a Server Certificate and CA Certificate from their respective dropdown list. 40 VIA Configuration Aruba VIA 2.1.x User Guide

41 Enable VPN Server Module ArubaOS allows you to connect to the VIA controller using the default user roles. However, to configure and assign specific user roles you must install the Policy Enforcement Firewall Virtual Private Network (PEFV) license. Refer to the Software Licenses chapter in the latest ArubaOS 6.4.x User Guide for more information on licenses. To install a license, perform the following steps: 1. Navigate to Configuration > Network > Controller and select the Licenses tab. 2. Enter the license key in the Add New License Key text box, click Add. Create VIA User Roles VIA user roles contain access control policies for users connecting to your network using VIA. You can configure different VIA roles or use the default VIA role default-via-role. To create VIA users roles, perform the following steps: 1. Navigate to Configuration > Security > Access Control and select the User Roles tab. 2. Click Add to create new policies. Click Done after creating the user role and apply to save it to the configuration. For more information on user roles, refer to the latest ArubaOS 6.4.x User Guide. Create VIA Authentication Profile A VIA authentication profile contains a server group for authenticating VIA users.the server group contains the list of authentication servers and server rules to derive user roles based on the user authentication. You can configure multiple VIA authentication profiles and/or use the default VIA authentication profile created with and Internal server group. To create an authentication profile to authenticate users against a server group, perform the following steps: 1. Navigate to Configuration > Security > Authentication and select the L3 Authentication tab. 2. Expand the VIA Authentication profile option. You can configure the following parameters for the authentication profile: Table 5: VIA Authentication Profile Parameters Parameter Default Role Description The role that will be assigned to the authenticated users. Max Authentication Failures Specifies the maximum authentication failures allowed. The default is 0 (zero). Description Check Certificate Common Name against AAA Server Authentication Protocol PAN Firewalls Integration A user friendly name or description for the authentication profile. If you use client certificates for user authentication, enable this option to verify that the certificate's common name exists in the server. PAP and MSCHAPv2 protocols are supported to authenticate VIA users. Default: PAP Requires IP mapping at Palo Alto Networks firewalls. 3. To create a new authentication profile: a. Enter a name for the new authentication profile under the VIA Authentication profiles section and click the Add button. Aruba VIA 2.1.x User Guide VIA Configuration 41

42 b. Expand the VIA Authentication profiles option and select the new profile name. 4. To modify an authentication profile, select the profile name to configure the default role The following figure uses the default authentication profile: Figure 45 VIA- Associate User Role to VIA Authentication Profile 5. To use a different server group, under VIA Authentication profile, click Server Group and select New to create a new server group. Figure 46 VIA- New Server Group for VIA Authentication Profile 6. Enter a name for the server group. Figure 47 VIA- Server Group Name 7. In the Servers section, click New to add a server from the Server Name dropdown list and click Add Server. 8. Click Apply to save the configuration changes. Create VIA Connection Profile A VIA connection profile contains settings required by VIA to establish a secure connection to the controller. You can configure multiple VIA connection profiles. A VIA connection profile is always associated to a user role and all users belonging to that role use the configured settings. If you do not assign a VIA connection profile to a user role, the default connection profile is used. To create VIA connection profile, perform the following steps: 1. Navigate to Configuration > Security > Authentication and select the L3 Authentication tab. 2. Click the VIA Connection option, and enter a name for the connection profile. 42 VIA Configuration Aruba VIA 2.1.x User Guide

43 Figure 48 VIA - Create VIA Connection Profile 3. Click on the new VIA connection profile to configure the connection settings. You can configure the various options for a VIA connection profile, as shown in Table 6 and Table 7. Table 6: VIA - Connection Profile Options Applicable to all Platforms Parameter VIA Servers VIA Authentication Profiles to provision VIA tunneled networks Enable split Tunneling Allow client side logging Description Enter the following information about the VIA controller. Hostname/IP Address: This is the public IP address or the DNS hostname of your VIA Server / controller. Users will connect to this remote server using the IP address or the hostname. Internal IP Address: This is the IP address of any of the VLAN interface IP addresses belonging to this VIA server. Description: This is a human-readable description of the VIA server. Click the Add button after you have entered all the details. If you have more than one VIA controller you re-order them by clicking the Up and Down arrows. To delete a VIA server from your list, select a server and click the Delete button. This is the list of VIA authentication profiles that will be displayed to users in the VIA client. See Create VIA Authentication Profile on page 41. These authentication profiles are used while authenticating users during IKE/IPsec authentication. Select an authentication profile and click the Add button to add to the authentication profiles list. You can change the order of the list by clicking the Up and Down arrows. To delete an authentication profile, select a profile name and click the Delete button. A list of network destination (IP address and netmask) that the VIA client will tunnel through the controller. All other networks will not be tunneled by VIA client. Enter an IP address and network mask. Click the Add button to add them to the tunneled networks list. To delete a network entry, select the IP address and click the Delete button. Enable or disable split tunneling. If enabled, all traffic to the VIA tunneled networks (refer to VIA tunneled networks on page 43) will go through the controller and the rest is just bridged directly on the client. If disabled, all traffic will flow through the controller. Default Off Enable or disable client side logging. If enabled, VIA client will collect logs that can be sent to the support -address for troubleshooting. Default Enabled Aruba VIA 2.1.x User Guide VIA Configuration 43

