User Acceptance - Mako Networks

1y ago
13 Views
2 Downloads
805.16 KB
26 Pages
Last View : 23d ago
Last Download : 3m ago
Upload by : Sasha Niles
Transcription

User AcceptanceTests for the CMSOverviewThe Mako System combines a web serverdriven configuration, management andreporting user interface. The system usesclient-end hardware to provide users withconsiderable cost savings as well as functionalityand flexibility not currently available intraditional devices used to meet either the sameor similar requirements.By default, tests are available for all users.However, some tests may only be done byresellers, and are labeled accordingly.All interactions with the management platformwill have up to a two minute delay before theCPE itself is updated. The CPE will poll themanagement platform for changes within thetwo minute window.All interaction takes place on the MakoCentral Management Severs via the webbased management and reporting console.The system is powerful but not unnecessarilycomplex to use. From initial configuration todaily changes through to viewing of reports, allinterface with the Mako System takes place viathe secure website.Some significant changes may trigger a softwareupdate for the device; an example of thisbehavior is if the user changes IP addressinginformation on the WAN interface. The devicewill update it stored configuration file to reflectthe changes.Failover configuration changes are delayedby 10 minutes to ensure the devices aresynchronised. It is recommended USB Keyconfiguration files (discussed later in thisdocument) are used after enabling the failoverservice.This document provides the reader witha series of User Acceptance Tests that canassist with exposing the core functionality ofthe Mako System. A certain level of technicalexpertise is required. You should have a basicunderstanding of TCP/IP and have experiencewith configuring and/or managing routers orfirewalls.A Web Access Control (WAC) server is requiredfor optimum Mako Guardian performance.Testing without this may result in increasedlatency when browsing websites.Hardware PrerequisitesDocument Referencenn Mako CMS ManualYou will need the following:The following documents shouldbe referenced for additionalconfiguration information.nn Mako Guardian Handbooknn A Mako devicenn 6500 Product Handbooksnn Cabling to suit. UAT1WWW.MAKONETWORKS.COM

Contents1 Management1.1 Creating a company profile (Reseller Only)1.2 Adding a Mako to a company (Reseller Only)2 Connectivity Configuration2.12.22.32.42.52.62.72.82.9ADSL WAN, PPP ConfigurationEthernet WAN, IP ConfigurationCellular WANAdding IP RangeConfiguring AlertsConfiguring Network LAN 1Configuring Network LAN 2Configuring DHCP LeasesConfiguring Static Routes3 Firewall Configuration3.13.23.33.43.53.63.73.8Inbound Basic RuleInbound Advanced RuleOutbound Basic RuleConfiguring Firewall - Outbound AdvancedConfiguring Firewall - Intranet BasicConfiguring Firewall - Intranet AdvancedConfiguring Firewall - VPN BasicVPN Advanced Rule37 Mako Guardian337.1 Category Management7.2 Default Site Categories7.3 Custom Sites7.4 Custom Sites Banned URL Expression7.5 Custom Categories7.6 Custom Category Edit7.7 Phrases Management7.8 Custom Phrases7.9 Weighted Phrase Configuration7.10 User and Group Options7.11 Users and Groups - LDAP7.12 Users and Groups - Local Users7.13 Create Local Group7.14 Create IP Group7.15 Create LDAP Group7.16 Add Local User to Local Group7.17 Add IP Address to IP Based Group7.18 Banned File Extensions7.19 MIME Types7.20 Create Time7.21 Exceptions7.22 Site Bypass7.23 Landing Page44455566667777888994 VPN and Remote Access Configuration 104.14.24.34.44.54.64.7Mako to Mako IPSec VPNAdd Third Party DeviceDelete Third Party DeviceMako to Third Party IPSec VPNPPTP ConfigurationAdding VPN UserEnabling Remote Access5 Quality of Service5.15.25.35.45.5Adding a service to a QoS BinRemoving a service from a QoS BinAdding a QoS BinRemoving a QoS BinManaging QoS Bin bandwidth allocations.6 VPN Cloud6.16.26.36.4 UATCreating a VPN CloudJoining a VPN CloudEditing your Mako's options for its VPN CloudSimple Diagnostics on VPN Cloud15101010111111128 Mako Failover24248.1 Failover Configuration9 Dynamic DNS249.1 Dynamic DNS Configuration - No-ip.com9.2 Dynamic DNS Configuration - DynDNS.org10 Deployment121212121211 Warranty24252510.1 Mako ID Change (Reseller Test)10.2 Hardware Modification (Reseller 32325252613131314142WWW.MAKONETWORKS.COM

