AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS
|
|
- Maximilian Holmes
- 8 years ago
- Views:
Transcription
1 AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS
2 Family Feud: AS2 Versus the Clan Selecting the Right Option for Your B2B Needs May 19, 2011 Slide GXS, Inc.
3 Agenda AS2 vs Review of basics How do they work? How to choose the best one? John Radko GXS Solutions for Connectivity Options available Additional services Rochelle Cohen Q&A May 19, 2011 Slide GXS, Inc.
4 What Is a Protocol? Client?? Channel? To illustrate the basics of a communication protocol, let s buy some furniture May 19, 2011 Slide GXS, Inc.
5 IKEA Protocol for Furniture Transfer Client May 19, 2011 Slide GXS, Inc.
6 IKEA Protocol for Furniture Transfer Client May 19, 2011 Slide GXS, Inc.
7 IKEA Protocol for Furniture Transfer Channel Client May 19, 2011 Slide GXS, Inc.
8 IKEA Protocol for Furniture Transfer Channel Synchronous Request/Response (you go to the store, find it, put it on a cart, buy it, and drive it home.) Client May 19, 2011 Slide GXS, Inc.
9 N.C. Furniture Protocol Client May 19, 2011 Slide GXS, Inc.
10 N.C. Furniture Protocol Client May 19, 2011 Slide GXS, Inc.
11 N.C. Furniture Protocol Channel Request Client May 19, 2011 Slide GXS, Inc.
12 N.C. Furniture Protocol Channel Request Response Client May 19, 2011 Slide GXS, Inc.
13 Understanding a Comms Protocol Clients are requesting data (in the B2B scenario) or services s are providing the data or services The Channel is how the request and data move (may be combined or discrete) Client/ is a role a given system may be both depending on the situation (AS2) May 19, 2011 Slide GXS, Inc.
14 Looking at the Protocol Families May 19, 2011 Slide GXS, Inc.
15 A Shared Family Tree Internet Protocol (IP) May 19, 2011 Slide GXS, Inc.
16 A Shared Family Tree Transport Control Protocol (TCP) (UDP) Internet Protocol (IP) May 19, 2011 Slide GXS, Inc.
17 A Shared Family Tree TCP/IP Transport Control Protocol (TCP) Internet Protocol (IP) (UDP) May 19, 2011 Slide GXS, Inc.
18 A Shared Family Tree File Transfer Protocol () Hyper-text Transfer Protocol (HTTP) TCP/IP Transport Control Protocol (TCP) Internet Protocol (IP) (UDP) May 19, 2011 Slide GXS, Inc.
19 A Shared Family Tree Secure or - SSL (S) File Transfer Protocol () HTTP over SSL (HTTPS) Hyper-text Transfer Protocol (HTTP) TCP/IP Transport Control Protocol (TCP) Internet Protocol (IP) (UDP) May 19, 2011 Slide GXS, Inc.
20 A Shared Family Tree Applicability Statement 3 (AS3) Secure or - SSL (S) File Transfer Protocol () Applicability Statement 2 (AS2) HTTP over SSL (HTTPS) Hyper-text Transfer Protocol (HTTP) TCP/IP Transport Control Protocol (TCP) Internet Protocol (IP) (UDP) May 19, 2011 Slide GXS, Inc.
21 A Shared Family Tree Applicability Statement 3 (AS3) Secure or - SSL (S) File Transfer Protocol () Applicability Statement 2 (AS2) HTTP over SSL (HTTPS) Hyper-text Transfer Protocol (HTTP) TCP/IP Transport Control Protocol (TCP) Internet Protocol (IP) (UDP) May 19, 2011 Slide GXS, Inc.
22 A Shared Family Tree Applicability Statement 3 (AS3) Secure or - SSL (S) File Transfer Protocol () Applicability Statement 2 (AS2) HTTP over SSL (HTTPS) Hyper-text Transfer Protocol (HTTP) TCP/IP Transport Control Protocol (TCP) Internet Protocol (IP) (UDP) May 19, 2011 Slide GXS, Inc.
23 A Shared Family Tree Applicability Statement 3 (AS3) Secure or - SSL (S)* File Transfer Protocol () Applicability Statement 2 (AS2) HTTP over SSL (HTTPS) Hyper-text Transfer Protocol (HTTP) TCP/IP Transport Control Protocol (TCP) Internet Protocol (IP) (UDP) May 19, 2011 Slide GXS, Inc.
24 The Extended Family EDIINT AS3 AS2 AS4 AS1 SOAP S HTTPS S HTTP SMTP SSH The Internet Transport Control Protocol (TCP) Internet Protocol (IP) May 19, 2011 Slide GXS, Inc.
25 How Works (Active Mode) Random port above 1023 Port 21 Client Command Channel May 19, 2011 Slide GXS, Inc.
26 How Works (Active Mode) Random port above 1023 Port 21 Client Command Channel Data Channel Random port +1 (1024) Port 20 May 19, 2011 Slide GXS, Inc.
27 How Works (Active Mode) Challenge Random port above 1023 Port 21 Client Command Channel Data Channel Firewall that HATES inbound connections Port 20 May 19, 2011 Slide GXS, Inc.
28 How Works (Passive Mode) Random port above 1023 Port 21 Client Command Channel May 19, 2011 Slide GXS, Inc.
29 How Works (Passive Mode) Random port above 1023 Port 21 Client Command Channel opens a port in the firewall for the client to use for data (>1023) May 19, 2011 Slide GXS, Inc.
30 How Works (Passive Mode) Random port above 1023 Port 21 Client Command Channel Data Channel Random port +1 (1024) opens a port in the firewall for the client to use for data (>1023) May 19, 2011 Slide GXS, Inc.
31 How Works (Passive Mode) Challenge Random port above 1023 Port 21 Client Command Channel Data Channel Random port +1 (1024) Network Admin that HATES inbound connections May 19, 2011 Slide GXS, Inc.
32 Securing VPN Creates a secure tunnel Can be used with any protocol, not just Some standards (especially server-to-server), but may require client install S 2 types Explicit Implicit Uses TLS/SSL to encrypt one or both channels May 19, 2011 Slide GXS, Inc.
33 Virtual Private Network (VPN) Client VPN Software VPN VPN Software May 19, 2011 Slide GXS, Inc.
34 Virtual Private Network (VPN) Client VPN Software Command Channel VPN VPN Software May 19, 2011 Slide GXS, Inc.
35 Virtual Private Network (VPN) Client VPN Software Command Channel VPN Data Channel VPN Software May 19, 2011 Slide GXS, Inc.
36 Explicit S Client Command Channel Data Channel May 19, 2011 Slide GXS, Inc.
37 Explicit S AUTH SSL Client Command Channel Data Channel May 19, 2011 Slide GXS, Inc.
38 Explicit S AUTH SSL Client Command Channel Data Channel May 19, 2011 Slide GXS, Inc.
39 Explicit S AUTH SSL Client Command Channel Data Channel Explicit S is usually used so that non S clients can still connect. May 19, 2011 Slide GXS, Inc.
40 Explicit S AUTH SSL Client Command Channel Data Channel Explicit S is usually used so that non S clients can still connect. May 19, 2011 Slide GXS, Inc.
41 Implicit S Client Command Channel May 19, 2011 Slide GXS, Inc.
42 Implicit S Client Command Channel Data Channel May 19, 2011 Slide GXS, Inc.
43 Implicit S Client Command Channel Data Channel Implicit S always uses secured channels, but the software must support it to connect. May 19, 2011 Slide GXS, Inc.
44 AS2 Provides Value-Added Capabilities Security Data is encrypted and signed Data is secured at all points Digital signatures allow non-repudiation Message Management Usage of receipts (called MDNs) Defined service levels Interoperability Extensive interoperability testing Certification by Drummond assures products work together May 19, 2011 Slide GXS, Inc.
45 How Does AS2 Work? Partner A Sender Receiver Partner B Public Internet or Other TCP/IP Network May 19, 2011 Slide GXS, Inc.
46 How Does AS2 Work? Partner A Sender Sign Receiver Partner B Public Internet or Other TCP/IP Network May 19, 2011 Slide GXS, Inc.
47 How Does AS2 Work? Partner A Sender Sign Encrypt Receiver Partner B Public Internet or Other TCP/IP Network May 19, 2011 Slide GXS, Inc.
48 How Does AS2 Work? Partner A Sender Sign Encrypt Send Receiver Receive Partner B Public Internet or Other TCP/IP Network HTTP May 19, 2011 Slide GXS, Inc.
49 How Does AS2 Work? Partner A Sender Sign Encrypt Send Receiver Receive Decrypt Partner B Public Internet or Other TCP/IP Network HTTP May 19, 2011 Slide GXS, Inc.
50 How Does AS2 Work? Partner A Sender Sign Encrypt Send Receiver Receive Decrypt Verify Signature Partner B PARTNER A Public Internet or Other TCP/IP Network HTTP May 19, 2011 Slide GXS, Inc.
