Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
59
3 Fill in the necessary information in the provided fields to configure the system in Secure Virtual Access
mode and click
OK
.
• Server:
This should be the name or IP address of the appliance the technician normally accesses
the Virtual Office from outside the management interface (Do not include “https://”).
• Portal:
The name of the portal the technician would normally log in to.
• Computer Name:
This is an identifier for the system to help differentiate between other systems
that might be waiting for support in the queue.
• Password:
This is a password the technician must enter prior to accessing the system through the
support queue.
4 After installation, the VASAC client should be left running in the desktop tray.
This system’s identifier name should now appear in the technician’s support queue displayed on the
Secure
Virtual Assist > Status
page within the management interface. Upon double-clicking the system listing, the
technician is prompted to provide the password established during system set-up to gain Secure Virtual Access
to the system.
Ending Secure Virtual Access Mode
Disconnecting from a Secure Virtual Access session places the system back in the support queue for later access
by the technician. From the personal system-side, the user/technician might uninstall or terminate the
application from the tray option icons.
An administrator can forcibly remove a system from the queue. If this occurs, the Secure Virtual Access system
should no longer attempt to connect to the support queue and should display an error message.
Secure Virtual Meeting Overview
This section provides an introduction to the Secure Virtual Meeting feature. This section contains the following
topics:
•
What is Secure Virtual Assist?
•
Benefits of Secure Virtual Assist
•
How Does Secure Virtual Assist Work?
•
Launching a Secure Virtual Assist Technician Session
NOTE:
For tasks and information on using Secure Virtual Assist as an end-user, refer to the
Dell SonicWALL
Secure Mobile Access User’s Guide
.