Possibilities for collaboration with Volkswagen and Audi

Size: px
Start display at page:

Download "Possibilities for collaboration with Volkswagen and Audi"

Transcription

1 Possibilities for collaboration with Volkswagen and Audi unique or seldom data exchange only once or rarely, small data volume, Asynchronous collaboration Regular data exchange, low up to high data volume, synchronous / asynchronous collaboration permanent data exchange, high data volume, synchronous collabo-ration, integrated scope of development Access to special applications resp. Access to VW / Audi net ECA QTS SimplX OFTP OFTP2 HyperKVS CONNECT Citrix/WTS Sprungserver VW DMS Virtual Desktop Secure Partner E2E-Portal Engineering- Portal Type of contract * special requirements Contract CSN non-disclosure agreement X X X X specified provider Contract SimplX Contract CSN, Contract HyperKVS Contract CSN, Contract CONNECT Contract CSN Evaluation information security X* 1 X X X Secure Partner contract X X X X

2 Information SimplX, OFTP & OFTP2 SimplX With the solution for data exchange SimplX, CAD data could be exchanged once and rarely via Internet. At the moment only data receipt is possible, but perspectively also the data transmission by the partner company is planned. SimplX is currently available only for Volkswagen. The Partner company can use any internet provider. The access for SimplX is granted for only one person. Access for a second person is possible only in justified exceptional cases. The utilisation period is 30 days starting with the date of initial operation. The utilisation period for further activations is also 30 days starting again with technical activation, maximum 3 times a year. During the period of a suspended SimplX connection (inactive phase) no charges incurs. More information, preconditions and prices you will find on document contract SimplX for Volkswagen. OFTP The Odette File Transfer Protocol (OFTP) is a protocol used for EDI (Electronic Data Interchange) between two communications business partners. OFTP is recommended by VDA (association of the German automotive industry). Only TCP/IP is available as a network protocol. For this reason, your OFTP software must support the TCP/IP protocol. For further information please see your software documentation or ask your software supplier directly. The communication is initiate by one partner. After the exchange of so-called Odette- ID s (placed by VDA) and passwords data can be exchanged bidirectional. Data files get a preconfigured virtual data name for the transmission. Data will be sent encrypted via ComSecure. CAD data sent by the partner company will be processed in HyperKVS automatically and are available for Audi. The responsible design engineer of Audi has also the possibility to send data via HyperKVS to the OFTP station of the partner company. These data are stored at the inhouse OFTP server of the partner company. OFTP2 As a difference to OFTP1 with Odette File Transfer Protocol 2 (OFTP2) it is possible, to send and receive data encrypted via Internet between the supplier and Volkswagen. Audi has not been implemented this solution yet. This protocol is recommended by VDA (association of the German automotive industry) too. Differently to OFTP1 it will be established a SSL/ TLS-encrypted TCP/IP connection. Each TCP/IP package will be encrypted. Files have only been encrypted if they were saved or routed from a provider. The supplier will get the necessary OFTP2 certificate for TLS encryption from VDA.

3 Information HyperKVS, CONNECT & VW DMS HyperKVS HyperKVS is an application for data exchange, for audit-proof storage and for file conversion of CAD data to the format that is needed. HyperKVS is used by all parties that are involved within the process of product creation. Due to the worldwide use by more than suppliers and partner companies HyperKVS connects design engineers, methods engineers, purchasers as well as quality managers of the corporate group with their partner companies. With HyperKVS you have the possibility to save data directly to the platform, to link them to a design version and to make them available for the design engineer. Released data can be downloaded directly from the platform. With HyperKVS you can view drawings on your screen. The drawing will be converted into tiff format. Normally the viewer Imaging for Windows is sufficient. Besides the csn contract, the application contract KVS is necessary for using HyperKVS. If you want to use HyperKVS for VW and Audi, you have to conclude a CSN and KVS contract for each group. The prices for the second contract for CSN and KVS is reduced up to 50% compared to the first contract for CSN and KVS. For more technical details please see the document contract KVS as well as the document technische Informationen. CONNECT The future-oriented concern product data management provides the technical and procedural solution for the modular building set strategy of VW. Since 2007 an integrated product data management system for vehicle projects and module developments for the involved concern brands, locations, business division and their external supplier has been used. The IT solution CONNECT which is specially configured for the concern based on the standard software Teamcenter from Siemens PLM. Different product data will be provided worldwide using a central database. Besides the CSN contract, the application contract CONNECT is necessary for using CONNECT. The service charge covers the synchronous collaboration at the data platform with Volkswagen and Audi, even if you exchange data to only one brand. For more technical details please see the document contract CONNECT as well as the document technische Informationen. VW DMS Volkswagen DMS is the abbreviation for Document-Management-System as a central management system for an organized saving of files. Within the system documents will we saved confidential and structured. They will be centrally provided. On the basis of the given quality characteristics a high-grade search regarding the functional properties can take place. Documents can be shared easily with others and at the same time these documents are retrievable very fast due to full-text search. Besides the CSN contract, the application contract DMS is necessary for using VW DMS. For more technical details please see the document technische Informationen.

4 Information other services and applications QTS Quality assurance component tracking system: QTS online serves in particular to improve communications and the exchange of information between AUDI AG and its partners. QTS creates transparency about defective parts and complaints, from the dealer through to the supplier and improves availability of information by means of direct access to various communication-capable IT platforms. Reduced administration and tax costs as a result of the online provision of centralised Audi data to decentralised partner systems. Citrix/WTS Sprungserver Citrix server for access to several systems within the intranet of VW / Audi. Separate activation and appliation processes are necessary. E2E-Portal Volkswagen AG runs an e2e platform within the intranet for variant applications in different security zones. Internal and external development partners have access to a worldwide and consistent communication and integration platform. The access to existing backend systems as well as data exchange between applications takes place via standardized gateways of the e2e platform. Engineering- Portal Audi Engineering Portal is the central platform for communication and applications in the development process: Efficient and effective networking of internal and external developers in compliance with the security standards of AUDI AG. Central provider of news and relevant information on processes and CAx-methods in vehicle development Applications. Central access to applications in the following fields: CAE (CAE-Bench2, FlowGuide, LoCo) CAT (FzgSi-Datentransfer) Project management (ChESS) Collaboration (Projekt-Raum, Wiki, Jira) Virtual Desktop With virtualisation of the desktop the partner company gets access to variant VW applications without access to the intranet of VW. The company can chose the provider for the access itself. With Virtual Desktop the partner company can reduce the local efforts for installation and support. With help of security settings the download resp. the local storage of data is prevented. The end user has only view to the desktop, that works with a remote client for the central data. The use of Virtual Desktop is only possible in case of direct assignment by VW department EAE. ECA ECA means Engineering Center Aggregate. ECA is a windchill database adapted to the demands of the aggregate development for the administration of CAD data, parts and parts lists.

5 Secure Partner Secure Partner Secure Partner is a technical connection type on the part of Volkswagen for using the VW intranet within partner company rooms. The application for Secure Partner is different from the application for access to the CSN partner net and is initiated by the responsible department of Volkswagen and not by the partner company. Criteria for a Secure Partner connection: - Work with data that have the status internal or confidential (the use of CONNECT is not allowed because of data status secret ) - Offices are located next to Wolfsburg, Gifhorn or Braunschweig - No administrative work for Volkswagen for example changes, maintenance and user management - Exclusive use of Volkswagen hardware (laptops, desktops, printers) - The partner company has 100% domiciliary rights for the workrooms - Exclusive work in these rooms for Volkswagen - The technical connection can be realised - The partner company has been evaluated regarding information security. An approval for confidential data was granted. - The connection for the location is authorised by Volkswagen.

6 Non-disclosure agreement and proof of information security Confidentiality agreement: For each legal company the existence of a confidentiality agreement with the particular brand is mandatory. That means if you want to exchange data with Volkswagen and Audi you have to conclude a confidentiality agreement with Volkswagen and a second one with Audi. Volkswagen (scope Technische Entwicklung (TE) at Wolfsburg) finalizes a corresponding agreement on own initiative with the process B2B-identity at the B2B platform. For more details please contact our Service Support Center. information security assessment: The proof of information security is a precondition for the technical connection to the partner company network of Volkswagen and/or Audi as well as the handing over of sensible information. operational services (OS) was authorized by Volkswagen Group to obtain this proof for partner companies. Basis for that is a self-assessment for information security and - if available - the proof of a valid ISO certification. The VDA working group "integral protection of information with IT security, prototype protection and risk management" has developed the used questionnaire "Information Security Assessment". The questionnaire is no replacement for the ISO certification, but serves as assistance on the way to certification and simplifies the start into the comprehensive group of themes ISO et sequences. The mentioned service fee is charged for the evaluation of the self-assessment. In case that a higher and more detailed evaluation of information security is requested by Volkswagen resp. Audi for your company, for example by an on-site assessment, further costs incur. These costs depend on type, scope and duration of this on-site assessment. A detailed consultation will take place between you and our responsible colleagues previously.

7 Provider In order to exchange data with Volkswagen resp. Audi you need a network connection to the respective partner net. This technical connection is only possible via special VPNs resp. access technologies. Therefore a special portfolio was defined by Volkswagen and Audi. In most cases a separate provider contract is necessary. This contract will be concluded directly between the company that requires the access and the provider. In case of using particular applications an internet based VPN connection can be prepared without the need for a provider contract. An overview about the applications and services that need a specified provider you will find on page 1 of this document. Germany location outside Germany bidirectional communication (e.g. OFTP, Printing Services ) application unidirectional communication (e.g. QTS, KVS Web-access, Citrix) bidirectional communication (e.g. OFTP, Printing Services ) application unidirectional communication (e.g. QTS, KVS Web-access, Citrix) only VW and AUDI OEM VW, AUDI and other only VW and AUDI OEM VW, AUDI and other only VW and AUDI OEM VW, AUDI and other only VW and AUDI OEM VW, AUDI and other VPN (Vodafone) VPN Offnet (BT) SFV (WOBCOM, COM-IN) Internet-VPN VPN (Vodafone) VPN Offnet (BT) SFV (WOBCOM, COM-IN) (as Certified Service Provider) VPN Offnet (BT) (as Certified Service Provider) (as Certified Service Provider) Internet-VPN VPN Offnet (BT) (as Certified Service Provider) Hints: Please be aware of the limited regional availability of the provider WOBCOM and COM-IN Summary of network access types technical requirements Network access is provided on the basis of the TCP/IP protocol. It is a prerequisite, that the given contractor supports this communication protocol. This is an important fact in case of OFTP data exchange, which is only supported on the basis of the TCP/IP-protocol. At the moment we offer the following connection types for the Volkswagen resp. Audi partner network: VPN European Network Exchange: the communication network for European automobile industry (e.g. operational services as service provider of T-Systems) Automotive Network Exchange: Communication network of automobile industry in North America -CSP (Certified Service Provider) Virtual Private Network: network connection by provider Vodafone (available only within Germany). VPN Offnet Network connection by provider BT (for partner companies outside Germany). Internet VPN SFV The technical requirement for the Internet VPN connection is an internet access by any internet provider. At the moment this kind of network connection can only be used for unidirectional network traffic from the company to Volkswagen resp. Audi. leased line, standard fixed line, e.g. by Provider Vodafone, WOBCOM or COM-IN

8 provider Access via (European Network Exchange) is the European automobile industry's communication network. It is operated as virtual private network on an IP basis. This connection is the favored one if you want to get access to the partner network of Volkswagen or Audi. is the preferred solution for companies that set a high value on data encoding, in case of need for larger bandwidth or in case of communication with other OEM s at the same time, that are using too. is offered with demand-actuated connection types (dial connect, ficed connect). For registration please visit the webpage: Operational services is an integrated part of T-Systems, so you can mandate operational services for your connection and your CSN network access at the same time. Thus you will have a competent partner for all questions regarding your access to the partner network of Volkswagen and Audi. has met all the requirements and passed audit review by German TÜV Rheinland Group, which allows to act as an Certified Service Provider (CSP).

9 provider Access via VPN, BT, SFV and Internet VPN Access via VPN VPN Company Net is a MPLS-based network providing an exclusive connection to the Partner Network of Volkswagen and Audi (contrary to ). Data exchange with other OEMs or engineering suppliers is not possible. VPN Company Net is offered by the external provider Vodafone. Several connection types based on ISDN and DSL are possible: VPN Company Dialog ISDN, bandwidth from 64kBit/s up to 128 kbit/s VPN Company Dialog ADSL flat and SDSL flat, typical DSL-bandwidths VPN Company Net Leased Line, bandwidth from 2 Mbit/s Access via BT In particular companies from foreign countries will be connected to the Partner Networks of Volkswagen and Audi via BT. BT is a leading provider of global communication services, offering a secure and scalable network connection to Volkswagen and Audi. For further information please see the separate BT information sheet. Access via leased line If two locations frequently communicate large volumes of information between each other, a leased line (fixed line) for transmitting data as well as voice and image information is a viable option. Such lines can be used 24h a day, are never busy and connect immediately. A fixed price is charged for their provision and is payable at the end of the agreed billing period. A standard fixed line is a special line type and marks a digital leased line offering bandwidths of 64 kbit to 34 Mbit. For the connection to the partner network of Volkswagen and Audi, following providers are considered: Company Net Leased Line by Vodafone WOBCOM (Volkswagen Wolfsburg and surrounding countryside) COM-IN (connection to Audi and Volkswagen, Ingolstadt and surrounding countryside) Access via Internet VPN The technical requirement for the Internet VPN connection is an internet access by any internet provider. This can be setup via a Router (VPN pass-through must be enabled) or via a local internet access on the selected PC. For encryption the IPSec protocol is used together with a CA-certificate (trusted certificate authority) and a hardware-token with username and PIN for authentication. At the moment this kind of network connection can only be used for unidirectional network traffic from the company to the OEM (e.g. QTS, Host, Citrix, E-Portal and KVS Web-Access).The use of OFTP with this kind of network connection is not possible and therefore not approved. The price for this connection was firmly calculated and is charged per user. In case of using the Internet- VPN connection a one-time charge for the Hardware-Token is due plus a monthly charge per user. The license model requires one hardware-token per user. For details please see document annex-2 CSN pricelist. Internet-VPN runs only with operating system Windows version Windows XP or higher. Internet VPN can only be used within the company site that meets the requirements regarding information security and non-disclosure agreement of the Volkswagen group. The use of Internet VPN within any private area for example office at home requires a special permit. The compliance with requirements regarding information security and non-disclosure agreement of the Volkswagen group is also mandatory in this case. In case of need the company has to provide evidence on demand.

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is

More information

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015 access technology 1. GENERAL At the moment, your EDI application (e.g., your EDI converter) uses our interactive interface, Local User Agent (LUA) or the CDIF protocol embedded in it (for a proprietary

More information

Automotive Supply Chain Best Practices OFTP2 EXPLAINED. Version No 1.0. Date: October 2009. Copyright Odette International Ltd

Automotive Supply Chain Best Practices OFTP2 EXPLAINED. Version No 1.0. Date: October 2009. Copyright Odette International Ltd Date: Copyright Odette International Ltd CONTENTS What is OFTP2 and what are its advantages?... 2 Secure OFTP2... 3 How does OFTP2 work?... 4 What are the main advantages of OFTP2?... 4 Globalisation of

More information

ELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications

ELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD for Production s EDI BROCHURE created by GSEC-EU, Global Electronic Communications Page 1 of 22 Brochure map EDI Brochure Overview Who is GSEC? What is EDI? Advantages

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

OFTP 2 Secure Data Exchange Via the Internet

OFTP 2 Secure Data Exchange Via the Internet OFTP 2 Secure Data Exchange Via the Internet A guideline for the practical application Version 1.1 VDA DFÜ AG Dietmar Kaschmieder Page 1 of 16 History: Version Date Description Author 1.0 04-10-2007 VDA

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

TAKE OFF FOR YOUR CLOUD virtual private networks (vpn)

TAKE OFF FOR YOUR CLOUD virtual private networks (vpn) INFRASTRUCTURE & NETwORK SERVICES TAKE OFF FOR YOUR CLOUD virtual private networks (vpn) Infrastructure & Network Services from T-Systems comprises all solutions that are critical to a business IT and

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable

More information

Common Remote Service Platform (crsp) Security Concept

Common Remote Service Platform (crsp) Security Concept Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry

More information

Campus VPN. Version 1.0 September 22, 2008

Campus VPN. Version 1.0 September 22, 2008 Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several

More information

optipoint 410/420 S General configuration instructions for VoIP suppliers

optipoint 410/420 S General configuration instructions for VoIP suppliers optipoint 410/420 S General configuration instructions for VoIP suppliers bktoc.fm Inhalt Inhalt 0 1 Introduction........................................................... 3 1.1 Prerequisites for the

More information

Remote Access via VPN Configuration (May 2011)

Remote Access via VPN Configuration (May 2011) Remote Access via VPN Configuration (May 2011) Contents Copyright...2 Important Considerations...3 Introduction...4 Supported router models... 4 Installation Topology... 4 Dynamic IP Configuration (DynDNS)...5

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

MPLS provides multi-site solution

MPLS provides multi-site solution MPLS provides multi-site solution Executive Summary MPLS (Multi Protocol Label Switching) meets the need for a cost effective solution for voice and data connectivity across multiple sites. Spitfire s

More information

Deploying VSaaS and Hosted Solutions Using CompleteView

Deploying VSaaS and Hosted Solutions Using CompleteView SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

Intelligent Solutions for the Highest IT Security Demands

Intelligent Solutions for the Highest IT Security Demands Intelligent Solutions for the Highest IT Security Demands 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected processing,

More information

Enterprise Broadband Customer Service Description

Enterprise Broadband Customer Service Description BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...

More information

Information Crib Sheet Internet Access Service Agreement

Information Crib Sheet Internet Access Service Agreement Information Crib Sheet Internet Access Service Agreement 1. Definitions and Interpretation This Service Agreement is to be read in conjunction with the Conditions for Communications Services (the Conditions

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

Lindenbaum Web Conference

Lindenbaum Web Conference Product information Lindenbaum Web Conference Lindenbaum Your partner for high-quality conferencing Scalable, secure and easy-to-use web conference Lindenbaum Web Conference is a secure and reliable web

More information

EDI Data Exchange and Conversion Range of Functions & Services

EDI Data Exchange and Conversion Range of Functions & Services cleardax EDI Data Exchange and Conversion Range of Functions & Services Introduction Main functions Data exchange (connection options) Conversion Mappings Addtional performances and functions cleardax

More information

Encryption of E-Mail Traffic

Encryption of E-Mail Traffic Encryption of E-Mail Traffic White Paper Version 1.1 Date: 2009-06-08 Foreword On the initiative of some German automotive manufacturers work has started on a series of white papers on the subject of e-mail

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Connecting to the FILTER Virtual Private Network (VPN)

Connecting to the FILTER Virtual Private Network (VPN) Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs

More information

Mercedes-Benz US International, Inc. Supplier Connection Guidelines

Mercedes-Benz US International, Inc. Supplier Connection Guidelines Mercedes-Benz US International, Inc. Supplier Connection Guidelines IMPORTANT: Check with MBUSI for any late-breaking changes to this specification. https://daimler.portal.covisint.com/web/mbusi Table

More information

Wholesale Partner Technical Guide

Wholesale Partner Technical Guide Wholesale Partner Technical Guide Initiating Contact Wholesale Customer Connectivity The first step in initiating the process for establishing a connection with your company and FairPoint Communications

More information

High Speed Communication Guide

High Speed Communication Guide Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Are you running at full speed? In this busy and unsecure world, businesses of all sizes need to be sure their data is

More information

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client Make sure your DI-804HV or DI-808HV is running firmware ver.1.40 August 12 or later. You can check firmware version

More information

Schedule Document. Leased Lines & Ethernet Based Services. Node4 Limited 29/11/2007

Schedule Document. Leased Lines & Ethernet Based Services. Node4 Limited 29/11/2007 Schedule Document Leased Lines & Ethernet Based Services Node4 Limited 9//007 SCHEDULE Additional terms, Service Description & Service Level Agreement for Leased Lines & Ethernet Based Services. SERVICE

More information

Virtual Private Network and Remote Access Setup

Virtual Private Network and Remote Access Setup CHAPTER 10 Virtual Private Network and Remote Access Setup 10.1 Introduction A Virtual Private Network (VPN) is the extension of a private network that encompasses links across shared or public networks

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

Service Managed Gateway TM. How to Configure a T1/E1 Connection

Service Managed Gateway TM. How to Configure a T1/E1 Connection Service Managed Gateway TM How to Configure a T1/E1 Connection Issue 1.2 Date 26 August 2008 1 Introduction... 3 1.1 What is T1/E1 technology?... 3 2 Point-to-Point Protocol (PPP) connections... 4 2.1

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection? FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...

More information

Authentication Node Configuration. WatchGuard XTM

Authentication Node Configuration. WatchGuard XTM Authentication Node Configuration WatchGuard XTM Author: Signify Issue: Version 1.0 Date: xx Month 2013 Contents Introduction... 4 Configuration Prerequisites... 4 Knowledge and Access Rights... 4 Infrastructure...

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services

More information

uturenet & its Document Imaging Services

uturenet & its Document Imaging Services F uturenet & its Document Imaging Services FutureNet Technologies Corporation has become a vital player in the healthcare information management industry. Founded in 1996, FutureNet was formed for the

More information

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support Software Announcement June 1, 2004 Services Expedite software adds Secure Sockets Layer TCP/IP support Overview Services Expedite software for Microsoft Windows, AIX, and OS/400 is being enhanced to support

More information

OFTP / OFTP2 Data and Parameter Sheet Communication parameter for establishing partner links Last updated: 30. May 2010

OFTP / OFTP2 Data and Parameter Sheet Communication parameter for establishing partner links Last updated: 30. May 2010 1. General information This page has to be filled in for establishing an connection as well as for an connection. Company address (name and address) Contact Data exchange SSID SFID Password Supported OFTP

More information

Samsung Security Solutions

Samsung Security Solutions Print with confidence Samsung Security Solutions For Every Business A4 to A3 Mono to Colour MFPs to Printers Samsung Security Features You may not realise it, but every business can benefit from security.

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST

TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 WHAT IS OFTP?... 3 1.2 HOW DOES IT WORK?... 3

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

Student Halls Network. Connection Guide

Student Halls Network. Connection Guide Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to

More information

Linksys Gateway SPA2100-SU Manual

Linksys Gateway SPA2100-SU Manual Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your

More information

BT Remote Internet. Internet Teleworker. Customer Service Description. June 04. Issue 1. Internet Teleworker Customer Service Description.

BT Remote Internet. Internet Teleworker. Customer Service Description. June 04. Issue 1. Internet Teleworker Customer Service Description. BT Remote Internet Internet Teleworker June 04 2003 BT TABLE OF CONTENTS 1 INTRODUCTION...3 2 SERVICE SUMMARY...3 3 BENEFITS...4 3.1 SERVICE FEATURES...4 3.2 COVERAGE...4 4 FEATURES...5 4.1 INTERNET TELEWORKER...5

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

Voice over IP for small companies and offices. HiPath BizIP. www.siemens.com/hipath

Voice over IP for small companies and offices. HiPath BizIP. www.siemens.com/hipath Voice over IP for small companies and offices HiPath BizIP www.siemens.com/hipath HiPath BizIP Just Communicate! The countdown is over. Are you revving up your company, changing processes or wanting to

More information

PAYE Online for Employers EDI. Electronic Data Interchange (EDI) EB2 (PAYE) Information Pack

PAYE Online for Employers EDI. Electronic Data Interchange (EDI) EB2 (PAYE) Information Pack PAYE Online for Employers Electronic Data Interchange (EDI) EB2 (PAYE) 1. Glossary 2. Introduction 3. Background 3.1 What is filing digitally? 4. EDI 4.1 What is EDI? 4.2 Who can use EDI? 5. Benefits 5.1

More information

Leased Lines Terms and Conditions

Leased Lines Terms and Conditions Leased Lines Terms and Conditions By using the ( Service ), or any services of Orbital Net Ltd, you are agreeing to be bound by the following terms and conditions. 1. DEFINITIONS These Specific Terms and

More information

Multi Source Input Multi Channel Output

Multi Source Input Multi Channel Output O U T P U T M A N A G E M E N T PLOSSYS netdome Document Output Management Print and electronic distribution Large and small size formats Text and graphics Single and bulk printing Spooling Conversion

More information

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0 Creating a System DSN for Crystal Reports to Access a Sentinel Server Database Configuration Guide Version 1.0 July 2007 Configuration Guide Part Number: 62-14332000, V1.0 Copyright 1995-2007 Ringdale

More information

Network support for tele-education

Network support for tele-education Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

BlackShield ID Best Practice

BlackShield ID Best Practice BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication

More information

Regular data supply and partner data management in the cloud

Regular data supply and partner data management in the cloud Strategies for controlling the flood of development data: Regular data supply and partner data management in the cloud Ralf Luithardt (SSC-Services GmbH), Dr. Anna Wasmer (PDTec AG) Globalisation and the

More information

A) Secure Virtual Private Network (VPN) access services.

A) Secure Virtual Private Network (VPN) access services. Technical Guideline for Virtual Private Network access services This document is continually updated from on going feedback for all. Please send to wannoc@doit.co.contra-costa.ca.us. This document is located

More information

R&S IP-GATE IP gateway for ISDN encryption devices

R&S IP-GATE IP gateway for ISDN encryption devices Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for ISDN encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the most recent models of the R&S MKS9680 and

More information

Cisco Configuration Assistant

Cisco Configuration Assistant Cisco Configuration Assistant Configuring a Small Business s Entire Routing, Switching, Wireless, Security, and Voice Network with a Single, Easy-to-Use Tool. Today s businesses depend more than ever on

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Remote Connection Options For Monitoring, Troubleshooting and Maintenance of Control Devices for OEM Machine Builders

Remote Connection Options For Monitoring, Troubleshooting and Maintenance of Control Devices for OEM Machine Builders White Paper Remote Connection Options For Monitoring, Troubleshooting and Maintenance of Control Devices for OEM Machine Builders INSYS Microelectronics Coventry United Kingdom Introduction: Each year

More information

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe

More information

meetings, presentations, training sessions and teamwork

meetings, presentations, training sessions and teamwork More than 100 million users The friendly all-in-one solution for meetings, presentations, training sessions and teamwork Simple and convenient via the Internet Online meetings and presentations Using time

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Intelligent Solutions for the Highest IT Security Requirements

Intelligent Solutions for the Highest IT Security Requirements Intelligent Solutions for the Highest IT Security Requirements 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected

More information

Web Authentication Application Note

Web Authentication Application Note What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

ipass FAQs Q: What is ipass? Q: Who should use ipass? Q: How do I get ipassconnect? When can I start using it?

ipass FAQs Q: What is ipass? Q: Who should use ipass? Q: How do I get ipassconnect? When can I start using it? ipass FAQs Q: What is ipass? A: The ipass service provides local dialup and wireless internet access in most cities and towns within the USA and many locations throughout the world. Many of these locations

More information

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers

More information

ADSL MODEM. User Manual V1.0

ADSL MODEM. User Manual V1.0 ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...

More information

Implementing a Microsoft Windows 2000 Network Infrastructure

Implementing a Microsoft Windows 2000 Network Infrastructure Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing

More information

Managing Central Monitoring in Distributed Systems

Managing Central Monitoring in Distributed Systems Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle

More information

Magna IT EDI services. Supplier Implementation guideline for Electronic data interchange

Magna IT EDI services. Supplier Implementation guideline for Electronic data interchange Magna IT EDI services Supplier Implementation guideline for Electronic data interchange Version 1.0 05.11.2009 Version history version date comment author reviewed 1.0 05.11.2009 Initial release Stefan

More information

OpenScape Web Collaboration

OpenScape Web Collaboration OpenScape Web Collaboration Performance-boosting collaboration and secure support for teams from anywhere OpenScape Web Collaboration is a scalable, reliable, and highly secure web conferencing solution

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring A White Paper from the Experts in Business-Critical Continuity TM Executive Summary With continued efforts to reduce overhead,

More information

The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private

The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private 1. Policy Overview The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private Network (VPN) connections to the University of Dammam network. 1.1. Purpose University

More information

Procedural use of global standards for logistics

Procedural use of global standards for logistics Procedural use of global standards for logistics Roadshow: 03.06.2014 Wolfsburg, 05.06.2014 Ingolstadt Matthias Lühr (LLX/B) Information logistics as success factor in the logistical supply chain Globalisation

More information

Experiment # 6 Remote Access Services

Experiment # 6 Remote Access Services Experiment # 6 Remote Access Services 7-1 : Introduction Businesses today want access to their information anywhere, at any time. Whether on the road with customers or working from home, employees need

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information

In this section you will find information on the following services:

In this section you will find information on the following services: Virtual private network OVERVIEW In this section you will find information on the following services: VPN Remote User: Secure VPN Remote User allows your employees to access your business information while

More information

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services Standard Information Communications Technology January2013 Version 1.4 Corporate and Information Services Document details Document Title Contact details File name Version 1.4 Document Control Information

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information