Pre Sales Communications
|
|
- Austin Austin
- 8 years ago
- Views:
Transcription
1 Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel
2 Table of contents 1. Objectives IP protocols Global overview Protocols Protocols and ports used without security protocol Connection Windows PC client with connection to the 4760 server Web directory consultation Application Configuration Accounting Directory Alarms Topology Scheduler Miscellaneous Report generation OXE declaration Save OXE data OXE automatic synchronization TELNET Hypervisor integration Protocols and ports used with security protocols Between PBX and OmniVista 4760 server SSH/SFTP Between OmniVista 4760 server and client IPSec protocol...20 End of document...21 ESD / Pre Sales / JMB 2/21 February 2009 Ed01b
3 1. Objectives This document provides the list of all IP protocols and the ports used by the OmniVista 4760 (client/server) to manage an OmniPCX Enterprise. The use of these protocols and ports is described through the examples. 2. IP protocols 2.1. Global overview Protocols GIOP: OmniVista 4760 uses CORBA (Common Object Request Broker Architecture) technology to communicate between Server and Client. GIOP is the CORBA exchange protocol. LDAP: is used to retrieve or send data to the Directory server. HTTP: is used to provide HTML pages and on-line help. TDS: is used to access the accounting database (SQL Sybase). CMOT: is used to retrieve or send the data from the PBX database. TELNET: is used when the user connects to the PBX system. FTP: is the file transfer protocol used to retrieve the PBX files (accounting, past time performance). The active mode is used up to OmniVista R3.1; the passive mode is used from OmniVista R3.2. ESD / Pre Sales / JMB 3/21 February 2009 Ed01b
4 SSH: is the secure protocol that replaces TELNET and FTP. SFTP is the file transfer protocol embedded with SSH protocol. SFTP it is not the evolution of the FTP protocol. SNMP: is used to provide voice network alarms by SNMP traps. SMTP: is used following an event, which includes sending information to a mail server. By default, 4760 sends the message to port 25 of the SMTP server. Information about SMTP is not provided in this document. STAP: Simple Telephony Application Protocol. It is used with the call by name feature in the Enterprise Directory Protocols and ports used without security protocol All ports, which are defined by default, can be modified after OmniVista 4760 server installation (for more information, see technical documentation). When the customer only uses the embedded client in the server, all the listening ports to a remote PC client management remain closed. There is no need to open the customer firewall. All listening ports of the 4760 server and PC client that are used by protocols are opened when a session starts Connection Windows PC client with connection to the 4760 server The protocols used are available whatever the type of Client Management (browser or client embedded in the Windows PC). The protocols and ports used are the same with or without user identification. GIOP: At the first connection, it is used to communicate with: The security server, The notification server. ESD / Pre Sales / JMB 4/21 February 2009 Ed01b
5 The license server and user access rights are sent via this protocol. OmniVista 4760 from R4.1 IP Protocols The default listening ports used by the 4760 server are: 30025, 30019, The default listening port used by the PC Client management is a free port in range: to LDAP: It is used to retrieve directory system information. The default listening port used by the 4760 server is: 389. HTTP: It is used for the help on the way. The default listening port used by the 4760 server is: Ports usage PC Client Management Ports DP DP DP Connection to the Directory server Access to the security server Access right request as PC client Ports OmniVista 4760 DP Test HTTP server 80 DP Request to the notification server RP Answer of the notification server DP DP : Dynamics Ports: Between1024 to 5000 RP : Range ports : between to Web directory consultation HTTP: It is used for the web presentation. The default listening port used by the 4760 server is: 80. ESD / Pre Sales / JMB 5/21 February 2009 Ed01b
6 Ports usage Application Configuration The protocols and ports described below concern the launching module and connection in the PBX. All PBX configuration actions are made in this way. GIOP: In this context, this protocol is used to: Request connection to the 4760 server, Send and receive PBX data information, Synchronize with the PBX MIB, Receive alarms and events configuration commands, Retrieve security information about user rights. The default listening ports used by the 4760 server are: 30022, 30014, 30017, 30018, The default listening port used by the PC Client management is a free port in the range: to LDAP: It is used to retrieve information about the PBX managed by the 4760 ESD / Pre Sales / JMB 6/21 February 2009 Ed01b
