Technological enhancements in B2B integration introduced by the new IT platform to manage the Commercial Process Nomination and Balancing
|
|
- Irma Hutchinson
- 8 years ago
- Views:
Transcription
1 Technological enhancements in B2B integration introduced by the new IT platform to manage the Commercial Process Nomination and Balancing Detail of the activity and planning San Donato Milanese Aprile 2014 snamretegas
2 Agenda Objective and scope of the document B2B integration: Https protocol Certification B2B integration : Communication X12 Authentication Client/Server HTTPS and certificates 2
3 Objective and scope of the document Snam Rete Gas has identified a number of technological enhancements in B2B integrations, to manage the communications refer to the the Nomination process using X12/GISB protocol. Refer to the communication of 10 of March (to see pubblication on the istitutional web site) about: The summary of the possible impacts that these enhancements will have on Shippers (hereinafter UdT) The timing reference needed to ensure the proper exchange of information via the B2B X12 protocol. The objective of this document is to provide a detail than anticipated like indication for adapting the system, as well as the preliminary activities and its schedule of reference for using of new system by Shippers. 3
4 B2B integration: HTTPS Protocollo Certification In order to ensure an adeguate level of security for the B2B communication, in Logistica Gas System expected that the X12 feeds will be managed exclusively via HTTPS in both directions, with autenthication of the sender system (Basic Autentication) and cryption of sent message. The impacts to the Shippers can be distinguished by the type of exchanged feed with Snam Rete Gas, and in particular are classified as follows: B2B flow with UdT that implement only X (Nomination): In this case the Shippers to manage the communication to Snam Rete Gas using the HTTPS protocol with cryption message will have to share to Snam Rete Gas the pairs of Digital Certificates and Application Keys (UdT- SRG; for the Authentication part Snam Rete Gas will provvide the credentials) B2B flow with UdT that also implement messages X and/or 885 In this case the Shippers, refer to parameter for the message 850, will give to Snam Rete Gas an application URL that the Logistica Gas System will use for the communication back. 4
5 B2B integration: Logic Architeture HTTPS Communications Sistemi Snam Rete Gas X Internet X Integration Layer Logistica Gas X Legenda Security Layer Utente del Trasporto (UdT) Sistema UdT Comunicazioni HTTPS Certificato SRG Certificato Partner Messaggi X12 5
6 B2B integration: HTTPS Protocoll Certification Deadline Hereunder a detail of expected activities and their timing reference. Activity Description Planned Date List of contact point for testing activities Shipper will give to SRG the contacts to run the testing activities Within mid May 2014 Availability and Installation Digital certificates to load Pubblication of network parameters and access credentials on company web site Send network parameters and access credentials Pubblication of Test Book on company web site Running Test Connectivity Availability and Installation of Digital certificates as a prerequisite for run the connetivity test Udt vs SRG & SRG vs UdT SRG will provide the access credentials (IP address and port) for X12 communications In particolar, it is planned that: SRG send to all own digital cetificates, asking for the explicit confirmation to communicate via HTTPS In affermative case, SRG will provide some technical information (IP address, port, ) and the Shipper will give to SRG the informations requested (see the following requested activities) The Shippers that implement the system to receive the feed back (997, 855), they will have to give to SRG the parameters required for accessing (IP address, port, credentials) We have planned two testing case on the outcomes of messages 997 (ok; ko) like answer to 850 message sent by Shippers. Running test: After regularized the exchange of certificates for adapting the criteria of security, will run connectivity test to verify proper authentication of the Shipper, the correct sending of an nomination and the correct answers of Snam Rete Gas. Note.Prerequisite: to start testing you have to complete all previous tasks Within mid May 2014 Within mid May 2014 Within mid May 2014 Within end May 2014 Start: first week of June 2014 (elapsed planned 3 weeks) 6
