throbber
Administrator's Guide
`
`' Always show me suspect certificates: Aventail Connect will display
`suspect certificates each time they are received. The Certificate dialog
`box will appear for each new connection to the server(s) sending a sus-
`pect certificate. (This option allows you to continue the connection
`despite the fact that the certificate is questionable.) The SSL module
`authenticates the server’s certificate based on the following questions:
`-
`Is the certificate valid?
`
`- Did a trusted certificate authority (CA) issue the certificate?
`
`-
`
`Is the name established by the certificate the same as the name of
`the server for this connection?
`
`If a certificate does not pass all three tests, it is considered a suspect certifi-
`cate.
`
`- Show me the same certificate once: Aventail Connect will display a
`suspect certificate the first time that it is received. If you choose to
`maintain the connection, the questionable certificate will not be dis-
`played again during the current session.
`
`- Show me the certificate, but reiect the connection: Aventail Con-
`nect will reject a connection if the certificate is suspect. It will display the
`certificate to allow you to vi ew it.
`
`4. Click Advanced in the dialog box to show the acceptable cipher (a crypto-
`graphic algorithm used to encrypt the data stream) options.
`
`Aventail Connect 3.01/2.51 Admi'ni'straror’s Guide - 49
`
`Petitioner Apple Inc. — Exhibit 1022, p. 150
`
`Petitioner Apple Inc. - Exhibit 1022, p. 150
`
`

`
`Administrator? Guide
`
`Aventaf! Connect 3.01/2.51 Administratorb Guide - 50
`
`Petitioner Apple Inc. — Exhibit 1022, p. 151
`
`Petitioner Apple Inc. - Exhibit 1022, p. 151
`
`

`
`Administrator's Guide
`
`Allow RC4
`
`Allow DES
`
`Offer the RC4 cipher to the server.
`
`Offer the DES cipher to the server.
`
`Allow NULL Encryption Do not encrypt using SSL. SSL will be used to
`authenticate only.
`
`Allow Diffie—He||man
`Anonymous
`
`Enable Compression
`
`Trusted Roots
`
`Do not authenticate the server; only do encryption.
`
`Use SSL compression to improve performance when
`slower connections are detected.
`
`Select a certificate file that specifies trusted certificate
`chain roots. and specify the maximum allowable
`certificate-chain length.
`NOTE: The trusted root tile MUST be placed in the same drrectoqr as the
`Aventail Connect configuration file.
`
`Select the specific file
`
`Client Certificate
`
`Select a client certificate file.
`NOTE: The client certificate MUST be placed in the same directory that
`Aventail Connect was installed to.
`
`Select the specific file
`
`During the initial SSL connection, the client and the server negotiate which
`cipher to use. Checking a particular cipher in the dialog box does not mean
`that it will be used. Instead, each checked cipher is offered to the server, but
`the server determines which cipher to use. if the server requires a cipher that
`is not selected in this dialog box, the authentication will fail.
`
`Any or all of the acceptable cipher options can be selected:
`
`- Allow RC4: Aventail Connect encrypts the information using the RC4
`cipher.
`
`- Allow DES: Aventail Connect encrypts the information using the DES
`cipher.
`
`- Allow NULL Encryption: Aventail Connect allows the server to select
`no encryption. Message integrity is still assured, but the data will be
`sent in cleartext.
`
`- Allow Diffie-Hellman Anonymous: Aventail Connect will be able to
`communicate with the extranet (SOCKS) server without requiring a
`server certificate. The client and server will not exchange certificates,
`so there will be no authentication. The encryption will still be negotiated,
`and the data stream will still be encrypted (unless NULL encryption is
`chosen by the server).
`
`Aventail Connect 3.01/2.51 Admr'nr'strator’s Guide ' 51
`
`Petitioner Apple Inc. — Exhibit 1022, p. 152
`
`Petitioner Apple Inc. - Exhibit 1022, p. 152
`
`

