Dell SRA 7.0 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 174 Seiten
- 11.8 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
All in One Printer
Dell 2155CN
761 Seiten 12.85 mb -
Projector Accessories
Dell 4310WX
82 Seiten 3.55 mb -
Network Card
Dell PRO3X
22 Seiten 0.4 mb -
Laptop
Dell 1015
8 Seiten 0.32 mb -
Computer Monitor
Dell 2007FP
43 Seiten 1.69 mb -
Computer Monitor
Dell E171FP
2 Seiten 0.75 mb -
Plumbing Product
Dell STP
222 Seiten 17.36 mb -
Camera Accessories
Dell M610
4 Seiten 0.42 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Dell SRA 7.0 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Dell SRA 7.0, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Dell SRA 7.0 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Dell SRA 7.0. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Dell SRA 7.0 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Dell SRA 7.0
- Den Namen des Produzenten und das Produktionsjahr des Geräts Dell SRA 7.0
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Dell SRA 7.0
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Dell SRA 7.0 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Dell SRA 7.0 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Dell finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Dell SRA 7.0 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Dell SRA 7.0, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Dell SRA 7.0 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
| 1 SRA 7.0 User Guide[...]
-
Seite 2
2 | SRA 7.0 User Guide Notes, Cautions, and W arnings © 2013 Dell Inc. T rademarks: Dell™, the DELL logo, SonicW ALL™ , SonicW ALL ViewPoint™, Reassembly-Free Deep Packet Inspection™, Dynam ic Security for the Global Network™, SonicW ALL Clean VPN™, SonicW ALL Clean Wireless™, SonicW ALL Global Response Intelligent Defense (GRID) Net[...]
-
Seite 3
Table of Contents | 3 Table of Contents Chapter 1. Using This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 About this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Organization of this Guide . . . . . . . . . . . . . . . . . [...]
-
Seite 4
4 | SRA 7.0 User Guide Installing NetExtender Using the Mozilla Firefox Browser . . . . . . . . . . . . . . . . 28 Installing NetExtender Using the Interne t Explorer Browser . . . . . . . . . . . . . . 30 Installing NetExtender Using the Ch rome Browser . . . . . . . . . . . . . . . . . . . . . . 32 Launching NetExtender Directly f rom Your Comput[...]
-
Seite 5
Table of Contents | 5 Initiating Secure Virtual Assist on a Linux Client . . . . . . . . . . . . . . . . . . . . . . . . 96 Using Secure Virtual Assist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Using Secure Virtual Assist in Unattended Mode . . . . . . . . . . . . . . . . . . . . . . 100 Enabling a Syste[...]
-
Seite 6
6 | SRA 7.0 User Guide[...]
-
Seite 7
Using This Guide | 7 Chapter 1 Using This Guide About this Guide Welcome to the Dell SonicWALL SRA User Guide . It provides information on using the Dell SonicW ALL SRA user portal called V irtual Of fice that allows you to create bookmarks and r un services over the Dell SonicW ALL SRA appliance. Always check http://www .sonicwall.com/us/Support.h[...]
-
Seite 8
8 | SRA 7.0 User Guide Guide Conventions The following conventions used in this guide are as follows: Current Documentation Check the Dell SonicW ALL documentation Web si te for the latest versions of all Dell SonicW ALL product documentation at h ttp://www .sonicwall.com/us/Support.html Quick Access Work Sheet Use the Quick Access Work Sheet to co[...]
-
Seite 9
Virtual Office Overv iew | 9 Chapter 2 Virtual Office Overview This chapter provides an overview of the Dell S onicW ALL SSL VPN user portal. It also includes an introduction to the SRA appliance and its feat ures and applications. This chapter contains the following sections: • “Virtual Of fice Overview” section on p age 9 • “Browser Req[...]
-
Seite 10
10 | SRA 7.0 User Guide The NetExtender standalone applications are automa tically installed on a client system the first time you click the NetExtender link in t he V irtual Of fice portal. The st andalone client can be launched directly from users’ computers without requiring them to log in to the SSL VPN portal first. • Using the SonicW ALL [...]
-
Seite 11
Virtual Office Overview | 11 The following table provides specific browser requirement s. T o configure SonicOS SSL VPN firmware, an Ad ministrator must use a W eb browser with JavaScript, cookies, and SSL enabled. Virtual Assist is fully supported on Windows platfor m s. Virtual Assist is certified to work on Windows 7, Windows V ista an d Windows[...]
-
Seite 12
12 | SRA 7.0 User Guide Web Management Interface Overview From your workstation at your remote location, launch an approved W eb browser and browse to your SRA appliance at the URL provided to you by your network Administrator . Ste p 1 Open a W eb browser and enter http s://192.168.200.1 (the default LAN management IP address) in the Location or A[...]
-
Seite 13
Virtual Office Overview | 13 have Administrator privileges, and login again using the LocalDo main domain. Only the LocalDomain allows Administrator access to the management interfa ce. Also note that the domain is independent of the privileges set up for the user . Logging in as a user takes you directly to V irtual Of fice. The V irtual Office Ho[...]
-
Seite 14
14 | SRA 7.0 User Guide The Home page provides customized content and links to network resources. The Home Page may contain support contact information, VPN instructions, comp any news, or technical updates. Only a Web browser is required to access intranet Web sites, File Shar e s, and FTP sites. VNC, T elnet and SSHv1 require Java. SSHv2 provi de[...]
-
Seite 15
Virtual Office Overview | 15 SonicW ALL NetExtender is a software applicati on th at enables remote users to securely connect to the remote network. Wi th NetExtender , remote users can virtually join the remote network. Users can mount network drives, upload and download files, and access resources in the same way as if they were on the local netw[...]
-
Seite 16
16 | SRA 7.0 User Guide[...]
-
Seite 17
Using Virtual Office Features | 17 Chapter 3 Using Virtual Office Features This chapter provides details on how to use the feature s in the Dell SonicW ALL SSL VPN user portal. This chapter cont ains the following sections: • “Importing Certificates” section on page 17 • “Using T wo-Factor Authentic ation” section on page 17 • “Usin[...]
-
Seite 18
18 | SRA 7.0 User Guide User Prerequisites Before you can log in using two-factor aut hentication, you must meet the following prerequisites: • Y our Administrator has created your user account. • Y ou have an account with a two-factor authent ication server that conforms to the RFC standard. User Configuration Tasks The following sections desc[...]
-
Seite 19
Using Virtual Office Features | 19 Ste p 1 Enter the IP address of the SRA appliance in your computers browser . The authentication window is displayed. Ste p 2 Enter your username in the Username field. Ste p 3 The first time you log in to the V irtual offi ce, your en try in the passwor d field depends on whether your system requires a PIN: – I[...]
-
Seite 20
20 | SRA 7.0 User Guide Enter the PIN in the New PIN field and again in the Confirm PIN field and click OK . The PIN must be between 4 and 8 characters long. Ste p 6 The RSA Authentication Manager verifies that the new PIN is an accept able PIN. If the PIN is accepted, the user is prompted to log in with the new passcode. Waiting for the Next Token[...]
-
Seite 21
Using Virtual Office Features | 21 Logging into the SSL VPN Virtual Office Using VASCO Two-Factor Authentication T o log in to the Dell SonicW A LL SSL VPN Virtual Office using V ASCO two-factor authentication, perform the following step s: Ste p 1 Enter the IP address of the SRA appliance in your computer ’s browser . The authentication window i[...]
