5 Network Requirements
The use of intelligent gigabit switches on the network is highly recommended. It is highly recommended that the entire system is on a domain due to user authentication requirements.
Networks connecting servers and desktop computers provide the vital backbone for correct data transfer and system operation.
It is paramount that your network is set up and configured correctly in order to ensure the software can run at full efficiency.
It is vital that we have access to and the full co-operation of your network administrator and/or IT support company either internally or externally to set up the necessary links between any systems and devices as required.
It is essential that the network is protected by suitable firewalls, virus detection, and defence system and that these are updated daily. It is also essential to have robust backup procedures in place, we advise incremental evening back-ups and a full back-up once a week and monthly.
It is also important that we are notified in advance of any changes being made to your network, network operating system and or linking programs including server upgrades, migrations and replacements are notified to us.
An external static IP address is mandatory for our software to ensure a stable and secure connection. This helps provide uninterrupted access to our web applications, preventing potential connectivity issues that could arise from network changes.
Remote Access Requirements
5.1 Terminal Server Network
If you require remote users to log into the central system, a separate dedicated server will be required. This will run Windows Terminal services or Citrix and may be configured to hold the main system data as well. Terminal services use the server to run separate user desktop sessions.
5.2 Remote Support
Help desk, remote support and training can only be provided if we have a direct connection to your server and selected PCs. Our recommendation is that Windows Remote Desktop or TeamViewer is set up to provide this facility. It is also necessary that routers and firewalls are configured to allow such communication access.