Title: Netop Remote Control 7.6
1Netop Remote Control 7.6
2Major Product Launches
- 1987 NetOp version 1.0 released (less than 1 Kb
RAM) - 1995 First NetOp solution with full Windows
support - 1996 NetOp for Windows 5.3
- 1998 NetOp for Windows 5.4
- 1999 NetOp Remote Control 6.0
- 2000 NetOp Remote Control 6.5
- 2001 NetOp Remote Control 7.0, 7.01
- 2002 NetOp Remote Control 7.5
- 2003 NetOp Remote Control 7.6
3NetOp Modules
Host
- Guest - Allows a computer to remote control any
computer running the Host module. - Host - Allows a computer to be remote controlled
by any computer running the Guest module. - Gateway An extended Host module that can route
NetOp traffic across different communication
protocols. - Name Server An extended Host module that can
store NetOp names and resolve them into IP
addresses. - Security Server An extended Host module that
can control NetOp security management and
logging.
Keyboard
Mouse
Screen
Guest
4Key Features
- Remote control in superior quality supporting a
superior range of platforms. - File transfer with split screen, crash recovery
and delta transfer. - Scripting in a graphical user interface for
scheduled file transfer, etc. - ActiveX components for integrating remote control
and file transfer into other applications. - Chat and Audio Chat between modules.
- Send Message for distributing popup messages.
- Get Inventory for collecting hardware and
software information from remote computers. - Request Help from the helpdesk via NetOp and run
an application to auto-generate trouble tickets. - Communication devices - TCP, UDP, IPX, NetBIOS,
Serial, TAPI, CAPI, IrDA. - Security - local and centralized, proprietary,
Directory Services and Windows-integrated. - Encryption with options according to the toughest
industry standards. - Event logging local, centralized,
Windows-integrated and management-integrated.
5Key Benefits
- High speed
- Security
- Stability
- Superior cross-platform support
- Multi-protocol communication
- Ease of use
- Scalability
6High Speed
- Among the fastest in the world
- Only screen changes are transferred
- Windows version uses GDI-hooking
- Advanced event driven region technique
- Uses bitmap caching
- Non-polling communication engine
- Strong compression algorithm
Guest
Host
Screen changes
7Security
- Guest access to Host up to six access criteria
must be met. - Guest policy on Host password, disconnect, file
transfer, session recording and timeout. - Maintenance password protects Guest and Host
configuration and Host user actions. - Host program options stealth mode, Host and
user name disabling, user notification. - Strong encryption scheme seven encryption
types, including highest industry standard
encrypted transmission, integrity check and
message authentication with secure key exchange.
- Event logging locally, on NetOp server,
Windows-integrated and in management information
system. More than 100 different NetOp events can
be logged.
8Guest Access
- To gain access to the Host, the Guest must meet
up to six access criteria.
Logon Process
MAC/IP Address
Closed User Group
Authen- tication
Manual Access Control
Authori- zation
Call back
Host
Guest
9MAC/IP Address
MAC/IP Address
- The Host can filter the Guest addresses it will
communicate with based on - MAC address (IPX and NetBIOS).
- IP address (TCP and UDP).
- When enabled, the Host will only communicate with
Guest computers if their addresses are listed. - Designed to use the original MAC/IP address (or
the NAT address) of the Guest. - The logon process is terminated, if the MAC/IP
address check fails.
10Closed User Group
Closed User Group
- Closed User Group serial numbers are supplied by
Danware to - Deny any communication with modules not using the
same Closed User Group serial number. - Prevent employees from using the modules outside
the organization. - Prevent access from outside the organization.
- They are supplied upon request for Site and
Enterprise licenses. - The logon process is terminated, if the Closed
User Group check fails.
11Authentication
Authen- tication
- Authentication is the process of verifying the
identity of a user identified by a set of logon
credentials.
- Local authentication
- The identity information is available in a
database on each Host computer. - Centralized authentication
- The identity information is available in a
database on a shared remote computer.
Centralized
Host
Local
- The logon process is terminated, if the
Authentication process fails.
12Local Authentication
- Default
- Specify a default password for all Guest users.
- One local security role.
- Individual NetOp
- Specify individual Guest IDs and passwords for
each user. - Multiple local security roles.
- Individual Windows
- Authenticate users against the local Windows XP,
2000 or NT user database. - Multiple local security roles.
