GS1 Trade Sync Connectivity guide
|
|
- Margaret Sherman
- 8 years ago
- Views:
Transcription
1 GS1 Trade Sync Connectivity guide Date: Version: v1.8
2 Page: 2/17
3 Revision history Version Date Description Author Initial version Fernando Pereira Added FTP and SFTP Fernando Pereira Add link to download digital certificates Added explicitly port numbers; Added outgoing IP Address to preproduction environment Added supported encryptions and hashing algorithms Corrected AS2 URLs to all environments Added Outgoing IP address Corrected preprod https url Fernando Pereira Fernando Pereira Fernando Pereira Fernando Pereira Fernando Pereira Fernando Pereira New digital certificate Diogo Malheiro Page: 3/17
4 Content GS1 Trade Sync - Connectivity guide 1 Overview Contacts Connectivity Information AS Definition Configuration: Production Environment Configuration: Pre-Production Environment Recommendations Information needed from the partner File Transfer Protocol (FTP) Definition Configuration Recommendations Information needed from the partner Secure File Transfer Protocol (SFTP) Definition Configuration Recommendations Information needed from the partner Outgoing IP Addresses Pre-Production Environment Production Environment Digital certificates Connectivity Test Procedure Connectivity to GS1Trade Sync Setup Acknowledge for the setup in GS1Trade Sync Connectivity tests Confirmation Page: 4/17
5 1 Overview The aim of this document is to describe and document the methods in which GS1 Trade Sync users may exchange information with the system, guiding the user through the setup and testing process used to connect to GS1 Trade Sync. This documents starts by providing the adequate contact information for both connectivity and non-connectivity support issues. Chapter 3 provides all GS1 Trade Sync connectivity details for the supported protocols. Chapter 4 describes the process a partner has to follow in order to test and establish a connection with GS1 Trade Sync. Page: 5/17
6 2 Contacts For any maintenance, support question or other issues regarding GS1 Trade Sync, use the following contact information: Tel: Fax: For any GS1 Trade Sync connectivity tests, technical questions regarding the communication to and from GS1 Trade Sync, use the following contact information: Tel: Fax: URL: Address: Rua Víriato, nº 13, 6º Andar Lisboa Portugal Page: 6/17
7 3 Connectivity Information GS1 Trade Sync supports 3 different connection types, which users and third party systems can choose from. Depending on the connection type chosen, the URL/Address used to send data are slightly different, and a digital certificate may be required. You will use the same connection for both sending and receiving information. Next table summarizes the information of each one of the connection type, for both the Pre-Production and the Production environments. Protocol Environment Addresses/URLs Signed Encrypted Compressed MDN AS2 over HTTP Prod Pre Prod AS2 over HTTPS Prod Pre Prod Table 1: Connectivity information summary The following subsections describe the specific characteristics of each one of the above protocols. 3.1 AS Definition Applicability Statement 2 (AS2) is an Electronic Data Interchange over the Internet (EDIINT) specification that uses a well-known standard using HTTP, or HTTPS, to transport data. EDIINT is a working group of the Internet Engineering Task Force (IETF) that develops secure and reliable business communications standards. The AS2 specification supports EDI or any other data transmittals over the internet using HTTP or HTTPS. AS2 is a specification about how to transport data, not how to validate or process data. AS2 specifies the means to connect, deliver, validate and reply to (receipt) data in a secure and reliable way. The data is then dispatched to the appropriate processor based upon its content-type. AS2 makes no specification about how that dispatch or subsequent processing is accomplished. Security is achieved by the digital signature and/or encryption of the message, for which the usage of digital certificates is mandatory. Additionally it can be done over HTTPS which add an additional encryption layer. Reliability is achieved by the exchange of Message Delivery Notifications (MDN), combined with re-try and re-send mechanisms, allowing the full control of the interchanges performed or in error. Users can send messages to GS1 Trade Sync using any AS2 compliant tool. For information on AS2 compliant tools refer to: Page: 7/17
8 3.1.2 Configuration: Production Environment URL for HTTP: Port: 80 URL for HTTPS: Port: 443 AS2 Identifier: MDNs: Supported both synchronous and asynchronous MDNS. Asynchronous MDNS are sent in 5 minutes time intervals; see 3.2 File Transfer Protocol (FTP) Definition File Transfer Protocol (FTP) is a standard network protocol used to transfer files over TCP-based networks. FTP is built on client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text signin protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it Configuration This is a case by case configuration. User has to provide access to an FTP server, with an appropriate account, where the system can retrieve and place information. Outgoing IP Addresses: Recommendations The usage of this protocol should be avoided, since it is not a secure protocol and it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a FTP connection we need the following information from the partner: Company Name; Server address; Port number; Mode: passive or active; Port range; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Page: 8/17
9 3.2 Secure File Transfer Protocol (SFTP) Definition The Secure File Transfer Protocol (known also as SSH File Transfer Protocol) is a network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capability, but is also intended to be usable with other protocols. The IETF Internet Draft states that even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol Configuration This is a case by case configuration. User has to provide access to an SFTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a SFTP connection we need the following information from the partner: Company Name; Server address; Port number; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Outgoing IP Addresses Page: 9/17
10 Retries: Resends: Hashing and Encryption methods 1 attempt per hour during 3 hours (when no successful http connection made, meaning no HTTP 200 code received); 1 attempts per hour during 3 hours (when the document was successfully posted, meaning successful HTTP connection and 200 code received, but no MDN received); SHA1 and Triple DES Configuration: Pre-Production Environment URL for HTTP: Port: 80 URL for HTTPS: Port: 443 AS2 Identifier: MDNs: Supported both synchronous and asynchronous MDNS. Asynchronous MDNS are sent in 5 minutes time intervals; see 3.3 File Transfer Protocol (FTP) Definition File Transfer Protocol (FTP) is a standard network protocol used to transfer files over TCP-based networks. FTP is built on client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text signin protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. Outgoing IP Addresses: Configuration This is a case by case configuration. User has to provide access to an FTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it is not a secure protocol and it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a FTP connection we need the following information from the partner: Company Name; Page: 10/17
11 Server address; Port number; Mode: passive or active; Port range; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; 3.3 Secure File Transfer Protocol (SFTP) Definition The Secure File Transfer Protocol (known also as SSH File Transfer Protocol) is a network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capability, but is also intended to be usable with other protocols. The IETF Internet Draft states that even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol Configuration This is a case by case configuration. User has to provide access to an SFTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a SFTP connection we need the following information from the partner: Page: 11/17
12 Company Name; Server address; Port number; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Outgoing IP Addresses Retries: Resends: Hashing and Encryption methods 1 attempt per hour during 3 hours (when no successful http connection made, meaning no HTTP 200 code received); 1 attempt per hour during 3 hours (when the document was successfully posted, meaning successful HTTP connection and 200 code received, but no MDN received); SHA1 and Triple DES Recommendations Our recommendation is to use AS2 via HTTP protocol with message encryption and signature. This combination provides a secure and reliable connection without the overhead required by HTTPS Information needed from the partner In order to establish an AS2 connection we need the following information from the partner: Company Name AS2 Identification URL User id and password if applicable Outgoing IP addresses Digital certificate Administrative contact for connectivity issues; Page: 12/17
13 3.4 File Transfer Protocol (FTP) Definition File Transfer Protocol (FTP) is a standard network protocol used to transfer files over TCPbased networks. FTP is built on client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a cleartext sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it Configuration This is a case by case configuration. User has to provide access to an FTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it is not a secure protocol and it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a FTP connection we need the following information from the partner: Company Name; Server address; Port number; Mode: passive or active; Port range; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; Page: 13/17
14 3.5 Secure File Transfer Protocol (SFTP) Definition The Secure File Transfer Protocol (known also as SSH File Transfer Protocol) is a network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capability, but is also intended to be usable with other protocols. The IETF Internet Draft states that even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications. This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol Configuration This is a case by case configuration. User has to provide access to an SFTP server, with an appropriate account, where the system can retrieve and place information Recommendations The usage of this protocol should be avoided, since it does not have acknowledgement mechanisms. Use only if not other possibility exists Information needed from the partner In order to establish a SFTP connection we need the following information from the partner: Company Name; Server address; Port number; User id ; Password; Path for GS1Trade Sync obtain the files to process; Path for GS1Trade Sync deliver files; Administrative contact for connectivity issues; 3.6 Outgoing IP Addresses Pre-Production Environment For HTTP based protocols we have the following outgoing IP Addresses: Page: 14/17
15 Production Environment For HTTP based protocols we have the following outgoing IP Addresses: Digital certificates Download digital certificates, for all GS1 Trade Sync environments, from here, or copy and paste the following URL into your browsers address bar: Credentials (case sensitive): User: saphsync-cert Pass: saphety.123! Download the file SaphetySyncCert.zip, which contains the digital certificate to use (saphetysyncas2_2017.cer) as well as the entire certification chain (the other two *.cer files). Page: 15/17
16 4 Connectivity Test Procedure In order to initiate exchange information with GS1Trade Sync production environment, it is necessary that you as a user perform a set of connectivity tests that will guarantee the correct setup between the systems. Premises: Partners connecting for the first time have to perform connectivity test with Pre- Production environment; Only after having successfully passed connectivity tests in Pre-Production, partner can initiate the document exchange in the Pre-Production environment. The process for the validating process is described in the GS1Trade Sync Setup Guide. After you have received acceptance from GS1 Denmark on the message validation you can begin connectivity tests to the Production environment. You are only allowed to exchange documents with production environment after having passed the connectivity tests, in both Pre-Production and Production, and after GS1 Denmark confirmation that are listed above. Page: 16/17
17 4.1 Connectivity to GS1Trade Sync Setup Configure your communication system with the information provided in chapter 3 - Connectivity Information. Check list for the setup: If using AS2: a. Digital certificates are installed and configured? In section 3.7 are all the certificates for all the environments. b. Network and firewalls configuration allow traffic from and to GS1Trade Sync servers? See the 3.5 section for GS1Trade Sync outgoing ip's, which should be enabled for inbound in your firewalls, if using AS2 protocol. For outbound you only need to allow the specific environment address, if using AS2 protocol. c. Configure digital signature and encryption; d. MDNs are required, so configure your system to request them. If using SFTP or FTP: o o o Accounts are created with correct data; Given paths are available; Privileges for the given folders are correct; Acknowledge for the setup in GS1Trade Sync Wait for acknowledge from Saphety that we have finished the setup on our side with the parameters supplied by you. This should be completed within 3 working days from the arrival of the filled in customer information document that is supplied at chapter 6 in the GS1Trade Sync Setup Guide Connectivity tests Sending to GS1Trade Sync: on the agreed test date perform the following steps a. Partner sends a meaningless file (not XML file); b. Partner check and guarantee that positive MDN has been received (AS2 only); c. Partner ask confirmation that it has been received by GS1Trade Sync (use contacts on chapter 2); d. In case of problems inform GS1 Denmark contact and schedule a new test. Receiving from GS1Trade Sync: on the agreed test date perform the following steps a. GS1Trade Sync sends a mean less file (not XML file). b. Partner is contacted by GS1Trade Sync in order to validate if the meaningless file has been received. In this contact GS1Trade Sync will indicate if MDN was received or not, only applicable for AS2. c. Partner must check and confirm the reception of the file and the delivery of the MDN back to GS1Trade Sync. d. In case of problems inform GS1Trade Sync contact and schedule a new test Confirmation Connectivity tests are considered successful when both partner and GS1 Denmark have confirmed that the communication is working correctly in both directions. GS1 Denmark will inform you when you have been confirmed finished with the communication tests and are ready to start the validating process. Page: 17/17
Royal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
More informationII. Implementation and Service Information
II. Implementation and Service Information A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationShipping Services Files (SSF) Secure File Transmission Account Setup
Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationAS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010
AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 18-Nov-2010, Issue 1 All contents copyright GS1 Page 1 of 19 Document Summary Document Item Document Title Date Last Modified Current
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationIntroduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
More informationFL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationFTP Peach Pit Data Sheet
FTP Peach Pit Data Sheet Peach Fuzzer, LLC v3.6.94 Copyright 2015 Peach Fuzzer, LLC. All rights reserved. This document may not be distributed or used for commercial purposes without the explicit consent
More informationMethods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
More informationInstall and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationNet Solutions WEB-EDI
Net Solutions WEB-EDI Solution Documentation NET SOLUTIONS PAGE 1 OF 10 Table of Contents 1 INTRODUCTION 3 2 BUSINESS CONTEXT 4 2.1 GENERAL 4 2.2 EDI IMPLEMENTATION DIFFICULTIES 4 2.3 NET SOLUTIONS WEB-EDI
More informationOCS Virtual image. User guide. Version: 1.3.1 Viking Edition
OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...
More informationGS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide
GS1 Newcomers to AS2 Implementation Guide Issue 1, 23-June-2008 23-June-2008, Issue 1 All contents copyright GS1 2008 Page 1 of 14 Document Summary Document Item Document Title Date Last Modified Current
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone
More informationPre-configured AS2 Host Quick-Start Guide
Pre-configured AS2 Host Quick-Start Guide Document Version 2.2, October 19, 2004 Copyright 2004 Cleo Communications Refer to the Cleo website at http://www.cleo.com/products/lexihubs.asp for the current
More information9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
More informationSECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
More informationPre Sales Communications
Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global
More informationSecurity. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationHow to setup FTP and Secure FTP for XD Series
How to setup FTP and Secure FTP for XD Series Use the following steps prior to enabling support for FTP services on XD Series: 1) Create NAS volume and Share(s) 2) Create Users and Groups 3) Select an
More informationConfiguring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
More informationAS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS
AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS Family Feud: AS2 Versus the Clan Selecting the Right Option for Your
More informationDevice Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationathenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
More informationWeb Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationCentral Desktop Enterprise Edition (Security Pack)
Central Desktop Enterprise Edition (Security Pack) The Central Desktop Security Pack is included in the Enterprise Edition of Central Desktop. The Enterprise Edition is for companies and organizations
More informationNetwork Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationThe LRS File Transfer Service offers a way to send and receive files in a secured environment
File Transfer Service The LRS File Transfer Service offers a way to send and receive files in a secured environment using HTTPS or FTPS. It also supports unsecured standard FTP transfers. The service supports
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationConfiguration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com
Dgw v2.0 May 14, 2015 www.media5corp.com Table of Contents Configuration Backup and Restore... 3 File Servers... 4 Configuring the FTP Server...4 Configuring the TFTP Server...4 Configuring the HTTP Server...
More informationNATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0
ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.
More informationMOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
More informationDeploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
More informationHTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationXFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.
XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationCASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationACCREDITED SOLUTION. EXPLORER Core FTP
ACCREDITED SOLUTION EXPLORER Core FTP Document Name: EXPLORER Core FTP Revision: B Introduction: Typical Users: Product Description: This document describes the Core FTP (File Transfer Protocol) software
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More information9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationSecure FTP. Client user guide. Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc
Secure FTP Client user guide Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc Steria A/S, Tonsbakken 16-18, 2740 Skovlunde, Denmark Phone +45 4450 6000, Fax
More informationCorporate Access File Transfer Service Description Version 1.0 01/05/2015
Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
More informationSetting Up Email on Your Palm. Treo 700wx Smartphone
Setting Up Email on Your Palm Treo 700wx Smartphone Intellectual property notices 2006 Palm, Inc. All rights reserved. Trademark, copyright, patent, and other intellectual property notices are set forth
More informationFL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP file transfer protocols for Claims, POC, and Medical EDI transmissions. SFTP
More informationSITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective:
AG041410 SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective: Determine how to configure the RD500 and your PSTN or GSM modem APPLICATION
More informationWhite Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
More informationCommunication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
More informationCreationDirect. Clearstream file transfer connectivity solutions
CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationTECHNICAL NOTE TNOI27
TECHNICAL NOTE TNOI27 Title: FTP Synchronization Product(s): G3, DSP and Enhanced Modular Controller ABSTRACT The purpose of this document is to describe the G3 s FTP feature and the configuration steps
More informationOnline Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE
Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address
More informationNew GoAnywhere File Transfer Set Up Tasks
New GoAnywhere File Transfer Set Up Tasks 1 Task Name Comments Assigned To Duration NEW GO ANYWHERE FILE TRANSFER SETUP TASKS 2 STANDARDS 3 4 PCSSC will be encrypting all files whether they contain PII
More informationDesign Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
More informationsmartoci User Guide Secure FTP for Catalog Loads
smartoci User Guide Secure FTP for Catalog Loads INTELLECTUAL PROPERTY RIGHT INFORMATION Copyright NetSol Technologies North America, Inc. All Rights Reserved. NetSol, the Netsol logo, smartoci, and the
More informationAS2 AND EDI OVER THE INTERNET FAQ
AS2 AND EDI OVER THE INTERNET FAQ A SoftCare EC Inc. White Paper ABOUT SOFTCARE Founded in 1989 and headquartered in British Columbia, SoftCare EC Inc. develops e-business software. Our OpenEC product
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationDSI File Server Client Documentation
Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationSecure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationCertificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationFile Transmission Methods Monday, July 14, 2014
Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and
More informationThis feature is available on the AppWall standalone and AppWall VA devices. It is not available on the AppWall module within Alteon.
AppWall (Web Application Firewall) Policy Distribution Feature Using the AppWall Policy Distribution mechanism you can either export or import a configuration, or distribute a full policy or just one application
More informationTLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Using the BranchCache feature in Forefront TMG SP1 Abstract In this
More informationLab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
More informationOSF INTEGRATOR for. Integration Guide
OSF INTEGRATOR for DEMANDWARE and MICROSOFT DYNAMICS CRM 2013 Integration Guide Table of Contents 1 Summary... 3 2 Component Overview... 3 2.1 Functional Overview... 3 2.2 Integration components... 3 2.3
More informationDRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationDirectory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
More informationSecurity Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationSophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More information