1 / 58

NetOp Remote Control 7.5

NetOp Remote Control 7.5 Major product launches 1987 NetOp version 1.0 released (less than 1 Kb RAM) 1995 First NetOp solution with full Windows support 1996 NetOp for Windows 5.3 1998 NetOp for Windows 5.4 1999 NetOp Remote Control 6.0 2000 NetOp Remote Control 6.5

Angelica
Download Presentation

NetOp Remote Control 7.5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NetOp Remote Control 7.5

  2. Major product launches • 1987 NetOp version 1.0 released (less than 1 Kb RAM) • 1995 First NetOp solution with full Windows support • 1996 NetOp for Windows 5.3 • 1998 NetOp for Windows 5.4 • 1999 NetOp Remote Control 6.0 • 2000 NetOp Remote Control 6.5 • 2001 NetOp Remote Control 7.0 • 2002 NetOp Remote Control 7.5

  3. NetOp modules Host • Guest - Allows a PC to remote control any computer running the Host module. • Host - Allows a PC to be remote controlled by any computer running the Guest module. • Gateway - A special Host module which acts as a routing mechanism for NetOp traffic. • Name Server - A special Host module which can register NetOp names and resolve them into IP addresses. • Security Server - A special Host module which can centralize security authentication and logging. Keyboard Mouse Screen Guest

  4. Key features • Remote control in superior quality from multiple platforms. • File Manager with split screen, crash recovery and delta transfer. • Script module for automated file transfer without programming. • ActiveX components for integrating of file transfer and remote-control in own programs. • Audio and text chat for online communication. • Send Message for popup messages on remote computers • Inventory for collecting hardware and software information from remote computers • Protocols - TCP, UDP, IPX, NetBIOS, RAS, Serial, TAPI, CAPI, IrDA. • Security - local and centralized with multiple levels and options. • Strong encryption - the toughest industry standards. • Event logging - local and centralized.

  5. Key benefits • Speed is a must • Security beyond excellence • Stability — it’s a prerequisite • Superior cross-platform support • Multi-protocol communication • Ease of use • Scalability

  6. Speed is a must • Among the fastest in the World • Only screen changes are transferred • Windows version uses GDI-hooking • Uses bitmap caching • Non-polling communication engine • Strong compression algorithm Host Guest Screen changes

  7. Security beyond excellence • Guest Access – To gain access to the Host, the Guest must pass up to 6 levels of security. • Guest Policy – set policies for passwords, action at disconnect and timeouts. • Program Options – includes Host user notification and stealth mode. • Maintenance password – password protect the Guest and Host configurations. • Strong encryption – encrypt sessions, enforce integrity check and perform secure key exchange. • Event logging – – log NetOp activity with up to 4 different techniques. • Log events – keep track of more than 100 different NetOp events.

  8. Guess access • To gain access to the Host, the Guest must pass up to 6 levels of security. Logon Process MAC/IP Address Closed User Group Authen- tication Call back Manual Access Control Authori- zation Guest Host

  9. MAC/IP Address MAC/IP address • The Host can filter the Guest addresses it will communicate with based on: • MAC address (IPX and NetBIOS). • IP address (TCP and UDP). • Once enabled, the Host will only communicate with Guest computers, if their addresses are listed. • It’s designed to use the original MAC/IP address of the Guest. • The logon process is terminated, if the MAC/IP address check fails.

  10. Closed User Group Closed user group • Closed User Group Serial numbers are produced by Danware to: • Deny any communication with modules not using the same Closed User Group Serial number. • Prevent employees from using the modules outside the organization. • Prevent access from outside the organization. • They are produced upon request for Site and Enterprise licenses. • The logon process is terminated, if the Closed User Group check fails.

  11. Authen- tication Authentication • Authentication is the process of verifying the identity of a user or a system. • Local authentication • The information about identities is available in a database on each local computer • Centralized authentication • The information about identities is available in a database on a shared remote computer Centralized Host Local • The logon process is terminated, if the Authentication process fails.

  12. Local authentication • Default • Set a default password for all Guest users • One local security role • Individual • Set individual Guest IDs and passwords for each user • Multiple local security roles • Local Windows User Database • Authenticate users against the local Windows NT, 2000 or XP user database • Multiple local security roles

  13. Centralized authentication • Windows NT SAM database • Authenticate users against Windows NT SAM database • Multiple local security roles • Microsoft Active Directory • Authenticate users against Windows 2000 Active Directory Service • Multiple local security roles

  14. Centralized authentication ... Configuration • NetOp Security Server • Special Host module • Resolve queries about session permissions and rights across a network connection • Forward the queries to an ODBC enabled database • Separate Security Manager for configuration of the ODBC database • Can use Windows Domain groups and users • Backwards compatible • Multiple centralized security roles 1 Guest Call Security Manager ODBCdatabase Host Security Server 2 Query 3 Query

  15. Call back Call back • Access to the Host computer is controlled by the location of the Guest user. • For modem, ISDN or TCP • Depends on the authenticated identity. • Can call back to a fixed address or to a Guest controlled address (roving). • The logon process is terminated, if the Call back fails.

  16. Manual Access Control Manual access control • Access to the Host computer manually controlled by the Host user. • The Host user can allow or deny the access request. • Option to bypass Confirm access, if the computer is in logged off state. • Customize the message appearing on the Host computer. • The logon process is terminated, if the Manual Access Control denies the access.

  17. Authori- zation Authorization • Authorization is the process of determining what actions an identity is permitted to perform. • A set of actions is organized in a Security Role. • An authenticated identity can be member of one or more Security Roles. • The final set of actions are the accumulated actions from all security roles where the authenticated identity has membership. • The logon process is terminated, if the authenticated identity isn’t member of any Security Roles.

  18. Security roles • Security roles • Allow or deny actions for a Guest during session • Two default roles • Full access • View only • Multiple roles • Add multiple roles • Customize your own roles

  19. Guest policy • Password - Control action if the authentication fails after a specifiy number of tries: • Hang up • Disable Host • Restart Windows • Hang up – Control the action after disconnect: • None • Lock computer • Log off Windows • Restart Windows

  20. Guest policy ... • File Transfer – Disable File Transfer before local login to ensure the file systems rights are engaged by having the user log on before any file transfer can be initiated. • Recorded sessions – Save the session for later replay and documentation • Timeout – Disconnects if the number of seconds are exceeded: • Confirm access • Authentication • Inactivity

  21. Maintenance password • Maintenance password • Protects all Host configuration. • Prevents Host user from exiting or stopping the Host program.

  22. Program options • Notification • Messagebox or tone upon, during and after a session. • Stealth mode • Hide the fact your computer is running a Host module

  23. Strong encryption • EncryptionProtects against third party being able to read a data-stream transmitted between two entities by using AES for encryption with key lengths up to 256 bits. • Data integrityProtects against third party being able to alter a data-stream transmitted between two entities by using HMAC for integrity check based on 160-bit SHA-1 or 256-bit SHA-256. • Key exchangeProtects against compromised keys by using a combination of up to 2048 bits Diffie-Hellman, 256 bits AES and 512 bits SHA HMACs integrity check. • NetOp 6.x/5.x compatible modeAllow communication with older NetOp modules

  24. Event logging • Logging to Security ServerThe NetOp modules are capable of sending event information across the network to the Security Server NetOp Log. • Logging to Windows event logThe NetOp modules can now write events directly to the Windows Event Log. • Logging to SNMP management consoleWrite events to a SNMP enabled Management console like HP OpenView by sending SNMP traps. • Extended set of eventsThe set offers more than 100 events to choose between.

  25. Stability • Unique communication recovery • Interferes little as possible with the operating system • Does not replace the Windows display device driver • On-the-fly configuration check • Low CPU consumption

  26. Superior cross-platform support • Windows XP, 2000, Terminal Server, NT 4.0, NT 3.51, ME, 98, 95 • Guest and Host with full functionality • Windows CE • Guest with remote-control functionality • Host with remote-control and text chat functionality • ActiveX • Guest component with remotecontrolfunctionality • Linux • Guest with remote-control functionality • Host with remote-control, file transfer and text chat functionality • Solaris • Host with remote-control, file transfer and text chat functionality • Symbian OS • Guest with remote-control functionality

  27. Superior cross-platform support ... • Most organizations consists of multiple operating systems. • Remote control between different operatingsystems. • Unique forward and backward compability. • Exchange of feature set to avoid any conflicts.

  28. Guest remote-control compatibility matrix * Selected protocols

  29. Host remote-control compatibility matrix

  30. Windows support • Windows Guest • Full functionality available

  31. Windows support ... • Windows Host • Full functionality available

  32. Windows CE support • Windows CE Guest • Remote control functionality available • Zoom and full screen mode • Full GDI hooking and bitmap mode • UDP and TCP • Gateway support (inbound) • Name Server support • Windows Security Management support

  33. Windows CE support ... • Windows CE Host • Remote control functionality available • Enhanced bitmap mode • UDP and TCP • Default password security • System password security • Confirm access • Text chat

  34. Linux support • Linux Guest • Remote control functionality available • Graphical user interface similiar to Windows Guest • Phonebook compatibility with the Windows Guest • UDP and TCP • Gateway support (inbound) • Windows Security Management support

  35. Linux support ... • Linux Host • Remote control functionality available • Enhanced bitmap mode • UDP and TCP • Default password security • System password security • Confirm access • File transfer • Text chat

  36. Solaris support • Solaris Host • Remote control functionality available • Enhanced bitmap mode • UDP and TCP • Default password security • System password security • Confirm access • File transfer • Text chat

  37. ActiveX support Call • ActiveX Component • Use from Internet Explorer • Use from any other application 2 Host Internet Explorer Web Server Load ActiveX 1

  38. Symbian OS support • Symbian OS Guest • Remote control functionality available • Enhanced bitmap mode • TCP • Inbound Gateway support • Recent Host list • Full screen / windowed / zoom mode • Keyboard / mouse control • Reboot Host • Lock Host keyboard • Blank Host display • Send special keystrokes

  39. Terminal Server support Terminal Server Host Host • Terminal Server • Call any Host within a session • Call the Terminal Server Console • Call any Host from a Guest within a session • Call any Host within a session from outside the Terminal Server via the NetOp Gateway Call Route call Guest Guest Gateway 2 Call

  40. Multi-protocol communication • Communication – supports all commonly used communication protocols. • Options – multiple settings related to communication are available. • Multi-protocol router – The NetOp Gateway lets you route NetOp traffic across different protocols. • IP connections made easy – The NetOp Name Server registers Guest/Host names and IP addresses. Resolves names into IP addresses upon request.

  41. Communication • Protocol support • TCP, UDP, IPX,NetBIOS, Windows modem, CAPI, Dial-up networking, Serial or IrDA • Communication profiles • A specific protocol with related settings • Initialize and communicate via multiple profiles • Options • Inactivity timeout, auto-select TCP / UDP port, keep alive-message, obtain list of IPX networks, call back based on Guest ID / password, A-number check (ISDN CAPI only).

  42. Multi-protocol router Guest • NetOp Gateway • Specialized Host module • Multiple protocol routing • Dial-in ability (Modem/ISDN to LAN) • Dial-out ability (LAN to Modem pool) • WAN enabled (supports NAT, 1-to-many routing) • Multiple device support (e.g. multiple modems) TCP/IPIPXNetBIOSModemISDNAPPCIrDASerial Gateway Host

  43. IP connections made easy 1 • NetOp Name Server • Centralized name management that register NetOp names and resolve them into IP addresses. • Solves the problem of finding Hosts using DHCP based IP addresses and not having any DNS registration. • Two public NetOp Name Servers are available on the Internet. Call 3 Register Host Guest Name Server 2 Resolve name

  44. Ease of use • Guest control panel – the intuitive interface and variable settings mean you can literally mold the system to support the way you do business. • Host connectivity – connect to a Host PC via multiple names. • Session – offers multiple session types, independent windows and a powerful, floating session toolbar. • Requesting help – Host users can request help from multiple Guests at the touch of a button. • Versatile installation – NetOp is easy to install and deploy, even on very large networks, thanks to the numerous installation methods available.

  45. Guest control panel • Hierarchical address book • Organize your remote PCs in a scalable, multi-level folder structure for easy access. • Individual connection properties. • Start sessions with multiple Hosts by a single command. • Import / export connection files from / to a comma-delimited file. • Quick connect • Call Hosts via a browse list or directly using the relevant address • Default connection properties

  46. Guest control panel ... • Current connections • List the running sessions and start or stop sessions. • History list • Contains a connection file for each session in the past. Can be copied to the address book. • Help request • View all incoming requests. A sound file is played when a help-request arrives. You can substitute this file with a customized file. • Session recording • It is possible to record and review past remote-control sessions.

  47. Guest control panel ... • Scripting utility • Start or schedule file transfers and launch programs automatically from an easy-to-use user interface or batch script language. • An ActiveX component is available for programming languages supporting OLE automation, for example Visual Basic. • Inventory • Review collected hardware and software for remote Hosts • Flexible user interface • Customize the Guest interface by showing only the needed tabs and toolbars. • Copy connection files to your desktop for easy access or use the Windows Explorer directly to start NetOp sessions. • File associations for connection, recording and script files are created during installation.

  48. Host connectivity • Connect to a Host PC via • User-defined ID • IP or MAC address • Long DNS name • Environment variable • Windows computer name • Windows logon name

  49. Session – Remote control 1 • Remote control • View desktops in full-screen, scalable or windowed mode. • Multiple, individual session windows • Auto-scroll feature available for Host screens larger than the viewing window. • Command prompts can be viewed in full-screen or windowed mode. • Full control of remote keyboard and mouse. • Cascade remote control. Call Guest Host Host + Guest 2 Call ”Cascade remote control”

  50. Session - File transfer • The File Manager offers interactive, split-screen drag-and-drop functionality. • Copy • Move • Synchronize • Clone • Crash recovery • Delta transfer • Select files/directories • Inverse selections • Progress metering • History list • Hot-keys • Transfer log • ”Tree-view" log viewer • Local mode operation

More Related