Netop Remote Control 7.6 - PowerPoint PPT Presentation

1 / 64
About This Presentation
Title:

Netop Remote Control 7.6

Description:

1995 First NetOp solution with full Windows support. 1996 ... Multi-protocol communication. Ease of use. Scalability. High Speed. Among the fastest in the world ... – PowerPoint PPT presentation

Number of Views:290
Avg rating:3.0/5.0
Slides: 65
Provided by: kimmac
Category:

less

Transcript and Presenter's Notes

Title: Netop Remote Control 7.6


1
Netop Remote Control 7.6
2
Major Product Launches
  • 1987 NetOp version 1.0 released (less than 1 Kb
    RAM)
  • 1995 First NetOp solution with full Windows
    support
  • 1996 NetOp for Windows 5.3
  • 1998 NetOp for Windows 5.4
  • 1999 NetOp Remote Control 6.0
  • 2000 NetOp Remote Control 6.5
  • 2001 NetOp Remote Control 7.0, 7.01
  • 2002 NetOp Remote Control 7.5
  • 2003 NetOp Remote Control 7.6

3
NetOp Modules
Host
  • Guest - Allows a computer to remote control any
    computer running the Host module.
  • Host - Allows a computer to be remote controlled
    by any computer running the Guest module.
  • Gateway An extended Host module that can route
    NetOp traffic across different communication
    protocols.
  • Name Server An extended Host module that can
    store NetOp names and resolve them into IP
    addresses.
  • Security Server An extended Host module that
    can control NetOp security management and
    logging.

Keyboard
Mouse
Screen
Guest
4
Key Features
  • Remote control in superior quality supporting a
    superior range of platforms.
  • File transfer with split screen, crash recovery
    and delta transfer.
  • Scripting in a graphical user interface for
    scheduled file transfer, etc.
  • ActiveX components for integrating remote control
    and file transfer into other applications.
  • Chat and Audio Chat between modules.
  • Send Message for distributing popup messages.
  • Get Inventory for collecting hardware and
    software information from remote computers.
  • Request Help from the helpdesk via NetOp and run
    an application to auto-generate trouble tickets.
  • Communication devices - TCP, UDP, IPX, NetBIOS,
    Serial, TAPI, CAPI, IrDA.
  • Security - local and centralized, proprietary,
    Directory Services and Windows-integrated.
  • Encryption with options according to the toughest
    industry standards.
  • Event logging local, centralized,
    Windows-integrated and management-integrated.

5
Key Benefits
  • High speed
  • Security
  • Stability
  • Superior cross-platform support
  • Multi-protocol communication
  • Ease of use
  • Scalability

6
High Speed
  • Among the fastest in the world
  • Only screen changes are transferred
  • Windows version uses GDI-hooking
  • Advanced event driven region technique
  • Uses bitmap caching
  • Non-polling communication engine
  • Strong compression algorithm

Guest
Host
Screen changes
7
Security
  • Guest access to Host up to six access criteria
    must be met.
  • Guest policy on Host password, disconnect, file
    transfer, session recording and timeout.
  • Maintenance password protects Guest and Host
    configuration and Host user actions.
  • Host program options stealth mode, Host and
    user name disabling, user notification.
  • Strong encryption scheme seven encryption
    types, including highest industry standard
    encrypted transmission, integrity check and
    message authentication with secure key exchange.
  • Event logging locally, on NetOp server,
    Windows-integrated and in management information
    system. More than 100 different NetOp events can
    be logged.

8
Guest Access
  • To gain access to the Host, the Guest must meet
    up to six access criteria.

Logon Process
MAC/IP Address
Closed User Group
Authen- tication
Manual Access Control
Authori- zation
Call back
Host
Guest
9
MAC/IP Address
MAC/IP Address
  • The Host can filter the Guest addresses it will
    communicate with based on
  • MAC address (IPX and NetBIOS).
  • IP address (TCP and UDP).
  • When enabled, the Host will only communicate with
    Guest computers if their addresses are listed.
  • Designed to use the original MAC/IP address (or
    the NAT address) of the Guest.
  • The logon process is terminated, if the MAC/IP
    address check fails.

