Embedded Linux for Thin Clients Next Generation (Elux® NG) Version 1.25

Total Page:16

File Type:pdf, Size:1020Kb

Embedded Linux for Thin Clients Next Generation (Elux® NG) Version 1.25 Embedded Linux for Thin Clients Next Generation (eLux® NG) Version 1.25 Administrator’s Guide Build Nr.: 23 UniCon Software GmbH www.myelux.com eLux® NG Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express consent of UniCon Software GmbH. © by UniCon 2005 Software GmbH. All rights reserved eLux is a registered trademark of UniCon Software GmbH in Germany. Accelerated-X is a trademark of Xi Graphics, Inc. Adobe, Acrobat Reader and PostScript are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Broadcom is a registered trademark of Broadcom Corporation in the U.S. and/or other countries. CardOS is a registered trademark and CONNECT2AIR is a trademark of Siemens AG in Germany and/or other countries. Cisco and Aironet are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Citrix, Independent Computing Architecture (ICA), Program Neighborhood, MetaFrame, and MetaFrame XP are registered trademarks or trademarks of Citrix Systems, Inc. in the United States and other countries. CUPS and the Common UNIX Printing System are the trademark property of Easy Software Products. DivX is a trademark of Project Mayo. Ericom and PowerTerm are registered trademarks of Ericom Software in the United States and/or other countries. Gemplus is a registered trademark and GemSAFE a trademark of Gemplus. Linux is a registered trademark of Linus Torvalds. Macromedia and Shockwave are registered trademarks of Macromedia, Inc. in the United States and/or other countries. Microsoft, MS, MS-DOS, Windows, Windows NT, Windows Server, Excel and Word are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Nortel, Nortel Networks and Contivity are trademarks of Nortel Networks in the United States and/or other countries. palmOne and Tungsten are among the trademarks or registered trademarks owned by or exclusively licensed to palmOne, Inc. PCL is a registered trademark of Hewlett Packard Company in the United States and/or other countries. PS/2 and Token Ring are registered trademarks of International Business Machines Corporation. RealPlayer is a registered trademark of RealNetworks, Inc. Safesign is a registered trademark of Thales e-Security Ltd. SAP and SAP product and service names are the trademarks or registered trademarks of SAP AG in Germany and several other countries. SICRYPT is a registered trademark of Infineon Technologies Security Solutions GmbH in Germany and/or in other countries. SSH and SSH product and service names are the trademarks or registered trademarks of SSH Communications Security Ltd. Sun, Sun Microsystems, Java and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. All other Trade Names referred to are the Servicemark, Trademark or Registered Trademark of the respective manufacturers. This product includes software developed by The XFree86 Project, Inc (http://www.xfree86.org/) and its contributors. The end user takes full responsibility for his or her actions. Neither UniCon Software GmbH nor its partners assume liability for any errors or damage resulting from the information contained herein. Build Nr.: 23 www.myelux.com eLux® NG C O N T E N T S 1 Before You Begin ........................................................................................................................ 2 1.1 Who Should Use This Manual....................................................................................................... 2 1.2 About This Guide........................................................................................................................... 2 1.3 Conventions and Abbreviations .................................................................................................... 3 1.3.1 Conventions...................................................................................................................... 3 1.3.2 Commonly-Used Abbreviations........................................................................................ 3 1.4 Finding More Information .............................................................................................................. 4 1.5 eLux NG on the World Wide Web................................................................................................. 4 1.6 Overview of eLux NG .................................................................................................................... 4 1.6.1 What is eLux NG? ............................................................................................................ 4 1.6.2 Features of eLux NG ........................................................................................................ 6 1.6.3 New Features in eLux NG 1.8.......................................................................................... 7 1.6.4 New Features in eLux NG 1.9.......................................................................................... 8 1.6.5 New Features in eLux NG 1.10........................................................................................ 8 1.6.6 New Features in eLux NG 1.11........................................................................................ 8 1.6.7 New Features in eLux NG 1.12........................................................................................ 8 1.6.8 New Features in eLux NG 1.14........................................................................................ 8 1.6.9 New Features in eLux NG 1.17........................................................................................ 8 1.6.10 New Features in eLux NG 1.20........................................................................................ 9 1.6.11 New Features in eLux NG 1.21........................................................................................ 9 1.6.12 New Features in eLux NG 1.22........................................................................................ 9 1.6.13 New Features in eLux NG 1.23........................................................................................ 9 1.6.14 New Features in eLux NG 1.25........................................................................................ 9 1.6.15 eLux NG Software Packages ......................................................................................... 10 2 Quick Start ................................................................................................................................. 12 2.1 First Boot ..................................................................................................................................... 13 2.2 First Configuration Wizard........................................................................................................... 15 2.2.1 Managed Device............................................................................................................. 15 2.2.2 Manually Configured Device .......................................................................................... 17 2.3 Troubleshooting........................................................................................................................... 18 2.4 eLux NG Interface ....................................................................................................................... 19 2.5 User Settings............................................................................................................................... 20 2.5.1 Making changes ............................................................................................................. 20 2.5.2 Screen ............................................................................................................................ 21 2.5.3 Network .......................................................................................................................... 22 2.5.4 Network Hardware.......................................................................................................... 23 2.6 Defining an Application ............................................................................................................... 24 2.7 Sessions...................................................................................................................................... 25 2.7.1 Starting an Application ................................................................................................... 25 2.7.2 Exiting an Application ..................................................................................................... 25 2.8 Shut Down................................................................................................................................... 26 3 Setup 27 3.1 General........................................................................................................................................ 28 3.2 Network ....................................................................................................................................... 29 3.2.1 Dynamic Host Configuration Protocol ...........................................................................
