User`s guide
AT&T Global Network Client for Windows Administrator’s Guide
© 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or
AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Images are shown for illustrative purposes only; individual
experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change.
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
-7-
Keyboard Navigation ................................................................................................................................................... 77
Extended Access........................................................................................................................................................... 78
Extended Access and AT&T Business Internet Service (BIS) ....................................................................................... 78
Internet Extended Access Authentication Options ..................................................................................................... 78
Extended Access and AT&T VPN Services (AT&T VPN Tunneling Services) ................................................................ 78
AT&T Lightweight Policy Enforcement ........................................................................................................................ 79
Asset Based Connection Prevention ........................................................................................................................... 79
Operating System ........................................................................................................................................................ 79
Application Monitoring ............................................................................................................................................... 80
Types of Applications Monitored ................................................................................................................................ 80
Limitations ................................................................................................................................................................... 81
Lightweight Policy Enforcement Customization Examples ......................................................................................... 81
AT&T Global Network Client Firewall .......................................................................................................................... 87
Overview...................................................................................................................................................................... 87
OPSWAT Certified Firewall .......................................................................................................................................... 87
Operating Modes ......................................................................................................................................................... 88
Default ......................................................................................................................................................................... 88
Trusted Domains ......................................................................................................................................................... 88
User Controlled ........................................................................................................................................................... 88
Disabled ....................................................................................................................................................................... 88
Firewall Settings Window ............................................................................................................................................ 88
Managed VPN Access Control Lists ............................................................................................................................. 89
Limitations ................................................................................................................................................................... 90
AT&T VPN Services ....................................................................................................................................................... 91
Using Managed IPSec VPN Services ............................................................................................................................ 91
Local Resources ........................................................................................................................................................... 91
Sharing Local Resources .............................................................................................................................................. 91
Registering VPN IP Address with Dynamic DNS .......................................................................................................... 91
Encryption for IPSec VPN connections ........................................................................................................................ 92
Co-existence with Microsoft IPSec .............................................................................................................................. 92