II. Implementation and Service Information
|
|
- Rudolph Lang
- 8 years ago
- Views:
Transcription
1 II. Implementation and Service Information
2 A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications testing, and 3) production mode follow-through. Operational and technical contacts from both parties will establish the communication link to their satisfaction to ensure network communication is successful. The client will then collaborate with our operational areas to test and validate file formats. Once in production, the initial transmission will be verified for completeness. KeyBank will not supply any codes or programs other than the parameters that are necessary for interaction with the bank s transmission platform(s). It is the client s responsibility to be able to interface with KeyBank s file transfer system. Prior to the request for transmission services: 1. Clients must meet all hardware and software specifications described in this toolkit. If any of the hardware and/or software specifications cannot currently be supported by the client, clients may request a technical review session with Key Bank s Technical Support Team by calling the Transmission Hotline at Clients must have the appropriate staff (technical or otherwise) available to work with KeyBank to establish communication links, test file formats, and run validity checks. 3. Clients must create test files according to the appropriate formats. Please refer to Section IV for samples. This requirement applies to clients that will be sending files to KeyBank for processing. Any questions regarding the creation of test files can be directed to the transmission Technical Support Team by calling the Transmission Hotline at Clients internal applications must be capable of accepting files from KeyBank. Please refer to Section IV for sample formats. This requirement applies to clients receiving files from KeyBank. Please contact your Fulfillment Support Transmission Specialist (FSTS) at with any questions regarding the receipt of files. Requesting Transmission Services: 1. Your Cash Management Sales Officer will work with you to determine which method of transmitting data will best suit your needs. 2. The client will complete the Transmission Set Up Request Form. Please refer to the Appendix for a copy of this form. A sample form has also been included at the end of this section. 3. Once all the forms have been completed and submitted to your Cash Management Sales Officer, the implementation process will begin. II. A- 1
3 Implementation Process: 1. After the transmission setup forms and all necessary agreements have been received, the technical contact for your company will receive an notifying them to expect a call the following business day. A copy of this toolkit will be included with the . Sections of the toolkit that should be reviewed prior to the call will be identified. 2. A KeyBank Transmission Specialist will call the technical contact. During the call, the Transmission Specialist will verify the information on the setup form and discuss the following components of the implementation process: a. Client commitment, responsibilities, and scheduling b. Formatting requirements c. Submitting and retrieving test files Any questions and concerns will also be addressed during the call. 3. After the call, you will be ed your mailbox ID and sign on instructions. 4. During the initial set-up phase, a process called the handshake takes place. This is the initial communication test between KeyBank and the client. This test establishes that the client can communicate electronically with KeyBank. It is done before a test file is sent or downloaded. 5. If the client will be retrieving files from KeyBank, KeyBank Operations will load a test file into the mailbox system after the handshake process has been completed and verified. The client will need to download and examine the file to ensure that it meets defined requirements. KeyBank must receive confirmation from the client that the downloaded file is satisfactory before transmission services begin. 6. KeyBank will work closely with your technical resources during the testing and approval phase. Clients MUST make themselves available to work with KeyBank during the transmission setup and testing process. The start of service(s) may be delayed until the testing cycle is complete. 7. Depending on the availability of your technical resources and the validity of the test file(s), completion of the entire process can take three to six weeks. Post Implementation 1. Once testing is complete and the client confirms that the service is setup correctly, the client is moved from the test environment to the production environment. Once the client has been moved to the production environment they must use that specific format for all future files transmitted to the bank. 2. There is no limit on the number of files that clients can send per day to KeyBank. Depending on the service, files will be processed as they are received or the new file(s) will be appended to the original file and the entire file will be processed during nightly batch processing. 3. Multiple accounts can be sent in the same file as long as they are in the same processing region (contact your Cash Management Sales Officer for details). If the accounts are from different banks within that region, then II. A- 2
4 4. Clients should not alter or add additional information, such as another account, to their file without notifying KeyBank. Proper procedures must be followed in order to ensure that all accounts are correctly setup, in the same layout, and appropriately formatted. 5. KeyBank cannot assist with correcting files due to a client s software problem. The client must utilize their internal technical support or contact the software vendor to address and resolve issues. 6. Once in production: All Communication Issues should be directed to the Transmission Hotline at All Application Issues (incorrect file, wrong format, etc.) should be directed to KeyBank s Corporate Client Services at For Clients using the Key Total Treasury application for file transfer should contact Commercial Client Services Internet Support at Clients performing any upgrades to hardware or software that is used for transmissions must contact the Transmission Hotline to schedule preproduction testing to make certain the client upgrade will not affect transmission communications and/or prevent production files from being sent and/or received. Please allow a minimum of one business week prior to implementation for testing to be performed. II. A- 3
5 B. Transmission Set Up Request Form This form is used for all transmission types. Shaded areas are for bank use only. Please refer to the following page for explanations of form fields. Company Name: 1 Company Address: 2 Client Technical Contact: 3 Client Operations Contact: 7 Address: 4 Address: 8 Telephone: 5 Fax: Telephone: 9 Fax: Staffing Hours: 6 Staffing Hours: 10 Transmission Method: 11 Secure File Transfer Key Total Treasury WBT(Web-based File Transfer Module) FTP w/pgp Other FTP w/tls AS-2 Transmission Frequency: 12 Daily Weekly Semi-Monthly Annually Daily Plus Bi-Weekly Monthly Other Data Transfer Direction: 13 Inbound to Bank Outbound from Bank Both Internal Use: Applications: ACH ARP Batch Wire BAI2 Information Reporting EDI Lockbox Wire Transfer Key Capture Plus Consolidated Payables Returned Items Request Date: Implementation Date: Comments Section: 14 II. B- 1
6 1. Company Name Official Name of Company/Organization 2. Company Address Official Address 3. Client Technical Contact Person that will be assisting with data communications setup 4. Address Technical Contact s address 5. Telephone and Fax Technical Contact s phone and fax number 6. Staffing Hours Hours that the Technical Contact is available (usual schedule) 7. Client Operations Contact Person at the company that will be responsible for creating, transmitting, and/or sending files 8. Address Operations Contact s address 9. Telephone and Fax Operations Contact s phone and fax number 10. Staffing Hours Hours that the Operations Contact is available (usual schedule) 11. Transmission Method Method of transmission that will be utilized to send/receive files 12. Transmission Frequency How often the files will be sent/retrieved 13. Data Transfer Direction Inbound: Client sends files to KeyBank Outbound from Key: Client will retrieve the file 14. Comments Section Include any relevant comments. II. B- 2
7 C. Secure Transfer Request Form FTP Guidelines: Encryption Encryption is required for all File Transfer Protocols (FTP) with KeyBank. KeyBank provides three encryption options: 1. FTP with Pretty Good Privacy (PGP) encryption (signing optional) 2. FTP/Transport Layer Security (TLS) 3. AS-2 A file size of 100Meg after encryption is considered large. Firewall KeyBank requires trading partners to have a static public source IP address, or limited range of addresses. The source address must be added to our firewall policy prior to connection. Please notify KeyBank at least 10 business days in advance for changes to your IP address(es) to allow adequate time for firewalls to be updated. FTP/TLS TLS (Transport Layer Security) is generally compatible with FTP/Secure Sockets Layer (SSL). KeyBank s FTP server supports explicit (AUTH SSL) TLS using the control port KeyBank s firewall does not allow either inbound or outbound FTP/TLS connections on port 21. Client certificates are not required. Passive Mode Clients must connect to our FTP server using passive mode. In passive mode, KeyBank s FTP server listens for data connections on ports in the range If necessary, configure your firewall to allow outgoing connections to KeyBank on these ports. Active Mode Generally, KeyBank does not support active mode. KeyBank may be able to accommodate a LIMITED range of data ports in active mode. Please note that most command line FTP clients (Solaris, Microsoft) use random high ports for data connections and cannot open data connections with KeyBank in active mode. SFTP KeyBank does not currently support S/FTP or Secure Copy using SSH. Test Server KeyBank s test FTP server uses port 2021 for control connections for all FTP traffic. V. B- 2
8 Port Summary Below are the destination IP addresses and ports to which your firewall should allow outbound connections: Server Control Data Ports Port Test/ DR FTP Test/ DR FTP/TLS Production FTP sft.keybank.com ( ) D/R FTP/TLS sft.keybank.com ( ) D/R If the above specifications cannot be supported, do not fill out the Secure FTP Request Form (below). Please contact KeyBank regarding alternate means of file transfer. V. B- 2
9 Secure File Transfer Setups Request Form KeyBank Secure FTP Request Form Company Name Company Address Contact Name Contact Phone Data Classification: Please select one of the four classifications your data will fall under: Highly Confidential Confidential Internal Public Data Direction Inbound to Key Outbound From Key Both Frequency Daily: files a day Weekly Files a week Monthly Files a month Other Files Approximate File Size K Encryption Method FTP/ TLS FTP with PGP Encryption FTP with PGP Signing and Encryption FTP Incoming / Outgoing File Transfers Using Key s FTP Server (trading partner pushes or pulls data) Source IP address Alias V. B- 2
10 Key s firewall allows data connections on the standard port (2021) in active mode, and ports in passive mode. Can your FTP client support passive mode? Yes No If No, what port(s) does your client listen on for data connections? Key FTP server: sft.keybank.com IP address ( for test) Username and Password will be sent via separate communication V. B- 2
Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE
Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Contents Secure FTP Setup... 1 Introduction...1 Secure FTP Setup Diagram...1 Before You Set Up S/FTP...2 Setting Up S/FTP...2
More informationB. KTT Web-based File Transfer
B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationRoyal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
More informationGS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationfreesshd SFTP Server on Windows
freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone
More informationSection I Transmission Modes
Transmission Modes Transmission Options Available...2 Value Added Networks (VAN)...2 File Transfer Protocol (FTP)...2 HTTPS File Upload (WEB)...3 Storing and Receiving Data with File Transfer Protocol...3
More informationGlobal Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
More informationOnline Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE
Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address
More informationSECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
More informationShipping Services Files (SSF) Secure File Transmission Account Setup
Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationMethods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
More informationState of Nevada Department of Health and Human Services (DHHS) Division of Health Care Financing and Policy (DHCFP)
Hewlett Packard Enterprise for HIPAA Compliant Electronic Transactions Nevada Medicaid Management Information System (NV MMIS) State of Nevada Department of Health and Human Services (DHHS) Division of
More informationKey Transmission Toolkit. Transmission Products and Services Electronic Data Interchange (EDI)
Key Transmission Toolkit Transmission Products and Services Electronic Data Interchange (EDI) Copyright 2014 by KeyBank, N.A. All rights reserved. Reproduction of any part of this work beyond that permitted
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationAccess Instructions for United Stationers ECDB (ecommerce Database) 2.0
Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...
More informationAutomated Clearing House (ACH) Direct Deposit
User Guide Version2008 11/07 Automated Clearing House (ACH) Direct Deposit Table of Contents 1. INTRODUCTION... 1 2. HISTORY OF THE AUTOMATED CLEARING HOUSE...2 3. UNDERSTANDING DIRECT DEPOSIT...3 A. How
More informationEDS*ELIT FTP/s Quick Start Guide
EDS*ELIT FTP/s Quick Start Guide Document Version 2.1 May 24, 2004 Copyright 2004 Cleo Communications In this document Process Map Overview Configure Your Client-Side Firewall Configuration Host Mailbox
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
More informationElectronic Data Interchange (EDI) 5010 Clearinghouse Services Guide
Electronic Data Interchange (EDI) 5010 Clearinghouse Services Guide A PUBLICATION OF THE EDI DEPARTMENT OF BLUE CROSS AND BLUE SHIELD OF LOUISIANA 18NW1935 R02/12 Blue Cross and Blue Shield of Louisiana
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationCSC E Mail. Mobile Device Configuration Settings and Setup Instructions
CSC E Mail Mobile Device Configuration Settings and Setup Instructions Contents Overview... 3 Android (Droid, Google Android, etc.)... 4 Exchange Settings... 4... 4 RIM Blackberry... 5... 5 Apple iphone
More informationWhite Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationHow To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For
Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com
More informationathenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
More informationBasic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
More informationMarch 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
More informationNew GoAnywhere File Transfer Set Up Tasks
New GoAnywhere File Transfer Set Up Tasks 1 Task Name Comments Assigned To Duration NEW GO ANYWHERE FILE TRANSFER SETUP TASKS 2 STANDARDS 3 4 PCSSC will be encrypting all files whether they contain PII
More informationRequirements for HIPAA 5010: Testing & Implementation
Requirements for HIPAA 5010: Testing & Implementation A PUBLICATION OF THE EDI DEPARTMENT OF BLUE CROSS AND BLUE SHIELD OF LOUISIANA 18NW1906 R04/12 Blue Cross and Blue Shield of Louisiana incorporated
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationsmartoci User Guide Secure FTP for Catalog Loads
smartoci User Guide Secure FTP for Catalog Loads INTELLECTUAL PROPERTY RIGHT INFORMATION Copyright NetSol Technologies North America, Inc. All Rights Reserved. NetSol, the Netsol logo, smartoci, and the
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationCorporate Access File Transfer Service Description Version 1.0 01/05/2015
Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring
More informationGETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures
A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationUnifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
More informationConfigure Managed File Transfer Endpoints
Configure Managed File Transfer Endpoints 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
More informationSecurity. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
More informationElectronic Service Agent TM. Network and Transmission Security And Information Privacy
Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting
More informationLinux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
More informationRemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
More informationVirtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
More informationASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example
ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example Document ID: 113110 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background
More informationSecure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationFTP Server Configuration
FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,
More informationClearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationHow do I load balance FTP on NetScaler?
How do I load balance FTP on NetScaler? Introduction: File transfer protocol is a standard for the exchange of files across a network. It is based on a client/server model with an FTP client on a user
More informationParallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
More informationFile Transmission Methods Monday, July 14, 2014
Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and
More informationACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM
Mestrado em Ciência da Informação Segurança da Informação 2013/2014 ACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM André Pinto & Ricardo Silva Summary 1 2 Introduction 1.1 Information Security 1.2 Work
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationPIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example
PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example Document ID: 82018 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background Information
More informationThe Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
More informationTable of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
More informationRegistrar Ramp Up Process. Prepared by Afilias
Registrar Ramp Up Process Prepared by Afilias December 2013 Contents Introduction... 2 Get Started By Having Someone Contact You... 2 Become a Registrar... 3 Step One Business and Legal Process... 3 Step
More informationInstallation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
More informationHow to setup FTP and Secure FTP for XD Series
How to setup FTP and Secure FTP for XD Series Use the following steps prior to enabling support for FTP services on XD Series: 1) Create NAS volume and Share(s) 2) Create Users and Groups 3) Select an
More informationMANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
More informationHIPAA Transaction ANSI X12 835 Companion Guide
HIPAA Transaction ANSI X12 835 Companion Guide HIPAA ASC x12 V5010X279A1 Version: 1.0 11/1/2013 Document History DOCUMENT VERSION HISTORY TABLE Version Sections Revised Description Revised By Date 2 Table
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationDigital Certificate Manager Setup
Digital Certificate Manager Setup Contents Pre-configuration 3 Sample control scripts 3 Server Requirements 3 Prerequisites 3 Technical documents available online at 3 Firewall Considerations 4 Introduction
More informationDirectory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
More informationBeamYourScreen Security
BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationCASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
More informationFirewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
More informationLifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
More informationOfficeServ 7100 IP-PBX. SIP Trunking using the Optimum Business Sip Trunk Adaptor and the Samsung
SIP Trunking using the Optimum Business Sip Trunk Adaptor and the Samsung OfficeServ 7100 IP-PBX 1 Table of Contents 1. Overview 3 2. Prerequisites 3 3. OfficeServ 7100 PBX Configuration 3 3.1 Network
More informationAlaska Alternate Assessment. Website Security Assurances. June 2015. App3.6_Test_Site_Security
Alaska Alternate Assessment Website Security Assurances June 2015 App3.6_Test_Site_Security ISSUE 1: Secure access to http://ak.k12test.com The AK website makes use of the cryptographic protocols Transport
More informationMIKOGO SECURITY DOCUMENT
MIKOGO SECURITY DOCUMENT Table of Contents Page 2. 6. 6. The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationFL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.
More informationDomain 3.0 Networking... 1
Table of Contents Domain 3.0 Networking... 1 DOMAIN 3.0 NETWORKING 1. You are installing a cable modem in a client s home. How should you select where to put the cable modem? A. Placing the modem right
More informationAdobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5
More informationCanada Savings Bonds Program. FTP Server User Guide. Version 2.5
Canada Savings Bonds Program FTP Server User Guide Version 2.5 September 1, 2015 FTPS Server User Guide FTPS Server User Guide Revision History Use the following table to track the revision history for
More informationIn-Network Translation User s Guide
GXS EDI Services In-Network Translation User s Guide GC34-3282-02 Third Edition (November 2005) This book replaces GC34-3282-01. Copyright GXS, Inc. 1998, 2005. All rights reserved. Government Users Restricted
More informationMANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
More informationBlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist
BlackBerry Enterprise Service version.2 preinstallation and preupgrade checklist Verify that the following requirements are met before you install or upgrade to BlackBerry Enterprise Service version.2.
More informationHow To Use A Pmsft On A Pc Or Mac Or Mac (For Mac) With A Pmf (For Pc) Or Mac Mac (Or Mac) On A Mac Or Pc (For Pmsf) On An Ipad
Capario Secure File Transfer User Guide Notices This user guide (the Guide ) is provided by Capario in order to facilitate your use of the Capario Secure File Transfer Software. This Guide is subject to
More informationSet up Outlook for your new student e mail with IMAP/POP3 settings
Set up Outlook for your new student e mail with IMAP/POP3 settings 1. Open Outlook. The Account Settings dialog box will open the first time you open Outlook. If the Account Settings dialog box doesn't
More informationForward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
More informationGentran User s Guide
Centers for Medicare & Medicaid Services 7500 Security Blvd Baltimore, MD 21244-1850 Enterprise File Transfer (EFT) Gentran User s Guide Version: 2.0 Last Modified: April 15, 2010 Document Number:
More informationNebraska Insurance Reporting Guide
Nebraska Insurance Reporting Guide Nebraska Department of Motor Vehicles Driver and Vehicle Records Division 301 Centennial Mall South P.O. Box 94789 Lincoln, NE 68509-4789 www.dmv.nebraska.gov Table of
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationJPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0
EMENTS JPMorgan Chase Treasury Workstation Certification Setup Guide Version 2.0 December 2010 TABLE OF CONTENTS Introduction... 1 About this Guide... 1 When to Create the Certificates... 2 Getting Help...
More information