-
Seite 22
22 | SRA 7.0 User Guide Ste p 6 Y ou will be prompted to enter additional information, the details of which will depend on the type of RADIUS server used. The ex ample below shows an M.ID RADIUS server , which first prompts you to “Please enter the M.ID PIN.” Enter the PIN in the Challenge field and click OK . Ste p 7 Y ou will then be prompted[...]
-
Seite 23
Using Virtual Office Features | 23 User Configuration Tasks T o use the One-T ime Password feature, per form the following steps: Ste p 1 If you are not logged into the SSL VPN V irtual Office user interface, open a W eb browser and type the Virtual Of fice interface URL in the Location or Address bar and press Enter . T ype in your user name in th[...]
-
Seite 24
24 | SRA 7.0 User Guide Verifying User One-Time Password Configuration If you are successfully logged in to V irtual Of fice, you have correctly used the One-T ime Password feature. If you cannot login using the One-T ime Password feature, verify the following: • Are you able to login to the V irtual Office wi thout being prompted to c heck your [...]
-
Seite 25
Using NetExtender | 25 Chapter 4 Using NetExtender This chapter explains how to configure and use Dell SonicW ALL NetExtender and includes the following sections: • “User Prerequisites” section on p age 25 • “User Configuration T asks” section on p age 27 • “V erifying NetExtender Operation from the System Tray” section on p age 4[...]
-
Seite 26
26 | SRA 7.0 User Guide Prerequisites for Linux Clients: Linux 32-bit or 64-bit client s are supported for NetExtender when running one of the following distributions (32- bit or 64-bit): • Linux Fedora Core 15 or higher , Ubuntu 1 1.10 or higher , or OpenSUSE 10.3 or higher • Java 1.5 and higher is requir ed for using the NetExtender GUI. The [...]
-
Seite 27
Using NetExtender | 27 Prerequisites for Android Smartphone Clients The NetExtender Android client is supported on rooted smartpho nes running the following versions of the Andr oid operating system: • 1.6 or higher The NetExtender Android client is compatible with any Dell SonicW ALL SSL VPN firmware version that supports the NetExt ender Linux [...]
-
Seite 28
28 | SRA 7.0 User Guide • “Using the NetExtender Command Line Interface” section on page 47 MacOS Platform • “Installing NetExtender on MacOS” section on page 48 • “Using NetExtender on MacOS” section on p age 50 Linux Platform • “Installing NetExtender on Linux” section on page 51 • “Using NetExtender on Linux” sectio[...]
-
Seite 29
Using NetExtender | 29 Ste p 4 Click the Install button. The portal will automatically inst all the NetExtender stand-alone application on your computer . If an older versi on of NetExtender is inst alled on the computer , the NetExtender launcher removes the old version and inst alls the new version. Ste p 5 Once the NetExtender application is ins[...]
-
Seite 30
30 | SRA 7.0 User Guide Closing the window (clicking the x icon in the upper right corner of the window) does not close the NetExtender session, but mini mizes it to the system tray for continued operation. Also, a balloon icon in the system tray appears, indica ting NetExtender has successfully inst alled. Ste p 7 The NetExtender icon is displayed[...]
-
Seite 31
Using NetExtender | 31 Ste p 4 Enter the URL or domain name of your SSL VPN server in the Add this Web site to the zone field and click Add . Ste p 5 Click Ok in the T rusted Sites and Internet Options win dows. Installing NetExtender fr om Internet Explorer T o install and launch NetExtender for the first time using the Internet Explorer browser ,[...]
-
Seite 32
32 | SRA 7.0 User Guide If an older version of NetExtender is inst alle d on the computer , the NetExtender launcher will remove the old version and t hen inst all the new version. Ste p 7 When NetExtender completes inst alling, the NetExtender St atus window displays, indicating that NetExtender successfully connected. The information provided in [...]
-
Seite 33
Using NetExtender | 33 Ste p 4 Return to the SSL VPN portal and click the NetExtender button. The portal will automatically install the NetExtender sta nd-alone application on your computer . The NetExtender inst aller window opens. If an older version of NetExtender is inst alle d on the computer , the NetExtender launcher will remove the old vers[...]
-
Seite 34
34 | SRA 7.0 User Guide Ste p 3 The IP address of the last SSL VPN se rver you connected to is displayed in the SSL VPN Server field. T o display a list of recent SSL VP N servers you have connected to, click the arrow . Ste p 4 Enter your username and password. Ste p 5 The last domain you connected to is displayed in the Domain field. Note The Net[...]
-
Seite 35
Using NetExtender | 35 Configuring NetExtender Properties Complete the following procedure to configure NetExtender properties: Ste p 1 Right click the icon in the system tray and click Properties... The NetExtender Properties window is displayed. Ste p 2 The Connection Profiles tab displays the SSL VPN connec tion profiles you have used, including[...]
-
Seite 36
36 | SRA 7.0 User Guide Ste p 6 T o have NetExtender launch when you log in to your computer , check the Automatically st art NetExtender UI . NetExtender will st art, but will only be displayed in the system tray . T o have the NetExtender log-in window display , check the Display NetExtender UI check box. Ste p 7 Select Minimize to the tray icon [...]
-
Seite 37
Using NetExtender | 37 Configuring NetExtender Connection Scripts Dell SonicW ALL SSL VPN provid es users with the ability to run batch file scripts when NetExtender connects and disconnect s. The scrip ts can be used to map or disconnect network drives and printers, launch applications, or open fi les or W eb sites. T o configure NetExtender Conne[...]
-
Seite 38
38 | SRA 7.0 User Guide Configuring Batch File Commands NetExtender Connection Script s can support any valid batch file commands. For more information on batch files, s ee the following Wikipedia entry: http://en.wikipedia.org/wiki/.bat . The following t asks provide an introduction to some commonly used batch file commands. Ste p 1 T o configure [...]
-
Seite 39
Using NetExtender | 39 Configuring Proxy Settings Dell SonicW ALL SSL VPN support s NetExtender sessions using proxy configurations. Currently , only HTTPS proxy is supported. When launching NetExtender from the Web portal, if your browser is already c onfigured for proxy access, NetExt ender automatically inherits the proxy settings. T o manually [...]
-
Seite 40
40 | SRA 7.0 User Guide Configuring NetExtender Log Properties Within the NetExtender Proper ties dialog box , click the Log heading in the menu on the left panel. The available options provide basic control over the NetExtender Log and Debug Log. Ste p 1 T o establish the size of the Ne tExtender Log, select either the Unlimited log file size radi[...]
-
Seite 41
Using NetExtender | 41 Configuring NetExtender Advanced Properties Within the NetExtender Proper ties dialog box, click the Advanced heading in the menu on the left p anel. The available options allow you to adjust advanced settings on NetExtender network properties and protocols. NetExtender allows users to customize the link speed that the NetExt[...]
-
Seite 42
42 | SRA 7.0 User Guide Configuring NetExtender Packet Capture Properties Within the NetExtender Proper ties dialog box , click the Packet Capture heading in the menu on the left p anel. The availabl e options allow you to enable and disable packet capture and dat a compression on NetExtender . Note Y ou must have Administrator privileges to change[...]
-
Seite 43
Using NetExtender | 43 Viewing the NetExtender Log The NetExtender log displays information on NetE xtender session event s. The log is a file named NetExtender .dbg . It is stored in the directory: C:Program FilesSonicWALLSSL VPNNetExtender . T o view the NetExtender log, ri ght click the NetExtender icon in the system tray , and click View Lo[...]