10
Closed User Group
Closed User Group
  • Closed User Group serial numbers are supplied by
    Danware to
  • Deny any communication with modules not using the
    same Closed User Group serial number.
  • Prevent employees from using the modules outside
    the organization.
  • Prevent access from outside the organization.
  • They are supplied upon request for Site and
    Enterprise licenses.
  • The logon process is terminated, if the Closed
    User Group check fails.

11
Authentication
Authen- tication
  • Authentication is the process of verifying the
    identity of a user identified by a set of logon
    credentials.
  • Local authentication
  • The identity information is available in a
    database on each Host computer.
  • Centralized authentication
  • The identity information is available in a
    database on a shared remote computer.

Centralized
Host
Local
  • The logon process is terminated, if the
    Authentication process fails.

12
Local Authentication
  • Default
  • Specify a default password for all Guest users.
  • One local security role.
  • Individual NetOp
  • Specify individual Guest IDs and passwords for
    each user.
  • Multiple local security roles.
  • Individual Windows
  • Authenticate users against the local Windows XP,
    2000 or NT user database.
  • Multiple local security roles.

13
Centralized Authentication
Centralized Authentication
  • Windows NT SAM database
  • Authenticate users against Windows NT Security
    Account Manager database.
  • Multiple local security roles.
  • Microsoft Active Directory
  • Authenticate users against Windows 2000 or Server
    2003 Active Directory Service.
  • Multiple local security roles.

14
Centralized Authentication ...
Centralized Authentication
  • Directory Service
  • Authenticate users against a Directory Service
    via LDAP.
  • Open design allows compatibility with all
    directory services.
  • Default configurations forMS Active
    DirectoryNovell eDirectoryNovell NDSNetscape
    Directory ServeriPlanet Directory ServerSun ONE
    Directory Server
  • Multiple local security roles.

15
Centralized Authentication...
  • NetOp Security Server
  • Extended Host module.
  • Responds to Host queries across a network
    connection on security roles.
  • Queries an ODBC database storing security data.
  • The ODBC database is managed from a separate
    Security Manager.
  • Supports Windows Security Management and NetOp
    authentication (also backwards compatible).
  • Multiple centralized security roles.

Configuration
1
Security Manager
Connect
Guest
ODBCdatabase
Security Server
Host
Query
Query
2
3
16
Call Back
Call back
  • Access to the Host computer is controlled by the
    location of the Guest.
  • For modem, ISDN or TCP.
  • Depends on the authenticated identity.
  • Can call back to a fixed address or to a Guest
    controlled address (roving).
  • The logon process is terminated, if the
    Connection back fails.

17
Manual Access Control
Manual Access Control
  • Access to the Host computer manually controlled
    by the Host user.
  • The Host user can allow or deny the access
    request.
  • Option to bypass Confirm Access, if no user is
    logged on to the computer.
  • Customize the message appearing on the Host
    computer.
  • The logon process is terminated, if access is
    denied by Manual Access Control.

18
Authorization
Authori- zation
  • Authorization is the process of determining what
    actions are allowed to a user.
  • A set of allowed, not allowed and denied actions
    make up a Security Role.
  • A user can be a member of different groups, and
    different security roles can be assigned to the
    individual user and the groups of which the user
    is a member.
  • The security role of a user is the composite of
    the security roles assigned to the individual
    user and to the groups of which the user is a
    member.
  • The logon process is terminated, if no security
    role is assigned to the user or if the composite
    security role of the user allows no access.

19
Security Roles
Security Roles
  • Security role
  • Allow or do not allow individual actions and
    specify when access must be confirmed.
  • Default roles
  • Full access
  • View only
  • User-defined role
  • Make individual selection.
  • Composite role
  • Allowed actions add up, and access must be
    confirmed if required by any security role.

