OFTP / OFTP2 Data and Parameter Sheet Communication parameter for establishing partner links Last updated: 30. May 2010

Size: px
Start display at page:

Download "OFTP / OFTP2 Data and Parameter Sheet Communication parameter for establishing partner links Last updated: 30. May 2010"

Transcription

1 1. General information This page has to be filled in for establishing an connection as well as for an connection. Company address (name and address) Contact Data exchange SSID SFID Password Supported OFTP versions ( supports also) OFTP/ system in use parameters 1) Solution indenture number IP address Used port port (default port is: 3305 for, 6619 for ) responsible person parameters 1) IP address Used port (default port is 6619) person responsible parameters 1) Call number Fixed line IP address Comments Our parameters Your parameters 1) Only the communication option where both partners have agreed in advance is to be entered. Specifications in the following table on page 2 are only necessary if is used by both partners

2 2. Specifications for the encrypted data exchange via This page is to be filled out only if shall be employed. Both partners should specify the transport medium agreed upon in advance. Agreed transport medium Supported by us Please tick where applicable Supported by you Encryption necessary Applied encryption options te: When using, the encryption does only provide for extra security if applied close to applications in place of the DMZ. Supported Cipher Suites Certificate used for encryption Key usage verification Provider: Provider: Automated certificate exchange Data compression EERP signing (only when using ) - 2 -

3 3. Explanations 3.1 General information The data and parameter sheet serves as documentation of the data and parameters of both partners for establishing an OFTP connection. Therefore, the partners have to clarify in advance, which OFTP version and what kind of transport medium shall be employed. 3.2 Application flow description - assumes the active part for establishing the connection, discussing open questions with the partner, arranging the exchange of the required certificates for the encrypted data transfer and initiating a test data exchange, after the connection has been established. - begins to fill out the sheet und sends it to partner B, who returns it back again to partner A according to his own specifications. Afterwards, the connection is being established, possibly under exchanging certificates between both partners and with confirmation of completion, respectively to each other. te: It might become a common practice, especially for OEMs, that a partner sends a pre-filled sheet as standard to his data exchange partners. 3.3 Further explanatory notes On page 1 (general Information) This page is always to be filled out for both, the installation of and the connection. - The option EERP signing on page 2 means signing the hash of the received file, providing for extra transfer security of the files; however, being relevant only when using. An additional YES or NO flag for the SFID ID requires a signed EERP. On page 2 (specifications for the encrypted data exchange) This page is to be filled out only if both partners want to use. - A transport medium specified by partner A is to be chosen respectively by partner B and to be filled out accordingly. If not possible, partner A and B have to agree upon another transport medium. - As a rule for using, the software can do without encryption and data compression, being operated by the router by default. However, encryption in the software could provide for extra security unless employed at the DMZ (location of the router), but close to application in the internal company network, or if the data transfer shall be signed. - The identical selection of the encryption option isn t mandatory for both partners. In particular, it is possible to make use of different certificate-generating services. Odette International offers especially for the data exchange with the issue of certificates. This ensures a high security for the data exchange partners by examination the authenticity of the certificate applicant by the national car organizations (https://www.odetteca.com). - It is important to rule out data manipulation and misusage when using connections via the, by accurate verification and confirmation of the partner with the implementation of the connection via phone or fax. - The data compression option is part of the data transfer, being operated very efficiently, along with the encryption within the software. Further data compression beyond with zip, tar, etc. will remain unaffected; however, the need is to be taken into consideration. Further detailed information can be obtained from the following documents: VDA: OFTP 2 Secure Data Exchange via the Guideline for the practical application, Version 1.1 (German and English) Odette: Implementation Guidelines (Englisch) - 3 -

4 Example: Parameter specifications for the data exchange via the 1. General information This page has to be filled in for establishing an connection as well as for an connection. Company address (name and address) Contact Data exchange Odette Parameter SSID SFID Password EERP signing (only when using ) Supported OFTP versions ( supports also) OFTP/ in use Our parameters Automotive Company AG Postfach Stuttgart Germany Hans Maier Phone: Fax: O00xx000yyy AUTOzzzzABCD Hugo System A, Version x.y Your parameters Supplier Company SA Rue de la Republique Paris France Paul Belmondo Phone : Fax aaa000bbb AutoccccEFGH Juliett System B, Version x parameters Solution indenture number IP address Used port port (default port is: 3305 for, 6619 for ) responsible person - - parameters IP address Used port (default port is 6619) responsible person Port 6619 Paul Mueller, phone Fax Port 6619 Francis Dupont, phone parameters Call number Fixed line IP address - - Comments Please announce the completion of the connection by fax We support ENGDAT V3-4 -

