netop remote control 7 5 l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
NetOp Remote Control 7.5 PowerPoint Presentation
Download Presentation
NetOp Remote Control 7.5

Loading in 2 Seconds...

play fullscreen
1 / 58

NetOp Remote Control 7.5 - PowerPoint PPT Presentation


  • 1369 Views
  • Uploaded on

NetOp Remote Control 7.5 Major product launches 1987 NetOp version 1.0 released (less than 1 Kb RAM) 1995 First NetOp solution with full Windows support 1996 NetOp for Windows 5.3 1998 NetOp for Windows 5.4 1999 NetOp Remote Control 6.0 2000 NetOp Remote Control 6.5

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'NetOp Remote Control 7.5' - Angelica


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
major product launches
Major product launches
  • 1987 NetOp version 1.0 released (less than 1 Kb RAM)
  • 1995 First NetOp solution with full Windows support
  • 1996 NetOp for Windows 5.3
  • 1998 NetOp for Windows 5.4
  • 1999 NetOp Remote Control 6.0
  • 2000 NetOp Remote Control 6.5
  • 2001 NetOp Remote Control 7.0
  • 2002 NetOp Remote Control 7.5
netop modules
NetOp modules

Host

  • Guest - Allows a PC to remote control any computer running the Host module.
  • Host - Allows a PC to be remote controlled by any computer running the Guest module.
  • Gateway - A special Host module which acts as a routing mechanism for NetOp traffic.
  • Name Server - A special Host module which can register NetOp names and resolve them into IP addresses.
  • Security Server - A special Host module which can centralize security authentication and logging.

Keyboard

Mouse

Screen

Guest

key features
Key features
  • Remote control in superior quality from multiple platforms.
  • File Manager with split screen, crash recovery and delta transfer.
  • Script module for automated file transfer without programming.
  • ActiveX components for integrating of file transfer and remote-control in own programs.
  • Audio and text chat for online communication.
  • Send Message for popup messages on remote computers
  • Inventory for collecting hardware and software information from remote computers
  • Protocols - TCP, UDP, IPX, NetBIOS, RAS, Serial, TAPI, CAPI, IrDA.
  • Security - local and centralized with multiple levels and options.
  • Strong encryption - the toughest industry standards.
  • Event logging - local and centralized.
key benefits
Key benefits
  • Speed is a must
  • Security beyond excellence
  • Stability — it’s a prerequisite
  • Superior cross-platform support
  • Multi-protocol communication
  • Ease of use
  • Scalability
speed is a must
Speed is a must
  • Among the fastest in the World
  • Only screen changes are transferred
  • Windows version uses GDI-hooking
  • Uses bitmap caching
  • Non-polling communication engine
  • Strong compression algorithm

Host

Guest

Screen changes

security beyond excellence
Security beyond excellence
  • Guest Access – To gain access to the Host, the Guest must pass up to 6 levels of security.
  • Guest Policy – set policies for passwords, action at disconnect and timeouts.
  • Program Options – includes Host user notification and stealth mode.
  • Maintenance password – password protect the Guest and Host configurations.
  • Strong encryption – encrypt sessions, enforce integrity check and perform secure key exchange.
  • Event logging – – log NetOp activity with up to 4 different techniques.
  • Log events – keep track of more than 100 different NetOp events.
guess access
Guess access
  • To gain access to the Host, the Guest must pass up to 6 levels of security.

Logon Process

MAC/IP

Address

Closed

User

Group

Authen-

tication

Call

back

Manual

Access

Control

Authori-

zation

Guest

Host

mac ip address

MAC/IP

Address

MAC/IP address
  • The Host can filter the Guest addresses it will communicate with based on:
    • MAC address (IPX and NetBIOS).
    • IP address (TCP and UDP).
  • Once enabled, the Host will only communicate with Guest computers, if their addresses are listed.
  • It’s designed to use the original MAC/IP address of the Guest.
  • The logon process is terminated, if the MAC/IP address check fails.
closed user group

Closed

User

Group

Closed user group
  • Closed User Group Serial numbers are produced by Danware to:
    • Deny any communication with modules not using the same Closed User Group Serial number.
    • Prevent employees from using the modules outside the organization.
    • Prevent access from outside the organization.
  • They are produced upon request for Site and Enterprise licenses.
  • The logon process is terminated, if the Closed User Group check fails.
authentication

Authen-

tication

Authentication
  • Authentication is the process of verifying the identity of a user or a system.
  • Local authentication
    • The information about identities is available in a database on each local computer
  • Centralized authentication
    • The information about identities is available in a database on a shared remote computer

Centralized

Host

Local

  • The logon process is terminated, if the Authentication process fails.
slide12

Local authentication

  • Default
    • Set a default password for all Guest users
    • One local security role
  • Individual
    • Set individual Guest IDs and passwords for each user
    • Multiple local security roles
  • Local Windows User Database
    • Authenticate users against the local Windows NT, 2000 or XP user database
    • Multiple local security roles
slide13

Centralized authentication

  • Windows NT SAM database
    • Authenticate users against Windows NT SAM database
    • Multiple local security roles
  • Microsoft Active Directory
    • Authenticate users against Windows 2000 Active Directory Service
    • Multiple local security roles
slide14

Centralized authentication ...

