1 of 21 9/22/11 10:41 AM

Size: px
Start display at page:

Download "1 of 21 9/22/11 10:41 AM"

Transcription

1 This document is a detailed reference guide that describes all the API operations for the CloudPassage. In addition, it provides sample requests, responses, and errors for the supported APIs. CloudPassage provides a collection of REST APIs which accept and return JSON-formatted data. CloudPassage s REST APIs provide access to resources via URI paths. To use a REST API, your application will make an HTTP request and parse the response. The request and response format are JSON and your methods will be the standard HTTP methods like GET, PUT, POST and DELETE. Because the REST API is based on open standards, you can use any web development language to access the API. API The s are version controlled. The current version of the is 1. The API version is independent of the CloudPassage Halo daemon release number. The version number of an API appears in its URI. For example, use this URI structure to request version 1 of the CloudPassage REST API: API Each call to a has to be authenticated using the customer s key. To authenticate the API call, include your API key in the x-cpauth-access field in the request header. This key may be found through the web user interface under: Settings > Site Administration > API Keys. Example: x-cpauth-access: cf04666d2d8fb834c65dc1fbd17qwert1 In case of an authentication error, a 401 (Unauthorized) HTTP response is returned. and HTTP Codes The CloudPassage REST API is served over HTTPS. To ensure data privacy unencrypted HTTP is not supported. Retrieving Resources with the HTTP GET Method You can retrieve a representation of a resource by GETting its URL. Possible GET Status Codes Code Status Explanation 200 OK The request was successful and the response body contains the representation requested. 401 Unauthorized The supplied credentials, if any, are not sufficient to access the resource. 404 Not Found Resource not found. 500 Server Error We couldn t return the representation due to an internal server error. Creating or Updating Resources with the HTTP POST and PUT Creating or updating a resource involves performing an HTTP PUT or HTTP POST to a resource URL. In the PUT or POST, you represent the properties of the object you wish to update as JSON objects. Be sure to set the HTTP Content-Type header to application/json for your requests if you are writing your own client. Possible POST or PUT Status Codes Code Status Explanation 204 No Content The request was successful. 201 Created The request was successful, we created a new resource and the response body contains the representation. 202 Accepted The request was successful, new resource was accepted for processing. 400 Bad Request The data given in the POST or PUT failed validation. Inspect the response body for details. 401 Unauthorized The supplied credentials, if any, are not sufficient to create or update the resource. 404 Not Found Resource not found. 500 Server Error We couldn t create or update the resource. Please try again. Deleting Resources with the HTTP DELETE Method To delete a resource make an HTTP DELETE request to the resource s URL. Not all CloudPassage REST API resources support DELETE operation. Possible DELETE Status Codes Code Status Explanation 204 No Content The request was successful; the resource was deleted. 1 of 21 9/22/11 10:41 AM

2 Code Status Explanation 401 Unauthorized The supplied credentials, if any, are not sufficient to delete the resource. 404 Not Found Resource not found. 500 Server Error We couldn t delete the resource. Please try again. Custom Error Messages Validation Errors In case of a validation error, a 422 (Unprocessable Entity) HTTP response will be returned. The response body will contain error details: Status: 422 "message" => "Validation Failed", "errors" => [ "code" : "taken", "field" : "name" ] Resource Not Found Errors In case of a resource not found error, a 404 (Not Found) HTTP response will be returned. The response body will contain error details: Status: 404 "resource" => "FirewallRule", "field" => "id", "value" => "3e74aaf e23f3442c031a719c" Server errors In case of a server error, a 500 (Internal Server Error) HTTP response will be returned. The response body will contain error details: Status: 500 "code" : 500, "message" : "Internal Server Error", "details" : <backtrace here> API Server Groups Object Representation Core server group fields id name tag policy_ids firewall_policy_id A unique string identifier for this server group. A unique name for this server group. Optional. A unique tag assigned to this server group. Tag is used to assign daemons to the group. Daemon started with the specific tag will be assigned to the group with that tag. Tag should start with a letter and contain only letters, numbers,. (dot), - (dash), and _ (underscore). An array of one or more configuration policy identifiers assigned to this server group. Optional Firewall policy identifier assigned to this server group. s present only in server group details cve_exception_ids Optional An array of common vulnerabilities and exposures exception identifiers. List server groups GET Search server groups that use specific configuration policy GET 2 of 21 9/22/11 10:41 AM

3 "groups": [ "url": " "firewall_policy_id": null, "exception_ids": [ "name": "Unassigned", "policy_ids": ["96cb9470a9b9012e0e56442c030d794d" "id": "1e9d5320a9b9012e0e53442c030d794d", "tag": null, "url": " "firewall_policy_id": null, "exception_ids": [ "name": "Retired", "policy_ids": ["96cb9470a9b9012e0e56442c030d794d" "id": "1ea83e60a9b9012e0e53442c030d794d", "tag": null, "url": " "firewall_policy_id": null, "exception_ids": [ "name": "Unretired", "policy_ids": ["96cb9470a9b9012e0e56442c030d794d" "id": "1ea85fd0a9b9012e0e53442c030d794d", "tag": null ] Get a single server group GET "group": "url": " "firewall_policy_id": null, "exception_ids": [ "name": "Unassigned", "policy_ids": ["96cb9470a9b9012e0e56442c030d794d" "id": "1e9d5320a9b9012e0e53442c030d794d", "tag": null Create a new server group POST "group": "firewall_policy_id": null, "name": "Load Balancers", "policy_ids": ["96cb9470a9b9012e0e56442c030d794d" "tag": "load_balancers" Status: 201 Location: "group": "firewall_policy_id": null, "cve_exception_ids": [ "tag": "load_balancers", "policy_ids": ["96cb9470a9b9012e0e56442c030d794d" "name": "Load Balancers", "url": " "id": "e04b92e0b61e012ec6e c01709" Update server group attributes PUT 3 of 21 9/22/11 10:41 AM

