Net Solutions WEB-EDI
|
|
- Gloria Boone
- 8 years ago
- Views:
Transcription
1 Net Solutions WEB-EDI Solution Documentation NET SOLUTIONS PAGE 1 OF 10
2 Table of Contents 1 INTRODUCTION 3 2 BUSINESS CONTEXT GENERAL EDI IMPLEMENTATION DIFFICULTIES NET SOLUTIONS WEB-EDI 5 3 TECHNICAL ARCHITECTURE EDI ENGINE 7 Data Parser 7 EDI Translator 7 Message Store ADMINISTRATION ENGINE 7 Alarm Manager 7 Online Reporting Service 8 Status Feedback Monitor EDI S 8 Mail Connector 8 VAN Connector 8 FTP Connector 8 HTTP Connector 9 Online Web Connector 9 AS2 Connector 9 MailMax 400 Connector 9 4 SECURITY MAIL CONNECTION VAN CONNECTION FTP CONNECTION HTTP CONNECTION ONLINE ACCESS TO WEB-EDI AS2 CONNECTION 10 NET SOLUTIONS PAGE 2 OF 10
3 1 Introduction This document describes the functional and technical specifications of the Net Solutions WEB-EDI application and offering. In chapter 2 the business context of EDI will briefly be drawn as well as the role both scope and limitations of the WEB-EDI application and offering towards an EDI project. The third chapter goes into the technical architecture of the solution. All components of the WEB-EDI application will be handled. This chapter will also handle the connection and communication details applicable to exchange EDI information between business partners. In the fourth chapter, the standards integrated in the WEB-EDI solution to ensure secure data-transfer will be explained. The Service Agreement describes how the WEB-EDI solution can be implemented and what services Net Solutions can provide in this context. Also the responsibilities of the business partners subscribed to Net Solutions WEB-EDI will be clarified. NET SOLUTIONS PAGE 3 OF 10
4 2 Business context 2.1 General Electronic Data Interchange or EDI is a mechanism to electronically exchange business information between business partners. By automating this data transfer and automating the integration with the information systems of the business partners, the following advantages can be reached : Quicker exchange of information Limited data entry No paper exchange of information No data-entry errors In order to structure the way different business partners exchange information, business standards for EDI have been developed and are applied by most business partners. Some standards are industry-dependent (e.g. EDIFACT), other standards are industry specific (e.g. ODETTE for the automotive industry). EDI information is exchanged in the form of messages. A message is business information logically belonging together. Examples are forecasts (DELFOR), sales orders (ORDERS), deliveries (DESADV), or invoices (INVOIC). 2.2 EDI implementation difficulties Although standards are available, every business partner (read customer ) has implemented them in its own way leading to different dialects. In practice this means that a message once configured for the data exchange with a certain business partner, can t be easily taken over for the data exchange with another business partner. Another difficulty in the implementation of EDI is that not all standards are supported by the information system to or from which the information needs to be interfaced. Especially the traditional ERP systems have defined their own standards (e.g. IDOC for SAP) to exchange information with external systems. In order to make these messages EDIcompliant they need to be translated into EDI messages. This translation is message and partner (see former paragraph) dependent and requires understanding and experience in the applied EDI standards. Another typical bottleneck is the communication of the information between business partners. In order to avoid point-to-point communication between business partners, EDI information must be written and read from so called Value Added Networks or VANs.. Each of these VANs developed its own communication and security protocol and requires specific communication forms to be compliant. The usage of the VAN depends on the choice your business partner (read customer ) already made. NET SOLUTIONS PAGE 4 OF 10
5 2.3 Net Solutions WEB-EDI The Net Solutions WEB-EDI concept consists of an application and a number of services offered to business partners in an EDI exchange chain. The main objective is to take the complexity and worries of the setup and operational support of an EDI system out of the hands of the business partner. By having EDI outsourced using the WEB-EDI concept, the EDI chain is guaranteed from the information system of the business partner until the publication of the EDI message on the relevant VAN in the correct standard. The WEB-EDI application takes care of : Secure communication of the information system of the business partner to the Net Solutions WEB-EDI platform Translation of the received information in the correct business partner specific EDI standard Secure communication of the EDI message to the VAN Update of the status of the communication back to the source system The following services are offered by Net Solutions during the EDI implementation project : Setting up secure information transfer and assisting the business partner in applying these standards Setting up translation rules between customer standard and EDI standard based on the mapping specifications made by the customer Analysis and configuration of the SAP R/3 system to send and receive IDOC documents including the implementation of user-exits for customer enhancements (incoming and outgoing) to meet the EDI standards of the business partner Assistance in the setup of EDI with non-sap systems Configuring and connecting to the VAN based on the VAN account of the customer Testing the complete scenario from business partner to business partner for both incoming and outgoing EDI messages The following run-time services are offered : Helpdesk support Maintenance and interventions Configurable messaging (SMS and ) in case of problems Online tracing and follow-up Automatic status feedback (in case of R/3 : status IDOCs) More details can be found on the last chapter and in the service level agreement. NET SOLUTIONS PAGE 5 OF 10