7 The default listening port used by the 4760 server is: 389. CMISE: is used to send requests to the OmniPCX Enterprise. The listening port of the OmniPCX Enterprise is: HTTP: is used when the GUI mode is used for set configuration. OmniVista 4760 from R4.1 IP Protocols Ports usage Accounting The protocols and ports described below concern the launching application and accounting configuration in the server. For accounting reports, see chapter report generation). ESD / Pre Sales / JMB 7/21 February 2009 Ed01b
8 TDS: is used to retrieve Data in the accounting database (Sybase Anywhere). The default listening port used by the 4760 server is: LDAP: is used to retrieve the accounting information (rights ) in the directory system. The default listening port used by the 4760 server is: 389. GIOP: is used to retrieve security information about user rights. The default listening port used by the 4760 server is: Ports usage Directory The protocols and ports described below concern the launching application and Directory configuration in the server. For declaring the OXE, see chapter OXE declaration. ESD / Pre Sales / JMB 8/21 February 2009 Ed01b
9 TDS: is used to retrieve information from the accounting database (Sybase Anywhere). The default listening port used by the 4760 server is: LDAP: is used to retrieve the Data in the directory system. The default listening port used by the 4760 server is: 389. GIOP: is used to retrieve security information about user rights. The default listening port used by the 4760 server is: Ports usage Alarms The protocols and ports described below concern the launching application and Alarm actions made in the server (Delete, Acknowledge ). For alarm reports, see chapter Report generation. ESD / Pre Sales / JMB 9/21 February 2009 Ed01b
10 GIOP: In this context, this protocol is used to receive alarms and events configuration from the notification server. The default listening port used by the 4760 server is: The default listening port used by the PC Client management is: to LDAP: is used to retrieve the alarms information (right ) in the directory system. The default listening port used by the 4760 server is: Ports usage Topology The protocols and ports described below concern the launching application and actions made in Topology (object creation ). ESD / Pre Sales / JMB 10/21 February 2009 Ed01b
11 GIOP: In this context, the protocol is used to receive alarms from the notification server and retrieve user rights from the security server. The default listening port used by the 4760 server is: 30022, The default listening port used by the PC Client management is a free port in range: to LDAP: is used to retrieve the topology information (PBX ) in the directory system. The default listening port used by the 4760 server is: 389. HTTP: It is used for the Topology GUI and the on-line help. The default listening port used by the 4760 server is: Ports usage Scheduler The protocols and ports described below concern the launching application and actions made in Scheduler (job creation...). ESD / Pre Sales / JMB 11/21 February 2009 Ed01b
12 GIOP: is used to communicate with the Scheduler server and the security server The default listening ports used by the 4760 server are: and LDAP: is used to retrieve the scheduler information (rights ) in the directory system. The default listening port used by the 4760 server is: Ports usage Miscellaneous Report generation The protocols and ports described below concern the launching application and reports generation. All report types are concerned (accounting, alarms, performances). ESD / Pre Sales / JMB 12/21 February 2009 Ed01b
13 GIOP: is used to communicate with the extractor server and security server The default listening port used by the 4760 server is: and TDS: is used to retrieve data in the accounting database (Sybase Anywhere). The default listening port used by the 4760 server is: LDAP: is used to retrieve the Directory information necessary to generate a report. The default listening port used by the 4760 server is: Ports usage OXE declaration The protocols and ports described below only concern OXE declaration. ESD / Pre Sales / JMB 13/21 February 2009 Ed01b
14 CMISD: is used to supervise the OmniPCX Enterprise alarms. If the OXE alarms are not supervised, the protocol is not used when an OXE PBX is declared. The listening port of the OmniPCX Enterprise is: FTP or SFTP: is used to retrieve the OmniPCX Enterprise MIB. If the MIB is already in the OmniVista database, the MIB is not retrieved from the OmniPCX Enterprise and the FTP protocol is not used. The listening port of the OmniPCX Enterprise is: 21. If SFTP is used the listening and data port is: 22 (see ) Ports usage Save OXE data The protocols and ports described below only concern the save of OXE data. ESD / Pre Sales / JMB 14/21 February 2009 Ed01b
15 GIOP: is used to communicate with the backup/restore server. The default listening port used by the 4760 server is: FTP or SFTP: is used to retrieve OmniPCX Enterprise database. The listening port of the OmniPCX Enterprise is: 21. If SFTP is used, the listening and data port is: 22 (see ) LDAP: is used to retrieve Directory information necessary for the OmniPCX database backup/restore. The default listening port used by the 4760 server is: Ports usage ESD / Pre Sales / JMB 15/21 February 2009 Ed01b
16 OXE automatic synchronization The protocols and ports described below are only used when the scheduler window is open. CMISD: is used: To supervise the OmniPCX Enterprise alarms, To retrieve specific telephonic database data (subscriber phone number ) The listening port of the OmniPCX Enterprise is: FTP or SFTP: is used to retrieve the files from the OmniPCX Enterprise (MIB, Accounting tickets, PTP counters, VOIP tickets). The listening port of the OmniPCX Enterprise is: 21. If SFTP is used, the listening and data port is: 22 (see ) GIOP: is used to communicate with the Scheduler server The default listening port used by the 4760 server is: HTTP: It is used for on-line help. The default listening port used by the 4760 server is: Ports usage ESD / Pre Sales / JMB 16/21 February 2009 Ed01b
17 TELNET TELNET: is used when the 4760 administrator connects to the OmniPCX in terminal mode. In this way, all technical commands to the OmniPCX Enterprise can be made (Login and password are required). TELNET protocol is not secured. The default ports used by the 4760 server are in the range: to ESD / Pre Sales / JMB 17/21 February 2009 Ed01b
18 The listening port of the OmniPCX Enterprise is: Ports usage OmniVista 4760 from R4.1 IP Protocols Hypervisor integration SNMP: The 4760 SNMP traps are sent via this protocol. The listening port of the 4760 is: Ports usage ESD / Pre Sales / JMB 18/21 February 2009 Ed01b
19 2.3. Protocols and ports used with security protocols Between PBX and OmniVista 4760 server SSH/SFTP SFTP: is the Secured File Transfer Protocol of SSH protocol that replaces TELNET and FTP. It can be used from OmniPCX R6.0. When the 4760 administrator connects to the OmniPCX in terminal mode, a Proxy in the 4760 server is used. In this way, all technical commands to the OmniPCX Enterprise can be made (Login and password are required). SSH: is used for Remote maintenance. Authentication is mandatory (Login / Password). Secured File Transfer Protocol retrieve: MIB structure, Accounting tickets, Counters of Past time performance, VOIP tickets. The port used by default in the 4760 server is: The listening port of the OmniPCX Enterprise is: Ports usage ESD / Pre Sales / JMB 19/21 February 2009 Ed01b
20 Between OmniVista 4760 server and client IPSec protocol IPSec is a standard, which includes specific protocols. OmniVista 4760 from R4.1 IP Protocols When IPSec is used, the ports, which have been described in the previous chapter 2.2, are not seen through the data network. They are still used at the end point (OXE, 4760 sever or client). IPSec can be deployed if the Operating System for the OmniVista 4760 server is Windows 2003 and Windows 2000, XP or 2003 for the OmniVista 4760 client. By default, IPSec protection is not active between 4760 server & client. IPSec protection of OmniVista 4760 is built with two IPSec windows strategies provided by Alcatel (client strategy & server strategy). Except for the HTTP protocol (port 80), these strategies provide security for all the client/server communications. HTTP port (80) can be added into the IPSec protection, but the Windows PC Web browser, which has active IPSec, can only have access to the 4760 Web Administration server. In the case of a third party, where the LDAP application would need to access the 4760 Directory Server (LDAP overflow from the OXE, LDAP replication, Alcatel 4059), the LDAP port (389 of the 4760 server) must be removed from the IPSec strategy. IPSec slows down access time and data exchanges. If the time delays are excessive, IPSec protection field can be reduced (modification of strategies). If the customer has an IPSec strategy, the IPSec protection of the OmniVista 4760 must be included in it. ESD / Pre Sales / JMB 20/21 February 2009 Ed01b
