Dell SRA 7.0 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Dell SRA 7.0, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Dell SRA 7.0 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Dell SRA 7.0. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Dell SRA 7.0 should contain:
- informations concerning technical data of Dell SRA 7.0
- name of the manufacturer and a year of construction of the Dell SRA 7.0 item
- rules of operation, control and maintenance of the Dell SRA 7.0 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Dell SRA 7.0 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Dell SRA 7.0, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Dell service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Dell SRA 7.0.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Dell SRA 7.0 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    | 1 SRA 7.0 User Guide[...]

  • Page 2

    2 | SRA 7.0 User Guide Notes, Cautions, and W arnings © 2013 Dell Inc. T rademarks: Dell™, the DELL logo, SonicW ALL™ , SonicW ALL ViewPoint™, Reassembly-Free Deep Packet Inspection™, Dynam ic Security for the Global Network™, SonicW ALL Clean VPN™, SonicW ALL Clean Wireless™, SonicW ALL Global Response Intelligent Defense (GRID) Net[...]

  • Page 3

    Table of Contents | 3 Table of Contents Chapter 1. Using This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 About this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Organization of this Guide . . . . . . . . . . . . . . . . . [...]

  • Page 4

    4 | SRA 7.0 User Guide Installing NetExtender Using the Mozilla Firefox Browser . . . . . . . . . . . . . . . . 28 Installing NetExtender Using the Interne t Explorer Browser . . . . . . . . . . . . . . 30 Installing NetExtender Using the Ch rome Browser . . . . . . . . . . . . . . . . . . . . . . 32 Launching NetExtender Directly f rom Your Comput[...]

  • Page 5

    Table of Contents | 5 Initiating Secure Virtual Assist on a Linux Client . . . . . . . . . . . . . . . . . . . . . . . . 96 Using Secure Virtual Assist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Using Secure Virtual Assist in Unattended Mode . . . . . . . . . . . . . . . . . . . . . . 100 Enabling a Syste[...]

  • Page 6

    6 | SRA 7.0 User Guide[...]

  • Page 7

    Using This Guide | 7 Chapter 1 Using This Guide About this Guide Welcome to the Dell SonicWALL SRA User Guide . It provides information on using the Dell SonicW ALL SRA user portal called V irtual Of fice that allows you to create bookmarks and r un services over the Dell SonicW ALL SRA appliance. Always check http://www .sonicwall.com/us/Support.h[...]

  • Page 8

    8 | SRA 7.0 User Guide Guide Conventions The following conventions used in this guide are as follows: Current Documentation Check the Dell SonicW ALL documentation Web si te for the latest versions of all Dell SonicW ALL product documentation at h ttp://www .sonicwall.com/us/Support.html Quick Access Work Sheet Use the Quick Access Work Sheet to co[...]

  • Page 9

    Virtual Office Overv iew | 9 Chapter 2 Virtual Office Overview This chapter provides an overview of the Dell S onicW ALL SSL VPN user portal. It also includes an introduction to the SRA appliance and its feat ures and applications. This chapter contains the following sections: • “Virtual Of fice Overview” section on p age 9 • “Browser Req[...]

  • Page 10

    10 | SRA 7.0 User Guide The NetExtender standalone applications are automa tically installed on a client system the first time you click the NetExtender link in t he V irtual Of fice portal. The st andalone client can be launched directly from users’ computers without requiring them to log in to the SSL VPN portal first. • Using the SonicW ALL [...]

  • Page 11

    Virtual Office Overview | 11 The following table provides specific browser requirement s. T o configure SonicOS SSL VPN firmware, an Ad ministrator must use a W eb browser with JavaScript, cookies, and SSL enabled. Virtual Assist is fully supported on Windows platfor m s. Virtual Assist is certified to work on Windows 7, Windows V ista an d Windows[...]

  • Page 12

    12 | SRA 7.0 User Guide Web Management Interface Overview From your workstation at your remote location, launch an approved W eb browser and browse to your SRA appliance at the URL provided to you by your network Administrator . Ste p 1 Open a W eb browser and enter http s://192.168.200.1 (the default LAN management IP address) in the Location or A[...]

  • Page 13

    Virtual Office Overview | 13 have Administrator privileges, and login again using the LocalDo main domain. Only the LocalDomain allows Administrator access to the management interfa ce. Also note that the domain is independent of the privileges set up for the user . Logging in as a user takes you directly to V irtual Of fice. The V irtual Office Ho[...]

  • Page 14

    14 | SRA 7.0 User Guide The Home page provides customized content and links to network resources. The Home Page may contain support contact information, VPN instructions, comp any news, or technical updates. Only a Web browser is required to access intranet Web sites, File Shar e s, and FTP sites. VNC, T elnet and SSHv1 require Java. SSHv2 provi de[...]

  • Page 15

    Virtual Office Overview | 15 SonicW ALL NetExtender is a software applicati on th at enables remote users to securely connect to the remote network. Wi th NetExtender , remote users can virtually join the remote network. Users can mount network drives, upload and download files, and access resources in the same way as if they were on the local netw[...]

  • Page 16

    16 | SRA 7.0 User Guide[...]

  • Page 17

    Using Virtual Office Features | 17 Chapter 3 Using Virtual Office Features This chapter provides details on how to use the feature s in the Dell SonicW ALL SSL VPN user portal. This chapter cont ains the following sections: • “Importing Certificates” section on page 17 • “Using T wo-Factor Authentic ation” section on page 17 • “Usin[...]

  • Page 18

    18 | SRA 7.0 User Guide User Prerequisites Before you can log in using two-factor aut hentication, you must meet the following prerequisites: • Y our Administrator has created your user account. • Y ou have an account with a two-factor authent ication server that conforms to the RFC standard. User Configuration Tasks The following sections desc[...]

  • Page 19

    Using Virtual Office Features | 19 Ste p 1 Enter the IP address of the SRA appliance in your computers browser . The authentication window is displayed. Ste p 2 Enter your username in the Username field. Ste p 3 The first time you log in to the V irtual offi ce, your en try in the passwor d field depends on whether your system requires a PIN: – I[...]

  • Page 20

    20 | SRA 7.0 User Guide Enter the PIN in the New PIN field and again in the Confirm PIN field and click OK . The PIN must be between 4 and 8 characters long. Ste p 6 The RSA Authentication Manager verifies that the new PIN is an accept able PIN. If the PIN is accepted, the user is prompted to log in with the new passcode. Waiting for the Next Token[...]

  • Page 21

    Using Virtual Office Features | 21 Logging into the SSL VPN Virtual Office Using VASCO Two-Factor Authentication T o log in to the Dell SonicW A LL SSL VPN Virtual Office using V ASCO two-factor authentication, perform the following step s: Ste p 1 Enter the IP address of the SRA appliance in your computer ’s browser . The authentication window i[...]

  • Page 22

    22 | SRA 7.0 User Guide Ste p 6 Y ou will be prompted to enter additional information, the details of which will depend on the type of RADIUS server used. The ex ample below shows an M.ID RADIUS server , which first prompts you to “Please enter the M.ID PIN.” Enter the PIN in the Challenge field and click OK . Ste p 7 Y ou will then be prompted[...]

  • Page 23

    Using Virtual Office Features | 23 User Configuration Tasks T o use the One-T ime Password feature, per form the following steps: Ste p 1 If you are not logged into the SSL VPN V irtual Office user interface, open a W eb browser and type the Virtual Of fice interface URL in the Location or Address bar and press Enter . T ype in your user name in th[...]

  • Page 24

    24 | SRA 7.0 User Guide Verifying User One-Time Password Configuration If you are successfully logged in to V irtual Of fice, you have correctly used the One-T ime Password feature. If you cannot login using the One-T ime Password feature, verify the following: • Are you able to login to the V irtual Office wi thout being prompted to c heck your [...]

  • Page 25

    Using NetExtender | 25 Chapter 4 Using NetExtender This chapter explains how to configure and use Dell SonicW ALL NetExtender and includes the following sections: • “User Prerequisites” section on p age 25 • “User Configuration T asks” section on p age 27 • “V erifying NetExtender Operation from the System Tray” section on p age 4[...]

  • Page 26

    26 | SRA 7.0 User Guide Prerequisites for Linux Clients: Linux 32-bit or 64-bit client s are supported for NetExtender when running one of the following distributions (32- bit or 64-bit): • Linux Fedora Core 15 or higher , Ubuntu 1 1.10 or higher , or OpenSUSE 10.3 or higher • Java 1.5 and higher is requir ed for using the NetExtender GUI. The [...]

  • Page 27

    Using NetExtender | 27 Prerequisites for Android Smartphone Clients The NetExtender Android client is supported on rooted smartpho nes running the following versions of the Andr oid operating system: • 1.6 or higher The NetExtender Android client is compatible with any Dell SonicW ALL SSL VPN firmware version that supports the NetExt ender Linux [...]

  • Page 28

    28 | SRA 7.0 User Guide • “Using the NetExtender Command Line Interface” section on page 47 MacOS Platform • “Installing NetExtender on MacOS” section on page 48 • “Using NetExtender on MacOS” section on p age 50 Linux Platform • “Installing NetExtender on Linux” section on page 51 • “Using NetExtender on Linux” sectio[...]

  • Page 29

    Using NetExtender | 29 Ste p 4 Click the Install button. The portal will automatically inst all the NetExtender stand-alone application on your computer . If an older versi on of NetExtender is inst alled on the computer , the NetExtender launcher removes the old version and inst alls the new version. Ste p 5 Once the NetExtender application is ins[...]

  • Page 30

    30 | SRA 7.0 User Guide Closing the window (clicking the x icon in the upper right corner of the window) does not close the NetExtender session, but mini mizes it to the system tray for continued operation. Also, a balloon icon in the system tray appears, indica ting NetExtender has successfully inst alled. Ste p 7 The NetExtender icon is displayed[...]

  • Page 31

    Using NetExtender | 31 Ste p 4 Enter the URL or domain name of your SSL VPN server in the Add this Web site to the zone field and click Add . Ste p 5 Click Ok in the T rusted Sites and Internet Options win dows. Installing NetExtender fr om Internet Explorer T o install and launch NetExtender for the first time using the Internet Explorer browser ,[...]

  • Page 32

    32 | SRA 7.0 User Guide If an older version of NetExtender is inst alle d on the computer , the NetExtender launcher will remove the old version and t hen inst all the new version. Ste p 7 When NetExtender completes inst alling, the NetExtender St atus window displays, indicating that NetExtender successfully connected. The information provided in [...]

  • Page 33

    Using NetExtender | 33 Ste p 4 Return to the SSL VPN portal and click the NetExtender button. The portal will automatically install the NetExtender sta nd-alone application on your computer . The NetExtender inst aller window opens. If an older version of NetExtender is inst alle d on the computer , the NetExtender launcher will remove the old vers[...]

  • Page 34

    34 | SRA 7.0 User Guide Ste p 3 The IP address of the last SSL VPN se rver you connected to is displayed in the SSL VPN Server field. T o display a list of recent SSL VP N servers you have connected to, click the arrow . Ste p 4 Enter your username and password. Ste p 5 The last domain you connected to is displayed in the Domain field. Note The Net[...]

  • Page 35

    Using NetExtender | 35 Configuring NetExtender Properties Complete the following procedure to configure NetExtender properties: Ste p 1 Right click the icon in the system tray and click Properties... The NetExtender Properties window is displayed. Ste p 2 The Connection Profiles tab displays the SSL VPN connec tion profiles you have used, including[...]

  • Page 36

    36 | SRA 7.0 User Guide Ste p 6 T o have NetExtender launch when you log in to your computer , check the Automatically st art NetExtender UI . NetExtender will st art, but will only be displayed in the system tray . T o have the NetExtender log-in window display , check the Display NetExtender UI check box. Ste p 7 Select Minimize to the tray icon [...]

  • Page 37

    Using NetExtender | 37 Configuring NetExtender Connection Scripts Dell SonicW ALL SSL VPN provid es users with the ability to run batch file scripts when NetExtender connects and disconnect s. The scrip ts can be used to map or disconnect network drives and printers, launch applications, or open fi les or W eb sites. T o configure NetExtender Conne[...]

  • Page 38

    38 | SRA 7.0 User Guide Configuring Batch File Commands NetExtender Connection Script s can support any valid batch file commands. For more information on batch files, s ee the following Wikipedia entry: http://en.wikipedia.org/wiki/.bat . The following t asks provide an introduction to some commonly used batch file commands. Ste p 1 T o configure [...]

  • Page 39

    Using NetExtender | 39 Configuring Proxy Settings Dell SonicW ALL SSL VPN support s NetExtender sessions using proxy configurations. Currently , only HTTPS proxy is supported. When launching NetExtender from the Web portal, if your browser is already c onfigured for proxy access, NetExt ender automatically inherits the proxy settings. T o manually [...]

  • Page 40

    40 | SRA 7.0 User Guide Configuring NetExtender Log Properties Within the NetExtender Proper ties dialog box , click the Log heading in the menu on the left panel. The available options provide basic control over the NetExtender Log and Debug Log. Ste p 1 T o establish the size of the Ne tExtender Log, select either the Unlimited log file size radi[...]

  • Page 41

    Using NetExtender | 41 Configuring NetExtender Advanced Properties Within the NetExtender Proper ties dialog box, click the Advanced heading in the menu on the left p anel. The available options allow you to adjust advanced settings on NetExtender network properties and protocols. NetExtender allows users to customize the link speed that the NetExt[...]

  • Page 42

    42 | SRA 7.0 User Guide Configuring NetExtender Packet Capture Properties Within the NetExtender Proper ties dialog box , click the Packet Capture heading in the menu on the left p anel. The availabl e options allow you to enable and disable packet capture and dat a compression on NetExtender . Note Y ou must have Administrator privileges to change[...]

  • Page 43

    Using NetExtender | 43 Viewing the NetExtender Log The NetExtender log displays information on NetE xtender session event s. The log is a file named NetExtender .dbg . It is stored in the directory: C:Program FilesSonicWALLSSL VPNNetExtender . T o view the NetExtender log, ri ght click the NetExtender icon in the system tray , and click View Lo[...]

  • Page 44

    44 | SRA 7.0 User Guide T o view the Debug Log, either click the Debug Log icon or go to Log > Debug Log . Note It may t ake several minutes for the D ebug Log to load. During this time, the Log window will not be accessible, although you can open a new Log window while the Debug Log is loading. T o clear the log, click Log > Clear Log . Disc[...]

