The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

MERCY INFORMATION SECURITY TEAM MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote ...

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by , 2016-08-28 22:54:02

Accessing the Mercy Remote Access Portal (SSL VPN)

MERCY INFORMATION SECURITY TEAM MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote ...

MERCY
INFORMATION

SECURITY
TEAM

Accessing the Mercy Remote Access Portal (SSL VPN)

In order to access the Sisters of Mercy Remote Access Portal, you will need to complete the following
steps.

** Important: If you are running Microsoft Windows XP SP2, or Microsoft Windows
Vista, you will need to install the appropriate software by clicking the links in the
corresponding section of the page shown below.**

1.) Establish Internet Connectivity. Verify that you can access http://www.google.com
• This must be completed before continuing to step 2. Without Internet Connectivity you will
not be able to access the Mercy’s Remote Portal.

2.) Using your web browser, connect to http://remote.mercy.net. This will take you to a page similar to
the following:

MERCY INFORMATION SECURITY TEAM

3.) **Notice for Windows Vista and Windows XP SP2 Users***

o Windows Vista Users should install the Trust Mercy Domains (trustmercy.exe) application,
the Juniper Installer Service for Non-Mercy/Open Access Machines, and the Network
Connect Client prior to authenticating.

o Windows XP Users should install the Microsoft Windows XP SP2 Patch prior to
authenticating.

*** These files can be found in the corresponding sections of the login page. ***

4.) Enter your Username in the “Username” box and enter your Password in the “Password” box.

o If you are using an RSA SecurID Token for authentication, please enter your pin +

your RSA Tokencode in the “Password” box.

ƒ For example, if your Pin number is 1234 and the current RSA Tokencode is 234836,
then your password would be 1234234836. The Pin number will always stay the
same, while the RSA Tokencode will change every minute.

ƒ Important: For first time use, there is no PIN number. Just enter the
tokencode. You will be prompted to create a 4-8 character alpha-numeric PIN,
reenter that PIN and then you will be logged out of the system. Repeat steps 3
and 4 to gain access.

o If you are using Microsoft’s Active Directory for Authentication then enter your Active
Directory password in the “Password” box.

ƒ Important: This password must meet length and complexity requirements to
be used for access from the internet.

ƒ If your password does not meet the requirements, you will be redirected to a
web page that outlines the requirements. Once your password meets the
requirements and has been successfully audited, you will be allowed to use it
for authentication.

• Your password must be at least 7 characters long
• Your password should not appear in any dictionary
• Your password must contain both numbers and letters
• Your password must contain at least one special character
• Your password must be changed every 45 days

MERCY INFORMATION SECURITY TEAM 2

4.) Please choose your authentication method from the drop-down box (Most Coworkers will choose
SMRCY.COM)

5.) Please choose the appropriate role from the list displayed. The role determines which bookmarks,
connection tools, etc. will be available to you. This list and the order of its contents may change as
more roles are added.

MERCY INFORMATION SECURITY TEAM 3

6.) If you see a yellow bar appear across the top of your web browser window, just below the address
bar, please click the bar and allow the activeX application to install.

MERCY INFORMATION SECURITY TEAM 4

7.) Click on the “Yes” button if any of the following Windows pop up regarding the installation of
NeoterisSetup.cab, Network Connect, Secure Application Manager, or Secure Meeting from
“Juniper Networks”

8.) You may see the following Window. Please wait….

MERCY INFORMATION SECURITY TEAM 5

9.) Once the installation of the Network Connect application is complete you will arrive at a screen
similar to the screen displayed below. You are now connected to the Remote Access Portal.

• You will be able to click on the bookmarks to browse web enabled applications.
• The column on the left gives you access to other applications such as Terminal Sessions, and

Terminal Services Sessions.
• As long as the Network Connect Application is running (Circled Above), you will be able to launch

the native Outlook client to get to your email, run locally installed applications, browse network file
shares, etc. If you are not using your corporate laptop you will need to access your email through
the appropriate Webmail bookmark.

MERCY INFORMATION SECURITY TEAM 6

XP SP2 Instructions – Only applicable to Windows XP Service Pack 2 users.

Click on the link from the Login Page for the “Microsoft Windows XP SP2 Patch”

Follow the link and download the file.

Save the file to your pc 7

MERCY INFORMATION SECURITY TEAM

Click on the file that you just saved and click on the “RUN”

When the file finishes the install, it may ask you to reboot. After rebooting, you should now be ready to login to
Neoteris. (Go back to Step #1 of this document)

MERCY INFORMATION SECURITY TEAM 8

Windows Vista and/or IE8 users Instructions – Only applicable to Windows Vista
and/or IE8 users.

1. Download and install the “Juniper Installer Service with Mercy Trusted Sites” referenced under the “Help” button on the
remote.mercy.net login page.

2. Download and and install the appropriate “Network Connect Client” for the version of the Windows operating system that
you are running.

