NetOp Remote Control 7'5 - PowerPoint PPT Presentation

1 / 58
About This Presentation
Title:

NetOp Remote Control 7'5

Description:

1995 First NetOp solution with full Windows support. 1996 NetOp for ... Symbian OS. Guest with remote-control functionality. Superior cross-platform support ... – PowerPoint PPT presentation

Number of Views:148
Avg rating:3.0/5.0
Slides: 59
Provided by: kimm157
Category:

less

Transcript and Presenter's Notes

Title: NetOp Remote Control 7'5


1
NetOp Remote Control 7.5
2
Major product launches
  • 1987 NetOp version 1.0 released (less than 1 Kb
    RAM)
  • 1995 First NetOp solution with full Windows
    support
  • 1996 NetOp for Windows 5.3
  • 1998 NetOp for Windows 5.4
  • 1999 NetOp Remote Control 6.0
  • 2000 NetOp Remote Control 6.5
  • 2001 NetOp Remote Control 7.0
  • 2002 NetOp Remote Control 7.5

3
NetOp modules
Host
  • Guest - Allows a PC to remote control any
    computer running the Host module.
  • Host - Allows a PC to be remote controlled by any
    computer running the Guest module.
  • Gateway - A special Host module which acts as a
    routing mechanism for NetOp traffic.
  • Name Server - A special Host module which can
    register NetOp names and resolve them into IP
    addresses.
  • Security Server - A special Host module which can
    centralize security authentication and logging.

Keyboard
Mouse
Screen
Guest
4
Key features
  • Remote control in superior quality from multiple
    platforms.
  • File Manager with split screen, crash recovery
    and delta transfer.
  • Script module for automated file transfer without
    programming.
  • ActiveX components for integrating of file
    transfer and remote-control in own programs.
  • Audio and text chat for online communication.
  • Send Message for popup messages on remote
    computers
  • Inventory for collecting hardware and software
    information from remote computers
  • Protocols - TCP, UDP, IPX, NetBIOS, RAS, Serial,
    TAPI, CAPI, IrDA.
  • Security - local and centralized with multiple
    levels and options.
  • Strong encryption - the toughest industry
    standards.
  • Event logging - local and centralized.

5
Key benefits
  • Speed is a must
  • Security beyond excellence
  • Stability its a prerequisite
  • Superior cross-platform support
  • Multi-protocol communication
  • Ease of use
  • Scalability

6
Speed is a must
  • Among the fastest in the World
  • Only screen changes are transferred
  • Windows version uses GDI-hooking
  • Uses bitmap caching
  • Non-polling communication engine
  • Strong compression algorithm

Guest
Host
Screen changes
7
Security beyond excellence
  • Guest Access To gain access to the Host, the
    Guest must pass up to 6 levels of security.
  • Guest Policy set policies for passwords, action
    at disconnect and timeouts.
  • Program Options includes Host user notification
    and stealth mode.
  • Maintenance password password protect the Guest
    and Host configurations.
  • Strong encryption encrypt sessions, enforce
    integrity check and perform secure key exchange.
  • Event logging log NetOp activity with up to 4
    different techniques.
  • Log events keep track of more than 100
    different NetOp events.

8
Guess access
  • To gain access to the Host, the Guest must pass
    up to 6 levels of security.

Logon Process
MAC/IP Address
Closed User Group
Authen- tication
Manual Access Control
Authori- zation
Call back
Host
Guest
9
MAC/IP address
MAC/IP Address
  • The Host can filter the Guest addresses it will
    communicate with based on
  • MAC address (IPX and NetBIOS).
  • IP address (TCP and UDP).
  • Once enabled, the Host will only communicate with
    Guest computers, if their addresses are listed.
  • Its designed to use the original MAC/IP address
    of the Guest.
  • The logon process is terminated, if the MAC/IP
    address check fails.