5 2. Specifications for the encrypted data exchange via Agreed transport medium Supported by us Please tick where applicable Supported by you Encryption necessary Applied encryption options te: When using, the encryption does only provide for extra security if applied close to applications in place of the DMZ. Supported Cipher Suites Certificate used for encryption Key usage verification 3DES 3DES Provider: Odette Provider: Verysecure Automated certificate exchange Data compression EERP signing (only when using ) - 5 -

Automotive Supply Chain Best Practices OFTP2 EXPLAINED. Version No 1.0. Date: October 2009. Copyright Odette International Ltd

Automotive Supply Chain Best Practices OFTP2 EXPLAINED. Version No 1.0. Date: October 2009. Copyright Odette International Ltd Date: Copyright Odette International Ltd CONTENTS What is OFTP2 and what are its advantages?... 2 Secure OFTP2... 3 How does OFTP2 work?... 4 What are the main advantages of OFTP2?... 4 Globalisation of

More information

OFTP 2 Secure Data Exchange Via the Internet

OFTP 2 Secure Data Exchange Via the Internet OFTP 2 Secure Data Exchange Via the Internet A guideline for the practical application Version 1.1 VDA DFÜ AG Dietmar Kaschmieder Page 1 of 16 History: Version Date Description Author 1.0 04-10-2007 VDA

More information

ELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications

ELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD for Production s EDI BROCHURE created by GSEC-EU, Global Electronic Communications Page 1 of 22 Brochure map EDI Brochure Overview Who is GSEC? What is EDI? Advantages

More information

OFTP2 Implementation Checklist

OFTP2 Implementation Checklist connect. move. share. Whitepaper OFTP2 Implementation Checklist This document provides a checklist for the implementation of the new Odette OFTP2 standard for data exchange. Implementation of OFTP2 requires

More information

TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST

TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 WHAT IS OFTP?... 3 1.2 HOW DOES IT WORK?... 3

More information

PAYE Online for Employers EDI. Electronic Data Interchange (EDI) EB2 (PAYE) Information Pack

PAYE Online for Employers EDI. Electronic Data Interchange (EDI) EB2 (PAYE) Information Pack PAYE Online for Employers Electronic Data Interchange (EDI) EB2 (PAYE) 1. Glossary 2. Introduction 3. Background 3.1 What is filing digitally? 4. EDI 4.1 What is EDI? 4.2 Who can use EDI? 5. Benefits 5.1

More information

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is

More information

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015 access technology 1. GENERAL At the moment, your EDI application (e.g., your EDI converter) uses our interactive interface, Local User Agent (LUA) or the CDIF protocol embedded in it (for a proprietary

More information

How to configure VPN function on TP-LINK Routers

How to configure VPN function on TP-LINK Routers How to configure VPN function on TP-LINK Routers 1. VPN Overview... 2 2. How to configure LAN-to-LAN IPsec VPN on TP-LINK Router... 3 3. How to configure GreenBow IPsec VPN Client with a TP-LINK VPN Router...

More information

How to configure VPN function on TP-LINK Routers

How to configure VPN function on TP-LINK Routers How to configure VPN function on TP-LINK Routers 1. VPN Overview... 2 2. How to configure LAN-to-LAN IPsec VPN on TP-LINK Router... 3 3. How to configure GreenBow IPsec VPN Client with a TP-LINK VPN Router...

More information

NETVIGATOR Wireless Modem Setup Guide

NETVIGATOR Wireless Modem Setup Guide Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who have applied for this service - One or more computers

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 20.07.2015 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 24.02.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 28.07.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

Configuring Time Zone redirection on a Microsoft Terminal Server

Configuring Time Zone redirection on a Microsoft Terminal Server Technical Sheet Configuring Time Zone redirection on a Microsoft Fiche IS00246EN Version 1.00 Limited diffusion: Systancia, membership of the program AppliDis Partners and clients or prospects of Systancia

More information

HOB WebSecureProxy as an SSL Terminal for E-Mail Clients

HOB WebSecureProxy as an SSL Terminal for E-Mail Clients HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: 09103 / 715-0 Fax: 09103 / 715-271 E-Mail: support@hob.de Internet: www.hob.de HOB WebSecureProxy as an SSL Terminal for E-Mail Clients November