4 "group": "name": "Test Groups", "tag": "load_balancers" Assign a firewall policy to the server group PUT "group": "firewall_policy_id": "96cb9470a9b9012e0e56442c030d794c" To remove a firewall policy from the server group PUT "group": "firewall_policy_id": null Assign several configuration policies to the server group PUT "group": "policy_ids": ["96cb9470a9b9012e0e56442c030d794d", "96cb9470a9b9012e0e56442c030d794f"] Delete server group without any servers DELETE : Delete server group and move group s servers into Unassigned group DELETE : To list common vulnerabilities and exposures exception identifiers applied to a server group 4 of 21 9/22/11 10:41 AM

5 GET "group": "firewall_policy_id": null, "cve_exception_ids": ["302ed800b61a012ec6e c01709" "tag": "", "policy_ids": ["7bef46c072b1012ec c01709", "8883c860b0ce012ec6a c01709" "name": "Unassigned", "url": " "id": "8cdc2200b576012ec6d c01709" To list details of a common vulnerability and exposure exception identifier GET "cve_exception": "package_name": "bzip2.x86_64", "server_id": null, "expires_at": " T23:59:59Z", "package_version": "1.0.3", "created_at": " T16:14:12Z", "id": "302ed800b61a012ec6e c01709", "group_id": "8cdc2200b576012ec6d c01709" Servers Object Representation Core server fields id hostname state connecting_ip_address interfaces A unique identifier of the server. A calculated hostname of the server. A state of the server. Currently, only active servers are returned. The last reported IP address of the server. A list of reported network interfaces that are present on the server. List active servers in the group If a server is inactive or missing it will not be in the response. GET List active servers GET "servers": [ "hostname": "svm-rh55", "connecting_ip_address": " ", "interfaces": [ "ip_address": " ", "name": "eth1", "ip_address": " ", "name": "eth0" "state": "active", "url": " "id": " a8a6da1586c8aaeac10452", "hostname": "domu c-92-fc", "connecting_ip_address": " ", "interfaces": [ "ip_address": " ", 5 of 21 9/22/11 10:41 AM

6 ] "name": "eth0" "state": "active", "url": " "id": "a731945fa16309d945a205f9c37f8e67" List active servers that have specific user account GET GET "servers": [ "hostname": "svm-rh55", "accounts": [ "last_login_at": " T14:47:47Z", "uid": "500", "comment": "", "gid": "500", "home": "/home/bob", "username": "bob", "shell": "/bin/bash", "url": " "last_login_from": "c hsd1.md.comcast.net pts/0" "connecting_ip_address": " ", "interfaces": [ "ip_address": " ", "name": "eth1", "ip_address": " ", "name": "eth0" "state": "active", "url": " "id": " a8a6da1586c8aaeac10452" ] Move server into server group PUT "server" : "group_id" : "94a90ae e23f3442c031a719c" Remove server from a server group You must first pull the group_id for the unassigned group by using the following request: GET Then assign the server to the unassigned group id PUT "server" : "group_id" : "unassigned_group_id" List of server issues 6 of 21 9/22/11 10:41 AM

7 GET : "connecting_ip_address": " ", "id": " a8a6da1586c8aaeac10452", "hostname": "newhost.domain.com", "state": "active", "sca": "policies": [ "Policy For Servers" "critical_findings_count": 2, "status": "completed_with_errors", "findings": [ "critical": true, "details": [ "scan_status": "ok", "expected": "enforcing", "config_key": "SELINUX", "type": "configuration", "actual": "disabled", "target": "/etc/selinux/config", "status": "bad", "scan_status": "ok", "expected": "targeted", "config_key": "SELINUXTYPE", "type": "configuration", "actual": "targeted", "target": "/etc/selinux/config", "status": "good" "rule_name": "Enable SELinux", "status": "bad", "critical": true, "details": [ "scan_status": "ok", "expected": "/etc/issue", "config_key": "Banner", "type": "configuration", "actual": "/etc/issue.net", "target": "/etc/ssh/sshd_config", "status": "bad" "rule_name": "Enable a Warning Banner", "status": "bad", "critical": false, "details": [ "scan_status": "not_found", "expected": "SymLinksIfOwnerMatch", "config_key": "Options", "type": "configuration", "actual": null, "target": "/etc/httpd/conf/httpd.conf", "status": "indeterminate" "rule_name": "APACHE: Restrict Web Directory", "status": "indeterminate", "critical": false, "details": [ "scan_status": "not_found", "expected": "/chroot/apache", "config_key": "SecChrootDir", "type": "configuration", "actual": null, "target": "/etc/httpd/conf/httpd.conf", "status": "indeterminate" "rule_name": "APACHE: Run Apache in a chroot Jail if Possible", "status": "indeterminate", "critical": false, "details": [ "scan_status": "not_found", 7 of 21 9/22/11 10:41 AM

