Secure Gateway User Guide v1
-
Upload
chandana-rachapudi -
Category
Documents
-
view
240 -
download
0
Transcript of Secure Gateway User Guide v1
-
8/12/2019 Secure Gateway User Guide v1
1/26
COMPANYCONFIDENTIAL PAGE 1OF 26
Shaw Secure VPN Gateway (IVE)
User Guide
Author: IT Security and Compliance, Shaw Cablesystems G.P.
Status
This document is final. Additions and changes will be made as different products are supported or commontroubleshooting steps are identified.
Index
1 Supported Systems
2 Quick Start
3 System Requirements
3.1 Minimum Hardware Requirements
3.2 Minimum Software Requirements3.2.1 Qualified Platform3.2.2 Compatible Platform3.2.3 Core Functionality (Web and File Browsing)3.2.4 Advanced Functionality
3.2.4.1 Client-side Java Applets3.2.4.2 Secure Terminal Access3.2.4.3 Java version of Secure Application Manager (J-SAM)3.2.4.4 Windows version of Secure Application Manager (W-SAM)3.2.4.5 Network Connect3.2.4.6 Host Checker3.2.4.7 Secure Virtual Workspace3.2.4.8 Cache Cleaner3.2.4.9 Terminal Services
3.2.5 Windows Vista Support
3.3 Checking and Upgrading Software Versions3.3.1 Windows
3.3.1.1 Performing Windows Update3.3.1.2 Internet Explorer
3.3.2 Firefox3.3.3 Sun JRE (Java Runtime Environment) and MS JVM3.3.4 Red Hat and Fedora Core Linux3.3.5 Macintosh
3.3.5.1 Safari3.3.5.2 Netscape
3.3.6 Solaris3.3.7 Mozilla
4 Logging In
4.1 Host Checker and Cache Cleaner
-
8/12/2019 Secure Gateway User Guide v1
2/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 2OF 26
4.2 Authentication4.2.1 Authentication Failure
5
Home Page
5.1 Browser Bar5.1.1 Floating Browse Bar
5.2 Browse Field
5.3 Web Bookmarks
5.4 Files
5.5 Terminal Sessions5.5.1 Telnet and SSH Sessions
5.6 Client Application Sessions5.6.1 Network Connect
5.6.1.1 Network Connect and Internet Explorer
6 Secure Meetings
6.1 Scheduling Meetings
6.2 Conducting Meetings
7 Logging Out
8 Frequently Asked Questions (FAQ)
9 Troubleshooting
10 Document Information
10.1 People
10.2 Document History
1 Supported Systems
The Shaw secure VPN gateway allows access to a limited set of resources from any internet browser. Thisincludes home office computers and personal computers that are not supported by Shaw IT services.
Unless your workstation or laptop was provisioned by Shaw IT services then we cannot guarantee supportor connectivity to the VPN gateway. Your personal system may not meet the minimum securityrequirements to connect to the VPN or be incorrectly configured. This document is indented to be used asan installation and troubleshooting guide in the event you have problems connecting.
2 Quick Start
Shaws Secure VPN Gateway is accessible from anywhere on the internet and basic functionality isdelivered entirely over the web. To access the gateway simply browse to the following address:
http://ive.sjrb.ca
Important:Although the secure gateway checks for malicious software installed on your system, if you
suspect you have a virus or you system shows any unexpected behaviour (i.e. popups, unexpectedshutdowns, extremely degraded performance), DO NOTattempt to launch the VPN. If you have a Shaw
-
8/12/2019 Secure Gateway User Guide v1
3/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 3OF 26
computer please have it examined by IT Desktop Services, otherwise have it checked for malicioussoftware by a qualified professional before connecting.
3 System Requirements
3.1 Minimum Hardware Requirements
The minimum recommended hardware requirements for client systems to utilize the full functionality of theVPN gateway are as follows:
CPU Pentium III 733MHz or equivalent
Memory 256 MB
Hard Disk 20 GB
Network 10/100 Ethernet with broadband internet connection
Operating System See Minimum Software Requirements below
3.2 Minimum Software Requirements
3.2.1 Qualified Platform
The platforms listed in the qualified category have been systematically tested by QA as part of the currentrelease.
3.2.2 Compatib le Platform
The platforms listed in the compatible category have not been systematically tested by our QAdepartment in this release but based on testing in previous releases and knowledge of the platform JuniperNetworks (the secure gateway vendor) expects that the functionality will work and will fully support theseplatforms.
3.2.3 Core Funct ionality (Web and File Browsing)
Qualified platforms:
- Windows XP Pro SP1: Internet Explorer 6.0, Firefox 2.0
- Windows XP Pro SP2: Internet Explorer 7.0, Internet Explorer 6.0, Firefox 2.0
- Windows 2000 SP4: Internet Explorer 6.0, Internet Explorer 5.5, Netscape 8.0, Firefox 1.5
- Windows 98 SE: Internet Explorer 6.0, Netscape 4.79
- Mac OS X 10.4: Safari 2.0- Mac OS X 10.3.2: Safari 1.1, Internet Explorer 5.2
- Mac OS X 10.2.8: Safari 1.0
- Mac 9.2: Internet Explorer 5.1.5 and Netscape 4.79
- Suse Linux 10: Firefox 2.0
- Fedora Core 5: Firefox 2.0
Compatible platforms:
- Windows Server 2003: Internet Explorer 6.0
- Windows XP Home Edition: Internet Explorer 6.0, Firefox 1.5 and greater
- Windows XP Media Center Edition 2002: : IE 6.0
-
8/12/2019 Secure Gateway User Guide v1
4/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 4OF 26
- Windows XP SP1 and SP2: AOL 8.0
- Windows 2000 SP4: Firefox 1.5 and greater.
