![download gotomypc download gotomypc](https://s1.manualzz.com/store/data/014446708_1-0c1e26970fb6ba554dbe661105e210fe.png)
GOTOMYPC CORPORATE USES THESE CONNECTIONS AS FOLLOWS: The GoToMyPC Corporate service running on a host PC uses persistent JEDI connections to Citrix Online s Web server to check for connection requests. Periodic short HTTP requests to the server for control information. Each JEDI connection uses one persistent TCP/IP socket. The types of connections required to operate broadly fall into two categories: Long-lived JEDI connections (JEDI is the name of our streaming connection protocol) to the servers for receiving notifications and for streaming real-time data.
![download gotomypc download gotomypc](https://i.ytimg.com/vi/3BMaZNUxjCo/maxresdefault.jpg)
#Download gotomypc software
The following sections will detail how our communication technology works and will show you how you can best achieve the behavior and performance that you require.ΔΆ THE SOFTWARE COMPONENTS AND THEIR NETWORK CONNECTIONS GoToMyPC Corporate requires connectivity with Citrix Online s servers to operate. Security is built in from the system architecture to the protocols. It does not accept any incoming connections and it does not establish VPN-like network links that other software could hijack. In establishing this connectivity, Citrix Online s communication technology does not open any new communication channels that an intruder could exploit, nor does it require any new holes to be opened in the firewall. Our lightweight software components dynamically analyze your firewall/proxy setup and conditions and find the best paths for connectivity. Proxies reduce bandwidth usage through caching. Proxies are similar to firewalls in the way they filter, but they additionally provide an audit trail of accessed Web resources. Firewalls may scan and filter incoming documents for viruses and other attacks. Firewalls prevent compromised machines on the inside from contacting arbitrary services on the outside to leak information or attack further machines. Briefly, let s revisit the main purpose of your network s firewall and proxies: Firewalls prevent intruders from communicating directly with machines on the inside where they might exploit vulnerabilities. Security Administrators needing to understand the communication behavior of GoToMyPC Corporate to evaluate any impact on network security. Network Administrators looking to maximize the performance of GoToMyPC Corporate by tuning their environment. The intended audience for this document: Network Administrators desiring assistance with the setup of GoToMyPC Corporate in environments where it does not function optimally upon the initial setup. And, with our comprehensive set of additional security features, you can take a flexible approach to balancing maximum performance with modern network security. Our software makes smart, secure use of your existing firewall and proxy configurations. There is usually no need to adjust your network or firewall. We support all of the common firewall and proxy configurations found on corporate LANs today. 1 F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology.