Installation manual

If you connect to clients with Remote Desktop 3.2.2 or later installed, encryption is
done using the Apple VNC server and Remote Desktop. If you connect to clients with
earlier client versions of Remote Desktop installed, encryption is done using an SSH
tunnel between the participating computers. In order to use encryption for Observe
and Control tasks with older clients, the target computers must have SSH enabled
(“Remote Login in the computers Sharing Preference pane). Also, rewalls between
the participating computers must be congured to pass trac on TCP port 22 (SSH
well-known port).
If you’re trying to control a VNC server that isn’t Remote Desktop, it won’t support
Remote Desktop keystroke encryption. If you try to control that VNC server, you’ll get a
warning that the keystrokes aren’t encrypted, which you’ll have to acknowledge before
you can control the VNC server. If you chose to encrypt all network data, then you
won’t able to control the VNC server because Remote Desktop isn’t able to open the
necessary SSH tunnel to the VNC server.
To enable Observe and Control transport encryption:
1 Choose Remote Desktop > Preferences.
2 Click the Security button.
3 In the “Controlling computers” section, select “Encrypt all network data.”
Encrypting Network Data During Copy Items and Install Packages
Tasks
Remote Desktop can send les for Copy Items and Install Packages using encrypted
transport. This option isn’t enabled by default—you must enable it either explicitly for
each copy task, or in a global setting in Remote Desktop preferences. Even installation
package les can be intercepted, if theyre not encrypted.
To encrypt individual le copying and package installation tasks
In the Copy Items task or Install Packages task conguration window, select “Encrypt m
network data.”
To set a default encryption preference for le copies
1 In the Remote Desktop Preferences window, select the Security pane.
2 Check “Encrypt network data when using Copy Items” or “Encrypt network data when
using Install Packages,” as desired.
Alternatively, you could encrypt a le archive before copying it. The encrypted archive
could be intercepted, but it would be unreadable.
86 Chapter 6 Setting Up the Network and Maintaining Security