1Management1.1 Creating a company profile (Reseller Only)MenuorManagement Home Add a companyManagement Company New Company1)Select the Parent Company.2)Enter the Company Name.3)Enter the Address.4)(Optional): Enter the Suburb.5)(Optional): Enter the City.6)(Optional): Enter the State.7)(Optional): Enter the Postal Code.8)Select the Country.1.1 NotesIt is possible for a reseller to belong tomultiple companies. Select the companythat will become the ‘Parent’ for thecompany being created.13) Access types are described inAppendix 1 of the Management SystemReseller Manual.14) Scope is defined as the single devicebeing created, or the entire Companybeing created.ResultCompany saved (if Mako device profileand/or user created these should be savedalso).-- Optionally Create a User -9)Select the user’s Title.10)Enter the First Name.11)Enter the desired username.12)Enter the user’s E-Mail address.13)Select Type of Access.14)Select the scope of access.-- Optionally Create a Mako -15)Enter the Mako name.16)Select the Hardware type.17)(Optional): Enter the Mako ID.18)(Optional): Enter any associated licenses for this device.19)(Optional): Enter location specific details (Default: InheritCompany details).1.2 Adding a Mako to a company (Reseller Only)Menu UATManagement Company Manage [Company] Add a Mako1)Select Management.2)Select Company and in the search box enter the Company youwant to add a new Mako device to.3)Select Company from the search results; your browser will beredirected to the Management tabs for the selected company.4)Select the ‘Add Mako to [Company]’ hyperlink, or click the AddMako tab.5)Select the appropriate model and enter the required name forthe new device profile.6)(Optional): Enter the Mako ID and any associated licenses youhave been supplied.31.2 ResultSelecting ‘Add’ creates the device profile,selecting ‘Add and Configure’ creates thedevice profile and redirects the user tothe configure page for the newly createdprofile.WWW.MAKONETWORKS.COM

2Connectivity Configuration2.1 Notes2.1 ADSL WAN, PPP ConfigurationPrerequisiteMako ADSL device profile has been loaded for configuration. This could be done via loadingfrom the selection page or after creating a new company and choosing the ‘Add and Configure’option.MenuConfigure Internet ISP SetupSelect the ISP.2)Select the Plan.3)Enter the username and password details.4)(Optional): Configure external DNS for the CPE to use.5)(Optional): Configure the warning and absolute threshold levels.6)Select the correct Billing Cycle Start Date to match the ISP billingcycle (this information is used by the End of Month Report.)7)Click ‘Save’ to commit the changes.2.2 Notes2.2 Ethernet WAN, IP ConfigurationPrerequisiteMako Ethernet device profile has been loaded for configuration. This could be done via loadingfrom the selection page or after creating a new company and choosing the ‘Add and Configure’option. UATResultWAN Interface configured. If a USBconfiguration file is required the abovesteps will be enough information to get aCPE device to an online state.1)Menu5) is dependent on the ISP Plan. If youhave selected an ISP plan that is flat rate,Warning and Absolute Threshold alerts arenot available.Configure Internet ISP Setup1) and 2) are optional here and not strictlyrequired to bring a device to an onlinestate. The information provided duringthese steps is used for reporting purposes.8) is dependent on the ISP Plan. If youhave selected an ISP plan that is flat rate,Warning and Absolute Threshold Alerts arenot available.Result1)(Optional): Select the ISP.2)(Optional): Select the Plan.3)Enter the WAN IP address.4)Enter the Network Mask.5)Enter the default gateway.6)(Optional): Configure external DNS for the CPE to use.7)(Optional): Configure the Warning and Absolute Threshold levels.8)Select the correct Billing Cycle Start Date to match the ISP billingcycle (this information is used by the End of Month report).9)Click ‘Save’ to commit the changes.WAN Interface configured. A USBConfiguration file can now be downloadedand applied to the device.4WWW.MAKONETWORKS.COM