`
`Administrator's Guide
`
`' Enable Compression: To speed the encryption process and enhance
`overall performance. Aventail Connect will automatically compress
`encryption when a narrow bandwidth andior slow modem are detected.
`
`5.
`
`If necessary, add (or delete) a trusted root (* . rot) to (or from) the list of
`
`trusted roots by clicking Browse. Only the filename of the roots file loads via
`the Browse button, and not the pathname.
`
`CA U TION: The trusted root tite must be in the same directory as
`the Aventail Connect configuration file.
`
`If Aventail Connect sends a client certificate to the server during the initial
`authentication exchange, it sends the certificate identified in the Client Certif-
`icate window. To load the client certificate, press Browse and then select the
`
`client certificate (* . cer) from the Aventail Connect directory. Only the file-
`name of the certificate file loads via the Browse button, and not the path-
`name.
`
` _ CAUTION: The ciient certificate tite must be ptaceo‘ in the Aventaif
`
`Connect directory.
`
`When Aventail Connect receives a certificate from a server, it looks at the root
`
`of the certificate chain and matches it against the Aventail Connect list of
`trusted roots.
`
`You can specify the maximum number of certificates in a certificate chain. The
`default maximum length is two certificates. In most instances, Aventail recom-
`mends allowing no more than two certificates to form a chain, although you
`can specify up to ten. The longer the certificate chain, the less secure the
`chain is.
`
`CA UTION:
`
`in most instances, Aventait recommends aiiowing no more
`than two certificates in a certificate chain. Attowing more
`than two certificates can compromise security.
`
`6. After making appropriate selections, click OK.
`
`The dialog box closes and the Config Tool reappears.
`
`ADVANCED TAB OPTIONS
`
`The Advanced tab in the Config Tool contains three advanced options. In the
`Advanced tab, you can allow SOCKS tunneling through successive extranet
`(SOCKS) servers, secure selected applications, and set credential cache time-
`outs.
`
`Aventaii Connect 3.01/2.51 Administrator's Guide - 52
`
`Petitioner Apple Inc. — Exhibit 1022, p. 153
`
`Petitioner Apple Inc. - Exhibit 1022, p. 153
`
`

`
`Administrator '5 Guide
`
`1} Config Tool ~ C:K...'U5tventai|\.l5rventaiI.clg
`
`Eile
`
`lialrs
`
`Fledirection Flules
`Local Name Flesolution
`
`I
`
`Sewers
`l“ld‘r'5i"|DBCl
`
`I
`
`I
`
`Destinations
`iltuthenticalion
`
`l7
`Applications to Secure
`
`5' Secure all applications
`
`
`F Secure all applications except listed
`
`
`1" Secure gnly applications listed
`Credential Timeouts
`
`Modify: List
`
`l
`
`
`
`
`
`
`5' flever time out cached credentials.
`7' Tine out credentials lrom line first entered
`_
`7' Tine out credentials lrom tine_|ast used.
`
`.
`
`ll
`
`_.l
`.
`_—| Mm‘
`
`ALLOW SOCKS TUNNELING THROUGH SUCCESSIVE EXTFIANET SEFWEFIS
`
`Once sewers and destinations are defined, you can direct SOCKS traffic
`through successive extranet (SOCKS) servers.
`
`On the Advanced tab in the Config Tool, select the Enable redirection... box to
`allow credential information to fonlvard to successive extranet servers.
`
`SECURE SELECTED APPLICATIONS
`
`This option allows you to:
`
`-
`
`-
`
`secure all applications except those listed,
`
`secure only the applications that are listed,
`
`- or secure all applications, enabling neither exclusion nor inclusion.
`
`
`
`NOTE: You can exclude and include only 32-bit applications. You cannot
`exclude and include 16-bit applications.
`
`You can exclude or include specified applications in the Exclusioniinclusion List.
`With the Exclusionllnclusion List, you can secure all applications except those
`on the list, or you can secure only those applications on the list. The default set-
`ting is to secure (hook) all network applications.
`
`Aventail Connect 3.01/2.51 Adminislralofls Guide - 53
`
`Petitioner Apple Inc. — Exhibit 1022, p. 154
`
`Petitioner Apple Inc. - Exhibit 1022, p. 154
`
`

`
`Administrators Guide
`
`Excluding Applications
`
`You can exclude specific applications through the Exclusionilnclusion List. When
`you enable the “Secure all applications except listed” option, Aventail Connect
`will not proxy any applications that are on the Exciusionilnclusion List.
`
`To exclude an application
`
`1. Under “Applications to Secure,” select Secure all applications except listed
`and click Modify List.
`
`The Edit List dialog box appears.
`
`
`
`
`2. Click Add....
`
`Aventail Connect 3.01/2.51 Administratorb Guide - 54
`
`Petitioner Apple Inc. — Exhibit 1022, p. 155
`
`Petitioner Apple Inc. - Exhibit 1022, p. 155
`
`