6 3 Technical Architecture CORUS NET SOLUTIONS WEB-EDI BUSINESS PARTNER HTTP HTTP BUSINESS SYSTEM FTP DATA PARSER EDI TRANSLATOR DATA PARSER FTP BUSINESS SYSTEM STATUS FEEDBACK MONITOR ONLINE WEB EDI ADMINISTRATOR ONLINE REPORTING SERVICE MESSAGE STORE VAN MAILBOX ALARM MANAGER VAN NET SOLUTIONS PAGE 6 OF 10
7 3.1 EDI Engine Data Parser The Data Parser is a tool that can interprete incoming messages. Basically every format can be interpreted. IDOCs, XML and EDI formats are standard available. EDI Translator The EDI Translator is an engine responsible for translating a message from one format into another format. Basically every format can be translated to any format, but IDOCs, XML and EDI formats (EDIFACT, ANSI, ODETTE, ) are the standard ones supported. The EDI Translator works based on message and partner dependent translation rules to identify : In what format data needs to be translated to Where (segment, field location) the data needs to be translated to By which conversion routine the data needs to be translated (e.g. conversion tables, ISO codes, ) Message Store The Message Store is the relational database in which all information is stored and that stores all operations made by the EDI engine and is used as basis for the reporting service and alarm manager. Incoming messages (IDOCs, XML, EDI, ) Outgoing messages (IDOCs, XML, EDI, ) Translation rules (formats, locations, conversion routines, ) Status information Connection and communication information Master data 3.2 Administration Engine Alarm Manager The Alarm Manager takes care of the generation of alarms if certain problems occur. The type of errors for which alarms need to be triggered can be customized as well as the messages and/or partners for which alarms are required. The Alarm Manager supports two alarm communication methods : SMS The complete configuration of the Alarm Manager can be online performed and modified by the Client using a web interface. NET SOLUTIONS PAGE 7 OF 10
8 Online Reporting Service The Online Reporting Service consists of a secured website on which the Client can monitor all the EDI operations in an online manner : Status of incoming message Status of parsing and translation Status of outgoing message Status of status feedback Status of VAN communication The Reporting Service is mainly a GUI based on the Message Store. Status Feedback Monitor The Status Feedback Monitor can send back status information to the client s application that can update the status of the outgoing message. For SAP R/3 the standard Audit/Status confirmation IDOCs are used. Other status feedback message formats can be supported. This allows the client to view the status up and to the publishing of the EDI message of the VAN from within its own system. 3.3 EDI Connectors Mail Connector The Mail connector is able to send and receive EDI, IDOC, XML and other messages using . A dedicated customer box will be used to send messages from the client s application to the Net Solution WEB-EDI application. The messages will be sent/received via the internet. For point-to-point EDI communication (not via the VAN, but direct communication between business partners), the Mail connector can also send the message via this connector to a fixed mail address at the business partner side. VAN Connector The VAN connector is able to send and receive EDI message to and from the VAN. Since most VAN s require secure dial-in communication, most VAN connections will be made using the dial-in protocol prescribed by the VAN hosting service. The VAN connection schedule (inbound and outbound) can be online customized by the client using a web interface. This customization is partner dependent and message independent. FTP Connector The FTP connector is able to send and receive EDI, IDOC, XML and other messages. The FTP connector can be used to receive messages from the Client and could be used in a point-to-point communication with other business partners to send and/or receive messages. The FTP connector can also be used in certain communication with the VAN if the FTP protocol is supported. This depends on the agreement/subscription of the Client with the VAN. NET SOLUTIONS PAGE 8 OF 10