2.3 Notes2.3 Cellular WAN3) is optional and depends on theenvironment your configuring for.PrerequisiteA Mako Cellular device profile has been loaded for configuration. This could be done via loadingfrom the selection page or after creating a new Mako and choosing the ‘Add and Configure’option.MenuConfigure Internet ISP Setup4) is optional and depends on the type ofservice your using.6) is dependent on the ISP Plan. If youhave selected an ISP plan that is flat rate,Warning and Absolute Threshold Alerts arenot available.1)Select the ISP.Result2)Select the ISP Plan.3)(Optional): Enter the PIN number.WAN Interface configured. A USBConfiguration file can now be downloadedand applied to the device.4)(Optional): Enter the APN.5)(Optional): Configure external DNS for the CPE to use.6)(Optional): Configure the Warning and Absolute Threshold levels.7)Select the correct Billing Cycle Start Date to match the ISP billingcycle (this information is used by the End of Month report).8)Click ‘Save’ to commit the changes.2.4 Notes2.4 Adding IP RangeIP Ranges are defined by the ISP plan.Subnet masks can be entered in standardor CIDR formats.PrerequisiteISP Plan selected support IP Range.ResultMenuConfigure Internet IP Range1)Enter an IP range that has been allocated by the ISP.2)Click Save.2.5 Notes2.5 Configuring AlertsMenu UATIP Range now listed. IP addresses allocatedwithin IP Range are now available inthe Firewall section of the website asTarget IPs.Configure Internet Alerts1)Set the percentage level at which the system will alert based onyour daily average.2)Set the percentage level at which the system will alert based onyour selected ISP plan free monthly allowance.3)Select Worm Detection threshold.4)Select Port Scan Detection threshold.5)Select the maximum temperature before alerting.6)Select whether to alert if the internal fan stops spinning.Extraordinary Alerts are based aroundsummary data captured during an End ofMonth report. The Management Systemwill track usage patterns and can warnwhen certain thresholds are passed.2) is ISP Plan dependent; if the currentlyselected ISP plan is flat rate this option willnot be available.ResultManagement system alerts are configured.5WWW.MAKONETWORKS.COM

2.6 Notes2.6 Configuring Network LAN 1MenuSteps 6-10 are optional and are only usedwhen client machines on the LAN areconnecting via DHCP. Client settings canoverride any DHCP options entered here.Configure Network LAN 11)(Optional): Enter a name to describe the LAN.2)Select whether to allow or deny ICMP echo-request (default:deny).3)Enter the Ethernet IP address.4)Enter the subnet mask.5)Enable or disable DHCP (default: enable).6)(Optional): Enter the start IP address for DHCP allocation.7)(Optional): Enter the stop IP address for DHCP allocation.8)(Optional): Enter the IP address of a WINS server for DHCP clients.9)(Optional): Enter the IP address of a primary DNS server for DHCPclients.10)ResultLAN 1 Interface is configured.(Optional): Enter the IP address of a secondary DNS server forDHCP clients.2.7 Notes2.7 Configuring Network LAN 2LAN 2 supports disabling NAT. This isuseful if you have a public IP range andwish to allocate the entire range to thisnetwork port.Prerequisite6500 - A2 / 3G / E Hardware type.MenuIf Steps 6 and 7 are not set the defaultaction is to use the entire LAN subnet forIP allocation.ResultConfigure Network LAN 2LAN 2 can have NAT enabled or disabled.See ‘Configuring Network LAN 1’2.8 Notes2.8 Configuring DHCP Leases1)Enter the IP Address.2)Enter the MAC Address. (Format XX:XX:XX:XX:XX:XX)The DHCP Leases page will beautomatically populated by the Makodevice after a lease has been issued. Thissection of the website can be used tostatically assign a particular IP address to aMAC address.3)(Optional): Enter a comment.The Mako Management System uses the“Comments” field for reporting purposes.4)Click Add.MenuConfigure Network DHCP LeasesResult2.9 Configuring Static RoutesMenuDHCP Entry displayed on page. AfterCPE update (2 minutes) the assigned IPaddress should be allocated to the correctrequesting MAC address.Configure Network Static Routes1)Enter the subnet information.2)Enter the gateway address to reach this subnet (must be local).2.9 Notes3)(Optional): Enter a name for the static route.4)Click Add.If the name field is omitted then thenetwork and subnet mask will be used asa name.Static routes can be edited by clicking onthe cog icon.ResultStatic route added. UAT6WWW.MAKONETWORKS.COM

3Firewall Configuration3.1 Notes3.1 Inbound Basic RuleMenuThe IP address must be reachable via onethe Mako’s internal LAN interfaces, eitherdirectly or via a static route.Configure Firewall Inbound Basic1)Enter the internal IP Address to forward traffic to.2)Select the service type from the list provided.3)(Optional): Enter a comment for the rule.Result4)Click Add.Firewall rule added to list.3.2 Notes3.2 Inbound Advanced RuleMenuThe IP address must be reachable via onethe Mako’s internal LAN interfaces; eitherdirectly or connected via a static route.Configure Firewall Inbound Advanced1)Enter the Source IP Address (blank for any).2)(Optional): Enter the subnet mask (defaults to /32).3)Select the External Service Type.4)(Optional): Select the Internal Service Type.5)(Optional): Enable Trace Logging (recommended only in rarecircumstances).6)(Optional): Enter a comment for the rule.7)Click Add. UATThe refresh button can be used to force anupdate from the NOC to the Mako.The External Service and the InternalService can be different; the Mako willperform a port translation in this case.Trace Logging means any packet comingthrough the firewall will be logged.ResultFirewall rule added to list.3.3 Notes3.3 Outbound Basic RuleMenuThe refresh button can be used force anupdate from the NOC to the Mako.The Refresh button can be used to forcean immediate update from the NOC to theMako.Configure Firewall Outbound Basic1)Enter a Source IP Address, or select a source network from thedrop down list.2)Enter a Destination IP Address, or leave blank for ‘anywhere’.3)Select the Service Type.4)Set the action for the rule: Allow or Deny.5)(Optional): Enter a comment for the rule.6)Click Add.Firewall rules are implemented fromthe top down. Be wary of this whenconstructing complex rule sets.ResultFirewall rule added to list.7WWW.MAKONETWORKS.COM

3.4 Configuring Firewall - Outbound AdvancedMenuConfigure Firewall Outbound Advanced7)Enter the Source IP Address.8)(Optional): Enter the Source Subnet Mask (default: /32).9)Enter the Destination IP Address.10)(Optional): Enter the Destination Subnet Mask (default /32).11)Select the Service Type.12)Set the action for rule: Allow or Deny.13)(Optional): Set Trace Logging flag (default: Allow-disabled, Denyenabled).14)(Optional): Enter a comment.15)Click Add.3.5 Configuring Firewall - Intranet BasicPrerequisiteConfigure Firewall Intranet BasicSelect the Source Network.2)Enter the Destination IP or select the Destination Network.3.5 NotesThe refresh button can be used force animmediate update from the NOC to theMako.3)Select the Service Type.4)Set the action for the rule: Allow or Deny.5)(Optional): Enter a comment.6)Click Add.Firewall rule added to list.3.6 Configuring Firewall - Intranet Advanced UATFirewall rule added to list.Result1)MenuResultAny manually entered IP addresses mustbe local to the device, either directlyconnected or reachable via a static route.6500 – A2 / Cellular / E Hardware type.Menu3.4 NotesThe Refresh button can be used force animmediate update from the NOC to theMako.Configure Firewall Intranet Advanced1)Enter the Source IP Address.2)(Optional): Enter the Source Subnet Mask (default: /32).3)Enter the Destination IP Address.4)(Optional): Enter the Destination Subnet Mask (default /32).5)Select the Service Type.6)Set the action for the rule: Allow or Deny.7)(Optional): Set Trace Logging flag (default: Allow-disabled, Denyenabled).8)(Optional): Enter a comment.9)Click Add.83.6 NotesThe refresh button can be used force animmediate update from the NOC to theMako.Any manually entered IP addresses mustbe local to the device, either directlyconnected or reachable via a static route.ResultFirewall rule added to list.WWW.MAKONETWORKS.COM

3.7 Notes3.7 Configuring Firewall - VPN BasicThe refresh button can be used force animmediate update from the NOC to theMako.PrerequisiteAn IPSec VPN must be present. Refer 4.1 Mako to Mako IPSec VPN.MenuResultFirewall rule added to VPN rule list.Configure Firewall VPN Basic1)Select an IPSec VPN to create a rule for.2)Enter Source IP Address, or select Source Network from the dropdown list.3)Enter Destination IP Address, or select Destination Network fromdrop down list.4)Select the Service Type.5)Set the action for the rule: Allow or Deny.6)(Optional): Enter a comment.7)Click Add.3.8 Notes3.8 VPN Advanced RuleThe refresh button can be used force animmediate update from the NOC to theMako.PrerequisiteAn IPSec VPN must be present. Refer 4.1 Mako to Mako IPSec VPN.MenuFirewall rule added to list.Configure Firewall VPN Advanced1)Select an IPSec VPN to create a rule for.2)Enter the Source IP Address.3)(Optional): Enter the source Subnet Mask (default: /32).4)Enter the Destination IP Address.5)(Optional): Enter the Destination Subnet Mask (default: /32).6)Select the Service Type.7)Set the action for the rule: Allow or Deny.8)(Optional): Set Trace Logging flag (default: Allow-disabled, Denyenabled).9)(Optional): Enter a comment.10) UATResultClick Add.9WWW.MAKONETWORKS.COM

4VPN and Remote AccessConfiguration4.1 Result4.1 Mako to Mako IPSec VPNMako to Mako IPSec VPN constructed withthe desired default traffic direction.PrerequisiteAt least two device profiles must exist in order to construct a Mako to Mako IPSec VPN. Thedevice profiles do not need to exist under the same company; a reseller with access to multiplecustomers can use the search feature to construct inter-company IPSec VPNs.MenuConfigure VPN Mako to Mako Manage Access1)On the left-hand side, select the local network to be part of theIPSec VPN.2)Select the direction of traffic flow. This controls firewall settingsallowing or denying traffic originating in a certain direction.3)Select the other device profile to be part of the IPSec VPN. Thesearch magnifying glass icon can be use to locate device profilesunder other companies (Reseller only function).4)Select the network on the other device that will be part of theIPSec VPN.5)Click Add.4.2 Notes4.2 Add Third Party DeviceMenuConfigure VPN Mako to Mako Add Third Party Device1)Enter the Location name.2)Enter the Public IP Address of the Third Party Device.3)Enter the Network that will be part of the IPSec VPN.4)Click Add, or Add and Create VPN. UATResultDevice created is now available in theManage Access section and can be used toconstruct an IPSec VPN.4.3 Notes4.3 Delete Third Party DeviceMenuRefer Appendix 3 of the ManagementSystem Reseller Manual for moreinformation on IPSec parameters.Configure VPN Mako to Mako Delete Third Party Device1)Select the device to delete.2)Click Delete. A confirmation box will be displayed allowing theuser to confirm or cancel this action.10Any IPSec VPNs or VPN Firewall rulesassociated with the Third Party IPSecdevice will be removed.ResultThird Party IPSec device is no longeravailable in the Manage Access section.WWW.MAKONETWORKS.COM