44 Parameter VIA IKE V2 Policy VIA IKE Policy Use Suite B Cryptography IKEv2 Authentication method VIA IPSec V2 Crypto Map VIA IPSec Crypto Map Allow user to save passwords VIA Support Address Maximum reconnection attempts Content Security Gateway URL Comma separated list of HTTP ports to be inspected (apart from default port 80) Enable IKEv2 VIA Client Network Mask VIA Client DNS Suffix List Description Lists the available IKEv2 policies. Select the policy from the list the VIA client can use to connect to the controller. These policies are configured under Configuration > Advanced Services > VPN Services > IPSEC > IKE Policies. This option is applicable only if the IKEv2 is enabled. Lists the IKE policies. Select the policy from the list the VIA client can use to connect to the controller. These policies are configured under Configuration > Advanced Services > VPN Services > IPSEC > IKE Policies. Selected policy from the list is used by VIA client to connect to the controller. Enable Suite-B compliant cryptographic algorithms for IPsec RFC List of all IKEv2 authentication methods. Currently only User Cert, EAP-TLS, and EAP-MSCHAPv2 authentication methods are supported. Lists all IPsec V2 crypto maps. Select the crypto map from the list the VIA client can use to connect to the controller. These crypto maps are configured in CLI using the crypto-local ipsec-map <ipsec-map-name> command. This option is applicable only if the IKEv2 is enabled. Lists all IPsec Crypto Maps. Select the crypto map from the list the VIA client can use to connect to the controller. These crypto maps are configured in CLI using the crypto-local ipsec-map <ipsec-map-name> command. Enable or disable users to save passwords entered in VIA during IKE/IPsec connection. Default Enabled The support address to which VIA users will send client logs. Default None The maximum number attempts to reconnect when authentication fails. This feature is applicable for 802.1X, MSCHAPv2, and certificate based authentication profiles. Default 3 If the split-tunnel is enabled, access to external (non-corporate) web sites will be verified by the specified content security service provider. Traffic from the specified ports will be verified by the content security service provider. Select this option to enable or disable the use of IKEv2 policies for VIA IPsec connection. The network mask that has to be set on the client after the VPN connection is established. Default The DNS suffix list (comma separated) that has be set on the client once the VPN connection is established. Default None 44 VIA Configuration Aruba VIA 2.1.x User Guide

45 Table 7: VIA - Connection Profile Options based on Platform Parameter Description Windows Linux Android ios Mac OS Client Auto-Login Allow client to autoupgrade VIA Client WLAN profiles Use Windows Credentials Enable or disable VIA client to automatic login and establish a secure connection to the controller as soon as the connection profile is downloaded. This option is applicable even after restarting the device. Default: Enabled Enable or disable VIA client to automatically upgrade when an updated version of the client is available on the controller. Default: Enabled A list of VIA client WLAN profiles that needs to be pushed to the client machines that use Windows Zero Config (WZC) to configure or manage their wireless networks. Select a WLAN profile and click the Add button to add to the client WLAN profile. To delete an entry, select the profile name and click the Delete button. See Configure VIA Client WLAN Profiles on page 50 for more information. Enable or disable the use of the Windows credentials to login to VIA. If enabled, the SSO (Single Sign-on) feature can be utilized by remote users to connect to internal resources. Default: Enabled Yes Yes No No Yes Yes Yes No No No Yes No No No No Yes Yes No No No Aruba VIA 2.1.x User Guide VIA Configuration 45

46 Parameter Description Windows Linux Android ios Mac OS Enable FIPS Module If FIPS is enabled, VIA uses FIPS compliant algorithms only for IKE and IPsec. For example, md5 algorithms are omitted. This also show FIPS flag in the UI. FIPS flag is displayed in the UI only if this option is enabled. Yes No Yes Yes No Auto-launch Supplicant Domain Suffix in VIA Authentication Enable Controllers Load Balance Enable Domain Preconnect VIA Banner Message Reappearance Timeout (minutes) Auto launches Suite-B compliant wireless supplicant in VIA. The user domain name is sent as part of user name. For example, or example\user. Enable this option to allow the VIA client to failover to the next available controller selected randomly from the list as configured in the VIA Servers option. If disabled, VIA will failover to the next controller in the sequence of ordered list of VIA Servers. Enable this option to allow users with lost or expired passwords to establish a VIA connection to corporate network before the user login. This option authenticates the user s device and establishes a VIA connection that allows users to reset credentials and continue with corporate access. The time for which VIA banner message reappears. Yes No No No No Yes Yes No No No Yes No No No No Yes No No No No Yes No No No No 46 VIA Configuration Aruba VIA 2.1.x User Guide

