GS1 Trade Sync Connectivity guide

Size: px
Start display at page:

Download "GS1 Trade Sync Connectivity guide"

Transcription

1 GS1 Trade Sync Connectivity guide Date: Version: v1.8

2 Page: 2/17

3 Revision history Version Date Description Author Initial version Fernando Pereira Added FTP and SFTP Fernando Pereira Add link to download digital certificates Added explicitly port numbers; Added outgoing IP Address to preproduction environment Added supported encryptions and hashing algorithms Corrected AS2 URLs to all environments Added Outgoing IP address Corrected preprod https url Fernando Pereira Fernando Pereira Fernando Pereira Fernando Pereira Fernando Pereira Fernando Pereira New digital certificate Diogo Malheiro Page: 3/17

4 Content GS1 Trade Sync - Connectivity guide 1 Overview Contacts Connectivity Information AS Definition Configuration: Production Environment Configuration: Pre-Production Environment Recommendations Information needed from the partner File Transfer Protocol (FTP) Definition Configuration Recommendations Information needed from the partner Secure File Transfer Protocol (SFTP) Definition Configuration Recommendations Information needed from the partner Outgoing IP Addresses Pre-Production Environment Production Environment Digital certificates Connectivity Test Procedure Connectivity to GS1Trade Sync Setup Acknowledge for the setup in GS1Trade Sync Connectivity tests Confirmation Page: 4/17

5 1 Overview The aim of this document is to describe and document the methods in which GS1 Trade Sync users may exchange information with the system, guiding the user through the setup and testing process used to connect to GS1 Trade Sync. This documents starts by providing the adequate contact information for both connectivity and non-connectivity support issues. Chapter 3 provides all GS1 Trade Sync connectivity details for the supported protocols. Chapter 4 describes the process a partner has to follow in order to test and establish a connection with GS1 Trade Sync. Page: 5/17

6 2 Contacts For any maintenance, support question or other issues regarding GS1 Trade Sync, use the following contact information: Tel: Fax: For any GS1 Trade Sync connectivity tests, technical questions regarding the communication to and from GS1 Trade Sync, use the following contact information: Tel: Fax: URL: Address: Rua Víriato, nº 13, 6º Andar Lisboa Portugal Page: 6/17

7 3 Connectivity Information GS1 Trade Sync supports 3 different connection types, which users and third party systems can choose from. Depending on the connection type chosen, the URL/Address used to send data are slightly different, and a digital certificate may be required. You will use the same connection for both sending and receiving information. Next table summarizes the information of each one of the connection type, for both the Pre-Production and the Production environments. Protocol Environment Addresses/URLs Signed Encrypted Compressed MDN AS2 over HTTP Prod Pre Prod AS2 over HTTPS Prod Pre Prod Table 1: Connectivity information summary The following subsections describe the specific characteristics of each one of the above protocols. 3.1 AS Definition Applicability Statement 2 (AS2) is an Electronic Data Interchange over the Internet (EDIINT) specification that uses a well-known standard using HTTP, or HTTPS, to transport data. EDIINT is a working group of the Internet Engineering Task Force (IETF) that develops secure and reliable business communications standards. The AS2 specification supports EDI or any other data transmittals over the internet using HTTP or HTTPS. AS2 is a specification about how to transport data, not how to validate or process data. AS2 specifies the means to connect, deliver, validate and reply to (receipt) data in a secure and reliable way. The data is then dispatched to the appropriate processor based upon its content-type. AS2 makes no specification about how that dispatch or subsequent processing is accomplished. Security is achieved by the digital signature and/or encryption of the message, for which the usage of digital certificates is mandatory. Additionally it can be done over HTTPS which add an additional encryption layer. Reliability is achieved by the exchange of Message Delivery Notifications (MDN), combined with re-try and re-send mechanisms, allowing the full control of the interchanges performed or in error. Users can send messages to GS1 Trade Sync using any AS2 compliant tool. For information on AS2 compliant tools refer to: Page: 7/17