9 HTTP Connector The HTTP connector can be used to send and receive EDI, IDOC, XML and other messages. In this scenario the client s system is initiating the connection at regular intervals (pull mechanism) both for sending and receiving messages. HTTP is used as a transfer protocol between SAP systems and Net Solutions WEB-EDI using the standard SAP tool SAPHTTP. Online Web Connector Via the Online Web Connector it is possible to create new messages via the internet. This allows client s who cannot generate EDI messages in an automatic way, to type in their EDI messages making use of a web interface. This connector is especially useful for smaller companies. AS2 Connector AS2 works by providing an envelope for the data, allowing it to be sent over the Internet (or another TCP/IP-based network) using the HTTP protocol, which powers the World Wide Web. The receiving organization s server then listens out for messages addressed to it. Like a call to a phone with no answering machine, the message will be missed if your server is not available to take the call; so, many organizations decide to use a service provider such as GXS to provide AS2 connectivity. AS2 can handle any kind of document but is ideally suited to the kind of transactions that have traditionally made up the bulk of EDI exchanges. Just as with EDI, you can extract data from internal systems and use a translator to transform it into the appropriate standard before dispatching it. You can then process the data you send and receive in the same way. MailMax 400 Connector With MailmaX.400, you connect to any private or public X.400 service provider to exchange with X.400, Internet or fax recipients. With its friendly user interface, MailmaX.400 is the easiest way to cooperate rapidly and securely with your EDI and Electronic commerce partners. MailmaX.400 supports all network access facilities provided by its sister product, UA-FI. This means that with MailmaX.400, you can connect to your mailbox through TCP/IP over a LAN, with a PPP/SLIP connection over PSTN or ISDN, as well as with a dial-up or X25 network. NET SOLUTIONS PAGE 9 OF 10
10 4 Security In this chapter, the security issues will be handled for the different services and connectors offered by Net Solutions WEB-EDI. 4.1 Mail Connection Standard mail security. 4.2 VAN Connection Connecting to the VAN using dial-in is per definition a secure way of communication since a dedicated connection is used to transfer data between Net Solutions WEB-EDI and the VAN. 4.3 FTP Connection Standard FTP security. 4.4 HTTP Connection The HTTP Connection is secured as follows : No external access is allowed. All calls are triggered from the client s side (Pull/Push mechanism) All communications are encrypted using SSL (HTTPS!) Client certificates are possible if increased authentication is required Access to WEB-EDI server only from fixed IP address 4.5 Online access to WEB-EDI All online connections to WEB-EDI (reporting, online web connector, configuration, ) are password enabled. In this way client authentication on the WEB-EDI platform is ensured for both browser and server access. 4.6 AS2 connection The AS2 connection uses certificates of authentication and encryption algorithms and signatures. It is also possible to go through a firewall or a DMZ (De-Militarized Zone) NET SOLUTIONS PAGE 10 OF 10
EDI Data Exchange and Conversion Range of Functions & Services
cleardax EDI Data Exchange and Conversion Range of Functions & Services Introduction Main functions Data exchange (connection options) Conversion Mappings Addtional performances and functions cleardax
More informationIn-Network Translation User s Guide
GXS EDI Services In-Network Translation User s Guide GC34-3282-02 Third Edition (November 2005) This book replaces GC34-3282-01. Copyright GXS, Inc. 1998, 2005. All rights reserved. Government Users Restricted
More informationGS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationMagna IT EDI services. Supplier Implementation guideline for Electronic data interchange
Magna IT EDI services Supplier Implementation guideline for Electronic data interchange Version 1.0 05.11.2009 Version history version date comment author reviewed 1.0 05.11.2009 Initial release Stefan
More informationLower costs, greater flexibility. Electronic Data Interchange (EDI): Optimisation of business processes through data exchange
Lower costs, greater flexibility Electronic Data Interchange (EDI): Optimisation of business processes through data exchange Faster, more transparent, more cost-effective EDI What is EDI and what are the
More informationE-Supplier. Information for Siemens Vendors - Exchange of business transactions via EDI. https://webedi.siemens.de/web4bis
E-Supplier Information for Siemens Vendors - Exchange of business transactions via EDI https://webedi.siemens.de/web4bis Contents Overview of EDI... 3 Supported Message Types and Processes... 4 Benefits
More informationELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications
ELECTRONIC DATA INTERCHANGE WITH FORD for Production s EDI BROCHURE created by GSEC-EU, Global Electronic Communications Page 1 of 22 Brochure map EDI Brochure Overview Who is GSEC? What is EDI? Advantages
More informationRanch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
More informationB2BE Transaction Delivery Network
Your Business System B2BE Client or Connection Server The Internet B2BE Server(s) Vadilation Translation The Internet B2BE Client or Connection Server Your Trading Partner s Business Enrichment System
More informationEDI 101 An Introduction to EDI. NewEDI 1
EDI 101 An Introduction to EDI NewEDI 1 Table of Contents Introduction...3 What is EDI?...4 How EDI Works...7 Why Use EDI...9 What EDI Solutions are Available?...11 Need More Help?...13 Glossary of EDI
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationCloudbuz at Glance. How to take control of your File Transfers!