8 "expected": "speling_module modules/mod_speling.so", "config_key": "#LoadModule", "type": "configuration", "actual": null, "target": "/etc/httpd/conf/httpd.conf", "status": "indeterminate" "rule_name": "APACHE: URL Correction on Misspelled Entries", "status": "indeterminate" "non_critical_findings_count": 3, "svm": "critical_findings_count": 1, "status": "completed_clean", "findings": [ "critical": true, "cve_entries": [ "suppressed": false, "cve_entry": "CVE ", "suppressed": false, "cve_entry": "CVE " "package_version": "0.2", "status": "bad", "package_name": "ed.x86_64", "critical": false, "cve_entries": [ "suppressed": false, "cve_entry": "CVE ", "suppressed": false, "cve_entry": "CVE " "package_version": "1.11.4", "status": "bad", "package_name": "wget.x86_64" "non_critical_findings_count": 1 Configuration Policies Object Representation Core server fields id name description used_by A unique identifier of the configuration policy. A name given to the configuration policy. Optional. A description of the configuration policy. Read-only. A list of server group identifiers of server groups that use the configuration policy. List configuration policies GET : "policies": [ "used_by": [ "name": "AcmeCorp - AMI (Amazon)", "id": "7bbea00072b1012ec c01709" "description": "This configuration security policy has been configured for a default Amazon Linux distribution. "name": "AMI - Core OS Policy", "id": "7bcb0a0072b1012ec c01709", "used_by": [ "description": null, "name": "Basic Linux Gotchas Copy", "id": "a44c24a07da6012ec c01709" 8 of 21 9/22/11 10:41 AM

9 ] Server Accounts Object Representation Core server account fields username A username of the server account. uid A user id of the server account. gid A group id of the server account. home A home directory of the server account. shell A server s account shell. comment A comment for the server account. last_login_at The last time the server account logged on in UTC time (if available) last_login_from The last domain and port the account logged on from (if available) s present only in server account details home_exists groups last_password_change days_warn_before_password_expiration minimum_days_between_password_changes maximum_days_between_password_changes disabled_after_days_inactive days_since_disabled ssh_authorized_keys sudo_access Whether or not the server account s home directory exists or not Any groups the account belongs to (if any) When the account s password was last changed (if available) How soon the account is warned about password expiration (if available) The date before which the account s password may be changed (if available) The date before which the account s password must be changed (if available) How many days of inactivity before the account is disabled (if available) How many days since the account was disabled (if available) An array of any authorized SSH keys belonging to the account (if available) A list of sudo access rules for the account, both as a member of a group and as a user (if available) List server accounts GET Search server accounts by username or uid GET GET "accounts": [ "last_login_at": null, "uid": "3", "comment": "adm", "gid": "4", "home": "/var/adm", "username": "adm", "shell": "/sbin/nologin", "url": " "last_login_from": null, "last_login_at": null, "uid": "70", "comment": "Avahi daemon", "gid": "70", "home": "/", "username": "avahi", "shell": "/sbin/nologin", "url": " "last_login_from": null, "last_login_at": null, "uid": "100", "comment": "avahi-autoipd", "gid": "101", "home": "/var/lib/avahi-autoipd", "username": "avahi-autoipd", 9 of 21 9/22/11 10:41 AM

10 "shell": "/sbin/nologin", "url": " "last_login_from": null, "last_login_at": null, "uid": "1", "comment": "bin", "gid": "1", "home": "/bin", "username": "bin", "shell": "/sbin/nologin", "url": " "last_login_from": null... ] Get server account details GET : "account": "maximum_days_between_password_changes": 99999, "days_warn_before_password_expiration": 7, "last_login_at": " T14:47:47Z", "uid": "500", "disabled_after_days_inactive": null, "comment": "", "gid": "500", "home": "/home/bob", "groups": "wheel, bob", "home_exists": true, "days_since_disabled": null, "last_password_change": " ", "sudo_access": [ "as_group": [ ["%wheel ALL = (ALL) ALL"] ] "username": "bob", "ssh_authorized_keys": [ "type": "rsa", "comment": "bob@bobs-macbook-pro.local" "shell": "/bin/bash", "minimum_days_between_password_changes": 0, "url": " "ssh_acl": "rwx------", "last_login_from": "c hsd1.md.comcast.net pts/0" Create server account Creating a new server account is done asynchronously. On successful call 202 (Accepted) status will be returned with information about the created server command. POST "account": "username" : "bob", "comment" : "User Bob", "groups" : "wheel,users", "password" : "length" : 10, "include_special" : true, "include_numbers" : true, "include_uppercase" : false Status: 202 Location: "command" : id => "ac49ce6e e21a713ce62c039c", uri => " name => "Create Account", 10 of 21 9/22/11 10:41 AM

11 status => "queued", created_at => " T10:10:10Z", updated_at => " T10:10:10Z" Reset password for server account Reseting password for server account is done asynchronously. On successful call 202 (Accepted) status will be returned with information about the created server command. PUT "password" : "length" : 10, "include_special" : true, "include_numbers" : true, "include_uppercase" : false Status: 202 Location: "command" : id => "ac49ce6e e21a713ce62c039c", uri => " name => "Reset Password", status => "queued", created_at => " T10:10:10Z", updated_at => " T10:10:10Z" Disable server account Disabling server account is done asynchronously. On successful call 202 (Accepted) status will be returned with information about the created server command. PUT "account" : "active" : false Status: 202 Location: "command" : id => "ac49ce6e e21a713ce62c039c", uri => " name => "Disable Account", status => "queued", created_at => " T10:10:10Z", updated_at => " T10:10:10Z" Remove server account Removing a server account is done asynchronously. On successful call 202 (Accepted) status will be returned with information about the created server command. DELETE Status: 202 Location: "command" : id => "ac49ce6e e21a713ce62c039c", 11 of 21 9/22/11 10:41 AM

12 uri => " name => "Remove Account", status => "queued", created_at => " T10:10:10Z", updated_at => " T10:10:10Z" Server Commands Object Representation id name status created_at updated_at result A unique identifier of the server command. A name of the command. Get command details A status of the command. Possible values queued, pending, completed, failed. A timestamp when command was created. A timestamp when command was last updated. A result of the command execution once command is finished. GET "command" : "id" : "ac49ce6e e21a713ce62c039c", "uri" : " "name" : "Remove Account", "status: : "completed", "created_at" : " T10:10:10Z", "updated_at" : " T10:11:12Z", "result : "done" Firewall Policies Object Representation Core server account fields id name description used_by A unique identifier of the firewall policy. A unique name given to the firewall policy. Optional. A description of the firewall policy. Read-only. The identifiers and names of server groups that use the firewall policy. List firewall policies GET : "used_by": [ "name": "Group One", "id": "f5e1ada0a4c0012ec c01709" "description": "", "name": "SSH-Only", "url": " "id": "7ba8ebc072b1012ec c01709", "used_by": [ "description": "Firewall policy for the Load Balancer server group with connections to the Internet and to the "name": "Load Balancer", "url": " "id": "7ba8a00072b1012ec c01709", "used_by": [ "description": "Firewall policy for the Web-Apps server group with connections to the Load Balancers server gro 12 of 21 9/22/11 10:41 AM

13 ] "name": "Web-Apps", "url": " "id": "7ba8c5d072b1012ec c01709" Get firewall policy details including firewall rules GET : "firewall_policy" : "id" : "b1553ab e23f3442c031a719c", "url": " "name" : "policy one", "description" : "", "used_by" : [ "id" : "b6dd e23f3442c031a719c", "name" : "group one" "firewall_rules" : [ "id" : "d09ac7d e23f3442c031a719c", "url": " "chain" : "INPUT", "active" : true, "firewall_interface" : null, "firewall_source": "name": "any", "id": "649acdf06ac8012e23ce442c031a719c", "url": " "type": "FirewallZone", "ip_address": " /0", "firewall_service": "name": "smtp", "port": "25", "protocol": "tcp", "id": " ac8012e23ce442c031a719c", "url": " "connection_states" : "NEW, ESTABLISHED", "action" : "ACCEPT", "log" : false, "id" : "d63c5b e23f3442c031a719c", "url": " "chain" : "INPUT", "active" : true, "firewall_interface": "name": "eth0", "id": "649ce6e06ac8012e23ce442c031a719c", "url": " "firewall_source" : null, "firewall_service" : null, "connection_states" : null, "action" : "REJECT", "log" : true, "id" : "da80ec e23f3442c031a719c", "url": " "chain" : "OUTPUT", "active" : true, "firewall_interface" : null, "firewall_target" : null, "firewall_service" : null, "connection_states" : null, "action" : "ACCEPT", "log" : false ] Create new firewall policy POST 13 of 21 9/22/11 10:41 AM

14 "firewall_policy" : "name" : "policy one", "description" : "my new policy", "firewall_rules" : [ "chain" : "INPUT", "active" : true, "firewall_interface" : null, "firewall_source" : "c26c6a50b190012ec6b c01709", "firewall_service" : "7b6409a072b1012ec c01709", "connection_states" : "NEW, ESTABLISHED", "action" : "ACCEPT", "log" : false, "chain" : "INPUT", "active" : true, "firewall_interface" : "7b881ca072b1012ec c01709", "firewall_source" : null, "firewall_service" : null, "connection_states" : null, "action" : "REJECT", "log" : true, "chain" : "OUTPUT", "active" : true, "firewall_interface" : "7b881ca072b1012ec c01709", "firewall_destination" : null, "firewall_service" : null, "connection_states" : null, "action" : "ACCEPT", "log" : false ] Status: 201 Location: "firewall_policy": "used_by": [ "description": "my new policy", "firewall_rules": [ "firewall_service": "port": "53", "protocol": "TCP", "name": "dns AXFR", "url": " "id": "7b6409a072b1012ec c01709", "log": false, "active": true, "action": "ACCEPT", "chain": "INPUT", "url": " "id": "812d3bf0b27b012ec6c c01709", "connection_states": "NEW, ESTABLISHED", "log": true, "active": true, "firewall_interface": "name": "eth0", "url": " "id": "7b881ca072b1012ec c01709", "action": "REJECT", "chain": "INPUT", "url": " "id": "812f26a0b27b012ec6c c01709", "connection_states": null, "log": false, "active": true, "firewall_interface": "name": "eth0", "url": " "id": "7b881ca072b1012ec c01709", "action": "ACCEPT", "chain": "OUTPUT", "url": " "id": "81304d50b27b012ec6c c01709", "connection_states": null "name": "policy one", "url": " "id": "812b7500b27b012ec6c c01709" 14 of 21 9/22/11 10:41 AM