10
Closed user group
Closed User Group
  • Closed User Group Serial numbers are produced by
    Danware to
  • Deny any communication with modules not using the
    same Closed User Group Serial number.
  • Prevent employees from using the modules outside
    the organization.
  • Prevent access from outside the organization.
  • They are produced upon request for Site and
    Enterprise licenses.
  • The logon process is terminated, if the Closed
    User Group check fails.

11
Authentication
Authen- tication
  • Authentication is the process of verifying the
    identity of a user or a system.
  • Local authentication
  • The information about identities is available in
    a database on each local computer
  • Centralized authentication
  • The information about identities is available in
    a database on a shared remote computer

Centralized
Host
Local
  • The logon process is terminated, if the
    Authentication process fails.

12
Local authentication
  • Default
  • Set a default password for all Guest users
  • One local security role
  • Individual
  • Set individual Guest IDs and passwords for each
    user
  • Multiple local security roles
  • Local Windows User Database
  • Authenticate users against the local Windows NT,
    2000 or XP user database
  • Multiple local security roles

13
Centralized authentication
  • Windows NT SAM database
  • Authenticate users against Windows NT SAM
    database
  • Multiple local security roles
  • Microsoft Active Directory
  • Authenticate users against Windows 2000 Active
    Directory Service
  • Multiple local security roles

14
Centralized authentication ...
Configuration
  • NetOp Security Server
  • Special Host module
  • Resolve queries about session permissions and
    rights across a network connection
  • Forward the queries to an ODBC enabled database
  • Separate Security Manager for configuration of
    the ODBC database
  • Can use Windows Domain groups and users
  • Backwards compatible
  • Multiple centralized security roles

1
Security Manager
Call
Guest
ODBCdatabase
Security Server
Host
Query
Query
2
3
15
Call back
Call back
  • Access to the Host computer is controlled by the
    location of the Guest user.
  • For modem, ISDN or TCP
  • Depends on the authenticated identity.
  • Can call back to a fixed address or to a Guest
    controlled address (roving).
  • The logon process is terminated, if the Call back
    fails.

16
Manual access control
Manual Access Control
  • Access to the Host computer manually controlled
    by the Host user.
  • The Host user can allow or deny the access
    request.
  • Option to bypass Confirm access, if the computer
    is in logged off state.
  • Customize the message appearing on the Host
    computer.
  • The logon process is terminated, if the Manual
    Access Control denies the access.

17
Authorization
Authori- zation
  • Authorization is the process of determining what
    actions an identity is permitted to perform.
  • A set of actions is organized in a Security Role.
  • An authenticated identity can be member of one or
    more Security Roles.
  • The final set of actions are the accumulated
    actions from all security roles where the
    authenticated identity has membership.
  • The logon process is terminated, if the
    authenticated identity isnt member of any
    Security Roles.

18
Security roles
  • Security roles
  • Allow or deny actions for a Guest during session
  • Two default roles
  • Full access
  • View only
  • Multiple roles
  • Add multiple roles
  • Customize your own roles

19
Guest policy
  • Password - Control action if the authentication
    fails after a specifiy number of tries
  • Hang up
  • Disable Host
  • Restart Windows
  • Hang up Control the action after disconnect
  • None
  • Lock computer
  • Log off Windows
  • Restart Windows

20
Guest policy ...
  • File Transfer Disable File Transfer before
    local login to ensure the file systems rights are
    engaged by having the user log on before any file
    transfer can be initiated.
  • Recorded sessions Save the session for later
    replay and documentation
  • Timeout Disconnects if the number of seconds
    are exceeded
  • Confirm access
  • Authentication
  • Inactivity

21
Maintenance password
  • Maintenance password
  • Protects all Host configuration.
  • Prevents Host user from exiting or stopping the
    Host program.