How to take control of your File Transfers! A MFT solution for ALL organisations! Cloudbuz is a MFT (Managed File Transfer) platform for organisations and businesses installed On-Premise or distributed
More informationDMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
More informationProcess. CS.Line. B2B communications services. 100% EDI integration of your business partners.
CS.Line B2B communications services. 100% EDI integration of your business partners. Process. Your business processes are becoming increasingly complex, and you want greater flexibility in your IT infrastructure
More informationTECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST
TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 WHAT IS OFTP?... 3 1.2 HOW DOES IT WORK?... 3
More informationEPIC. Enterprise Process Integration Controller. Creating 100% Reliable Business Systems. ebusiness Solutions
EPIC Enterprise Process Integration Controller Creating 100% Reliable Business Systems ebusiness Solutions D A T A I N T E R C H A N G E P L C EPIC Data Interchange s EPIC is an Enterprise Process Integration
More informationSITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective:
AG041410 SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective: Determine how to configure the RD500 and your PSTN or GSM modem APPLICATION
More informationWHITE PAPER How to assure a successful SAP/EDI implementation?
WHITE PAPER How to assure a successful SAP/EDI implementation? November 2009 www.viseo.net Through a new ERP implementation, many companies decide to improve their supply chain by automating their EDI
More informationODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2
ODEX Enterprise Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2 Copyright Data Interchange Plc Peterborough, England, 2013. All rights reserved. No part of this document may be disclosed
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS VERSION MANAGEMENT VERSION REVIEW DATE REVIEW COMMENTS 1.0 23/05/2014 First version. 2.0 14/04/2016 Adaptation to standard template. Page 1 of 15 INDEX VERSION MANAGEMENT...
More informationEDI FAQ Document ABOUT THIS DOCUMENT EDI. This document is a repository of frequently asked questions relating to: 1. EDI. 2. emessaging Standards
EDI FAQ Document ABOUT THIS DOCUMENT This document is a repository of frequently asked questions relating to: 1. EDI 2. emessaging Standards 3. Communications & Network Setups EDI 1. What is meant by EDI?
More informationApproved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
More informationSo far in the first three chapters of this book we have studied an overview of SAP
4 CHAPTER SAP ERP Integration Overview with Other Systems So far in the first three chapters of this book we have studied an overview of SAP business suite applications and the NetWeaver Application Server
More information1 IT Service Delivery
Contact EDI Support IT Service Delivery Oxford University Press Great Clarendon Street Oxford OX2 6DP, UK Tel: +44 (0)1865 353916 Tel: +44 (0)1865 353142 Fax: +44 (0)1865 354744 e-mail: electrad.uk@oup.com
More informationEDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications
ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is
More informationDevice Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
More informationIntellicyber s Enterprise Integration and Application Tools
Intellicyber s Enterprise Integration and Application Tools The IDX product suite provides Intellicyber s customers with cost effective, flexible and functional products that provide integration and visibility
More informationMachine control going www - Opportunities and risks when connecting a control system to the Internet
B&R Industrial Automation Corp. 1325 Northmeadow Parkway, S-130 Tel: (770) 772-0400 E-mail: office.us@br-automation.com Roswell, Georgia 30076 Fax: (770) 772-0243 Internet: www.br-automation.com Machine
More informationElectronic Invoicing Overview. April, 2010
Electronic Invoicing Overview April, 2010 Electronic Invoicing Topics Electronic Invoicing Overview Electronic Invoicing Benefits Supported File Formats Flat File Flat File Process Functionality Flat File
More informationCornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
More informationRoyal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
More informationThe Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
More informationGPX Business CLOUD. Electronic Data Interchange. www.inposia.com
GPX Business CLOUD Electronic Data Interchange EDI via GPX Business CLOUD This booklet shall give You an overview on the GPX Business CLOUD services What the difference makes Why EDI via GPX Business CLOUD
More informationFaxinating Solutions Inc. More Then Just a Fax Company. Your Solution for All Types of Electronic Document Exchange
Faxinating Solutions Inc. More Then Just a Fax Company Your Solution for All Types of Electronic Document Exchange 1/26/2006 Faxinating Solutions Inc. 1 Who Is Faxinating Solutions Inc.: Faxinating Solutions
More informationAloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
More informationService Overview & Installation Guide
Service Overview & Installation Guide Contents Contents... 2 1.0 Overview... 3 2.0 Simple Setup... 4 3.0 OWA Setup... 5 3.1 Receive Test... 5 3.2 Send Test... 6 4.0 Advanced Setup... 7 4.1 Receive Test
More informationWhite Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
More informationCommon Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
More informationA Quick Guide to Publish Thecus NAS on Internet. Contents
Contents 1. Overview...2 2. Setup Thecus NAS on Internet...2 2-1 Demo with DD-WRT...2 2-1-1 Setup DMZ for Thecus NAS...2 2-1-2 Setup Port Forwarding for Thecus NAS...3 2-2 Demo with Tomato...3 2-2-1 Setup
More informationElectronic Data Interchange
Fourth Shift Electronic Data Interchange Strategic tool to increase cost-efficiency and reduce errors. Table of contents. Executive summary... 3 EDI overview... 4 EDI components... 6 Fourth Shift EDI solution
More informationEDI Compliance Report
The EDI Deenvelope business processes (that is, X12Deenvelope, EDIFACTDeenvelope, CIIDeenvelope) perform a compliance check to verify absolute adherence to the supported EDI standards, including ANSI X12,
More informationHOB WebSecureProxy as an SSL Terminal for E-Mail Clients
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: 09103 / 715-0 Fax: 09103 / 715-271 E-Mail: support@hob.de Internet: www.hob.de HOB WebSecureProxy as an SSL Terminal for E-Mail Clients November
More informationStreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes
StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes User Guide Rev A StreamServe Persuasion SP4StreamServe Connect for SAP - Business Processes User Guide Rev A SAP, mysap.com,
More informationSFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality
More informationPre-configured AS2 Host Quick-Start Guide
Pre-configured AS2 Host Quick-Start Guide Document Version 2.2, October 19, 2004 Copyright 2004 Cleo Communications Refer to the Cleo website at http://www.cleo.com/products/lexihubs.asp for the current
More informationBasic Requirements...2. Software Requirements...2. Mailbox...2. Gatekeeper...3. Plan Your Setup...3. Meet Extreme Processing...3. Script Editor...
Guide on EDI automation and use of VAN services Copyright 2008-2009 Etasoft Inc. Main website http://www.etasoft.com Extreme Processing website http://www.xtranslator.com Basic Requirements...2 Software
More informationELECTRONIC DATA INTERCHANGE
Electronic Data Interchange 6CHAPTER ELECTRONIC DATA INTERCHANGE LEARNING OBJECTIVES During this chapter, we will learn: What is EDI? EDI Software EDI Services EDI Standards 6.1 INTRODUCTION Processing
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use TMG network templates Abstract In this article I will show
More informationPROTECTING NETWORKS WITH FIREWALLS
83-10-44 DATA SECURITY MANAGEMENT PROTECTING NETWORKS WITH FIREWALLS Gilbert Held INSIDE Connecting to the Internet; Router Packet Filtering; Firewalls; Address Hiding; Proxy Services; Authentication;
More informationMessage Handling Automation with ebxml. Case Study: Automated Document Transfer between the DBKK Health Insurance Company and their Business Partners
Case Study: Automated Transfer between the DBKK Health Insurance Company and their Business Partners Background and Context The German Health Insurance company Deutsche Betriebskrankenkasse (DBKK) has
More informationTO TRADE WITH HOW TO USE EDI AMAZON YOUR GLOBAL EDI NETWORK B2BGATEWAY. May 13, 2015
YOUR GLOBAL EDI NETWORK HOW TO USE EDI TO TRADE WITH AMAZON B2BGATEWAY May 13, 2015 NORTH AMERICA // +1 (401) 491-9595 EUROPE // +353 (0) 61 708533 AUSTRALIA // +61 2 8003 7584 TODAY S AGENDA & PRESENTERS
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationSAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationWHAT IS EDI AND HOW DOES IT WORK?