Configuration

  • NetOp Security Server
    • Special Host module
    • Resolve queries about session permissions and rights across a network connection
    • Forward the queries to an ODBC enabled database
    • Separate Security Manager for configuration of the ODBC database
    • Can use Windows Domain groups and users
    • Backwards compatible
    • Multiple centralized security roles

1

Guest

Call

Security Manager

ODBCdatabase

Host

Security Server

2

Query

3

Query

call back

Call

back

Call back
  • Access to the Host computer is controlled by the location of the Guest user.
    • For modem, ISDN or TCP
    • Depends on the authenticated identity.
    • Can call back to a fixed address or to a Guest controlled address (roving).
  • The logon process is terminated, if the Call back fails.
manual access control

Manual

Access

Control

Manual access control
  • Access to the Host computer manually controlled by the Host user.
    • The Host user can allow or deny the access request.
    • Option to bypass Confirm access, if the computer is in logged off state.
    • Customize the message appearing on the Host computer.
  • The logon process is terminated, if the Manual Access Control denies the access.
authorization

Authori-

zation

Authorization
  • Authorization is the process of determining what actions an identity is permitted to perform.
  • A set of actions is organized in a Security Role.
  • An authenticated identity can be member of one or more Security Roles.
  • The final set of actions are the accumulated actions from all security roles where the authenticated identity has membership.
  • The logon process is terminated, if the authenticated identity isn’t member of any Security Roles.
slide18

Security roles

  • Security roles
    • Allow or deny actions for a Guest during session
  • Two default roles
    • Full access
    • View only
  • Multiple roles
    • Add multiple roles
    • Customize your own roles
slide19

Guest policy

  • Password - Control action if the authentication fails after a specifiy number of tries:
    • Hang up
    • Disable Host
    • Restart Windows
  • Hang up – Control the action after disconnect:
    • None
    • Lock computer
    • Log off Windows
    • Restart Windows
slide20

Guest policy ...

  • File Transfer – Disable File Transfer before local login to ensure the file systems rights are engaged by having the user log on before any file transfer can be initiated.
  • Recorded sessions – Save the session for later replay and documentation
  • Timeout – Disconnects if the number of seconds are exceeded:
    • Confirm access
    • Authentication
    • Inactivity
slide21

Maintenance password

  • Maintenance password
    • Protects all Host configuration.
    • Prevents Host user from exiting or stopping the Host program.
program options
Program options
  • Notification
    • Messagebox or tone upon, during and after a session.
  • Stealth mode
    • Hide the fact your computer is running a Host module
strong encryption
Strong encryption
  • EncryptionProtects against third party being able to read a data-stream transmitted between two entities by using AES for encryption with key lengths up to 256 bits.
  • Data integrityProtects against third party being able to alter a data-stream transmitted between two entities by using HMAC for integrity check based on 160-bit SHA-1 or 256-bit SHA-256.
  • Key exchangeProtects against compromised keys by using a combination of up to 2048 bits Diffie-Hellman, 256 bits AES and 512 bits SHA HMACs integrity check.
  • NetOp 6.x/5.x compatible modeAllow communication with older NetOp modules
event logging
Event logging
  • Logging to Security ServerThe NetOp modules are capable of sending event information across the network to the Security Server NetOp Log.
  • Logging to Windows event logThe NetOp modules can now write events directly to the Windows Event Log.
  • Logging to SNMP management consoleWrite events to a SNMP enabled Management console like HP OpenView by sending SNMP traps.
  • Extended set of eventsThe set offers more than 100 events to choose between.
stability
Stability
  • Unique communication recovery
  • Interferes little as possible with the operating system
  • Does not replace the Windows display device driver
  • On-the-fly configuration check
  • Low CPU consumption
superior cross platform support
Superior cross-platform support
  • Windows XP, 2000, Terminal Server, NT 4.0, NT 3.51, ME, 98, 95
    • Guest and Host with full functionality
  • Windows CE
    • Guest with remote-control functionality
    • Host with remote-control and text chat functionality
  • ActiveX
    • Guest component with remotecontrolfunctionality
  • Linux
    • Guest with remote-control functionality
    • Host with remote-control, file transfer and text chat functionality
  • Solaris
    • Host with remote-control, file transfer and text chat functionality
  • Symbian OS
    • Guest with remote-control functionality
superior cross platform support27
Superior cross-platform support ...
  • Most organizations consists of multiple operating systems.
    • Remote control between different operatingsystems.
    • Unique forward and backward compability.
    • Exchange of feature set to avoid any conflicts.
windows support
Windows support
  • Windows Guest
    • Full functionality available
windows support31
Windows support ...
  • Windows Host
    • Full functionality available
windows ce support
Windows CE support
  • Windows CE Guest
    • Remote control functionality available
    • Zoom and full screen mode
    • Full GDI hooking and bitmap mode
    • UDP and TCP
    • Gateway support (inbound)
    • Name Server support
    • Windows Security Management support
windows ce support33
Windows CE support ...
  • Windows CE Host
    • Remote control functionality available
    • Enhanced bitmap mode
    • UDP and TCP
    • Default password security
    • System password security
    • Confirm access
    • Text chat
linux support
Linux support
  • Linux Guest
    • Remote control functionality available
    • Graphical user interface similiar to Windows Guest
    • Phonebook compatibility with the Windows Guest
    • UDP and TCP
    • Gateway support (inbound)
    • Windows Security Management support
linux support35
Linux support ...
  • Linux Host
    • Remote control functionality available
    • Enhanced bitmap mode
    • UDP and TCP
    • Default password security
    • System password security
    • Confirm access
    • File transfer
    • Text chat
solaris support
Solaris support
  • Solaris Host
    • Remote control functionality available
    • Enhanced bitmap mode
    • UDP and TCP
    • Default password security
    • System password security
    • Confirm access
    • File transfer
    • Text chat
activex support
ActiveX support

