Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS)
|
|
|
- Annabelle Welch
- 10 years ago
- Views:
Transcription
1 Collaboration Protocol Agreement Guide Public Health Information Network Messaging System (PHINMS) Version: Prepared by: U.S. Department of Health & Human Services Date: April 15, 2008
2 EXECUTIVE SUMMARY Public health involves many organizations throughout the PHIN (Public Health Information Network), working together to protect and advance the public's health. These organizations need to use the Internet to securely exchange sensitive data between varieties of different public health information systems. The exchange of data, also known as "messaging" is enabled through messages created using special file formats and a standard vocabulary. The exchange uses a common approach to security and encryption, methods for dealing with a variety of firewalls, and Internet protection schemes. The system provides a standard way for addressing and routing content, a standard and consistent way for information systems to confirm an exchange. The PHINMS (Public Health Information Network Messaging System) is the software which makes this work. The system securely sends and receives sensitive data over the Internet to the public health information systems using Electronic Business Extensible Markup Language (ebxml) technology. Creating a Collaboration Protocol Agreement (CPA) is a necessary agreement between two messaging partners. Collaboration Protocol Agreement Guide_v1.0.0_ doc Page ii of 11
3 REVISION HISTORY Collaboration Protocol Agreement Guide VERSION # IMPLEMENTER DATE EXPLANATION Wendy Fama Collaboration Protocol Agreement Guide Rajeev Seenappa Reviewed document Wendy Fama Finalized document. Collaboration Protocol Agreement Guide_v1.0.0_ doc Page iii of 11
4 TABLE OF CONTENTS Collaboration Protocol Agreement Guide 1.0 CPA Overview CPA Communication CDC OID Create CPA CPA.xml Files Sender CPA.xml File...8 Collaboration Protocol Agreement Guide_v1.0.0_ doc Page iv of 11
5 LIST OF FIGURES Figure 1. Sender Collaboration Protocol Agreement.xml File... 9 Collaboration Protocol Agreement Guide_v1.0.0_ doc Page v of 11
6 CDC CPA ebxml OID PHIN PHINMS ACRONYM LIST Centers for Disease Control and Prevention Collaboration Protocol Agreement Electronic Business Extensible Markup Language Object Identifier Public Health Information Network Public Health Information Network Messaging System Collaboration Protocol Agreement Guide_v1.0.0_ doc Page vi of 11
7 1.0 CPA OVERVIEW The Collaboration Protocol Agreement (CPA) consists of rules which allow communication between hardware and software. Interoperability is a major concern when different systems attempt to communicate. Both sides must understand the same protocol for the communication to be successful. A communications protocol defines: rate of transmission in bits per second, whether the transmission is to be synchronous or asynchronous, whether the data is to be transmitted in half-duplex mode (data can only be transmitted in one direction at time) or full-duplex mode (data can be transmitted in both directions at once), rules for detecting and recovering from transmission errors, and rules for encoding and decoding data (data compression and decompression). Note: Information on importing and exporting CPAs can be located in the PHINMS Implementation Guide. 1.1 CPA Communication The CPA is a unique identifier providing the information needed to communicate between two or more messaging partners. This includes the transport protocol and security constraints both parties have agreed to use when sending and receiving messages to one another. A CPA is required for every Public Health Information Network Messaging System (PHINMS) installation at each location. Each PHINMS Sender requires a CPA when they are installed at two separate locations. There are two parts to the CPA, the Sender s and the Receiver s Object Identifier (OID). An OID is generally an implementation - specific integer or pointer uniquely identifying an object. An object can be any organization, a vocabulary code, a PHINMS software installation, or any other entity. The OID indicates the organization running the software and the location at which the software is running. 1.2 CDC OID The CDC uses a Party Identifier (PartyID) as an OID for PHINMS. A PartyID is used to provide the instance with a unique ID. A PartyID is required for each and every organization sending messages to the CDC and receiving messages from the CDC. A PartyID uniquely identifies a PHINMS installation, also called an instance or node. The PartyID is included with every message informing the recipient of the originator. Note: A CDC PartyID is an OID but an OID is not necessarily a CDC PartyID. Instances not sending data to the CDC may create an unofficial PartyID. This is used to test and become familiar with the PHINMS application when multiple installations are configured. Once the site becomes comfortable using the application, apply for a registered PartyID when messages are going to be sent to the CDC. If the servers were installed without a registered PartyID, the PHINMS application software must be removed and re-installed using the registered PartyID. Collaboration Protocol Agreement Guide_v1.0.0_ doc Page 7 of 11
8 Contact the PHINMS Help Desk to obtain a PartyID by calling , option 2 or by sending an to [email protected]. Information is required about the organization(s) sending and receiving messages. When complete, the PHIN Help Desk will the PartyID to the requestor. Contact the PHIN Help Desk regarding any issues encountered with the PartyID. 1.3 Create CPA Complete the following steps to create a CPA.xml file using any text editing software such as Microsoft Notepad: Note: The CPA file naming convention for sending messages to CDC is <CDCOID>.<PartnerOID>.xml. Sending and receiving nodes need to have a CPA identically named in order to send messages. This is how PHINMS determines the relationship between the two parties. 1. save the CPA.xml file, 2. configure the CPA.xml file, and 3. ensure both partners CPA.xml file are identical. When troubleshooting the route configuration, if a change is made to the CPA.xml file both partners CPA.xml files need to be updated. Ensure there are no extra spaces or unknown characters in the destination PartyID. 1.4 CPA.xml Files This section explains the tags within the CPA.xml files for both Sender and Receiver. PartyInfo Segments Sender CPA.xml File The default location for the PHINMS Sender CPA.xml file is C:\Program Files\PhinMS2.8.00\config\sender\CPA. The Sender CPA.xml file is shown in Figure 1 and explained after the figure. Collaboration Protocol Agreement Guide_v1.0.0_ doc Page 8 of 11
9 Figure 1. Sender Collaboration Protocol Agreement.xml File Collaboration Protocol Agreement Guide_v1.0.0_ doc Page 9 of 11
10 The first part of the Sender CPA.xml file is the beginning tag for the CPA. Collaboration Protocol Agreement Guide <?xml version="1.0" encoding="utf-8"?> <tp:collaborationprotocolagreement tp:cpaid="uri:phmsg-cdc-ssl" tp:version="1.2" xmlns:ds=" xmlns:tp=" xmlns:xlink=" xmlns:xsi=" xsi:schemalocation=" <tp:status tp:value="proposed"/> <tp:start> t07:21:00z</tp:start> <tp:end> t07:21:00z</tp:end> <tp:conversationconstraints tp:concurrentconversations="100" tp:invocationlimit="100"/> The next part identifies the PHINMS Sender s PartyID, type, reference transport ID, sending protocol, receiving protocol, protocol version, and encryption certificate. <tp:partyinfo> <tp:partyid tp:type="zz">phinmssender</tp:partyid> <tp:partyref xlink:href=" xlink:type="simple"/> <tp:transport tp:transportid="n35"> <tp:sendingprotocol tp:version="1.1"> </tp:sendingprotocol> <tp:receivingprotocol tp:version="1.1"> </tp:receivingprotocol> <tp:endpoint tp:type="allpurpose" tp:uri="phmsg.cdc.gov/evalebxml/receivefile"/> <tp:transportsecurity> <tp:protocol> </tp:protocol> <tp:certificateref> </tp:certificateref> <tp:authenticationtype> </tp:authenticationtype> <!-- basic, custom, sdn, clientcert --> <tp:basicauth> <tp:indexpage> </tp:indexpage> <tp:basicauthuser> </tp:basicauthuser> <tp:basicauthpasswd> </tp:basicauthpasswd> </tp:basicauth> </tp:transportsecurity> </tp:transport> </tp:partyinfo> The section which follows the PHINMS Sender s PartyID identifies the CDC Registration s PartyID, type, reference transport ID, sending protocol, receiving protocol, protocol version, and encryption certificate: <tp:partyinfo> <tp:partyid tp:type="zz">cdcregistration</tp:partyid> <tp:partyref xlink:href=" xlink:type="simple"/> <tp:transport tp:transportid="n35"> Collaboration Protocol Agreement Guide_v1.0.0_ doc Page 10 of 11
11 <tp:sendingprotocol tp:version="1.1"> </tp:sendingprotocol> <tp:receivingprotocol tp:version="1.1"> </tp:receivingprotocol> <tp:endpoint tp:type="allpurpose" tp:uri="phinmsping.cdc.gov:443/receiver/receivefile"/> <tp:transportsecurity> <tp:protocol>https</tp:protocol> <tp:certificateref> </tp:certificateref> <tp:authenticationtype>clientcert</tp:authenticationtype> <!-- basic, custom, sdn, clientcert --> <tp:basicauth> <tp:indexpage> </tp:indexpage> <tp:basicauthuser> </tp:basicauthuser> <tp:basicauthpasswd> </tp:basicauthpasswd> </tp:basicauth> <tp:customauth> <tp:customloginpage> </tp:customloginpage> <tp:publicparams> </tp:publicparams> <tp:secretparams> </tp:secretparams> </tp:customauth> <tp:netegrityauth> <tp:sdnpassword> </tp:sdnpassword> <tp:sdnloginpage> </tp:sdnloginpage> <tp:keystore> </tp:keystore> <tp:keystorepasswd> </tp:keystorepasswd> </tp:netegrityauth> <tp:clientcertauth> <tp:keystore>c:/program Files/PhinMS2.8.00c/security/sender/cdc_reg.pfx</tp:keyStore> <tp:keystorepasswd>cpa_keystorepasswd27</tp:keystorepasswd> </tp:clientcertauth> </tp:transportsecurity> </tp:transport> </tp:partyinfo> The last section indicates the language and the description of the agreement between the CDC and the messaging partner. <tp:comment xml:lang="en-us">send/receive agreement between cdc and messaging partner</tp:comment> </tp:collaborationprotocolagreement> Collaboration Protocol Agreement Guide_v1.0.0_ doc Page 11 of 11
Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH. Public Health Information Network Messaging System (PHINMS)
Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH Public Health Information Network Messaging System (PHINMS) Version: 1.0 Prepared by: U.S. Department of Health & Human Services Date:
Implementation Guide. Public Health Information Network Messaging System (PHINMS)
Implementation Guide Public Health Information Network Messaging System (PHINMS) Version: 2.8.02 Prepared by: U.S. Department of Health & Human Services November 1, 2012 EXECUTIVE SUMMARY PHINMS 2.8.02
PHIN MS Detailed Security Design
The Public Health Information Network Messaging System (PHINMS) sends and receives sensitive data over the internet to the public health information systems using Electronic Business Extensible Markup
Public Health Information Network Messaging System
Public Health Information Network Messaging System Implementing New VeriSign G2 Intermediate Certificate on Windows Systems Version: 1.0.0 Date: September 29, 2009 EXECUTIVE SUMMARY VeriSign is requiring
Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)
1 ebxml Case Study 2 3 4 5 Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS) 4 October 2003 6 7 8 9 10 11 12 13 14 15 16 17 Document identifier: (Word)
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
PHINMS Alarms. Version: 1.0.0. Prepared by: U.S. Department of Health & Human Services
PHINMS Alarms Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: January 11, 2008 VERSION HISTORY VERSION # IMPLEMENTER DATE EXPLANATION 1.0.0 Chris Childs 01/11/08 Create version
The FTP Monitor application performs the following main functions:
FTP Monitor Application The FTP Monitor application performs the following main functions: 1. Periodically monitors the files to be uploaded. 2. Automatically compresses and encrypts the files to be uploaded.
introducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
PHINMS Acronyms & Glossary List
PHINMS Acronyms & Glossary List Version: 1.0.3 Prepared by: U.S. Department of Health & Human Services Date: March 27, 2008 VERSION HISTORY VERSION # IMPLEMENTER DATE EXPLANATION 1.0.0 Wendy Fama 03-19-07
OSI Seven Layers Model Explained with Examples
OSI Layer Model describes how information is transmitted between networking devices. In this tutorial I will provide a brief introduction of OSI Layer model including its advantage and services. OSI model
Journaling Guide for Email Archive for Exchange 2007
Journaling Guide for Email Archive for Exchange 2007 (C) 2010 Websense, Inc. All Rights Reserved. Thank you for choosing Email Archive. This Journaling Guide provides information you need to set up the
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
ODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2
ODEX Enterprise Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2 Copyright Data Interchange Plc Peterborough, England, 2013. All rights reserved. No part of this document may be disclosed
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
Configuration. Windows 98 and Me Configuration
Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks
Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;
Chapter 6. About This Chapter. Before You Begin. Windows 2000 Naming Schemes. [Previous] [Next]
[Previous] [Next] Chapter 6 R e s o l v i n g N e t w o r k H o s t N a m e s About This Chapter Both clients and servers on a network must resolve the user-friendly host names to the Internet Protocol
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 R2 FOR EMBEDDED SYSTEMS TELECOMMUNICATIONS STANDARD
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 R2 FOR EMBEDDED SYSTEMS TELECOMMUNICATIONS STANDARD These license terms are an agreement between you and Unify GmbH & Co. KG. Please read
Moscow Exchange Fix protocol specifications for OTC trades report system (OTC-monitor)
Moscow Exchange Fix protocol specifications for OTC trades report system (OTC-monitor) Moscow, 2014 1 Table of Contents 1. Introduction... 4 1.1. Document purpose... 4 1.2. General description... 4 2.
The Public Health Information Network Messaging System
The Public Health Information Network Messaging System Tim Morris Director, Division of Informatics Shared Services (DISS) National Center for Public Health Informatics (NCPHI) Centers for Disease Control
Alteva Fax USER GUIDE
Alteva Fax USER GUIDE 2015 Alteva, Inc. AFUG07092015 USER GUIDE 400 Market Street Suite 1100 PHONE 1.877.258.3722 SUPPORT 1.877.258.3828 Philadelphia, PA 19106 WEB www.alteva.com EMAIL [email protected]
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00
VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...
SQL EXPRESS INSTALLATION...
Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is
mailtunnel Quick Guide ENCRYPTED TUNNEL COMENDO DATA CENTER SECURITY CENTER SPAM+VIRUS LOGS
COMENDO CUSTOMER ENCRYPTED TUNNEL INBOUND E-MAIL COMENDO DATA CENTER RECEIVED E-MAIL SECURITY CENTER SPAM+VIRUS LOGS Comendo offers encryption of your e-mail connection. It ensures that all e-mail communication
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
My IC Customizer: Descriptors of Skins and Webapps for third party User Guide
User Guide 8AL 90892 USAA ed01 09/2013 Table of Content 1. About this Document... 3 1.1 Who Should Read This document... 3 1.2 What This Document Tells You... 3 1.3 Terminology and Definitions... 3 2.
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Accounting Manager. User Guide A31003-P1030-U114-2-7619
Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified
U.S. Department of Education 1998 Electronic Access Conferences
U.S. Department of Education 1998 Electronic Access Conferences 11/9/98 Session 43-1 Session 43 Mainframe Connectivity to Title IV Wide Area Network Session 43-2 Session 43 Mike Cline - NCS Development
Using Avaya Aura Messaging
Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the
Kerio VPN Client. User Guide. Kerio Technologies
Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
Address Information. USPS Web Tools Application Programming Interface User s Guide. Document Version 4.0 (2/01/2015)
Address Information USPS Web Tools Application Programming Interface User s Guide Document Version 4.0 (2/01/2015) Table of Contents 1.0 Introduction To Web Tools... 2 Before you get started:... 2 Important
Securepoint Security Systems
HowTo: VPN with OpenVPN, certificates and OpenVPN-GUI Securepoint Security Systems Version 2007nx Release 3 Contents 1 Configuration on the appliance... 4 1.1 Setting up network objects... 4 1.2 Creating
이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다
020-101186-01 020-101186-01 이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다 Table of Contents About this Document... 1 Document Conventions... 1 Audience... 1 Related
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Technical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD These license terms are an agreement between you and [OEM]. Please read them. They apply to the software included
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Burst Technology bt-loganalyzer SE
Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...
FILE TRANSFER PROTOCOL (FTP) SITE
FILE TRANSFER PROTOCOL (FTP) SITE Section 1 - SPIN System Overview As part of the digital plan submission process that Registries is currently implementing a File Transfer Protocol (FTP) site has been
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring the Forefront TMG HTTP Filter Abstract In this article I will show you how to configure
RJS Email Monitor. User Guide. 2012 RJS Software Systems Document Version 1.0.0.1
User Guide RJS Email Monitor 2012 RJS Software Systems Document Version 1.0.0.1 RJS Software Systems 2970 Judicial Road, Suite 100 Burnsville, MN 55337 Phone: 952-736-5800 Fax: 952-736-5801 Sales email:
AS DNB banka. DNB Link specification (B2B functional description)
AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL
White Paper HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL EXPLORING THE CHALLENGES AND OPPORTUNITIES OF DELIVERING MORE CONTENT AT LESS COST Today s broadcasters are faced with an ever- present
HIPAA TRANSACTION 837 INSTITUTIONAL STANDARD COMPANION GUIDE
HIPAA TRANSACTION 837 INSTITUTIONAL STANDARD COMPANION GUIDE Refers to the Implementation Guides Based on X12 version 004010 A1 and version 005010 Companion Guide Version Number: 1.3 January 29, 2014 TABLE
Virtual Fax API User Guide
Virtual Fax API User Guide Introduction 2 Single Fax Job Submission (XML) 2 Protus XML Submission Services 2 Input: Job Request 2 Output: Status Response 2 Single Fax Job Submission XML Element Hierarchy
Client/Server Messaging System v3.28 Client User's Guide
Client/Server Messaging System v3.28 Client User's Guide Client/Server Messaging System v3.28 Client User's Guide Page 1 Contents 1 Introduction...3 2 Glossary...3 3 What is the Messaging System?...4 4
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
SmartPTT File Transfer User's Guide. Version 2.0
SmartPTT File Transfer User's Guide Version 2.0 Introduction 2 Introduction SmartPTT File Transfer was designed to transfer files over-the-air by means of MOTOTRBO radios. It is an easy-to-use and very
SMS Database System Quick Start. [Version 1.0.3]
SMS Database System Quick Start [Version 1.0.3] Warning ICP DAS Inc., LTD. assumes no liability for damages consequent to the use of this product. ICP DAS Inc., LTD. reserves the right to change this manual
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
What communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
Installation and Configuration in Microsoft Dynamics NAV 5.0
Installation and Configuration in Microsoft Dynamics NAV 5.0 8870: Installation and Configuration in Microsoft Dynamics NAV 5.0 (2 Days) About this Course Elements of this syllabus are subject to change.this
Installation and Connection Guide to the simulation environment GLOBAL VISION
Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Microsoft IIS Integration Guide
Microsoft IIS Integration Guide Preface Preface 2015 SafeNet, Inc. All rights reserved. Part Number: 007-011955-001 (Rev E, 12/2015) All intellectual property is protected by copyright. All trademarks
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research
LATITUDE Patient Management System
LATITUDE PACEART INTEGRATION 1.01 GUIDE LATITUDE Patient Management System LATITUDE PACEART INTEGRATION SYSTEM DIAGRAM a. Patient environment b. LATITUDE environment c. Clinic environment d. Data retrieval
Technical Data Sheet: imc SEARCH 3.1. Topology
: imc SEARCH 3.1 Database application for structured storage and administration of measurement data: Measurement data (measurement values, measurement series, combined data from multiple measurement channels)
Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide
BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple
Terminal Services vs. Remote Desktop Connection in Windows 2000 and Windows 2003. White Paper
Terminal Services vs. Remote Desktop Connection in Windows 2000 and Windows 2003 White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished
Serial Deployment Quick Start Guide
PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and
Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE
Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Contents Secure FTP Setup... 1 Introduction...1 Secure FTP Setup Diagram...1 Before You Set Up S/FTP...2 Setting Up S/FTP...2
Installing VinNOW Client Computers
Installing VinNOW Client Computers Please review this entire document prior to proceeding Client computers must use UNC path for database connection and can t be connected using a mapped network drive.
2 Basic Concepts. Contents
2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a
Developer Guide to Authentication and Authorisation Web Services Secure and Public
Government Gateway Developer Guide to Authentication and Authorisation Web Services Secure and Public Version 1.6.3 (17.04.03) - 1 - Table of Contents Government Gateway 1 Developer Guide to Authentication
Enterprise Vault 6.0. SMTP Archiving
Enterprise Vault 6.0 SMTP Archiving Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard
File transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
Managed File Transfer with Universal File Mover
Managed File Transfer with Universal File Mover Roger Lacroix [email protected] http://www.capitalware.com Universal File Mover Overview Universal File Mover (UFM) allows the user to combine
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
MiGS Virtual Payment Client Integration Guide. July 2011 Software version: MR 27
MiGS Virtual Payment Client Integration Guide July 2011 Software version: MR 27 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you must
Bulk Downloader. Call Recording: Bulk Downloader
Call Recording: Bulk Downloader Contents Introduction... 3 Getting Started... 3 Configuration... 4 Create New Job... 6 Running Jobs... 7 Job Log... 7 Scheduled Jobs... 8 Recent Runs... 9 Storage Device
Feature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
Georgia State Longitudinal Data System
Georgia State Longitudinal Data System FTP Client Installation Manual Version 3.0 Table of Contents 1 Overview... 3 2 FTP Connection Checklist... 3 3 FTP Installation Instructions... 4 4 Apply license
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
aims sql server installation guide
aims sql server installation guide Document Version: 4000 February 2015 CONTENTS AIMS Installation Guide... 3 Installing the AIMS Software... 4 Pre-Requisites... 4 Installation... 4 Shortcuts... 4 Directory
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