47 Parameter Description Windows Linux Android ios Mac OS Validate Server Certificate VIA max session timeout VIA Logon Script VIA Logoff Script Maximum reconnection attempts Allow user to disconnect VIA Enable Content Security Services Enable or disable VIA from validating the server certificate presented by the controller. Default: Enabled The maximum time (minutes) allowed before the VIA session is disconnected. Default: 1440 min Specify the name of the logon script that must be executed after VIA establishes a secure connection. The logon script must reside in the client computer. Specify the name of the log-off script that must be executed after the VIA connection is disconnected. The logoff script must reside in the client computer. The maximum number of re-connection attempts by the VIA client due to authentication failures. Default: 3 Enable or disable users to disconnect their VIA sessions. Default: on You can enable this option is available only if you have installed the content security services license. See the Software Licenses chapter in the latest ArubaOS 6.4.x User Guide for more information on licenses. Yes No Yes Yes No Yes No No No Yes Yes No No No No Yes No No No No Yes Yes Yes No No Yes Yes No No No Yes No No No No Aruba VIA 2.1.x User Guide VIA Configuration 47

48 Parameter Description Windows Linux Android ios Mac OS Keep VIA window minimized Block traffic until VPN tunnel is up VIA external download URL Lockdown All Settings Block traffic rules User idle timeout Enable this option to minimize the VIA client to system tray during the connection phase. Applicable to VIA client installed in computers running Microsoft Windows operating system. This option is also applicable to desktop and laptop versions of Windows, MAC, and Linux. An exception list for which the traffic is allowed when Block traffic until VPN is UP is enabled. Once VIA connection profile is downloaded the traffic from the client machine is blocked until VPN tunnel is up. End users will use this URL to download VIA on their computers. If this option enabled all user options on the VIA client are disabled. Blocks traffic rules for a specific users. You can add the user by providing the following details: Hostname /IP Address, Network Mask, and description. The time for which the user can remain idle, after which VIA disconnects automatically. Yes No No No No Yes Yes No No No Yes No No No No Yes No No No No Yes No No No No Yes No No No No Associate VIA Connection Profile to User Role A VIA connection profile has to be associated to a user role. Users can log in by authenticating against the server group specified in the VIA authentication profile and are put into that user role. If the VIA configuration settings are derived from the VIA connection profile attached to that user role, the default VIA connection profile is used. To associate a VIA connection profile to a user role, perform the following steps: 1. Navigate to Configuration > Security > Access Control and select the User Roles tab. 2. For VIA user role (See Create VIA User Roles on page 41), click the Edit button. 48 VIA Configuration Aruba VIA 2.1.x User Guide

49 3. In the Misc. Configuration section of the Edit Role page, select a connection profile from the VIA Connection Profile dropdown list. 4. Click the Apply button to save the changes to the configuration. Figure 49 VIA - Associate VIA Connection Profile to User Role Configure VIA Web Authentication A VIA web authentication profile contains an ordered list of VIA authentication profiles. The web authentication profile is used by end users to log in to the VIA download page ( for downloading the VIA client. Only one VIA web authentication profile is available. If more than one VIA authentication profile (step 5 on page 40) is configured, users can view this list and select a profile during client login. To configure VIA web authentication profile, perform the following steps: 1. Navigate to Configuration > Security > Authentication, select the L3 Authentication tab. 2. Expand VIA Web Authentication and click on default profile. You can have only one profile for VIA web authentication. 3. Select a profile from VIA Authentication Profile dropdown list and click the Add button. To re-order profiles, click the Up and Down button. To delete a profile, select a profile and click the Delete button. 4. If a profile is not selected, the default VIA authentication profile is used. 5. Click the Apply button to save the changes to the configuration. Aruba VIA 2.1.x User Guide VIA Configuration 49