`
`The Specify Application dialog box appears.
`
`Administrator '5 Guide
`
`i'5fiF'rograrn
`§ Spellflhk
`E netscapee:-:e
`E N |:i'W'rap. e:-ce
`nsnotify. ene
`
`
`
`Lchnkjrlt
`
`VI El
`
`
`
`|
`
`
`
`F3138 ofype:
`
`|i'-applications
`
`‘I
`
`ca,-.ce|
`
`3. Highlight the application(s) to add to the Exclusionilnclusion List, and then
`click Open.
`
`The Specify Application dialog box disappears and the applications are now
`in the Edit List dialog box.
`
`4. In the Edit List dialog box, select All occurrences or Only this occurrence.
`
`
`
`NOTE: You may have more than one path (instance) of a specified flie-
`name (e. g., ftp . exe). You can choose to exclude one specified
`appiication, with a tuiiy quaiified pathname (e. g., C : \wi n-
`dows\ Sys3 2 \ ftp . exe), or ail‘ instances of a specified fitename
`(e.g., aii instances of ftp.exe).
`
`- Only this occurrence: Selecting this option excludes only the speci-
`fied application.
`
`- All occurrences: Selecting this option excludes all applications with
`the specified filename.
`
`To undo application exclusion
`
`1. Under “Applications to secure,” select Secure all applications except listed,
`and then click Modify List.
`
`The Edit List dialog box appears.
`
`2. Highlight the application you want to remove from the Exclusionilnclusion List,
`and then click Remove.
`
`The application is removed from the Exclusionilnclusion List.
`
`Aventaii Connect 3.01/2.51 Administrator’s Guide - 55
`
`Petitioner Apple Inc. — Exhibit 1022, p. 156
`
`Petitioner Apple Inc. - Exhibit 1022, p. 156
`
`

`
`Administrator's Guide
`
`inciuding Appiicarions
`
`You can include specific applications through the Exclusion/inclusion List. When
`you enable the “Secure only applications listed" option, Aventail Connect will
`hook only those applications that are on the Exclusionilnclusion List.
`
`To include an application
`
`1. Under “Applications to secure," select Secure only applications listed, and
`then click Modify List.
`
`The Edit List dialog box appears.
`
`2. Click Add.
`
`The Specify Application dialog box appears.
`
`3. Highlight the application(s) to add to the Exclusionilnclusion List, and then
`click Open.
`
`The Specify Application dialog box disappears and the applications are now
`in the Edit List dialog box.
`
`4. In the Edit List dialog box, select All occurrences or Only this occurrence.
`
`
`
`NOTE: You may have more than one instance of a specified application
`(e. g., ftp . exe). You can choose to inciude one specified appli-
`cation, with a fuiiy quaiified pathname (e. 9., C : \Win—
`dc-ws\ Sys3 2 \ ftp . exe), or aii instances of a specified
`appiication (e. g., aii instances of ftp . exe).
`
`- Only this occurrence: Selecting this option excludes only the speci-
`fied application.
`
`- All occurrences: Selecting this option excludes all applications with
`the specified filename.
`
`To undo application inclusion
`
`1. Under “Applications to secure," select Secure only applications listed, and
`then click Modify List.
`
`The Edit List dialog box appears.
`
`2. Highlight the application you want to remove from the Exclusionilnclusion List,
`and then click Remove.
`
`The application is removed from the Exclusionilnclusion List.
`
`Securing ail Appiications
`
`You can secure at! applications, enabling neither exclusion nor inclusion. When
`you secure all applications, Aventail Connect ignores any applications on the
`Exclusionilnclusion List.
`
`Aventaii Connect 3.01/2.51 Administrator’s Guide - 56
`
`Petitioner Apple Inc. — Exhibit 1022, p. 157
`
`Petitioner Apple Inc. - Exhibit 1022, p. 157
`
`