- Mac OS X 10.2.8: Safari 1.1 and greater
- Suse Linux 9.3: Mozilla 1.6 and Firefox 1.5 and greater
- Red Hat Linux 9.0: Mozilla 1.6 and Firefox 1.5 and greater
- Solaris 9: Mozilla 1.4
3.2.4 Advanced Functionality
3.2.4.1 Client-side Java Applets
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0, Internet Explorer 6.0 running Sun JRE 1.5.0_07,Firefox 2.0 running Sun JRE 1.5.0_07
- Windows 2000: Internet Explorer 6.0 running Sun JRE 1.5.0_07, Internet Explorer 5.5 SP2 runningMicrosoft JVM, Firefox 1.5 running Sun JRE 1.4.2
- Windows 98 SE: Internet Explorer 6.0 running MS JVM.
- Mac OS X 10.4: Safari 2.0 running Java 1.5
- Mac OS X 10.3.2: Safari 1.1 and above running Java 1.4.2_09
- Mac OS X 10.2.8: Safari 1.0 running Java 1.4.1_01
- Suse Linux 10: Firefox 2.0 running Sun JRE 1.5.0_07
- Fedora Core 5: Firefox 2.0 running Sun JRE 1.5.0_07
Compatible platforms:- Windows XP Pro SP1: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox 1.5
and greater running Sun JRE 1.4.1 and greater.
- Windows XP Home Edition: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox1.5 and greater running Sun JRE 1.4.1 and greater.
- Windows XP Media Center Edition 2002: Internet Explorer 6.0 running Sun JRE 1.4.1_01 andgreater.
- Windows 2000: Internet Explorer 6.0 running MS JVM or Sun JRE 1.4.1_01 and greater, InternetExplorer 5.5 SP2 running MS JVM or Sun JRE 1.4.1 and greater, Firefox 1.5 and greater runningSun JRE 1.4.1_01 and greater.
- Windows 2000: Netscape 8.0 running Sun JRE 1.5.0_05
- Red Hat Linux 9.0: Mozilla 1.6 running Sun JRE 1.4.2_04 and greater.
- Suse Linux 9.3: Firefox 1.5 and Firefox 2.0 running Sun JRE 1.4.2_04 and higher.
- Windows 98: Internet Explorer 6.0 running Microsoft JVM or Sun JRE 1.4.2_04 and higher.
- Red Hat Linux 9.0: Firefox 1.5 and greater running Sun JRE 1.4.2_04 and higher.
- Mac OS 10.2.8: Safari 1.1 running Java 1.4.2_04
3.2.4.2 Secure Terminal Access
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0, Internet Explorer 6.0 running Sun JRE 1.5.0_07,
Firefox 2.0 running Sun JRE 1.5.0_07
-
8/12/2019 Secure Gateway User Guide v1
5/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 5OF 26
- Windows 2000: Internet Explorer 6.0 running Sun JRE 1.5.0_07, Internet Explorer 5.5 SP2 runningMicrosoft JVM, Firefox 1.5 running Sun JRE 1.4.2
- Windows 98 SE: Internet Explorer 6.0 running MS JVM.
- Mac OS X 10.4: Safari 2.0 running Java 1.5
- Mac OS X 10.3.2: Safari 1.1 and above running Java 1.4.2_09
- Mac OS X 10.2.8: Safari 1.0 running Java 1.4.1_01
- Suse Linux 10: Firefox 2.0 running Sun JRE 1.5.0_07
- Fedora Core 5: Firefox 2.0 running Sun JRE 1.5.0_07
Compatible platforms:
- Windows XP Pro SP1: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox 1.5and greater running Sun JRE 1.4.1 and greater.
- Windows XP Home Edition: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox
1.5 and greater running Sun JRE 1.4.1 and greater.
- Windows XP Media Center Edition 2002: Internet Explorer 6.0 running Sun JRE 1.4.1_01 andgreater.
- Windows 2000: Internet Explorer 6.0 running MS JVM or Sun JRE 1.4.1_01 and greater, InternetExplorer 5.5 SP2 running MS JVM or Sun JRE 1.4.1 and greater, Firefox 1.5 and greater runningSun JRE 1.4.1_01 and greater.
- Windows 2000: Netscape 8.0 running Sun JRE 1.5.0_05
- Red Hat Linux 9.0: Mozilla 1.6 running Sun JRE 1.4.2_04 and greater.
- Suse Linux 9.3: Firefox 1.5 and Firefox 2.0 running Sun JRE 1.4.2_04 and higher.
- Windows 98: Internet Explorer 6.0 running Microsoft JRE or Sun JRE 1.4.2_04 and higher.
- Red Hat Linux 9.0: Firefox 1.5 and greater running Sun JRE 1.4.2_04 and higher.
- Mac OS 10.2.8: Safari 1.1 running Sun JRE 1.4.2_04
3.2.4.3 Java version of Secure Appl ication Manager (J-SAM)
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0, Internet Explorer 6.0 running Sun JRE 1.5.0_07,Firefox 2.0 running Sun JRE 1.5.0_07
- Windows 2000: Internet Explorer 6.0 running Sun JRE 1.5.0_07, Internet Explorer 5.5 SP2 runningMicrosoft JVM, Firefox 1.5 running Sun JRE 1.4.2
- Windows 98 SE: Internet Explorer 6.0 running MS JVM.- Mac OS X 10.4: Safari 2.0 running Java 1.5
- Mac OS X 10.3.2: Safari 1.1 and above running Java 1.4.2_04
- Mac OS X 10.2.8: Safari 1.0 running Java 1.4.1_01
- Suse Linux 10: Firefox 2.0 running Sun JRE 1.5.0_07
- Fedora Core 5: Firefox 2.0 running Sun JRE 1.5.0_07
Note for Mac and Linux implementations:
- Automatic editing of hosts file is only available for root users
- Ports less than 1024 are only available for root users
Compatible platforms:
-
8/12/2019 Secure Gateway User Guide v1
6/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 6OF 26
- Windows XP Pro SP1: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox 1.5and greater running Sun JRE 1.4.1 and greater.