15 Update name or description for the firewall policy To update firewall rules within the policy use firewall rules API. PUT "firewall_policy" : "name" : "policy one" Delete firewall policy Deletes an existing firewall policy. If firewall policy is used by one or more server groups 422 error will be returned. DELETE Firewall Rules Object Representation Core firewall rule fields id chain active firewall_interface firewall_source firewall_target firewall_service connection_states action log A unique identifier of the firewall rule. Whether the firewall rule covers INPUT or OUTPUT connections. Allowed values are INPUT and OUTPUT. Whether the firewall rule is active or not. The specified firewall interface for this rule. Specify the ID of the interface you wish to use. The specified source/zone for an INPUT rule. Specify the ID and type of source you wish to use. Allowed values for type are FirewallZone or Group. The specified source/zone for an OUTPUT rule. Specify the ID and type of destination you wish to use. Allowed values for type are FirewallZone or Group. The specified firewall service for this rule. Specify the ID of the service you wish to use. The specified firewall connection state(s) fot this rule. NEW, RELATED, and ESTABLISHED are allowed. The specified action to take if this rule is matched. Allowed values are ACCEPT, DROP, and REJECT. Whether matches to this rule are logged or not. s present only in firewall rule details position The position order of the rule in the chain. List firewall rules in firewall policy GET "firewall_rules": [ "firewall_service": "port": "53", "protocol": "TCP", "name": "dns AXFR", "url": " "id": "7b6409a072b1012ec c01709", "log": false, "active": true, "action": "ACCEPT", "chain": "INPUT", 15 of 21 9/22/11 10:41 AM

16 "url": " "id": "812d3bf0b27b012ec6c c01709", "connection_states": "NEW, ESTABLISHED", "log": true, "active": true, "firewall_interface": "name": "eth0", "url": " "id": "7b881ca072b1012ec c01709", "action": "REJECT", "chain": "INPUT", "url": " "id": "812f26a0b27b012ec6c c01709", "connection_states": null, "log": false, "active": true, "firewall_interface": "name": "eth0", "url": " "id": "7b881ca072b1012ec c01709", "action": "ACCEPT", "chain": "OUTPUT", "url": " "id": "81304d50b27b012ec6c c01709", "connection_states": null ] Get firewall rule details GET "firewall_rule": "log": false, "active": true, "position": 1, "firewall_interface": "name": "eth0", "url": " "id": "7b881ca072b1012ec c01709", "action": "ACCEPT", "chain": "OUTPUT", "url": " "id": "81304d50b27b012ec6c c01709", "connection_states": null Add a new firewall rule to the firewall policy Note that when creating a firewall rule, the source or destination needs to specify whether the zone type is FirewallZone or Group. Position of the rule in the policy is determined by position value. Rules are numbered from 1 for each chain. To add new rule to the very end of the chain, set the value of the position attribute to last. POST "firewall_rule" : "chain" : "INPUT", "active" : true, "firewall_interface" : "7b881ca072b1012ec c01709", "firewall_service" : "7b6409a072b1012ec c01709", "connection_states" : "NEW, ESTABLISHED", "action" : "ACCEPT", "log" : false, "position": 4 Status: 201 Location: 16 of 21 9/22/11 10:41 AM

17 "firewall_rule": "firewall_service": "port": "53", "protocol": "TCP", "name": "dns AXFR", "url": " "id": "7b6409a072b1012ec c01709", "log": false, "active": true, "position": 4, "firewall_interface": "name": "eth0", "url": " "id": "7b881ca072b1012ec c01709", "action": "ACCEPT", "chain": "INPUT", "url": " "id": "99b71970b27c012ec6c c01709", "connection_states": "NEW, ESTABLISHED" Delete firewall rule DELETE Update firewall rule Note that when updating a firewall rule and specifying the source or destination, you also need to specify whether the zone type is FirewallZone or Group. To move rule to a new position specify new position. PUT "firewall_rule" : "firewall_interface" : "649cf9806ac8012e23ce442c031a719c", Move a firewall rule to a desired position Rules within a policy may be ordered. To see the current order execute the API call to list the details of the firewall policy. The rules will be listed in order. Positions accepted are whole numbers with 1 being the first position. Alternatively, you may use position : last for the rule to be moved to the last position. PUT "firewall_rule" : "position" : position Firewall Interfaces Object Representation id name A unique identifier of the firewall interface. A unique name given to the firewall interface. 17 of 21 9/22/11 10:41 AM