4.4 Notes4.4 Mako to Third Party IPSec VPNRefer Appendix 3 of the ManagementSystem Reseller Manual for moreinformation on IPSec parameters.PrerequisiteThe local subnets at both ends of an IPSecconnection must be unique.A Third Party device needs to be available to use.MenuConfigure VPN Mako to Mako Manage AccessResult1)On the left-hand side, select the local network to be part of theIPSec VPN.2)Select the direction of traffic flow. This controls firewall settingsallowing or denying traffic originating in a certain direction.Mako side of IPSec tunnel will be created.If the other end is correctly configuredthen the tunnel should establish and beuseable.3)Select the Third Party Device profile to be part of the IPSec VPN.The search magnifying glass icon can be use to locate deviceprofiles under other companies (Reseller only function).4)Enter the pre-shared key to be used during authentication for thisIPSec tunnel. Alternately, the Management system can generate aunique pre-shared key by clicking on the [random] hyperlink.5)Click Add.4.5 Notes4.5 PPTP ConfigurationMenuConfigure VPN Remote Access PPTP Settings1)Enable PPTP access.2)Select the Network to terminate PPTP VPNs.3)Enter the IP Range Start Address.4)Enter the IP Range Stop Address.5)(Optional): Enter a DNS server address to be allocated to aconnecting PPTP client.6)(Optional): Enter a WINS server address to be allocated to aconnecting PPTP client.7)Click Save.Due to the above nature of PPTP, theconnecting client cannot have the samenetwork as the Mako. I.e. They cannot bothhave 10.0.0.0/8, as a routing conflict willexist.ResultPPTP Configured. PPTP will not beactivated on the device until a user iscreated and enabled, refer 4.6 and 4.7.4.6 Notes4.6 Adding VPN UserMenuPPTP allocates IP addresses from thenetwork terminating the PPTP sessions.It is important to ensure that theIP addresses allocated during PPTPConfiguration do not conflict with existingdevices on the LAN.Configure VPN Remote Access Add VPN UserThe user will receive an e-mail containinglogin details. These details are used byPPTP users when they construct a PPTPVPN, or by a Remote Access IPSec VPNuser when they log into the ManagementSystem to exchange pre-shared keys.1)Enter the users First Name.2)Enter the users Last Name.3)Enter the desired Username.Result4)Enter the users E-Mail Address.5)Click Add.The user is created in the system. The willreceive an e-mail containing username andpassword information.The user will now be available in theRemote Access Manage Access section. UAT11WWW.MAKONETWORKS.COM

4.7 Notes4.7 Enabling Remote AccessMenu6)5User access is disabled by default.Configure VPN Remote Access Manage AccessToggle the red and green access orbs to enable or disable accessof the required type on the appropriate LAN by clicking once onthem.ResultAccount state is changed and access isallowed or denied.Quality of ServiceQuality of Services comes pre-configured. The Mako Team has developed a generic QoS profilethat suits the majority of customers. All QoS changes are done via Configure Services QoS Advanced. The hyperlink found atConfigure Services QoS Custom is the same menu item.QoS works by dividing the available upstream bandwidth into segments called bins.5.1 Notes5.1 Adding a service to a QoS BinConfigure Services QoS AdvancedSource Addresses can be used to providefine-grained control over QoS.1)Select the Service Type.Result2)Select the Bin.3)Service added to selected QoS Bin andprioritized accordingly.(Optional): Enter a Source Address.4)Click Add.Menu5.2 Removing a service from a QoS BinMenu1)Configure Services QoS AdvancedClick on the delete icon in the Remove Service column next tothe service you want to remove.5.3 Adding a QoS BinMenu1)2)New QoS bin available for use.Configure Services QoS Advanced5.4 NotesClick on the Add New Bin button.Any services in the QoS Bin being removedwill be deleted from the QoS profile.Configure Services QoS AdvancedClick on the delete icon in the Remove Bin column next to the binyou wish to remove.5.5 Managing QoS Bin bandwidth allocations.Menu UAT5.3 NotesThe new bin will be allocated 3%bandwidth from the most suitable bin. Thenew bin will be placed last in the priorityqueue.Result5.4 Removing a QoS BinMenu5.2 ResultService removed from QoS configuration.The bandwidth previously added to theQoS Bin will be distributed to the last QoSbin in the profile.ResultBin removed and QoS allocationsreadjusted.Configure Services QoS Advanced5.5 Notes1)Click on the ‘Show advanced bandwidth settings’ checkbox at thebottom of the page.The refresh button can be used force animmediate update from the NOC to theMako.2)Adjust QoS Bin allocations, ensuring the total adds to 100%.3)Click Save.ResultFirewall rule added to list.12WWW.MAKONETWORKS.COM

6VPN Cloud6.1 Notes6.1 Creating a VPN CloudPrerequisiteYou must have a least one appliance able to be used as a VPN Cloud concentrator.You must have the authority required to create a VPN Cloud for your network.Menu1)Management Company Manage MSP VPN CloudClick 'Create VPN Cloud'. The VPN Cloud modal window willappear.Enter a name for your VPN Cloud.3)Select a Mako to be used as a cloud concentrator. The Mako'sLAN details will appear.4)Enable at least one LAN over which the VPN cloud will operate.5)Click 'Save VPN Cloud'. The 'Save VPN Cloud' dialog box willappear.6)Enter your password to authorize this configuration change.Result6.2 Notes6.2 Joining a VPN CloudBy default, joining a Mako to a VPN Cloudallows bi-directional traffic.PrerequisiteResultA VPN Cloud must have been created for the business. UATWhile creating a VPN Cloud is very simple,you should ensure that its creation has agenuine business purpose, as maintainingseveral VPN clouds may cause unwantedmanagement problems.A new VPN Cloud is created.2)Menu1)A VPN Cloud is a virtual data center whereVPN traffic is managed by certificatebased authentication. It's a fast, secureway of handling VPN traffic.Configure VPN VPN CloudClick 'Join VPN Cloud'. A modal window will appear.2)Click 'Select VPN Cloud'. A drop-down selection box will appear.3)Begin typing the name of an available VPN Cloud. (In Mako'sDemo site, "BigCorp's Cloud" has been created.)4)If/When the cloud appears below the search box, click it. Thecloud name will appear in the VPN Cloud field.5)Click 'Save VPN Cloud connection'.13The VPN Cloud-enabled LANs of theselected Mako are listed.WWW.MAKONETWORKS.COM

6.3 Editing your Mako's options for its VPN CloudPrerequisiteSNAT settings, whether it's used or not,can be instrumental in diagnosing UScentric problems.Your Mako must have joined a VPN Cloud.Menu1)Configure VPN VPN CloudThe page shows the name of the Mako's VPN Cloud, how manyLANs your Mako has assigned to the cloud, the direction, SNATsetting and the Options ( ) column.2)Click the button. The 'Join VPN Cloud' modal pane appears.3)Click 'Select concentrators, VPN direction and SNAT'. The VPNCloud's concentrator list and Mako LAN properties appear.4)Enter an SNAT address in IPv4 or CIDR notation, and/or select adirection change, and/or a priority weighting level. You may alsoengage or disengage a Mako's LAN from the cloud.5)Click 'Save VPN Cloud connection'. You will return to the mainpage listing the VPN Cloud your Mako has joined.Traffic direction determines which waydata may be transmitted and receivedfrom Mako to Mako.Priority is a weighting level. A Mako'sLAN may be part of several VPN cloudnetworks in a distributed concentratorconfiguration. Priority assists indistributing loads across severalconcentrators.ResultThe Mako's LAN's properties have beenaltered.6.4 Notes6.4 Simple Diagnostics on VPN CloudPrerequisiteThis procedure requires a laptop or IP client with which to plug in to theLAN(s) of a Mako assigned to a VPN Cloud. UAT6.3 NotesOptions may be edited during the 'Joining'process.1)Plug a PC or IP client to the LANs on at least one Mako designatedas a VPN Cloud Mako.2)Enter the CMS and select the Mako.3)Menu4)This diagnostic displays the Cloud name, Device tunnel name, thenumber of connections in the cloud, the Peer Network count andlocal network address.5)Menu6)This displays the networks discovered over the VPN Cloud,including network ranges, weights and endpoint address.VPN Cloud diagnostics start stepping outof the scope of user acceptance testing.Some properties are only accessible viahigh level system administrators.ResultSeveral tables of diagnostic informationare present for user evaluation.Reports Diagnostics VPN Cloud SetupReports Diagnostics VPN Cloud Routing Table14WWW.MAKONETWORKS.COM

7Mako Guardian7.1Category Management7.1 NotesMako Spyware Protection can be enabledby checking the ‘Enable Mako SpywareProtection’ checkbox.PrerequisiteA Mako Guardian license must be installed to use this functionality.Mako Guardian must be activated. Activate it from this same Menu by clicking the ‘Enable MakoGuardian’ checkbox.An ‘Add All’ category is available; thissimply adds all categories into the profileconfiguration.Configure Services Mako Guardian Sites CategoriesGroups and Times default to Everyone/Anytime. Additional Groups and Times canbe configured. Refer 6.10 through to 6.18.1)Select a category for the drop down list.Result2)(Optional) Select a Group.New category selected is added to the list.3)(Optional) Select a Time.4)Select an action for the category: Allow or Deny.5)Click Add.Menu7.2 Notes7.2 Default Site CategoriesA Mako Guardian license must be installed to use this functionality.The Mako Team has put together astandard set of categories suitable to mostsites. Using the Default button will loadthose categories into the list, replacing anyuser-specific changes.Mako Guardian must be activated. Activate it from this same Menu by clicking the ‘Enable MakoGuardian’ checkbox.ResultPrerequisiteMenu1)Configure Services Mako Guardian Sites CategoriesClick the ‘Use Default Site and Phrase Categories’ button.7.3 Notes7.3 Custom SitesPrerequisiteA Ma

2.1 ADSL WAN, PPP Configuration 4 2.2 Ethernet WAN, IP Configuration 4 2.3 Cellular WAN 5 2.4 Adding IP Range 5 2.5 Configuring Alerts 5 2.6 Configuring Network LAN 1 6 2.7 Configuring Network LAN 2 6 2.8 Configuring DHCP Leases 6 2.9 Configuring Static Routes 6 3 Firewall Configuration 7 3.1 Inbound Basic Rule 7 3.2 Inbound Advanced Rule 7

Related Documents:

The Mako Robotic-Arm Assisted System helps to address the challenges in today's changing orthopaedic landscape and healthcare environment. . as laying a scientific foundation for the support and development of future products and applications. Potential benefits of Mako partial knee arthroplasty Partial knee arthroplasty (PKA) for patients .

Yes. We used to support over 600 Netezza customers globally on behalf of Netezza and then IBM for 5 years (during the transition from TwinFin to Striper - N1000 to N2000 series), and some of our team even worked on the Striper and Mako engineering side of things. We also support a number of Mako customers directly around the world at present.

Musical Lyrics & Script SCENE 1 Hammerhead: Gee! I just love it when we "card sharks" get together for our weekly game Blue Shark: Hey, Mako, got any Jacks? Mako Shark: Yeah, Blue! I got two. Blue Shark: How about you, Hammerhead, got any 7's? Hammerhead: How did you know that? Blue Shark: I got eyes in the back of my head. Okay Tiger, I know you have some 9's. Hand 'em over! Tiger Shark: Nope .

For additional information, contact Market Monitoring at 514 871-7877 LIST OF MARKET MAKERS Class Symbol Underlying Symbol Canaccord Genuity Corp. Mako Global Derivatives Partnership LLP National Bank Financial Inc. DV Tradi

Mako shark MO 2 (mg O 2 kg ¡1 h¡1) was measured by recording the decline in water O 2 concentration over time as the shark swam at a designated speed (Sepulveda et al. 2003). A calibrated polarographic O 2 electrode and meter (Model 52, Yellow Springs Instrument, OH, USA) were in

Surgical Technique of the selected implant system. Mako TKA with Triathlon Surgical Protocol (PN TRIATH-SP-21) Manual TKA Surgical Technique for KINETIS (PN 210468). C. MAKO TKA TERMINOLOGY Approach Zone A volume in space around the kn

One-piece ball stem Panel mountable Variety of End Connections Straight, Angle and 3-Way ow patterns Each and every valve is tested at the factory . Phone: 405-509-2665 Fax: 866-239-1587 408 Wimbledon Rd., Edmond, OK 73003 www.mako-products.net .

Mako Total Knee tray layouts Stryker leg positioner instrument kit Description 1 210040 Rail clamp 2 210110 Sled 3 210070 Extension bar 4 210194 PCL retractor 5 210192 Smiley retractor (2) 6 210098 Large antler 7 210099 Small antler (located below long antler) Description 8 210195 Patella retractor* 9 210196 Patella protector* 10 210193 Rake retractor 11 210191 Hohmann retractor