More information

SWANcloud. Security Aspects. SSC-Services GmbH Herrenberger Straße 56 71034 Böblingen Deutschland

SWANcloud. Security Aspects. SSC-Services GmbH Herrenberger Straße 56 71034 Böblingen Deutschland SWANcloud Security Aspects SSC-Services GmbH Herrenberger Straße 56 71034 Böblingen Deutschland SSC-Services GmbH 2014 All rights reserved. Reprinting, reproduction and publication not permitted. Document:

More information

Global Data Exchange for Product Data Management based on Standards

Global Data Exchange for Product Data Management based on Standards Global Data Exchange for Product Data Management based on Standards Gerhard Schatz (DaimlerChrysler AG) Dr. Reinhold Klass (DaimlerChrysler AG) ProSTEP-Symposium Wolfsburg, 25./26. April 2007 Content Introduction

More information

Communications Protocol Reference

Communications Protocol Reference EPIC Communications Protocol Reference VM-0001-10 Copyright Data Interchange Plc Peterborough, England, 2012. All rights reserved. No part of this document may be disclosed to third parties or reproduced,

More information

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 Purpose Liability Trademarks Copyright Guidelines and standards How to reach Funkwerk

More information

Configuring a VPN between a Sidewinder G2 and a NetScreen

Configuring a VPN between a Sidewinder G2 and a NetScreen A PPLICATION N O T E Configuring a VPN between a Sidewinder G2 and a NetScreen This document explains how to create a basic gateway to gateway VPN between a Sidewinder G 2 Security Appliance and a Juniper

More information

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com Dgw v2.0 May 14, 2015 www.media5corp.com Table of Contents Configuration Backup and Restore... 3 File Servers... 4 Configuring the FTP Server...4 Configuring the TFTP Server...4 Configuring the HTTP Server...

More information

EDI Data Exchange and Conversion Range of Functions & Services

EDI Data Exchange and Conversion Range of Functions & Services cleardax EDI Data Exchange and Conversion Range of Functions & Services Introduction Main functions Data exchange (connection options) Conversion Mappings Addtional performances and functions cleardax

More information

Encryption of E-Mail Traffic

Encryption of E-Mail Traffic Encryption of E-Mail Traffic White Paper Version 1.1 Date: 2009-06-08 Foreword On the initiative of some German automotive manufacturers work has started on a series of white papers on the subject of e-mail

More information

VPN Lesson 2: VPN Implementation. Summary

VPN Lesson 2: VPN Implementation. Summary VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users

More information

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.

More information

by using the Setup Wizard in CD Disk

by using the Setup Wizard in CD Disk How to configure Access Point as Wireless Bridge by using the Setup Wizard in CD Disk Thanks for purchasing Edimax Wireless Access Point. We hope this instruction can help you setup the Wireless Bridge

More information

Virtual Private Network and Remote Access Setup

Virtual Private Network and Remote Access Setup CHAPTER 10 Virtual Private Network and Remote Access Setup 10.1 Introduction A Virtual Private Network (VPN) is the extension of a private network that encompasses links across shared or public networks

More information

Possibilities for collaboration with Volkswagen and Audi

Possibilities for collaboration with Volkswagen and Audi Possibilities for collaboration with Volkswagen and Audi unique or seldom data exchange only once or rarely, small data volume, Asynchronous collaboration Regular data exchange, low up to high data volume,

More information

Qualified Integrators and Resellers (QIR) Implementation Statement

Qualified Integrators and Resellers (QIR) Implementation Statement Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

SAP NetWeaver 7.31 Process Integration Simple Use Cases for B2B OFTP Configuration SAP NetWeaver 7.31

SAP NetWeaver 7.31 Process Integration Simple Use Cases for B2B OFTP Configuration SAP NetWeaver 7.31 SAP NetWeaver 7.31 SAP NetWeaver Process Integration Simple Use Cases for B2B OFTP Configuration 1 TABLE OF CONTENTS 1 PREFACE... 3 2 INTRODUCTION AND PREREQUISITES... 3 2.1 Introduction... 3 2.1.1 OFTP

More information

Cisco QuickVPN Installation Tips for Windows Operating Systems

Cisco QuickVPN Installation Tips for Windows Operating Systems Article ID: 2922 Cisco QuickVPN Installation Tips for Windows Operating Systems Objective Cisco QuickVPN is a free software designed for remote access to a network. It is easy to install on a PC and simple