18 system Denotes whether the firewall interface is built-in/system or not. These interfaces can not be updated or deleted. List firewall interfaces GET "firewall_interfaces": [ "name": "eth0", "url": " "id": "5a9a36906ac7012ea3c c9f3", "name": "eth0:1", "url": " "id": "5a9a65806ac7012ea3c c9f3", "name": "eth0:15", "system": false, "url": " "id": "5a9b5b406ac7012ea3c c9f3" ] Get firewall interface details GET "firewall_interface": "name": "eth0:15", "system": false, "url": " "id": "5a9b5b406ac7012ea3c c9f3" Create a new firewall interface POST "firewall_interface" : "name" : "eth0:16" Status: 201 Location: "firewall_interface": "name": "eth0:16", "system": false, "url": " "id": "648e7d40ae4f012ea3f c9f3" Delete firewall interface DELETE Sample : Firewall Services Object Representation 18 of 21 9/22/11 10:41 AM

19 id name protocol port system A unique identifier of the firewall service. A unique name given to the firewall service. The specified protocol of the firewall service. TCP, UDP, and ICMP are allowed. The specified port(s) of the firewall service. Denotes whether the firewall service is built-in/system or not. System firewall services can not be updated or deleted. List firewall services GET "firewall_services": [ "port": "53", "protocol": "TCP", "name": "dns AXFR", "url": " "id": "5a8ce2e06ac7012ea3c c9f3", "port": "53", "protocol": "UDP", "name": "dns query", "url": " "id": "5a8cc0a06ac7012ea3c c9f3", "port": "5432", "protocol": "TCP", "name": "postgres", "system": false, "url": " "id": "5a8e66606ac7012ea3c c9f3" ] Get firewall service details GET "firewall_service": "port": "5432", "protocol": "TCP", "name": "postgres", "system": false, "url": " "id": "5a8e66606ac7012ea3c c9f3" Create a new firewall service POST "firewall_service" : "name" : "rails", "protocol" : "tcp", "port" : "3000" Status: 201 Location: "firewall_service": "port": "3000", "protocol": "TCP", "name": "rails", "system": false, "url": " 19 of 21 9/22/11 10:41 AM

20 "id": "d ae4e012ea3f c9f3" Delete firewall service DELETE Firewall Zones Object Representation id A unique identifier of the firewall zone. name A unique name given to the firewall zone. ip_address The specified IP address(es) of the firewall zone. system Denotes whether the firewall zone is built-in/system or not. These zones can not be updated or deleted. used_by Read-only. The list of firewall policies that use this firewall zone. List firewall zones GET "firewall_zones": [ "ip_address": " /0", "used_by": [ "name": "CentOS firewall policy", "id": "5ab5a3106ac7012ea3c c9f3", "name": "Drop everything in all directions policy", "id": "5ab8a7e06ac7012ea3c c9f3" "name": "any", "url": " "id": "5a935b306ac7012ea3c c9f3", "ip_address": " , ", "used_by": [ "name": "DevelopmentCo", "system": false, "url": " "id": "5a ac7012ea3c c9f3" ] Get firewall zone details GET "firewall_zone": "ip_address": " , ", "used_by": [ "name": "DevelopmentCo", "system": false, "url": " "id": "5a ac7012ea3c c9f3" Create a new firewall zone POST 20 of 21 9/22/11 10:41 AM

21 "firewall_zone" : "name" : "databases", "ip_address" : " , , " : Status: 201 Location: "firewall_zone": "ip_address": " , , ", "used_by": [ "name": "databases", "system": false, "url": " "id": "002736c0ae4b012ea3f c9f3" Clone a firewall zone To clone a firewall zone, first fetch the firewall zone details to clone, then create the new firewall zone by using the create firewall zone call, with the new name and IP address(es) details. Update firewall zone PUT "firewall_zone" : "ip_address" : " " : Delete firewall zone Only non-system firewall zones that are not used by firewall policies can be deleted. Attempting to delete a system firewall zone or a firewall zone that is used by firewall policies will result in 422 error. DELETE 21 of 21 9/22/11 10:41 AM

Getting Started With Halo for Windows For CloudPassage Halo

Getting Started With Halo for Windows For CloudPassage Halo Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud has become much easier and more secure, now that CloudPassage Halo is available

More information

Server Account Management

Server Account Management Server Account Management Setup Guide Contents: About Server Account Management Setting Up and Running a Server Access Scan Addressing Server Access Findings View Server Access Scan Findings Act on Server

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure

More information

Workload Firewall Management

Workload Firewall Management Workload Firewall Management Setup Guide Contents: About Halo Workload Firewalls Implementing Halo Workload Firewalls Creating Firewall Policies Define Firewall-Related Components Create Inbound Rules

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Tenable for CyberArk

Tenable for CyberArk HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments

More information

Startup guide for Zimonitor

Startup guide for Zimonitor Page 1 of 5 Startup guide for Zimonitor This is a short introduction to get you started using Zimonitor. Start by logging in to your version of Zimonitor using the URL and username + password sent to you.

More information

Getting Started With Halo for Windows

Getting Started With Halo for Windows Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud is much easier and more secure with CloudPassage Halo for Windows. Halo for Windows

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure

More information

LifeSize UVC Access Deployment Guide

LifeSize UVC Access Deployment Guide LifeSize UVC Access Deployment Guide November 2013 LifeSize UVC Access Deployment Guide 2 LifeSize UVC Access LifeSize UVC Access is a standalone H.323 gatekeeper that provides services such as address

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members Last updated: 27/06/2014 Contents 1 Introduction... 2 1.1 What is ARMS?... 2 1.2 Glossary Terms... 2 2 Setting up your ARMS configuration

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

IP Filtering for Patton RAS Products

IP Filtering for Patton RAS Products RAS Filtering: Applications and Functionality Security PLUS Service Differentiation Did you know you can use IP filtering to boost your revenues? Patton s Remote Access Server (RAS) provides IP Filtering

More information

Remote Access API 2.0

Remote Access API 2.0 VYATTA A BROCADE COMPANY Vyatta System Remote Access API 2.0 REFERENCE GUIDE Vyatta A Brocade Company 130 Holger Way San Jose, CA 95134 www.brocade.com 408 333 8400 COPYRIGHT Copyright 2005 2015 Vyatta,

More information

without the fixed perimeters of legacy security.

without the fixed perimeters of legacy security. TECHNICAL BRIEF The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure cloud security without the fixed perimeters

More information

IBM Cloud Manager with OpenStack. REST API Reference, version 4.1

IBM Cloud Manager with OpenStack. REST API Reference, version 4.1 IBM Cloud Manager with OpenStack REST API Reference, version 4.1 IBM Cloud Manager with OpenStack REST API Reference, version 4.1 Note Before using this information and the product it supports, read the

More information

Git Fusion Guide 2015.3. August 2015 Update

Git Fusion Guide 2015.3. August 2015 Update Git Fusion Guide 2015.3 August 2015 Update Git Fusion Guide 2015.3 August 2015 Update Copyright 1999-2015 Perforce Software. All rights reserved. Perforce software and documentation is available from http://www.perforce.com/.

More information

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3

More information

User and Programmer Guide for the FI- STAR Monitoring Service SE

User and Programmer Guide for the FI- STAR Monitoring Service SE User and Programmer Guide for the FI- STAR Monitoring Service SE FI-STAR Beta Release Copyright 2014 - Yahya Al-Hazmi, Technische Universität Berlin This document gives a short guide on how to use the

More information

Lab Objectives & Turn In

Lab Objectives & Turn In Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for

More information

Moving to Plesk Automation 11.5

Moving to Plesk Automation 11.5 Moving to Plesk Automation 11.5 Last updated: 2 June 2015 Contents About This Document 4 Introduction 5 Preparing for the Move 7 1. Install the PA Moving Tool... 8 2. Install Mail Sync Software (Windows

More information

Flight Workflow User's Guide. Release 12.0.0

Flight Workflow User's Guide. Release 12.0.0 Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration

More information

File Transfer Examples. Running commands on other computers and transferring files between computers

File Transfer Examples. Running commands on other computers and transferring files between computers Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

vcloud Air Platform Programmer's Guide

vcloud Air Platform Programmer's Guide vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

API documentation - 1 -

API documentation - 1 - API documentation - 1 - Table of Contents 1. Introduction 1.1. What is an API 2. API Functions 2.1. Purge list of files 2.1.1 Description 2.1.2 Implementation 2.2. Purge of whole cache (all files on all

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER

INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER A TECHNICAL WHITEPAPER Copyright 2012 Kaazing Corporation. All rights reserved. kaazing.com Executive Overview This document

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Dashboard Admin Guide

Dashboard Admin Guide MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Automating Server Firewalls

Automating Server Firewalls Automating Server Firewalls With CloudPassage Halo Contents: About Halo Server Firewalls Implementing Firewall Policies Create and Assign a Firewall Policy Specify Firewall-Related Components Managing

More information

Cloud Elements! Marketing Hub Provisioning and Usage Guide!

Cloud Elements! Marketing Hub Provisioning and Usage Guide! Cloud Elements Marketing Hub Provisioning and Usage Guide API Version 2.0 Page 1 Introduction The Cloud Elements Marketing Hub is the first API that unifies marketing automation across the industry s leading

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Preinstallation Requirements Guide

Preinstallation Requirements Guide Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy

More information

PC Monitor Enterprise Server. Setup Guide

PC Monitor Enterprise Server. Setup Guide PC Monitor Enterprise Server Setup Guide Prerequisites Server Requirements - Microsoft Windows Server 2008 R2 or 2012-2GB RAM - IIS 7.5 or IIS 8.0 (with ASP.NET 4.0 installed) - Microsoft SQL Server 2008

More information

Using TestLogServer for Web Security Troubleshooting

Using TestLogServer for Web Security Troubleshooting Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part

More information

Dragonframe License Manager User Guide Version 1.2.2

Dragonframe License Manager User Guide Version 1.2.2 Dragonframe License Manager User Guide Version 1.2.2 The Dragonframe License Manager (DFLM) provides floating license management for Dragonframe 3.0 and above. You must contact support (support@dragonframe.com)

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Chapter 3 Restricting Access From Your Network

Chapter 3 Restricting Access From Your Network Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.