13Centralized Authentication
Centralized Authentication
- Windows NT SAM database
- Authenticate users against Windows NT Security
Account Manager database. - Multiple local security roles.
- Microsoft Active Directory
- Authenticate users against Windows 2000 or Server
2003 Active Directory Service. - Multiple local security roles.
14Centralized Authentication ...
Centralized Authentication
- Directory Service
- Authenticate users against a Directory Service
via LDAP. - Open design allows compatibility with all
directory services. - Default configurations forMS Active
DirectoryNovell eDirectoryNovell NDSNetscape
Directory ServeriPlanet Directory ServerSun ONE
Directory Server - Multiple local security roles.
15Centralized Authentication...
- NetOp Security Server
- Extended Host module.
- Responds to Host queries across a network
connection on security roles. - Queries an ODBC database storing security data.
- The ODBC database is managed from a separate
Security Manager. - Supports Windows Security Management and NetOp
authentication (also backwards compatible). - Multiple centralized security roles.
Configuration
1
Security Manager
Connect
Guest
ODBCdatabase
Security Server
Host
Query
Query
2
3
16Call Back
Call back
- Access to the Host computer is controlled by the
location of the Guest. - For modem, ISDN or TCP.
- Depends on the authenticated identity.
- Can call back to a fixed address or to a Guest
controlled address (roving). - The logon process is terminated, if the
Connection back fails.
17Manual Access Control
Manual Access Control
- Access to the Host computer manually controlled
by the Host user. - The Host user can allow or deny the access
request. - Option to bypass Confirm Access, if no user is
logged on to the computer. - Customize the message appearing on the Host
computer. - The logon process is terminated, if access is
denied by Manual Access Control.
18Authorization
Authori- zation
- Authorization is the process of determining what
actions are allowed to a user. - A set of allowed, not allowed and denied actions
make up a Security Role. - A user can be a member of different groups, and
different security roles can be assigned to the
individual user and the groups of which the user
is a member. - The security role of a user is the composite of
the security roles assigned to the individual
user and to the groups of which the user is a
member. - The logon process is terminated, if no security
role is assigned to the user or if the composite
security role of the user allows no access.
19Security Roles
Security Roles
- Security role
- Allow or do not allow individual actions and
specify when access must be confirmed. - Default roles
- Full access
- View only
- User-defined role
- Make individual selection.
- Composite role
- Allowed actions add up, and access must be
confirmed if required by any security role.
20Guest Policy
Guest Policy
- Password - action after a specifed number of
authentication attempts - Disconnect
- Disable Host
- Restart Windows
- Disconnect action after disconnect
- None
- Lock computer
- Log off Windows
- Restart Windows
21Guest Policy ...
Guest Policy ...
- File Transfer Disable file transfer before
local login. - Protect Host computer files.
- Ensure that Host user file rights are enabled.
- Record sessions
- Save session recordings for documentation.
- Timeout
- Disconnect if exceeded
- Confirm Access
- Authentication
- Inactivity
22Maintenance Password
Maintenance Password
- Can protect Host
- Guest access security.
- All other configuration.
- Can prevent the Host user from unloading the Host
and stopping Host communication. - Host configuration files can be protected and the
Tools menu commands disabled, when the - Host is connected.
- Host is communicating.
- Guest maintenance password
- Protects all configuration.
23Program Options
- Stealth mode
- Host is not displayed on the screen.
- Host name not public
- Host does not respond to broadcast communication.
- User name disabled
- Host does not respond to calls to the logged-on
user. - Connection notification
- Message and/or sound upon and/or during
connection. - Connection list after connections.
24Strong Encryption Scheme
- Seven encryption typesIncluding NetOp 6.x/5.x
compatible allowing communication with older
NetOp version modules. - EncryptionData transmitted between modules can
be encrypted using the Advanced Encryption
Standard (AES) with key lengths up to 256 bits. - Integrity and message authentication The
integrity and authenticity of encrypted data is
verified using the Keyed-Hash Message
Authentication Code (HMAC) based on the Secure
Hash Standards SHA-1 (160-bit) or SHA-256
(256-bit). - Key exchangeEncryption keys for encrypted data
transmissions are exchanged using the
Diffie-Hellman method with key lengths up to 2048
bits and up to 256-bit AES and up to 512-bit SHA
HMAC verification.