50 Figure 50 VIA - Select VIA Authentication Profile Configure VIA Client WLAN Profiles You can push WLAN profiles to end-user computers that use the Microsoft Windows Wireless Zero Config (WZC) service to configure and maintain their wireless networks. After the WLAN profiles are pushed to enduser computers, they are automatically displayed as an ordered list in the preferred networks. The VIA client WLAN profiles provisioned on the client can be selected from the VIA connection profile described in Create VIA User Roles. To configure a VIA client WLAN profile, perform the following steps: 1. Navigate to Configuration > Advanced Services > All Profiles. 2. Expand Wireless LAN profile and select VIA Client WLAN profile. 3. In the Profile Details section, enter a name for the WLAN profile and click the Add button. Figure 51 VIA - Create VIA Client WLAN Profile 4. Expand the new WLAN profile and click on SSID. In the Profile Details page, from the SSID Profile dropdown list, select New. Enter a name for the SSID profile in the text box. 5. In the Basic tab, enter the network name (SSID) and a select security settings. 6. Click the Apply button to continue. Figure 52 VIA - Configure the SSID Profile 7. You can now configure the SSID profile by selecting the SSID profile under the VIA Client WLAN profile option. 50 VIA Configuration Aruba VIA 2.1.x User Guide

51 Figure 53 VIA - Configure VIA Client WLAN Profile The VIA client WLAN profiles are similar to the authentication settings used to set up a wireless network in Microsoft Windows. The following table shows the Microsoft Windows equivalent settings: Table 8: Configure VIA client WLAN profile Parameter EAP-PEAP options EAP Type EAP-Certificate Options Inner EAP Type Inner EAP Authentication options: Description Select the following options, if the EAP type is PEAP (Protected EAP): validate-server-certificate: Select this option to validate server certificates. enable-fast-reconnect: Select this option to allow fast reconnect. enable-quarantine-checks: Select this option to perform quarantine checks. disconnect-if-no-cryptobinding-tlv: Select this option to disconnect if server does not present cryptobinding TLV. dont-allow-user-authorization: Select this to disable prompts to user for authorizing new servers or trusted certification authorities. Select an EAP type used by client to connect to wireless network. Default: EAP-PEAP If you select EAP type as certificate, you can select one of the following options: mschapv2-use-windows-credentials use-smartcard simple-certificate-selection use-different-name validate-server-certificate Select the inner EAP type. Currently supports only EAP-PEAP. mschapv2-use-windows-credentials: Automatically use the Windows logon name and password (and domain if any) use-smartcard: Use a smart card simple-certificate-selection: Use a certificate on the user s computer or use a simple certificate selection method (recommended) validate-server-certificate: Validate the server certificate use-different-name: Use a different user name for the connection (and not the CN on the certificate) Aruba VIA 2.1.x User Guide VIA Configuration 51

52 Parameter Automatically connect when this WLAN is in range EAP-PEAP: Connect only to these servers Enable IEEE 802.1x authentication for this network EAP-Certificate: Connect only to these certificates Inner EAP- Certificate: Connect only to these servers Connect even if this WLAN is not broadcasting Description Select this option if you want WZC (Microsoft Windows Wireless Zero Config tool) to connect when this network (SSID) is available. Comma separated list of servers. Select this option to enable 802.1x authentication for this network. Default: Enabled. Comma separated list of servers. Comma separated list of servers. Default: Disabled Re-branding VIA (Windows and MacOS) You can add a custom logo on the VIA client. You can re-brand the VIA client and the VIA download page with your custom logo and HTML page. The feature is supported only in Windows and Mac OS. Customize Logo To use a custom logo on the VIA download page and on the VIA client: 1. Navigate to Configuration > Advanced Services > VPN Services, select the VIA tab. 2. Under the Customize Logo section, browse and select a logo from your computer. Click the Upload button to upload the image to the controller. To use the default Aruba logo, click the Reset button. Customize the Landing Page for Web-based Login To use a custom landing page for VIA web login: 1. Navigate to Configuration > Advanced Services > VPN Services, select the VIA tab. 2. Under Customize Welcome HTML section, browse and select the HTML file from your computer. Click the Upload button to upload the image to the controller. Variables are used in the custom HTML file and all variables in the custom HTML file must have the following notation: <% user %>: this displays the username. <% ip %>: this displays the IP address of the user. <% role %>: this displays the user role. <% logo %>: this is the custom logo (Example: <img src="<% logo %>">) <% logout %>: the logout link (Example: <a href="<% logout %>">VIA Web Logout</a>) <% download %>: the installer download link (Example: <a href="<% download %>">Click here to download VIA</a>) 52 VIA Configuration Aruba VIA 2.1.x User Guide