More information

Integration Client Guide

Integration Client Guide Integration Client Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Compute RESTful API. Programmer s Guide. Revision 1.4 (11/10/2013) COMPUTE RESTFUL API

Compute RESTful API. Programmer s Guide. Revision 1.4 (11/10/2013) COMPUTE RESTFUL API Compute RESTful API Programmer s Guide Revision 1.4 (11/10/2013) Lunacloud Tel: 0845 0730827 21 Southampton Row Email: info@lunacloud.com WC1B 5HA London www.lunacloud.com Table of Contents CHAPTER 1 4

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

OS Installation: CentOS 5.8

OS Installation: CentOS 5.8 OS Installation: CentOS 5.8 OpenTUSK Training University of Nairobi Mike Prentice michael.prentice@tufts.edu Tufts University Technology for Learning in the Health Sciences July 2013 Outline 1 OS Install

More information

API Reference Guide. API Version 1. Copyright Platfora 2016

API Reference Guide. API Version 1. Copyright Platfora 2016 API Reference Guide API Version 1 Copyright Platfora 2016 Last Updated: 10:05 a.m. April 21, 2016 Contents Document Conventions... 5 Contact Platfora Support...6 Copyright Notices... 6 Chapter 1: Using

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Administrators guide to the Matrix Control Panel. Linux

Administrators guide to the Matrix Control Panel. Linux Administrators guide to the Matrix Control Panel Linux Setting up your server... 3 Introduction... 3 Logging into the matrix control panel... 3 Setting yourself up as a user... 3 Securing the Matrix control

More information

Healthstone Monitoring System

Healthstone Monitoring System Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................

More information

Ansible Tower API Guide

Ansible Tower API Guide Ansible Tower API Guide Release Ansible Tower 2.3.1 Ansible, Inc. October 19, 2015 CONTENTS 1 Introduction to the Tower API 2 1.1 Tools................................................... 2 1.2 Browsable

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11 Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component

More information

API V2.0. Documentation 7/28/2014

API V2.0. Documentation 7/28/2014 API V2.0 Documentation 7/28/2014 Table of Contents TABLE OF CONTENTS 2 REVISION HISTORY 6 OVERVIEW 7 Making A Request 7 The Sandbox 7 Rate Limiting 7 Supported Data Formats 8 Authentication 8 Common Header

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA

Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following

More information

Qualys API V1. User Guide. Version 8.6

Qualys API V1. User Guide. Version 8.6 Qualys API V1 User Guide Version 8.6 September 30, 2015 Copyright 2002-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

EMC NetWorker. Security Configuration Guide. Version 8.2 SP1 302-001-577 REV 02

EMC NetWorker. Security Configuration Guide. Version 8.2 SP1 302-001-577 REV 02 EMC NetWorker Version 8.2 SP1 Security Configuration Guide 302-001-577 REV 02 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published February, 2015 EMC believes the information

More information

Web Browsing Examples. How Web Browsing and HTTP Works

Web Browsing Examples. How Web Browsing and HTTP Works How Web Browsing and HTTP Works 1 1 2 Lets consider an example that shows how web browsing and HTTP work. The example will cover a simple, but very common case. There are many more details of HTTP that

More information

Infinitel HotSpotWeb User Manual

Infinitel HotSpotWeb User Manual Infinitel HotSpotWeb User Manual INTRODUCTION... 5 REQUIREMENTS... 6 INSTALLATION... 7 FIRST STEP... 7 MICROSOFT WINDOWS... 7 Uninstall service... 7 OTHER OS... 7 ADVANCED INSTALLATION SETTINGS... 8 Application.properties

More information

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,

More information

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this

More information

Shipping Services Files (SSF) Secure File Transmission Account Setup

Shipping Services Files (SSF) Secure File Transmission Account Setup Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:

More information

EMC ViPR Controller. ViPR Controller REST API Virtual Data Center Configuration Guide. Version 2.3.0.0 302-002-070 01

EMC ViPR Controller. ViPR Controller REST API Virtual Data Center Configuration Guide. Version 2.3.0.0 302-002-070 01 EMC ViPR Controller Version 2.3.0.0 ViPR Controller REST API Virtual Data Center Configuration Guide 302-002-070 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in USA. Published

More information

TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE

TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE April 2016 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 1 1.1 Getting Started... 1 1.2 System

More information

How to Configure Active Directory based User Authentication

How to Configure Active Directory based User Authentication How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.

More information

Presented by Henry Ng

Presented by Henry Ng Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0 Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Configuring Basic Settings

Configuring Basic Settings CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

McAfee Vulnerability Manager 7.0.2

McAfee Vulnerability Manager 7.0.2 McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

OCS Training Workshop LAB14. Email Setup

OCS Training Workshop LAB14. Email Setup OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging

More information

NetIQ Advanced Authentication Framework - MacOS Client

NetIQ Advanced Authentication Framework - MacOS Client NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements

More information

SUSE Manager in the Public Cloud. SUSE Manager Server in the Public Cloud

SUSE Manager in the Public Cloud. SUSE Manager Server in the Public Cloud SUSE Manager in the Public Cloud SUSE Manager Server in the Public Cloud Contents 1 Instance Requirements... 2 2 Setup... 3 3 Registration of Cloned Systems... 6 SUSE Manager delivers best-in-class Linux

More information

Rebasoft Auditor Quick Start Guide

Rebasoft Auditor Quick Start Guide Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered

More information

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?

More information