-
Seite 44
44 | SRA 7.0 User Guide T o view the Debug Log, either click the Debug Log icon or go to Log > Debug Log . Note It may t ake several minutes for the D ebug Log to load. During this time, the Log window will not be accessible, although you can open a new Log window while the Debug Log is loading. T o clear the log, click Log > Clear Log . Disc[...]
-
Seite 45
Using NetExtender | 45 Authentication Methods NetExtender supports various two factor authentic ation methods, including one-time p a ssword, RSA, and V asco. If an Administrator has c onfigured one-time passwords to be required to connect through NetExtender , you will be asked to provide this information before connecting. If an Administrator has[...]
-
Seite 46
46 | SRA 7.0 User Guide Uninstalling NetExtender The NetExtender utility is automatically insta lled on your computer . T o remove NetExtender , click St art > All Programs , click Dell SonicW AL L NetExtender , and then click Unins tall . Y ou can also configure NetExtender to autom atically uninstall w hen your session is disconnected. T o do [...]
-
Seite 47
Using NetExtender | 47 Using the NetExtender Co mmand Line Interface Note The NetExtender command line interface is only available on Windows platforms. T o launch the NetExtender CLI, perform the following t asks: Ste p 1 Launch the Windows Command Prompt by going to the Start menu, select Run , enter cmd , and click OK . Ste p 2 Change directory [...]
-
Seite 48
48 | SRA 7.0 User Guide Installing NetExtender on MacOS Dell SonicW ALL SSL VPN support s NetExt ender on MacOS. T o use NetExtender on your MacOS system, your system must meet the following prerequisites: • Mac OS 10.6 and higher • Java 1.5 and higher • Both PowerPC and Intel Macs are supported. T o install NetExtender on your MacOS system, [...]
-
Seite 49
Using NetExtender | 49 Ste p 3 The Virtual Of fice displays the status of NetExtender inst allation. A pop-up window may appear , prompting you to accept a certificate. Click Tr u s t . Ste p 4 A second pop-up window may appear , prompting you to accept a ce rtificate. Click Tr u s t . Ste p 5 When NetExtender is successfully inst alled and connect[...]
-
Seite 50
50 | SRA 7.0 User Guide Using NetExtender on MacOS Ste p 1 T o launch NetExtender , go the Ap plications folder in the Finder and double-click NetExtender .app . Ste p 2 The first time you connect, yo u must enter the Dell SonicW ALL SSL VPN server name in the SSL VPN Server field. Ste p 3 Enter your username and password. Ste p 4 The first time yo[...]
-
Seite 51
Using NetExtender | 51 Step 10 T o view the NetExtender Log, go to Window > Log . Ste p 11 T o generate a diagnostic report with detailed information on NetExtender performance, go to Help > Generate diagnostic report . Step 12 Click Save to save the diagnostic report using the default nx diag.txt file name in your NetExtender directory . Ins[...]
-
Seite 52
52 | SRA 7.0 User Guide T o install NetExtender on your Linux system, perform the following tasks: Ste p 1 Log in to the Dell SonicW ALL Virtual Of fice. Ste p 2 Click the NetExtender button. A pop-up window indicate s that you have chosen to open a .tgz file. Clic k OK to save it to your default download directory . Note Y ou must be logged in as [...]
-
Seite 53
Using NetExtender | 53 Ste p 5 Enter su -C “ ./ins tal l” to inst all NetExtender . Ste p 6 Enter your system password. Ste p 7 The installer will ask if you want non-root us ers to be able to r un NetExtender . Enter either y for yes or n for no. Note T o allow non-root users to run NetExtender , t he installer will set PPPD to run as root. Th[...]
-
Seite 54
54 | SRA 7.0 User Guide Ste p 2 The first time you connect, yo u must enter the Dell SonicW ALL SSL VPN server name in the SSL VPN Server field. NetExtender will remember the server name in the future. Ste p 3 Enter your username and password. Ste p 4 The first time you connec t, you must enter the domain name. The domain name is case- sensitive. N[...]
-
Seite 55
Using NetExtender | 55 Ste p 6 T o view the NetExtender DNS server information, select the DNS tab in the main NetExtender window . Ste p 7 T o configure NetExtender Preferences, select NetExtender > Preferences . Ste p 8 The following NetExtender settings can be configure d: • Automatically reconnect when the connection is terminated • Unin[...]
-
Seite 56
56 | SRA 7.0 User Guide • PPP Sync Mode - S pecifies synchronous PPP . By default, this opt ion is disabled and asynchronous PPP is used. Step 10 T o view the NetExtender Log, go to NetExtender > Log . Ste p 11 T o generate a diagnostic report with detailed information on NetExtender performance, go to Help > Generate diagnostic report . St[...]
-
Seite 57
Using NetExtender | 57 NetExtender supports the following Windows Mobile plat forms: • Windows Mobile 5 PocketPC version • Windows Mobile 6 Professional/Classic version Note Windows Mobile 5 Smart Phone version and Windows Mobile 6 S tandard version are not currently supported. T o use NetExtender on your Windows Mobile device, perform the foll[...]
-
Seite 58
58 | SRA 7.0 User Guide Ste p 11 Click the Menu button to see the NetExtender properties menu. Step 12 Select the Sent & Received menu t ab to adjust the metric us ed for sent and received statistics on the status window . Select the Throughput menu tab to adjust the throughput measurement displayed on the status window . Step 13 T o configure [...]
-
Seite 59
Using NetExtender | 59 – Hide NetExtender when closing window - Hides NetExtender when you click the ok button. – Display precise number in status - Displays the exact numbers of sent and receive data. – Automatically est ablish the underlying connection - Uses the Windows Mobile Connection Manager to establis h the device’ s connection to [...]
-
Seite 60
60 | SRA 7.0 User Guide Passwords in NetExtender Mobile NetExtender Mobile supports the ability for users to change passwords. Also, if configured by an Administrator , users can be alerted that the th eir password is scheduled to expire soon. If a user must change their password, a screen prompt will ask for the user’s old password, along with a[...]
-
Seite 61
Using NetExtender | 61 The following features are not supported or not applicable on NetExtender Android in Dell SonicW ALL SSL VPN: • Automatic connection of NetE xtender before Windows login • Automatic proxy support and Internet Explorer proxy synchronization • Connection scripts • IPv6 support • Client certificate support • Exit cli[...]
-
Seite 62
62 | SRA 7.0 User Guide Ste p 8 T ap USB connected to connect to the computer . T he next screen shows the connection. Ste p 9 T ap T urn on USB storage to prep are for copying the apk installer to the Android smartphone. Step 10 On the computer , copy the apk file to the Android SD card. Ste p 11 Unmount the Android SD card from your com puter . O[...]
-
Seite 63
Using NetExtender | 63 Step 14 Using the file browser , locate the apk file and run it to inst all NetExtender Android. Af ter installation, the NetExtender icon appears on the applications p age of the smartphone. Using NetExtender on Android Smartphones Instructions for using NetExtender on your A ndroid smartphone are available in the following [...]
-
Seite 64
64 | SRA 7.0 User Guide Connecting to NetExtender T o launch NetExtender on your An droid smar tphone and connect to t he network through th e Dell SonicW ALL SRA appliance, per form the following steps: Ste p 1 On your Android smartphone, start NetExt ender by t apping the appl ication icon. The NetExtender connection options screen displays. Ente[...]
