HP Service Virtualization
|
|
- Alexander Summers
- 8 years ago
- Views:
Transcription
1 HP Service Virtualization Fixed Length Protocol Virtualization SV Training September 2014
2 Fixed Length Protocol Virtualization Technology Description Use Cases Supported Message Structures SV Service Description Format Virtual Service Summary Exercise 2
3 Technology Description TCP/IP layer is used directly Message is introduced by a field describing its length The same message type has usually the same length No delimiters are present Each field is described by offset and length pair Usually used as a legacy protocol or in embedded devices 3
4 Use Case 4
5 Use Case 5
6 Use Cases How to Recognize Fixed Length Message (While Viewing in Hex Editor) Unsupported characters are present in the beginning of the file (underlined) Lots of spaces (hex value 0x20) Lots of zeros (hex value 0x30) No visible data value separation Can read ASCII strings and numbers Free Hex Editor SQRT
7 Use Cases How to Recognize Fixed Length Message (From Provided Description) Offset and Length columns Format column Message Length field Alphanumeric and Numeric fields are mostly present Numeric fields are usually left zero padded to defined length Alphanumeric fields are usually right space padded to defined length Message Type field can be present All messages have a message length field on the same offset position Name Offset Length Type Description Value Length 0 4 Binary (network byte order) Message length Type 4 6 String Message type SQRT Number Numeric Number 7
8 Supported Message Structures No occurring structures are supported (arrays of some type, defined field occurrence) Message can be shorter than defined, unspecified fields are set to not present value in SV Supported field data types: Format SV Format Note ASCII, Alphanumeric, String String Just ASCII chars are valid UTF-8, Unicode, Binary Any non-ascii charset Numeric Numeric Numbers in ASCII ( or ) Decimal Decimal Numbers in ASCII + decimal separator ( or ) Fixed Decimal String Fixed decimal places (i.e. financial applications: ) Integer, Short (big-endian, network byte order) Integer, Short (little-endian, Intel x86) IntBE IntLE Supported byte length is 4 bytes or less. More info: Binary, other non-specified Binary If some of parent formats is not working, use Binary instead. 8
9 Evaluation Direction SV Service Description Format (structure) Tab-separated table in *.txt file. Can be prepared in Excel and copy & pasted to *.txt file. Following table format is required (at any order), just bold fields are mandatory: Name Offset Length Type Description Default Value Attributes Length 0 4 IntBE Message Length 1 Type 4 4 String Message Type 2 Request Type Response Type REQ RESP Enumeration of matching message types MsgID 8 6 Numeric Message ID HasError 14 1 Numeric Has Error Flag 0 No Error 0 Error 1 Enumeration of possible values for the parent field Data String Message Payload 9
10 SV Service Description Format (file name) Defined service description is used for request and response calls but if the file name matches one of the following patterns: Request File Name Pattern *_req.txt *_request.txt *_rq.txt *-req.txt *-request.txt *-rq.txt *.req.txt *.request.txt *.rq.txt Response File Name Pattern *_resp.txt *_response.txt *_rs.txt *-resp.txt *-response.txt *-rs.txt *.resp.txt *.response.txt *.rs.txt 10
11 Virtual Service Summary Multiple responses are supported TCP/IP protocol is only supported Multiple service description files can be used to create a virtual service Simulation from the scratch is not supported, learning is needed Just one virtual service can be deployed on a Fixed-Length TCP Agent Occurring structures are not supported Variable message structures (defined by a precedent field) are not supported Cobol strings are not supported (in a readable way) 11
12 Summary Introduced simple to use fixed-length protocol in SV No code changes needed for introducing customer-specific fixed-length protocol Easy maintenance of the protocol in customer environment Service description format can be used for further extensions (like Text Based protocol over TCP) 12
13 Exercise
14 Fixed Length Protocol Virtualization Exercise Use Case Application Analysis & Packet Dumps Service Description Creation Virtualization Troubleshooting Summary 14
15 Use Case Demo Application Simple calculator that supports SQRT and PLUS operations Responses are either RESULT or ERROR Demo Application Package Client Application (connecting to localhost:10000) Real Service (listening on localhost:10000) 15
16 Application Analysis & Packet Dumps Open *.pcap file in Wireshark Example *.pcap file Select the first TCP/IP packet with payload data Check the packet structure (the TCP part is the last part) Find the TCP segment data Check payload of the data Use the protocol recognition steps from the Lesson 5: Fixed Length Protocol Virtualization 16