- Windows XP Home Edition: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox
1.5 and greater running Sun JRE 1.4.1 and greater.
- Windows XP Media Center Edition 2002: Internet Explorer 6.0 running Sun JRE 1.4.1_01 andgreater.
- Windows 2000: Internet Explorer 6.0 running MS JVM or Sun JRE 1.4.1_01 and greater, InternetExplorer 5.5 SP2 running MS JVM or Sun JRE 1.4.1 and greater, Firefox 1.5 and greater runningSun JRE 1.4.1_01 and greater.
- Windows 2000: Netscape 8.0 running Sun JRE 1.5.0_05
- Red Hat Linux 9.0: Mozilla 1.6 running Sun JRE 1.4.2_04 and greater.
- Suse Linux 9.3: Firefox 1.5 and Firefox 2.0 running Sun JRE 1.4.2_04 and higher.
- Windows 98: Internet Explorer 6.0 running Microsoft JVM or Sun JRE 1.4.2_04 and higher.
- Red Hat Linux 9.0: Firefox 1.5 and greater running Sun JRE 1.4.2_04 and higher.
- Mac OS 10.2.8: Safari 1.1 running Sun JRE 1.4.2_04
- Solaris 9: Mozilla 1.4 running Sun JVM 1.4.2_04
Note for Mac, Linux, and Solaris implementations:
- Automatic editing of hosts file is only available for root users
- Ports less than 1024 are only available for root users
3.2.4.4 Windows version of Secure Appl ication Manager (W-SAM)
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0, Internet Explorer 6.0, Firefox 2.0 with Sun JRE 1.5\
- Windows 2000: Internet Explorer 6.0, Internet Explorer 5.5 SP2, Firefox 1.5 with Sun JRE 1.5 and1.4.2.
- Windows Server 2003: Internet Explorer 6.0
- Windows 98 SE: Internet Explorer 6.0 (WSAM + NetBIOS is not supported in Windows 98)
Compatible platforms:
- Windows XP Pro SP1: Firefox 1.5 and greater running Sun JRE 1.4.1 and greater.
- Windows XP Home Edition: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox1.5 and greater running Sun JRE 1.4.1 and greater.
- Windows XP Media Center Edition 2002: Internet Explorer 6.0 running Sun JRE 1.4.1_01 andgreater.
3.2.4.5 Network Connect
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0, Internet Explorer 6.0, Firefox 2.0 with Sun JRE 1.5
- Windows 2000: Internet Explorer 6.0, Internet Explorer 5.5 SP2, Firefox 1.5 with Sun JRE 1.5 and1.4.2.
- Windows Server 2003: Internet Explorer 6.0
- Windows 98 SE: Internet Explorer 6.0
- Mac OS X 10.4: Safari 2.0 running Java 1.5
-
8/12/2019 Secure Gateway User Guide v1
7/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 7OF 26
- Mac OS X 10.3.2: Safari 1.1 and above, running Java 1.4.2_04
- Mac OS X 10.2.8: Safari 1.0 and 1.1, running above Java 1.4.1_04
- Suse Linux 10: Firefox 2.0 running Sun JRE 1.5.0_07
- Fedora Core 5: Firefox 2.0 running Sun JRE 1.5.0_07
Compatible platforms:
- Windows XP Pro SP1: Firefox 1.5 and greater running Sun JRE 1.4.1 and greater.
- Windows XP Home Edition: Internet Explorer 6.0 running Sun JRE 1.4.1_01 and greater, Firefox1.5 and greater running Sun JRE 1.4.1 and greater.
- Windows XP Media Center Edition 2002: Internet Explorer 6.0 running Sun JRE 1.4.1_01 andgreater.
- Red Hat Linux 9.0 on x86 platforms: Firefox 1.5 and greater running Sun JRE 1.4.2_04
- Suse Linux 9.3 on x86 platforms: Firefox 1.5 and greater running Sun JRE 1.4..2_04
3.2.4.6 Host Checker
Qualified platforms:
- Windows XP SP2: Internet Explorer 7.0, Internet Explorer 6.0 and Firefox 2.0
- Windows 2000 SP4: Internet Explorer 5.5 SP2
- Windows 98: Internet Explorer 6.0 and Firefox 1.5
- Mac OS X 10.4: Safari 2.0
- Mac OS X 10.3.7: Safari 1.2
- Suse Linux 10: Firefox 2.0
- Fedora Core 5: Firefox 2.0
Compatible platforms:
- Windows XP SP1: Firefox 1.5 and greater.
- Windows XP Home Edition: Internet Explorer 6.0, Firefox 1.5 and greater
- Windows XP Media Center Edition 2002: : Internet Explorer 6.0
- Windows 2000: Internet Explorer 6.0, Firefox 1.5 and greater.
- Windows NT: Internet Explorer 6.0
- Windows 98: Firefox 1.5 and greater.
- Mac OS X 10.3.7: Safari 1.1 and greater.- Red Hat Linux 9.0: Firefox 1.5 and greater
3.2.4.7 Secure Virtual Workspace
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0
- Windows XP Pro SP1 and SP2: Internet Explorer 6.0, and Firefox 2.0.
- Windows 2000 SP4: Internet Explorer 6.0, Internet Explorer 5.5 SP2, and Firefox 1.5.
Compatible platform:
- Windows XP Home: Internet Explorer 6.0, Firefox 1.5 and greater
-
8/12/2019 Secure Gateway User Guide v1
8/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 8OF 26
3.2.4.8 Cache Cleaner
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0
- Windows XP Pro SP1 and SP2: Internet Explorer 6.0 and Firefox 2.0
- Windows 2000 SP4: Windows 2000: Internet Explorer 6.0, Internet Explorer 5.5 SP2.