53 To use the default welcome page, click the Reset button. 3. Click the Apply button to save the changes to the configuration. Figure 54 VIA - Customize VIA logo, Landing Page, and Download VIA Installer Uploading VIA Installers To upload a new VIA installer on the web page, perform the following steps: 1. Navigate to Configuration > Advanced Services > VPN Services and select the VIA tab. 2. Under Upload new VIA Installers, browse and select the installer from your computer. Click the Upload button to upload the installer to the controller. 3. Click the Apply button to save the changes to the configuration. The installer file should be in the.arb format. Downloading VIA Installer To download the VIA installer, perform the following steps: 1. Navigate to Configuration > Advanced Services > VPN Services and select the VIA tab. 2. Under VIA installers for various platforms section, click ansetup.msi to download the installation file. 3. Click the Apply button to save the changes to the configuration. Additionally, you can download the VIA installer from Aurba Support Site or App store in case of mobile devices. Configuring VIA using the CLI The following steps illustrate configuring VIA using the controller CLI. Install your Policy Enforcement Firewall Virtual Private Network (PEFV) license key. Commands that achieve specific task are described in this section. For detailed information on the VIA command line options, see the latest ArubaOS 6.4.x Command Line Interface Reference Guide. Enable VPN Serven Module (host) (config)# license add <key> Create VIA Roles (host) (config) #user-role example-via-role (host) (config-role) #access-list session "allowall" position 1 (host) (config-role) #ipv6 session-acl "v6-allowall" position 2 Aruba VIA 2.1.x User Guide VIA Configuration 53

Aruba VIA Windows Edition

Aruba VIA Windows Edition Aruba VIA 3.0.0 Windows Edition a Hewlett Packard Enterprise company User Guide Copyright Information Copyright 2017 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code

More information

Aruba VIA for Mobility Master

Aruba VIA for Mobility Master Aruba VIA 3.0.0 for Mobility Master a Hewlett Packard Enterprise company User Guide Copyright Information Copyright 2016 Hewlett Packard Enterprise Development LP. Open Source Code This product includes

More information

August 2015 Aruba Central Getting Started Guide

August 2015 Aruba Central Getting Started Guide Aruba Central Copyright Information Copyright 2015 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public License, the GNU Lesser General

More information

Aruba VIA Windows Edition

Aruba VIA Windows Edition Aruba VIA 3.2.2 Windows Edition a Hewlett Packard Enterprise company Release Notes Copyright Information Copyright 2018 Hewlett Packard Enterprise Development LP. Open Source Code This product includes

More information

Aruba VIA Android Edition

Aruba VIA Android Edition Aruba VIA 3.0.3 Android Edition a Hewlett Packard Enterprise company Release Notes Copyright Information Copyright 2017 Hewlett Packard Enterprise Development LP. Open Source Code This product includes

More information

Aruba Central Switch Configuration

Aruba Central Switch Configuration Aruba Central Switch Configuration User Guide Copyright Information Copyright 2016 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General

More information

Aruba Central Switch Configuration

Aruba Central Switch Configuration Aruba Central Switch Configuration User Guide Copyright Information Copyright 2017Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public

More information

Aruba VIA 3.x (for ArubaOS 6.5.x)

Aruba VIA 3.x (for ArubaOS 6.5.x) Aruba VIA 3.x (for ArubaOS 6.5.x) a Hewlett Packard Enterprise company User Guide Copyright Information Copyright 2018 Hewlett Packard Enterprise Development LP. Open Source Code This product includes

More information

Aruba VIA 3.x (for ArubaOS 8.x)

Aruba VIA 3.x (for ArubaOS 8.x) Aruba VIA 3.x (for ArubaOS 8.x) a Hewlett Packard Enterprise company User Guide Copyright Information Copyright 2018 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code

More information

Aruba Central Guest Access Application

Aruba Central Guest Access Application Aruba Central Guest Access Application User Guide Copyright Information Copyright 2017Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Aruba Instant

Aruba Instant Aruba Instant 6.4.4.4-4.2.3.2 Release Notes Copyright Copyright 2016 Hewlett Packard Enterprise Development LP Open Source Code This product includes code licensed under the GNU General Public License,

More information

Aruba VIA Windows Edition

Aruba VIA Windows Edition Aruba VIA 2.1.1.8 Windows Edition Release Notes Copyright Information 2015 Aruba Networks, Inc. All rights reserved. Aruba Networks, Aruba NetworksTM (stylized), People Move Networks Must Follow, Mobile

More information

Aruba Instant

Aruba Instant Aruba Instant 6.4.3.4-4.2.1.0 Release Notes Copyright Copyright 2015 Hewlett Packard Enterprise Development LP Open Source Code This product includes code licensed under the GNU General Public License,

More information

Aruba Networks and AirWave 8.2

Aruba Networks and AirWave 8.2 Aruba Networks and AirWave 8.2 Controller Config Copyright Information Copyright 2016 Hewlett Packard Enterprise Development LP Open Source Code This product includes code licensed under the GNU General

More information

AT&T Global Network Client for Mac User s Guide Version 1.7.3

AT&T Global Network Client for Mac User s Guide Version 1.7.3 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

MSP Solutions Guide. Version 1.0

MSP Solutions Guide. Version 1.0 MSP Solutions Guide Version 1.0 Copyright Information Copyright 2018 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public License,

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

What Is Wireless Setup

What Is Wireless Setup What Is Wireless Setup Wireless Setup provides an easy way to set up wireless flows for 802.1x, guest, and BYOD. It also provides workflows to configure and customize each portal for guest and BYOD, where

More information

Deploy APs in a Centralized Controller-Based Network

Deploy APs in a Centralized Controller-Based Network AP Software Quick Start Guide This document outlines the various deployment scenarios for Unified Access Points (UAPs) and the procedures involved in deploying the APs in controller-based and Instant operating

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Data Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology Universal VPN Client Suite for macos/os X Compatible with VPN Gateways (IPsec Standard) macos 10.13, 10.12, OS X 10.11, OS X 10.10 Import of third party configuration files Integrated, dynamic Personal

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Aruba Central. User Guide

Aruba Central. User Guide Aruba Central User Guide Copyright Information Copyright 2017Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public License, the GNU

More information

NetConnect to GlobalProtect Migration Tech Note PAN-OS 4.1

NetConnect to GlobalProtect Migration Tech Note PAN-OS 4.1 NetConnect to GlobalProtect Migration Tech Note PAN-OS 4.1 Revision A 2011, Palo Alto Networks, Inc. Contents Overview... 3 GlobalProtect Overview... 3 LICENSING... 3 UPGRADE... 3 Understanding the Migrated

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

Cisco NAC Appliance Agents

Cisco NAC Appliance Agents 10 CHAPTER This chapter presents overviews, login flow, and session termination dialogs for the following Cisco NAC Appliance access portals: Cisco NAC Agent, page 10-1 Cisco NAC Web Agent, page 10-28

More information

Data Sheet. NCP Exclusive Remote Access Mac Client. Next Generation Network Access Technology

Data Sheet. NCP Exclusive Remote Access Mac Client. Next Generation Network Access Technology Centrally managed VPN Client Suite for macos/os X For Juniper SRX Series Central Management macos 10.13, 10.12, OS X 10.11, OS X 10.10 Dynamic Personal Firewall VPN Path Finder Technology (Fallback IPsec/HTTPS)

More information

Copyright NeoAccel Inc. SSL VPN-Plus TM. NeoAccel Management Console: Network Extension version 2.3

Copyright NeoAccel Inc. SSL VPN-Plus TM. NeoAccel Management Console: Network Extension version 2.3 Copyright 2005-2009. NeoAccel Inc. SSL VPN-Plus TM NeoAccel Management Console: Network Extension version 2.3 NeoAccel makes no warranty of any kind with regard to this manual, including, but not limited

More information

V7610 TELSTRA BUSINESS GATEWAY

V7610 TELSTRA BUSINESS GATEWAY V7610 TELSTRA BUSINESS GATEWAY VPN Configuration Guide Date: Oct 16, 2015 Revision Num: 1.0 1 V7610 VPN Configuration Guide Rev1.0, October 2015 Revision History Date Release Author Description Oct 16,

More information

NCP Secure Entry macos Client Release Notes

NCP Secure Entry macos Client Release Notes Service Release: 3.20 r43098 Date: March 2019 Prerequisites Apple macos operating systems: The following Apple macos operating systems are supported with this release: macos Mojave 10.14 macos High Sierra

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology Universal, centrally managed VPN Client Suite for macos/os X Central Management and Network Access Control Compatible with VPN Gateways (IPsec Standard) Integrated, dynamic Personal Firewall VPN Path Finder

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors.

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors. IMC inode Intelligent Client v7.0 (E0106) Copyright (c) 2011-2014 Hewlett-Packard Development Company, L.P. and its licensors. Table of Contents 1. What's New in this Release 2. Problems Fixed in this

More information

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc. REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas

More information

NCP Secure Enterprise macos Client Release Notes

NCP Secure Enterprise macos Client Release Notes Service Release: 3.10 r40218 Date: July 2018 Prerequisites Apple OS X operating systems: The following Apple macos operating systems are supported with this release: macos High Sierra 10.13 macos Sierra

More information

AirGroup Configuration How- To with ClearPass Technical Note

AirGroup Configuration How- To with ClearPass Technical Note AirGroup Configuration How- To with ClearPass 6.0.1 Technical Note Copyright 2012 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the

More information

Secure Access Configuration Guide For Wireless Clients

Secure Access Configuration Guide For Wireless Clients ProCurve Networking Secure Access Configuration Guide For Wireless Clients Secure Access Configuration Guide For Wireless Clients Introduction... 2 Configuration Scenarios... 2 Required Network Services...