More information

WHMCS LUXCLOUD MODULE

WHMCS LUXCLOUD MODULE èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your

More information

Questionnaire Portal and EDI Usage for Data Exchange

Questionnaire Portal and EDI Usage for Data Exchange Questionnaire Portal and EDI Usage for Data Exchange Date: Copyright Odette International Ltd COPYRIGHT NOTICE Standard Copyright Notice here Odette International Ltd Forbes House Halkin Street London

More information

8 Steps for Network Security Protection

8 Steps for Network Security Protection 8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because

More information

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn) NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who

More information

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client Make sure your DI-804HV or DI-808HV is running firmware ver.1.40 August 12 or later. You can check firmware version

More information

Virtual Private Network and Remote Access

Virtual Private Network and Remote Access Virtual Private Network and Remote Access Introduction A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A

More information

Outlook 2000. Install the Identity Certificate: Send a Digitally Signed Email: To Send an Encrypted Email:

Outlook 2000. Install the Identity Certificate: Send a Digitally Signed Email: To Send an Encrypted Email: Outlook 2000 1. Open Outlook 2000 and select the Tools > Options > Security. 2. Click Change Settings. 3. Under the Certificates and Algorithms, there are two Choose buttons. The first allows you to select

More information

8 Steps For Network Security Protection

8 Steps For Network Security Protection 8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their

More information

GS1 Trade Sync Connectivity guide

GS1 Trade Sync Connectivity guide GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and

More information

Web Authentication Application Note

Web Authentication Application Note What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular

More information

1WLAN CONFIGURATION WITH WEP

1WLAN CONFIGURATION WITH WEP 1WLAN CONFIGURATION WITH WEP Copyright August 26, 2005 Funkwerk Enterprise Communications GmbH bintec Workshop Version 0.9 Purpose Liability Trademarks Copyright Guidelines and standards How to reach Funkwerk

More information

TABLE OF CONTENTS DESCRIPTION - WHAT S INSIDE 3 - APPLICATION REQUIRED 4. - APPLICATION INTERFACE DESCRIPTION ( Version

TABLE OF CONTENTS DESCRIPTION - WHAT S INSIDE 3 - APPLICATION REQUIRED 4. - APPLICATION INTERFACE DESCRIPTION ( Version TABLE OF CONTENTS DESCRIPTION PAGE - WHAT S INSIDE 3 - APPLICATION REQUIRED 4 - APPLICATION INTERFACE DESCRIPTION ( Version 1.0.2.a ) 5 - APPLICATION INTERFACE DESCRIPTION ( Version 1.0.3.a ) 6 - MOTOR

More information

Weidmueller minirouter with two Ethernet ports (IE-ARM-E) Firmware 3.3.0 (please use appl-note_router-update-en.pdf for updates)

Weidmueller minirouter with two Ethernet ports (IE-ARM-E) Firmware 3.3.0 (please use appl-note_router-update-en.pdf for updates) Application Note MiniRouter: IPSec-configuration and access This document describes the configuration for the construction of an IPsec connection. This relates to a computer with Windows XP computer software

More information

RemotelyAnywhere Getting Started Guide

RemotelyAnywhere Getting Started Guide April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...

More information

SIP Trunking with Elastix. Configuration Guide for Matrix SETU VTEP

SIP Trunking with Elastix. Configuration Guide for Matrix SETU VTEP SIP Trunking with Elastix Configuration Guide for Matrix SETU VTEP Contents Setup Diagram 3 SIP Trunk Configuration in Elastix for SETU VTEP 4 Outgoing Call configuration in Elastix 7 Incoming call configuration

More information

Secure XML API Integration Guide. (with FraudGuard add in)

Secure XML API Integration Guide. (with FraudGuard add in) Secure XML API Integration Guide (with FraudGuard add in) Document Control This is a control document DESCRIPTION Secure XML API Integration Guide (with FraudGuard add in) CREATION DATE 02/04/2007 CREATED

More information

Securing your Linksys Wireless Router BEFW11S4 Abstract

Securing your Linksys Wireless Router BEFW11S4 Abstract Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms

More information

Implementing an SSL security on AppliDis Servers running under Windows 2008 Server R2

Implementing an SSL security on AppliDis Servers running under Windows 2008 Server R2 Technical Sheet Implementing an SSL security on AppliDis Servers running under Windows 2008 Server R2 Fiche IS00265 Version 1.00 Limited diffusion: Systancia, membership of the program AppliDis Partners

More information

Configuring and Monitoring Bluecoat AntiVirus

Configuring and Monitoring Bluecoat AntiVirus Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 èè How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 Table of Contents 1. General overview... 3 1.1. Installing the plugin... 3 1.2. Testing the plugin with the

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

Here s the whole setup, ready for initial configuration. * Note: Each master AirStation may be connected to 2 slave AirStations.