7 B2B integration X12 Communication : Integration Test (1/2) To the Shipper that decide to use the X12 commuication on the new system, is planned a dedicated phase of Integrational Tests. Specifically, the approch to testing provides: Census and Registration of the Shippers that run the test; Identification a slot time for the test of each Shippers within the period dedicated to Integrational Test Using a collaboration tool useful for testing tracking/defect monitoring with related communication parameters /login credentials; Pubblication of the test book to Shippers It provides for the management of the common cases to all Shippers with indication of the reference database that the Shippers will use to send the messages ( example the list of meter to input the nomination value ) The list of meter is common to all Shippers, so no all meter will have capacity booking to Shipper 7
8 B2B integration X12 Comunication : Integration Test (2/2) Hereunder a detail of expected activities. Activities Description Planned Date Communication on the new code 855 on the company web site SRG will inform the Shippers the new encodings introduced to manage the output of the new semantic checks Census and Registration Census and Registration of the Shippers that run the test Communication on running test on the company web site SRG will inform the Shipper slot time for integration test For each Shipper the slot time is 3-5 day to test [range varies in function of type of implementated message by Shipper and then tested; specificaly Message 850the nomination rather than receiving response message (997, 855)] Note: for nework parameterrs and access credentials the Shippers have to refer to information to connectivity test Soon available Communication on the access to collaboration tool on the company web site Pubblication of the Test Book on the company web site SRG will inform the Shippers the parameters / access credentials to collaboration tool We have planned one-two testing case on semantic check in function of the two outcomes of messages (ok; ko) like answer to 850 message sent by Shippers. Run Integration Test Run Test between SRG and the Shippers 8
9 Authentication Client/Server HTTPS and certificates HTTPS HTTPS HTTP_BASIC_AUTH HTTPS WAN Internet F W LAN SNAM RETE GAS HTTPS: In telecomunicazioni e informatica HyperText Transfer Protocol over Secure Socket Layer (HTTPS) FIREWALL: è un componente passivo di difesa perimetrale di una rete informatica, che può anche svolgere funzioni di collegamento tra due o più tronconi di rete, garantendo dunque una protezione in termini di sicurezza informatica della rete stessa. HTTP_BASIC_AUTH HTTPS HTTP_BASIC_AUTH Logistica Gas HTTP_BASIC_AUTH HTTP_BASIC_AUTH: L'autenticazione BA non prevede protezione per le credenziali trasmesse. Esse vengono codificate con base 64 ma non criptate o crittografate con hash. È solitamente utilizzata in HTTPS.
10 Authenticaion Server/Server HTTPS and certificates (server answer to Shippers) UdT HTTP_BASIC_AUTH SNAM RETE GAS NLG HTTPS Integration FW Layer NLG Server key store Client trust store
11 Contacts Please contact if you require any further clarification. To ensure the take-over of your request please write in the object field of mail : «LG Richieste di informazione LG Information request». Thanks for your attention Only for consultation - not binding 11
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
More informationElenco Porte TCP/UDP
Elenco Porte TCP/UDP Autore: DPS SRL Creato il: 13 Oct 2008 10 : 50 AM da 0 a 1023 PortaDescrizione 1/tcpTCP Multiplexor 2/tcpcompressnet Management Utility 3/tcpcompressnet Compression Process 7/tcpEcho
More informationEmailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
More informationOpen Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next.
Server Type: POP3 or IMAP Incoming(POP3 or IMAP) Mail Server: student.ncnm.edu POP3 Port: 995 (SSL) IMAP Port: 993 (SSL) Outgoing(SMTP) Mail Server: student.ncnm.edu SMTP Port: 587 (TLS) (Users must change
More informationUSER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
More informationIBM Academic Initiative
IBM Academic Initiative Sistemi Centrali Modulo 3- Il sistema operativo z/os (quarta parte) Unix Services Sapienza- Università di Roma - Dipartimento Informatica 2007-2008 UNIX System Services POSIX XPG4
More informationWindows XP User guide for wired network v1.1
User guide for wired network v1.1 Pagina 1 di 10 Wired configuration guide v1.1 Instructions for 1 Introduction These instructions are intended only for the native Microsoft tool for wired networks (supplicant).