25Event Logging
- Logging locallyLog NetOp events on the local
computer. - Logging to a NetOp serverLog NetOp events in the
database of a central NetOp Security Server
group. - Logging to a Windows event logLog NetOp events
to the local and a remote Windows Event Log. - Logging to a management consoleLog NetOp events
by sending SNMP traps to a SNMP enabled central
management console like HP OpenView. - Large set of eventsMore than 100 NetOp events
can be logged.
26Stability
- Unique communication recovery
- Interferes as little as possible with the
operating system - Does not replace the Windows display device
driver - On-the-fly configuration check
- Low CPU utilization
27Superior Cross-Platform Support
- Windows Server 2003, XP, 2000, Terminal Server,
NT 4.0, ME, 98, 95 - Guest and Host with full functionality
- Windows CE
- Guest with remote-control functionality
- Host with remote-control and text chat
functionality - Linux
- Guest with remote-control functionality
- Host with remote-control, file transfer and text
chat functionality - Solaris
- Guest with remote-control functionality
- Host with remote-control, file transfer and text
chat functionality
28Superior Cross-Platform Support ...
- Mac OS X
- Host with remote-control, file transfer andtext
chat functionality - ActiveX
- Guest component with remote-control functionality
- Symbian OS
- Guest with remote-control functionality
29Superior Cross-Platform Support ...
- Most organizations use multiple operating
systems. NetOp offers - Remote control across different operating
systems. - Unique forward and backward compability.
- Compatible feature sets.
30Guest Remote Control Compatibility Matrix
Selected protocols
31Host Remote Control Compatibility Matrix
Selected protocols
32Windows Support
- Windows Guest
- Full functionality.
33Windows Support ...
- Windows Host
- Full functionality.
34Windows CE Support
- Windows CE Guest
- Remote control.
- Zoom and full screen mode.
- Full GDI hooking and bitmap mode.
- UDP and TCP.
- Dial-up networking.
- Gateway support (inbound).
- Name Server support.
- Windows Security Management support.
35Windows CE Support ...
- Windows CE Host
- Remote control.
- Enhanced bitmap mode.
- UDP and TCP.
- Dial-up networking.
- Default password security.
- System password security.
- Confirm access.
- Text chat.
36Linux Support
- Linux Guest
- Remote control.
- Graphical user interface similiar to Windows
Guest. - Phonebook compatibility with Windows Guest.
- UDP and TCP.
- Gateway support (inbound).
- Windows Security Management support.
37Linux Support ...
- Linux Host
- Remote control.
- Graphical user interface similiar to Windows
Host. - Enhanced bitmap mode.
- UDP and TCP.
- Default password security.
- System password security.
- Confirm access.
- File transfer.
- Text chat.
38Solaris Support
- Solaris Guest
- Remote control.
- Graphical user interface similiar to Windows
Guest. - Phonebook compatibility with Windows Guest.
- UDP and TCP.
- Gateway support (inbound).
- Windows Security Management support.
39Solaris Support
- Solaris Host
- Remote control.
- Graphical user interface similiar to Windows
Host. - Enhanced bitmap mode.
- UDP and TCP.
- Default password security.
- System password security.
- Confirm access.
- File transfer.
- Text chat.
40Macintosh Support
- Mac OS X Host
- Remote control.
- Graphical user interface similiar to Windows
Host. - Enhanced bitmap mode.
- UDP and TCP.
- Default password security.
- System password security.
- Confirm access.
- File transfer.
- Text chat.
41ActiveX Support
Connect
- ActiveX Guest Component
- Use from Internet Explorer.
- Embed in any Windows application.
- Remote control.
- Window and full screen mode.
- Full GDI hooking and bitmap mode.
- UDP and TCP.
- Gateway support (inbound).
- Name Server support.
- Lock Host keyboard.
- Blank Host display.
- Send special keystrokes.
2
Host
Web Server
Internet Explorer
Load ActiveX
1
42Symbian OS Support
- Symbian OS Guest
- Remote control.
- Enhanced bitmap mode.
- TCP.
- Gateway support (inbound).
- Recent Host list.
- Full screen / windowed / zoom mode.
- Keyboard / mouse control.
- Reboot Host.
- Lock Host keyboard.
- Blank Host display.
- Send special keystrokes.
43Terminal Server Support
Terminal Server
Host
Host
- Connect
- Inside to inside.
- Inside to network.
- Network to inside via NetOp Gateway on the
terminal server console. - Inside one terminal server to inside another
terminal server across network via NetOp Gateway
on the terminal server console. - Full functionality
- A few minor limitations.
Route connection
Connect
Guest
Gateway
Guest
Connect
44Multi-Protocol Communication
- Communication supports all commonly used
communication protocols. - Options protocol settings provide connectivity
and optimize speed. - Multi-protocol routing NetOp Gateway routes
NetOp traffic across different protocols. - IP connections made easy NetOp Name Server
makes NetOp modules connect swiftly across any IP
network including the Internet when using NetOp
call names.
45Communication
- Protocol support
- TCP and UDP including Dial-up networking, IPX,
NetBIOS, Gateway (outbound), Windows modem,
Serial modem, ISDN CAPI, Infrared and Terminal
Server. - Communication profile
- A named configuration of a protocol.
- Multiple communication profiles can be enabled at
the same time. - Options
- Protocol-specific options including TCP/UDP port
selection, finding IPX networks and modem
definition.
46Multi-Protocol Routing
Guest
- NetOp Gateway
- Extended Host module.
- Dial-in (Modem to LAN).
- Dial-out (LAN to modem pool).
- Internal routing (LAN to LAN).
- Terminal Server (LAN ? TS)
- WAN enabled(supports NAT, one-to-many routing).
- Multiple device support(e.g. multiple modems).
TCPUDPIPXNetBIOSWindows modemSerial
modemISDN CAPIIrDATerminal ServerAPPC
Gateway
Host
47IP Connections Made Easy
1
- NetOp Name Server
- Extended Host module.
- Stores NetOp names and IP addresses of NetOp
modules using NetOp Name Server in separate name
spaces. - Frequent update (few minutes). Names not updated
are deleted. - Called NetOp names are resolved into IP addresses
that are used for connecting. - Two public NetOp Name Servers are available on
the Internet.
Call
Register
3
Host
Name Server
Guest
Resolve name
2
48Ease of Use
- Swift installation easy to install and set up,
even with very large installations, thanks to the
versatile installation and deployment options. - User interface the intuitive Guest window can
be molded to support the way you work. - Host connectivity call using use easily
remembered computer or user names. - Session Multiple session types with independent
windows and a powerful floating remote control
toolbar/toolbox. - Help request at the touch of a button, Host
users can request help from any available help
providing Guest user.
49Swift Installation
- Installation versatility
- NetOp is easy to install and set up, even with
very large installations, thanks to its versatile
installation options. - Select between traditional InstallShield and
Windows Installer for interactive installation
and setup or Silent Install for installation and
setup with minimum user intervention. - NetOp Deployment Utility (NDU)
- Remotely install and set up Host modules on
Windows Server 2003, XP, 2000 and NT, or update
Host modules on any 32-bit Windows platform. - NDU is a separate program licensed with the Guest
module.
50Guest Window Tabs
- Phonebook tab
- Your phonebook of best connections to Hosts that
you connect to frequently. - Start sessions with multiple Hosts at the same
time. - Add records manually or from the Quick Connect or
History tab. - Refine records in the Connection Properties
window. - Organize records in a folder structure for easy
access. - Export/import multiple records data to/from a
comma-separated file.
51Guest Window Tabs ...
- Quick Connect Tab
- Start here to connect to a Host not connected to
before. - Select a Communication Profile.
- Optionally, adjust Connection Properties for all
connections from this tab. - Optionally, Browse to display locally available
Hosts in the Browse list. - Optionally, add Browse list records to the
Phonebook tab. - Connect from a Browse list record or a Host
section Name field entry. - Connections Tab
- View running sessions.
- Start and stop sessions with connected Hosts.
52Guest Window Tabs ...
- History Tab
- View records of last connections.
- Organize records in a folder structure for
overview. - Double-click a record to reconnect.
- Optionally, copy records to the Phonebook tab.
- Help Request Tab
- View pending help requests.
- A sound is played and/or a pop-up message box
appears when a help request arrives. - Double-click a record to respond and connect.
53Guest Window Tabs ...