`
`Administrator's Guide
`
`To secure all applications
`
`' On the Advanced tab, under “Applications to Secure," select Secure all
`
`applications.
`
`
`
`NOTE: Aventail Connect secures all applications by default. Unless you
`need to exclude or include specific applications, Aventail recom-
`mends that you use the default Secure all applications setting.
`
` ' CAUTION: Microsoft internetserverproducts (including Microsoft inter-
`
`net information Server {ilS) and Microsoft Peer Web Server)
`include inetiniaexe, which conflicts with Aventail Connect
`
`3.01. To eliminate this conflict, exclude inetinloexe through
`the Application Exclusion/inclusion List in the Coniig Tool.
`
`CREDENTIAL CACHE TIMEOUTS
`
`With the credential cache timeout feature, you can control when credentials
`expire (time out). If a user has not made a connection to the extranet (SOCKS)
`server for a certain length of time (determined by the administrator). then the
`credentials will automatically be deleted from the credential cache. if a credential
`times out, the user must reauthenticate by entering the proper credentials before
`regaining access to the extranet. This feature can help to prevent unauthorized
`users from gaining access to secured areas.
`
`9v Conlig Tool - C:‘s...\Aventai|\Aventai|.clg
`Eilei flelp
`7
`A
`7
`‘
`
`
`
`Fledirection Flules
`Local Name Resolution
`
`I
`
`Servers
`AUVGVICBU
`
`I
`
`I
`
`Destinations
`Authentication
`
`I
`I
`
`l- Enable redirection through successive SUCKS sewers.
`Applications to Secure
`
`
`
`
`
`5' Secure all applications
`1" Secure all applications except listed
`1"‘ Secure gnly applications listed
`Credential Timeouts
`
`_
`_
`tjodriy LI5;l
`
`
`
`
`
`l‘“
`
`_.l
`.
`_-r '*"'"-
`
`in flever time out cached credentials.
`F Time out credentials lrom tinefirst entered.
`r-*
`""used"""""‘
`uulm-...r.¢...................uu-.M.u.4.n-A-r.|-s
`.«-u-q.a.._.._,..._.
`
`There are three credential cache timeout options.
`
`- Never time out cached credentials: Credentials never time out.
`
`Aventail Connect 3.01/2.51 Administrator’s Guide - 5?
`
`Petitioner Apple Inc. — Exhibit 1022, p. 158
`
`Petitioner Apple Inc. - Exhibit 1022, p. 158
`
`

`
`Admlnlslraror's Guide
`
`' Time out credentials from time first entered: Credentials time out x
`
`minutes after the user first entered the credentials (where “x” is the
`number of minutes you enter in the Min. box).
`- Time out credentials from time last used: Credentials time out Jr min-
`
`utes after the user last connected through the extranet server (where
`")4" is the number of minutes you enter in the llllin. box).
`
` . CAUTl0l\l:
`
`ll‘yourmallprogram is configuredto check fore-mallat
`
`regular intervals, the mall-checking frequency must be
`longer than the credential cache timeout. For example, if
`your mall program ls configured to check for mall every
`ten minutes, you should set the credential cache to less
`than ten minutes.
`
`ENABLE PASSWORD PROTECTION
`
`You can enable password protection for a configuration file. If you enable pass-
`word protection, users will not be able to view or modify the configuration file
`without the assigned password. A password is not required to use the configura-
`tion file with Aventail Connect.
`
`To enable password protection
`
`1. From any tab of the Config Tool, select File I Set Password.
`
`33- [Ioniig Tool — E:\...\Avenlail\.l5.venlai|.clg
`
`EZ:kF'rog1am Fi|'es\itli.veritail\l!l.ventai|. cfg
`
`The Configuration File Password dialog box will appear.
`
`2. Enter the desired password.
`
`3. Reenter the password to confirm, and then click OK.
`
`Aventall Connect 3.01/2.51 Adml'nl'slralcr’s Guide - 58
`
`Petitioner Apple Inc. — Exhibit 1022, p. 159
`
`Petitioner Apple Inc. - Exhibit 1022, p. 159
`
`

`
`Administrator's Guide
`
`To disable password protection
`
`1. From any tab of the Config Tool, select File I Set Password.
`
`The Configuration File Password dialog box will appear.
`
`2. Clear the password from both boxes. and then click OK.
`
`
`
`NOTE:
`
`if you save an existing configuration fiie using the Save As com-
`mand, Avenfaii Connect wiii prompt you to enter the correct pass-
`word for the configuration fiie.
`
`MULTIPLE FIREWALL TRAVERSAL
`
`To gain access to your extranet, users may need to traverse multiple firewalls. In
`the simplest case, this involves an employee at a partner company gaining
`access to the Internet via an outbound proxy server at the partner company, and
`having an authenticated, encrypted, and controlled connection to your internal
`network via an Aventail ExtraNet Server. This capability is provided in Aventail
`Connect 3.01 by the Aventail MultiProxy feature. Aventail Connect can open
`connections through SOCKS servers, through HTTP proxies, or through proxy
`chaining.
`
`- MultiProxy with SOCKS Server: Uses a SOCKS server to control out-
`bound access.
`
`° MultiProxy with HTTP Proxy: Uses an HTTP proxy to control out-
`bound access.
`
`- Proxy Chaining: Uses two Aventail ExtraNet Sewers, where one
`Aventail ExtraNet Sewer acts as a client to another Aventail ExtraNet
`Server.
`
`AVENTAIL MULTIPROXY
`
`The Aventail MultiProxy feature allows Aventail Connect to traverse multiple fire-
`walls by making connections through successive proxy servers. Aventail Con-
`nect makes a connection with each proxy server individually. Each proxy server
`forms a link in a chain that connects Aventail Connect to the final destination.
`
`Any or all of the proxy servers can apply authentication and access control rules.
`Proxies can be Aventail ExtraNet Sewers, other SOCKS 5 servers, SOCKS 4
`
`servers, or HTTP proxies.
`
`Using an HTTP proxy server to control outbound traffic eliminates the need to
`install a separate SOCKS server. This HTTP proxy can filter outbound connec-
`tion requests and route those requests to the specified servers. MultiProxy sup-
`ports RFC 2068 HTTP Basic (usernameipassword) authentication. If your proxy
`uses HTTP Basic (usernameipassword) authentication, Aventail Connect will
`store the username and password information in the credential cache, as it does
`with SOCKS sewers.
`
`Aventail Connect 3.01/2.51 Administrators Guide - 59
`
`Petitioner Apple Inc. — Exhibit 1022, p. 160
`
`Petitioner Apple Inc. - Exhibit 1022, p. 160
`
`

`
`
`
`NOTE: The MuitiProxy feature supports the use of HTTP proxies in
`Aventaii Connect 3.01 oniy. HTTP proxies cannot be used in
`A ventaii Connect 2.51.
`
`Administrator's Guide
`
`The steps for making a connection using MultiProxy are:
`
`1. The client application requests access to the destination server.
`
`2. Aventail Connect establishes a connection with the outbound server (SOCKS
`sewer or HTTP proxy). Aventail Connect then sends the access request to
`the outbound sewer, specifying the Aventail ExtraNet Sewer as the destina-
`tion. The user authenticates with the outbound server, if necessary.
`
`3. Aventail Connect instructs the outbound server to establish a connection with
`
`the Aventail ExtraNet Sewer on the specified port. The user authenticates
`
`with the Aventail ExtraNet Sewer, if necessary.
`
`4. Aventail Connect instructs the Aventail ExtraNet Server to proxy its connec-
`tion to the final destination.
`
`5. Once the connection between the client and the Aventail ExtraNet Server is
`
`established, the outbound server simply relays the data.
`
`The following example illustrates the connections made during a MultiProxy con-
`nection through three proxy sewers.
`
`IE
`
`|
`:
`I
`:I
`lapplicalj tn
`
`proxy 3
`Aventail Cc-rnect
`|:ur::o<y 1
`I
`I
`.
`I
`l
`I
`tonne-:|:Ion #1 -ISKKS
`connezticun #2 :5mKS :
`connection #3
`:SCICKS
`:I:Inna:tiI:In #4
`
`
`
`In the following diagram, the Aventail ExtraNet Server acts as both a destination
`and a server. It is a destination because a proxy sewer routes traffic to it. It is a
`sewer because it routes traffic to the final destination.
`
`
`
`d
`
`2
`
`final destination
`
`crI_IH:n:III_Ind proxy server
`
`»'-‘l.1rentai| ExtraNet
`Center server
`
`Aventail Connect 3.01/2.51 Administraror’s Guide ' 60
`
`Petitioner Apple Inc. — Exhibit 1022, p. 161
`
`Petitioner Apple Inc. - Exhibit 1022, p. 161
`
`

`
`Administrator's Guide
`
`CA U TION:
`
`if using an HTTP proxy, you must configure your HTTP
`proxy and fire wait to aiicw H TTPS/SSL connections to
`port 1080, OR you must run the Aventaii ExtraNel‘
`Server on port 443 or part 563.
`
`Configuring Aventaii il/fuitiProxy
`
`You have two options for configuring Mu|tiProxy. You can configure Aventail
`Connect 3.01 to redirect all Internet traffic (including extranet traffic) through
`your outbound proxy, or you can configure Aventail Connect 3.01 to redirect only
`extranet traffic through your outbound proxy.
`
`To configure Aventail I'li|ultiProxy
`
`1. Create a destination (“Final destination”).
`
`2. Create a server (“Extranet server”).
`
`3. To redirect only extranet traffic: Create a destination ("Extranet server"),
`using the same information from step 2, above.
`
`_0R_
`
`To redirect all Internet traffic (including extranet traffic): Create a destina-
`tion (“Local network,” the network local to Aventail Connect).
`
`
`
`NOTE:
`
`if you have muitipie domains or subnets, you may need to create
`muitipie destinations.
`
`4. Create a server (“Outbound proxy”). This can be a SOCKS 5, SOCKS 4, or
`HTTP proxy server.
`
`5. Create a redirection rule (Redirect “Final destination" through "Extranet
`sewer").
`
`6. To redirect only extranet traffic: Create a redirection rule (Redirect “Extra-
`net server" through “Outbound proxy”). Do not redirect “(everything else)."
`
`..OR..
`
`To redirect all Internet traffic (including extranet traffic): Create a redirec-
`tion rule (Do not redirect “Local network"). Redirect "(everything else)" through
`the outbound proxy. (NOTE: Your outbound proxy must belong to “Local net-
`work.”')
`
`Aventaii Connect 3.01/2.51 Administraror’s Guide - 61
`
`Petitioner Apple Inc. — Exhibit 1022, p. 162
`
`Petitioner Apple Inc. - Exhibit 1022, p. 162
`
`

`
`Admfnistratorb Guide
`
`J
`
`ln.-II Un.':l|*.'.'I
`
`Redirect only the extranet traffic through
`the outbound proxy. Leave all other
`traffic alone.
`
`Redirect all Internet traffic throuh the
`outbound proxy. Leave only “Local network”
`traffic alone.
`
`Aventail Connect 3.01/2.51 Administrator? Guide - 62
`
`Petitioner Apple Inc. — Exhibit 1022, p. 163
`
`Petitioner Apple Inc. - Exhibit 1022, p. 163
`
`

`
`Administrator's Guide
`
`Pnoxv CHAINING
`
`Proxy chaining is an Aventail ExtraNet Server feature. With proxy chaining,
`Aventail ExtraNet Servers forward connections for certain destinations to other
`
`DFOXY SBNBFS.
`
`The following diagram and table illustrate the differences between MuItiProxy
`and proxy chaining. In many cases, Mu|tiProxy is the preferred method for tra—
`versing multiple firewalls. With Mu|tiProxy, each proxy server can provide
`authentication, access control, and encryption.
`
`PRl2|X‘I' EHAIHIHE: Serverl appears as a user to server2.
`
`
`
`!'1"!FoIFulfiI
`
`Aventail Connect
`client
`
`serverl
`(outbound)
`
`server?
`Ifiifiventail Extrahlet
`Server)
`
`Destination server
`
`{ii Authenticated and encrypted tunnel
`In Mu|tiProxy, an authenticated and encrvpted
`tunnel exists between the client and the Fiventail
`
`Extralflet Server.
`
`Aventail Connect 3.01/2.51 Admr'nr'siraror’s Guide ' 63
`
`Petitioner Apple Inc. — Exhibit 1022, p. 164
`
`Aventail Connect
`client
`
`serverl
`(outbound)
`
`Destination server
`
`|:l:WE.'l'Itai| Extrali-let
`Server)
`
`MULTIPRDXV: The user authenticates with server2 directlv.
`
`Petitioner Apple Inc. - Exhibit 1022, p. 164
`
`

`
`Administrator's Guide
`
`Mulh‘Proxy
`
`Proxy Chaining
`
`Server 1
`
`Can be Aventail ExtraNet
`
`Must be Aventail ExtraNet
`
`Server, other SOCKS 5 server,
`SOCKS 4 server, or H'|'|'P
`proxy.
`
`Server.
`
`Server 2
`
`Must be Aventail ExtraNet
`
`Must be Aventail ExtraNet
`
`Authentication
`to Server 1
`
`Sewer.
`
`User authenticates (if
`necessary).
`
`1 Server.
`
`User authenticates.
`
`Authentication
`
`User authenticates.
`
`Server 1 authenticates
`
`to Server 2
`Trust model for
`Server 2
`
`I Not inherited. Each user must
`individually authenticate with
`Server 2.
`
`automatically.
`I Inherited from Server 1. Server
`2 trusts everyone who
`authenticates to Server 1
`
`Access control
`rules
`
`Can be for specific users.
`
`Client
`
`1 equally.
`Treats everyone who
`authenticates to Server 1
`
`equally.
`
`configuration
`redirection rules
`
`'
`
`r- :-
`s..\dlhIPofir)1I')D';I
`
`|
`
`aauud I muwvrr-wn.
`
`|
`Server 1.
`
`Advantages
`
`- Server 1 can be an Aventail
`ExtraNet Server, other SOCKS
`5 server, SOCKS 4 server, or
`HTFP proxy.
`- Most secure. because no
`
`security policy is inherited from
`
`- Client is aware of Server 1
`only.
`- User authenticates only once.
`to Server 1.
`
`Disadvantages
`
`- User may need to authenticate
`more than once.
`- Client must be aware of
`Server 1 and Server 2.
`
`° All users connecting through
`Server 1 appear as a single
`user to Server 2.
`
`Aventaii Connect 3.01‘/2.51 Admi'ni'siraror’s Guide - 64
`
`Petitioner Apple Inc. — Exhibit 1022, p. 165
`
`Petitioner Apple Inc. - Exhibit 1022, p. 165
`
`