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationWindows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
More informationSecurity IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
More informationAPC-Pro sa Computer Service
Configuring, Managing and Troubleshooting Microsoft Exchange Service Pack 2 (10135B) Durata: 5 giorni Orario: 8:30 12:00 / 13:30-17.00 Costo per persona: CHF 1 900.-- (Min. 5 partecipanti) Obiettivi di
More informationApache web server: ConceI avanza0 (Lezione 2, Parte I) Emiliano Casalicchio (C) emiliano.casalicchio@uniroma1.it
Corso di Proge+azione di Re0 e Sistemi Informa0ci Apache web server: ConceI avanza0 (Lezione 2, Parte I) Emiliano Casalicchio emiliano.casalicchio@uniroma1.it Agenda ConceI e pra0ca sul Virtual hos0ng
More informationWeb Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More informationHow to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server
How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server Copyright notice Panda Security 2010. All rights reserved. Neither the documents nor the programs
More informationACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM
Mestrado em Ciência da Informação Segurança da Informação 2013/2014 ACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM André Pinto & Ricardo Silva Summary 1 2 Introduction 1.1 Information Security 1.2 Work
More informationCertificates, Certification Authorities and Public-Key Infrastructures
Certificati digitali Certificates, Certification Authorities and Public-Key Infrastructures Ozalp Babaoglu La chiave pubblica con la quale stiamo cifrando deve appartenere realmente al destinatario del
More informationCertificates, Certification Authorities and Public-Key Infrastructures
Certificati digitali Certificates, Certification Authorities and Public-Key Infrastructures Ozalp Babaoglu Problema: la chiave pubblica con la quale stiamo cifrando deve appartenere realmente al destinatario
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationReti Informatiche. WireShark. www.wireshark.org
Reti Informatiche WireShark www.wireshark.org What is WireShark Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data
More informationWeb Security: Encryption & Authentication
Web Security: Encryption & Authentication Arnon Rungsawang fenganr@ku.ac.th Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,
More informationCorso: Configuring and Administering Windows 7 Codice PCSNET: MSW7-8 Cod. Vendor: 50322 Durata: 5
Corso: Configuring and Administering Windows 7 Codice PCSNET: MSW7-8 Cod. Vendor: 50322 Durata: 5 Obiettivi Descrivere e scegliere le varie versioni di Windows 7 Eseguire una nuova installazione di Windows
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
More informationElluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationFile Transmission Methods Monday, July 14, 2014
Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and
More informationElastix SIP Firewall. Quick Installation Guide
Elastix SIP Firewall Quick Installation Guide Table of Contents Overview... 2 Deployment Considerations... 3 Initial Setup & Configuration... 5 Accessing the WebUI... 6 1 Overview Congratulations on your
More informationPercorso Mcsa Managing and Mainting Windows 8
Percorso Mcsa Managing and Mainting Windows 8 Descrizione In questo corso, gli studenti imparano a progettare l'installazione, la configurazione e la manutenzione di Windows 8. Due caratteristiche uniche
More informationEmail Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 Apple Mail 8.2...
More informationEmail Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 2 Email Client
More informationChapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
More informationLinux Web Based VPN Connectivity Details and Instructions
Linux Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationRoyal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
More informationVASCO Data Security. The Authentication Company. Richard Zoni Channel Manager Italy
VASCO Data Security The Authentication Company Richard Zoni Channel Manager Italy 05/05/2010 Le password... più utilizzate 1. password 2. 123456 3. Qwerty 4. Abc123 5. pippo 6. 696969 7. Myspace1 8. Password1
More informationSecure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
More informationInternetworking e applicazioni
Internetworking e applicazioni Scenario Singole LAN Singole WAN La maggior parte delle industrie hanno reti strutturate che combinano diverse LAN e WAN. La maggior parte delle reti internet utilizzano
More informationWhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp
More informationSSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica
SSL VPN Virtual Private Networks based on Secure Socket Layer Mario Baldi Politecnico di Torino Dipartimento di Automatica e Informatica mario.baldi[at]polito.it staff.polito.it/mario.baldi Nota di Copyright
More informationAdvanced Configuration Administration Guide
Advanced Configuration Administration Guide Active Learning Platform October 2015 Table of Contents Configuring Authentication... 1 PingOne... 1 LMS... 2 Configuring PingOne Authentication... 3 Before
More informationEmail Update Instructions
Email Update Instructions Table of Contents Email Client Settings The Basics... 2 Outlook 2013... 2 Outlook 2007... 4 Outlook Express... 6 Windows Mail... 7 Thunderbird 3... 9 Apple Mail... 11 1 Email
More informationMS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
More informationDEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection
DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS Introduction I m InTouch is a personal remote access application that allows a user to access the data on his or her PC from a remote location,
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationHTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
More informationInternet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationD-LINK DPH-140S SIP PHONE INSTALLATION GUIDE
pag.1 D-LINK DPH-140S SIP PHONE INSTALLATION GUIDE pag.2 SUMMARY SKYPHO VOIP SERVICE...3 DPH-140S PACKAGE CONTENT...3 DEVICE PHYSICAL CONNECTION...4 ACCESS TO THE DEVICE...6 Accesso to the IP Phone when
More informationThe PostBase Connectivity Wizard
The PostBase Connectivity Wizard The PostBase Connectivity Wizard allows you to easily set up your PostBase postage machine to suit your organization s arrangements. This document will guide you through
More informationHow do I load balance FTP on NetScaler?