22
Program options
  • Notification
  • Message box or tone upon, during and after a
    session.
  • Stealth mode
  • Hide the fact your computer is running a Host
    module

23
Strong encryption
  • EncryptionProtects against third party being
    able to read a data-stream transmitted between
    two entities by using AES for encryption with key
    lengths up to 256 bits.
  • Data integrityProtects against third party being
    able to alter a data-stream transmitted between
    two entities by using HMAC for integrity check
    based on 160-bit SHA-1 or 256-bit SHA-256.
  • Key exchangeProtects against compromised keys by
    using a combination of up to 2048 bits
    Diffie-Hellman, 256 bits AES and 512 bits SHA
    HMACs integrity check.
  • NetOp 6.x/5.x compatible modeAllow communication
    with older NetOp modules

24
Event logging
  • Logging to Security ServerThe NetOp modules are
    capable of sending event information across the
    network to the Security Server NetOp Log.
  • Logging to Windows event logThe NetOp modules
    can now write events directly to the Windows
    Event Log.
  • Logging to SNMP management consoleWrite events
    to a SNMP enabled Management console like HP
    OpenView by sending SNMP traps.
  • Extended set of eventsThe set offers more than
    100 events to choose between.

25
Stability
  • Unique communication recovery
  • Interferes little as possible with the operating
    system
  • Does not replace the Windows display device
    driver
  • On-the-fly configuration check
  • Low CPU consumption

26
Superior cross-platform support
  • Windows XP, 2000, Terminal Server, NT 4.0, NT
    3.51, ME, 98, 95
  • Guest and Host with full functionality
  • Windows CE
  • Guest with remote-control functionality
  • Host with remote-control and text chat
    functionality
  • ActiveX
  • Guest component with remote control functionality
  • Linux
  • Guest with remote-control functionality
  • Host with remote-control, file transfer and text
    chat functionality
  • Solaris
  • Host with remote-control, file transfer and text
    chat functionality
  • Symbian OS
  • Guest with remote-control functionality

27
Superior cross-platform support ...
  • Most organizations consists of multiple operating
    systems.
  • Remote control between different operating
    systems.
  • Unique forward and backward compability.
  • Exchange of feature set to avoid any conflicts.

28
Guest remote-control compatibility matrix
Selected protocols
29
Host remote-control compatibility matrix
30
Windows support
  • Windows Guest
  • Full functionality available

31
Windows support ...
  • Windows Host
  • Full functionality available

32
Windows CE support
  • Windows CE Guest
  • Remote control functionality available
  • Zoom and full screen mode
  • Full GDI hooking and bitmap mode
  • UDP and TCP
  • Gateway support (inbound)
  • Name Server support
  • Windows Security Management support

33
Windows CE support ...
  • Windows CE Host
  • Remote control functionality available
  • Enhanced bitmap mode
  • UDP and TCP
  • Default password security
  • System password security
  • Confirm access
  • Text chat

34
Linux support
  • Linux Guest
  • Remote control functionality available
  • Graphical user interface similiar to Windows
    Guest
  • Phonebook compatibility with the Windows Guest
  • UDP and TCP
  • Gateway support (inbound)
  • Windows Security Management support

35
Linux support ...
  • Linux Host
  • Remote control functionality available
  • Enhanced bitmap mode
  • UDP and TCP
  • Default password security
  • System password security
  • Confirm access
  • File transfer
  • Text chat

36
Solaris support
  • Solaris Host
  • Remote control functionality available
  • Enhanced bitmap mode
  • UDP and TCP
  • Default password security
  • System password security
  • Confirm access
  • File transfer
  • Text chat

37
ActiveX support
Call
  • ActiveX Component
  • Use from Internet Explorer
  • Use from any other application

2
Host
Web Server
Internet Explorer
Load ActiveX
1
38
Symbian OS support
  • Symbian OS Guest
  • Remote control functionality available
  • Enhanced bitmap mode
  • TCP
  • Inbound Gateway support
  • Recent Host list
  • Full screen / windowed / zoom mode
  • Keyboard / mouse control
  • Reboot Host
  • Lock Host keyboard
  • Blank Host display
  • Send special keystrokes