-
Seite 65
Using NetExtender | 65 After a successful connection, the enter ed values are saved as a profile that you can select when starting NetExtender . NetExtender saves the information in a secure file on the smartphone. Ste p 4 If One T ime Password is enabled on the Dell SonicW ALL SRA appli ance, the One T ime Password prompt is displayed. Enter the t[...]
-
Seite 66
66 | SRA 7.0 User Guide If no PIN has yet been configured, or if the Ad ministrator has reset t he account, the following screen asks if the system should generate a new PIN. T o allow the system to generate it, tap Ye s . T o type in a PIN yourself, tap No and skip to S tep 7 . Ste p 6 If you chose to allow the system to generate t he PIN, the dis[...]
-
Seite 67
Using NetExtender | 67 Ste p 8 After entering the PIN or creating a new PIN, the T w o Factor Authentication process requires you to enter the token code shown on your tok en device. W a it for the token code to change on the device, and then type the code into the field on your smartphone and tap OK . Ste p 9 If a proxy server is configured in the[...]
-
Seite 68
68 | SRA 7.0 User Guide Ste p 11 If the NetExtender service running on the smar tphone has a problem or has stopped running, the following screen is displayed. T ap Exit to quit the application. Y ou may need to restart the service, possibly by turning the phone of f and on again, or you may need to re-install NetExtender . Exiting or Disconnecting[...]
-
Seite 69
Using NetExtender | 69 Ste p 2 In the NetExtender user interface, tap the Disconnect button and tap OK to confirm. NetExtender notifies you while disconnecting. Checking Status, Routes, and DNS Settings While NetExtender is connected, you can view st atus information, routes, and DNS settings on your smartphone. Ste p 1 T o open the NetExtender use[...]
-
Seite 70
70 | SRA 7.0 User Guide Ste p 2 T o view status information , tap the Stat us tab. Y ou can tap on the Sent , Received , or Throughput fields to change the unit s between bytes and packets. If you are connected to a Dell SonicW ALL SRA appliance running 5.0 or higher , and you have an Active Direct ory account, the User field contains your display [...]
-
Seite 71
Using NetExtender | 71 Ste p 4 T o view the configured DNS servers, t ap the DNS t ab. NetExtender Android supports DNS only; WI NS or DNS suffix are no t supported. Configuring Profiles, Prefer ences, and Proxy Servers T o configure NetExtender profiles and preferences, including proxy servers, on your Android smartphone, perform the following ste[...]
-
Seite 72
72 | SRA 7.0 User Guide Ste p 3 T o display the Remove selected , Remove all , and Close options on this NetExtender Profiles screen, press the options button while on the screen. Ste p 4 T ap Remove selected to remove the profiles that have check marks next to them. Ste p 5 T ap Remove all to remove all profiles from the smartphone. Ste p 6 T ap C[...]
-
Seite 73
Using NetExtender | 73 EXPORT LOG Step 12 T o export the log file of NetExt ender Android activity , select the Export Log option and enter the requested information. ABOUT Step 13 T o view NetExtender versi on information, select the About option. PREFERENCES / PROXY SETTINGS Step 14 T o configure NetExtender preferences including proxy and notifi[...]
-
Seite 74
74 | SRA 7.0 User Guide Step 17 After selecting the Use Proxy check box, tap Proxy settings to open the configuration screen for the proxy server . Step 18 T ype the IP address of the proxy server into the Server field. T ype the port number of the port that the server listens on into the Port field. This field displays “8080” by default, b ut [...]
-
Seite 75
Using NetExtender | 75 Changing Your Password T o change your password when prompted by NetExtender , perform the following steps: Ste p 1 After connecting, a p assword expiration notice may be displayed on your Android smartphone. T ap Ye s to change your password, or No to delay until a later time . NetExtender will remind you each time you conne[...]
-
Seite 76
76 | SRA 7.0 User Guide Ste p 3 If your password expires befo re you change it, the Change password screen is displayed when you connect, with the message “Login fa iled – you must change your passwo rd.” T ype your old password into the Current Password field, then type a new password into the New p assword field and again into the Ty p e i [...]
-
Seite 77
Using Secure Virtual Assist | 77 Chapter 5 Using Secure Virtual Assist Secure Virtual Assist provides remote assist ance and virtual meeting cap abilities. Secure Virtual Assist is an easy to use tool that allows Dell SonicW ALL SSL VPN use rs to remotely support customers by taking control of their co mputers while the customer observes. Secure Vi[...]
-
Seite 78
78 | SRA 7.0 User Guide 3. The customer requests assist ance by one of these methods: – Logs into the Dell SonicW ALL SSL VPN V irtual Office an d clicks on the Virtual Assist link. – Receives an email invitation from the T echni cian and clicks on the link to launch Virtual Assist. – Navigate directly to the URL of the V irtual Assist home p[...]
-
Seite 79
Using Secure Virtual Assist | 79 Configuring Secure Vi rtual Assist Settings The Secure V irtual Assist Settings window can be access ed either by clicking the Settings button in the top left corner of the application window or by right-clicki ng on the V irtual Assist icon in the taskbar and selecting Settings . The Virtual Assist Settings window [...]
-
Seite 80
80 | SRA 7.0 User Guide • Connection Profiles - Displays all of the V i rtual As sist connection profiles that have been used on this computer . T o remove a profile, select it and click the Remove button. • Connection Settings - Allows users to customize how they are identified in Vi rtual Assist and the default settings of V irt ual Assist cu[...]
-
Seite 81
Using Secure Virtual Assist | 81 Selecting a Secure Virtual Assist Mode When you first launch Secure Virtual Assist, by de fault it will be in customer mode. T o change the mode, perform the following step s. Ste p 1 Click Change Mode to select one of four possible modes. Ste p 2 Select one of the following fou r Virtual Assist modes: • Customer [...]
-
Seite 82
82 | SRA 7.0 User Guide Ste p 2 In the Server drop-down menu, select the IP address or domain name of the Dell SonicW ALL SRA appliance. Ste p 3 Enter the Username and Password for the T echnician account on the appliance. Ste p 4 Click Login .The Select Domain window displays. Ste p 5 Select the Domain that the username is configured for and click[...]
-
Seite 83
Using Secure Virtual Assist | 83 Performing Secure Virtual Assist Technician Tasks T o get started , the T echnician logs into the Dell SonicWALL SRA app liance and launches the Secure Virtual Assist application. Note Each T echnician can only assist one customer at a time. By default, the V irtual Assist window launches with the V irtual Assist to[...]
-
Seite 84
84 | SRA 7.0 User Guide Assisting Customers A pop-up window in the bottom right t ask bar aler ts the T echnician when a customer is in the assistance queue. The customer queue is also displayed in the Service window . Ste p 1 Double-click a customer ’s user nam e to begin assisting the customer . Note Return a customer to the queue by right-cli [...]
-
Seite 85
Using Secure Virtual Assist | 85 The T echnician now has complete control of the customer’s keyboard and mouse. The customer can see all of the actions that the T echnician performs. During a V irtual Assist session, the customer is not locked out of their compu ter . Both the T echnician and customer can control the com puter , although this may[...]
-
Seite 86
86 | SRA 7.0 User Guide • Record - Records the Virtual As sist session in a .wmv file that can be shared with other customers. The file is automatically named with the user name and the date and time the recording was started (for example, Sue_EST_2013-2-12_09h47m43s.wmv). The file location can be set on the Connection Settings window . • Syste[...]
-
Seite 87
Using Secure Virtual Assist | 87 • Request Full Control - T echnicians can request full c ontrol of a customer ’s desktop, allowing them to reboot the system, delete file s, or over-write files on the customer ’s computer without the customer being repeat edly prompted for permission. Select Request Full Control under the Commands menu to i s[...]
-
Seite 88
88 | SRA 7.0 User Guide Viewing Secure Virtual Assist Session Log The Secure Virtual Assist Session Log window can be display ed by clicking the Logging button in the T askbar . The log displays a history of timest amped events for the session, such as opening Chat or File T ransfer , requesting Full Control, etc. Using the Secure Virtua l Assist F[...]
-
Seite 89
Using Secure Virtual Assist | 89 Note When deleting or overwriting files, the customer is warned and must give the T echnician permission unless t he T echnician has clicked the Request Full Control button and the customer has confirmed. • New folder creates a new folder in the selected directory . • Rename renames the selected file or director[...]
-
Seite 90
90 | SRA 7.0 User Guide • The login page of your V irtual Office may incl ude a direct link to Virtual Assist as shown below . • Login to the Virtual Of fice and click the Request Assist ance button. • If Secure Virtual Assist has already been install ed, select the Secure V i rtual Assist shortcut from the Programs list under Window’s st a[...]
-
Seite 91
Using Secure Virtual Assist | 91 Ste p 4 Y ou can launch Virtual Assist either from the Vi rtual Office window or from a shortcut that is added to your Programs list under Window’s st art button. If the Server address is not auto- propagated in the login window , enter the Server address. The server address can be either an IP address, IPv6 addre[...]
-
Seite 92
92 | SRA 7.0 User Guide After selecting a port al, a certificate prom pt appears, followed by an assistance code and/or disclaimer if configur ed by the Administrator . Ste p 9 A pop-up window indicates that you are in the Virtual Assist queue. T he T echnician will be alerted that you are ready . Click Cancel to cancel the V irtual Assist request.[...]
-
Seite 93
Using Secure Virtual Assist | 93 Ste p 11 When the T echnician initiates the session, the V i rtual Assist toolbar appears in the bo ttom right of your screen. The T echnician now has control of your computer . Step 12 For information on using V irtual Assist once the session is active, see “Using Secure V irtual Assist” section on page 99 . In[...]
-
Seite 94
94 | SRA 7.0 User Guide Ste p 2 The first time you launch Vi rtual Assist, you will be p rompted to allow the Secure V irtual Assist applet to be inst alled on your computer . Click Allow . Ste p 3 The Secure V irtual Assist client installs and launches. In the future, you can either launch Virtual Assist either by navigat ing to the Virtual Of fic[...]
-
Seite 95
Using Secure Virtual Assist | 95 Ste p 6 Y ou may be prompted to enter an Assist ance Code . Ste p 7 If prompted to read and acc ept a disclaimer , click OK . Ste p 8 A pop-up window indicates that you are in the Virtual Assist queue. T he T echnician will be alerted that you are ready . Click Cancel to cancel the V irtual Assist request. Ste p 9 T[...]
-
Seite 96
96 | SRA 7.0 User Guide Initiating Secure Virtual Assist on a Linux Client Note Dell SonicW ALL Secure V irtual Assist is fully tested on the Ubuntu di stribution of Linux. It has not been tested on other Linux distributions. T o launch a V irtual Assist customer session to request help on your Linux computer , perform the following steps: Ste p 1 [...]
-
Seite 97
Using Secure Virtual Assist | 97 Ste p 3 Optionally , you can enter your name and a summary of your issue and click Request Support . Y ou will then be prompted to install the Secure Vi rtual Assist client. Af ter the installation is complete, the Secure Virtual Assist client will launch automatically . Ste p 4 Y ou can now launch Virtual Assist ei[...]
-
Seite 98
98 | SRA 7.0 User Guide Ste p 7 Y ou may be prompted to enter an Assist ance Code . Ste p 8 If prompted to read and acc ept a disclaimer , click OK . Ste p 9 A pop-up window indicates that you are in the Virtual Assist queue. T he T echnician will be alerted that you are ready . Click Cancel to cancel the V irtual Assist request. Step 10 The Virtua[...]
-
Seite 99
Using Secure Virtual Assist | 99 Ste p 11 When the T echnician initiates the session, the V i rtual Assist toolbar appears in the bo ttom right of your screen. The T echnician now has control of your computer . Step 12 For information on using V irtual Assist once the session is active, see “Using Secure V irtual Assist” section on page 99 . Us[...]
-
Seite 100
100 | SRA 7.0 User Guide • Tr u s t e d - The T echnician has complete control of the customer ’s computer . T o toggle between T rusted mode and Active mode, enter Ctrl-Alt-T . Note By default, Virtual Assist sessions are launc hed in T rusted mode. T o modify this mode: 1. Click the Settings button on the top lef t corner of the window . 2. S[...]
-
Seite 101
Using Secure Virtual Assist | 101 Ste p 4 Enter a Password and click Login . The W aiting window displays and shows the length of time you have been in the queue. Ste p 5 Y ou need to provide the T echnician with the password you just def ined. An easy way to do this is to click Add Information and give the T echnician your password. Enabling a Sys[...]
-
Seite 102
102 | SRA 7.0 User Guide • Computer Name: This is an identifier for the system to help dif ferentiate between other systems that may be waiting for support in the queue. This name will appear as a bookmark name in the user port al of the owner . • Owner Name: This name must be a valid SRA appliance user name. • Key: This is a key the T echnic[...]
-
Seite 103
Using Secure Virtual Assist | 103 T o enable W ake on Lan: Ste p 1 Configure W ake on Lan in the client PC BIOS by selecting the W ake-on-LAN option. Ste p 2 Configure W ake on Lan in the client PC Device Manager: 1. Open Device Manager by right-clicking the Co mputer icon on the client PC desktop, selecting Properties from the drop-down list, and [...]
-
Seite 104
104 | SRA 7.0 User Guide Ending Secure Virtual Access Mode Disconnecting from a Secure V irtual Access sess ion will place the system back in the support queue for later access by the T echnician. From the personal system-side, the user/T echnician may uninstall or terminate the applic ation from the tray option icons. An Administrator can forcibly[...]
-
Seite 105
Using Secure Virtual Assist | 105 • Assist ant (Coordinator-designated Assi stant) - The Coordinator se lect s an Assist ant fr om the list of available Participant s and assigns the Assist ant privileges. W h e n t h e C o o r d i n a t o r exits the meeting , th e Assist an t auto m at ic ally becom e s the Coor di na tor. A me et ing may hav e[...]
-
Seite 106
106 | SRA 7.0 User Guide Coordinator Role The Virtual Meetin g Coordinator performs the following t asks: Logging In A Participant can join a V irtual M eeting by clicking a link in the email invite or by logging into the Virtual Meeting client if t he Administrator has enabled Join Without an Invitation on the AMC Secure Virtual Meeting > Setti[...]
-
Seite 107
Using Secure Virtual Assist | 107 The meeting application can alternatively be acce ssed directly from the V irtual Office on an SRA 4600, SRA 4200, and V irtual Appliance. A Domains drop-down list is displayed if the user belongs to multiple domains, and a Port als drop-down list is shown if V irtual Meeting is enabled on multiple portals. Otherwi[...]
-
Seite 108
108 | SRA 7.0 User Guide T o create a meeting, click the Create button to display the meeting creation interface. T o set up a meeting enter a Meeting Name , Meeting Code , S tarting Dat e and Tim e , and Ending Date and Tim e . The meeting code will be entered by al l Particip ants wishing to join the meeting. If you want to invite attendees and t[...]
-
Seite 109
Using Secure Virtual Assist | 109 After you create a meeting, you enter the meeting’ s lobby automatically . When a meeting is scheduled for a late r time, the Coordinator exit s the m eeting and returns to the lobby at the meeti ng start time. If the Allow startin g meetin g without meeting creator setting is disabled and the Coordinator has not[...]
-
Seite 110
110 | SRA 7.0 User Guide Performing Lobby Functions The following functions can be performed fr om the lobby by clicking buttons at the top: Clicking the St art Meeting button start s the meeting. Only the Coordinator and Assistant can st art a meeting. When a meeting is started, the St art Meeting button changes to the S top Meeting button. Clicki[...]
-
Seite 111
Using Secure Virtual Assist | 111 Controlling Roles The Coordinator and Assist ant can change a meet ing member ’s role by right clicking the meeting member ’s name and selecting a role from the drop-down menu. The following options may appear , depending on permissions and the meeting member ’s current role. . Option User Description Pass Ke[...]
-
Seite 112
112 | SRA 7.0 User Guide Revising Meeting Settings Proxy Settings For setups that require a proxy , click the Settings tab in the Virtual Meeting window , and check the Enable Proxy Settings check box. Enter the proper information to utilize the prox y or click the Internet Explorer proxy settings button to automatically import the proxy settings u[...]
-
Seite 113
Using Secure Virtual Assist | 113 General Settings The General Settings tab is used to select the location where recordings will be save d, select the V oice Transmission met hod, and enable or disable the Participant Mark feature. T o change the default settings: • Click the Browse button and select the lo cation where you want to save meeting r[...]
-
Seite 114
114 | SRA 7.0 User Guide Logging Actions and Messages The Log Viewer displays all event log dat a, wh ich includes actions t aken during a meeting and any errors that occur . The Log helps you keep tr ack of events that occu r in a meeting and shows all actions performed by meeting Par ticipants. Use the error and warning events in the log to take [...]
-
Seite 115
Using Secure Virtual Assist | 115 The Lobby button is available for all meeting me mbers, including Vi ew-only Participant s. If the lobby is hidden during a m eeting, it displays the lobby window when the Host is sharing the screen. The Options button opens the Meeting Settings window described in “Revising Meeting Settings” on page 1 12 and i[...]
-
Seite 116
116 | SRA 7.0 User Guide White Board displays a white board and is also displayed on the Lobby toolbar . See “Using a White Board” on page 1 19 for additional information. Annotation allows an y meeting Participant to add text, object s, and highlighting to a white board using the white board toolbar , as described in “Using a White Board” [...]
-
Seite 117
Using Secure Virtual Assist | 117 T o invite someone to a Vi rtual Meeting, enter the email address and click Invite . Additional fields are optional. Invited users rece ive an email similar to the following: After receiving the email in vita tion, attendees click the link in the email, which accesses the appliance to join the meeting. If the Secur[...]
-
Seite 118
118 | SRA 7.0 User Guide Create new questions by clicking t he and buttons. There are three question types: • Multiple choice (single answer) • Multiple choice (multiple answer) • Short answer Use the buttons at the top of the window to: The Open Virtual Meeting Poll Files button opens any saved polling questions an d possible answers. The Sa[...]
-
Seite 119
Using Secure Virtual Assist | 119 Polling feedback wind ow Feedback from the poll is returned to the poll initiator when a nswers are submitted and when the End Polling button is clicked. The collected feedbac k is displayed as shown below . Click the green bar to display det ai led information for each answer . Using a White Board The Host can sha[...]
-
Seite 120
120 | SRA 7.0 User Guide Rect angle tool draws a rectangle. The rect angle edge colo r (default black), fill color (default transparent), and edge weight (1- 100pt, default 5pt ) are configurable with the Customization tools. Ellip se tool draws an ellip se on the white board. T he ellipse color (default black), fill color (default transparent), an[...]
-
Seite 121
Using Secure Virtual Assist | 121 T o share a file, select File > Select File from the menu on the Sharing File window and select the file. By default, the file will be shared with a ll meeting Particip ants. T o share the file with specific meeting Participants select Customize . Next, click Publish to notify Participants th at a file is availa[...]
-
Seite 122
122 | SRA 7.0 User Guide Text Chatting Chat with all attendees in the meeting or hav e a private chat with one or more selected attendees, including View-only Participant s. If the lobby is hidden, click on the control menu once the meeting has started and the Host is sharing the screen. The chat window is displayed in a stand-alone chat window . R[...]
-
Seite 123
Using Secure Virtual Assist | 123 Login Participant s click the link from the meeting email invitation or type the server name or IP address in the Server field of the Secure V irtual Meeting window . If necessary , select the proper meeting por t al. All available m eetings are displayed. Select the meeting to join and click the Join button. The f[...]
-
Seite 124
124 | SRA 7.0 User Guide Enter the meeting code that was pr ovided in the meeting email invitation and click the OK button to join the meeting. After joining t he meeting, you will be in the meeti ng lobby .[...]
-
Seite 125
Using File Shares | 125 Chapter 6 Using File Shares File shares provide remote users with a secure Java applet or HTML-based interface to Microsoft File Shares using the CIFS (Common Internet File System) or SMB (Se rver Message Block) protocols. Using a Web interface simila r in style to Microsoft’ s familiar Network Neighborhood or My Network P[...]
-
Seite 126
126 | SRA 7.0 User Guide Configuration Overview The SSL VPN File Shares Applet is easy and intuitive to use. User should be aware of its functions and limitations . Setting up bookmarks and the browser interface are covered in this section, along with an overview of the browser and sample use cases. This section contains t he following subsections:[...]
-
Seite 127
Using File Shares | 127 Ste p 4 The Add Bookmark screen displays. Enter a friendly name for the bookmark in the Bookmark Name field. Ste p 5 Enter the IP address and file director y path to the File Share in the N a me o r I P Ad d r e s s field. Note When using the Java applet, the Name or IP Address field m ust be to a file directory and end with[...]
-
Seite 128
128 | SRA 7.0 User Guide Using the Java File Shares Applet While loading the browser interf ace, warning messages might display . These messages will look dif ferent for different browsers. For the pur pose of these examples, Internet Explorer 6.0 was used. Ste p 1 If you are not logged into the SSL VPN V irtual Office user interface, open a W eb b[...]
-
Seite 129
Using File Shares | 129 The File Shares Applet displays. Note The File Shares Applet window will not automatically refresh when its content s have changed or if it has been previously viewed. T o refresh, click the Refresh icon from the toolbar , or use the Refresh option from the right-click menu. Note The remote networ k can be browsed from the r[...]
-
Seite 130
130 | SRA 7.0 User Guide Ste p 7 Double-click a file to launch it with the proper applic ation. If activating a file on the remote machine, the File Shares Applet will first do wnload the file to a temporary folder on your machine and then open it. The File Shares Applet will not always be able to delete the tempor ary file after use. Use caution w[...]