20
Guest Policy
Guest Policy
  • Password - action after a specifed number of
    authentication attempts
  • Disconnect
  • Disable Host
  • Restart Windows
  • Disconnect action after disconnect
  • None
  • Lock computer
  • Log off Windows
  • Restart Windows

21
Guest Policy ...
Guest Policy ...
  • File Transfer Disable file transfer before
    local login.
  • Protect Host computer files.
  • Ensure that Host user file rights are enabled.
  • Record sessions
  • Save session recordings for documentation.
  • Timeout
  • Disconnect if exceeded
  • Confirm Access
  • Authentication
  • Inactivity

22
Maintenance Password
Maintenance Password
  • Can protect Host
  • Guest access security.
  • All other configuration.
  • Can prevent the Host user from unloading the Host
    and stopping Host communication.
  • Host configuration files can be protected and the
    Tools menu commands disabled, when the
  • Host is connected.
  • Host is communicating.
  • Guest maintenance password
  • Protects all configuration.

23
Program Options
  • Stealth mode
  • Host is not displayed on the screen.
  • Host name not public
  • Host does not respond to broadcast communication.
  • User name disabled
  • Host does not respond to calls to the logged-on
    user.
  • Connection notification
  • Message and/or sound upon and/or during
    connection.
  • Connection list after connections.

24
Strong Encryption Scheme
  • Seven encryption typesIncluding NetOp 6.x/5.x
    compatible allowing communication with older
    NetOp version modules.
  • EncryptionData transmitted between modules can
    be encrypted using the Advanced Encryption
    Standard (AES) with key lengths up to 256 bits.
  • Integrity and message authentication The
    integrity and authenticity of encrypted data is
    verified using the Keyed-Hash Message
    Authentication Code (HMAC) based on the Secure
    Hash Standards SHA-1 (160-bit) or SHA-256
    (256-bit).
  • Key exchangeEncryption keys for encrypted data
    transmissions are exchanged using the
    Diffie-Hellman method with key lengths up to 2048
    bits and up to 256-bit AES and up to 512-bit SHA
    HMAC verification.

25
Event Logging
  • Logging locallyLog NetOp events on the local
    computer.
  • Logging to a NetOp serverLog NetOp events in the
    database of a central NetOp Security Server
    group.
  • Logging to a Windows event logLog NetOp events
    to the local and a remote Windows Event Log.
  • Logging to a management consoleLog NetOp events
    by sending SNMP traps to a SNMP enabled central
    management console like HP OpenView.
  • Large set of eventsMore than 100 NetOp events
    can be logged.

26
Stability
  • Unique communication recovery
  • Interferes as little as possible with the
    operating system
  • Does not replace the Windows display device
    driver
  • On-the-fly configuration check
  • Low CPU utilization

27
Superior Cross-Platform Support
  • Windows Server 2003, XP, 2000, Terminal Server,
    NT 4.0, ME, 98, 95
  • Guest and Host with full functionality
  • Windows CE
  • Guest with remote-control functionality
  • Host with remote-control and text chat
    functionality
  • Linux
  • Guest with remote-control functionality
  • Host with remote-control, file transfer and text
    chat functionality
  • Solaris
  • Guest with remote-control functionality
  • Host with remote-control, file transfer and text
    chat functionality

28
Superior Cross-Platform Support ...
  • Mac OS X
  • Host with remote-control, file transfer andtext
    chat functionality
  • ActiveX
  • Guest component with remote-control functionality
  • Symbian OS
  • Guest with remote-control functionality

29
Superior Cross-Platform Support ...
  • Most organizations use multiple operating
    systems. NetOp offers
  • Remote control across different operating
    systems.
  • Unique forward and backward compability.
  • Compatible feature sets.

30
Guest Remote Control Compatibility Matrix
Selected protocols
31
Host Remote Control Compatibility Matrix
Selected protocols
32
Windows Support
  • Windows Guest
  • Full functionality.

33
Windows Support ...
  • Windows Host
  • Full functionality.

34
Windows CE Support
  • Windows CE Guest
  • Remote control.
  • Zoom and full screen mode.
  • Full GDI hooking and bitmap mode.
  • UDP and TCP.
  • Dial-up networking.
  • Gateway support (inbound).
  • Name Server support.
  • Windows Security Management support.

