The security section of the documentation uses several terms that must be clarified for
  a good understanding. 
  
   
    - Firewall Router
 
    - This is a device that isolates the corporate network from the Internet. It typically allows
     connections to the Internet, but also prevents connections from entering. They can usually be
     configured to allow/prevent several conditions. They can be configured to allow a port
     connection from the Internet to go through to a machine. This can be done either by allowing
     the connection straight through or translating it to a different port.
 
   
   
    - NAT
 
    - Network Address Translation is a method of allowing computers to access the Internet
     without having them be assigned real Internet addresses. The connections must originate from
     the internal machines to reach Internet addresses. TheNAT router will then put these on
     the Internet using the router's IP address. When data is returned it forwards the data to the
     requesting internal machine. Part of this process includes mapping what internal IP/Port
     combinations correspond to external port usage. Doing so allows the router to know where data
     needs to be sent when it returns. Special port mappings can be made to specific internal IP
     addresses to support connections originating from the Internet. Other configurable values might
     be session timers that will be explored in the section.
 
   
   
    - Private Network
 
    - This is the network used in the corporation that is private and trusted. Most companies
     tightly control what is plugged in so they can ensure the data is safe.
 
   
   
    - VPN
 
    - Virtual Private Network is a method of tunnelling through an existing connection back
     to the corporate LAN. It provides end-to-end encrypted connections. These types of connections
     are usually equivalent to being plugged into the office LAN.
 
   
   
    - Encryption of all Data
 
    - Genero requires a TCP connection for the GUI data transmission. If the GDC short cuts are
     being used there is also a connection needed to start the application that may require a log
     in. Both connections in this case are encrypted.
 
   
   
    - Password/login Encrypted
 
    - Genero logs in and executes an application when the short cuts are used. This connection is
     encrypted. The connection carrying the GUI data is not encrypted.
 
   
   
    - Keep Alive
 
    - Typical TCP connections don't cause any network traffic when idle unless the KeepAlive flag
     is set. This flag will prevent the session from timing out and thus prevent the session from
     closing. This also assumes that the firewalls don't expire the session during the keep alive
     interval.
 
   
   
    - Port Forwarding
 
    - The method referred to is implemented in the Secure Shell (ssh). The ssh can be told to
     listen to a port and tunnel it through an existing ssh session and present it to a port on the
     other machine. This method is used to listen to a port on the server side and direct the data
     to the GDC on the client side.
 
   
  
  Note: This document covers system configuration using the following environment:
    - 
     
Genero Desktop Client Release 1.20.1a (under Windows®, Linux® and Mac Os 10)
     
    - 
     
Genero DVM Release 1.20.1a (Under Linux and Windows)
     
    - 
     
Different Openssh Server 3.x.yy under Linux