  • Page 45

    Using NetExtender | 45 Authentication Methods NetExtender supports various two factor authentic ation methods, including one-time p a ssword, RSA, and V asco. If an Administrator has c onfigured one-time passwords to be required to connect through NetExtender , you will be asked to provide this information before connecting. If an Administrator has[...]

  • Page 46

    46 | SRA 7.0 User Guide Uninstalling NetExtender The NetExtender utility is automatically insta lled on your computer . T o remove NetExtender , click St art > All Programs , click Dell SonicW AL L NetExtender , and then click Unins tall . Y ou can also configure NetExtender to autom atically uninstall w hen your session is disconnected. T o do [...]

  • Page 47

    Using NetExtender | 47 Using the NetExtender Co mmand Line Interface Note The NetExtender command line interface is only available on Windows platforms. T o launch the NetExtender CLI, perform the following t asks: Ste p 1 Launch the Windows Command Prompt by going to the Start menu, select Run , enter cmd , and click OK . Ste p 2 Change directory [...]

  • Page 48

    48 | SRA 7.0 User Guide Installing NetExtender on MacOS Dell SonicW ALL SSL VPN support s NetExt ender on MacOS. T o use NetExtender on your MacOS system, your system must meet the following prerequisites: • Mac OS 10.6 and higher • Java 1.5 and higher • Both PowerPC and Intel Macs are supported. T o install NetExtender on your MacOS system, [...]

  • Page 49

    Using NetExtender | 49 Ste p 3 The Virtual Of fice displays the status of NetExtender inst allation. A pop-up window may appear , prompting you to accept a certificate. Click Tr u s t . Ste p 4 A second pop-up window may appear , prompting you to accept a ce rtificate. Click Tr u s t . Ste p 5 When NetExtender is successfully inst alled and connect[...]

  • Page 50

    50 | SRA 7.0 User Guide Using NetExtender on MacOS Ste p 1 T o launch NetExtender , go the Ap plications folder in the Finder and double-click NetExtender .app . Ste p 2 The first time you connect, yo u must enter the Dell SonicW ALL SSL VPN server name in the SSL VPN Server field. Ste p 3 Enter your username and password. Ste p 4 The first time yo[...]

  • Page 51

    Using NetExtender | 51 Step 10 T o view the NetExtender Log, go to Window > Log . Ste p 11 T o generate a diagnostic report with detailed information on NetExtender performance, go to Help > Generate diagnostic report . Step 12 Click Save to save the diagnostic report using the default nx diag.txt file name in your NetExtender directory . Ins[...]

  • Page 52

    52 | SRA 7.0 User Guide T o install NetExtender on your Linux system, perform the following tasks: Ste p 1 Log in to the Dell SonicW ALL Virtual Of fice. Ste p 2 Click the NetExtender button. A pop-up window indicate s that you have chosen to open a .tgz file. Clic k OK to save it to your default download directory . Note Y ou must be logged in as [...]

  • Page 53

    Using NetExtender | 53 Ste p 5 Enter su -C “ ./ins tal l” to inst all NetExtender . Ste p 6 Enter your system password. Ste p 7 The installer will ask if you want non-root us ers to be able to r un NetExtender . Enter either y for yes or n for no. Note T o allow non-root users to run NetExtender , t he installer will set PPPD to run as root. Th[...]

  • Page 54

    54 | SRA 7.0 User Guide Ste p 2 The first time you connect, yo u must enter the Dell SonicW ALL SSL VPN server name in the SSL VPN Server field. NetExtender will remember the server name in the future. Ste p 3 Enter your username and password. Ste p 4 The first time you connec t, you must enter the domain name. The domain name is case- sensitive. N[...]

  • Page 55

    Using NetExtender | 55 Ste p 6 T o view the NetExtender DNS server information, select the DNS tab in the main NetExtender window . Ste p 7 T o configure NetExtender Preferences, select NetExtender > Preferences . Ste p 8 The following NetExtender settings can be configure d: • Automatically reconnect when the connection is terminated • Unin[...]

  • Page 56

    56 | SRA 7.0 User Guide • PPP Sync Mode - S pecifies synchronous PPP . By default, this opt ion is disabled and asynchronous PPP is used. Step 10 T o view the NetExtender Log, go to NetExtender > Log . Ste p 11 T o generate a diagnostic report with detailed information on NetExtender performance, go to Help > Generate diagnostic report . St[...]

  • Page 57

    Using NetExtender | 57 NetExtender supports the following Windows Mobile plat forms: • Windows Mobile 5 PocketPC version • Windows Mobile 6 Professional/Classic version Note Windows Mobile 5 Smart Phone version and Windows Mobile 6 S tandard version are not currently supported. T o use NetExtender on your Windows Mobile device, perform the foll[...]

  • Page 58

    58 | SRA 7.0 User Guide Ste p 11 Click the Menu button to see the NetExtender properties menu. Step 12 Select the Sent & Received menu t ab to adjust the metric us ed for sent and received statistics on the status window . Select the Throughput menu tab to adjust the throughput measurement displayed on the status window . Step 13 T o configure [...]

  • Page 59

    Using NetExtender | 59 – Hide NetExtender when closing window - Hides NetExtender when you click the ok button. – Display precise number in status - Displays the exact numbers of sent and receive data. – Automatically est ablish the underlying connection - Uses the Windows Mobile Connection Manager to establis h the device’ s connection to [...]

  • Page 60

    60 | SRA 7.0 User Guide Passwords in NetExtender Mobile NetExtender Mobile supports the ability for users to change passwords. Also, if configured by an Administrator , users can be alerted that the th eir password is scheduled to expire soon. If a user must change their password, a screen prompt will ask for the user’s old password, along with a[...]

  • Page 61

    Using NetExtender | 61 The following features are not supported or not applicable on NetExtender Android in Dell SonicW ALL SSL VPN: • Automatic connection of NetE xtender before Windows login • Automatic proxy support and Internet Explorer proxy synchronization • Connection scripts • IPv6 support • Client certificate support • Exit cli[...]

  • Page 62

    62 | SRA 7.0 User Guide Ste p 8 T ap USB connected to connect to the computer . T he next screen shows the connection. Ste p 9 T ap T urn on USB storage to prep are for copying the apk installer to the Android smartphone. Step 10 On the computer , copy the apk file to the Android SD card. Ste p 11 Unmount the Android SD card from your com puter . O[...]

  • Page 63

    Using NetExtender | 63 Step 14 Using the file browser , locate the apk file and run it to inst all NetExtender Android. Af ter installation, the NetExtender icon appears on the applications p age of the smartphone. Using NetExtender on Android Smartphones Instructions for using NetExtender on your A ndroid smartphone are available in the following [...]

  • Page 64

    64 | SRA 7.0 User Guide Connecting to NetExtender T o launch NetExtender on your An droid smar tphone and connect to t he network through th e Dell SonicW ALL SRA appliance, per form the following steps: Ste p 1 On your Android smartphone, start NetExt ender by t apping the appl ication icon. The NetExtender connection options screen displays. Ente[...]

  • Page 65

    Using NetExtender | 65 After a successful connection, the enter ed values are saved as a profile that you can select when starting NetExtender . NetExtender saves the information in a secure file on the smartphone. Ste p 4 If One T ime Password is enabled on the Dell SonicW ALL SRA appli ance, the One T ime Password prompt is displayed. Enter the t[...]

  • Page 66

    66 | SRA 7.0 User Guide If no PIN has yet been configured, or if the Ad ministrator has reset t he account, the following screen asks if the system should generate a new PIN. T o allow the system to generate it, tap Ye s . T o type in a PIN yourself, tap No and skip to S tep 7 . Ste p 6 If you chose to allow the system to generate t he PIN, the dis[...]

  • Page 67

    Using NetExtender | 67 Ste p 8 After entering the PIN or creating a new PIN, the T w o Factor Authentication process requires you to enter the token code shown on your tok en device. W a it for the token code to change on the device, and then type the code into the field on your smartphone and tap OK . Ste p 9 If a proxy server is configured in the[...]

  • Page 68

    68 | SRA 7.0 User Guide Ste p 11 If the NetExtender service running on the smar tphone has a problem or has stopped running, the following screen is displayed. T ap Exit to quit the application. Y ou may need to restart the service, possibly by turning the phone of f and on again, or you may need to re-install NetExtender . Exiting or Disconnecting[...]

  • Page 69

    Using NetExtender | 69 Ste p 2 In the NetExtender user interface, tap the Disconnect button and tap OK to confirm. NetExtender notifies you while disconnecting. Checking Status, Routes, and DNS Settings While NetExtender is connected, you can view st atus information, routes, and DNS settings on your smartphone. Ste p 1 T o open the NetExtender use[...]

  • Page 70

    70 | SRA 7.0 User Guide Ste p 2 T o view status information , tap the Stat us tab. Y ou can tap on the Sent , Received , or Throughput fields to change the unit s between bytes and packets. If you are connected to a Dell SonicW ALL SRA appliance running 5.0 or higher , and you have an Active Direct ory account, the User field contains your display [...]

  • Page 71

    Using NetExtender | 71 Ste p 4 T o view the configured DNS servers, t ap the DNS t ab. NetExtender Android supports DNS only; WI NS or DNS suffix are no t supported. Configuring Profiles, Prefer ences, and Proxy Servers T o configure NetExtender profiles and preferences, including proxy servers, on your Android smartphone, perform the following ste[...]

  • Page 72

    72 | SRA 7.0 User Guide Ste p 3 T o display the Remove selected , Remove all , and Close options on this NetExtender Profiles screen, press the options button while on the screen. Ste p 4 T ap Remove selected to remove the profiles that have check marks next to them. Ste p 5 T ap Remove all to remove all profiles from the smartphone. Ste p 6 T ap C[...]

  • Page 73

    Using NetExtender | 73 EXPORT LOG Step 12 T o export the log file of NetExt ender Android activity , select the Export Log option and enter the requested information. ABOUT Step 13 T o view NetExtender versi on information, select the About option. PREFERENCES / PROXY SETTINGS Step 14 T o configure NetExtender preferences including proxy and notifi[...]

  • Page 74

    74 | SRA 7.0 User Guide Step 17 After selecting the Use Proxy check box, tap Proxy settings to open the configuration screen for the proxy server . Step 18 T ype the IP address of the proxy server into the Server field. T ype the port number of the port that the server listens on into the Port field. This field displays “8080” by default, b ut [...]

  • Page 75

    Using NetExtender | 75 Changing Your Password T o change your password when prompted by NetExtender , perform the following steps: Ste p 1 After connecting, a p assword expiration notice may be displayed on your Android smartphone. T ap Ye s to change your password, or No to delay until a later time . NetExtender will remind you each time you conne[...]

  • Page 76

    76 | SRA 7.0 User Guide Ste p 3 If your password expires befo re you change it, the Change password screen is displayed when you connect, with the message “Login fa iled – you must change your passwo rd.” T ype your old password into the Current Password field, then type a new password into the New p assword field and again into the Ty p e i [...]

  • Page 77

    Using Secure Virtual Assist | 77 Chapter 5 Using Secure Virtual Assist Secure Virtual Assist provides remote assist ance and virtual meeting cap abilities. Secure Virtual Assist is an easy to use tool that allows Dell SonicW ALL SSL VPN use rs to remotely support customers by taking control of their co mputers while the customer observes. Secure Vi[...]

  • Page 78

    78 | SRA 7.0 User Guide 3. The customer requests assist ance by one of these methods: – Logs into the Dell SonicW ALL SSL VPN V irtual Office an d clicks on the Virtual Assist link. – Receives an email invitation from the T echni cian and clicks on the link to launch Virtual Assist. – Navigate directly to the URL of the V irtual Assist home p[...]

  • Page 79

    Using Secure Virtual Assist | 79 Configuring Secure Vi rtual Assist Settings The Secure V irtual Assist Settings window can be access ed either by clicking the Settings button in the top left corner of the application window or by right-clicki ng on the V irtual Assist icon in the taskbar and selecting Settings . The Virtual Assist Settings window [...]

  • Page 80

    80 | SRA 7.0 User Guide • Connection Profiles - Displays all of the V i rtual As sist connection profiles that have been used on this computer . T o remove a profile, select it and click the Remove button. • Connection Settings - Allows users to customize how they are identified in Vi rtual Assist and the default settings of V irt ual Assist cu[...]

  • Page 81

    Using Secure Virtual Assist | 81 Selecting a Secure Virtual Assist Mode When you first launch Secure Virtual Assist, by de fault it will be in customer mode. T o change the mode, perform the following step s. Ste p 1 Click Change Mode to select one of four possible modes. Ste p 2 Select one of the following fou r Virtual Assist modes: • Customer [...]

  • Page 82

    82 | SRA 7.0 User Guide Ste p 2 In the Server drop-down menu, select the IP address or domain name of the Dell SonicW ALL SRA appliance. Ste p 3 Enter the Username and Password for the T echnician account on the appliance. Ste p 4 Click Login .The Select Domain window displays. Ste p 5 Select the Domain that the username is configured for and click[...]

  • Page 83

    Using Secure Virtual Assist | 83 Performing Secure Virtual Assist Technician Tasks T o get started , the T echnician logs into the Dell SonicWALL SRA app liance and launches the Secure Virtual Assist application. Note Each T echnician can only assist one customer at a time. By default, the V irtual Assist window launches with the V irtual Assist to[...]

  • Page 84

    84 | SRA 7.0 User Guide Assisting Customers A pop-up window in the bottom right t ask bar aler ts the T echnician when a customer is in the assistance queue. The customer queue is also displayed in the Service window . Ste p 1 Double-click a customer ’s user nam e to begin assisting the customer . Note Return a customer to the queue by right-cli [...]

  • Page 85

    Using Secure Virtual Assist | 85 The T echnician now has complete control of the customer’s keyboard and mouse. The customer can see all of the actions that the T echnician performs. During a V irtual Assist session, the customer is not locked out of their compu ter . Both the T echnician and customer can control the com puter , although this may[...]

  • Page 86

    86 | SRA 7.0 User Guide • Record - Records the Virtual As sist session in a .wmv file that can be shared with other customers. The file is automatically named with the user name and the date and time the recording was started (for example, Sue_EST_2013-2-12_09h47m43s.wmv). The file location can be set on the Connection Settings window . • Syste[...]

  • Page 87

    Using Secure Virtual Assist | 87 • Request Full Control - T echnicians can request full c ontrol of a customer ’s desktop, allowing them to reboot the system, delete file s, or over-write files on the customer ’s computer without the customer being repeat edly prompted for permission. Select Request Full Control under the Commands menu to i s[...]

