netop remote control 7 5 n.
Skip this Video
Loading SlideShow in 5 Seconds..
NetOp Remote Control 7.5 PowerPoint Presentation
Download Presentation
NetOp Remote Control 7.5

NetOp Remote Control 7.5

1472 Views Download Presentation
Download Presentation

NetOp Remote Control 7.5

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. NetOp Remote Control 7.5

  2. Major product launches • 1987 NetOp version 1.0 released (less than 1 Kb RAM) • 1995 First NetOp solution with full Windows support • 1996 NetOp for Windows 5.3 • 1998 NetOp for Windows 5.4 • 1999 NetOp Remote Control 6.0 • 2000 NetOp Remote Control 6.5 • 2001 NetOp Remote Control 7.0 • 2002 NetOp Remote Control 7.5

  3. NetOp modules Host • Guest - Allows a PC to remote control any computer running the Host module. • Host - Allows a PC to be remote controlled by any computer running the Guest module. • Gateway - A special Host module which acts as a routing mechanism for NetOp traffic. • Name Server - A special Host module which can register NetOp names and resolve them into IP addresses. • Security Server - A special Host module which can centralize security authentication and logging. Keyboard Mouse Screen Guest

  4. Key features • Remote control in superior quality from multiple platforms. • File Manager with split screen, crash recovery and delta transfer. • Script module for automated file transfer without programming. • ActiveX components for integrating of file transfer and remote-control in own programs. • Audio and text chat for online communication. • Send Message for popup messages on remote computers • Inventory for collecting hardware and software information from remote computers • Protocols - TCP, UDP, IPX, NetBIOS, RAS, Serial, TAPI, CAPI, IrDA. • Security - local and centralized with multiple levels and options. • Strong encryption - the toughest industry standards. • Event logging - local and centralized.

  5. Key benefits • Speed is a must • Security beyond excellence • Stability — it’s a prerequisite • Superior cross-platform support • Multi-protocol communication • Ease of use • Scalability

  6. Speed is a must • Among the fastest in the World • Only screen changes are transferred • Windows version uses GDI-hooking • Uses bitmap caching • Non-polling communication engine • Strong compression algorithm Host Guest Screen changes

  7. Security beyond excellence • Guest Access – To gain access to the Host, the Guest must pass up to 6 levels of security. • Guest Policy – set policies for passwords, action at disconnect and timeouts. • Program Options – includes Host user notification and stealth mode. • Maintenance password – password protect the Guest and Host configurations. • Strong encryption – encrypt sessions, enforce integrity check and perform secure key exchange. • Event logging – – log NetOp activity with up to 4 different techniques. • Log events – keep track of more than 100 different NetOp events.

  8. Guess access • To gain access to the Host, the Guest must pass up to 6 levels of security. Logon Process MAC/IP Address Closed User Group Authen- tication Call back Manual Access Control Authori- zation Guest Host

  9. MAC/IP Address MAC/IP address • The Host can filter the Guest addresses it will communicate with based on: • MAC address (IPX and NetBIOS). • IP address (TCP and UDP). • Once enabled, the Host will only communicate with Guest computers, if their addresses are listed. • It’s designed to use the original MAC/IP address of the Guest. • The logon process is terminated, if the MAC/IP address check fails.

  10. Closed User Group Closed user group • Closed User Group Serial numbers are produced by Danware to: • Deny any communication with modules not using the same Closed User Group Serial number. • Prevent employees from using the modules outside the organization. • Prevent access from outside the organization. • They are produced upon request for Site and Enterprise licenses. • The logon process is terminated, if the Closed User Group check fails.

  11. Authen- tication Authentication • Authentication is the process of verifying the identity of a user or a system. • Local authentication • The information about identities is available in a database on each local computer • Centralized authentication • The information about identities is available in a database on a shared remote computer Centralized Host Local • The logon process is terminated, if the Authentication process fails.

  12. Local authentication • Default • Set a default password for all Guest users • One local security role • Individual • Set individual Guest IDs and passwords for each user • Multiple local security roles • Local Windows User Database • Authenticate users against the local Windows NT, 2000 or XP user database • Multiple local security roles

  13. Centralized authentication • Windows NT SAM database • Authenticate users against Windows NT SAM database • Multiple local security roles • Microsoft Active Directory • Authenticate users against Windows 2000 Active Directory Service • Multiple local security roles

  14. Centralized authentication ... Configuration • NetOp Security Server • Special Host module • Resolve queries about session permissions and rights across a network connection • Forward the queries to an ODBC enabled database • Separate Security Manager for configuration of the ODBC database • Can use Windows Domain groups and users • Backwards compatible • Multiple centralized security roles 1 Guest Call Security Manager ODBCdatabase Host Security Server 2 Query 3 Query

  15. Call back Call back • Access to the Host computer is controlled by the location of the Guest user. • For modem, ISDN or TCP • Depends on the authenticated identity. • Can call back to a fixed address or to a Guest controlled address (roving). • The logon process is terminated, if the Call back fails.

  16. Manual Access Control Manual access control • Access to the Host computer manually controlled by the Host user. • The Host user can allow or deny the access request. • Option to bypass Confirm access, if the computer is in logged off state. • Customize the message appearing on the Host computer. • The logon process is terminated, if the Manual Access Control denies the access.

  17. Authori- zation Authorization • Authorization is the process of determining what actions an identity is permitted to perform. • A set of actions is organized in a Security Role. • An authenticated identity can be member of one or more Security Roles. • The final set of actions are the accumulated actions from all security roles where the authenticated identity has membership. • The logon process is terminated, if the authenticated identity isn’t member of any Security Roles.

  18. Security roles • Security roles • Allow or deny actions for a Guest during session • Two default roles • Full access • View only • Multiple roles • Add multiple roles • Customize your own roles

  19. Guest policy • Password - Control action if the authentication fails after a specifiy number of tries: • Hang up • Disable Host • Restart Windows • Hang up – Control the action after disconnect: • None • Lock computer • Log off Windows • Restart Windows

  20. Guest policy ... • File Transfer – Disable File Transfer before local login to ensure the file systems rights are engaged by having the user log on before any file transfer can be initiated. • Recorded sessions – Save the session for later replay and documentation • Timeout – Disconnects if the number of seconds are exceeded: • Confirm access • Authentication • Inactivity

  21. Maintenance password • Maintenance password • Protects all Host configuration. • Prevents Host user from exiting or stopping the Host program.

  22. Program options • Notification • Messagebox or tone upon, during and after a session. • Stealth mode • Hide the fact your computer is running a Host module

  23. Strong encryption • EncryptionProtects against third party being able to read a data-stream transmitted between two entities by using AES for encryption with key lengths up to 256 bits. • Data integrityProtects against third party being able to alter a data-stream transmitted between two entities by using HMAC for integrity check based on 160-bit SHA-1 or 256-bit SHA-256. • Key exchangeProtects against compromised keys by using a combination of up to 2048 bits Diffie-Hellman, 256 bits AES and 512 bits SHA HMACs integrity check. • NetOp 6.x/5.x compatible modeAllow communication with older NetOp modules

  24. Event logging • Logging to Security ServerThe NetOp modules are capable of sending event information across the network to the Security Server NetOp Log. • Logging to Windows event logThe NetOp modules can now write events directly to the Windows Event Log. • Logging to SNMP management consoleWrite events to a SNMP enabled Management console like HP OpenView by sending SNMP traps. • Extended set of eventsThe set offers more than 100 events to choose between.

  25. Stability • Unique communication recovery • Interferes little as possible with the operating system • Does not replace the Windows display device driver • On-the-fly configuration check • Low CPU consumption

  26. Superior cross-platform support • Windows XP, 2000, Terminal Server, NT 4.0, NT 3.51, ME, 98, 95 • Guest and Host with full functionality • Windows CE • Guest with remote-control functionality • Host with remote-control and text chat functionality • ActiveX • Guest component with remotecontrolfunctionality • Linux • Guest with remote-control functionality • Host with remote-control, file transfer and text chat functionality • Solaris • Host with remote-control, file transfer and text chat functionality • Symbian OS • Guest with remote-control functionality

  27. Superior cross-platform support ... • Most organizations consists of multiple operating systems. • Remote control between different operatingsystems. • Unique forward and backward compability. • Exchange of feature set to avoid any conflicts.

  28. Guest remote-control compatibility matrix * Selected protocols

  29. Host remote-control compatibility matrix

  30. Windows support • Windows Guest • Full functionality available

  31. Windows support ... • Windows Host • Full functionality available

  32. Windows CE support • Windows CE Guest • Remote control functionality available • Zoom and full screen mode • Full GDI hooking and bitmap mode • UDP and TCP • Gateway support (inbound) • Name Server support • Windows Security Management support

  33. Windows CE support ... • Windows CE Host • Remote control functionality available • Enhanced bitmap mode • UDP and TCP • Default password security • System password security • Confirm access • Text chat

  34. Linux support • Linux Guest • Remote control functionality available • Graphical user interface similiar to Windows Guest • Phonebook compatibility with the Windows Guest • UDP and TCP • Gateway support (inbound) • Windows Security Management support

  35. Linux support ... • Linux Host • Remote control functionality available • Enhanced bitmap mode • UDP and TCP • Default password security • System password security • Confirm access • File transfer • Text chat

  36. Solaris support • Solaris Host • Remote control functionality available • Enhanced bitmap mode • UDP and TCP • Default password security • System password security • Confirm access • File transfer • Text chat

  37. ActiveX support Call • ActiveX Component • Use from Internet Explorer • Use from any other application 2 Host Internet Explorer Web Server Load ActiveX 1

  38. Symbian OS support • Symbian OS Guest • Remote control functionality available • Enhanced bitmap mode • TCP • Inbound Gateway support • Recent Host list • Full screen / windowed / zoom mode • Keyboard / mouse control • Reboot Host • Lock Host keyboard • Blank Host display • Send special keystrokes

  39. Terminal Server support Terminal Server Host Host • Terminal Server • Call any Host within a session • Call the Terminal Server Console • Call any Host from a Guest within a session • Call any Host within a session from outside the Terminal Server via the NetOp Gateway Call Route call Guest Guest Gateway 2 Call

  40. Multi-protocol communication • Communication – supports all commonly used communication protocols. • Options – multiple settings related to communication are available. • Multi-protocol router – The NetOp Gateway lets you route NetOp traffic across different protocols. • IP connections made easy – The NetOp Name Server registers Guest/Host names and IP addresses. Resolves names into IP addresses upon request.

  41. Communication • Protocol support • TCP, UDP, IPX,NetBIOS, Windows modem, CAPI, Dial-up networking, Serial or IrDA • Communication profiles • A specific protocol with related settings • Initialize and communicate via multiple profiles • Options • Inactivity timeout, auto-select TCP / UDP port, keep alive-message, obtain list of IPX networks, call back based on Guest ID / password, A-number check (ISDN CAPI only).

  42. Multi-protocol router Guest • NetOp Gateway • Specialized Host module • Multiple protocol routing • Dial-in ability (Modem/ISDN to LAN) • Dial-out ability (LAN to Modem pool) • WAN enabled (supports NAT, 1-to-many routing) • Multiple device support (e.g. multiple modems) TCP/IPIPXNetBIOSModemISDNAPPCIrDASerial Gateway Host

  43. IP connections made easy 1 • NetOp Name Server • Centralized name management that register NetOp names and resolve them into IP addresses. • Solves the problem of finding Hosts using DHCP based IP addresses and not having any DNS registration. • Two public NetOp Name Servers are available on the Internet. Call 3 Register Host Guest Name Server 2 Resolve name

  44. Ease of use • Guest control panel – the intuitive interface and variable settings mean you can literally mold the system to support the way you do business. • Host connectivity – connect to a Host PC via multiple names. • Session – offers multiple session types, independent windows and a powerful, floating session toolbar. • Requesting help – Host users can request help from multiple Guests at the touch of a button. • Versatile installation – NetOp is easy to install and deploy, even on very large networks, thanks to the numerous installation methods available.

  45. Guest control panel • Hierarchical address book • Organize your remote PCs in a scalable, multi-level folder structure for easy access. • Individual connection properties. • Start sessions with multiple Hosts by a single command. • Import / export connection files from / to a comma-delimited file. • Quick connect • Call Hosts via a browse list or directly using the relevant address • Default connection properties

  46. Guest control panel ... • Current connections • List the running sessions and start or stop sessions. • History list • Contains a connection file for each session in the past. Can be copied to the address book. • Help request • View all incoming requests. A sound file is played when a help-request arrives. You can substitute this file with a customized file. • Session recording • It is possible to record and review past remote-control sessions.

  47. Guest control panel ... • Scripting utility • Start or schedule file transfers and launch programs automatically from an easy-to-use user interface or batch script language. • An ActiveX component is available for programming languages supporting OLE automation, for example Visual Basic. • Inventory • Review collected hardware and software for remote Hosts • Flexible user interface • Customize the Guest interface by showing only the needed tabs and toolbars. • Copy connection files to your desktop for easy access or use the Windows Explorer directly to start NetOp sessions. • File associations for connection, recording and script files are created during installation.

  48. Host connectivity • Connect to a Host PC via • User-defined ID • IP or MAC address • Long DNS name • Environment variable • Windows computer name • Windows logon name

  49. Session – Remote control 1 • Remote control • View desktops in full-screen, scalable or windowed mode. • Multiple, individual session windows • Auto-scroll feature available for Host screens larger than the viewing window. • Command prompts can be viewed in full-screen or windowed mode. • Full control of remote keyboard and mouse. • Cascade remote control. Call Guest Host Host + Guest 2 Call ”Cascade remote control”

  50. Session - File transfer • The File Manager offers interactive, split-screen drag-and-drop functionality. • Copy • Move • Synchronize • Clone • Crash recovery • Delta transfer • Select files/directories • Inverse selections • Progress metering • History list • Hot-keys • Transfer log • ”Tree-view" log viewer • Local mode operation