21 KERBEROS: is used to send the authentication request to the Kerberos server embedded in the Data Controller. Authentication is requested when the PC starts. UDP or TCP support depends on the Kerberos message size. If the size is not compliant with UDP format, it is sent by TCP format. The Microsoft System makes the choice. ISAKMP: is the security protocol used to define security keys and algorithms. In 4760 server or client, the Port #500 is used as source and destination port. ESP: is the security protocol used to provide data privacy for the communication exchange between the OmniVista 4760 server and the client Ports usage IPSec protection, simplifies firewall configuration because the communication ports embedded in the IPSec strategy are not filtered in firewalls. If you have reactions or comments to make about this document, please send an to with the title of this document and the subject. End of document ESD / Pre Sales / JMB 21/21 February 2009 Ed01b
Pre Sales Communications
Pre Sales Communications OmniVista 4760 Construction of a redundancy server solution All rights reserved 2009, Alcatel-lucent Table of contents 1. INTRODUCTION AND OBJECTIVE... 4 2. FOREWORD... 4 3. THE
More informationThe Next generation Network Management solution
The Next generation Network Management solution August 2012 AGENDA 1. The Problem: IT is struggling to cope 2. The Solution: Automating Unified Management 3. 8770 Application Suite Overview 4. Ordering
More informationNETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
More informationFeatures Description Benefit AP-7131N support Adaptive AP Support for the AP7131N-GR and AP7131N- GRN
Release Notes for RFS7000 v4.1.0.0-040gr Contents 1. Introduction to New Features 2. Features Added for FIPS Compliance 3. Features Disabled or Modified for FIPS Compliance 4. Firmware Versions & Compatibility
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationAlcatel-Lucent OmniVista TM 4760 Network Management System
Alcatel-Lucent OmniVista TM 4760 Network Management System Network Management Systems Telecom managers need flexible network management tools to deal with the challenge of staying current with today s
More informationDevice Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationOnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationImmotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationAlcatel-Lucent OmniPCX Enterprise Free Desktop. Free Desktop version 3.0.1 Linux Installation Guide
Alcatel-Lucent OmniPCX Enterprise Free Desktop Free Desktop version 3.0.1 Linux Installation Guide Alcatel-Lucent Services for Enterprise All Rights Reserved Alcatel-Lucent 2008 Legal notice Alcatel, Lucent,
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More informationPreventing credit card numbers from escaping your network
Preventing credit card numbers from escaping your network The following recipe describes how to configure your FortiGate to use DLP (Data Loss Prevention) so that credit card numbers cannot be sent out
More informationAvaya Integrated Management Application Notes: Release 3.1 Windows Installation Properties - Issue 1.0
Avaya Integrated Application Notes: Release 3.1 Windows Installation Properties - Issue 1.0 Abstract This paper attempts to provide the customer with relevant information about the Integrated Microsoft
More informationApplication Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationConfiguring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
More informationList of Common TCP/IP port numbers
List of Common TCP/IP port numbers For those of you who configure firewalls, routers, port forwarding, and applications connectivity, this regularly updated document lists all standard, common, well known,
More informationConfiguring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0
Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different
More informationIntroduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationFreeFlow Core, Version 4.0 August 2014 702P02837. Xerox FreeFlow Core Security Guide
FreeFlow Core, Version 4.0 August 2014 702P02837 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in the United States and/or other
More informationVirtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
More informationDeploying Brocade Network Advisor in a Secure Environment
Deploying Brocade Network Advisor in a Secure Environment To ensure secure data center operations, the data handled by Brocade Network Advisor must be protected from misuse. This paper describes techniques
More informationAlcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration
Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration September, 2009 TC1312 Alcatel-Lucent Office Offer - All Rights Reserved Alcatel-Lucent 2009
More informationPRINT FLEET MANAGER USER MANUAL
PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced
More informationSecurity Provider Integration Kerberos Authentication
Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationRemote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
More informationLab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team
More informationExam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
More informationSCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...
More informationGS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationBorderWare Firewall Server 7.1. Release Notes
BorderWare Firewall Server 7.1 Release Notes BorderWare Technologies is pleased to announce the release of version 7.1 of the BorderWare Firewall Server. This release includes following new features and
More informationDirectory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
More informationMonitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationParallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
More informationDistrict of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationSOSFTP Managed File Transfer
Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP
More informationNetwork Management Card. User Manual
User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationVirtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationLab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
More informationACP 3.2 Novelties. Edition 01 March, 2014. Aastra - 2014 1
ACP 3.2 Novelties Edition 01 March, 2014 Aastra - 2014 1 Mitel 2014 Content New features New Aastra light classic interface Calls log SIP encryption Incoming SMS CSTA link for subscriber supervision Subscriber
More informationBusiness VoIP Solution Training 04/2009
Business VoIP Solution Training 04/2009 IP Phone Deployment Scenario 1 Company LAN All the IP Phones and PBX are within the same local area network, no firewall and NAT traversal issues IP PBX 2 IP Phone
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationfreesshd SFTP Server on Windows
freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone
More informationSITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective:
AG041410 SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective: Determine how to configure the RD500 and your PSTN or GSM modem APPLICATION
More informationNovell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
More informationFigure 41-1 IP Filter Rules
41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1
More informationVirtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
More informationFile Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
More informationRequirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
More informationCompiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
More informationActiveXperts Network Monitor. White Paper
ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents
More informationRevised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0
Revised: 14-Nov-07 Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 2 / 16 This edition of the User Manual has been updated with information available at the date of issue. This edition supersedes
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationMyPBX Security Configuration Guide
MyPBX Security Configuration Guide Version: V1.4 Date: March 25 th, 2013 Yeastar Technology Co., Ltd. http://www.yeastar.com 1/16 Contents 1. Security Configuration for Web GUI..3 1.1 Change the default
More informationApplication Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1
Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1 The CTI 2500P-ACP1 is capable of transferring data files to a remote FTP Server. This document provides information
More informationPerleVIEW Device Management System User s Guide
PerleVIEW Device Management System User s Guide Version 1.2 Part #5500320-12 May 2013 PerleVIEW V1.2 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,
More informationQuick Scan Features Setup Guide
Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)
More informationIntroduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
More informationPreinstallation Requirements Guide
Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy
More informationPersonal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address
NAT Introduction: Vidyo Conferencing in Firewall and NAT Deployments Vidyo Technical Note Section 1 The VidyoConferencing platform utilizes reflexive addressing to assist in setup of Vidyo calls. Reflexive
More informationA Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationVirtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
More informationMcAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationSmart Cloud Integration Pack. For System Center Operation Manager. v1.1.0. User's Guide
Smart Cloud Integration Pack For System Center Operation Manager v1.1.0 User's Guide Table of Contents 1. INTRODUCTION... 6 1.1. Overview... 6 1.2. Feature summary... 7 1.3. Supported Microsoft System
More informationFortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html
IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : NSE4 Title : Fortinet Network Security Expert 4 Written Exam (400) Vendor
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationVoIPon www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299
VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR
More informationConsiderations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
More informationSonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
More informationKnowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?
Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database? Date: January 11th, 2011 Last Update: January 21st, 2013 (see Section 2, C, 4) Problem: You want to create
More informationFile Transfer Protocol (FTP) & SSH
http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.
More informationEnabling Users for Lync services
Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option
More informationTable of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
More information11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationWS_FTP Server. User Guide
WS_FTP Server User Guide Contents CHAPTER 1 WS_FTP Server Overview What is WS_FTP Server?...1 System requirements for WS_FTP Server...1 How FTP works...3 How SSH works...3 Activating WS_FTP Server for
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationHowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0
Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...
More informationBasic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
More informationAgenda What can we do now? And 5 years from now we will still be current!
Pittsburgh Steelers Alcatel-Lucent OmniPCX Enterprise IP Telephone System Alcatel-Lucent OmniSwitch Network Infrastructure Alcatel-Lucent Collaboration and Fax Server AVST Unified Messaging Wireless Network
More informationTechnical Support Information
Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband
More informationLifeSize Control TM Deployment Guide
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
More informationVoIP Laboratory A Creating a local private telephony network in a rural community
VoIP Laboratory A Creating a local private telephony network in a rural community (cc) Creative Commons Share Alike Non Commercial Attribution 3 This laboratory focus on building local Voice infrastructure
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationConfigure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
More information