  • Page 88

    88 | SRA 7.0 User Guide Viewing Secure Virtual Assist Session Log The Secure Virtual Assist Session Log window can be display ed by clicking the Logging button in the T askbar . The log displays a history of timest amped events for the session, such as opening Chat or File T ransfer , requesting Full Control, etc. Using the Secure Virtua l Assist F[...]

  • Page 89

    Using Secure Virtual Assist | 89 Note When deleting or overwriting files, the customer is warned and must give the T echnician permission unless t he T echnician has clicked the Request Full Control button and the customer has confirmed. • New folder creates a new folder in the selected directory . • Rename renames the selected file or director[...]

  • Page 90

    90 | SRA 7.0 User Guide • The login page of your V irtual Office may incl ude a direct link to Virtual Assist as shown below . • Login to the Virtual Of fice and click the Request Assist ance button. • If Secure Virtual Assist has already been install ed, select the Secure V i rtual Assist shortcut from the Programs list under Window’s st a[...]

  • Page 91

    Using Secure Virtual Assist | 91 Ste p 4 Y ou can launch Virtual Assist either from the Vi rtual Office window or from a shortcut that is added to your Programs list under Window’s st art button. If the Server address is not auto- propagated in the login window , enter the Server address. The server address can be either an IP address, IPv6 addre[...]

  • Page 92

    92 | SRA 7.0 User Guide After selecting a port al, a certificate prom pt appears, followed by an assistance code and/or disclaimer if configur ed by the Administrator . Ste p 9 A pop-up window indicates that you are in the Virtual Assist queue. T he T echnician will be alerted that you are ready . Click Cancel to cancel the V irtual Assist request.[...]

  • Page 93

    Using Secure Virtual Assist | 93 Ste p 11 When the T echnician initiates the session, the V i rtual Assist toolbar appears in the bo ttom right of your screen. The T echnician now has control of your computer . Step 12 For information on using V irtual Assist once the session is active, see “Using Secure V irtual Assist” section on page 99 . In[...]

  • Page 94

    94 | SRA 7.0 User Guide Ste p 2 The first time you launch Vi rtual Assist, you will be p rompted to allow the Secure V irtual Assist applet to be inst alled on your computer . Click Allow . Ste p 3 The Secure V irtual Assist client installs and launches. In the future, you can either launch Virtual Assist either by navigat ing to the Virtual Of fic[...]

  • Page 95

    Using Secure Virtual Assist | 95 Ste p 6 Y ou may be prompted to enter an Assist ance Code . Ste p 7 If prompted to read and acc ept a disclaimer , click OK . Ste p 8 A pop-up window indicates that you are in the Virtual Assist queue. T he T echnician will be alerted that you are ready . Click Cancel to cancel the V irtual Assist request. Ste p 9 T[...]

  • Page 96

    96 | SRA 7.0 User Guide Initiating Secure Virtual Assist on a Linux Client Note Dell SonicW ALL Secure V irtual Assist is fully tested on the Ubuntu di stribution of Linux. It has not been tested on other Linux distributions. T o launch a V irtual Assist customer session to request help on your Linux computer , perform the following steps: Ste p 1 [...]

  • Page 97

    Using Secure Virtual Assist | 97 Ste p 3 Optionally , you can enter your name and a summary of your issue and click Request Support . Y ou will then be prompted to install the Secure Vi rtual Assist client. Af ter the installation is complete, the Secure Virtual Assist client will launch automatically . Ste p 4 Y ou can now launch Virtual Assist ei[...]

  • Page 98

    98 | SRA 7.0 User Guide Ste p 7 Y ou may be prompted to enter an Assist ance Code . Ste p 8 If prompted to read and acc ept a disclaimer , click OK . Ste p 9 A pop-up window indicates that you are in the Virtual Assist queue. T he T echnician will be alerted that you are ready . Click Cancel to cancel the V irtual Assist request. Step 10 The Virtua[...]

  • Page 99

    Using Secure Virtual Assist | 99 Ste p 11 When the T echnician initiates the session, the V i rtual Assist toolbar appears in the bo ttom right of your screen. The T echnician now has control of your computer . Step 12 For information on using V irtual Assist once the session is active, see “Using Secure V irtual Assist” section on page 99 . Us[...]

  • Page 100

    100 | SRA 7.0 User Guide • Tr u s t e d - The T echnician has complete control of the customer ’s computer . T o toggle between T rusted mode and Active mode, enter Ctrl-Alt-T . Note By default, Virtual Assist sessions are launc hed in T rusted mode. T o modify this mode: 1. Click the Settings button on the top lef t corner of the window . 2. S[...]

  • Page 101

    Using Secure Virtual Assist | 101 Ste p 4 Enter a Password and click Login . The W aiting window displays and shows the length of time you have been in the queue. Ste p 5 Y ou need to provide the T echnician with the password you just def ined. An easy way to do this is to click Add Information and give the T echnician your password. Enabling a Sys[...]

  • Page 102

    102 | SRA 7.0 User Guide • Computer Name: This is an identifier for the system to help dif ferentiate between other systems that may be waiting for support in the queue. This name will appear as a bookmark name in the user port al of the owner . • Owner Name: This name must be a valid SRA appliance user name. • Key: This is a key the T echnic[...]

  • Page 103

    Using Secure Virtual Assist | 103 T o enable W ake on Lan: Ste p 1 Configure W ake on Lan in the client PC BIOS by selecting the W ake-on-LAN option. Ste p 2 Configure W ake on Lan in the client PC Device Manager: 1. Open Device Manager by right-clicking the Co mputer icon on the client PC desktop, selecting Properties from the drop-down list, and [...]

  • Page 104

    104 | SRA 7.0 User Guide Ending Secure Virtual Access Mode Disconnecting from a Secure V irtual Access sess ion will place the system back in the support queue for later access by the T echnician. From the personal system-side, the user/T echnician may uninstall or terminate the applic ation from the tray option icons. An Administrator can forcibly[...]

  • Page 105

    Using Secure Virtual Assist | 105 • Assist ant (Coordinator-designated Assi stant) - The Coordinator se lect s an Assist ant fr om the list of available Participant s and assigns the Assist ant privileges. W h e n t h e C o o r d i n a t o r exits the meeting , th e Assist an t auto m at ic ally becom e s the Coor di na tor. A me et ing may hav e[...]

  • Page 106

    106 | SRA 7.0 User Guide Coordinator Role The Virtual Meetin g Coordinator performs the following t asks: Logging In A Participant can join a V irtual M eeting by clicking a link in the email invite or by logging into the Virtual Meeting client if t he Administrator has enabled Join Without an Invitation on the AMC Secure Virtual Meeting > Setti[...]

  • Page 107

    Using Secure Virtual Assist | 107 The meeting application can alternatively be acce ssed directly from the V irtual Office on an SRA 4600, SRA 4200, and V irtual Appliance. A Domains drop-down list is displayed if the user belongs to multiple domains, and a Port als drop-down list is shown if V irtual Meeting is enabled on multiple portals. Otherwi[...]

  • Page 108

    108 | SRA 7.0 User Guide T o create a meeting, click the Create button to display the meeting creation interface. T o set up a meeting enter a Meeting Name , Meeting Code , S tarting Dat e and Tim e , and Ending Date and Tim e . The meeting code will be entered by al l Particip ants wishing to join the meeting. If you want to invite attendees and t[...]

  • Page 109

    Using Secure Virtual Assist | 109 After you create a meeting, you enter the meeting’ s lobby automatically . When a meeting is scheduled for a late r time, the Coordinator exit s the m eeting and returns to the lobby at the meeti ng start time. If the Allow startin g meetin g without meeting creator setting is disabled and the Coordinator has not[...]

  • Page 110

    110 | SRA 7.0 User Guide Performing Lobby Functions The following functions can be performed fr om the lobby by clicking buttons at the top: Clicking the St art Meeting button start s the meeting. Only the Coordinator and Assistant can st art a meeting. When a meeting is started, the St art Meeting button changes to the S top Meeting button. Clicki[...]

  • Page 111

    Using Secure Virtual Assist | 111 Controlling Roles The Coordinator and Assist ant can change a meet ing member ’s role by right clicking the meeting member ’s name and selecting a role from the drop-down menu. The following options may appear , depending on permissions and the meeting member ’s current role. . Option User Description Pass Ke[...]

  • Page 112

    112 | SRA 7.0 User Guide Revising Meeting Settings Proxy Settings For setups that require a proxy , click the Settings tab in the Virtual Meeting window , and check the Enable Proxy Settings check box. Enter the proper information to utilize the prox y or click the Internet Explorer proxy settings button to automatically import the proxy settings u[...]

  • Page 113

    Using Secure Virtual Assist | 113 General Settings The General Settings tab is used to select the location where recordings will be save d, select the V oice Transmission met hod, and enable or disable the Participant Mark feature. T o change the default settings: • Click the Browse button and select the lo cation where you want to save meeting r[...]

  • Page 114

    114 | SRA 7.0 User Guide Logging Actions and Messages The Log Viewer displays all event log dat a, wh ich includes actions t aken during a meeting and any errors that occur . The Log helps you keep tr ack of events that occu r in a meeting and shows all actions performed by meeting Par ticipants. Use the error and warning events in the log to take [...]

  • Page 115

    Using Secure Virtual Assist | 115 The Lobby button is available for all meeting me mbers, including Vi ew-only Participant s. If the lobby is hidden during a m eeting, it displays the lobby window when the Host is sharing the screen. The Options button opens the Meeting Settings window described in “Revising Meeting Settings” on page 1 12 and i[...]

  • Page 116

    116 | SRA 7.0 User Guide White Board displays a white board and is also displayed on the Lobby toolbar . See “Using a White Board” on page 1 19 for additional information. Annotation allows an y meeting Participant to add text, object s, and highlighting to a white board using the white board toolbar , as described in “Using a White Board” [...]

  • Page 117

    Using Secure Virtual Assist | 117 T o invite someone to a Vi rtual Meeting, enter the email address and click Invite . Additional fields are optional. Invited users rece ive an email similar to the following: After receiving the email in vita tion, attendees click the link in the email, which accesses the appliance to join the meeting. If the Secur[...]

  • Page 118

    118 | SRA 7.0 User Guide Create new questions by clicking t he and buttons. There are three question types: • Multiple choice (single answer) • Multiple choice (multiple answer) • Short answer Use the buttons at the top of the window to: The Open Virtual Meeting Poll Files button opens any saved polling questions an d possible answers. The Sa[...]

  • Page 119

    Using Secure Virtual Assist | 119 Polling feedback wind ow Feedback from the poll is returned to the poll initiator when a nswers are submitted and when the End Polling button is clicked. The collected feedbac k is displayed as shown below . Click the green bar to display det ai led information for each answer . Using a White Board The Host can sha[...]

  • Page 120

    120 | SRA 7.0 User Guide Rect angle tool draws a rectangle. The rect angle edge colo r (default black), fill color (default transparent), and edge weight (1- 100pt, default 5pt ) are configurable with the Customization tools. Ellip se tool draws an ellip se on the white board. T he ellipse color (default black), fill color (default transparent), an[...]

  • Page 121

    Using Secure Virtual Assist | 121 T o share a file, select File > Select File from the menu on the Sharing File window and select the file. By default, the file will be shared with a ll meeting Particip ants. T o share the file with specific meeting Participants select Customize . Next, click Publish to notify Participants th at a file is availa[...]

  • Page 122

    122 | SRA 7.0 User Guide Text Chatting Chat with all attendees in the meeting or hav e a private chat with one or more selected attendees, including View-only Participant s. If the lobby is hidden, click on the control menu once the meeting has started and the Host is sharing the screen. The chat window is displayed in a stand-alone chat window . R[...]

  • Page 123

    Using Secure Virtual Assist | 123 Login Participant s click the link from the meeting email invitation or type the server name or IP address in the Server field of the Secure V irtual Meeting window . If necessary , select the proper meeting por t al. All available m eetings are displayed. Select the meeting to join and click the Join button. The f[...]

  • Page 124

    124 | SRA 7.0 User Guide Enter the meeting code that was pr ovided in the meeting email invitation and click the OK button to join the meeting. After joining t he meeting, you will be in the meeti ng lobby .[...]

  • Page 125

    Using File Shares | 125 Chapter 6 Using File Shares File shares provide remote users with a secure Java applet or HTML-based interface to Microsoft File Shares using the CIFS (Common Internet File System) or SMB (Se rver Message Block) protocols. Using a Web interface simila r in style to Microsoft’ s familiar Network Neighborhood or My Network P[...]

  • Page 126

    126 | SRA 7.0 User Guide Configuration Overview The SSL VPN File Shares Applet is easy and intuitive to use. User should be aware of its functions and limitations . Setting up bookmarks and the browser interface are covered in this section, along with an overview of the browser and sample use cases. This section contains t he following subsections:[...]

  • Page 127

    Using File Shares | 127 Ste p 4 The Add Bookmark screen displays. Enter a friendly name for the bookmark in the Bookmark Name field. Ste p 5 Enter the IP address and file director y path to the File Share in the N a me o r I P Ad d r e s s field. Note When using the Java applet, the Name or IP Address field m ust be to a file directory and end with[...]

  • Page 128

    128 | SRA 7.0 User Guide Using the Java File Shares Applet While loading the browser interf ace, warning messages might display . These messages will look dif ferent for different browsers. For the pur pose of these examples, Internet Explorer 6.0 was used. Ste p 1 If you are not logged into the SSL VPN V irtual Office user interface, open a W eb b[...]

  • Page 129

    Using File Shares | 129 The File Shares Applet displays. Note The File Shares Applet window will not automatically refresh when its content s have changed or if it has been previously viewed. T o refresh, click the Refresh icon from the toolbar , or use the Refresh option from the right-click menu. Note The remote networ k can be browsed from the r[...]

  • Page 130

    130 | SRA 7.0 User Guide Ste p 7 Double-click a file to launch it with the proper applic ation. If activating a file on the remote machine, the File Shares Applet will first do wnload the file to a temporary folder on your machine and then open it. The File Shares Applet will not always be able to delete the tempor ary file after use. Use caution w[...]

  • Page 131

    Using File Shares | 131 Configuration Examples The following configuration examples provide a demonstration of the us efulness and flexibility of the File Shares Applet. • Configuring Bookmarks from Within the File Shares Applet, p age 131 • Using Bookmarks from Within t he File Shares Applet, p age 133 • Moving Files and Folders, page 133 ?[...]

  • Page 132

    132 | SRA 7.0 User Guide Ste p 5 T o set a bookmark to the current directory , right-click in an empty location in the remote directory and select Add Bookmark . Note T o set a bookmark for a specific file or folder , select it prior to selecting Add Bookmark from the right-click menu. Ste p 6 Enter a name for the new bookmark in the New Bookmark w[...]

  • Page 133

    Using File Shares | 133 Using Bookmarks from With in the File Shares Applet In Addition to accessing bookmarks from the Vi rtual Of fice portal, boo kmarks can be easily accessed from within the File Shares Applet. Ste p 1 Launch the File Shares A pplet by clicking on the File Shares button in the Virtual Of fice portal. Ste p 2 Click the Bookmarks[...]

  • Page 134

    134 | SRA 7.0 User Guide Warning The File Shares Applet will completely delete t he file or folder from the remote machine. In the case of a folder , nested items will also be deleted. These items will not be sent to the recycle bin on either machine and are not recoverable. Ste p 6 Once the file or folder has been deleted, the File Shares Applet w[...]

  • Page 135

    Using File Shares | 135 Ste p 1 Launch the File Shares Applet by clicking on a bookmark in the Virtual Of fice portal. Ste p 2 Right click the file and select Properties . The file’ s properties will be displayed in a separate window . Ste p 3 T o open the file, double-click the file. Alternativ ely , create a bookmark to it, and launch the file [...]

  • Page 136

    136 | SRA 7.0 User Guide Using HTML-Based File Shares File shares provide remote users with a secure Web interface to Microsof t File Shares using the CIFS (Common Internet File System) or SMB (Server Message Block) protocols. Using a Web interface similar in style to Microsof t’ s familiar Network Neighborhood or My Network Places, File Shares a[...]

  • Page 137

    Using File Shares | 137 Ste p 5 T ype a valid username in the User Name field and a valid p assword in the Password field and click Login . Ste p 6 Virtual Of fice displays the home File Share scr een that you have specif ied, displaying folders on the network to which you can navigate.[...]

  • Page 138

    138 | SRA 7.0 User Guide The following t able describes the controls at the top of the File Share window . Ste p 7 Y ou can now navigate the folders and files in the File S hare as you would through Windows Explorer or other file management systems. Ste p 8 T o add a new folder in the current File Shar e location, type the name of the folder in the[...]

  • Page 139

    Managing Bookmarks | 139 Chapter 7 Managing Bookmarks Bookmarks are objects that enabl e you to connect to a location or application conveniently and quickly . The Virtual Of fice B ookmark system allows bookmark s to be cr eated at the group and user levels. The Administrator can create both group and user bookmarks which will apply to applicable [...]

  • Page 140

    140 | SRA 7.0 User Guide Adding Bookmarks Bookmarks provide a convenient way for you to access Web, FTP , or other services on the remote network that you will connect to frequent ly . T o define bookmarks, perform the following: Ste p 1 In the Virtual Office window at t he top of the bookmarks table, click Show Edit Controls and then click Create [...]

  • Page 141

    Managing Bookmarks | 141 Ste p 3 Enter the domain name, IP address, or IPv6 addr ess of a host machine on the LAN in the Name or IP Address field. IPv6 addresses should be enclosed in brackets (i.e. the [ and ] symbols). Y ou may also enter the wildcard variable %USERNAME% to display the current user name. V ariables are case-sensitive. Ste p 4 In [...]

  • Page 142

    142 | SRA 7.0 User Guide • Select Always use specified Citrix ICA Server to explicitly specify the Citrix ICA Server Address for the Citrix ICA Session. By default , the Bookmark uses the information provided in the ICA configuration on the Citrix server .[...]

  • Page 143

    Managing Bookmarks | 143 RDP ActiveX and Java Bookmarks ActiveX and Java RDP bookmarks of fer several features that are not available in other bookmarks. Tip The ActiveX client is only suppor ted on the Internet Explorer browser , while the Java client is supported on all platforms and browsers that are compatible with Dell SonicW ALL SSL VPN. Ste [...]

  • Page 144

    144 | SRA 7.0 User Guide Ste p 6 Continue to configure t he RDP ActiveX or Java Bookmark as follows: Option Usage Screen Size Select the default screen si ze to be used when users execute this bookmark. It is advised that you select a size equal to or smaller than your current desktop screen size. ActiveX RDP bookmarks also have a full-screen optio[...]

  • Page 145

    Managing Bookmarks | 145 Tip The ActiveX client is only suppor ted on the Internet Explorer browser , while the Java client is supported on all platforms and browsers that are compatible with Dell SonicW ALL SSL VPN. Ste p 7 When you are fini shed. Click the Add button to add this bookmark to your Vi rtual Office list. Application and Path T o have[...]

  • Page 146

    146 | SRA 7.0 User Guide Determining the Remote Comput er’s Full Name or IP Address Complete the following steps to determine the fu ll name of the computer to which the RDP bookmark is pointing: Ste p 1 Right click the My Computer icon on the desktop of the remote computer , and select Properties . Ste p 2 Click the Remote tab. Ste p 3 The full [...]

  • Page 147

    Managing Bookmarks | 147 to be displayed when a user clicks this bookmark. If left unchecked, the wa rning dialog will allow the user to select a “Do not show this warning again” option if the user has permissions to edit this bookmark (set above). For more information about of floaded applications, see the Application Offloading section in the[...]

  • Page 148

    148 | SRA 7.0 User Guide Ste p 5 Optionally change other settings specific to the Service type. Ste p 6 Optionally enable or disable the Automatical ly log in setting, or change the credentials selection. Ste p 7 Click Apply . The Virtual Office home p age displays with the new IP address or domain name. Removing Bookmarks T o remove a bookmark, pe[...]

  • Page 149

    Managing Bookmarks | 149 • Bitmap caching • Menu/window animation • Visual styles • Window drag If the Java client application is RDP 6, it also support s: • Dual monitors • S p an monitors • Font smoothing • Desktop composition • Remote Application Note RDP bookmarks can use a port designation if t he service is not running on th[...]

  • Page 150

    150 | SRA 7.0 User Guide Ste p 3 A window is displayed indicating that the Remo te Desktop Client is loading. The remote desktop then loads in it s own windows. Y ou can now access all of the applications and files on the remote computer . For information on configuring options for RDP bookmarks, see “RDP ActiveX and Java Bookmarks” on page 143[...]

  • Page 151

    Managing Bookmarks | 151 Using VNC Bookmarks Ste p 1 Click the VNC bookmark. The following window is d isplayed while the VNC client is loading. Note VNC can have a port designation if the service is running on a different port. Ste p 2 When the VNC client has loaded, you will be pr ompted to enter your p assword in the VNC Authentication window . [...]

  • Page 152

    152 | SRA 7.0 User Guide The following t able describes the options that can be configured for VNC. T able 1 VNC Options Option Default Description of Options Encoding T ight Hextile is a good choice for fast networks, while T ight is better suited for low-bandwidth connections. From the other side, the Tig h t decoder in T ightVNC Java viewer is m[...]

  • Page 153

    Managing Bookmarks | 153 Using FTP Bookmarks FTP bookmarks can use a port designation if t he service is not running on the default port. Ste p 1 Click the FTP bookmark. The FTP Session dialog box displays. Ste p 2 Enter your username and password. If you want to use your Virtual Of fice username and password, simply leav e the fields blank. Ste p [...]

  • Page 154

    154 | SRA 7.0 User Guide Ste p 4 Y ou can use the following utilities in the FTP site: – T o manually navigate to a folder , enter the folder name in the Go to directory field and click Submit . – T o create new folders in the directory , use the Create new folder fields. – T o delete multiple files, click in the check box es of files or fold[...]

  • Page 155

    Managing Bookmarks | 155 Uploading Files T o upload a file, perform the following: Ste p 1 Click Upload Files in the navigation bar . The Upload FTP Files window will be displayed. Ste p 2 The current directory is displayed in the Upload files to: field. T o navigate to a different directory , enter the directory name in the Go to directory: field.[...]

  • Page 156

    156 | SRA 7.0 User Guide Using Telnet Bookmarks Ste p 1 Click the T elnet bookmark. T elnet bookmarks can use a port designation for servers not running on the default por t. Ste p 2 Click OK to any warning messages that are displa yed. A Java-based T e lnet window launches. Ste p 3 If the device you are T elnetting to is configur ed for authentica[...]

  • Page 157

    Managing Bookmarks | 157 Using SSHv2 Bookmarks SSH bookmarks can use a port designation fo r servers not running on the default port. Ste p 1 Click the SSHv2 bookmark. A Java-based SSH window displays. T y pe your user name in the Username field and click Login . Ste p 2 A hostkey popup displays. Click Ye s to accept and proceed with the login proc[...]

  • Page 158

    158 | SRA 7.0 User Guide Ste p 4 The SSH terminal launches in a new screen. Using Web Bookmarks Ste p 1 Click the HTTP or HTTPS bookmark. Note HTTP bookmarks can have a port designation and a path. Ste p 2 A new window is launched in your default browser that connect s to the domain name or IP address specified in the bookmark. HTTP & HTTPS Boo[...]

  • Page 159

    Managing Bookmarks | 159 Using Citrix Bookmarks Citrix is a remote access, app lication sharing service, simila r to RDP . It enables users to remotely access files and applications on a cent ral computer over a secure connection. There are two types of Citrix bookmarks: • “ActiveX Citrix Bookmark” on page 159 • “Java Citrix Bookmark” o[...]

  • Page 160

    160 | SRA 7.0 User Guide Ste p 4 Click Ye s to the Security W arning message that is displayed. Ste p 5 The Citrix Web Client installs. Ste p 6 Click Ye s to the Citrix license agreement.[...]

  • Page 161

    Managing Bookmarks | 161 Ste p 7 When the Citrix Web Client has inst alled, click OK If the Citrix Web Interface login window does not display , restart your Web brow ser and launch the Citrix bookmark again. Ste p 8 Enter your username, password, and domain in the Citrix Web Interface login window . Ste p 9 The Citrix W eb Interface home page is d[...]

  • Page 162

    162 | SRA 7.0 User Guide Java Citrix Bookmark When using a non-Internet Explorer web browse r , Citrix bookmarks launch the Java Citrix client. The following steps describe how to launch and use the Java Citrix client. Ste p 1 Click the Citrix bookmark. The login window displays. Ste p 2 For Logon type , select either Anonymous or Explicit . Select[...]

  • Page 163

    Managing Bookmarks | 163 Ste p 6 Select Display Settings to change the language and to specif y if Citrix hints should be displayed. Ste p 7 Select Session Settings to customize the default window size for Citrix sessions. Ste p 8 In the Window Size drop-down menu, select one of the following options: • No preference : Uses the default setting co[...]

  • Page 164

    164 | SRA 7.0 User Guide Global Bookmark Single Sign-On Options Y ou can configure si ngle sign-on using the Options button on the main Virtual Of fice page. SSO settings will be enabled only if the Administrator has conf igured user- controlled single sign-on (SSO). T o configure SSO bookmark options, perform the following tasks: Ste p 1 Click the[...]

  • Page 165

    Managing Bookmarks | 165 Per-Bookmark SSO allows users to enable or disable SSO for indivi dual bookmarks. This flexibility in specifying l ogin credentials is useful in the following cases: • Users who use multiple accounts to access a variety of resources. • Users who use two-factor authentication to log in to the SSL VPN Virtual Of fice, but[...]

  • Page 166

    166 | SRA 7.0 User Guide Ste p 7 Click OK . Ste p 8 Enter the User name and p assword for the service.[...]

  • Page 167

    Support Information | 167 Appendix A Support Information This appendix contains the following se ctions: • “Contact Information” on p age 167 • “GNU General Public License (GPL) Source Code” on page 167 • “Limited Hardware W arranty” on pa ge 167 • “End User Licensing Agreement” on page 168 Contact Information For timely res[...]

  • Page 168

    168 | SRA 7.0 User Guide suppliers' entire liability and Cu stomer's sole and exclusive remedy under this limited warranty will be shipment of a replacement product. At Dell SonicW ALL's discretion the replacement product may be of equal or greater functionality and may be of either new or like-new quality . Dell SonicW ALL's ob[...]

  • Page 169

    Support Information | 169 "Product" means the SonicW ALL labeled hardw are and related documentation ("Hardware") and/or proprietary SonicW ALL labeled soft war e, firmware and related documentation ("Software") pur chased by the end user of the product either directly from SonicW ALL or a Reseller (“Customer”). ?[...]

  • Page 170

    170 | SRA 7.0 User Guide (d) Evaluation License. If the Sof tware is provided by SonicW ALL or a Reseller at no charge for evaluation purposes, then Secti on 1(a) above shall not apply to such Sof tware and instead Customer is granted a nonproduction License to use such Software and the associated documentation solely for Customer’s own inter nal[...]

  • Page 171

    Support Information | 171 (g) Updates/Upgrades. If Customer purchases or otherwise is eligible to receive a SOFTWARE update or upgrade, you must be properly licensed to use the Product identified by SonicW ALL as being eligible for the update/ upgrade in or der to inst all and use the SOFTW ARE update/ upgrade. A SOFTW ARE update/ upgrade replaces [...]

  • Page 172

    172 | SRA 7.0 User Guide Software is ninety days from the date of registration of the Soft war e Product (or if sooner , seven days after initial delivery/download) of the So f tware Product to/by Customer . SonicWALL does not warrant that use of the Product(s) will be unin terrupted or error free nor that SonicWALL will correct all errors. The Lim[...]

  • Page 173

    Support Information | 173 SONICW ALL FOR SUC H MAINTENANCE SE R VICE OR PRODUCT PURCHASED BY CUSTOMER DURING THE TWEL VE (12) MO NTHS PRECEDING THE CLAIM). CUSTOMER EXPRESSL Y AGREES TO THE ALLOCA TION OF LIABILITY SET FORTH IN THIS SECTION, AND ACKNOWLEDGES THA T WITHOUT ITS AGREEMENT TO THESE LIMIT A TIONS, THE PRICES CHARGED FOR THE PRODUCTS AND[...]

  • Page 174

    174 | SRA 7.0 User Guide c) Severability . If any provision of this Ag reement shall be held by a court of competent jurisdiction to be contrary to law , such prov ision will be enforced to the maximum e xtent permissible and the remaining provis io ns of this Agreement will remain in full force and effect. d) Privacy Policy . Customer hereby ackno[...]