8 3.1.2 Configuration: Production Environment URL for HTTP: Port: 80 URL for HTTPS: Port: 443 AS2 Identifier: MDNs: Supported both synchronous and asynchronous MDNS. Asynchronous MDNS are sent in 5 minutes time intervals; see 3.2 File Transfer Protocol (FTP) Definition File Transfer Protocol (FTP) is a standard network protocol used to transfer files over TCP-based networks. FTP is built on client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text signin protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it Configuration This is a case by case configuration. User has to provide access to an FTP server, with an appropriate account, where the system can retrieve and place information. Outgoing IP Addresses: Recommendations The usage of this protocol should be avoided, since it is not a secure protocol and it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a FTP connection we need the following information from the partner: Company Name; Server address; Port number; Mode: passive or active; Port range; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Page: 8/17

9 3.2 Secure File Transfer Protocol (SFTP) Definition The Secure File Transfer Protocol (known also as SSH File Transfer Protocol) is a network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capability, but is also intended to be usable with other protocols. The IETF Internet Draft states that even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol Configuration This is a case by case configuration. User has to provide access to an SFTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a SFTP connection we need the following information from the partner: Company Name; Server address; Port number; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Outgoing IP Addresses Page: 9/17

10 Retries: Resends: Hashing and Encryption methods 1 attempt per hour during 3 hours (when no successful http connection made, meaning no HTTP 200 code received); 1 attempts per hour during 3 hours (when the document was successfully posted, meaning successful HTTP connection and 200 code received, but no MDN received); SHA1 and Triple DES Configuration: Pre-Production Environment URL for HTTP: Port: 80 URL for HTTPS: Port: 443 AS2 Identifier: MDNs: Supported both synchronous and asynchronous MDNS. Asynchronous MDNS are sent in 5 minutes time intervals; see 3.3 File Transfer Protocol (FTP) Definition File Transfer Protocol (FTP) is a standard network protocol used to transfer files over TCP-based networks. FTP is built on client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text signin protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. Outgoing IP Addresses: Configuration This is a case by case configuration. User has to provide access to an FTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it is not a secure protocol and it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a FTP connection we need the following information from the partner: Company Name; Page: 10/17

11 Server address; Port number; Mode: passive or active; Port range; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; 3.3 Secure File Transfer Protocol (SFTP) Definition The Secure File Transfer Protocol (known also as SSH File Transfer Protocol) is a network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capability, but is also intended to be usable with other protocols. The IETF Internet Draft states that even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol Configuration This is a case by case configuration. User has to provide access to an SFTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a SFTP connection we need the following information from the partner: Page: 11/17

12 Company Name; Server address; Port number; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Outgoing IP Addresses Retries: Resends: Hashing and Encryption methods 1 attempt per hour during 3 hours (when no successful http connection made, meaning no HTTP 200 code received); 1 attempt per hour during 3 hours (when the document was successfully posted, meaning successful HTTP connection and 200 code received, but no MDN received); SHA1 and Triple DES Recommendations Our recommendation is to use AS2 via HTTP protocol with message encryption and signature. This combination provides a secure and reliable connection without the overhead required by HTTPS Information needed from the partner In order to establish an AS2 connection we need the following information from the partner: Company Name AS2 Identification URL User id and password if applicable Outgoing IP addresses Digital certificate Administrative contact for connectivity issues; Page: 12/17

13 3.4 File Transfer Protocol (FTP) Definition File Transfer Protocol (FTP) is a standard network protocol used to transfer files over TCPbased networks. FTP is built on client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a cleartext sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it Configuration This is a case by case configuration. User has to provide access to an FTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it is not a secure protocol and it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a FTP connection we need the following information from the partner: Company Name; Server address; Port number; Mode: passive or active; Port range; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Page: 13/17

14 3.5 Secure File Transfer Protocol (SFTP) Definition The Secure File Transfer Protocol (known also as SSH File Transfer Protocol) is a network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capability, but is also intended to be usable with other protocols. The IETF Internet Draft states that even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol Configuration This is a case by case configuration. User has to provide access to an SFTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a SFTP connection we need the following information from the partner: Company Name; Server address; Port number; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; 3.6 Outgoing IP Addresses Pre-Production Environment For HTTP based protocols we have the following outgoing IP Addresses: Page: 14/17

15 Production Environment For HTTP based protocols we have the following outgoing IP Addresses: Digital certificates Download digital certificates, for all GS1 Trade Sync environments, from here, or copy and paste the following URL into your browsers address bar: Credentials (case sensitive): User: saphsync-cert Pass: saphety.123! Download the file SaphetySyncCert.zip, which contains the digital certificate to use (saphetysyncas2_2017.cer) as well as the entire certification chain (the other two *.cer files). Page: 15/17

16 4 Connectivity Test Procedure In order to initiate exchange information with GS1Trade Sync production environment, it is necessary that you as a user perform a set of connectivity tests that will guarantee the correct setup between the systems. Premises: Partners connecting for the first time have to perform connectivity test with Pre- Production environment; Only after having successfully passed connectivity tests in Pre-Production, partner can initiate the document exchange in the Pre-Production environment. The process for the validating process is described in the GS1Trade Sync Setup Guide. After you have received acceptance from GS1 Denmark on the message validation you can begin connectivity tests to the Production environment. You are only allowed to exchange documents with production environment after having passed the connectivity tests, in both Pre-Production and Production, and after GS1 Denmark confirmation that are listed above. Page: 16/17

17 4.1 Connectivity to GS1Trade Sync Setup Configure your communication system with the information provided in chapter 3 - Connectivity Information. Check list for the setup: If using AS2: a. Digital certificates are installed and configured? In section 3.7 are all the certificates for all the environments. b. Network and firewalls configuration allow traffic from and to GS1Trade Sync servers? See the 3.5 section for GS1Trade Sync outgoing ip's, which should be enabled for inbound in your firewalls, if using AS2 protocol. For outbound you only need to allow the specific environment address, if using AS2 protocol. c. Configure digital signature and encryption; d. MDNs are required, so configure your system to request them. If using SFTP or FTP: o o o Accounts are created with correct data; Given paths are available; Privileges for the given folders are correct; Acknowledge for the setup in GS1Trade Sync Wait for acknowledge from Saphety that we have finished the setup on our side with the parameters supplied by you. This should be completed within 3 working days from the arrival of the filled in customer information document that is supplied at chapter 6 in the GS1Trade Sync Setup Guide Connectivity tests Sending to GS1Trade Sync: on the agreed test date perform the following steps a. Partner sends a meaningless file (not XML file); b. Partner check and guarantee that positive MDN has been received (AS2 only); c. Partner ask confirmation that it has been received by GS1Trade Sync (use contacts on chapter 2); d. In case of problems inform GS1 Denmark contact and schedule a new test. Receiving from GS1Trade Sync: on the agreed test date perform the following steps a. GS1Trade Sync sends a mean less file (not XML file). b. Partner is contacted by GS1Trade Sync in order to validate if the meaningless file has been received. In this contact GS1Trade Sync will indicate if MDN was received or not, only applicable for AS2. c. Partner must check and confirm the reception of the file and the delivery of the MDN back to GS1Trade Sync. d. In case of problems inform GS1Trade Sync contact and schedule a new test Confirmation Connectivity tests are considered successful when both partner and GS1 Denmark have confirmed that the communication is working correctly in both directions. GS1 Denmark will inform you when you have been confirmed finished with the communication tests and are ready to start the validating process. Page: 17/17

Royal Mail Business Integration Gateway Specification

Royal Mail Business Integration Gateway Specification FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail

More information

II. Implementation and Service Information

II. Implementation and Service Information II. Implementation and Service Information A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Shipping Services Files (SSF) Secure File Transmission Account Setup

Shipping Services Files (SSF) Secure File Transmission Account Setup Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks

More information

AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010

AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 18-Nov-2010, Issue 1 All contents copyright GS1 Page 1 of 19 Document Summary Document Item Document Title Date Last Modified Current

More information

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxies. Chapter 4. Network & Security Gildas Avoine Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Introduction to Computer Security Benoit Donnet Academic Year 2015-2016

Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter

More information

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer) FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

FTP Peach Pit Data Sheet

FTP Peach Pit Data Sheet FTP Peach Pit Data Sheet Peach Fuzzer, LLC v3.6.94 Copyright 2015 Peach Fuzzer, LLC. All rights reserved. This document may not be distributed or used for commercial purposes without the explicit consent

More information

Methods available to GHP for out of band PUBLIC key distribution and verification.

Methods available to GHP for out of band PUBLIC key distribution and verification. GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and

More information

Install and configure SSH server

Install and configure SSH server Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Net Solutions WEB-EDI

Net Solutions WEB-EDI Net Solutions WEB-EDI Solution Documentation NET SOLUTIONS PAGE 1 OF 10 Table of Contents 1 INTRODUCTION 3 2 BUSINESS CONTEXT 4 2.1 GENERAL 4 2.2 EDI IMPLEMENTATION DIFFICULTIES 4 2.3 NET SOLUTIONS WEB-EDI

More information

OCS Virtual image. User guide. Version: 1.3.1 Viking Edition

OCS Virtual image. User guide. Version: 1.3.1 Viking Edition OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...

More information

GS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide

GS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide GS1 Newcomers to AS2 Implementation Guide Issue 1, 23-June-2008 23-June-2008, Issue 1 All contents copyright GS1 2008 Page 1 of 14 Document Summary Document Item Document Title Date Last Modified Current

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone

More information

Pre-configured AS2 Host Quick-Start Guide

Pre-configured AS2 Host Quick-Start Guide Pre-configured AS2 Host Quick-Start Guide Document Version 2.2, October 19, 2004 Copyright 2004 Cleo Communications Refer to the Cleo website at http://www.cleo.com/products/lexihubs.asp for the current

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

SECURE FTP CONFIGURATION SETUP GUIDE

SECURE FTP CONFIGURATION SETUP GUIDE SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients

More information

Pre Sales Communications

Pre Sales Communications Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

How to setup FTP and Secure FTP for XD Series

How to setup FTP and Secure FTP for XD Series How to setup FTP and Secure FTP for XD Series Use the following steps prior to enabling support for FTP services on XD Series: 1) Create NAS volume and Share(s) 2) Create Users and Groups 3) Select an

More information

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.

More information

AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS

AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS Family Feud: AS2 Versus the Clan Selecting the Right Option for Your

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

athenahealth Interface Connectivity SSH Implementation Guide

athenahealth Interface Connectivity SSH Implementation Guide athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6

More information

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Central Desktop Enterprise Edition (Security Pack)

Central Desktop Enterprise Edition (Security Pack) Central Desktop Enterprise Edition (Security Pack) The Central Desktop Security Pack is included in the Enterprise Edition of Central Desktop. The Enterprise Edition is for companies and organizations

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

The LRS File Transfer Service offers a way to send and receive files in a secured environment

The LRS File Transfer Service offers a way to send and receive files in a secured environment File Transfer Service The LRS File Transfer Service offers a way to send and receive files in a secured environment using HTTPS or FTPS. It also supports unsecured standard FTP transfers. The service supports

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com Dgw v2.0 May 14, 2015 www.media5corp.com Table of Contents Configuration Backup and Restore... 3 File Servers... 4 Configuring the FTP Server...4 Configuring the TFTP Server...4 Configuring the HTTP Server...

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram

More information

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0 ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.

More information

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the

More information

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Deploying the BIG-IP System with Oracle E-Business Suite 11i Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc. XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

CASHNet Secure File Transfer Instructions

CASHNet Secure File Transfer Instructions CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

ACCREDITED SOLUTION. EXPLORER Core FTP

ACCREDITED SOLUTION. EXPLORER Core FTP ACCREDITED SOLUTION EXPLORER Core FTP Document Name: EXPLORER Core FTP Revision: B Introduction: Typical Users: Product Description: This document describes the Core FTP (File Transfer Protocol) software

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Secure FTP. Client user guide. Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc

Secure FTP. Client user guide. Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc Secure FTP Client user guide Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc Steria A/S, Tonsbakken 16-18, 2740 Skovlunde, Denmark Phone +45 4450 6000, Fax

More information

Corporate Access File Transfer Service Description Version 1.0 01/05/2015

Corporate Access File Transfer Service Description Version 1.0 01/05/2015 Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

Setting Up Email on Your Palm. Treo 700wx Smartphone

Setting Up Email on Your Palm. Treo 700wx Smartphone Setting Up Email on Your Palm Treo 700wx Smartphone Intellectual property notices 2006 Palm, Inc. All rights reserved. Trademark, copyright, patent, and other intellectual property notices are set forth

More information

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol) FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP file transfer protocols for Claims, POC, and Medical EDI transmissions. SFTP

More information

SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective:

SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective: AG041410 SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective: Determine how to configure the RD500 and your PSTN or GSM modem APPLICATION

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

Communication Security for Applications

Communication Security for Applications Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

More information

CreationDirect. Clearstream file transfer connectivity solutions

CreationDirect. Clearstream file transfer connectivity solutions CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

TECHNICAL NOTE TNOI27

TECHNICAL NOTE TNOI27 TECHNICAL NOTE TNOI27 Title: FTP Synchronization Product(s): G3, DSP and Enhanced Modular Controller ABSTRACT The purpose of this document is to describe the G3 s FTP feature and the configuration steps

More information

Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE

Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address

More information

New GoAnywhere File Transfer Set Up Tasks

New GoAnywhere File Transfer Set Up Tasks New GoAnywhere File Transfer Set Up Tasks 1 Task Name Comments Assigned To Duration NEW GO ANYWHERE FILE TRANSFER SETUP TASKS 2 STANDARDS 3 4 PCSSC will be encrypting all files whether they contain PII

More information

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password

More information

smartoci User Guide Secure FTP for Catalog Loads

smartoci User Guide Secure FTP for Catalog Loads smartoci User Guide Secure FTP for Catalog Loads INTELLECTUAL PROPERTY RIGHT INFORMATION Copyright NetSol Technologies North America, Inc. All Rights Reserved. NetSol, the Netsol logo, smartoci, and the

More information

AS2 AND EDI OVER THE INTERNET FAQ

AS2 AND EDI OVER THE INTERNET FAQ AS2 AND EDI OVER THE INTERNET FAQ A SoftCare EC Inc. White Paper ABOUT SOFTCARE Founded in 1989 and headquartered in British Columbia, SoftCare EC Inc. develops e-business software. Our OpenEC product

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

DSI File Server Client Documentation

DSI File Server Client Documentation Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software

More information

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

File Transmission Methods Monday, July 14, 2014

File Transmission Methods Monday, July 14, 2014 Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and

More information

This feature is available on the AppWall standalone and AppWall VA devices. It is not available on the AppWall module within Alteon.

This feature is available on the AppWall standalone and AppWall VA devices. It is not available on the AppWall module within Alteon. AppWall (Web Application Firewall) Policy Distribution Feature Using the AppWall Policy Distribution mechanism you can either export or import a configuration, or distribute a full policy or just one application

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Using the BranchCache feature in Forefront TMG SP1 Abstract In this

More information

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

OSF INTEGRATOR for. Integration Guide

OSF INTEGRATOR for. Integration Guide OSF INTEGRATOR for DEMANDWARE and MICROSOFT DYNAMICS CRM 2013 Integration Guide Table of Contents 1 Summary... 3 2 Component Overview... 3 2.1 Functional Overview... 3 2.2 Integration components... 3 2.3

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust. Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery

More information

Directory and File Transfer Services. Chapter 7

Directory and File Transfer Services. Chapter 7 Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major

More information

Security Overview Introduction Application Firewall Compatibility

Security Overview Introduction Application Firewall Compatibility Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Sophos UTM. Remote Access via SSL. Configuring UTM and Client

Sophos UTM. Remote Access via SSL. Configuring UTM and Client Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information