Call

  • ActiveX Component
    • Use from Internet Explorer
    • Use from any other application

2

Host

Internet Explorer

Web Server

Load ActiveX

1

symbian os support
Symbian OS support
  • Symbian OS Guest
    • Remote control functionality available
    • Enhanced bitmap mode
    • TCP
    • Inbound Gateway support
    • Recent Host list
    • Full screen / windowed / zoom mode
    • Keyboard / mouse control
    • Reboot Host
    • Lock Host keyboard
    • Blank Host display
    • Send special keystrokes
terminal server support
Terminal Server support

Terminal Server

Host

Host

  • Terminal Server
    • Call any Host within a session
    • Call the Terminal Server Console
    • Call any Host from a Guest within a session
    • Call any Host within a session from outside the Terminal Server via the NetOp Gateway

Call

Route call

Guest

Guest

Gateway

2

Call

multi protocol communication
Multi-protocol communication
  • Communication – supports all commonly used communication protocols.
  • Options – multiple settings related to communication are available.
  • Multi-protocol router – The NetOp Gateway lets you route NetOp traffic across different protocols.
  • IP connections made easy – The NetOp Name Server registers Guest/Host names and IP addresses. Resolves names into IP addresses upon request.
communication
Communication
  • Protocol support
    • TCP, UDP, IPX,NetBIOS, Windows modem, CAPI, Dial-up networking, Serial or IrDA
  • Communication profiles
    • A specific protocol with related settings
    • Initialize and communicate via multiple profiles
  • Options
    • Inactivity timeout, auto-select TCP / UDP port, keep alive-message, obtain list of IPX networks, call back based on Guest ID / password, A-number check (ISDN CAPI only).
multi protocol router
Multi-protocol router

Guest

  • NetOp Gateway
    • Specialized Host module
    • Multiple protocol routing
    • Dial-in ability (Modem/ISDN to LAN)
    • Dial-out ability (LAN to Modem pool)
    • WAN enabled (supports NAT, 1-to-many routing)
    • Multiple device support (e.g. multiple modems)

TCP/IPIPXNetBIOSModemISDNAPPCIrDASerial

Gateway

Host

ip connections made easy
IP connections made easy

1

  • NetOp Name Server
    • Centralized name management that register NetOp names and resolve them into IP addresses.
    • Solves the problem of finding Hosts using DHCP based IP addresses and not having any DNS registration.
    • Two public NetOp Name Servers are available on the Internet.