2012 Hochschule Furtwangen University Term Paper WHAT IS EDI AND HOW DOES IT WORK? Salman Shahzad Matriculation ID: 238636 Course: BCM 2011-12 Subject: E-Business Technologies Prof.Dr. Eduard Heindel Certificate
More informationEPIC. Planning Guide VM-0001-02
EPIC Planning Guide VM-0001-02 Copyright Data Interchange Plc Peterborough, England, 2012. All rights reserved. No part of this document may be disclosed to third parties or reproduced, stored in a retrieval
More informationE-Business Exchange Solutions
> BusinessConnect Services > Solution ====!" ==Systems= BusinessConnect Services for seamless data exchange. > BusinessConnect Services The BusinessConnect Center The business integration platform. Cutting-edge
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationSetup Guide for Exchange Server
Setup Guide for Exchange Server Table of Contents Overview... 1 A. Exchange Server 2007/2010 Inbound Mail... 2 B. Exchange Server 2007/2010 Outbound Mail (optional)... 8 C. Exchange Server 2003/2000 Inbound
More informationGetting Started with EDI Implementation Guide
Getting Started with EDI Implementation Guide Business Usage: Basic Guidelines Implementation Guide Version: 2.0 Published: July 2011 Last Changed: April 2014 Table of Contents Getting Started with Walmart
More informationChapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationGXS BizManager. Translate. Exchange. Communicate. Enhanced Connectivity, Visibility and Control. www.gxs.com. The Power of a Comprehensive B2B Gateway
www.gxs.com GXS BizManager The Power of a Comprehensive B2B Gateway The ability to quickly, easily and securely exchange information with your trading partners is vital to your success. Purchase orders,
More informationEDI 101 Guide 1EDISOURCE BUYER S GUIDE
EDI 101 Guide 1EDISOURCE BUYER S GUIDE 3 TABLE OF CONTENTS CHAPTER 1: WHAT IS ELECTRONIC DATA INTERCHANGE (EDI)? 3 CHAPTER 2: SEVEN GOOD REASONS TO USE EDI 5 CHAPTER 3: WHAT S THE PROCESS OF EXCHANGING
More informationSAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation
A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can
More informationEDI 101. Your Basic Course in Electronic Data Interchange
EDI 101 Your Basic Course in Electronic Data Interchange Direct EDI, Inc., 2009 IRECT EDI, INCI DIRECT NC. Direct EDI, Inc. is an e commerce solution provider specializing in providing web based EDI solutions
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationSecurity and Risk Management
Mario Linkies and Horst Karin SAP Security and Risk Management Bonn Boston Contents at a Glance PART I Basic Principles of Risk Management and IT Security... 31 1 Risk and Control Management... 33 2 Enterprise
More informationIBM WebSphere Data Interchange V3.3
IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic
More information1 EDI Source, Inc. 31875 Solon Road Solon, OH 44139 877.334.1334 Fax: 440.542.9370 www.1edisource.com EDI 101. An Introductory Guide to EDI
1 EDI Source, Inc. 31875 Solon Road Solon, OH 44139 877.334.1334 Fax: 440.542.9370 www.1edisource.com EDI 101 An Introductory Guide to EDI Introduction At 1 EDI Source, we have spent more than 20 years
More informationSection I Transmission Modes
Transmission Modes Transmission Options Available...2 Value Added Networks (VAN)...2 File Transfer Protocol (FTP)...2 HTTPS File Upload (WEB)...3 Storing and Receiving Data with File Transfer Protocol...3
More informationLesson 5: Network perimeter security
Lesson 5: Network perimeter security Alejandro Ramos Fraile aramosf@sia.es Tiger Team Manager (SIA company) Security Consulting (CISSP, CISA) Perimeter Security The architecture and elements that provide
More informationGXS BizManager. Translate. Exchange. Communicate. Enhanced Connectivity, Visibility and Control. www.gxs.co.uk
www.gxs.co.uk GXS BizManager The Power of a Comprehensive B2B Gateway The ability to quickly, easily and securely exchange information with your trading partners is vital to your success. Purchase orders,
More informationelectronic data interchange (EDI) faster, better, more costeffective
electronic data interchange (EDI) faster, better, more costeffective business operations Vanboxtel installs EDI technology. electronic data interchange (EDI) faster, better, more costeffective business
More informationSAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...