Here s the whole setup, ready for initial configuration. * Note: Each master AirStation may be connected to 2 slave AirStations. Your AirStation s WDS bridging capability allows you to extend the size of your wireless network by adding additional AirStations, all connected wirelessly. In this simple example, we ll connect two AirStations

More information

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6 WL/IP-8000VPN VPN Setup Guide Version 0.6 Document Revision Version Date Note 0.1 11/10/2005 First version with four VPN examples 0.2 11/15/2005 1. Added example 5: dynamic VPN using TheGreenBow VPN client

More information

ISG50 Application Note Version 1.0 June, 2011

ISG50 Application Note Version 1.0 June, 2011 ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,

More information

The English translation Of MBA Standard 0301

The English translation Of MBA Standard 0301 MBA 文 書 0603 号 MBA Document 0603 The English translation Of MBA Standard 0301 MISAUTH Protocol Specification The authoritive specification is Japansese one, MBA Standard 0203 (June 2004). The Protocol

More information

Netcomm NB604N. Modem Configuration Guide. Netcomm NB604N. Configuring in Layer2 PPPoE for Windows XP and 2000 IMPORTANT MESSAGE

Netcomm NB604N. Modem Configuration Guide. Netcomm NB604N. Configuring in Layer2 PPPoE for Windows XP and 2000 IMPORTANT MESSAGE Configuring in Layer2 PPPoE for Windows XP and 2000 IMPORTANT MESSAGE Your modem has been pre-configured, you do not need to follow each step of the set-up guide but should retain this document in case

More information

Automatic Hotspot Logon

Automatic Hotspot Logon WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS VERSION MANAGEMENT VERSION REVIEW DATE REVIEW COMMENTS 1.0 23/05/2014 First version. 2.0 14/04/2016 Adaptation to standard template. Page 1 of 15 INDEX VERSION MANAGEMENT...

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Controller Management

Controller Management Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management

More information

Installing SQL Express. For CribMaster 9.2 and Later

Installing SQL Express. For CribMaster 9.2 and Later Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,

More information

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be

More information

Please find detailed settings of virtual fax here.

Please find detailed settings of virtual fax here. ZYCOO new generation IP Phone system---coovox Series (U20/50/60/100) support virtual fax. Virtual fax is an important feature to help enterprise reduce the cost and promote the efficient communication.

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 186 Release Date: August 14, 2007 Region: GLOBAL Configuring a VPN Remote IP Phone with an Adtran Netvanta 3305 VPN Router The following document assumes that the user/installer

More information

Merchant Application Form

Merchant Application Form emerchantpay Limited Merchant Application Form Hand written applications will not be accepted. CORPORATION DETAILS European Company Details n-european Company Details If applicable Company Registration

More information

FieldIT Limited www.fieldit-limited.com. FieldIT CRM. Installation Manual v1.3.i3 (Enterprise Install)

FieldIT Limited www.fieldit-limited.com. FieldIT CRM. Installation Manual v1.3.i3 (Enterprise Install) FieldIT Limited www.fieldit-limited.com FieldIT CRM Installation Manual v1.3.i3 (Enterprise Install) Oliver Field FieldIT Limited 2013 13 Introduction The FieldIT CRM software can be installed in several

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Configuration Notes 283

Configuration Notes 283 Mediatrix 4400 Digital Gateway VoIP Trunking with a Legacy PBX June 21, 2011 Proprietary 2011 Media5 Corporation Table of Contents Table of Contents... 2 Introduction... 3 Mediatrix 4400 Digital Gateway

More information

Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication

Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Objective Topology Estimated Time: 40 minutes Number of Team Members: Students can work in teams of two. In this lab, the student will

More information

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program).

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program). Introduction This document serves as a guide for TCS Retail users who are credit card merchants. It is written to help them become compliant with the PCI (payment card industry) security requirements.

