Content
4
Jul-23
1 General Information ............................................................................... 6
2 VPN Service Background ....................................................................... 7
2.1 Networking via icom Connectivity Suite – VPN. ................................................... 7
2.2 Secure Communication ....................................................................................... 8
2.3 Simple Setup and Management .......................................................................... 8
2.4 China VPN ........................................................................................................... 8
3 Login ..................................................................................................... 9
3.1 Registration ......................................................................................................... 9
3.2 Login to icom Connectivity Suite ....................................................................... 10
3.3 Managing the own Password ............................................................................ 10
3.4 Activating China VPN ........................................................................................ 10
4 VPN Service Configuration ................................................................... 11
4.1 Devices ............................................................................................................. 11
4.1.1 Creating a Device ................................................................................... 12
4.1.2 Managing the Devices ............................................................................ 14
4.1.3 Downloading the Device List ................................................................. 15
4.1.4 Addressing via Netmapping ................................................................... 16
4.1.5 Direct Addressing ................................................................................... 17
4.1.6 Activating time-restricted access for a device ....................................... 18
4.1.7 Configuring the two-factor authentication (TOTP) ................................. 20
4.1.8 Replacement of certificates .................................................................... 22
4.2 Groups .............................................................................................................. 23
4.2.1 Adding a Group ...................................................................................... 23
4.2.2 Managing the Groups ............................................................................. 24
4.2.3 Communication Rules ............................................................................ 25
4.3 Monitoring ........................................................................................................ 27
4.3.1 Adding a Check ...................................................................................... 27
4.3.2 Managing the Checks ............................................................................ 29
4.3.3 Adding a Host......................................................................................... 30
4.3.4 Managing the Hosts ............................................................................... 31
4.3.5 Configuring the check options ............................................................... 32
4.4 Licenses ............................................................................................................ 33
4.5 Web Proxies ...................................................................................................... 34
4.5.1 Setting Up a Web Proxy ......................................................................... 35
4.5.2 Managing the Web Proxies .................................................................... 36
4.6 My VPN ............................................................................................................ 37
4.6.1 Changing the Default Code .................................................................... 37
4.6.2 Downloading the VPN Log ..................................................................... 37
4.6.3 Restarting the VPN instance .................................................................. 38
4.6.4 Downloading the connection log ........................................................... 38
4.6.1 Managing the two-factor authentication ................................................ 38