- Windows 98 SE: Internet Explorer 6.0
- Windows 98 SE: Internet Explorer 5.5 SP2
Compatible platform:
- Windows XP SP1: Firefox 1.5 and greater.
- Windows XP Home Edition: Internet Explorer 6.0, Firefox 1.5 and greater
- Windows XP Media Center Edition 2002: Internet Explorer 6.0
3.2.4.9 Terminal Services
Qualified platforms:
- Windows XP Pro SP2: Internet Explorer 7.0
- Windows XP Pro SP1 and SP2*: Internet Explorer 6.0 and Firefox 2.0.
- Windows 2000 SP4: Internet Explorer 6.0, Internet Explorer 5.5 SP2, Firefox 2.0 and Firefox 1.5.
- Windows 98 SE: Internet Explorer 6.0
Compatible platform:
- Windows XP SP1: Firefox 1.5 and greater.
- Windows XP Home Edition: Internet Explorer 6.0, Firefox 1.5 and greater
- Windows XP Media Center Edition 2002: Internet Explorer 6.0
* Windows XP SP2 contains a bug which prevents connections to loopback addresses. This functionality isrequired for J-SAM, W-SAM, and Terminal Services. Hot fix 884020,http://support.microsoft.com/default.aspx?scid=kb;en-us;884020includes the fix however; due to possiblesecurity vulnerabilities our recommendation is to apply the latest Microsoft security update that includesthis fix.
3.2.5 Windows Vista Support
As of Jan 19, 2007 we do not support Windows Vista for advanced functionality. It has been reported thatbasic features such as web browsing and file transfers do work with the current release of windows Vista
running internet explorer 7. We expect full feature functionality to be released and supported by the end ofApril 2007.
3.3 Checking and Upgrading Software Versions
You may need to upgrade your operating system or software components in order to launch and properlydisplay the secure gateway and/or use advanced features like network connect. Shaw recommends thatyou install all available updates, according to your operating system vendors recommendations andensure that your system is functioning normallybefore connecting to the VPN gateway.
3.3.1 Windows
To check the version of windows you are currently running, as well as the service pack that is installed:
1. right click on My Computer on the desktop and select Properties
-
8/12/2019 Secure Gateway User Guide v1
9/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 9OF 26
2. in the General tab you should see the windows version as well as the service pack level underthe heading System:
Figure 3.3.1(1) System Properties window in Windows XP
To upgrade your version of windows you must purchase an upgrade or replacement copy. Please seehttp://www.microsoft.com/windows/default.mspxfor more information.
Service packs can be downloaded from Microsoft but we recommend running windows update beforeusing the VPN, windows update will automatically upgrade your system to the latest service pack.
3.3.1.1 Performing Windows Update
To perform a windows update, which will update your windows components to the latest versions as wellas install any missing service packs, perform the following steps:
1. launch internet explorer
2. in the Tools menu select Windows Update you will be taken to the windows update site andprompted to update your components as needed.
-
8/12/2019 Secure Gateway User Guide v1
10/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 10OF 26
Figure 3.3.1(1) Tools Menu in Internet Explorer
Depending on the last time windows update was run you may be prompted several times to reboot yoursystem. After rebooting please repeat the above steps until the windows update site reports that yoursystem is up-to-date.
3.3.1.2 Internet Explorer
To check the version of internet explorer that you are running perform the following steps:
1. launch internet explorer
2. in the Help menu select About Internet Explorer you should see the version and service packlevel of internet explorer
Figure 3.3.1.2(1) About Internet Explorer Window
Internet explorer can be updated to the latest version by running windows update as specified in section3.3.1.1. Alternatively internet explorer installation files can be downloaded athttp://www.microsoft.com/windows/ie/default.mspx
3.3.2 Firefox
To check the version of Firefox that you are running perform the following steps:
-
8/12/2019 Secure Gateway User Guide v1
11/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 11OF 26
1. launch Firefox
2. in the Help menu select About Mozilla Firefox you should see the version
Figure 3.3.2(1) About Mozilla Firefox Window
The latest version of Mozilla Firefox can be downloaded at http://www.mozilla.com/en-US/firefox/
3.3.3 Sun JRE (Java Runtime Environment) and MS JVM
To find out which version of Java you are currently running visit http://www.javatester.org/version.html
Javatester.org provides specific instructions for determining the version of Java you are running with yourbrowser. It also contains links to Suns website where you can download and install the latest version (orolder versions) of the Sun JRE. To download the latest version from Sun go tohttp://java.com/en/download/
Microsoft no longer supports their JVM. If you require a specific version please upgrade to the Sun JREfrom Sun Microsystems.
Suns JRE runs on Linux, Solaris, Windows and Mac OS(X).
3.3.4 Red Hat and Fedora Core Linux
To find out the version of red hat Linux you are running you can look in the /etc/redhat-release file. Youshould see a string to indicate the version you are running.
Figure 3.3.4(1) Contents of /etc/redhat-release file
-
8/12/2019 Secure Gateway User Guide v1
12/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 12OF 26
You may download* the latest versions of Red Hat install media fromhttps://www.redhat.com/apps/download/
*If you do not have an active subscription with Red Hat you will need to purchase the install media.
Fedora core is an open-source community supported operating system but major versions can bedownloaded from http://fedora.redhat.com/Download/
3.3.5 Macintosh
Only core functionality is available with Mac OS 9.2. OSX is required for any advanced functionality. Todetermine the version of Mac OS you are running:
1. click on the Apple icon in the top left corner of your screen and select About This Mac.
2. this should bring up version information about the version of Mac OS you are running
Figure 3.3.5(1) About This Mac Window
Please refer to apples support site, http://www.apple.com/support/to determine if you can upgrade theMac OS version on your system.
3.3.5.1 Safari
To determine the version of safari you are currently running:
1. Open your Safari web browser by clicking on the Safari icon in the dock.
2. Click on Safari in your Safari menu, located at the top of your screen.
3. A drop-down menu will now appear. Choose the option labelled About Safari.
4. A dialog box will now appear containing the browser's version number.
-
8/12/2019 Secure Gateway User Guide v1
13/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 13OF 26
Figure 3.3.5.1(1) About Safari Window
The latest version of safari can be downloaded at http://www.apple.com/support/downloads/safari.html
3.3.5.2 Netscape
Netscape Version 4.79 for Mac PowerPC as well as most other operating systems can be downloaded athttp://browser.netscape.com/ns8/download/archive47x.jsp
3.3.6 Solaris
Solaris runs SunOS. Your version of SunOS can be found by running the command uname a
SunOS will report its version numbers as follows:
SunOS 5.8 = Solaris 8
SunOS 5.9 = Solaris 9SunOS 5.10 = Solaris 10
Please visit Suns website at http://www.sun.comto see which version of Solaris your system can supportand if you are eligible for an upgrade.
3.3.7 Mozilla
The latest version of the Mozilla browser suite can be downloaded athttp://www.mozilla.org/releases/#1.7.13
4 Logging In
To access the login page for the secure access VPN gateway point you internet browser to the followingaddress:
http://ive.sjrb.ca
Important:Although the secure gateway checks for malicious software installed on your system, if yoususpect you have a virus or you system shows any unexpected behaviour (i.e. popups, unexpectedshutdowns, extremely degraded performance), DO NOTattempt to launch the VPN. If you have a Shawcomputer please have it examined by IT Desktop Services, otherwise have it checked for malicioussoftware by a qualified professional before connecting.
Once connected to the system, you may create a bookmark in your web browsers favourites orbookmarks folder so that you do not need to type the entire address in to connect in the future.
The secure gateway is accessible from both inside the Shaw network and on the internet. Some featuresthat work on the internet may not work when connecting from the inside. You should access the resourcedirectly if you are connected to Shaws internal network.
-
8/12/2019 Secure Gateway User Guide v1
14/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 14OF 26
4.1 Host Checker and Cache Cleaner
Before you are presented with a page to provide your user id and password, the gateway will attempt toload several software components to check for the following types of malicious software running on your
system:
- keyloggers
- viruses and Trojans
- malware
- other potentially malicious software
You should see a screen indicating that the host checker and cache cleaner are loading.
Figure 4.1(1) Loading Secure Gateway Components
The secure gateway can download and deploy the host checker and cache cleaner software using activex(on windows) or with Java (on other operating systems, or as a fallback install method on windows)
If you are presented with a Java window or an activex warning about software needing to be installed fromJuniper Networks Inc. you must say Yes, otherwise the host checker and cache cleaner may fail to loadpreventing you from logging into the VPN.
-
8/12/2019 Secure Gateway User Guide v1
15/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 15OF 26
Figure 4.1(2) ActiveX install warning
Figure 4.1(3) ActiveX install warning
Host checker and cache cleaner may cause one or more the following images (processes) to run on yoursystem:
- dshostchecker.exe
- dscachecleaner.exe
- jhoe.exe
- dsncservice.exe
- dssamproxy.exe
- dssamui.exe
The execution of these programs before you login or during your session is normal. If you have securitysoftware that alerts you of these processes or may block their execution, you will be unable to login. Youmust allow the execution of these processes if prompted by firewall or security so ftware.
The host checker process will place an icon in your tray to notify you of malicious software it detects. Youcan also use it to check the status of the host checker application by right clicking the icon and selecting
Details.
Figure 4.1(4) Host checker and Java tray icons
The appearance of the Java icon (coffee cup) is normal during your session.
Note for Shaw Secure Users
It has been observed that the Shaw Secure product may try to block the execution of these programs. Ifprompted please allow these programs to run.
-
8/12/2019 Secure Gateway User Guide v1
16/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 16OF 26
4.2 Authentication
The credentials you must provide to login to the VPN gateway are your Shaw corporate e-mail addressand your domain password. (I.e. the same password you use to login to your workstation)
Figure 4.2(1) Secure Gateway Login Page
Some users may have more than one e-mail address. The address you must use is your primary e-mailaddress. The e-mail address field is not case sensitive.
If you are unsure of your primary e-mail address you can check your properties in the global address book.(Address Book in Outlook.) Your primary e-mail address is indicated by the prefix SMTP: (note the capitalletters, secondary addresses will be lowercase)
Figure 4.2(2) Outlook Address Book Contact Properties (multiple e-mail addresses example)
-
8/12/2019 Secure Gateway User Guide v1
17/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 17OF 26
4.2.1 Authentication Failure
A failed username or password combination will produce an Invalid Username or Password message andprompt you to re-authenticate. Your windows domain account will be locked after 5 failed attempts. Please
contact the IT Service Centre (4944) to have your account un-locked.
Due to security concerns we cannot do password resets over the phone without some form of identityverification.
5 Home Page
A successful login will present you with the Secure VPN Gateway home page. The home page contains allof your pre-defined links, user created links, and links to launch advanced utilities like network connect,secure application manager and secure meetings.
Figure 5(1) Home page browser bar (top) and browse field (bottom)
Your level of access and which panels and features are displayed or accessible on your home pagedepend on how your account was setup. If you have any questions about missing access or accesschanges please contact the IT Service Centre (4944)
5.1 Browser Bar
The browser bar is located in the top left of the web page. It provides an interface that should always bedisplayed while using the secure gateway. The buttons on the bar provide functionality to:
- Home: return to the home page from any other page you are currently viewing.
- Meetings: host or join a secure meeting
- Preferences: change the appearance of your home page, change your password and configureyour secure meeting preferences
- Session Timer: the session timer tells you the remaining time until your session is disconnected.The session timer is reset every time you login.