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0:

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0: GVC SonicWALL Global VPN Client 4.0.0 Contents Pre-installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Known Issues... 4 Troubleshooting... 5 Pre-installation

More information

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.1.0:

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.1.0: GVC SonicWALL Global VPN Client 4.1.0 Contents Pre-installation Recommendations Platform Compatibility New Features Known Issues Resolved Known Issues Troubleshooting Pre-installation Recommendations SonicWALL

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform. NCP Secure Enterprise MAC Client Service Release 2.02 Build 11 Date: August 2011 1. New Feature Compatibility to Mac OS X 10.7 Lion This version of the des Secure Enterprise MAC Client can be used on Mac

More information

NCP Secure Enterprise macos Client Release Notes

NCP Secure Enterprise macos Client Release Notes Service Release: 3.20 r43098 Date: March 2019 Prerequisites Apple macos operating systems: The following Apple macos operating systems are supported with this release: macos Mojave 10.14 macos High Sierra

More information

AT&T Global Network Client User s Guide Version 9.7

AT&T Global Network Client User s Guide Version 9.7 Version 9.7 AT&T Global Network Client User s Guide 9.9.1 2019 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

AT&T Global Network Client User s Guide Version 9.7

AT&T Global Network Client User s Guide Version 9.7 Version 9.7 AT&T Global Network Client User s Guide 9.8.1 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change. Notice Every effort

More information

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. NCP Secure Enterprise Mac Client Service Release 2.05 Build 14711 Date: December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Client VPN OS Configuration. Android

Client VPN OS Configuration. Android Client VPN OS Configuration This article outlines instructions to configure a client VPN connection on commonly-used operating systems. For more information about client VPN, please refer to our documentation.

More information

Aruba Central Application Programming Interface

Aruba Central Application Programming Interface Aruba Central Application Programming Interface User Guide Copyright Information Copyright 2016 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the

More information

Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 2 Resolved Issues... 3 Troubleshooting...

Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 2 Resolved Issues... 3 Troubleshooting... Global VPN Client SonicWALL Global VPN Client 4.6.4 Contents Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Known Issues... 2 Resolved Issues... 3 Troubleshooting...

More information

SonicWall Global VPN Client Getting Started Guide

SonicWall Global VPN Client Getting Started Guide SonicWall Global VPN Client 4.10 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the

More information

Configuring SSL VPN. About SSL VPN. About SSL VPN NetExtender

Configuring SSL VPN. About SSL VPN. About SSL VPN NetExtender SSL VPN Configuring SSL VPN Displaying SSL VPN Session Data Configuring SSL VPN Server Behavior Configuring SSL VPN Client Settings Configuring the Virtual Office Web Portal Configuring Virtual Office

More information

Managing the VPN Client

Managing the VPN Client Managing the VPN Client This chapter explains the tasks you can perform to manage connection entries, view and manage event reporting, and upgrade or uninstall the VPN Client software. The management features

More information

Firepower Threat Defense Remote Access VPNs

Firepower Threat Defense Remote Access VPNs About, page 1 Firepower Threat Defense Remote Access VPN Features, page 3 Firepower Threat Defense Remote Access VPN Guidelines and Limitations, page 4 Managing, page 6 Editing Firepower Threat Defense

More information

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN Remote Access virtual private network (VPN) allows individual users to connect to your network from a remote location using a laptop or desktop computer connected to the Internet. This allows mobile workers

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows Objective A Virtual Private Network (VPN) is a method for remote users to virtually connect to a private network

More information

Integrating AirWatch and VMware Identity Manager

Integrating AirWatch and VMware Identity Manager Integrating AirWatch and VMware Identity Manager VMware AirWatch 9.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Using VMware View Client for Mac

Using VMware View Client for Mac May 2012 View Client for Mac This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Junos Pulse 2.1 Release Notes

Junos Pulse 2.1 Release Notes Access Solutions Junos Pulse 2.1 Release Notes Junos Pulse Build# 14305 Secure Access Build# 7.1R5 JWOS Build# 6.2R1.4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745

More information

Cisco ASA 5500 LAB Guide

Cisco ASA 5500 LAB Guide INGRAM MICRO Cisco ASA 5500 LAB Guide Ingram Micro 4/1/2009 The following LAB Guide will provide you with the basic steps involved in performing some fundamental configurations on a Cisco ASA 5500 series

More information

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing an encrypted

More information

VMware Horizon Client for Windows 10 UWP User Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6

VMware Horizon Client for Windows 10 UWP User Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6 VMware Horizon Client for Windows 10 UWP User Guide Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6 You can find the most up-to-date technical documentation on the VMware website at:

More information

Pulse Secure Client for Chrome OS

Pulse Secure Client for Chrome OS Pulse Secure Client for Chrome OS Quick Start Guide Published March, 2018 Release 5.2r1 Version 1.6 2018 by Pulse Secure, LLC. All rights reserved 1 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose,

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

NCP Secure Client Juniper Edition (Win32/64) Release Notes

NCP Secure Client Juniper Edition (Win32/64) Release Notes Service Release: 10.10 r31802 Date: September 2016 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 32/64 bit Windows 8.x 32/64

More information

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. NCP Secure Enterprise Mac Client Service Release 2.05 Rev. 32317 Date: January 2017 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this

More information

Aruba Central. User Guide

Aruba Central. User Guide Aruba Central User Guide Copyright Information Copyright 2016 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public License, the GNU

More information

Configuring the VPN Client

Configuring the VPN Client Configuring the VPN Client This chapter explains how to configure the VPN Client. To configure the VPN Client, you enter values for a set of parameters known as a connection entry. The VPN Client uses

More information

Pulse Policy Secure. Getting Started Guide. Product Release 5.1. Document Revision 1.0 Published:

Pulse Policy Secure. Getting Started Guide. Product Release 5.1. Document Revision 1.0 Published: Pulse Policy Secure Getting Started Guide Product Release 5.1 Document Revision 1.0 Published: 2014-12-15 2014 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200 San

More information

AnyConnect on Mobile Devices

AnyConnect on Mobile Devices AnyConnect on mobile devices is similar to AnyConnect on Windows, Mac and Linux platforms. This chapter provides device information, configuration information, support information, as well as other administrative

More information

Support Device Access

Support Device Access Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 8 Device Portals Configuration Tasks, on page

More information

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide Document Control Number: 7055011 Contract Number: DMS-13/14-024 Prepared for: Florida Department of Management Services Division of Departmental

More information

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers MDQS-6-3639 Rev 4.0 Revised June 13, 2017. PS Suite EMR software and related products and services are owned by TELUS. PS Suite EMR and

More information

AT&T Global Network Client for Android

AT&T Global Network Client for Android Version 4.1.0 AT&T Global Network Client for Android 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

Aruba Central. User Guide

Aruba Central. User Guide Aruba Central User Guide Copyright Information Copyright 2015 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public License, the GNU

More information

Hollins University VPN

Hollins University VPN Hollins University VPN Hollins is now using Palo Alto for its network security and VPN gateway. You will need to install the new VPN client called GlobalProtect to gain access to the Hollins network remotely.

More information

NCP Secure Client Juniper Edition Release Notes

NCP Secure Client Juniper Edition Release Notes Service Release: 10.11 r32792 Date: November 2016 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 32/64 bit Windows 8.x 32/64

More information

Remote Support Web Rep Console

Remote Support Web Rep Console Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Data Sheet. NCP Secure Enterprise Linux Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Linux Client. Next Generation Network Access Technology Versatile central manageable VPN Client Suite for Linux Central Management and Network Access Control Compatible with VPN gateways (IPsec Standard) Integrated, dynamic personal firewall FIPS Inside Fallback

More information

EMC Ionix Network Configuration Manager Version 4.1.1

EMC Ionix Network Configuration Manager Version 4.1.1 EMC Ionix Network Configuration Manager Version 4.1.1 RSA Token Service Installation Guide 300-013-088 REVA01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Guest Access User Interface Reference

Guest Access User Interface Reference Guest Portal Settings, page 1 Sponsor Portal Application Settings, page 17 Global Settings, page 24 Guest Portal Settings Portal Identification Settings The navigation path for these settings is Work Centers

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

Aruba Central. User Guide

Aruba Central. User Guide Aruba Central User Guide Copyright Information Copyright 2017 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General Public License, the GNU

More information

SMG-1100/6100 User s Manual

SMG-1100/6100 User s Manual User s Manual First Edition, January 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is

More information

Dell SonicWALL Aventail Connect Tunnel User s Guide

Dell SonicWALL Aventail Connect Tunnel User s Guide Dell SonicWALL Aventail 10.6.2 Connect Tunnel User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Introduction. Introduction

Introduction. Introduction Introduction Introduction This manual describes the outline of SSCom and the operation method of SSCom Client. It also describes the manual that you need to refer to when using the SSCom. Target Readers

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

EMC SourceOne Discovery Manager Version 6.7

EMC SourceOne Discovery Manager Version 6.7 EMC SourceOne Discovery Manager Version 6.7 Installation and Administration Guide 300-012-743 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

Sophos Connect. help

Sophos Connect. help help Contents About... 1 Installing...1 Uninstalling... 1 Connections...3 Import connection... 3 Connect...4 Connection options...7 Events...9 Troubleshooting events... 10 General troubleshooting... 13

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information