-
Seite 131
Using File Shares | 131 Configuration Examples The following configuration examples provide a demonstration of the us efulness and flexibility of the File Shares Applet. • Configuring Bookmarks from Within the File Shares Applet, p age 131 • Using Bookmarks from Within t he File Shares Applet, p age 133 • Moving Files and Folders, page 133 ?[...]
-
Seite 132
132 | SRA 7.0 User Guide Ste p 5 T o set a bookmark to the current directory , right-click in an empty location in the remote directory and select Add Bookmark . Note T o set a bookmark for a specific file or folder , select it prior to selecting Add Bookmark from the right-click menu. Ste p 6 Enter a name for the new bookmark in the New Bookmark w[...]
-
Seite 133
Using File Shares | 133 Using Bookmarks from With in the File Shares Applet In Addition to accessing bookmarks from the Vi rtual Of fice portal, boo kmarks can be easily accessed from within the File Shares Applet. Ste p 1 Launch the File Shares A pplet by clicking on the File Shares button in the Virtual Of fice portal. Ste p 2 Click the Bookmarks[...]
-
Seite 134
134 | SRA 7.0 User Guide Warning The File Shares Applet will completely delete t he file or folder from the remote machine. In the case of a folder , nested items will also be deleted. These items will not be sent to the recycle bin on either machine and are not recoverable. Ste p 6 Once the file or folder has been deleted, the File Shares Applet w[...]
-
Seite 135
Using File Shares | 135 Ste p 1 Launch the File Shares Applet by clicking on a bookmark in the Virtual Of fice portal. Ste p 2 Right click the file and select Properties . The file’ s properties will be displayed in a separate window . Ste p 3 T o open the file, double-click the file. Alternativ ely , create a bookmark to it, and launch the file [...]
-
Seite 136
136 | SRA 7.0 User Guide Using HTML-Based File Shares File shares provide remote users with a secure Web interface to Microsof t File Shares using the CIFS (Common Internet File System) or SMB (Server Message Block) protocols. Using a Web interface similar in style to Microsof t’ s familiar Network Neighborhood or My Network Places, File Shares a[...]
-
Seite 137
Using File Shares | 137 Ste p 5 T ype a valid username in the User Name field and a valid p assword in the Password field and click Login . Ste p 6 Virtual Of fice displays the home File Share scr een that you have specif ied, displaying folders on the network to which you can navigate.[...]
-
Seite 138
138 | SRA 7.0 User Guide The following t able describes the controls at the top of the File Share window . Ste p 7 Y ou can now navigate the folders and files in the File S hare as you would through Windows Explorer or other file management systems. Ste p 8 T o add a new folder in the current File Shar e location, type the name of the folder in the[...]
-
Seite 139
Managing Bookmarks | 139 Chapter 7 Managing Bookmarks Bookmarks are objects that enabl e you to connect to a location or application conveniently and quickly . The Virtual Of fice B ookmark system allows bookmark s to be cr eated at the group and user levels. The Administrator can create both group and user bookmarks which will apply to applicable [...]
-
Seite 140
140 | SRA 7.0 User Guide Adding Bookmarks Bookmarks provide a convenient way for you to access Web, FTP , or other services on the remote network that you will connect to frequent ly . T o define bookmarks, perform the following: Ste p 1 In the Virtual Office window at t he top of the bookmarks table, click Show Edit Controls and then click Create [...]
-
Seite 141
Managing Bookmarks | 141 Ste p 3 Enter the domain name, IP address, or IPv6 addr ess of a host machine on the LAN in the Name or IP Address field. IPv6 addresses should be enclosed in brackets (i.e. the [ and ] symbols). Y ou may also enter the wildcard variable %USERNAME% to display the current user name. V ariables are case-sensitive. Ste p 4 In [...]
-
Seite 142
142 | SRA 7.0 User Guide • Select Always use specified Citrix ICA Server to explicitly specify the Citrix ICA Server Address for the Citrix ICA Session. By default , the Bookmark uses the information provided in the ICA configuration on the Citrix server .[...]
-
Seite 143
Managing Bookmarks | 143 RDP ActiveX and Java Bookmarks ActiveX and Java RDP bookmarks of fer several features that are not available in other bookmarks. Tip The ActiveX client is only suppor ted on the Internet Explorer browser , while the Java client is supported on all platforms and browsers that are compatible with Dell SonicW ALL SSL VPN. Ste [...]
-
Seite 144
144 | SRA 7.0 User Guide Ste p 6 Continue to configure t he RDP ActiveX or Java Bookmark as follows: Option Usage Screen Size Select the default screen si ze to be used when users execute this bookmark. It is advised that you select a size equal to or smaller than your current desktop screen size. ActiveX RDP bookmarks also have a full-screen optio[...]
-
Seite 145
Managing Bookmarks | 145 Tip The ActiveX client is only suppor ted on the Internet Explorer browser , while the Java client is supported on all platforms and browsers that are compatible with Dell SonicW ALL SSL VPN. Ste p 7 When you are fini shed. Click the Add button to add this bookmark to your Vi rtual Office list. Application and Path T o have[...]
-
Seite 146
146 | SRA 7.0 User Guide Determining the Remote Comput er’s Full Name or IP Address Complete the following steps to determine the fu ll name of the computer to which the RDP bookmark is pointing: Ste p 1 Right click the My Computer icon on the desktop of the remote computer , and select Properties . Ste p 2 Click the Remote tab. Ste p 3 The full [...]
-
Seite 147
Managing Bookmarks | 147 to be displayed when a user clicks this bookmark. If left unchecked, the wa rning dialog will allow the user to select a “Do not show this warning again” option if the user has permissions to edit this bookmark (set above). For more information about of floaded applications, see the Application Offloading section in the[...]
-
Seite 148
148 | SRA 7.0 User Guide Ste p 5 Optionally change other settings specific to the Service type. Ste p 6 Optionally enable or disable the Automatical ly log in setting, or change the credentials selection. Ste p 7 Click Apply . The Virtual Office home p age displays with the new IP address or domain name. Removing Bookmarks T o remove a bookmark, pe[...]
-
Seite 149
Managing Bookmarks | 149 • Bitmap caching • Menu/window animation • Visual styles • Window drag If the Java client application is RDP 6, it also support s: • Dual monitors • S p an monitors • Font smoothing • Desktop composition • Remote Application Note RDP bookmarks can use a port designation if t he service is not running on th[...]
-
Seite 150
150 | SRA 7.0 User Guide Ste p 3 A window is displayed indicating that the Remo te Desktop Client is loading. The remote desktop then loads in it s own windows. Y ou can now access all of the applications and files on the remote computer . For information on configuring options for RDP bookmarks, see “RDP ActiveX and Java Bookmarks” on page 143[...]
-
Seite 151
Managing Bookmarks | 151 Using VNC Bookmarks Ste p 1 Click the VNC bookmark. The following window is d isplayed while the VNC client is loading. Note VNC can have a port designation if the service is running on a different port. Ste p 2 When the VNC client has loaded, you will be pr ompted to enter your p assword in the VNC Authentication window . [...]
-
Seite 152
152 | SRA 7.0 User Guide The following t able describes the options that can be configured for VNC. T able 1 VNC Options Option Default Description of Options Encoding T ight Hextile is a good choice for fast networks, while T ight is better suited for low-bandwidth connections. From the other side, the Tig h t decoder in T ightVNC Java viewer is m[...]
-
Seite 153
Managing Bookmarks | 153 Using FTP Bookmarks FTP bookmarks can use a port designation if t he service is not running on the default port. Ste p 1 Click the FTP bookmark. The FTP Session dialog box displays. Ste p 2 Enter your username and password. If you want to use your Virtual Of fice username and password, simply leav e the fields blank. Ste p [...]
-
Seite 154
154 | SRA 7.0 User Guide Ste p 4 Y ou can use the following utilities in the FTP site: – T o manually navigate to a folder , enter the folder name in the Go to directory field and click Submit . – T o create new folders in the directory , use the Create new folder fields. – T o delete multiple files, click in the check box es of files or fold[...]
-
Seite 155
Managing Bookmarks | 155 Uploading Files T o upload a file, perform the following: Ste p 1 Click Upload Files in the navigation bar . The Upload FTP Files window will be displayed. Ste p 2 The current directory is displayed in the Upload files to: field. T o navigate to a different directory , enter the directory name in the Go to directory: field.[...]
-
Seite 156
156 | SRA 7.0 User Guide Using Telnet Bookmarks Ste p 1 Click the T elnet bookmark. T elnet bookmarks can use a port designation for servers not running on the default por t. Ste p 2 Click OK to any warning messages that are displa yed. A Java-based T e lnet window launches. Ste p 3 If the device you are T elnetting to is configur ed for authentica[...]
-
Seite 157
Managing Bookmarks | 157 Using SSHv2 Bookmarks SSH bookmarks can use a port designation fo r servers not running on the default port. Ste p 1 Click the SSHv2 bookmark. A Java-based SSH window displays. T y pe your user name in the Username field and click Login . Ste p 2 A hostkey popup displays. Click Ye s to accept and proceed with the login proc[...]
-
Seite 158
158 | SRA 7.0 User Guide Ste p 4 The SSH terminal launches in a new screen. Using Web Bookmarks Ste p 1 Click the HTTP or HTTPS bookmark. Note HTTP bookmarks can have a port designation and a path. Ste p 2 A new window is launched in your default browser that connect s to the domain name or IP address specified in the bookmark. HTTP & HTTPS Boo[...]
-
Seite 159
Managing Bookmarks | 159 Using Citrix Bookmarks Citrix is a remote access, app lication sharing service, simila r to RDP . It enables users to remotely access files and applications on a cent ral computer over a secure connection. There are two types of Citrix bookmarks: • “ActiveX Citrix Bookmark” on page 159 • “Java Citrix Bookmark” o[...]
-
Seite 160
160 | SRA 7.0 User Guide Ste p 4 Click Ye s to the Security W arning message that is displayed. Ste p 5 The Citrix Web Client installs. Ste p 6 Click Ye s to the Citrix license agreement.[...]
-
Seite 161
Managing Bookmarks | 161 Ste p 7 When the Citrix Web Client has inst alled, click OK If the Citrix Web Interface login window does not display , restart your Web brow ser and launch the Citrix bookmark again. Ste p 8 Enter your username, password, and domain in the Citrix Web Interface login window . Ste p 9 The Citrix W eb Interface home page is d[...]
-
Seite 162
162 | SRA 7.0 User Guide Java Citrix Bookmark When using a non-Internet Explorer web browse r , Citrix bookmarks launch the Java Citrix client. The following steps describe how to launch and use the Java Citrix client. Ste p 1 Click the Citrix bookmark. The login window displays. Ste p 2 For Logon type , select either Anonymous or Explicit . Select[...]
-
Seite 163
Managing Bookmarks | 163 Ste p 6 Select Display Settings to change the language and to specif y if Citrix hints should be displayed. Ste p 7 Select Session Settings to customize the default window size for Citrix sessions. Ste p 8 In the Window Size drop-down menu, select one of the following options: • No preference : Uses the default setting co[...]
-
Seite 164
164 | SRA 7.0 User Guide Global Bookmark Single Sign-On Options Y ou can configure si ngle sign-on using the Options button on the main Virtual Of fice page. SSO settings will be enabled only if the Administrator has conf igured user- controlled single sign-on (SSO). T o configure SSO bookmark options, perform the following tasks: Ste p 1 Click the[...]
-
Seite 165
Managing Bookmarks | 165 Per-Bookmark SSO allows users to enable or disable SSO for indivi dual bookmarks. This flexibility in specifying l ogin credentials is useful in the following cases: • Users who use multiple accounts to access a variety of resources. • Users who use two-factor authentication to log in to the SSL VPN Virtual Of fice, but[...]
-
Seite 166
166 | SRA 7.0 User Guide Ste p 7 Click OK . Ste p 8 Enter the User name and p assword for the service.[...]
-
Seite 167
Support Information | 167 Appendix A Support Information This appendix contains the following se ctions: • “Contact Information” on p age 167 • “GNU General Public License (GPL) Source Code” on page 167 • “Limited Hardware W arranty” on pa ge 167 • “End User Licensing Agreement” on page 168 Contact Information For timely res[...]
-
Seite 168
168 | SRA 7.0 User Guide suppliers' entire liability and Cu stomer's sole and exclusive remedy under this limited warranty will be shipment of a replacement product. At Dell SonicW ALL's discretion the replacement product may be of equal or greater functionality and may be of either new or like-new quality . Dell SonicW ALL's ob[...]
-
Seite 169
Support Information | 169 "Product" means the SonicW ALL labeled hardw are and related documentation ("Hardware") and/or proprietary SonicW ALL labeled soft war e, firmware and related documentation ("Software") pur chased by the end user of the product either directly from SonicW ALL or a Reseller (“Customer”). ?[...]
-
Seite 170
170 | SRA 7.0 User Guide (d) Evaluation License. If the Sof tware is provided by SonicW ALL or a Reseller at no charge for evaluation purposes, then Secti on 1(a) above shall not apply to such Sof tware and instead Customer is granted a nonproduction License to use such Software and the associated documentation solely for Customer’s own inter nal[...]
-
Seite 171
Support Information | 171 (g) Updates/Upgrades. If Customer purchases or otherwise is eligible to receive a SOFTWARE update or upgrade, you must be properly licensed to use the Product identified by SonicW ALL as being eligible for the update/ upgrade in or der to inst all and use the SOFTW ARE update/ upgrade. A SOFTW ARE update/ upgrade replaces [...]
-
Seite 172
172 | SRA 7.0 User Guide Software is ninety days from the date of registration of the Soft war e Product (or if sooner , seven days after initial delivery/download) of the So f tware Product to/by Customer . SonicWALL does not warrant that use of the Product(s) will be unin terrupted or error free nor that SonicWALL will correct all errors. The Lim[...]
-
Seite 173
Support Information | 173 SONICW ALL FOR SUC H MAINTENANCE SE R VICE OR PRODUCT PURCHASED BY CUSTOMER DURING THE TWEL VE (12) MO NTHS PRECEDING THE CLAIM). CUSTOMER EXPRESSL Y AGREES TO THE ALLOCA TION OF LIABILITY SET FORTH IN THIS SECTION, AND ACKNOWLEDGES THA T WITHOUT ITS AGREEMENT TO THESE LIMIT A TIONS, THE PRICES CHARGED FOR THE PRODUCTS AND[...]
-
Seite 174
174 | SRA 7.0 User Guide c) Severability . If any provision of this Ag reement shall be held by a court of competent jurisdiction to be contrary to law , such prov ision will be enforced to the maximum e xtent permissible and the remaining provis io ns of this Agreement will remain in full force and effect. d) Privacy Policy . Customer hereby ackno[...]