17 Service Description Creation SQRT Operation Service Description File for SV Name Offset Length Type Description Default Value Data Attributes Length 0 4 IntBE Message length 1 Type 4 6 String Message type 2 SQRT Number Numeric Number Example Excel with Service Descriptions 17
18 Service Description Creation PLUS Operation Service Description File for SV Name Offset Length Type Description Default Value Data Attributes Length 0 4 IntBE Message length 1 Type 4 6 String Message type 2 PLUS Base 10 2 Numeric Base Binary 2 Octal 8 Decimal 10 Hexadecimal 16 Number String Number 1 Number String Number 2 18
19 Service Description Creation RESULT Operation Service Description File for SV Name Offset Length Type Description Default Value Data Attributes Length 0 4 IntBE Message length 1 Type 4 6 String Message type 2 RESULT Base 10 2 Numeric Base Binary 2 Octal 8 Decimal 10 Hexadecimal 16 Result String Result 19
20 Service Description Creation ERROR Operation Service Description File for SV Name Offset Length Type Description Default Value Data Attributes Length 0 4 IntBE Message length 1 Type 4 6 String Message type 2 ERROR ErrorCode 10 4 Numeric Error code ErrorMessage String Error message Output error_rs.txt file opened in Notepad++ 20
21 Virtualization Agent Configuration Virtual Service Port Number Real Service Hostname And Port Number (our example: localhost and ) 21
22 Virtualization Creating a Virtual Service & Learning
23 Virtualization After Learning Protocol operations 23
24 Virtualization Data Model Refinement Message Length Recognition Note the length 24
25 Virtualization Data Model Refinement Fallback to the Error Message Type Create a new rule and set the message type to error_rs 25
26 Virtualization Data Model Refinement Default Rule Update Set all fields meaningfully, especially the length field must have the same value as the learned message When you hit the default rule, data model accuracy will be decreases 26
27 Troubleshooting The following namespaces can be set to TRACE log level to debug the protocol: HP.SV.MessageProcessing.GenericProtocol HP.SV.TcpAgent.FixedAndText HP.SV.MessageProcessing.ProtocolBuilder.GenericProtocolServiceDescriptionBuilder The protocol uses XML message format internally in SV The message logger also displays XML format, so don t be surprised Service description format is tab-separated, so check the format first when you get errors while creating a virtual service Fixed Length TCP Agent can be used just by one virtual service at the same time 27
28 Summary The same approach applicable also for Text Based protocol over TCP extension in HP SV Extensibility SDK No empty line should be present in a service description file Use Designer/Server logs for debugging Analyze messages in the message logger in Designer 28
29 Thank you!
The Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
More informationTCP Session Management (SesM) Protocol Specification
TCP Session Management (SesM) Protocol Specification Revision Date: 08/13/2015 Version: 1.1e Copyright 2015 Miami International Securities Exchange, LLC. All rights reserved. This constitutes information
More informationModScan A SCADA MODBUS Network Scanner. Mark Bristow mark.bristow@gmail.com
ModScan A SCADA MODBUS Network Scanner Mark Bristow mark.bristow@gmail.com Agenda Brief introduction to SCADA Systems The MODBUS Protocol MODBUS TCP ModScan Demonstration ModScan Project Information Q&A
More informationChapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
More informationChapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
More informationCluster APIs. Cluster APIs
Cluster APIs Cluster APIs Cluster APIs include: Cluster Control APIs Cluster Resource Group APIs Cluster Resource Group Exit Program Topics covered here are: Cluster APIs Cluster Resource Services Characteristics
More informationConfiguring the Bundled SESM RADIUS Server
APPENDIX D This appendix describes the configuration options for the bundled SESM RADIUS server. Topics are: Bundled SESM RADIUS Server Installed Location, page D-1 Profile File Requirements, page D-1
More informationPacket Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
More informationApplication Firewall Configuration Examples
SonicOS Application Firewall Configuration Examples This technote describes practical usage examples with the SonicOS Application Firewall (AF) feature introduced in SonicOS Enhanced 4.0. The Application
More information2011, The McGraw-Hill Companies, Inc. Chapter 3
Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through
More informationTCP Packet Tracing Part 1
TCP Packet Tracing Part 1 Robert L Boretti Jr (robb@us.ibm.com) Marvin Knight (knightm@us.ibm.com) Advisory Software Engineers 24 May 2011 Agenda Main Focus - TCP Packet Tracing What is TCP - general description
More informationNAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
More informationPeach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
More informationExam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
More informationKiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.
Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationTurquoise Equities. TQ401 - Level 2 MITCH UDP Market Data. Issue 3.3 19 November 2015
Turquoise Equities TQ401 - Level 2 MITCH UDP Market Data Issue 3.3 19 November 2015 Contents 1.0 Introduction 4 1.1 Purpose 4 1.2 Readership 4 1.3 Document Series 4 1.4 Document History 5 1.5 Enquiries
More informationAQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
More informationMoven Studio realtime. streaming
Moven Studio realtime network streaming UDP protocol specification Document MV0305P Revision B, 19 December 2007 Xsens Technologies B.V. phone +31 88 XSENS 00 Pantheon 6a +31 88 97367 00 P.O. Box 559 fax
More informationµtasker Document FTP Client
Embedding it better... µtasker Document FTP Client utaskerftp_client.doc/1.01 Copyright 2012 M.J.Butcher Consulting Table of Contents 1. Introduction...3 2. FTP Log-In...4 3. FTP Operation Modes...4 4.
More informationConfiguration of the DHCP server
104 Page 91 of 294 Contents This section contains information on the following topics: Overview................................................ 91 i2004 Internet Telephone....................................
More informationActive Directory Integration with Blue Coat
The Web Security Authority. TM Active Directory Integration with Blue Coat NOTE: This techbrief is applicable when using NTLM under Windows 2000 Server. Introduction Windows 2000 server utilizes Active
More informationSQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
More informationNetwork Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
More informationLab Module 3 Network Protocol Analysis with Wireshark
Pacific Northwest National Laboratory Lab Module 3 Network Protocol Analysis with Wireshark NATO ASI on Energy Infrastructure Security October 2015 PNNL-##### Lab Module 3 Network Protocol Analysis with
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More information4D Plugin SDK v11. Another minor change, real values on 10 bytes is no longer supported.
4D Plugin SDK v11 4D Plugin API 4D Plugin API v11 is a major upgrade of 4D Plugin API. The two major modifications are that it is now fully Unicode compliant, and that it gives support to the new 4D pictures.
More informationEinführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
More informationLab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
More informationRNPP: Remote NotePad Protocol. Computer Networking Program. Protocol Specifications. October 2014. Prepared for
RC_RFC: 5 RNPP: Computer Networking Program Protocol Specifications October 2014 Prepared for Computer Networking, 2nd Year Grade of Computer Science Engineering University of Seville by Lecturers of the
More informationUsing DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
More informationLinkScope CTI Analysis and Monitoring Solution. Two Products in one Complete Solution. White Paper
LinkScope CTI Analysis and Monitoring Solution Two Products in one Complete Solution White Paper C o p y r i g h t 2 0 0 7. P r i m a s. A l l r i g h t s r e s e r v e d. w w w. p r i m a s. n e t s a
More informationeztcp Technical Document Modbus/TCP of eztcp Caution: Specifications of this document may be changed without prior notice for improvement.
eztcp Technical Document Modbus/TCP of eztcp Version 1.3 Caution: Specifications of this document may be changed without prior notice for improvement. Sollae Systems Co., Ltd. http://www.sollae.co.kr Contents
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationEKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
More informationPositional Numbering System
APPENDIX B Positional Numbering System A positional numbering system uses a set of symbols. The value that each symbol represents, however, depends on its face value and its place value, the value associated
More informationConfiguring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
More informationLabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
More informationAvid Technology, Inc. inews NRCS. inews FTP Server Protocol Specification. Version 2.8 12 January 2006
Avid Technology, Inc. inews NRCS inews FTP Server Protocol Specification Version 2.8 12 January 2006 NOTICE: Avid Technology, Inc. accepts no responsibility for the accuracy of the information contained
More informationNETWORK ADMINISTRATION
NETWORK ADMINISTRATION INTRODUCTION The PressureMAP software provides users who have access to an Ethernet network supporting TCP/IP with the ability to remotely log into the MAP System via a network connection,
More informationTechnical Support Bulletin Nr.18 Modbus Tips
Technical Support Bulletin Nr.18 Modbus Tips Contents! Definitions! Implemented commands! Examples of commands or frames! Calculating the logical area! Reading a signed variable! Example of commands supported
More informationIntel Hexadecimal Object File Format Specification Revision A, 1/6/88
Intel Hexadecimal Object File Format Specification Revision A, 1/6/88 DISCLAIMER Intel makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties
More informationA White Paper about. MiniSEED for LISS and data compression using Steim1 and Steim2
Contents Norwegian National Seismic Network Technical Report No. 20 A White Paper about MiniSEED for LISS and data compression using Steim1 and Steim2 version 01.00 Prepared by Mauro Mariotti SARA snc
More informationEnhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
More informationDeploying HIDS Client to Windows Hosts
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationDate 07/05/2014 10:20:22. CENTREL Solutions. Author. Version 1.02. Product XIA Configuration Server [6.0.0.25996]
Date 07/05/2014 10:20:22 Author CENTREL Solutions Version 1.02 Product XIA Configuration Server [6.0.0.25996] Page 3 of 28 Description Item Name Microsoft Windows Server 2012 R2 Datacenter DEMO-DHCP-12R2
More informationBase Conversion written by Cathy Saxton
Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,
More informationBachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)
Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
More informationConfiguring DHCP and DNS Services
12 CHAPTER A DHCP server provides network configuration parameters, such as IP addresses, to DHCP clients. The FWSM can provide DHCP server or DHCP relay services to DHCP clients attached to FWSM interfaces.
More informationMike Canney. Application Performance Analysis
Mike Canney Application Performance Analysis 1 Welcome to Sharkfest 12 contact Mike Canney, Principal Network Analyst, Tektivity, Inc. canney@getpackets.com 319-365-3336 www.getpackets.com 2 Agenda agenda
More informationKMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon
KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise includes two api s for integrating user accounts with an external directory of employee or other
More informationMODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b CONTENTS
MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b CONTENTS 1 Introduction... 2 1.1 Scope of this document... 2 2 Abbreviations... 2 3 Context... 3 4 General description... 3 4.1 Protocol description... 3
More informationLab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
More informationThe Hexadecimal Number System and Memory Addressing
APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to
More informationApplication Detection
The following topics describe Firepower System application detection : Overview:, page 1 Custom Application Detectors, page 7 Viewing or Downloading Detector Details, page 15 Sorting the Detector List,
More informationFigure 1. Wireshark Menu Bar
Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain
More informationChapter Binary, Octal, Decimal, and Hexadecimal Calculations
Chapter 5 Binary, Octal, Decimal, and Hexadecimal Calculations This calculator is capable of performing the following operations involving different number systems. Number system conversion Arithmetic
More informationData Storage: Each time you create a variable in memory, a certain amount of memory is allocated for that variable based on its data type (or class).
Data Storage: Computers are made of many small parts, including transistors, capacitors, resistors, magnetic materials, etc. Somehow they have to store information in these materials both temporarily (RAM,
More informationEnergy Management System CANBUS Interface Specification
Energy Management System CANBUS Interface Specification Overview The EMS Broadcaster program will export a set of data via a Canbus hardware link. The data set is open and described here to facilitate
More informationLogging. Working with the POCO logging framework.
Logging Working with the POCO logging framework. Overview > Messages, Loggers and Channels > Formatting > Performance Considerations Logging Architecture Message Logger Channel Log File Logging Architecture
More informationISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
More informationVirtual Integrated Design Getting started with RS232 Hex Com Tool v6.0
Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0 Copyright, 1999-2007 Virtual Integrated Design, All rights reserved. 1 Contents: 1. The Main Window. 2. The Port Setup Window. 3.
More informationEE122 Project 2B: P2P tiny World of Warcraft. Instructor: Prof. Ion Stoica (istoica@eecs.berkeley.edu)
EE122 Project 2B: P2P tiny World of Warcraft Instructor: Prof. Ion Stoica (istoica@eecs.berkeley.edu) TAs: Junda Liu (liujd@eecs.berkeley.edu) DK Moon (dkmoon@eecs.berkeley.edu) David Zats(dzats@eecs.berkeley.edu)
More informationSURF HMP getting started guide
[Pick the date] SURF Motion Media Platform User Guide SURF HMP getting started guide Document version: 1.3 Date: May 2015 www.surf-com.com a Copyright 2005-2015, SURF Communication Solutions Ltd. This
More informationTCP/IP Networking, Part 2: Web-Based Control
TCP/IP Networking, Part 2: Web-Based Control Microchip TCP/IP Stack HTTP2 Module 2007 Microchip Technology Incorporated. All Rights Reserved. Building Embedded Web Applications Slide 1 Welcome to the next
More informationJapannext PTS ITCH Market Data Specification. Version 1.4 Updated 3 October 2014
Japannext PTS ITCH Market Data Specification Version 1.4 Updated 3 October 2014 Table of Contents 1. Introduction... 3 2. Overview... 3 3. Data Types... 3 4. Outbound Sequenced Messages... 3 4.1 Seconds...