- Help: opens the comprehensive online help system
- Sign Out: logout of the secure VPN gateway and terminate all VPN components running on yoursystem
5.1.1 Floating Browse Bar
When browsing away from the home page to internal sites the VPN gateway will re-write your pages with abrowser bar that allows you to navigate back to the home page or sign out regardless of the page you areon.
Figure 5.1.1(1) Floating Browse Bar
You can move the browse bar to either side of the active page by clicking the arrow icon beside the homeicon.
-
8/12/2019 Secure Gateway User Guide v1
18/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 18OF 26
5.2 Browse Field
The browse field is a text entry field that functions similar to the address field on your internet browser,allowing you to enter website addresses (and other resources) to access directly.
You can enter the following types of resources in the browse field:
Use this format To
http://www.domain.com
OR
https://www.domain.com
OR
domain.com
Browse web pages
i.e. shawnet
\\server\share
OR
smb://server/share
Access shares on Windows file servers
i.e. \\dilbert\someuser$
telnet://host:portSSH://host:port
Start a telnet/SSH session to connect to the specifiedhostname and port
ica:// Start Citrix terminal services to connect to the specifiedhostname (Windows only)
rdp:// Start Microsoft terminal services or a remote desktopsession to the specified hostname (Windows only)
outlook:inbox
OR
outlook:today
OR
(any x:y format that your browser supports)
Access your Outlook inbox or calendar (Windows only).
(For any text you enter as x:y, the secure gateway passes itto your browser without executing it.) You must have Outlookinstalled for this feature to work.
5.3 Web BookmarksThe Web Bookmarks panel on the secure gateway home page provides a centralized location for links tocorporate resources. A resource can be any Web page or Web application that can be accessed throughthe secure gateway. The secure gateway rewrites the links in this panel in order to secure traffic betweenyour computer and the Web resource. When you click a link or use the Browse field at the top of thesecure gateway home page, the transmitted page content is rewritten.
If your system administrator enables the option for personal bookmarks, you can create your own links inthe Web Bookmarks panel by clicking the + (plus sign) icon.
Figure 5.3(1) Web Bookmarks panel
5.4 Files
The Files panel on the secure gateway home page provides a centralized location for links to files thatreside on an internal corporate network. If your system administrator enables the option for personalbookmarks, you can create your own links in the Files panel by clicking the + (plus sign) icon.
-
8/12/2019 Secure Gateway User Guide v1
19/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 19OF 26
Figure 5.4(1) Files panel
5.5 Terminal Sessions
Terminal services enable you to use Windows-based or Citrix applications that are running directly on yourcompanys terminal server. When you run an application on the terminal server, most actions areperformed on the server itself rather than your workstation. The terminal server only transmits keyboard,mouse, and display information over the network.
Figure 5.4(1) Terminal Sessions panel
If your workstation is connected to the Shaw network, is powered on and has remote desktop servicesenabled you can configure a session to connect to it remotely. Use the following settings as a guide:
Figure 5.4(2) Example settings for remote desktop connection
Using a smaller screen size or a smaller color depth may improve performance over slow internetconnections.
5.5.1 Telnet and SSH Sessions
If enabled by your administrator, you can use the Telnet and SSH protocols in the Browse field of thesecure gateway home page or the terminal sessions panel to browse to UNIX servers, networking devices,and other legacy applications that utilize terminal services.
-
8/12/2019 Secure Gateway User Guide v1
20/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 20OF 26
The secure terminal application is Java based and may not include functionality or emulation for allterminal types. If you are having issues using a text terminal application or console please contact the ITService Centre (4944) to explore alternative access methods.
5.6 Client Appl ication Sessions
The secure gateway secures traffic to applications that reside on your corporate servers (such as MicrosoftOutlook) through the Secure Application Manager.
To access an application through the Secure Application Manager, you must first start a SecureApplication Manager session through the secure gateway. You can then access your application. Onceyou start the application, the Secure Application Manager secures the traffic between your computer andthe applications server. Access to applications using this method is determined by your profile and accesslevel granted to you when your account was activated.
The secure gateway includes two versions of the Secure Application Manager. You can determine whichversion your administrator has enabled for you by viewing options in the Client Application Sessions panel
on the secure gateway home page:- WSAM- If you see the Windows Secure Application Manager option in the Client Application
Sessions panel, the secure gateway secures application connections using the Windows SecureApplications Manager (WSAM).
- JSAM- If you see the Java Secure Applications Manager in the Client Application Sessions panelor page, the secure gateway secures application connections using the Java Secure ApplicationsManager (JSAM). (To use JSAM, you or your administrator must install the Java Virtual Machineon your computer, see section 3.3.3.)
Secure application access is configured by the IT Security and Compliance group on a per user or pergroup basis based on the requirements to run applications remotely. SAM and JSAM sessions should onlybe used if no basic access can be used.
Figure 5.6(1) Client Application Sessions panel
5.6.1 Network Connect
Network Connect is a client application that the secure gateway installs on your computer. Once started,this application provides a secure tunnel through the secure gateway to your corporate network from aremote location, such as a customer site, conference kiosk, or home office. Using this secure tunnel, youcan access applications, servers, and files on Shaws internal network.
The network connect client provides the same functionality as a direct connection to the network would.
Network connect requires that a browser session be open to the secure gateway. If you close your activebrowser window while network connect is connected your connection will be terminated and you will needto login again
NOTE:You must have root privileges or the root password to install the network connect client on a Macor UNIX system and Administrator privileges on a Windows system.
Network connect will appear as a tray icon similar to host checker. You can disconnect your session outcompletely by tight clicking this icon. You can click on Basic View or Advanced View to see networkconnect status and network statistics.