- Recordings Tab
- If specified in Connection Properties, remote
control sessions are recorded. Recording records
are accessed on this tab. - Double-click a record to replay the session.
- Organize records in a folder structure for
overview. - Script Tab
- This tab provides access to NetOp scripts and the
Script window. - NetOp scripts schedule file transfers, etc. with
remote computers. Scripts are created, edited and
debugged in the graphical Script window. - Right-click a record to display a popup menu with
options. - Double-click a record to run the script.
- Organize records in a folder structure for
overview. - Inventory Tab
- This tab displays details of inventories
collected from remote computers.
54Guest Window
- Flexible user interface
- Customize the Guest window size and contents of
tabs and bars to suit your demands. - Double-click Host connection files (.dwc) copied
to your desktop or in Windows Explorer to connect
directly. - Double-click remote control session recording
(.dwr) or script (.dws) files copied to your
desktop or in Windows Explorer to run them.
55Host Connectivity
- Connect to a Host by any of the names
- User-defined Host ID.
- IP or MAC address.
- Long DNS name.
- Environment variable.
- Windows computer name.
- Windows logon user name.
56Session Remote Control
- Remote control
- Host desktops can be displayed in full-screen,
optionally auto-scrolling window or fit window
mode. - Remote control windows can be placed anywhere on
the Guest desktop. - Host full-screen commands are displayed
correctly. - Full control of remote keyboard and mouse.
- Cascading remote control is possible.
Connect
Guest
Host Guest
Host
Connect
Cascading remote control
57Session - File Transfer
- The File Manager offers interactive split-screen
drag-and-drop functionality. - Copy,
- Move,
- Synchronize,
- Clone,
- Crash recovery,
- Delta transfer,
- Select/deselect files/directories,
- Invert selections.
- Viewed directory history list.
- Hotkeys.
- Local file transfer.
- File transfer progress monitoring.
- File transfer log.
- Graphical tree-structure file transfer log
viewer. - Open and edit local and remote files.
58Session Other Types
- Chat
- Communicate by typed text with Host users.
- Audio chat
- Talk with Host users.
- Run program
- Run browsed for or predefined programs residing
on a remote Host computer. - Execute command
- Execute one of the commands Log off, Restart,
Shut down, Lock Computer or Wake on LAN on a
remote Host computer.
59Session Other Types ...
- Send message
- The Guest user can create, edit and send a
message to one or more Windows Hosts. - The default RTF format supports different fonts,
styles, sizes and colors and even hyperlinks. - The message will pop up on selected Host screens.
- Messages are automatically saved on Hosts
receiving them. - Message contents can be saved on the Guest.
60Session Other Types ...
- Inventory
- The Guest user can collect a complete inventory
of hardware and software on selected Host
computers. - Host computers are typically selected by
Phonebook records. - Host inventory details are displayed in a
hierarchical view on the Inventory tab. - Host inventories are saved in XML files.
- Inventory information can be extracted from XML
files by a user-defined external application.
61Powerful Floating Remote Control Toolbar/Toolbox
- Remote Control, File transfer, Chat, Audio Chat,
- Run Program, Execute Command, Send Message,
- Get Inventory, Hang up,
- Connection Properties, Full Screen/Window,
- Send CtrlEsc ,Send CtrlAltDel, Restart Host
PC, - Send Clipboard, Retrieve Clipboard, Marker mode,
- Blank Display, Lock Keyboard and Mouse.
- Transfer Host sound.
62Help Request
- Requesting help
- Host users can request help from multiple help
providing Guest users at the touch of a button or
unattended from a command line. - Optionally, customize help requests by a
specified problem description, help service name,
communication profile and/or timeout. - A help request icon can be added to the tray,
also when the Host runs in stealth mode. - Incoming requests can start an action like send
message and/or run an application - e.g. a
helpdesk system that auto-generates a trouble
ticket.
Host
Call
Guest
Guest
Guest
63Scalability
- Scalable to fit any organization
- The Guest can handle from one Host and upwards
only limited by disk space. - Netop generates only a modest amount of network
traffic and only when actual interaction is
taking place. - Multiple protocol support spans from simple
point-to-point connections and up to enterprise
WAN. - NetOp can integrate into most management systems.
64Thats Netop Remote Control 7.6
Fast, scalable, secure remote-control software
for IT professionals