51 How Does AS2 Work? Partner A Sender Sign Encrypt Send Receiver Receive Decrypt Verify Signature Send MDN Partner B MDN PARTNER A Public Internet or Other TCP/IP Network HTTP May 19, 2011 Slide GXS, Inc.
52 How Does AS2 Work? Partner A Sender Sign Encrypt Send Verify MDN Receiver Receive Decrypt Verify Signature Send MDN Partner B MDN PARTNER A Public Internet or Other TCP/IP Network HTTP May 19, 2011 Slide GXS, Inc.
53 A Quick Comparison Plus AS2 Ready for Business Purposely built for B2B Interoperable security Interoperable non-repudiation Built-in business grade transaction management Proxy/firewall friendly Interoperability testing process Widely adopted in many communities (opt) Re-start I m Already Here Ubiquitous, on basically every computer Widely used in almost every community Vast amounts of experience Nearly instant setup Low administrative overhead* S Privacy Included Channel encryption Low administrative overhead Relatively simple May 19, 2011 Slide GXS, Inc.
54 A Quick Comparison Minus AS2 Specialist Requires special software Certificate administration Higher processing overhead (for encryption and digital signature) More keys/ids to manage Master of None What security? No standard guaranteed delivery No interoperability testing No standardised document tracking Requires two network connections Can be difficult (or impossible) to traverse some networks (NAT) S All the minuses of Not as ubiquitous as May 19, 2011 Slide GXS, Inc.
55 And the Winner Is Applicability Statement 2 (AS2) May 19, 2011 Slide GXS, Inc.
56 A Hybrid Community to Mediate Protocols Partners using same protocol Partners that use a different protocol or AS2 Gateway May 19, 2011 Slide GXS, Inc.
57 GXS Communications Portfolio May 19, 2011 Slide GXS, Inc.
58 Your B2B Communications Decisions Sending Company Receiving Company EDI Translator EDI Translator EDI Data Service Provider EDI Data Communications Software Which protocol? How to connect? Communications Software May 19, 2011 Slide GXS, Inc.
59 AS2 and /VPN Most Popular Protocols for New GXS Clients Protocols Selected by New GXS Clients % 40% 35% 30% 25% 20% 15% 10% 5% 0% AS2 /VPN S S Other May 19, 2011 Slide GXS, Inc.
60 Global, Flexible Connectivity Options Enabling Businesses to Make Technology Decisions Independent of Their Partners VAN Interconnect Private IP Networks (e.g., ANX, ENX) Frame Relay Web Forms EDI-to-Fax Legacy Protocols Async / Bisync & SNA Other Services Internet Protocols /VPN, S/ and /S X.25 SOAP & HTTPS X400 AS1, AS2, AS3 MQ Series O, O2 May 19, 2011 Slide GXS, Inc.
61 Full Portfolio of AS2 Options on GXS Trading Grid AS2 Internet Trading Partners Your Company AS2 Direct Trading Partners Additional AS2 Services: AS2 Contingency Back-up access if your AS2 server goes down AS2 Outsourcing Comply with AS2 mandates without adding infrastructure, expense, & expertise Real-time, efficient communications with your entire community One implementation with GXS, GXS manages community All the value-added transaction management services Leverages AS2 software already in place Reduce risk of failed connectivity May 19, 2011 Slide GXS, Inc.
62 Full Portfolio of Secure Solutions Your Company Secure Internet Trading Partners Multiple options: over VPN S (SSH ) S (/SSL) Easy to implement Standards based Wide range of client software support Multiple security options May 19, 2011 Slide GXS, Inc.
63 GXS BizManager Software Behind-the-Firewall Connectivity Software for Every Type of User BizManager BizLink unlimited connections Windows, Red Hat and SUSE Linux, Solaris, AIX, HP-UX Functionality BizManager400 unlimited connections AS400 BizManager BizConnect Up to 25 connections Community Size Windows, Red Hat and SUSE Linux May 19, 2011 Slide GXS, Inc.
64 GXS Internet Connectivity Solutions for Each Business Scenario B2B Program Outsourcing Connectivity to GXS Trading Grid Software May 19, 2011 Slide GXS, Inc.
65 And More GXS is the Largest Integration Cloud for B2B May 19, 2011 Slide GXS, Inc.
66 Thank You for Your Participation! For More Information May 19, 2011 Slide GXS, Inc.
AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS
AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS Family Feud: AS2 Versus the Clan Selecting the Right Option for Your
More informationRoyal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
More informationGXS Trading Grid Messaging Service. Connectivity Overview. A GXS Transact SM Messaging Service for the Active Business
GXS Trading Grid Messaging Service A GXS Transact SM Messaging Service for the Active Business Table of Contents Introduction... 3 Trading Grid Messaging Service Connectivity Options Matrix... 4 AS2...
More informationGS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationEffective Data Inc. White Paper: EDIINT EDI Over the Internet
Effective Data Inc. White Paper: EDIINT EDI Over the Internet 1515 E. Woodfield Road Suite 770 Schaumburg, IL 60173 Ph (847) 969-9300 Fx (847) 969-9350 www.effective-data.com TABLE OF CONTENTS Executive
More informationGXS BizManager. Translate. Exchange. Communicate. Enhanced Connectivity, Visibility and Control. www.gxs.co.uk
www.gxs.co.uk GXS BizManager The Power of a Comprehensive B2B Gateway The ability to quickly, easily and securely exchange information with your trading partners is vital to your success. Purchase orders,
More informationMilsVPN VPN Tunnel Port Translation. Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2
Page 1 of 8 Table of Contents Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2 2.1 VPN Settings...2 2.2 MilsVPN Service Properties...3 3. Service Object Creation...3 4. Firewall rules
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationVirtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationGXS BizManager. Translate. Exchange. Communicate. Enhanced Connectivity, Visibility and Control. www.gxs.com. The Power of a Comprehensive B2B Gateway
www.gxs.com GXS BizManager The Power of a Comprehensive B2B Gateway The ability to quickly, easily and securely exchange information with your trading partners is vital to your success. Purchase orders,
More informationII. Implementation and Service Information
II. Implementation and Service Information A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications
More informationManaged VPSv3 Firewall Supplement
Managed VPSv3 Firewall Supplement Copyright 2006 VERIO Europe page 1 1 INTRODUCTION 3 1.1 Overview of the Documentation Library 3 1.2 Overview of this Document 3 2 TWO OPTIONS FOR BUILDING A FIREWALL 4
More informationMichal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1
Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1 Communication between User and Server: In the form of packets. Traverse several Routers. Can be intercepted by a BadBoy. Michal Ludvig, SUSE Labs,
More informationShipping Services Files (SSF) Secure File Transmission Account Setup
Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:
More informationGS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide
GS1 Newcomers to AS2 Implementation Guide Issue 1, 23-June-2008 23-June-2008, Issue 1 All contents copyright GS1 2008 Page 1 of 14 Document Summary Document Item Document Title Date Last Modified Current
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationOS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Agenda OS/390 Firewall OS/390 Firewall Features Hardware requirements Software
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationDMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
More information642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More information,V :HE %DVHG (', IRU <RX" 7LPRWK\ 6]DO ', &RQVXOWLQJ 2SSRUWXQLW\ 0DQDJHU 6U &RQVXOWDQW 1HWZRUN 6HUYLFHV +DQJ 7HQ ZLWK ', $ 'HFDGH RI,QQRYDWLRQ DI1789
DI1789 History of Traditional EDI Internet Background Issues Driving Traditional EDI to the Internet Web Evolution Web Enabled EDI Architectures DI1790/1 EDI is not dead & will not be replaced by the
More informationDeploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2 Organizations can use the Barracuda Load Balancer to enhance the scalability and availability of their Microsoft Office Communications
More informationManaged File Transfer
Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability
More informationFirewall Access Request Form
SECTION 1 TO BE COMPLETED BY THE APPLICANT By completing the below information the requestor/applicant acknowledges and agrees that he/she has read, understood and will comply with the following: CHECK
More informationNETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationHow To Configure Apple ipad for Cyberoam L2TP
How To Configure Apple ipad for Cyberoam L2TP VPN Connection Applicable to Version: 10.00 (All builds) Layer 2 Tunneling Protocol (L2TP) can be used to create VPN tunnel over public networks such as the
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationSECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More information120: All You Need to Know About Implementing EDI Eduardo Valdes, Vilore Foods, Co., Inc. Bekki Windsperger, Best Buy Co., Inc.