More informationCA-EDI. Certification of the EDI Interface
CA-EDI Certification of the EDI Interface SAP AG Page 1 of 14 Introduction The EDI interface is intended to connect an EDI subsystem with the SAP system. EDI subsystems perform the following tasks related
More informationThis article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.
How To Configure Port Forwarding using Virtual Host to access devices on Internal network Applicable to versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates
More informationDetailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
More informationPAYE Online for Employers EDI. Electronic Data Interchange (EDI) EB2 (PAYE) Information Pack
PAYE Online for Employers Electronic Data Interchange (EDI) EB2 (PAYE) 1. Glossary 2. Introduction 3. Background 3.1 What is filing digitally? 4. EDI 4.1 What is EDI? 4.2 Who can use EDI? 5. Benefits 5.1
More informationSending and Receiving a FAX edgebox V4.5
intelligence at the edge of the network www.critical-links.com Sending and Receiving a FAX edgebox V4.5 Sending and Receiving a FAX (revision 1.3) Page 1 1. Introduction With the introduction of edgebox
More informationUsing a Cisco PIX Firewall to Limit Outbound Internet Access
Controlling Outbound Internet Access by Use of a Proxy and Firewall A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY www.aspetech.com toll-free: 877-800-5221 Controlling Outbound Internet Access by Use of a
More informationSANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
More informationVirtual Server in SP883
Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not
More informationPUBLIC Connecting a Customer System to SAP HCI
SAP HANA Cloud Integration for process integration 2015-05-10 PUBLIC Connecting a Customer System to SAP HCI Content 1 Introduction....4 2 Overview of Connection Setup, Tasks, and Roles.... 5 3 Operating
More informationBasic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
More informationICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0
ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.
More informationWalmart Stores, Inc. Getting Started with EDI Implementation Guideline Document version: 1.0 Published November 2011
Walmart Stores, Inc. Getting Started with EDI Implementation Guideline Document version: 1.0 Published November 2011 5 0 1 0 Business Usage: The following packet was created to speed-up your EDI implementation.
More informationEDI-INT AS2: VAN Elimination & Deployment Options
EDI-INT AS2: VAN Elimination & Deployment Options A Business and High Level Technical Guide to AS2 Version 1.0 Executive Summary 3 SEEBURGER Company Profile 4 Emerging Technologies.5 Communications History
More informationWe will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
More informationDocument Copying on GXS Trading Grid Messaging Service. Debbie Scott Senior Solution Consultant
Document Copying on GXS Trading Grid Messaging Service Debbie Scott Senior Solution Consultant Agenda Trading Grid Messaging Service Document Copying Sample scenarios AutoCopy, Carbon Copy, AutoForward
More informationGXS Trading Grid Messaging Service. Connectivity Overview. A GXS Transact SM Messaging Service for the Active Business
GXS Trading Grid Messaging Service A GXS Transact SM Messaging Service for the Active Business Table of Contents Introduction... 3 Trading Grid Messaging Service Connectivity Options Matrix... 4 AS2...
More informationElectronic Data Interchange / IDoc Interface (SD-EDI)
Electronic Data Interchange / IDoc Interface (SD-EDI) HELP.SDEDI Release 4.6C SAP AG Copyright Copyright 2000 SAP AG. All rights reserved. No part of this brochure may be reproduced or transmitted in any
More informationHow to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)
NetVanta 2000 Series Technical Note How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS) This document is applicable to NetVanta 2600 series, 2700 series,
More informationSECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationArt des Dokuments Supplier Logistics Manual 29.12.04. EDI in Procurement
Art des Dokuments Supplier Logistics Manual 29.12.04 EDI in Procurement Table of contents 2 14 1. What is EDI - targets of EDI... 3 2. EDI between and the supplier... 5 2.1. EDI in procurement and logistics.....6
More informationMANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
More information