CPE WAN & FAP Management Protocols
|
|
|
- Sharon Logan
- 10 years ago
- Views:
Transcription
1 White Paper CPE WAN & FAP Management Protocols By: Ravi Raj Bhat, Vice President of Engineering and V. Srinivasa Rao, Sr. Architect Overview Standardization of Femtocell technology has come a very long way. This progress is largely due to the leadership of the telecom industry consortium known as the Femto Forum ( working with various standardization organizations such as the 3rd Generation Partnership Project (3GPP, and the Broadband Forum (BBF, previously known as the DSL Forum, CONTENTS BBF Auto-Configuration Architecture and Framework pg. 2 Auto-Configuration Data Organization pg. 2 Data Hierarchy pg. 3 Profiles pg. 3 CPE WAN Management Protocol Overview pg. 4 Protocol Stack and Operation pg. 4 Protocol Operation pg. 5 FAP Data Model pg. 5 Control Object Group pg. 6 Configuration Object Group pg. 7 Monitoring and Management Object Group pg. 7 References pg. 8
2 2 3GPP has standardized the Fa interface, known as the Iuh interface in 3GPP terminology (identified by the Femto Forum reference model shown in Figure 1). 3GPP has made good progress in defining the HNBAP protocol for communication between a Femto Access Point (FAP, also known as a Home NodeB or HNB in 3GPP terminology) and a Femto Gateway (FGW) and is actively identifying a means of transporting Radio Access Network Application Part (RANAP) to the RNC (including definition of the RANAP User Adapatation, RUA). The Femto Forum also worked with BBF to standardize the Fm interface by leveraging the existing remote device configuration and management standards TR-069 and TR-106. Figure 1. Femtocell Reference Model (Source: Femto Forum) This paper focuses on explaining the existing BBF remote device management framework and how it would be adapted to manage FAPs. Technical references are provided at the end of the document. BBF Auto-Configuration Architecture and Framework The guiding principle around BBF s auto-configuration architecture and framework is to configure the Customer Premises Equipment (CPE, also known as the Broadband Network Termination, or B-NT in BBF terminology) with zero touch based on a pre-defined service configuration template located somewhere in the service provider s network, thus avoiding a costly truck roll to the customer premises and enabling a true plug-and-play experience for the customer. Figure 2 illustrates the end-to-end network architecture to achieve auto-configuration. The Auto- Configuration Server (ACS) stores the pre-defined service configuration template, added and pre- validated by the service provider through its service configuration manager. BBF s technical report, TR-046, defines the DSL autoconfiguration architecture and framework. This generic framework can be divided into three distinct aspects: Figure 2. Auto-Configuration Network Architecture Data organization, validation, and storage, which is typically described in a data model for a specific technology (e.g., TR-106). Process and transport protocol used to convey the configuration information from the ACS to a CPE device; this is described in TR-069. Configuration information used in the CPE device leading to service activation which is device-specific. The following sections will briefly explain data model organization and TR-069, the CPE WAN Management Protocol (CWMP), followed by the specific data model being proposed by the Femto Forum and BBF to manage FAPs.
3 3 Auto-Configuration Data Organization A very important aspect of auto-configuration and flow-through service provisioning is the way configuration and service information is represented in the service provider domain. Such information needs to enable service providers to easily extend the configuration representation and quickly define new services with minimal incremental costs to roll out the new services. Configuration information representation is referred to as Data Model and an object-oriented model is preferred for this purpose as it allows easy extensibility and fits very well with the underlying Remote Procedure Call (RPC) methods used by protocol-independent transport mechanisms. TR-106 describes the data model template for TR- 069-enabled devices. The following sections explain this template briefly. Data Hierarchy Data representation for a TR-069 capable device will always have a single Root object which will be called either Device or InternetGatewayDevice. Typically the Root object contains two types of sub-elements: the Common Objects, applicable only to a Device Root object, and a single Services object that contains all the Service objects associated with the specific services or applications. For InternetGatewayDevice, the Root object will also contain the applicationspecific objects associated with it. A single device might include more than one service object (e.g., a device that serves both as a FAP and an IPTV set top box might include both FAP-specific and IPTV-specific Service objects) and/or more than one instance of the same type of Service object (e.g., where a TR-069 capable device proxies the management functions for one or more other devices that are not TR-069 capable). Figure 3 illustrates the Data Hierarchy and how the template is defined. Figure 4 pictorially illustrates the TR-069 Data Model Structure where each box represents an object container. Re-definition of the Service object or Root object over time is allowed via Object Versioning with the first version starting at 1.0. Object version is defined as a pair of integers ( major. minor ) separated Figure 3. Data Hierarchy 3 Figure 4. TR-069 Data Model Structure by., where the first integer is the major version number and the second integer is the minor version number. The major version changes if the subsequent version is not compatible with the previous versions, otherwise only the minor version changes. Profiles The ACS needs to be scalable enough to communicate with multiple devices with varying capabilities and potentially from different manufacturers. This variability is controlled by defining the Profiles that express a collection of requirements associated with a given object, support for which can be explicitly indicated by the device. A device supporting a profile means that the device supports all of the requirements defined by that profile. The use of profiles allows the ACS a shorthand means of discovering support for entire collections of capabilities in a device.
4 4 A given profile is defined only in the context of a specific Service object or Root object with a specific major version. A Profile s name must be unique among profiles defined for the same object and major version. A given profile is defined in association with a minimum minor version of a given object that includes all of the required elements defined by the profile. For each profile definition, the specific minimum version must be explicitly specified. For a given type of Service object, multiple profiles may be defined and they may have either independent or overlapping requirements. To allow the definition of a profile to change over time, the definition of every profile has an associated version number which uses a minor-only version numbering convention. All compatible changes to a profile use the same profile name but different minor versions. Any incompatible change to a profile shall use a different profile name. For every Service and Root object there is at least one Baseline profile defined which supports the minimum requirements required for any device that supports that object. CPE WAN Management Protocol Overview TR-069 defines a CPE WAN Management Protocol (CWMP) for secure auto configuration of CPE devices and provides other CPE management functions in a common framework, including: Auto Configuration and Dynamic Service Provisioning of a CPE device either on initially connecting to the broadband network or later while re-provisioning or re-configuring to allow services and capabilities to change in the future. CPE devices are identified based on various criteria such as CPE vendor, model, software version, etc. Software/Firmware image management including mechanisms for version identification, file (group or single) download initiation (ACS initiated downloads and optionally CPE initiated downloads), authentication of file source, and notification of the ACS of the success or failure of file download. Status and Performance monitoring of the CPE device. Figure 5. TR-069 Protocol Stack 1 Diagnostics for CPE to report critical information to the ACS, which may use it to diagnose and resolve connectivity or service issues as well as execute specific diagnostic tests. Security to prevent tampering with the management functions of a CPE or ACS, ensure confidentiality of the transactions that take place between them, allow appropriate authentication for each type of transaction, and prevent theft of service. CWMP to a large extent leverages the security services provided by underlying layers (e.g., SSL/TLS). Protocol Stack and Operation Figure 5 illustrates the protocol stack used in the CWMP. CPE/ACS Management App uses the CWMP protocol on the CPE and ACS and is locally defined by device vendors. RPC Methods define a generic mechanism by which an ACS can read or write parameters to configure a CPE device and monitor CPE status and statistics. Each parameter consists of a name-value pair where name identifies the particular parameter and has a hierarchical structure similar to files in a directory,
5 5 with each level separated by a dot. The value of a parameter is one of several defined data types. RPC Methods also define a mechanism to facilitate file downloads or optionally uploads for a variety of purposes, which includes firmware upgrades or vendor-specific configuration files. File transfers can be performed by Unicast (for downloads) or multicast transport protocols. Unicast protocols include HTTP/ HTTPS, FTP, SFTP, and TFTP. Multicast protocols include FLUTE and DSM-CC. RPC Methods are encoded using standard XML-based syntax called SOAP. CWMP recommends using the SOAP 1.1 protocol. SOAP runs over standard HTTP 1.1 protocol and security is enabled using SSL 3.0 and TLS 1.0 specifications, which run over standard TCP/ IP protocol. The CPE device acts as the HTTP client and the ACS acts as the HTTP server. HTTP can be run directly over TCP/IP if security is not a major concern. Protocol Operation The CPE device establishes a connection toward the ACS when it boots up for the first time or at a suitable trigger such as a change in the URL of the ACS. The ACS can be configured in the CPE or alternatively the CPE can discover the ACS using DHCP. After identifying the CPE (using the CPE vendor, model, software version, or other criteria), the ACS configures the writeable parameters in the CPE using RPCs. All of these configurations take the form of request/response and form a transaction, hence a series of transactions might be required to configure the CPE based on the number of parameters to be configured. All these transactions can happen in a single TCP/IP connection or they could span across multiple TCP/IP connections. An event is an indication that something of interest has happened that requires the CPE to notify the ACS via an Inform request. The CPE must attempt to deliver an event at least once. If the CPE is not currently in a session with the ACS, it must attempt to deliver events immediately by initiating a session with the ACS, otherwise it must attempt to deliver them after the current session terminates. Figure 6. Transaction Session Example 1 All transaction sessions must begin with an Inform message from the CPE to the ACS contained in the initial HTTP POST. This will be used to initiate a set of transactions and to communicate the limitations of the CPE with respect to message encoding. The session terminates when both the ACS and CPE have no more requests to send and no responses pending from either the ACS or the CPE. Only one transaction session shall exist between the CPE and ACS at a time. Please refer to Figure 6 for an example Transaction Session. FAP Data Model The Femto Forum is driving definition of the FAP Data Model along with BBF s Working Group 3. Reference 9 outlines the current working draft (submitted as a contribution to BBF) of the FAP Data Model as defined by the Femto Forum. The FAP Data Model is being defined based on the TR-106 template and will be transported over the CWMP protocol defined in TR Much of the following text is part of the current working draft.
6 6 Figure 7 illustrates the FAP Data Model, which is defined in Reference 9 as a Service object and called FAPService. FAPService is a container for a collection of three broad categories of management objects that cover all the aspects of FAP management. The base FAPService object includes parameters to identify whether the FAP service instance is enabled and the number of RF instances supported. The following sections briefly describe these management objects; refer to Reference 9 for details on the parameters. Control Object Group This group covers all the objects and parameters required to control the FAP s operation including: FapDevice object contains the general product description and hardware capabilities including FAP product Type. Parameters in this section are readonly. It contains two objects: Description object contains parameters characterizing the general product description including FAP Type (i.e., standalone or integrated), Vendor Name, Hardware Name and Version, Device ID, and other customer-specific information. CapabilitySet object contains parameters characterizing the capabilities supported by the FAP such as whether it is equipped with GPS; its maximum transmit power; whether it supports GSM, HSDPA, HSUPA, FDD/GSM; etc. FapControl object contains state management of the FAP and associated control of the FAP done by the network side. The base FapControl object contains parameters characterizing the general FAP state such as whether the FAP is enabled, whether FAP administration is locked, whether the RF transmitter is enabled, and the type of System supported (e.g., Umts). Device state management is based on X.731. FapControl object in turn contains one object: Umts object contains parameters that identify the Femto Gateway (FGW) and Security Gateway (SeGW) host name and IP address. Figure 7. FAP Data Model Structure 9 In the future, new objects for additional RF technology such as CDMA2000 and GSM are expected to be added to the FAPControl base object. AccessManagement object ensures management of subscription-based information. The base object contains parameters to identify whether Access Control List (ACL), Closed Subscriber Group (CSG), and Local IP Access (LIA) are supported. In addition it contains three objects: ACL object parameters identify the maximum number of ACL entries supported and the International Mobile Subscriber Identity (IMSI) and Temporary Mobile Subscriber Identity (TMSI) numbers for each ACL entry. CSG object parameters are yet to be defined and would likely identify a whitelist of subscribers in a group. LIA object parameters are yet to be defined and would likely identify local IP access domain and devices included among other parameters.
7 7 Configuration Object Group This group covers the aspects to configure the FAP for proper operation, including: CellConfig object contains configuration management of FAP functions and protocols. The base object contains parameters to identify the type of protocol supported (e.g., Umts). In addition, this object contains: Umts object that contains parameters to enumerate CN/RAN/Cell (RF) related configurations that define the FAP operational parameters, e.g., Public Land Mobile Network (PLMN) type (GSM or ANSI), Mobile Country Code (MCC), Mobile Network Code (MNC), Radio Network Controller (RNC) identifier, Cell Mode (FDD or TDD), Cell identifier, etc. In the future, new objects for additional RF technology such as CDMA2000 and GSM are expected to be added to the CellConfig base object. Transport object contains parameters and objects to manage functions and protocols related to Transport between the FAP and FGW. It contains four main objects Tunnel object is related to IPsec tunnels. The IPsec Architecture (see RFC4301) describes a general processing model based on three nominal databases: (1) Security Policy Database (SPD) specifying the policy that applies to all IP traffic (inbound or outbound); (2) Security Association Database (SAD) that contains parameters associated with each Security Association (SA); and (3) Peer Authorization Database (PAD) that provides a link between an SA management protocol (such as IKE) and the SPD. SPD is modeled by the TR-098 [2] Queue Management object, and mainly by the Classification table. SAD and PAD are modeled by Tunnel object parameters such as IKE SA peer address, IKE SA creation time, IKE SA lifetime, Child SA creation time, Child SA life time, etc. RealTime object manages Real Time Protocol (RTP) session and stream information via two tables. The RTP session table maintains an entry for each session with information such as session status, peer address, peer port, etc. The RTP stream table maintains an entry for sender and receiver with information such as stream status, RTCP status, stream direction, stream lost packet count, etc. Security object contains parameters and objects to manage security key information. It contains two tables: (1) The Shared-secret table gathers information about all types of shared-secret based credentials (e.g., simple shared secrets, UICC, emulated UICC, etc.); (2) The Public Key table gathers information about all types of public key based elements (e.g., raw key pairs, X.509 certificates, etc.) and stores CPE credentials, trust-anchors, etc. Basic X.509 certificate management is also supported. VPN object contains parameters relating to IPSec Tunnel based connectivity, including IP Address, subnet mask, DNS servers, count of bytes received/ sent, etc., for the VPN. Timing object contains management of synchronization mode, such as NTP and GPS. This object is yet to be defined further.
8 8 Monitoring and Management Object Group This group covers the aspects to monitor the operation of the FAP: REM object contains measurement of the mobile network information in the surrounding environment. The base object contains parameters such as Radio Environment Measurement (REM) trigger event, frequency of REM trigger, etc. In addition, it contains four objects: WcdmaFdd object represents the information gathered by the FAP by monitoring the RF environment in FDD mode of WCDMA in a Umts system. The collected information includes the Umts WCDMA FDD cells (both regular NodeB macrocells as well as other FAPs in the area). It contains parameter- enumerating information such as whether REM is enabled, timestamp of last REM, number of measured cells, etc. Gsm object represents the information gathered by the FAP by monitoring the RF environment in a GSM system including the FAP capable of receiving the GSM band. Parameters for this object are very similar to the parameters in WcdmaFdd object. AutoConfig object contains potential parameter values that are self-derived by the FAP based on the REM above. Gps object contains GPS-derived location information (such as Latitude, Longitude, last measured time, etc.) when the FAP contains a GPS receiver. ServiceEvents object contains the FAP event management related information to be delivered to the ACS. It contains four objects: Management object maintains the configuration of FAP service events such as event type, probable cause of the event, perceived severity of the event, authentication credential to upload specific event file, etc. ActiveEvents object maintains a list of active events (i.e., having an associated lifecycle) on the FAP such as event type, timestamp when the event was raised, probable cause of the event, perceived severity, etc. History object maintains a cyclic history of generated events on the FAP such as event type, timestamp when the event was raised, probable cause of the event, perceived severity, etc. PendingDelivery object maintains the event messages waiting to be delivered to the upstream Element Management System such as event type, timestamp when the event was raised, probable cause of the event, perceived severity, etc. ServiceMonitoring object contains aggregation of periodic sampling of counters in the UTRAN control function or the WCDMA cell supported by a FAP for statistics purpose, such as the number of successfully established Radio Access Bearer (RAB) connections, number of RABs successfully modified or released by the FAP, etc.
9 9 References 1 DSL Forum TR-069 Amendment 2, CPE WAN Management Protocol v1.1, Dec DSL Forum TR-098 Amendment, Internet Gateway Device Data Model for TR-069, Nov DSL Forum TR-106 Amendment 1, Data Model Template for TR-069-Enabled Devices, Nov GPP TS33.210, Network Domain Security (NDS); Authentication Framework (AF) (Rel. 8). Mar GPP TS32.642, Configuration Management (CM); UTRAN network resources IRP (IRP); Network Resource Model (NRM) (Rel.8), Mar GPP TS32.405, Performance Management (PM); Performance measurements UTRAN (UTRAN) (Rel. 8), Mar GPP TS22.011, Service Accessibility (Rel. 8), June GPP TR25.820, 3G Home NodeB Study Item Technical Report (Rel. 8), Mar ff_wg3_data_model_draft_v05, FAP Data Model (Working Draft),, Femto Forum Sep Corporate Headquarters 5435 NE Dawson Creek Drive Hillsboro, OR USA Fax Toll-Free: [email protected] 2011 Radisys Corporation. Radisys, Trillium, Continuous Computing and Convedia are registered trademarks of Radisys Corporation. *All other trademarks are the properties of their respective owners. September 2011
ETSI ES 203 069 V1.2.1 (2011-09)
ES 203 069 V1.2.1 (2011-09) Standard Access, Terminals, Transmission and Multiplexing (ATTM); Remote management of CPE over broadband networks; CPE WAN Management Protocol (CWMP) 2 ES 203 069 V1.2.1 (2011-09)
3GPP TS 32.593 V9.0.0 (2009-12)
TS 32.593 V9.0.0 (2009-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Home enode B (HeNB) Operations,
TR-069 CPE WAN Management Protocol v1.1
TECHNICAL REPORT TR-069 CPE WAN Management Protocol v1.1 Version: Issue 1 Amendment 2 Version Date: December 2007 2007 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit
TR-069 Brings Flexibility To DSL Remote Management
TR-069 Brings Flexibility To DSL Remote Management by Mukesh Kumar Product Manager, Networking and Multimedia Gateways Residential Gateway and Embedded Systems Business, Texas Instruments Incorporated
W52P IP DECT Phones (with firmware version 30 or later)
This technote mainly provides a general introduction of TR-069 (Technical Report 069) and the way of enabling the TR-069 on the Yealink IP phones. It also provides the supported RPC methods and the information
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
Gigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011
Gigaset IP and IP-PRO Phones Provisioning / Remote Management last modifications by J. Stahl, Bocholt, January the 18 th 2011 Agenda Provisioning / Remote Management for Gigaset IP phones Introduction
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
Protocol Signaling Procedures in LTE
White Paper Protocol Signaling Procedures in LTE By: V. Srinivasa Rao, Senior Architect & Rambabu Gajula, Lead Engineer Overview The exploding growth of the internet and associated services has fueled
3GPP Femtocells: Architecture and Protocols. by Gavin Horn
3GPP Femtocells: Architecture and Protocols by Gavin Horn QUALCOMM Incorporated 5775 Morehouse Drive San Diego, CA 92121-1714 U.S.A. 3GPP Femtocells: Architecture and Protocols September 2010-2 - Contents
Broadband Forum - Remote Management Work
Broadband Forum - Remote Management Work Why Standardize Management Protocols? 2 BroadbandHome Remote Management Framework OSS/BSS Policy Call Center WT-131, WT-132: ACS Northbound Interface Auto-Configuration
JDSU Signaling Analyzer Solution for Femtocell Monitoring
COMMUNICATIONS TEST & MEASUREMENT SOLUTIONS JDSU Signaling Analyzer Solution for Femtocell Monitoring Key Features Interpret, correlate and analyze protocol messages on both sides of the femtocell gateway
CPE Management Overview
CHAPTER 4 This chapter describes the management of customer premises equipment (CPE) by using the CPE WAN Management Protocol for Cisco Broadband Access Center (BAC). It features: Overview, page 4-1 BAC
introduction to femtocells
.. introduction to femtocells Kévin Redon Technische Universität Berlin, Security in Telecommunications [email protected] OsmoDevCon 2012, Berlin, 24th March 2012 UMTS architecture SecT
TR-069 CPE WAN Management Protocol
TECHNICAL REPORT TR-069 CPE WAN Management Protocol Issue: 1 Amendment 5 Issue Date: November 2013 CWMP Version: 1.4 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
DSL Forum Technical Report TR-054
DSL Forum Technical Report TR-054 (Formerly WT-074v1) Updates and supercedes TR-038 DSL Service Flow-Through Fulfillment Management Overview Abstract: August 2002 This Working Text defines the first set
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
Smartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
Secure distribution of the device identity in mobile access network. Konstantin Shemyak senior security specialist, Nokia Siemens Networks
Secure distribution of the device identity in mobile access network Konstantin Shemyak senior security specialist, Nokia Siemens Networks 1 MobiSec-2010 Secure distribution of the device identity in mobile
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
Femtocells: A Poisonous Needle in the Operator s Hay Stack
Femtocells: A Poisonous Needle in the Operator s Hay Stack Ravishankar Borgaonkar, Nico Golde and Kevin Redon Security in Telecommunications Technische Universität Berlin and Deutsche Telekom Laboratories
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
BroadCloud PBX Customer Minimum Requirements
BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide
VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Appendix C Network Planning for Dual WAN Ports
Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Third Party Integration
APPENDIXG This appendix contains the following sections: Overview, page G-1 BlackBerry Enterprise Server, page G-1 Blue Coat, page G-2 Check Point, page G-3 Firebox, page G-4 ISA Server/Forefront TMG,
GS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network
Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components
Broadband Forum Machine-to-Machine (M2M) Solutions
Broadband Forum Machine-to-Machine (M2M) Solutions OMA Workshop, February 2012 Barcelona, Spain Robin Mersh, CEO [email protected] Tim Spets, Motorola The information in this presentation is public
Use of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
V310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Com.X IP PBX The complete communications solution in a box
IP PBX Utilising VPN security when extending PBX services to remote users Virtual Private Network It is not uncommon for a single company to occupy more than one set of premises. Individual users on geographically
Innominate mguard Version 6
Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Fanvil VoIP Auto Provison Standard
Fanvil VoIP Auto Provison Standard Version Author Date Remark 1.0 May 2012-1-11 I write the first fanvil VoIP auto provision standard according to the before auto provision and the new auto provision standard
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Configuring Windows Server 2008 Network Infrastructure
Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online
1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The
TR-296 IPv6 Transition Mechanisms Test Plan
Technical Report TR-296 IPv6 Transition Mechanisms Test Plan Issue:1 Issue Date: November 2013 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized
Device Provisioning in Cable Environments
A white paper by Incognito Software March, 2009 2009 Incognito Software Inc. All rights reserved. Page 1 of 8 Introduction... 2 Auto-Provisioning and Pre-Provisioning... 2 Components Involved in Device
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Chapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
TR-143. Enabling Network Throughput Performance Tests and Statistical Monitoring TECHNICAL REPORT. Issue: 1 Corrigendum 1 Issue Date: December 2008
TECHNICAL REPORT TR143 Enabling Network Throughput Performance Tests and Statistical Monitoring Issue: 1 Corrigendum 1 Issue Date: December 2008 The Broadband Forum. All rights reserved. Notice The Broadband
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
3GPP TS 29.161 V6.3.0 (2007-12)
TS 29.161 V6.3.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Interworking between the Public Land Mobile Network (PLMN)
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Mobile Device Management A Functional Overview
Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute
Background 1 Table 1 Software & Firmware Versions Tested 1 Figure 1 Integra s Universal Access (UA) IP PBX Test Configuration 1
1 Background 1 Table 1 Software & Firmware Versions Tested 1 Figure 1 Integra s Universal Access (UA) IP PBX Test Configuration 1 Configuration Data 2 Section 1: Initial IPitomy IP PBX Connection & Login
Timing over Packet. Technical Brief
Technical Brief 02/08 1. Abstract This paper is designed to help operators understand how to deploy Precision Time Protocol (PTP, or IEEE 1588v2) in mobile networks for the purpose of synchronizing base
This page displays the device information, such as Product type, Device ID, Hardware version, and Software version.
Huawei HG622 -- HUAWEI Home Gateway STATUS Device Device xtm WAN LAN WLAN This page displays the device information, such as Product type, Device ID, Hardware version, and Software version. XTM This page
CT505-30 LANforge-FIRE VoIP Call Generator
1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP
Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007
Feature Brief FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007 Revision History Revision Change Description 1.0 Initial Release. 1.1 Removed sectoin on Content Archive and AV
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
SonicOS Enhanced 5.7.0.2 Release Notes
SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
For extra services running behind your router. What to do after IP change
For extra services running behind your router. What to do after IP change This guide is for customers who meet the following conditions: - Customers who have moved from a TPG Layer 3 plan to a TPG Layer
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Chapter 8 Virtual Private Networking
Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
Part Number: 203285. HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD.
Part Number: 203285 HG253s V2 Home Gateway Issue V100R001_01 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
TECHNICAL REPORT. DSL Forum TR-069. CPE WAN Management Protocol. May 2004. Produced by: DSLHome-Technical Working Group
TECHNICAL REPORT DSL Forum CPE WAN Management Protocol May 2004 Produced by: DSLHome-Technical Working Group Editors: Jeff Bernstein, 2Wire Tim Spets, Westell Working Group Co-Chairs: Greg Bathrick, Texas
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
EDA 1200 4.3 Training Programs. Catalog of Course Descriptions
EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Open Mobile Alliance (OMA) Device Management Overview. Peter Thompson Mark Staskauskas Qualcomm Incorporated
Open Mobile Alliance (OMA) Device Management Overview Peter Thompson Mark Staskauskas Qualcomm Incorporated Motivation for this Presentation Many of the features envisioned for the TR-50 Smart Device Communications
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
IPv6 for AT&T Broadband
IPv6 for AT&T Broadband Chris Chase, AT&T Labs Sept 15, 2011 AT&T Broadband ~15 million subscribers Legacy DSL, PPP subscribers, ATM aggregation Not many CPE IPv6 capable Customer owned, unmanaged CPE