More information

How To Set up and Configure the WNA-100 Wireless Network Adapter

How To Set up and Configure the WNA-100 Wireless Network Adapter How To Set up and Configure the WNA-100 Wireless Network Adapter Section 1: Set up and Connect the Adapter to a Computer, Then Configure the Computer to Communicate With the Adapter Before the adapter

More information

WLA-5000AP and Mikrotik Router Board Connection Guide

WLA-5000AP and Mikrotik Router Board Connection Guide WLA-5000AP and Mikrotik Router Board Connection Guide This document guides you to connect WLA-5000AP and Mikrotik RB-433 with wireless interface. When Mikrotik is set to be AP Bridge mode, WLA-5000AP can

More information

Penetration Testing - a way for improving our cyber security

Penetration Testing - a way for improving our cyber security OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH adif2k8@gmail.com Copyright The OWASP

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

bintec Workshop Remote Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

bintec Workshop Remote Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 bintec Workshop Remote Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 Purpose Liability Trademarks Copyright Guidelines and standards How to reach Funkwerk

More information

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007 Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.

More information

United States Trustee Program s Wireless LAN Security Checklist

United States Trustee Program s Wireless LAN Security Checklist United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following

More information

EDI Agreement EDI AGREEMENT. Article 1: Object and scope. Article 2: Definitions

EDI Agreement EDI AGREEMENT. Article 1: Object and scope. Article 2: Definitions EDI AGREEMENT This Electronic Data Interchange (EDI) Agreement is concluded by and between: And hereinafter referred to as 'the parties', Article 1: Object and scope 1.1. The 'EDI Agreement', hereinafter

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using

More information

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive

More information

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh...

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... Chapter7 Setting the Receiving PC for Direct Upload Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... 153 Setting the Receiving PC for Direct Upload This section explains

More information

ZyXEL ZyWALL P1 firmware V3.64

ZyXEL ZyWALL P1 firmware V3.64 TheGreenBow IPSec VPN Client Configuration Guide ZyXEL ZyWALL P1 firmware V3.64 WebSite: Contact: http://www.thegreenbow.com support@thegreenbow.com IPSec VPN Router Configuration Property of TheGreenBow

More information

ESCAUX Unified Communication Solution Administrator guide

ESCAUX Unified Communication Solution Administrator guide ESCAUX Unified Communication Solution Administrator guide Table of Contents Introduction...4 Intended audience...4 Disclaimer...4 Initial setup...5 Modules configuration...5 Creating server configuration...5

More information

EPIC. Enterprise Process Integration Controller. Creating 100% Reliable Business Systems. ebusiness Solutions

EPIC. Enterprise Process Integration Controller. Creating 100% Reliable Business Systems. ebusiness Solutions EPIC Enterprise Process Integration Controller Creating 100% Reliable Business Systems ebusiness Solutions D A T A I N T E R C H A N G E P L C EPIC Data Interchange s EPIC is an Enterprise Process Integration

More information

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering? FAQs: MATRIX NAVAN CNX200 Q: How to configure port triggering? Port triggering is a type of port forwarding where outbound traffic on predetermined ports sends inbound traffic to specific incoming ports.

More information

esight Global Energy Management Software

esight Global Energy Management Software esight Global Energy Management Software Global Energy Management Software Global Energy Management Software helping organisations reduce energy consumption, costs, and emissions by up to 30% Comprehensive

More information

Chapter 7 Using Network Monitoring Tools

Chapter 7 Using Network Monitoring Tools Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance

More information

Netcomm NF12. Configuration Guide. Netcomm NF12 IMPORTANT MESSAGE

Netcomm NF12. Configuration Guide. Netcomm NF12 IMPORTANT MESSAGE IMPORTANT MESSAGE Your router has been pre-configured, you do not need to follow each step of the set-up guide but should retain this document in case you need to manually configure your equipment. To

More information

emerge 50P emerge 5000P

emerge 50P emerge 5000P emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is

More information

optipoint 410/420 S General configuration instructions for VoIP suppliers

optipoint 410/420 S General configuration instructions for VoIP suppliers optipoint 410/420 S General configuration instructions for VoIP suppliers bktoc.fm Inhalt Inhalt 0 1 Introduction........................................................... 3 1.1 Prerequisites for the

More information

( ) ( ) TECHNOLOGY BRIEF. XTNDConnect Server: Security XTNDCONNECT SERVER OFFERS A VARIETY OF FEATURES TO SECURELY EXTEND MISSION-CRITICAL

( ) ( ) TECHNOLOGY BRIEF. XTNDConnect Server: Security XTNDCONNECT SERVER OFFERS A VARIETY OF FEATURES TO SECURELY EXTEND MISSION-CRITICAL Server: Security In this growing mobile and wireless world, anytime, anywhere access to corporate data is becoming a necessity. Mobile workers are demanding access to mission-critical data in order to

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Dear Friends, This mailer will help you configure Email Notification in SATATYA Web Client

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information