-
8/12/2019 Secure Gateway User Guide v1
21/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 21OF 26
Figure 5.6.1(1) Network Connect
5.6.1.1 Network Connect and Internet Explorer
An important condition exists where the network connect client may fail to connect if Internet Explorer isconfigured to automatically detect its proxy settings. If you receive any errors trying to launch the networkconnect client please ensure that Internet Explorers Connection settings are correct.
To disable the automatic proxy detection:
1. choose Internet Options from the tools menu in Internet Explorer
2. click the Connections tab
3. click LAN Settings and ensure that the checkbox beside Automatically Detect Settings isunchecked
-
8/12/2019 Secure Gateway User Guide v1
22/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 22OF 26
Figure 5.6.1.1(1) Internet Explorer LAN Settings Window
6 Secure Meetings
Secure Meeting allows secure gateway users to securely schedule and hold online meetings between bothin-network and out-of-network users. In meetings, users can share their desktops and applications withone another over a secure connection, allowing everyone in the meeting to instantaneously shareelectronic data on-screen. Meeting attendees can also securely collaborate online by remote-controllingone another's desktops and through text chatting using a separate application window that does notinterfere with the presentation.
NOTE:Secure Meeting grants invitees different levels of access based on the compatibility of theircomputer configurations. To determine the level of accessibility allowed by your configuration, click theCheck Meeting Compatibility link in the meeting sign in page or invitation email.
NOTE:Before you begin using Secure Meeting, we recommend that navigate to the Preferences >
General tab and use the Daylight Savings Time option to adjust meeting times based on daylight savingsfor your area. By default, Secure Meeting uses the daylight savings time rules set on the server by youradministrator. However, you can override the server setting by specifying the country whose daylightsavings time rules your local client should observe instead. Secure Meeting adjusts your individual meetingtimes as necessary based the specified DST option and your browser settings.
6.1 Scheduling Meetings
Each Secure Meeting online meeting must be scheduled by a secure gateway user. Through the securegateway interface, the meeting creator specifies meeting details, including the meeting name, description,start time, start date, recurrence pattern, duration, password, a list of invitees, and the email addresses ofthe invitees.
Meeting creators can use either of the following applications to schedule meetings:- Secure Meeting end user consoleWhen the meeting creator uses the secure gateway end
user console to schedule a meeting, Secure Meeting displays it in the Meetings page of meeting-enabled secure gateway invitees. Secure Meeting also sends a notification email to each inviteewith a known email address.
- Microsoft OutlookWhen the meeting creator uses Microsoft Outlook to schedule a meeting,Outlook displays it in the Calendar page of other Outlook-enabled invitees and sends a notificationemail to each invitee through the Outlook email server. Secure Meeting also displays the meetingin the meeting creators Meetings page in the secure gateway end user console.
When specifying a list of invitees, the meeting creator must group them into one of two categories:
- In-network inviteesAn in-network invitee is a secure gateway user who signs into the same
secure gateway server as the meeting creator. An in-network invitee can access meetings throughthe secure gateway and can attend meetings without presenting a meeting password. Wheninviting an in-network user to a meeting, the meeting creator must specify the users securegateway username and authentication server.
- Out-of-network inviteesAn out-of-network invitee is a non-secure gateway user or a securegateway user who signs into a different secure gateway server as the meeting creator. Out-of-network invitees can only attend meetings if the Secure Meeting administrator enables it. Whenallowed to attend, out-of-network invitees must access meetings through a special URL that allowsthem to join the meeting without allowing them access to other resources on the secure gateway. Ifrequired by the meeting creator or administrator, out-of-network invitees must supply the meetingpassword for access. When inviting an out-of-network user to a meeting, the meeting creator mustspecify the users email address.
-
8/12/2019 Secure Gateway User Guide v1
23/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 23OF 26
NOTE:If an in-network invitee uses the meeting URL instead of the Meetings page in the secure gatewayend user console to join a meeting, Secure Meeting classifies the user as an out-of-network invitee.
When the meeting creator uses Microsoft Outlook to schedule a meeting, all invitees except the meeting
creator are classified as out-of-network invitees.
6.2 Conduct ing Meetings
The meeting conductor is an in-network user who is responsible for starting the meeting. Secure Meetinggrants the conductor the following responsibilities and capabilities in order to help him effectively run hismeeting:
- Starting the meeting presentationBefore the conductor joins, the other attendees can onlychat. They cannot view or make a presentation because the conductor is also the default meetingpresenter. The meeting presenter starts the meeting presentation by sharing his desktop orapplications with other attendees.
- Passing conductor and presenter rightsThe meeting conductor can choose to pass some orall of his responsibilities to another meeting attendee. For instance, after joining the meeting, theconductor can specify that another attendee should start the meeting presentation by passing thatattendee presenter rights. The conductor can pass his conductor rights to any other in-networkuser and pass his presenter rights to any other in-network or out-of-network user.
- Monitoring the meeting The meeting conductor is responsible for expelling meeting attendeesif necessary. The meeting conductor can also see the names of all meeting attendees so that hecan determine who is attending (even if the meeting creator or administrator chooses to hidenames)
- Ending the meetingThe meeting conductor is responsible for extending the meeting if it runsover the scheduled duration and closing the meeting when it is done.
For more information about conducting a meeting, access the Secure Meeting help from the Help menu in
the Secure Meeting Client window.
7 Logging Out
Once your internet browser is closed all of your VPN connections will be terminated. Shaw advises thatyou use the Sign Out button on the browser bar in the top right of the home page. By signing out the VPNwill cleanly shutdown all of the host checker and cache cleaner processes running on your system.
Not cleanly logging out can cause internet connection issues after disconnecting. If you are experiencingany strange behaviour after logging out, try logging in again and, once logged in, use the Sign Out buttoninstead of closing the browser.
8 Frequently Asked Questions (FAQ)
Q:Why are we using our e-mail address to login?A: Since duplicate usernames exist in both the SJRB and STARCHOICE domains it is necessary to usean identifier that is unique across both domains. Everyone has a unique e-mail address because two of thesame addresses cannot exist on the internet.
Q:What does SSL VPN mean?A: SSL stands for Secure Sockets Layer; it is a set of encryption protocols that standard web browsers useto secure communications. Your bank uses an SSL web connection, just like the secure gateway to makesure your information is safe as it travels across the internet. VPN Stands for Virtual Private Network, anextension of the corporate network to remote locations.
Q:Why doesnt everyone get VPN access by default?A: To minimize our risk of exposure and loss of confidential information Shaw must approve all VPN
requests and track which employees and vendors have remote access.
-
8/12/2019 Secure Gateway User Guide v1
24/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 24OF 26
Q:Do we use Citrix?A: Shaw does not currently have a Citrix remote access solution deployed. If you wish to access specificcorporate applications you can:
a) connect via remote desktop to your workstation
b) use Shaw equipment with the required applications are pre-installed
Q:Can I use my home computer to connect?A: Yes, if approved, you can access basic functionality and a limited set of internal websites and fileservers using your home computer as long as it passes the security checks when logging in. In order touse most advanced features or Network Connect you must be using a Shaw system.
Q:Can I connect from behind a router or firewall?A: Yes, an SSL VPN overcomes firewall and router issues that traditional VPNs cause because it uses astandard web browsing connection to pass secure traffic.
Q:Can I use the VPN for large quantity of users or critical third-party-access?A: In most cases we recommend working with IT to provision a point-to-point VPN rather than an SSL
VPN, however in special circumstances we can use the SSL VPN for third-party-access. Please see ITSecurity and Compliance for more information as a special agreement is required for third parties.
9 Troubleshooting
The following are common problems experienced by users when connecting to the secure gateway. If youare having trouble connecting or problems accessing a resource please look through these troubleshootingsteps before calling the IT Service Centre (4944)
Before attempting troubleshooting please ensure that you install all available updates, according to youroperating system vendors recommendations and check your operating system, browser and Javaversions to ensure they are supported (see section 3.2)
-
8/12/2019 Secure Gateway User Guide v1
25/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 25OF 26
Symptom Cause(s) Possible Resolution
I receive an error pagecannot be displayed when
trying to browse tohttps://ive.sjrb.ca
No internet connection
Service is unavailable
Check your internet connection, can youbrowse to other web sites?
The secure gateway could beundergoing maintenance. Please tryagain soon or contact 4944.
I receive the error you do nothave permission to loginwhen trying to browse tohttp://ive.sjrb.ca
Your internet browser is notsupported
Your browser is sending anunrecognized browser string
Please check the user guide (section3.2) to see if you browser is supported
You may be infected with a virus, if youdo not know how to change yourbrowser string please check for viruses.
I receive the errornc.windows.app.23791 whenlaunching Network Connect
You are running an un-patchedversion of Windows XP SP2
Internet Explorer is configured toAutomatically detect proxy
Run windows update and install thelatest patches or download a hot fix athttp://support.microsoft.com/?kbid=884020
Disable automatic proxy detection. Seesection 5.6.1.1
I receive an error Access tothe Web site is blocked byyour administrator whentrying to access an internalweb site
You do not have access to viewthat web site using VPN
Contact 4944 and request that youraccess be changed or reviewed
While loading the hostchecker or cache cleaner, thebrowser stops responding fora long period of time
An activex install is trying toinstall to the same location as aJava install
Close or terminate your internet browserand restart your computer. Tryconnecting again
I receive the error Yourcomputer's security isunsatisfactory when trying tobrowse to http://ive.sjrb.ca
You do not have the rights toinstall applications
You have malicious softwarerunning that the secure gatewaycannot terminate
Java is not installed properly
Anti-virus is not installed or out-of-date
You must have access to installapplications on your system. Lockeddown computers or kiosks may notfunction correctly for use with the securegateway.
Have your computer scanned for virusesand malicious software
See section 3.3.3 for instructions oninstalling or upgrading your Java versionIf you are using a Shaw system youshould connect it to the network and
perform an update to your anti-virussoftware or contact IT Desktop Services
I cannot connect to myworkstation with terminalservices
Your desktop is turned off
Remote Desktop is not enabledon your workstation
Make sure you leave your workstationon when you leave the office
Contact the IT Service Centre forinformation on enabling RemoteDesktop on your workstation
Outlook web access does notwork
You may not be authorized touse outlook web access or itmay be misconfigured onShaws server
Contact the IT Service Centre
Invalid username orpassword. Please re-enteryour user information.
Your account is locked out ordisabled
Contact the IT Service Centre
-
8/12/2019 Secure Gateway User Guide v1
26/26
SHAW SECURE VPNGATEWAY (IVE)
SECURE GATEWAY USER GUIDE V1.DOC
COMPANYCONFIDENTIAL PAGE 26OF 26
Symptom Cause(s) Possible Resolution
You may be entering the wronge-mail address
Check to make sure you are enteringyour PRIMARY e-mail. See section 4.2
You receive the error Theserver had an internal Error
The content mediation enginemay be restarting
The secure gateway could beundergoing maintenance. Please tryagain soon or contact 4944.
Network connect is notlaunching when using Firefoxon my Mac OSX system
Certain version conflicts on aMac system prevent this fromfunctioning properly
Install the latest version of the Safaribrowser (see section 3.3.5.1) and tryrunning network connect again.
10 Document Information
10.1 People
Role Person / PeopleContributors IT Security and Compliance
Reviewers IT Security and Compliance, IT Account Administration, IT Service Centre, IT BusinessRelations
Distribution See Reviewers
10.2 Document History
Date Version Status Description
16-Jan-07 0.1 Draft Initial document.
19-Jan-07 0.2 Final Draft First review and revision
22-Jan-07 0.5 Final Draft Spelling, format changes, >PDF
23-Jan-07 1.0 Final Updated status