Safe Financials Limited. The CREST Simulator. File Transfer Overview and SFL Gateway
|
|
- Violet Manning
- 8 years ago
- Views:
Transcription
1 Safe Financials Limited Ascension House 2 nd Floor First Avenue Burton on Trent DE14 2WW Tel : Web : enquiries@safefinancials.co.uk The CREST Simulator File Transfer Overview and SFL Gateway A document including: An overview of file transfer An overview of the SFL CREST SimGateway application Secure file transfer options and description The SFL program manager Date Author Status Approved by Approved Internal / Document Name Date External 29/10/04 Mark Brown Release External SFL CREST SimGateway Overview.doc
2 CONTENTS CONTENTS 2 INTRODUCTION 3 Simulator Overview 3 FILE TRANSFER OVERVIEW 4 Overview 4 Test System Connectivity 4 Gateways and Connections 4 Single Gateway Setup 4 Multiple Gateway Setup 5 Multiple Connections Setup 5 File Transfer Protocols 6 Plain FTP 6 Firewall Port Requirements for FTP 6 SSL Enabled FTPS 6 Firewall Port Requirements for FTPS 6 Secure Shell SFTP (SSH2-SFTP) 7 Firewall Port Requirements for SFTP 7 Connectivity Options 7 SFL CREST SIMGATEWAY APPLICATION 8 Program Views and Modes 8 THE SFL PROGRAM MANAGER 11 Overview 11 Automatic Updates 11 SimGateway Monitoring and Start-up 11 The anatomy of the SFL Program Manger 11 CONFIGURATION 13 INI Files 13 File TranSfer Overview File Transfer Protocols Page 2 of 13
3 INTRODUCTION Simulator Overview The CREST Simulator mimics the live CREST environment including the secure networks provided by Swift, Syntegra and the LSE. The main difference is the Simulator service is supplied over the internet rather than through a private network. Although the customer may provide their own solution for file transfer, the majority of SFL s customers utilise the SFL CREST SimGateway. The SFL CREST SimGateway is a Windows application that manages the transfer of files between local and remote locations. This document provides an overview of that application. File TranSfer Overview File Transfer Protocols Page 3 of 13
4 FILE TRANSFER OVERVIEW Overview The basic objective of the file transfer software is to transfer files from one local location to another remote location using a file transfer protocol. SFL have developed the SFL SimGateway application to transfer files using the following methods; Swift : In and out directories Syntegra : Transmit/receive directories LSE : Various To facilitate all customers, the SFL software is highly customisable. It can be easily configured for most setups. Within the CREST environment, the SFL software picks up files from the test system and sends them to SFL. The SimGateway then picks up the processed files and deposits them back on the test system waiting for them. Test System Connectivity The SFL SimGateway sits on a Microsoft Windows PC 1 and connects to the customers test system or environment through the following methods; Shared, or mapped drive presented on the Windows PC The SimGateway is configured with the mapped drive path for its local files. NFS presented as a shared drive on the Windows PC As above. FTP The SimGateway application is configured to handle two connections (gateways). One connection/gateway manages the transfer of files between the local pc and the remote test system. The second connection/gateway manages the transfer of files between the local pc and the remote CREST Simulator service. Gateways and Connections Each local to remote connection process is termed a Gateway. The SFL application is used to transfer files between one or more customer test systems using one or more configured gateways. Single Gateway Setup The normal installation includes the SFL application controlling one gateway. This gateway controls the transfer of files between the customer and SFL. The following diagram depicts a single gateway, single connection environment: 1 The software support, Windows 2000, 2000 Server, 2003 server, XP and fully patched versions of NT workstation and server. File TranSfer Overview File Transfer Protocols Page 4 of 13
5 Single test system connection with mapped /NFS drive to back office connection Client controlled FTP to SFL INTERNET Client controlled FTP to SFL Workstation running SFL CREST SimGATEWAY 1 Gateway for 2SFL Process Customer Firewall Opened ports : FTP / SFTP / FTPS SFL Firewall Opened ports : FTP / SFTP / FTPS SFL SECURE FILE TRANSFER PORTAL ftp.safefinancials.co.uk BACKOFFICE TEST SYSTEM E.g. FIGARO, GLOSS, FISCAL, TAROT Multi-user testing system SHARED DRIVE/NFS ACCESS to CREST FILE DIRECTORIES SFL CREST Simulator Environment IBM iseries Multiple Gateway Setup In some cases, the file transfer process between the test system and the SFL CREST Simulator can only be achieved through the use of multiple gateways. One gateway is configured to transfer the files from the back office system and a second gateway to transfer the same files to the remote SFL CREST Simulator internet portal. The running application will manage the transfer of files for both gateways. The following depicts a single connection, multiple gateway set-up: Single test system connection with additional FTP Gateway to back office SFL CREST SimGATEWAY 2 Gateways managed. 1=To-Backoffice 2=To-SFL Client controlled FTP to SFL GATEWAY 2 To- SFL Process GATEWAY 1 : To-Backoffice process Customer Firewall Opened ports : FTP / SFTP / FTPS INTERNET Client controlled FTP to SFL SFL Firewall Opened ports : FTP / SFTP / FTPS SFL SECURE FILE TRANSFER PORTAL ftp.safefinancials.co.uk BACKOFFICE TEST SYSTEM E.g. FIGARO, GLOSS, FISCAL, TAROT Multi-user testing system FTP to BO File stored locally on worksations SFL CREST Simulator Environment IBM iseries Multiple Connections Setup The CREST Simulator and CREST SimGateway can support multiple customer environments. I.e. concurrent CREST Simulation for the following environment uses; Unit test System test UAT (user test) Pre-production test Training and other environments The same file transfer application can be used to control the entire process. File TranSfer Overview File Transfer Protocols Page 5 of 13
6 Multiple connections to the Simulator SFL CREST SimGATEWAY Gateway 1 : UAT 2 Gateways - UAT - Training Gateway 1 Gateway 2 Gateway 2 : TRAINING Customer Firewall Opened ports : FTP / SFTP / FTPS INTERNET SFL Firewall Opened ports : FTP / SFTP / FTPS SFL SECURE FILE TRANSFER PORTAL ftp.safefinancials.co.uk UAT TEST SYSTEM TRAINING SYSTEM SFL CREST Simulator Environment IBM iseries File Transfer Protocols The normal protocol for file transfer between systems is FTP. This is a simple protocol used to send files internally or across WANs. The only drawback with FTP over the Internet is that the communications are unsecured and are authenticated using plain text (unencrypted). However, for test systems, this is not a problem as the data being transmitted is fictitious test data. Although the majority of Simulator customers utilise normal FTP, some organisations no longer allow insecure file transfer. It is for that reason that the following protocols are supported by SFL. Plain FTP The straight forward unsecured file transfer protocol. Firewall Port Requirements for FTP The customer must allow outbound connections to the following IP ports; 20 and 21 for FTP to for passive mode ports SSL Enabled FTPS Secure Socket Layer (SSL) is a protocol for encrypting and decrypting data across a secure connection from a client to an SSL enabled server. In SFL s case, the SSL-enabled server is our secure FTP server. The process is secured through the use of digital certificates. The SFL SimGateway and secure FTP server supports both Explicit (Turn on) and Implicit (Always on) SSL negotiations. Firewall Port Requirements for FTPS The customer must allow outbound connections to the following IP ports; 20 and 21 for FTPS 990 for implicit SSL to passive mode ports File TranSfer Overview File Transfer Protocols Page 6 of 13
7 Secure Shell SFTP (SSH2-SFTP) The industry standard for secure access to remote systems. SSH2 is a protocol that combines strong authentication and encryption processes to allow various functions. The SFL SimGateway and secure FTP server utilises the SFTP subprotocol. This protocol is very similar to FTP in that it is used to transfer files between sites. The SSH and SFTP protocol utilises public and private keys. The server will only allow access from clients with known public keys. SFTP is much easier to route through a firewall as only one IP port is used. Firewall Port Requirements for SFTP The customer must allow outbound connections to the following IP ports; 22 for SSH2 Connectivity Options The majority of our customers utilise the Internet to connect through to our servers. However, in some cases we can support IPSEC VPN connections through our firewall. Once connected through a VPN, the same choice of protocols remain as described previously. File TranSfer Overview File Transfer Protocols Page 7 of 13
8 SFL CREST SIMGATEWAY APPLICATION Program Views and Modes This is the default running mode. It shows the key status information. Mini Mode View Stats and summary information Click to cycle through stats Start / Stop Green=Running Red=Stopped Maximise Screen Switch to Max view Current action Click to view file sizes Error light Click error text to view last error and clear the light Scanning/Retrieving status Click to view file sizes Secure session icon When the max button is clicked, the following main screen is displayed. The orange buttons along the top row change the view. Max View : Logging Program Views Support page Mini mode information Log details Colour coded for severity Clear screen Log View Log file All logging is also sent to a text file in the history directory Log options File TranSfer Overview File Transfer Protocols Page 8 of 13
9 Max View : File history File send, 2 to do Mini mode showing file send in progress File details Sent/received files. Click to view file contents Clear history Summary Examines all directories to show Overall status. I.e. no to send etc Max View : Gateway Configuration : LOGIN Details Stats field showing summary over last 10 mins Gateway configuration sub - views Login : Login details. Primary/secondary switch, secure config etc To remote: Transfer to remote site options From remote : Transfer from remote site options Misc options: Overall configuration options Operators : CREST operators for file transfer process File TranSfer Overview File Transfer Protocols Page 9 of 13
10 Max View : Program Configuration : File & Directory Program configuration sub-views File & Directory : Various options for controlling files. E.g. creating all operator directories Misc options: Autoupdate and shortcuts for viewing the INI files FTP transfer Options: Stats for the FTP process Time and schedule: Overall time options. E.g. schedule and operators timeslices File TranSfer Overview File Transfer Protocols Page 10 of 13
11 THE SFL PROGRAM MANAGER Overview The program manger application performs the following two tasks; Perform automatic updates Monitors and controls the starting and stopping of the SimGateway The program manger is configured from its own INI file found in the configuration directory. SFL_PGMmanager.ini Automatic Updates The SimGateway application can be configured to look for updates to itself and components. These components are automatically downloaded. The SFL Program Manger application will find these updates and prompt the user if it should apply the updates or not. SimGateway Monitoring and Start-up The program manger can be configured to start up multiple applications including SFL and none-sfl applications. The application will then monitor the status of the invoked application to ensure that the program has not crashed or has been stopped. If the program manager detects that an application has failed, it will be terminated and restarted. The anatomy of the SFL Program Manger The following are screen shots of the main screens; SFL Program Manger Log view File TranSfer Overview File Transfer Protocols Page 11 of 13
12 SFL Program Manger Process view SFL Program Manger Config view File TranSfer Overview File Transfer Protocols Page 12 of 13
13 CONFIGURATION INI Files The SFL SimGateway and SFL Program Manager applications are configured through the use of INI files. The INI files are read when the program starts and configure the program and all their sub processes/gateways. The programs do not update their own INI files. This means that any changes to the running program will be lost should the program be closed down and restarted. SFL will provide the customer with a working configuration based on the completed registration document. SFL are always on hand to help with any configuration changes. File TranSfer Overview File Transfer Protocols Page 13 of 13
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationThe following lists the main applications used at SFL. Most of these applications have various uses and are in operation across most of our servers.
SFL SOFTWARE GUIDE Introduction The following lists the main applications used at SFL. SFL Program Manager Simulator Gateway XCEED Version (used to be known as the channel processor) Simulator Gateway
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationRemote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
More informationInstallation and Connection Guide to the simulation environment GLOBAL VISION
Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationChapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
More informationSysax Multi Server User manual
Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationUsing SonicWALL NetExtender to Access FTP Servers
SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationSECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
More informationExternal Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
More informationHow To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip
WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need
More informationCampus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationDEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection
DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS Introduction I m InTouch is a personal remote access application that allows a user to access the data on his or her PC from a remote location,
More informationIBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide
IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This
More informationAllworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1
More informationImmotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationProjetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations
Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationCREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel
More informationCASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
More informationSophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationSophos UTM. Remote Access via IPsec Configuring Remote Client
Sophos UTM Remote Access via IPsec Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
More informationHow To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationConnecting an Android to a FortiGate with SSL VPN
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
More informationMCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Six Configuring Windows Server 2008 Web Services, Part 1 Objectives Create and configure Web
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationDevice Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
More informationWS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
More informationExternal Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationVPN Overview. The path for wireless VPN users
VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0
More informationRoyal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationWEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide
WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.
More informationImplementing and using the NetSupport Connectivity Server
Implementing and using the Connectivity Server Summary With the increased use of the internet, common questions asked by customers using Manager are: Can I connect to and remote control a machine behind
More informationAstaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
More informationConfiguring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
More informationCreationDirect. Clearstream file transfer connectivity solutions
CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking
More informationOvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6
WL/IP-8000VPN VPN Setup Guide Version 0.6 Document Revision Version Date Note 0.1 11/10/2005 First version with four VPN examples 0.2 11/15/2005 1. Added example 5: dynamic VPN using TheGreenBow VPN client
More informationXFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.
XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been
More informationSchoolBooking LDAP Integration Guide
SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your
More informationExport & Backup Guide
Eport & Backup Guide Welcome to the WebOffice and WorkSpace eport and backup guide. This guide provides an overview and requirements of the tools available to etract data from your WebOffice or WorkSpace
More informationTesting New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationfreesshd SFTP Server on Windows
freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone
More informationClick to begin. Maitre'D Full System Backup & Restore
Click to begin Maitre'D Full System Backup & Restore Full System Backup & Restore This document will guide you through the Backup of the Maitre D Database from a Source computer and the Restoration on
More informationHow to Tunnel Remote Desktop Through SSH on a Windows Computer
College of Engineering > Computing Resources > Computing Best Practices > W indows Remote Desktop How to Tunnel Remote Desktop Through SSH on a Windows Computer Why me and why now? CAE has been charged
More information[CERBERUS FTP SERVER 5.0 ]
2012 Cerberus, LLC Grant Averett [CERBERUS FTP SERVER 5.0 ] User manual for Cerberus FTP Server 5.0. It contains detailed steps and help on configuring Cerberus FTP Server. CONTENTS Introduction... 8 Description...
More informationInstall FileZilla Client. Connecting to an FTP server
Install FileZilla Client Secure FTP is Middle Georgia State College s supported sftp client for accessing your Web folder on Webdav howeve you may use FileZilla or other FTP clients so long as they support
More informationConfiguring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without
More informationAccess Instructions for United Stationers ECDB (ecommerce Database) 2.0
Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...
More informationExternal authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
More information[CERBERUS FTP SERVER 6.0]
2013 Cerberus, LLC Grant Averett [CERBERUS FTP SERVER 6.0] User manual for Cerberus FTP Server 6.0. It contains detailed steps and help on configuring Cerberus FTP Server. CONTENTS Introduction... 10 Description...
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationMediasite EX server deployment guide
Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationHUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD.
V100R011 Issue 02 Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
More informationInstallation Troubleshooting Guide
Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching
More informationJuniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista
Juniper NetScreen IPSec Dial Client Installation Guide for Windows 2000 Windows XP Windows Vista Revision 2.0 NetScreen is a registered trademark of Juniper, Inc. Windows is a registered trademark of Microsoft
More informationUSER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
More informationfor Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
More informationWorkflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using Digital Certificates For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 14 Establish Site-to-Site VPN Connection
More informationThe SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
More informationTECHNICAL SUPPORT GUIDE
TECHNICAL SUPPORT GUIDE INTRODUCTION This document has been developed to provide a guideline for assisting our clients and their technicians with a standard Console Gateway Live configuration. IS THIS
More informationWorkflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using RSA Keys For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 10 Establish Site-to-Site VPN Connection using
More informationTera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
More informationCitrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
More informationHOW TO RETRIEVE FILES FROM THE TARGET ANALYTICS FTP SITE
HOW TO RETRIEVE FILES FROM THE TARGET ANALYTICS FTP SITE Note: These instructions direct you to download a free secure FTP client called FileZilla. If you already use a secure client such as WS-FTP Pro
More informationHow To Industrial Networking
How To Industrial Networking Prepared by: Matt Crites Product: Date: April 2014 Any RAM or SN 6xxx series router Legacy firmware 3.14/4.14 or lower Subject: This document provides a step by step procedure
More informationUnifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
More informationMicrosoft Virtual Labs. Administering the IIS 7 File Transfer Protocol (FTP) Server
Microsoft Virtual Labs Administering the IIS 7 File Transfer Protocol (FTP) Server Table of Contents Exercise 1 Installing the Microsoft FTP Publishing Service for the IIS 7... 1 Exercise 2 Introducing
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationWS_FTP Professional 12 and WS_FTP Home 12. Getting Started Guide
WS_FTP Professional 12 and WS_FTP Home 12 Getting Started Guide Welcome Ipswitch WS_FTP Professional 12 and Home 12 is the leading file transfer client with millions of users worldwide. You can easily
More informationNetwork Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)
Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means
More informationShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
More informationConfiguring TheGreenBow VPN Client with a TP-LINK VPN Router
Configuring TheGreenBow VPN Client with a TP-LINK VPN Router This chapter describes how to configure TheGreenBow VPN Client with a TP-LINK router. This chapter includes the following sections: Example
More informationWindows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationDefender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
More informationUSER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
More informationFile Transfers. Contents
A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using
More informationHow To Configure Apple ipad for Cyberoam L2TP
How To Configure Apple ipad for Cyberoam L2TP VPN Connection Applicable to Version: 10.00 (All builds) Layer 2 Tunneling Protocol (L2TP) can be used to create VPN tunnel over public networks such as the
More informationImportant Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
More informationClearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Network Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationSSL VPN Portal Options
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationSSL Enforcer Documentation
SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,
More informationPaxera Uploader Basic Troubleshooting
Before going further, please check the logs and auto-route queue in the Uploader Control, these logs will say a lot about your problem. You should take care of the following before contacting our Support
More information