120: All You Need to Know About Implementing EDI Eduardo Valdes, Vilore Foods, Co., Inc. Bekki Windsperger, Best Buy Co., Inc. Agenda Introductions All About Electronic Data Interchange (EDI) Why Do EDI
More informationAS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010
AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 18-Nov-2010, Issue 1 All contents copyright GS1 Page 1 of 19 Document Summary Document Item Document Title Date Last Modified Current
More informationEDIINT AS1 and AS2 Transport
EDIINT AS1 and AS2 Transport Communication Guidelines Issue 1, Feb-2006 Feb-2006, Issue 1 All contents copyright GS1 2006 Page 1 of 24 Document Summary Document Item Document Title Date Last Modified Current
More informationSetting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer
Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer Mathias Johanson Alkit Communications AB Introduction The Alkit Reflex reflector/mixer system can be set-up to interconnect
More informationWhy SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. aidan.gogarty@hob.de What are we all trying to achieve? Fully transparent network access
More informationLifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
More informationINTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
More information000-609. IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>
000-609 IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP Version: Demo Page 1. Which of the following is an advantage of using WS-Security instead of SSL? A. Provides assured message
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationTELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationNetwork Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
More informationThe LRS File Transfer Service offers a way to send and receive files in a secured environment
File Transfer Service The LRS File Transfer Service offers a way to send and receive files in a secured environment using HTTPS or FTPS. It also supports unsecured standard FTP transfers. The service supports
More informationConfiguring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
More informationSECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Firewall 1 Basic firewall concept Roadmap Filtering firewall Proxy firewall Network Address Translation
More informationProtected Trust Setup Guide for Brother MFC Devices
Protected Trust Setup Guide for Brother MFC Devices Summary Protected Trust Email Encryption is a versatile secure email service. This guide details three use cases between Protected Trust and your Brother
More informationIndustrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
More informationCreationDirect. Clearstream file transfer connectivity solutions
CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking
More informationFile System Design and Implementation
WAN Transfer Acceleration Product Description Functionality Interfaces Specifications Index 1 Functionality... 3 2 Integration... 3 3 Interfaces... 4 3.1 Physical Interfaces...5 3.1.1 Ethernet Network...5
More informationInstalling and Configuring Websense Content Gateway
Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar
More informationHow To Configure Virtual Host with Load Balancing and Health Checking
How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article
More informationOverview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...
Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationTel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
More informationPolicy on ARCS eresearch Services Firewall Configuration Requests
Policy on ARCS eresearch Services Firewall Configuration Requests (Endorsed by CAUDIT Executive 29 July 2009) Introduction ARCS and CAUDIT have together sought to arrive at an agreed set of firewall configurations
More informationHigh Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
More informationDeploying ACLs to Manage Network Security
PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system
More informationOverview of GXS Products
www.gxs.com Overview of GXS Products GXS offers a comprehensive suite of B2B e-commerce products to meet the needs of companies ranging from large, multi-national enterprises to small, entrepreneurial
More informationExecutive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
More informationMonitoring Hybrid Cloud Applications in VMware vcloud Air
Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER
More informationIn-Network Translation User s Guide
GXS EDI Services In-Network Translation User s Guide GC34-3282-02 Third Edition (November 2005) This book replaces GC34-3282-01. Copyright GXS, Inc. 1998, 2005. All rights reserved. Government Users Restricted
More informationz/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
More informationSynology QuickConnect
Synology QuickConnect Based on DSM 5.2 Synology Inc. Table of Contents Chapter 1: Introduction What is QuickConnect?... 3 Chapter 2: How QuickConnect Works Overview... 4 QuickConnect Connectivity Test...
More informationLinux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
More informationMy FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
More informationGlobal Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
More informationSIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationOpenScape Business V2
OpenScape Business V2 Tutorial System Device@Home Configuration Version 1.1 Table of Contents 1. Configuration Overview 4 1.1. Network Scenario Description: 4 1.2. Configuration Steps 5 1.2.1. Overview
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationSecurity Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
More informationAPNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0
APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
More informationFirewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationForward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
More informationScan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component
More informationNetwork Security CS 192
Network Security CS 192 Firewall Rules Department of Computer Science George Washington University Jonathan Stanton 1 Client Web Auth paper Today s topics Firewall Rules Jonathan Stanton 2 Required: Additional
More informationemerge 50P emerge 5000P
emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is
More informationFIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
More informationLinkProof And VPN Load Balancing
LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg
More informationSSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
More informationSkype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
More informationEARLY EXPERIENCE WITH CLOUD COMPUTING AT ISO NEW ENGLAND
ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 EARLY EXPERIENCE WITH CLOUD COMPUTING AT ISO NEW ENGLAND NOVEMBER 12, 2014 XIAOCHUAN LUO TECHNICAL MANAGER, ISO NEW ENGLAND INC. UNIVERSITY OF ILLINOIS DARTMOUTH
More informationEDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications
ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationSSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationSpam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
More informationSecurity Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationMicrosoft Lync Server Overview
Organizations can use the to enhance the scalability and availability of their Microsoft Lync Server 2010 deployments (formerly known as Microsoft Office Communications Server). Barracuda Networks has
More information