Recommended publications
  • Cisco VPN Client Administrator Guide Release 5.0 April 2010
    Cisco VPN Client Administrator Guide Release 5.0 April 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-5492-02 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Machine Learning in the Browser
    Machine Learning in the Browser The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:38811507 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Machine Learning in the Browser a thesis presented by Tomas Reimers to The Department of Computer Science in partial fulfillment of the requirements for the degree of Bachelor of Arts in the subject of Computer Science Harvard University Cambridge, Massachusetts March 2017 Contents 1 Introduction 3 1.1 Background . .3 1.2 Motivation . .4 1.2.1 Privacy . .4 1.2.2 Unavailable Server . .4 1.2.3 Simple, Self-Contained Demos . .5 1.3 Challenges . .5 1.3.1 Performance . .5 1.3.2 Poor Generality . .7 1.3.3 Manual Implementation in JavaScript . .7 2 The TensorFlow Architecture 7 2.1 TensorFlow's API . .7 2.2 TensorFlow's Implementation . .9 2.3 Portability . .9 3 Compiling TensorFlow into JavaScript 10 3.1 Motivation to Compile . 10 3.2 Background on Emscripten . 10 3.2.1 Build Process . 12 3.2.2 Dependencies . 12 3.2.3 Bitness Assumptions . 13 3.2.4 Concurrency Model . 13 3.3 Experiences . 14 4 Results 15 4.1 Benchmarks . 15 4.2 Library Size . 16 4.3 WebAssembly . 17 5 Developer Experience 17 5.1 Universal Graph Runner .
    [Show full text]
  • N2N: a Layer Two Peer-To-Peer VPN
    N2N: A Layer Two Peer-to-Peer VPN Luca Deri1, Richard Andrews2 ntop.org, Pisa, Italy1 Symstream Technologies, Melbourne, Australia2 {deri, andrews}@ntop.org Abstract. The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are almost entirely managed and limited by access providers. From the user’s perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer-to- peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems. Keywords: Virtual private network, peer-to-peer, network overlay. 1. Motivation and Scope of Work Irony pervades many pages of history, and computing history is no exception. Once personal computing had won the market battle against mainframe-based computing, the commercial evolution of the Internet in the nineties stepped the computing world back to a substantially rigid client-server scheme. While it is true that the today’s Internet serves as a good transport system for supplying a plethora of data interchange services, virtually all of them are delivered by a client-server model, whether they are centralised or distributed, pay-per-use or virtually free [1].