Call

3

Register

Host

Guest

Name Server

2

Resolve name

ease of use
Ease of use
  • Guest control panel – the intuitive interface and variable settings mean you can literally mold the system to support the way you do business.
  • Host connectivity – connect to a Host PC via multiple names.
  • Session – offers multiple session types, independent windows and a powerful, floating session toolbar.
  • Requesting help – Host users can request help from multiple Guests at the touch of a button.
  • Versatile installation – NetOp is easy to install and deploy, even on very large networks, thanks to the numerous installation methods available.
guest control panel
Guest control panel
  • Hierarchical address book
    • Organize your remote PCs in a scalable, multi-level folder structure for easy access.
    • Individual connection properties.
    • Start sessions with multiple Hosts by a single command.
    • Import / export connection files from / to a comma-delimited file.
  • Quick connect
    • Call Hosts via a browse list or directly using the relevant address
    • Default connection properties
guest control panel46
Guest control panel ...
  • Current connections
    • List the running sessions and start or stop sessions.
  • History list
    • Contains a connection file for each session in the past. Can be copied to the address book.
  • Help request
    • View all incoming requests. A sound file is played when a help-request arrives. You can substitute this file with a customized file.
  • Session recording
    • It is possible to record and review past remote-control sessions.
guest control panel47
Guest control panel ...
  • Scripting utility
    • Start or schedule file transfers and launch programs automatically from an easy-to-use user interface or batch script language.
    • An ActiveX component is available for programming languages supporting OLE automation, for example Visual Basic.
  • Inventory
    • Review collected hardware and software for remote Hosts
  • Flexible user interface
    • Customize the Guest interface by showing only the needed tabs and toolbars.
    • Copy connection files to your desktop for easy access or use the Windows Explorer directly to start NetOp sessions.
    • File associations for connection, recording and script files are created during installation.
host connectivity
Host connectivity
  • Connect to a Host PC via
    • User-defined ID
    • IP or MAC address
    • Long DNS name
    • Environment variable
    • Windows computer name
    • Windows logon name
session remote control
Session – Remote control

1

  • Remote control
    • View desktops in full-screen, scalable or windowed mode.
    • Multiple, individual session windows
    • Auto-scroll feature available for Host screens larger than the viewing window.
    • Command prompts can be viewed in full-screen or windowed mode.
    • Full control of remote keyboard and mouse.
    • Cascade remote control.

Call

Guest

Host

Host + Guest

2

Call

”Cascade remote control”

session file transfer
Session - File transfer
  • The File Manager offers interactive, split-screen drag-and-drop functionality.
    • Copy
    • Move
    • Synchronize
    • Clone
    • Crash recovery
    • Delta transfer
    • Select files/directories
    • Inverse selections
    • Progress metering
    • History list
    • Hot-keys
    • Transfer log
    • ”Tree-view" log viewer
    • Local mode operation
session other types
Session – Other types
  • Text chat
    • Communicate with Host users online in text mode.
  • Audio chat
    • Communicate with Host users verbally.
  • Run program
    • With this useful function you can launch pre-planned commands or applications on the Host computers remotely.
  • Execute command
    • Initiate commands on the remote Host computer: Log off, Shut down, Restart, Lock computer, Wake on LAN
session other types52
Session – Other types ...
  • Send message
    • The Guest user has a tool to edit and send messages in RTF to one or more Windows Host PCs.
    • The messages will pop up on the Host screen and can contain text using different fonts, styles, sizes and colors and even include links for e.g. web pages or e-mail addresses.
    • The messages can be saved on both Guest and Host for later use.
session other types53
Session – Other types ...
  • Inventory
    • The Guest can collect details about installed hardware and software for Windows Hosts.
    • Saved in a XML file for each Host
    • Process the XML files after scanning by calling an external application
    • The Guest displays the details in a hierarchical view
    • Use the phonebook to collect inventory from multiple Hosts
session toolbar
Session - Toolbar
  • Powerful floating toolbar
    • Remote control
    • File transfer
    • Text chat
    • Audio Chat
    • Run program
    • Execute command
    • Send message
    • Inventory
    • Hang up
    • Full screen / windowed mode
    • Ctrl-Esc ,Ctrl-Alt-Del, Restart
    • Transfer clipboard, Marker mode
    • Blank display, Lock keyboard and mouse.
requesting help
Requesting Help
  • Requesting help
    • Host users can request help from multiple Guests at the touch of a button.
    • Customize help request with a pre-defined message, specific help provider service, timeout and specific communication protocol.
    • A request help icon can be added to the tray, even when Host runs in stealth mode.
    • External applications can activate the Request help from a command line and include Help provide name, address and the description text.
versatile installation
Versatile installation
  • Versatile installation
    • NetOp is easy to install and deploy, even on very large networks, thanks to the numerous installation methods available.
    • Choose between Windows Installer and InstallShield for interactive installation or Silent Install for automatic scripted installation.
  • Deployment utility
    • Remotely install Host modules on Windows NT, 2000 and XP, or update Host modules on any 32-bit Windows platform.
    • This is a separate module licensed with the Guest module.
scalability
Scalability
  • NetOp can scale to fit any organization
    • The Guest phonebook can handle from 1 Host and upwards – only limited by disk space
    • The network traffic generated by NetOp does not increase with the number of computers
    • Multiple protocol support spans from simple point-to-point connections and up to enterprise WAN.
    • The Guest module can integrate into most management systems
that s netop remote control 7 5
That’s NetOp Remote Control 7.5

Fast, scalable, secure remote-control software for ITprofessionals