3. Browse back to the main portal page and logon/authenticate normally.

4. If a message similar to the following comes up, this means that Windows Vista’s User Access Control (UAC) is enabled on
your machine and your computer is asking for permission to install an add-on component. Please allow this component to
install by clicking “Continue”.

MERCY INFORMATION SECURITY TEAM 9

5. Once the necessary Juniper components have installed, your portal will be available.

MERCY INFORMATION SECURITY TEAM 10

MercyConnect Instructions

Click on Mercy Connect

The following screen will be displayed.

If you need to install a Citrix Web client, then you will get the following Window. Click on the Yes button.

MERCY INFORMATION SECURITY TEAM 11

If a new Citrix Web client is installed for you, then the following Window will pop up. Click on the OK button.

Type in your network username and network password, and choose your domain. Then click on the Submit
button. (The Enter key doesn’t work on this page)

Mercy Connect will show a “web view” of Citrix Program Neighborhood. Click on the icon that you need, or click on
one of the subfolders to bring up other icons.

MERCY INFORMATION SECURITY TEAM 12

MERCY INFORMATION SECURITY TEAM 13

Utilizing Web Conference Software built into
Neoteris.

* Note: There is a 25 user and 10 simultaneous meeting limit on the software. *

This software is intended for several purposes.
• Mercy Employees who need to host a meeting with external contacts (vendors or traveling
employees)
• Mercy Helpdesk to aid in troubleshooting application and connectivity issues.
• Mercy Employees who need to troubleshoot application issues with vendors.

There are four parts to this instruction sheet.

• Setting up a meeting

• New Meeting Instructions.

• Instant Meeting Instructions.

• How to operate Meeting Software.

MERCY INFORMATION SECURITY TEAM 14

Setting Up a Meeting
Connect to the SSL VPN (http://remote.mercy.net) and successfully authenticate.

From the Neoteris welcome screen seen below.
• Click on Secure Meeting Only (Circled)

This will bring you to the following screen.
Click Meetings (Cricled)

MERCY INFORMATION SECURITY TEAM 15

This page displays meetings which are currently scheduled on the Neoteris.
• From this page you can schedule an upcoming meeting (New Meeting) or an Instant Meeting.

MERCY INFORMATION SECURITY TEAM 16

New Meeting Instructions:
After clicking on New Meeting you will be greeted with the following screen.

You must fill out the form to schedule the meeting.
• Verify that your email is recognized in the email window (Circled). It should read your email back to
you, and not <email missing>. You can fix this by clicking Set Email and adding your email
address.
• Click Finish.
• A meeting will appear in the Neoteris window confirming your meeting, and an automatic email will
be sent to your email address. This email will detail the confirmed meeting. Forward this on to all
other attendees using Outlook.
Example of the meeting invitation to be forwarded is below.

MERCY INFORMATION SECURITY TEAM 17

MERCY INFORMATION SECURITY TEAM 18

Instant Meeting Instructions:
Click on Instant Meeting
You will be taken to the following screen.

Take note of the Meeting URL and Password Fields. You will need to pass these on to other attendees.
There is no email generated for an Instant Meeting.

• If you start the meeting without the noted fields you can view them again by clicking on Meeting and
then selecting details on the Neoteris screen (Circled below).

MERCY INFORMATION SECURITY TEAM 19

The details screen will look similar to the screen below.

The attendees will go to http://remote.mercy.net/meeting and enter the meeting ID (Circled) and
password (Circled).

MERCY INFORMATION SECURITY TEAM 20

How to Operate Meeting Software.

From the meeting software window you can perform several options.

Determine who is in control of the Meeting. These are all initially controlled by the meeting organizer,
but can be passed on to attendees.
• Controller – Determines who is in control of the applications currently on the screen.
• Presenter – Determines who is in control of the presentation.
• Conductor – Determines who controls actions within the meeting.
• Request Control – Others can request control of the applications after they are shared.
• Remove – Kicks users out of the meeting.

There is also a toolbar which will be running across the top of the screen which will allow the same and
additional functions. You can hide this toolbar by selecting the thumbtack on the top left.

Sharing - This is an integral part of Meeting.
• This option allows users to share their applications and/or desktop with others.
• To share applications click Sharing. You will be prompted with the following screen.

MERCY INFORMATION SECURITY TEAM 21

• You can share applications by placing a check box in the appropriate squares. By clicking on
Share Desktop and All Applications you will give other attendees the ability to view everything
currently running on your PC.
• After sharing applications you can release control to other users by using the buttons described
above.
** Be very careful with this functionality, users will have control of applications running on
your PC. **

Chat – Gives the ability to text chat with other meeting attendees. To chat, click inside the box (Circled
Below), type in your message, and click Send.

Drawing – Gives you the ability to highlight specific items on the screen by drawing shapes or adding
text. For example in the following screen I have highlighted the meeting URL and password in yellow.

MERCY INFORMATION SECURITY TEAM 22

** If you turn on drawing you will freeze the screen. In order to regain control of the applications you
will need to turn off drawing**

MERCY INFORMATION SECURITY TEAM 23


Click to View FlipBook Version