35
Windows CE Support ...
  • Windows CE Host
  • Remote control.
  • Enhanced bitmap mode.
  • UDP and TCP.
  • Dial-up networking.
  • Default password security.
  • System password security.
  • Confirm access.
  • Text chat.

36
Linux Support
  • Linux Guest
  • Remote control.
  • Graphical user interface similiar to Windows
    Guest.
  • Phonebook compatibility with Windows Guest.
  • UDP and TCP.
  • Gateway support (inbound).
  • Windows Security Management support.

37
Linux Support ...
  • Linux Host
  • Remote control.
  • Graphical user interface similiar to Windows
    Host.
  • Enhanced bitmap mode.
  • UDP and TCP.
  • Default password security.
  • System password security.
  • Confirm access.
  • File transfer.
  • Text chat.

38
Solaris Support
  • Solaris Guest
  • Remote control.
  • Graphical user interface similiar to Windows
    Guest.
  • Phonebook compatibility with Windows Guest.
  • UDP and TCP.
  • Gateway support (inbound).
  • Windows Security Management support.

39
Solaris Support
  • Solaris Host
  • Remote control.
  • Graphical user interface similiar to Windows
    Host.
  • Enhanced bitmap mode.
  • UDP and TCP.
  • Default password security.
  • System password security.
  • Confirm access.
  • File transfer.
  • Text chat.

40
Macintosh Support
  • Mac OS X Host
  • Remote control.
  • Graphical user interface similiar to Windows
    Host.
  • Enhanced bitmap mode.
  • UDP and TCP.
  • Default password security.
  • System password security.
  • Confirm access.
  • File transfer.
  • Text chat.

41
ActiveX Support
Connect
  • ActiveX Guest Component
  • Use from Internet Explorer.
  • Embed in any Windows application.
  • Remote control.
  • Window and full screen mode.
  • Full GDI hooking and bitmap mode.
  • UDP and TCP.
  • Gateway support (inbound).
  • Name Server support.
  • Lock Host keyboard.
  • Blank Host display.
  • Send special keystrokes.

2
Host
Web Server
Internet Explorer
Load ActiveX
1
42
Symbian OS Support
  • Symbian OS Guest
  • Remote control.
  • Enhanced bitmap mode.
  • TCP.
  • Gateway support (inbound).
  • Recent Host list.
  • Full screen / windowed / zoom mode.
  • Keyboard / mouse control.
  • Reboot Host.
  • Lock Host keyboard.
  • Blank Host display.
  • Send special keystrokes.

43
Terminal Server Support
Terminal Server
Host
Host
  • Connect
  • Inside to inside.
  • Inside to network.
  • Network to inside via NetOp Gateway on the
    terminal server console.
  • Inside one terminal server to inside another
    terminal server across network via NetOp Gateway
    on the terminal server console.
  • Full functionality
  • A few minor limitations.

Route connection
Connect
Guest
Gateway
Guest
Connect
44
Multi-Protocol Communication
  • Communication supports all commonly used
    communication protocols.
  • Options protocol settings provide connectivity
    and optimize speed.
  • Multi-protocol routing NetOp Gateway routes
    NetOp traffic across different protocols.
  • IP connections made easy NetOp Name Server
    makes NetOp modules connect swiftly across any IP
    network including the Internet when using NetOp
    call names.

45
Communication
  • Protocol support
  • TCP and UDP including Dial-up networking, IPX,
    NetBIOS, Gateway (outbound), Windows modem,
    Serial modem, ISDN CAPI, Infrared and Terminal
    Server.
  • Communication profile
  • A named configuration of a protocol.
  • Multiple communication profiles can be enabled at
    the same time.
  • Options
  • Protocol-specific options including TCP/UDP port
    selection, finding IPX networks and modem
    definition.

46
Multi-Protocol Routing
Guest
  • NetOp Gateway
  • Extended Host module.
  • Dial-in (Modem to LAN).
  • Dial-out (LAN to modem pool).
  • Internal routing (LAN to LAN).
  • Terminal Server (LAN ? TS)
  • WAN enabled(supports NAT, one-to-many routing).
  • Multiple device support(e.g. multiple modems).

TCPUDPIPXNetBIOSWindows modemSerial
modemISDN CAPIIrDATerminal ServerAPPC
Gateway
Host
47
IP Connections Made Easy
1
  • NetOp Name Server
  • Extended Host module.
  • Stores NetOp names and IP addresses of NetOp
    modules using NetOp Name Server in separate name
    spaces.
  • Frequent update (few minutes). Names not updated
    are deleted.
  • Called NetOp names are resolved into IP addresses
    that are used for connecting.
  • Two public NetOp Name Servers are available on
    the Internet.

Call
Register
3
Host
Name Server
Guest
Resolve name
2
48
Ease of Use
  • Swift installation easy to install and set up,
    even with very large installations, thanks to the
    versatile installation and deployment options.
  • User interface the intuitive Guest window can
    be molded to support the way you work.
  • Host connectivity call using use easily
    remembered computer or user names.
  • Session Multiple session types with independent
    windows and a powerful floating remote control
    toolbar/toolbox.
  • Help request at the touch of a button, Host
    users can request help from any available help
    providing Guest user.

49
Swift Installation
  • Installation versatility
  • NetOp is easy to install and set up, even with
    very large installations, thanks to its versatile
    installation options.
  • Select between traditional InstallShield and
    Windows Installer for interactive installation
    and setup or Silent Install for installation and
    setup with minimum user intervention.
  • NetOp Deployment Utility (NDU)
  • Remotely install and set up Host modules on
    Windows Server 2003, XP, 2000 and NT, or update
    Host modules on any 32-bit Windows platform.
  • NDU is a separate program licensed with the Guest
    module.

50
Guest Window Tabs
  • Phonebook tab
  • Your phonebook of best connections to Hosts that
    you connect to frequently.
  • Start sessions with multiple Hosts at the same
    time.
  • Add records manually or from the Quick Connect or
    History tab.
  • Refine records in the Connection Properties
    window.
  • Organize records in a folder structure for easy
    access.
  • Export/import multiple records data to/from a
    comma-separated file.

51
Guest Window Tabs ...
  • Quick Connect Tab
  • Start here to connect to a Host not connected to
    before.
  • Select a Communication Profile.
  • Optionally, adjust Connection Properties for all
    connections from this tab.
  • Optionally, Browse to display locally available
    Hosts in the Browse list.
  • Optionally, add Browse list records to the
    Phonebook tab.
  • Connect from a Browse list record or a Host
    section Name field entry.
  • Connections Tab
  • View running sessions.
  • Start and stop sessions with connected Hosts.

52
Guest Window Tabs ...
  • History Tab
  • View records of last connections.
  • Organize records in a folder structure for
    overview.
  • Double-click a record to reconnect.
  • Optionally, copy records to the Phonebook tab.
  • Help Request Tab
  • View pending help requests.
  • A sound is played and/or a pop-up message box
    appears when a help request arrives.
  • Double-click a record to respond and connect.

53
Guest Window Tabs ...
  • Recordings Tab
  • If specified in Connection Properties, remote
    control sessions are recorded. Recording records
    are accessed on this tab.
  • Double-click a record to replay the session.
  • Organize records in a folder structure for
    overview.
  • Script Tab
  • This tab provides access to NetOp scripts and the
    Script window.
  • NetOp scripts schedule file transfers, etc. with
    remote computers. Scripts are created, edited and
    debugged in the graphical Script window.
  • Right-click a record to display a popup menu with
    options.
  • Double-click a record to run the script.
  • Organize records in a folder structure for
    overview.
  • Inventory Tab
  • This tab displays details of inventories
    collected from remote computers.

54
Guest Window
  • Flexible user interface
  • Customize the Guest window size and contents of
    tabs and bars to suit your demands.
  • Double-click Host connection files (.dwc) copied
    to your desktop or in Windows Explorer to connect
    directly.
  • Double-click remote control session recording
    (.dwr) or script (.dws) files copied to your
    desktop or in Windows Explorer to run them.

55
Host Connectivity
  • Connect to a Host by any of the names
  • User-defined Host ID.
  • IP or MAC address.
  • Long DNS name.
  • Environment variable.
  • Windows computer name.
  • Windows logon user name.

56
Session Remote Control
  • Remote control
  • Host desktops can be displayed in full-screen,
    optionally auto-scrolling window or fit window
    mode.
  • Remote control windows can be placed anywhere on
    the Guest desktop.
  • Host full-screen commands are displayed
    correctly.
  • Full control of remote keyboard and mouse.
  • Cascading remote control is possible.

Connect
Guest
Host Guest
Host
Connect
Cascading remote control
57
Session - File Transfer
  • The File Manager offers interactive split-screen
    drag-and-drop functionality.
  • Copy,
  • Move,
  • Synchronize,
  • Clone,
  • Crash recovery,
  • Delta transfer,
  • Select/deselect files/directories,
  • Invert selections.
  • Viewed directory history list.
  • Hotkeys.
  • Local file transfer.
  • File transfer progress monitoring.
  • File transfer log.
  • Graphical tree-structure file transfer log
    viewer.
  • Open and edit local and remote files.

58
Session Other Types
  • Chat
  • Communicate by typed text with Host users.
  • Audio chat
  • Talk with Host users.
  • Run program
  • Run browsed for or predefined programs residing
    on a remote Host computer.
  • Execute command
  • Execute one of the commands Log off, Restart,
    Shut down, Lock Computer or Wake on LAN on a
    remote Host computer.

59
Session Other Types ...
  • Send message
  • The Guest user can create, edit and send a
    message to one or more Windows Hosts.
  • The default RTF format supports different fonts,
    styles, sizes and colors and even hyperlinks.
  • The message will pop up on selected Host screens.
  • Messages are automatically saved on Hosts
    receiving them.
  • Message contents can be saved on the Guest.

60
Session Other Types ...
  • Inventory
  • The Guest user can collect a complete inventory
    of hardware and software on selected Host
    computers.
  • Host computers are typically selected by
    Phonebook records.
  • Host inventory details are displayed in a
    hierarchical view on the Inventory tab.
  • Host inventories are saved in XML files.
  • Inventory information can be extracted from XML
    files by a user-defined external application.

61
Powerful Floating Remote Control Toolbar/Toolbox
  • Remote Control, File transfer, Chat, Audio Chat,
  • Run Program, Execute Command, Send Message,
  • Get Inventory, Hang up,
  • Connection Properties, Full Screen/Window,
  • Send CtrlEsc ,Send CtrlAltDel, Restart Host
    PC,
  • Send Clipboard, Retrieve Clipboard, Marker mode,
  • Blank Display, Lock Keyboard and Mouse.
  • Transfer Host sound.

62
Help Request
  • Requesting help
  • Host users can request help from multiple help
    providing Guest users at the touch of a button or
    unattended from a command line.
  • Optionally, customize help requests by a
    specified problem description, help service name,
    communication profile and/or timeout.
  • A help request icon can be added to the tray,
    also when the Host runs in stealth mode.
  • Incoming requests can start an action like send
    message and/or run an application - e.g. a
    helpdesk system that auto-generates a trouble
    ticket.

Host
Call
Guest
Guest
Guest
63
Scalability
  • Scalable to fit any organization
  • The Guest can handle from one Host and upwards
    only limited by disk space.
  • Netop generates only a modest amount of network
    traffic and only when actual interaction is
    taking place.
  • Multiple protocol support spans from simple
    point-to-point connections and up to enterprise
    WAN.
  • NetOp can integrate into most management systems.

64
Thats Netop Remote Control 7.6
Fast, scalable, secure remote-control software
for IT professionals
Write a Comment
User Comments (0)
About PowerShow.com