More informationFuzzing in Microsoft and FuzzGuru framework
Fuzzing in Microsoft and FuzzGuru framework OWASP-IL May-2007 John Neystadt jney@microsoft.com Lead Program Manager Forefront Edge, Microsoft Agenda Overview Introduction to Fuzzing FuzzGuru Architecture
More informationInstallation and Operation Manual Ascom Report Manager
Installation and Operation Manual Ascom Report Manager 1 Introduction... 4 1.1 Abbreviations and Glossary... 4 2 Technical Solution... 5 2.1 Message Logging Overview... 5 2.2 Call Logging Overview... 6
More informationCONFIGURING TCP/IP ADDRESSING AND SECURITY
1 Chapter 11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 2 OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security
More informationMicroLogix 1400 Embedded Web Server
MicroLogix 1400 Embedded Web Server Bulletin 1766 Controllers User Manual Important User Information Solid state equipment has operational characteristics differing from those of electromechanical equipment.
More informationDigital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 04 Digital Logic II May, I before starting the today s lecture
More informationIP Filter/Firewall Setup
IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from
More informationSolution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
More information990-4584. APC by Schneider Electric www.apc.com Release Notes AP9537 Network Management Card. APC part number: 990-4584. Released: 26 October 2012
APC by Schneider Electric www.apc.com Release Notes AP9537 Network Management Card 990-4584 APC part number: 990-4584 Released: 26 October 2012 Affected Revision Levels: apc_hw05_aos_519.bin apc_hw05_x84p_510.bin
More informationEINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationConfiguring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
More informationLecture 2. Binary and Hexadecimal Numbers
Lecture 2 Binary and Hexadecimal Numbers Purpose: Review binary and hexadecimal number representations Convert directly from one base to another base Review addition and subtraction in binary representations
More informationTroubleshooting for Yamaha router
Troubleshooting for Yamaha router How to troubleshoot This document describes how to troubleshoot for Yamaha router. - Some points which should be considered before the trouble - What you should do when
More informationCNT5106C Project Description
Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationHexadecimal Object File Format Specification
Hexadecimal Object File Format Specification Revision A January 6, 1988 This specification is provided "as is" with no warranties whatsoever, including any warranty of merchantability, noninfringement,
More information13. Publishing Component Information to Embedded Software
February 2011 NII52018-10.1.0 13. Publishing Component Information to Embedded Software NII52018-10.1.0 This document describes how to publish SOPC Builder component information for embedded software tools.
More informationUsing RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
More information1. Whatdo you use? 2. Speed Tests?
Session Title: Network Traffic Analysis -- It's not just for fun anymore. Session Type: 50 Min. Breakout Session Presentation Day: Tuesday, February 11 Network Traffic Analysis It s not just for fun anymore.
More informationCyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
More informationSimple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
More informationOutbound Option Installation: SIP Dialer
This chapter, intended for system administrators who perform the first installation of Outbound Option, describes what you need to set up and install the Outbound Option platform. This chapter groups installation
More informationEXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC
EXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
More informationWSNetServer User Manual. Date: July 13 2003
Date: July 13 2003 1 Revision History... 2 2 Introduction... 2 3 Installation... 2 4 Normal Operation... 2 4.1 Startup... 2 4.2 About Box... 3 4.3 Specifying The Cross Point XY Broadcast Port... 3 4.4
More informationNetwork Trace Analysis
Network Trace Analysis Version 1.0 Facebook LinkedIn Twitter Dmitry Vostokov Software Diagnostics Services Wireshark Hark Listen (to) Hark! There s the big bombardment. Speak in one s ear; whisper Shorter
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationEnvoy MQ Connector Administrator's Guide
Envoy Message Queuing version 1.3 Envoy MQ Connector Administrator's Guide For use with Microsoft Message Queue services (MSMQ) software Envoy Message Queuing version 1.3 Envoy MQ Connector Administrator's
More informationIntroduction to Wireshark Network Analysis
Introduction to Wireshark Network Analysis Page 2 of 24 Table of Contents INTRODUCTION 4 Overview 4 CAPTURING LIVE DATA 5 Preface 6 Capture Interfaces 6 Capture Options 6 Performing the Capture 8 ANALYZING
More informationPacket Monitor in SonicOS 5.8
Packet Monitor in SonicOS 5.8 Document Contents This document contains the following sections: Packet Monitor Overview on page 1 Configuring Packet Monitor on page 5 Using Packet Monitor and Packet Mirror
More informationAdvanced Install & Configuration Guide
Advanced Install & Configuration Guide This document details advanced installation and configuration options for Layer8 software agents. Delivered as standard MSI packages, Layer8 deployment can be made
More informationMonitoring System Status
CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,
More informationReporting Guide for Novell Sentinel
www.novell.com/documentation Reporting Guide for Novell Sentinel Identity Manager 4.0.2 November 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
More informationCYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
More informationUsing TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
More information