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Analisi Del Progetto Mozilla
    Università degli studi di Padova Facoltà di Scienze Matematiche, Fisiche e Naturali Corso di Laurea in Informatica Relazione per il corso di Tecnologie Open Source Analisi del progetto Mozilla Autore: Marco Teoli A.A 2008/09 Consegnato: 30/06/2009 “ Open source does work, but it is most definitely not a panacea. If there's a cautionary tale here, it is that you can't take a dying project, sprinkle it with the magic pixie dust of "open source", and have everything magically work out. Software is hard. The issues aren't that simple. ” Jamie Zawinski Indice Introduzione................................................................................................................................3 Vision .........................................................................................................................................4 Mozilla Labs...........................................................................................................................5 Storia...........................................................................................................................................6 Mozilla Labs e i progetti di R&D...........................................................................................8 Mercato.......................................................................................................................................9 Tipologia di mercato e di utenti..............................................................................................9 Quote di mercato (Firefox).....................................................................................................9
    [Show full text]
  • Institutionen För Datavetenskap Department of Computer and Information Science
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A—14/015--SE 6/28/14 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A--14/015--SE June 28, 2014 Supervisors: Peter Åstrand (Cendio AB), Maria Vasilevskaya (IDA) Examiner: Prof. Simin Nadjm-Tehrani På svenska Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ In English The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • Mozillamessaging.Com Site Redesign Site Map — Version 3.0 — September 22, 2008
    Mozillamessaging.com Site Redesign Site Map — Version 3.0 — September 22, 2008 While this document can be printed at 8.5” x 11” it may be hard to read and is intended to be printed at 11” x 17”. Mozillamessaging.com Site Redesign Version 3.0 Other Systems and Features 03 05 Mozilla Messaging Languages http://www.mozillamessaging.com/en-US/features.html http://www.mozillamessaging.com/en-US/all.html Thunderbird 02 Release Notes 04 Download Page 18 (Overview) http://www.mozillamessaging.com/ http://www.mozillamessaging.com/en-US/releasenotes/ http://www.mozillamessaging.com/en-US/download.html ?? URL TBD en-US/thunderbird Secure Email TBD http://www.mozillamessaging.com/en-US/email.html All Add-Ons https://addons.mozilla.org/en-US/thunderbird/ Supported Servers TBD http://www.mozillamessaging.com/en-US/servers Recommended https://addons.mozilla.org/en-US/thunderbird/recommended Add-Ons Popular https://addons.mozilla.org/en-US/ https://addons.mozilla.org/en-US/thunderbird/browse/type:1/cat:all?sort=popular thunderbird/ FAQ Themes http://www.mozilla.org/support/thunderbird/faq https://addons.mozilla.org/en-US/thunderbird/browse/type:2 Tips & Tricks Dictionaries http://www.mozilla.org/support/thunderbird/tips https://addons.mozilla.org/en-US/thunderbird/browse/type:3 Keyboard Shortcuts http://www.mozilla.org/support/thunderbird/keyboard Mouse Shortcuts Add-Ons Support 06 http://www.mozilla.org/support/thunderbird/mouse https://addons.mozilla.org/en-US/thunderbird/ (Overview) http://www.mozillamessaging.com/ Menu References Bugzilla en-US/support http://www.mozilla.org/support/thunderbird/menu https://bugzilla.mozilla.org/ Editing Config.
    [Show full text]
  • Mozilla Messaging and Thunderbird: Why, And
    Email is essential. Let’s make it great. An Introduction to Mozilla Messaging David Ascher [email protected] Why am I here? • To introduce Mozilla • To discuss the current email & messaging challenges • To share the Thunderbird vision • To listen and learn Core Belief The Mozilla project is a global community of people who believe that openness, innovation, and opportunity are key to the continued health of the Internet. A short history 2000 Mozilla Foundation 2005 2008 MozillaMozilla CorporationMessaging Focus and Scope Mozilla Foundation (MoFo) ❖ Everything else Mozilla Corp (MoCo) Mozilla Messaging (MoMo) ❖ Web standards ❖ Email & Calendaring ❖ Web Privacy standards ❖ ❖ Weave Email privacy ❖ ❖ Prism Mobile messaging ❖ Mobile web ❖ Calendaring ❖ IM, etc. Expectation Reset • Mozilla is a public benefit organization • Driven by non-financial outcomes • Use the tools of business and markets to further our agenda What’s the problem with “email”? Instant Messaging News Home Email Email Twitter Web Forums Work Email Pownce Jaiku RSS/Atom MySpace Pulse Atom Pub Facebook FriendFeed LinkedIn Xing VoIP Voicemail SMS What’s the problem with “email”? Instant Messaging News THIS HomeDOES Email Email Twitter Web Forums Work Email Pownce Jaiku RSS/AtomNOTMySpace FIT OURPulse Atom Pub Facebook FriendFeed LinkedIn Xing VoIP Voicemail BRAINS!SMS How did we get here? • Email design predates current internet architecture • Email was “solved”, consolidated, dead. • The Web is changing everything ❖ Economies of clouds & services ❖ Monetization strategies ❖ Social graphs and Identity crisis Still • Messaging is still key to the user experience of the internet • It needs to be: ❖ Open, competitive, interoperable, secure ❖ More effective ❖ Less stressful ❖ Fun again! So? The Mozilla Manifesto 1.
    [Show full text]
  • IGEL Universal Desktop Linux User Guide
    IGEL Thin Clients Universal Desktop User Guide For IGEL Thin Clients with IGEL Flash Linux Copyright © 2009 IGEL Technology Ver. UD-LX 4.02.100 12/2009 Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including the products and software described in it, may be reproduced, manipulated, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup purposes, without the express written permission of IGEL Technology GmbH. Disclaimer The information in this document is subject to change without notice. IGEL Technology GmbH makes no representations or warranties with respect to the contents hereof and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. Further, IGEL Technology GmbH reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of IGEL Technology GmbH to notify any person of such revision or changes. Trademark Recognition IGEL is a registered trademark of IGEL Technology GmbH. MicrosoftTM WindowsTM is a registered trademark of Microsoft Corporation. JavaTM is a registered trademark of Sun Microsystems, Inc. VMwareTM is a registered trademark of VMware, Inc. PowerTermTM WebConnectTM and PowerTermTM InterConnectTM are registered trademarks of Ericom Software. CUPSTM and the CUPS logo are trademarks of Apple Inc. All other products and corporate names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies, and are used only for identification or explanation and to the owner’s benefit.
    [Show full text]
  • Unpermitted Resources
    Process Check and Unpermitted Resources Common and Important Virtual Machines Parallels VMware VirtualBox CVMCompiler Windows Virtual PC Other Python Citrix Screen/File Sharing/Saving .exe File Name VNC, VPN, RFS, P2P and SSH Virtual Drives ● Dropbox.exe ● Dropbox ● OneDrive.exe ● OneDrive ● <name>.exe ● Google Drive ● etc. ● iCloud ● etc. Evernote / One Note ● Evernote_---.exe ● onenote.exe Go To Meeting ● gotomeeting launcher.exe / gotomeeting.exe TeamViewer ● TeamViewer.exe Chrome Remote ● remoting_host.exe www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ Messaging / Video (IM, IRC) / .exe File Name Audio Bonjour Google Hangouts (chrome.exe - shown as a tab) (Screen Sharing) Skype SkypeC2CPNRSvc.exe Music Streaming ● Spotify.exe (Spotify, Pandora, etc.) ● PandoraService.exe Steam Steam.exe ALL Processes Screen / File Sharing / Messaging / Video (IM, Virtual Machines (VM) Other Saving IRC) / Audio Virtual Box Splashtop Bonjour ● iChat ● iTunes ● iPhoto ● TiVo ● SubEthaEdit ● Contactizer, ● Things ● OmniFocuse phpVirtualBox TeamViewer MobileMe Parallels Sticky Notes Team Speak VMware One Note Ventrilo Windows Virtual PC Dropbox Sandboxd QEM (Linux only) Chrome Remote iStumbler HYPERBOX SkyDrive MSN Chat Boot Camp (dual boot) OneDrive Blackboard Chat CVMCompiler Google Drive Yahoo Messenger Office (Word, Excel, Skype etc.) www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ 2X Software Notepad Steam AerooAdmin Paint Origin AetherPal Go To Meeting Spotify Ammyy Admin Jing Facebook Messenger AnyDesk
    [Show full text]
  • VPN Tracker 365 April 2016
    VPN Tracker 365 Manual © 2016 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of equinux AG or equinux USA, Inc. Your rights to the software are governed by the accompanying soft- ware license agreement. The equinux logo is a trademark of equinux AG and equinux USA, Inc., registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks and/or regis- tered trademarks of their respective companies. equinux shall have absolutely no liability for any direct or indirect, special or other consequential damages in connection with the use of this document or any change to the router in general, including with- out limitation, any lost profits, business, or data, even if equinux has been advised of the possibility of such damages. Every effort has been made to ensure that the information in this manual is accurate. equinux is not responsible for printing or clerical errors. Revised April 28, 2016 Created using Apple Pages. www.equinux.com !2 Contents Notes 33 Introducing VPN Tracker 365........................................ 5 Network Scanner .........................................................34 VPN Tracker Plans.......................................................... 7 Accounting ...................................................................39 Getting Started............................................................... 9 Exporting Connections ...............................................41
    [Show full text]
  • Nist Sp 800-77 Rev. 1 Guide to Ipsec Vpns
    NIST Special Publication 800-77 Revision 1 Guide to IPsec VPNs Elaine Barker Quynh Dang Sheila Frankel Karen Scarfone Paul Wouters This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-77r1 C O M P U T E R S E C U R I T Y NIST Special Publication 800-77 Revision 1 Guide to IPsec VPNs Elaine Barker Quynh Dang Sheila Frankel* Computer Security Division Information Technology Laboratory Karen Scarfone Scarfone Cybersecurity Clifton, VA Paul Wouters Red Hat Toronto, ON, Canada *Former employee; all work for this publication was done while at NIST This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-77r1 June 2020 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]