39
Terminal Server support
Terminal Server
Host
Host
  • Terminal Server
  • Call any Host within a session
  • Call the Terminal Server Console
  • Call any Host from a Guest within a session
  • Call any Host within a session from outside the
    Terminal Server via the NetOp Gateway

Call
Route call
Guest
Gateway
Guest
2
Call
40
Multi-protocol communication
  • Communication supports all commonly used
    communication protocols.
  • Options multiple settings related to
    communication are available.
  • Multi-protocol router The NetOp Gateway lets
    you route NetOp traffic across different
    protocols.
  • IP connections made easy The NetOp Name Server
    registers Guest/Host names and IP addresses.
    Resolves names into IP addresses upon request.

41
Communication
  • Protocol support
  • TCP, UDP, IPX, NetBIOS, Windows modem, CAPI,
    Dial-up networking, Serial or IrDA
  • Communication profiles
  • A specific protocol with related settings
  • Initialize and communicate via multiple profiles
  • Options
  • Inactivity timeout, auto-select TCP / UDP port,
    keep alive-message, obtain list of IPX networks,
    call back based on Guest ID / password, A-number
    check (ISDN CAPI only).

42
Multi-protocol router
Guest
  • NetOp Gateway
  • Specialized Host module
  • Multiple protocol routing
  • Dial-in ability (Modem/ISDN to LAN)
  • Dial-out ability (LAN to Modem pool)
  • WAN enabled (supports NAT, 1-to-many routing)
  • Multiple device support (e.g. multiple modems)

TCP/IPIPXNetBIOSModemISDNAPPCIrDASerial
Gateway
Host
43
IP connections made easy
1
  • NetOp Name Server
  • Centralized name management that register NetOp
    names and resolve them into IP addresses.
  • Solves the problem of finding Hosts using DHCP
    based IP addresses and not having any DNS
    registration.
  • Two public NetOp Name Servers are available on
    the Internet.

Call
Register
3
Host
Name Server
Guest
Resolve name
2
44
Ease of use
  • Guest control panel the intuitive interface and
    variable settings mean you can literally mold the
    system to support the way you do business.
  • Host connectivity connect to a Host PC via
    multiple names.
  • Session offers multiple session types,
    independent windows and a powerful, floating
    session toolbar.
  • Requesting help Host users can request help
    from multiple Guests at the touch of a button.
  • Versatile installation NetOp is easy to install
    and deploy, even on very large networks, thanks
    to the numerous installation methods available.

45
Guest control panel
  • Hierarchical address book
  • Organize your remote PCs in a scalable,
    multi-level folder structure for easy access.
  • Individual connection properties.
  • Start sessions with multiple Hosts by a single
    command.
  • Import / export connection files from / to a
    comma-delimited file.
  • Quick connect
  • Call Hosts via a browse list or directly using
    the relevant address
  • Default connection properties

46
Guest control panel ...
  • Current connections
  • List the running sessions and start or stop
    sessions.
  • History list
  • Contains a connection file for each session in
    the past. Can be copied to the address book.
  • Help request
  • View all incoming requests. A sound file is
    played when a help-request arrives. You can
    substitute this file with a customized file.
  • Session recording
  • It is possible to record and review past
    remote-control sessions.

47
Guest control panel ...
  • Scripting utility
  • Start or schedule file transfers and launch
    programs automatically from an easy-to-use user
    interface or batch script language.
  • An ActiveX component is available for programming
    languages supporting OLE automation, for example
    Visual Basic.
  • Inventory
  • Review collected hardware and software for remote
    Hosts
  • Flexible user interface
  • Customize the Guest interface by showing only the
    needed tabs and toolbars.
  • Copy connection files to your desktop for easy
    access or use the Windows Explorer directly to
    start NetOp sessions.
  • File associations for connection, recording and
    script files are created during installation.