`
`Administrator's Guide
`
`HTTP PFIOXIES AND WEB Bnowsens
`
`Extranets often include Web pages that must be viewed with a Web browser.
`When a Web browser uses an HTTP proxy server, Aventail Connect sees con—
`nections being made to the HTTP proxy rather than to the final destination.
`Therefore, Aventail Connect cannot redirect the connections to the Aventail
`
`ExtraNet Server or provide authentication and encryption. For Aventail Connect
`to function properly, the Web browser cannot use the HTTP proxy to connect
`with sites protected in the extranet; this is because Aventail Connect must redi—
`rect and encrypt connections. The Web browser can still use the HTTP proxy to
`connect to sites that are not protected in the extranet.
`
`If access to Web pages behind the Aventail ExtraNet Server requires users to
`connect through a Web browser (e.g., Microsoft Internet Explorer or Netscape
`Navigator), you must configure the Web browser to not use the HTTP proxy in
`the Web browser for those sites protected in the extranet.
`
`When users need to access Web pages behind an Aventail ExtraNet Server. you
`must properly configure the Web browser.
`
`Configuring Aventail Connect and the Web Browser
`
`There are two approaches to configuring Aventail Connect for use with a Web
`browser.
`
`- Configure the Web browser to not use the HTTP proxy for any traffic.
`(Aventail Connect redirects all connections through the outbound
`proxy.)
`
`..OR..
`
`- Configure the Web browser to not use the HTTP proxy for only those
`sites that are protected in the secure extranet. (Aventail Connect redi-
`rects only extranet connections through the outbound proxy.)
`
`To use either approach, you must first configure Aventail Connect. The Aventail
`Connect configuration is the same for both approaches, whether you are config-
`uring your browser to not use the HTTP proxy for all traffic or for protected sites
`only.
`
`To configure Aventail Connect for use with a Web browser
`
`‘I.
`
`In the Servers tab of the Config Tool, add the HTTP proxy as a server.
`
`2.
`
`In the Destinations tab of the Config Tool, add the HTTP proxy as a destina-
`tion.
`
`3.
`
`4.
`
`In the Redirection Rules tab of the Config Tool, edit the "(everything else)”
`rule to redirect all traffic to the HTTP proxy server.
`
`In the Redirection Rules tab, select the HTTP proxy and select the Do not
`redirect option.
`
`Avenrail Connect 3.01/2.51 Admr'nr'siraror’s Guide - 65
`
`Petitioner Apple Inc. — Exhibit 1022, p. 166
`
`Petitioner Apple Inc. - Exhibit 1022, p. 166
`
`

`
`Administrator's Guide
`
`CA UTION: Make sure you do not redirect the outbound proxy.
`Redirecting the outbound server or proxy wiii instruct
`the outbound proxy to redirect traffic to itseif, causing
`Aventaii Connect to behave unpredictabiy.
`
`To configure the Web browser to not use the HTTP proxy for all traffic
`
`After you have configured Aventail Connect by following the instructions above,
`configure the Web browser by using one of the following procedures.
`
`- Microsoft Internet Explorer
`
`a. On the View menu, click Internet Options.
`
`b. Click the Connection tab.
`
`c. Click to clear the Access the Internet using a proxy server check box.
`
`- Netscape Navigator
`
`a. On the Edit menu, click Preferences.
`
`b. Under “Category,” click to expand Advanced, and then click Proxies.
`
`c. Select Direct Connection to the Internet, and then click OK.
`
`To configure the Web browser to not use the HTTP proxy for protected
`sites only
`
`After you have configured Aventail Connect, configure the Web browser by
`using one of the following procedures.
`
`- Microsoft Internet Explorer
`
`9-???’
`
`On the View menu, click Internet Options.
`
`Click the Connection tab.
`
`Under “Proxy Server," click Advanced.
`
`In the Exceptions box, type the URL of each site that is in the protected
`extranet.
`
`- Netscape Navigator
`
`P-P579‘
`
`On the Edit menu, click Preferences.
`
`Under “Category.” click to expand Advanced, and then click Proxies.
`
`Select Manual Proxy Configuration, and then click View.
`
`In the Exceptions box, type the URL of each site that is in the protected
`extranet.
`
`Aventaii Connect 3.01/2.51 Administrator’s Guide - 66
`
`Petitioner Apple Inc. — Exhibit 1022, p. 167
`
`Petitioner Apple Inc. - Exhibit 1022, p. 167
`
`

