The security section of the documentation uses several terms that must be clarified for
a good understanding.
- Firewall Router
- This is a device that isolates the corporate network from the Internet. It typically allows
connections to the Internet, but also prevents connections from entering. They can usually be
configured to allow/prevent several conditions. They can be configured to allow a port
connection from the Internet to go through to a machine. This can be done either by allowing
the connection straight through or translating it to a different port.
- NAT
- Network Address Translation is a method of allowing computers to access the Internet
without having them be assigned real Internet addresses. The connections must originate from
the internal machines to reach Internet addresses. TheNAT router will then put these on
the Internet using the router's IP address. When data is returned it forwards the data to the
requesting internal machine. Part of this process includes mapping what internal IP/Port
combinations correspond to external port usage. Doing so allows the router to know where data
needs to be sent when it returns. Special port mappings can be made to specific internal IP
addresses to support connections originating from the Internet. Other configurable values might
be session timers that will be explored in the section.
- Private Network
- This is the network used in the corporation that is private and trusted. Most companies
tightly control what is plugged in so they can ensure the data is safe.
- VPN
- Virtual Private Network is a method of tunnelling through an existing connection back
to the corporate LAN. It provides end-to-end encrypted connections. These types of connections
are usually equivalent to being plugged into the office LAN.
- Encryption of all Data
- Genero requires a TCP connection for the GUI data transmission. If the GDC short cuts are
being used there is also a connection needed to start the application that may require a log
in. Both connections in this case are encrypted.
- Password/login Encrypted
- Genero logs in and executes an application when the short cuts are used. This connection is
encrypted. The connection carrying the GUI data is not encrypted.
- Keep Alive
- Typical TCP connections don't cause any network traffic when idle unless the KeepAlive flag
is set. This flag will prevent the session from timing out and thus prevent the session from
closing. This also assumes that the firewalls don't expire the session during the keep alive
interval.
- Port Forwarding
- The method referred to is implemented in the Secure Shell (ssh). The ssh can be told to
listen to a port and tunnel it through an existing ssh session and present it to a port on the
other machine. This method is used to listen to a port on the server side and direct the data
to the GDC on the client side.
Note: This document covers system configuration using the following environment:
-
Genero Desktop Client Release 1.20.1a (under Windows®, Linux® and Mac Os 10)
-
Genero DVM Release 1.20.1a (Under Linux and Windows)
-
Different Openssh Server 3.x.yy under Linux