48
Host connectivity
  • Connect to a Host PC via
  • User-defined ID
  • IP or MAC address
  • Long DNS name
  • Environment variable
  • Windows computer name
  • Windows logon name

49
Session Remote control
1
  • Remote control
  • View desktops in full-screen, scalable or
    windowed mode.
  • Multiple, individual session windows
  • Auto-scroll feature available for Host screens
    larger than the viewing window.
  • Command prompts can be viewed in full-screen or
    windowed mode.
  • Full control of remote keyboard and mouse.
  • Cascade remote control.

Call
Guest
Host Guest
Host
2
Call
Cascade remote control
50
Session - File transfer
  • The File Manager offers interactive, split-screen
    drag-and-drop functionality.
  • Copy
  • Move
  • Synchronize
  • Clone
  • Crash recovery
  • Delta transfer
  • Select files/directories
  • Inverse selections
  • Progress metering
  • History list
  • Hot-keys
  • Transfer log
  • Tree-view" log viewer
  • Local mode operation

51
Session Other types
  • Text chat
  • Communicate with Host users online in text mode.
  • Audio chat
  • Communicate with Host users verbally.
  • Run program
  • With this useful function you can launch
    pre-planned commands or applications on the Host
    computers remotely.
  • Execute command
  • Initiate commands on the remote Host computer
    Log off, Shut down, Restart, Lock computer, Wake
    on LAN

52
Session Other types ...
  • Send message
  • The Guest user has a tool to edit and send
    messages in RTF to one or more Windows Host PCs.
  • The messages will pop up on the Host screen and
    can contain text using different fonts, styles,
    sizes and colors and even include links for e.g.
    web pages or e-mail addresses.
  • The messages can be saved on both Guest and Host
    for later use.

53
Session Other types ...
  • Inventory
  • The Guest can collect details about installed
    hardware and software for Windows Hosts.
  • Saved in a XML file for each Host
  • Process the XML files after scanning by calling
    an external application
  • The Guest displays the details in a hierarchical
    view
  • Use the phonebook to collect inventory from
    multiple Hosts

54
Session - Toolbar
  • Powerful floating toolbar
  • Remote control
  • File transfer
  • Text chat
  • Audio Chat
  • Run program
  • Execute command
  • Send message
  • Inventory
  • Hang up
  • Full screen / windowed mode
  • Ctrl-Esc ,Ctrl-Alt-Del, Restart
  • Transfer clipboard, Marker mode
  • Blank display, Lock keyboard and mouse.

55
Requesting Help
  • Requesting help
  • Host users can request help from multiple Guests
    at the touch of a button.
  • Customize help request with a pre-defined
    message, specific help provider service, timeout
    and specific communication protocol.
  • A request help icon can be added to the tray,
    even when Host runs in stealth mode.
  • External applications can activate the Request
    help from a command line and include Help provide
    name, address and the description text.

56
Versatile installation
  • Versatile installation
  • NetOp is easy to install and deploy, even on very
    large networks, thanks to the numerous
    installation methods available.
  • Choose between Windows Installer and
    InstallShield for interactive installation or
    Silent Install for automatic scripted
    installation.
  • Deployment utility
  • Remotely install Host modules on Windows NT, 2000
    and XP, or update Host modules on any 32-bit
    Windows platform.
  • This is a separate module licensed with the Guest
    module.

57
Scalability
  • NetOp can scale to fit any organization
  • The Guest phonebook can handle from 1 Host and
    upwards only limited by disk space
  • The network traffic generated by NetOp does not
    increase with the number of computers
  • Multiple protocol support spans from simple
    point-to-point connections and up to enterprise
    WAN.
  • The Guest module can integrate into most
    management systems

58
Thats NetOp Remote Control 7.5
Fast, scalable, secure remote-control software
for IT professionals
Write a Comment
User Comments (0)
About PowerShow.com