`
`Administrator's Guide
`
`CONFIGUFIING THE HTTP Pnoxv
`
`To allow SSL connections to destination ports other than 443 (https) and 563
`(snews), you may need to configure your HTTP proxy. Typically, if you plan to
`connect to a SOCKS server on port 1080 using an HTTP proxy, you must
`change the HTTP proxy configuration.
`
`To avoid changing the HTTP proxy configuration, you must run the destination
`Aventail ExtraNet Server on port 443 or port 563. and configure Aventail Con-
`nect accordingly.
`
`lvlost HTTP proxies can allow connections to port 1080. The following instruc-
`tions describe how to configure the Microsoft Proxy Server, Netscape Proxy
`Server, or Apache Web Server to allow port 1080 connections.
`
`- Microsoft Proxy Server 2.0: Follow the Microsoft instructions at
`http:/!support.microsoft.comlsupportl'kbr‘artic|es!q184./OI28.asp.
`You must modify a registry setting with regedt32 .exe.
`(regedit . exe will not work; you must use regedt32 . exe.)
`
`- Netscape Proxy Server 3.5: Add the following to your obj . conf file:
`<Object ppath="connect: //*"> (all ports)
`Service fn="connect" method="COI~lNECT”
`
`</object>
`To specify a particular port, add the following to your obj . conf file:
`Cobject ppath="<:oz1nect : //* : 1080"
`
`- Apache Web Server 1.3.2 (Linux) with Proxy Support: The following
`two lines must be included in the httpd.conf file:
`
`Proxy Requests On
`
`AllowCONNE:CT <port list> (NOTE: This feature is available only
`on version 1.3.2 and greater.)
`
`THE CERTIFICATE WIZARD
`
`Aventail Connect supports client certificates and provides you with a certificate
`wizard to help generate and process a certificate. You start the certificate wizard
`through the Aventail Connect program group (via the Start button or Program
`Manager).
`
`The Certificate wizard can create certificates for clients and servers. In this case,
`
`you are only interested in creating a client certificate. However, whether for client
`or server, you will need to mn this wizard twice: Once to generate a Certificate
`Signing Request (CSR) to submit to your Certificate Authority (CA); the second
`time, to process the certificate file. If this is your first time in generating a certifi-
`cate request, Aventail recommends that you complete the second step immedi-
`ately after the first.
`
`To generate the client key pair and Certificate Signing Request (CSR)
`
`1. Select the certificate wizard from the Aventail Connect program group.
`
`Aventail Cor1rieci3.0l'/2.51‘ Admr'nr'siraror’s Guide ' 6?
`
`Petitioner Apple Inc. — Exhibit 1022, p. 168
`
`Petitioner Apple Inc. - Exhibit 1022, p. 168
`
`

`
`2. In the Certificate Type dialog box, select the client certificate option, and
`then click Next.
`
`Administrators Guide
`
`Certificate Type
`
`
`
`3. Provide the requested information by following the prompts in the subsequent
`dialog boxes.
`
`4. In the Key Length dialog box, select the size of your key.
`
` NOTE: NotallCA5acceptkeysiergerthan512bits. itisprudenttoknow
`
`which key lengths your CA accepts prior to generating your key
`pair. For testing purposes use 512 bits.
`
`Aventaii Connect 3.01’/2.51 Administrator's Guide - 68
`
`Petitioner Apple Inc. — Exhibit 1022, p. 169
`
`Petitioner Apple Inc. - Exhibit 1022, p. 169
`
`

`
`Administrator '5 Guide
`
`
`
`
`
`What sizefslrength of keys would you like to generate?
`
`T.he key size or length directly impacts the strength of encryption
`used. The lager the key size the stronger the encryption.
`However, stronger encryption requires more processing power.
`
`P 512 hits, low
`
`17 TEE bits, medium
`
`P “J24 bits. high
`
`5. Once you have generated the random data, continue through the screen
`prompts until the Congratulations! screen, where you will see the name and
`path to the new certificate request.
`
`Congratulations!
`
`The certificate request and keys for v are now ready to he sent to
`your certifying authority for processing. Your certificate authority
`will contact d@b for additional information if needed.
`
`
`
`The certificate request has been saved in:
`
`C:\F'FtU[iFlr5rl'v‘l FILES‘.-5rVENT:t-JLWPNE:L|El~lT'~.Socks5EI1.req
`
`Elnce you

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket