AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010
|
|
|
- Eleanor Wilcox
- 10 years ago
- Views:
Transcription
1 AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov Nov-2010, Issue 1 All contents copyright GS1 Page 1 of 19
2 Document Summary Document Item Document Title Date Last Modified Current Value AS2 Disaster Recovery Implementation Guide 18-Nov-2010 Current Document Issue Issue 1 Status Document Description Approved The purpose of this AS2 Disaster Recovery Guideline is to provide information about Disaster Recovery Planning (DRP) as it relates to Applicability Statement 2 (AS2) an industry standard for Internet-based data exchange. Contributors Name Organization Log of Changes in Issue 1 Issue No. Date of Change Changed By Summary of Change Disclaimer Whilst every effort has been made to ensure that the guidelines to use the GS1 standards contained in the document are correct, GS1 and any other party involved in the creation of the document HEREBY STATE that the document is provided without warranty, either expressed or implied, of accuracy or fitness for purpose, AND HEREBY DISCLAIM any liability, direct or indirect, for damages or loss relating to the use of the document. The document may be modified, subject to developments in technology, changes to the standards, or new legal requirements. Several products and company names mentioned herein may be trademarks and/or registered trademarks of their respective companies. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 2 of 19
3 Table of Contents 1. Introduction Purpose of this Document Who Will Use this Document? Implementation Procedures Software Failure Localized Hardware Failure Network Failure Full Scale Disaster Involving a Hot, Warm, Cold or Live-Live Site Generalized Diagram of AS2 Disaster Recovery Scenarios for AS2 Disaster Recovery Energy Company Failover System Mid-Level Transaction Volume with Very Low Tolerance for Recovery Delays Operational Description Software Requirements Hardware Requirements Cost Guidelines Live-Live Failover System High-Level Transaction Volume with Very Low Tolerance for Recovery Delays Operational Description Software Requirements Hardware Requirements Cost Guidelines Live-Live Failover System High-Level Transaction Volume with Very Low Tolerance for Recovery Delays Operational Description Software Requirements Hardware Requirements Cost Guidelines Live-Live Failover System High-Level Transaction Volume with Very Low Tolerance for Recovery Delays Operational Description Software Requirements Hardware Requirements Cost Guidelines Recovery Considerations and Recommendations Firewall IP Addresses Nov-2010, Issue 1 All contents copyright GS1 Page 3 of 19
4 5.3. Certificates URL Appendix A. Glossary of Terms and Acronyms Acronyms and Abbreviations Terminology A B C E G I M O P Q S T Z Appendix B. Frequently Asked Questions Nov-2010, Issue 1 All contents copyright GS1 Page 4 of 19
5 1. Introduction 1.1. Purpose of this Document The purpose of this AS2 Disaster Recovery Guideline is to provide information about Disaster Recovery Planning (DRP) as it relates to Applicability Statement 2 (AS2) an industry standard for Internet-based data exchange Who Will Use this Document? This document is for anyone that is responsible for preventing, planning for, or recovering from an event that could negatively impact the integrity of electronic data. 2. Implementation Procedures The following sections provide an introduction to Disaster Recovery Planning as it relates to AS2, and an overview of the activities recommended for successful disaster recovery. In this section we review the various types of disaster level failures that must be planned for, some of which are: Software failure Localized hardware failure Network failure Full scale disaster involving a hot site 2.1. Software Failure A software failure (crash or bomb) is when a program is not able to continue processing due to incorrect programming logic. Examples are when the web site is down or there is a corrupted database Localized Hardware Failure A localized hardware failure is when there is a malfunction within the electronic circuits or electromechanical components (disks, drives, cables, circuit boards, etc.) of a computer system at the production or local site. (The production or local site is abbreviated as CoLoProd in diagrams later in this document.) Recovery requires troubleshooting to find the component and repair or replace the malfunctioning part Network Failure A network failure is a malfunction of any of the following components Network operating system in a client or server machine Cables connecting machines Hardware in between, such as bridges, routers, and switches In a wireless system, antennas and towers 18-Nov-2010, Issue 1 All contents copyright GS1 Page 5 of 19
6 2.4. Full Scale Disaster Involving a Hot, Warm, Cold or Live-Live Site A full scale disaster is when a whole site is down malfunctions are extensive enough to where the whole local production system is duplicated and switched over to another geographic location. A hot, warm, or cold site is a site that is switched over to in the case of failure of a whole system. There are 4 different categories of disaster recovery scenarios with different recovery times. Cold site Software and hardware is assembled and built and switched over to replace the production site. Typically it is turned over to in a 48 hour recovery period. Warm site A duplicate system is built (software and hardware) and standing by running but not quite ready for turnover. Typically it is turned over to in a 24 hour recovery period. Hot site A complete duplicate system is already installed, assembled and built. It is running and standing by to be turned over to. Typically, it is turned over within 15 minutes. Live-Live site A complete duplicate system at another site is always running and processing a portion of the total load. Typically AS2 network transmissions are variably directed to one site or the other. Control information about the status of transmissions, partner information, etc., is continually synchronized between the two sites. Received files are directed to the appropriate internal application. 3. Generalized Diagram of AS2 Disaster Recovery Failover Primart Site Server GISB v1.4 GISB v1.4 Trading Partner (TP) Proxy Server Firewall SQL Database and File Replication through our Cisco VPN using CA XOsoft Replication Software Inbound Outbound to TP Failover Relpication Colo Server Proxy Server GISB v1.4 GISB v1.4 Colo Firewall 18-Nov-2010, Issue 1 All contents copyright GS1 Page 6 of 19
7 4. Scenarios for AS2 Disaster Recovery The following section contains various scenarios for AS2 Disaster Recovery 4.1. Energy Company Failover System Mid-Level Transaction Volume with Very Low Tolerance for Recovery Delays Wednesday, July 14, 2010 Failover System DNS Failover Public IP Address Fails Over To Failover System If An Outage Occurs. Failover System Primary System CoLoProd Production F/O Proxy Server DR Proxy Server Proxy Server Production Failover T2 DR T2 Server T2 Syncronization T2 Server Production FailoverSQL DR SQL Database Server SQL Database Replication SQL Database Server Page 1 18-Nov-2010, Issue 1 All contents copyright GS1 Page 7 of 19
8 Operational Description Requires two identical sets of hardware and software at two remote locations both responding to the same URL. Both sites are capable of processing all AS2 communications. Trading partners will send data to the common URL. The AS2 transmission is routed to the appropriate Content Smart Switch by best path determination. After being directed to the Content Smart Switch the transmission is sent to the Web Server cluster completing the HTTP AS2 session. AS2 messages are then passed through a firewall (if allowed) to the High Availability Cluster of AS2 servers. Data and configurations are synchronized live and continuously between the two sites. Within each site a failure of a server would cause the transmission to be directed to another within the cluster. If the entire site were to experience an outage the transmissions would be sent to the alternate site for processing Software Requirements Software licensing will be required for both sites. Software supporting synchronization and High Availability over a WAN connection will have to be purchased for both sites Hardware Requirements Duplicate hardware will be required at the sites. A reliable high bandwidth connection between the sites will be necessary also. A point to-point VPN connection between the sites is highly recommended Cost Guidelines The costs for this scenario will be a little more than twice that of a single site Live-Live Failover System High-Level Transaction Volume with Very Low Tolerance for Recovery Delays 18-Nov-2010, Issue 1 All contents copyright GS1 Page 8 of 19
9 External Trading Partners Sample Live Live AS2 Infrastructure Via AS2 (HTTP) Internet DNS/ IP Router URL: X.Y.Z.com DNS/ IP Router URL: X.Y.Z.com Content Smart Switch Content Smart Switch US Active Web App. Servers Europe Active Web App. Servers HA Server Cluster Peer Networking (Configuration Replication) HA Server Cluster A p p l i c a t i o n A p p l i c a t i o n s s Operational Description Two complete duplicate systems at different sites have the same domain name (URL) and are always processing a portion of the total AS2 message load. Trading partners send AS2 messages which are variably directed to one site or the other. The AS2 transmission is processed by the DNS/IP Router at the site which responds first (based on internet latency). At either site, the AS2 message goes through a firewall into the DMZ and is passed to a Content Smart Switch which directs it to one of two Web Application Servers. The Web Application Server completes the HTTP AS2 session in the DMZ. The AS2 message is transferred through a second firewall (out of the DMZ) to one of several High Availability AS2 servers based on load balancing. Control information about the status of transmissions, partner information, etc. is continually synchronized between the two sites. If one site fails, all transmissions automatically go to the other site. This approach can handle both planned and unplanned outages. This approach is useful if virtually no AS2 downtime is acceptable Software Requirements A second AS2 software license is required, as well as an AS2 software solution that supports synchronization of control information (configuration replication) across a wide area network. A software application to transfer payload files to and from internal applications across a wide area network is also required. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 9 of 19
10 Hardware Requirements Investment in duplicate hardware at a second site, as well as a High Availability server cluster at each site is required. A reliable high bandwidth network connection between the two sites is also needed Cost Guidelines Costs will be at least two times the cost of a single site solution. However the need for a separate disaster recovery site (or contract) for AS2 connectivity is avoided. If the business cost of losing AS2 connections with customers and suppliers is high, this solution may be worthwhile Live-Live Failover System High-Level Transaction Volume with Very Low Tolerance for Recovery Delays 18-Nov-2010, Issue 1 All contents copyright GS1 Page 10 of 19
11 Operational Description Two complete duplicate systems at different sites have the same domain name (URL). Trading partners send AS2 messages to a Global Site Selector (GSS) which then directs the traffic to one site or the other. The GSS renews the IP address from each CSS at a set interval of time. If one data center is down, all traffic will route to the other. At either site, the AS2 message goes through a firewall into the DMZ and is passed to a Content Smart Switch which directs it to one of several AS2 Application Servers based on server and AS2 application availability. The Web Application Server completes the HTTP AS2 session in the DMZ. The AS2 message is then transferred through a second firewall (out of the DMZ) to one a High Availability server for storage and further application level routing. Control information about the status of transmissions, partner information, etc. is continually synchronized between the two sites. If one site fails, all transmissions automatically go to the other site. This approach can handle both planned and unplanned outages. This approach is useful if virtually no AS2 downtime is acceptable Software Requirements Depending on your companies AS2 software contract, additional AS2 software licenses may be required. A software application to transfer payload files to and from internal applications across a wide area network is also required Hardware Requirements Investment in duplicate hardware at a second site, as well as a High Availability server cluster at each site is required. A reliable high bandwidth network connection between the two sites is also needed. A reliable power backup for both sights is recommended. Several pieces of network routing equipment (Global Site Selector and Content Smart Switches) will be required Cost Guidelines Costs will be at least two times the cost of a single site solution. However the need for a separate disaster recovery site (or contract) for AS2 connectivity is avoided. This solution is also useful if your business model supports units in several different time zones where it is difficult to have downtime for system maintenance. If the business cost of losing AS2 connections with customers and suppliers is high, this solution may be worthwhile. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 11 of 19
12 4.4. Live-Live Failover System High-Level Transaction Volume with Very Low Tolerance for Recovery Delays Operational Description In the primary production system, inbound calls route into the DMZ which uses a load balancer to go to multiple relay servers run off an Intel platform and bring them into the internal domain. It processes all inbound/outbound EDI transactions. The transactions run on mainframe. The gateway is doing XML as well. There is a duplicate backup facility in a different location which runs a QA environment. Backups are done frequently with copies. There is very low loss of data. Tiered applications are provisioned by priority. By design the test platform must run at 85% of capacity of production. If a disaster occurs, the system is brought up using a second copy at the backup facility using the same IP address. Communications start going to the secondary site. Full DR tests with simulated outages are done twice a year, isolated from production. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 12 of 19
13 Software Requirements Depending on your companies AS2 software contract, additional AS2 software licenses may be required. A software application to transfer payload files to and from internal applications across a wide area network is also required Hardware Requirements Investment in duplicate hardware at a second site, as well as a High Availability server cluster at each site is required. Duplicate hardware is not idle, but runs the QA environment except in case of disaster Cost Guidelines Costs will be at least two times the cost of a single site solution. However the need for a separate disaster recovery site (or contract) for AS2 connectivity is avoided. This solution is also useful if your business model supports units in several different time zones where it is difficult to have downtime for system maintenance. If the business cost of losing AS2 connections with customers and suppliers is high, this solution may be worthwhile. 5. Recovery Considerations and Recommendations Discussion of possible barriers to recovering AS2 communications and remedies/planning considerations and recommendations. Proactive and Reactive steps are included Firewall Barrier: Firewall setup at DR site must be identical to firewall rules and port openings to production site. If not identical, trading partners will be denied access. Recommendation: There should be careful setup of DR site firewall rules and port openings IP Addresses Barrier: When DR site is activated, IP addresses of various application servers will be different. Recommendation: Trading partners have to be informed of DR site IP addresses, as well as production site IP addresses Certificates 5.4. URL Barrier: Updating to synchronize DR and production sites can be extremely time-consuming. Recommendation: Updating of public key certificates can be greatly improved by utilization of certificate automation standard work of GS1 etg (reference...) Barrier: When DR site is activated DNS updates may be delayed to trading partners. Recommendation: All trading partners should be notified to flush their DNS cache. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 13 of 19
14 Appendix A. Glossary of Terms and Acronyms The following glossary was updated for the 18-Nov-2010 publication of this document. Please refer to the GDSN glossary in the GS1 GDD ( for the latest version Acronyms and Abbreviations AS2 Applicability Statement 2 (AS2). DRP Disaster Recovery Planning. ERP Enterprise Resource Planning Terminology A B C E G I M O P Q S T A B Activity An action that took place during a given time period with a defined start time and end time AS1 Applicability Statement 1 An Internet Request For Comment (RFC) defining how applications can securely transport EDI and XML over the Internet using SMTP. It specifies how to transport data files. AS2 Transports business-critical data over the Internet via HTTP (Hypertext Transfer Protocol) or HTTP/S (Secure HTTP). AS2 provides additional security protection as well as responding with a message letting the sender know that the data was received. AS3 Applicability Statement 3 An Internet draft defining how applications can securely transport EDI and XML over the Internet using FTP. It specifies how to transport data files. Authentication Ensures the accurate identification of both the sender and the receiver. Is accomplished via digital signatures. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 14 of 19
15 C E Ciphertext Data that has been transformed from a plaintext form into encrypted text (an unreadable form) via an encryption process. Digital Certificate A document that contains name, serial number, expiration dates & a copy of the owner s public key; used to encrypt data & validate signatures. Digital Signature An electronic signature that can be used to authenticate the identity of the sender of a message, and via the encrypted document digest, to ensure that the original content of the data that has been sent is unchanged. Document Digest A unique "fingerprint" summary (128 or 160 bits long) of an input file. It is used to create a digital signature and to ensure that the file has not been altered. It is also called a hash and is produced by a checksum program that processes a file. EDI Electronic Data Interchange The exchange of structured business data computer to computer. EDI data format standards are developed by the EDIFACT Working Group of the United Nations and the Accredited Standards Committee (ASC) X12 of the American National Standards Institute. EDIINT EDI Over the Internet Working Group A working group of the IETF that developed the AS1 and AS2 standards. Encryption A process that uses a mathematical algorithm and a key to transform data into an unreadable format (called ciphertext). A receiver can then use a key to restore the data to its original content G I HTTP Hypertext Transport Protocol - The HyperText Transfer Protocol (HTTP) is the de facto standard for transferring World Wide Web documents. IETF Internet Engineering Task Force - The Internet Engineering Task Force is a large, open, international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. Integrity Ensures that data is neither tampered with nor corrupted in transit. Is accomplished via document digests and digital signatures. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 15 of 19
16 ISP Internet Service Provider - A company that provides end users (individuals and companies) access to the Internet M O MDN Message Disposition Notification A document, typically digitally signed, acknowledging receipt of data from the sender. Message An Internet message consists of header fields (collectively called "the header of the message") followed by a body. The header is a sequence of lines of characters with special syntax. The body is a sequence of characters that follows the header and is separated from the header. See RFC 2822 Message-ID Message Identifier - A globally unique identifier for a message. The sending implementation must guarantee that the Message-ID is unique. See RFC MIME Multipurpose Internet Mail Extension - MIME is a specification for enhancing the capabilities of standard Internet electronic mail. It offers a simple standardized way to represent and encode a wide variety of media types for transmission via the Internet. Non-repudiation of Receipt Confirms that the intended party received the data. Is accomplished via digital signatures and signed MDNs P Payload The body of the message that contains a business document(s) and is protected by encryption and a digital signature. Privacy Ensures that only the intended receiver can view the data. Is accomplished via a combination of encryption algorithms and message packaging. Private Key A value known only to the owner, used to create a signature and decrypt data encrypted by its corresponding public key. Public Key A value, known by everyone to whom the certificate has been distributed, used to encrypt data and validate a digital signature. Although mathematically related to the private key, it is astronomically difficult to derive from the public key. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 16 of 19
17 Q S Receiver of Message The EDIINT application and/or site which receives the Message containing the business payload. The Receiver of Message sends a MDN back to the Sender of Message. Retry When attempting to send an AS2 message, the Sender of Message can encounter transient failures. "Retry" is the term used in this document to refer to an additional send attempt (HTTP POST) of the same message, with the same content and with the same Message-ID value. A Retry can occur whether the Sender of Message requests a Synchronous or Asynchronous MDN. Resend When a MDN response is not received in a timely manner, the Sender of Message may choose to resend the original message. Resend only applies when the Sender of Message requests an Asynchronous MDN. Because the message has already been sent, but has presumably not been processed according to expectation, the same message, with the same content and the same Message-ID value is sent again. This operation is referred to as a resend of the message. Resending ends when the MDN is received or the resend count is reached. Resubmit Neither Resending nor Retrying continue forever, but the data may still need to be exchanged at a later time, so a message may need to be resubmitted. When data that failed to be exchanged or was exchanged but later lost is resubmitted in a new message (with a new Message-ID value), it is called resubmission. Resubmission is normally a manual compensation. Schema A set of rules to which an XML document must conform in order to be considered 'valid' according to that schema. This is a specific reference to the World Wide Web Consortium's approved standard XML Schema language. Sender of Message The EDIINT application and/or site which transmits the Message containing the business payload to the "Receiver of Message S/MIME Secure MIME - S/MIME (Secure/Multipurpose Internet Mail Extensions) provides a consistent way to send and receive secure MIME data. Based on the popular Internet MIME standard, S/MIME provides the following cryptographic security services for electronic messaging applications: authentication, message integrity and non-repudiation of origin (using digital signatures) and privacy and data security (using encryption). SMTP Simple Mail Transport Protocol - An Internet standard for transporting . Symmetric Key A single secret key used to encrypt or decrypt a file, known only by the sender and receiver. It is used in the symmetric-key encryption process in which each computer has a secret key (code) that it can use to encrypt 18-Nov-2010, Issue 1 All contents copyright GS1 Page 17 of 19
18 information before it is transmitted to another computer. Symmetric-key encryption requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message T Z UN/EDIFACT United Nations / Electronic Data Interchange for Administration, Commerce and Transport VAN Value Added Network XML extensible Markup Language. A widely used standard from the World Wide Web Consortium (W3C) that facilitates the interchange of data between computer applications. XML is similar to the language used for Web pages, the HyperText Markup Language (HTML), in that both use markup codes (tags). XML allows the developers create customized tags that offer greater flexibility in organizing and presenting information than is possible with HTML. 18-Nov-2010, Issue 1 All contents copyright GS1 Page 18 of 19
19 Appendix B. Frequently Asked Questions Question What is DR? What is AS2? Reply Disaster Recovery AS2 (Applicability Statement 2) is an Internet Engineering Task Force (IETF) standard (RFC4130) that specifies how to transport data securely and reliably over the Internet. Data can consist of Electronic Data Interchange (EDI) messages or XML messages, but may also be of any other message type or format. AS2 specifies how to connect, deliver, validate and acknowledge data. AS2 creates an envelope for a message which is then sent securely over the Internet. Security is achieved by using digital certificates and encryption. An implementation of AS2 involves two machines, a client and a server, communicating with each other over the Internet. On the operating system level, the AS2 client may be a server, too, offering its communication services to application software. The client sends data to the server, e.g. a trading partner. On receipt of the message the receiving application sends an acknowledgement or MDN (Message Disposition Notification) back to the sender. Are AS1, AS2, and AS3 official standards? Yes, AS1, AS2, and AS3 are official standards. The AS2, AS1, and AS3 standards were developed and by and currently governed by the Internet Engineering Task Force (IETF AS2 is registered as IETF standard RFC4130, AS1 is registered as RFC3335, and AS3 is registered as RFC Nov-2010, Issue 1 All contents copyright GS1 Page 19 of 19
EDIINT AS1 and AS2 Transport
EDIINT AS1 and AS2 Transport Communication Guidelines Issue 1, Feb-2006 Feb-2006, Issue 1 All contents copyright GS1 2006 Page 1 of 24 Document Summary Document Item Document Title Date Last Modified Current
GS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide
GS1 Newcomers to AS2 Implementation Guide Issue 1, 23-June-2008 23-June-2008, Issue 1 All contents copyright GS1 2008 Page 1 of 14 Document Summary Document Item Document Title Date Last Modified Current
GS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Royal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Using email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Quickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
ODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2
ODEX Enterprise Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2 Copyright Data Interchange Plc Peterborough, England, 2013. All rights reserved. No part of this document may be disclosed
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Configuring High Availability for Embedded NGX Gateways in SmartCenter
Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and
AS2 AND EDI OVER THE INTERNET FAQ
AS2 AND EDI OVER THE INTERNET FAQ A SoftCare EC Inc. White Paper ABOUT SOFTCARE Founded in 1989 and headquartered in British Columbia, SoftCare EC Inc. develops e-business software. Our OpenEC product
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Everything You Need to Know About Network Failover
Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know
Service Level Agreement for Windows Azure operated by 21Vianet
Service Level Agreement for Windows Azure operated by 21Vianet Last updated: November 2015 1. Introduction This Service Level Agreement for Windows Azure (this SLA ) is made by 21Vianet in connection with,
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
DeltaV Virtualization High Availability and Disaster Recovery
DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
AS4: Web Services for B2B. GS1 etg White Paper. Issue 1, Approved, July 2011. AS4: Web Services for B2B GS1 etg White Paper
AS4: Web Services for B2B GS1 etg White Paper Issue 1, Approved, July 2011 Issue 1, Approved, July 2011 All contents copyright GS1 Page 1 of 14 Document Summary Document Item Document Title Current Value
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
Cloud Computing Disaster Recovery (DR)
Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Public-Root Name Server Operational Requirements
Public-Root Name Server Operational Requirements Published January the 17 th, 2005 Status of this Document This document provides information to the Public-Root and Internet technical community. This document
Oracle Collaboration Suite
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
Attachment D System Hardware & Software Overview & Recommendations For IRP System
Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3
OpenText Secure MFT Network and Firewall Requirements
NETWORK OpenText Secure MFT Network and Firewall Requirements Secure MFT is a client-server solution that provides accelerated transfer of large files over any network connection. The solution architecture
GFI Product Manual. Getting Started Guide
GFI Product Manual Getting Started Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Massachusetts Electronic Business Transaction Working Group
Massachusetts Electronic Business Transaction Working Group Report On: Internet Transmission Protocols Version 1.1 October 24, 2002 Contributors The extensive materials and insight provided by the following
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
VPN Only Connection Information and Sign up
VPN Only Connection Information and Sign up Revision 4/16/2013 CU*Answers supports a variety of VPN network configurations for credit unions that desire to use VPN for primary connectivity. These options
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
ENTERPRISE DATA CENTER CSS HARDWARE LOAD BALANCING POLICY
CSS HARDWARE LOAD BALANCING POLICY Version 2.5 Date: 04/11/2014 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
Technical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
DISASTER RECOVERY WITH AWS
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
Technical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Technical Considerations in a Windows Server Environment
Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Secure Use of the New NHS Network (N3): Good Practice Guidelines
Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version
1 Product. Open Text is the leading fax server vendor in the world. *
1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Serial Deployment Quick Start Guide
PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and
5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance
5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance DEPLOYMENT GUIDE Prepared by: Jim Puchbauer Coyote Point Systems Inc. The idea of load balancing
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
APPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Prepared by: CP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 Page i Copyright 2012 Transglobal Secure
Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Disaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright
CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
Online Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
BME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
APPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Effective Data Inc. White Paper: EDIINT EDI Over the Internet
Effective Data Inc. White Paper: EDIINT EDI Over the Internet 1515 E. Woodfield Road Suite 770 Schaumburg, IL 60173 Ph (847) 969-9300 Fx (847) 969-9350 www.effective-data.com TABLE OF CONTENTS Executive
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60
EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