How do I load balance FTP on NetScaler? Introduction: File transfer protocol is a standard for the exchange of files across a network. It is based on a client/server model with an FTP client on a user
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
More informationMS 10972A Administering the Web Server (IIS) Role of Windows Server
MS 10972A Administering the Web Server (IIS) Role of Windows Server Description: Days: 5 Prerequisites: This course provides students with the fundamental knowledge and skills to configure and manage Internet
More informationHow To Configure L2TP VPN Connection for MAC OS X client
How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used
More informationSCADA / Smart Grid Security Who is really in control of our Control Systems?
SCADA / Smart Grid Security Who is really in control of our Control Systems? Simone Riccetti Certified SCADA Security Architect Agenda Overview of Security landscape SCADA security problem How to protect
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationHow to Configure Active Directory based User Authentication
How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.
More informationHow To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: 10.00 onwards. Overview. Scenario. Site A Configuration
How To Establish Site-to-Site VPN Connection How To Establish Site-to-Site IPSec VPN Connection using Preshared key using Preshared Key Applicable Version: 10.00 onwards Overview IPSec is an end-to-end
More informationSecure Socket Layer (SSL) Machines included: Contents 1: Basic Overview
Secure Socket Layer (SSL) Machines included: HL-4040CN HL-4050CDN HL-4070CDW DCP-9040CN DCP-9045CDN MFC-9440CN MFC-9840CDW Contents 1) Basic overview 2) Brief history 3) Benefit of using SSL 4) How to
More informationHow to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
More informationData Center Architecture
Data Center Architecture Mario Baldi Politecnico di Torino (Technical University of Turin) Computer Engineering Department http://www.mario-baldi.net reti_aziendali_ced - 2 Copyright notice This set of
More informationCome utilizzare il servizio di audioconferenza
Come utilizzare il servizio di audioconferenza Il sistema di audioconferenza puo essere utilizzato in due modalita : 1) Collegamento singolo. Si utilizza l apparecchio per audioconferenza che si ha a disposizione
More informationEmail Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 8 Windows Mail... 9 Thunderbird 3... 10 Apple Mail... 11 2 Email Client
More informationNetwork setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
More informationElluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationExternal Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
More information10972-Administering the Web Server (IIS) Role of Windows Server
Course Outline 10972-Administering the Web Server (IIS) Role of Windows Server Duration: 5 days (30 hours) Target Audience: This course is intended for IT Professionals already experienced in general Windows
More informationCornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
More informationApplication Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the configuration
More informationWhite Paper How to Remotely Access Ethernet I/O Over the Internet
White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationAD RMS Microsoft Federation Gateway Support Installation and Configuration Guide... 3 About this guide... 3
Contents AD RMS Microsoft Federation Gateway Support Installation and Configuration Guide... 3 About this guide... 3 Microsoft Federation Gateway Support Overview... 4 Deploying and Configuring Microsoft
More informationWhy a Reverse Proxy with My Instant Communicator for mobiles??
Why a Reverse Proxy with My Instant Communicator for mobiles?? INTEGRATED COMMUNICATION SYSTEMS 8AL020043359DRARA, February 2010 What is OmniTouch 8600 My Instant Communicator? Is an aggregator of all
More informationArcserve Cloud. Arcserve Cloud Getting Started Guide
Arcserve Cloud Arcserve Cloud Getting Started Guide This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More information22/11/2015-08:08:30 Pag. 1/10
22/11/2015-08:08:30 Pag. 1/10 CODICE: TITOLO: MOC20462 Administering Microsoft SQL Server Databases DURATA: 5 PREZZO: LINGUA: MODALITA': 1.600,00 iva esclusa Italiano Classroom CERTIFICAZIONI ASSOCIATE:
More informationTwo Factor Authentication in SonicOS
Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage
More informationISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationSonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationRemote Access to Embedded WEB by NAT Port Forwarding
Remote Access to Embedded WEB by NAT Port Forwarding (KX-UDS/UDT series) No. 42-016 September 28, 2012 Ver.1.0 Panasonic System Networks Co., Ltd. 1 Abstract about this document This document describes
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationIs your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
More informationSecuring an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationSSL Overview for Resellers
Web Security Enterprise Security Identity Verification Services Signing Services SSL Overview for Resellers What We ll Cover Understanding SSL SSL Handshake 101 Market Opportunity for SSL Obtaining an
More informationCentral Administration QuickStart Guide
Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing
More informationMobility User mobility Service mobility 3GPP
Advanced Networking Voice over IP & Other Multimedia Protocols Some SIP Advanced Topics Renato Lo Cigno Renato.LoCigno@disi.unitn.it Mobility User mobility Service mobility 3GPP ENUM Advanced Networking
More informationLDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
More informationTHINKTEL COMMUNICATIONS TALKSWITCH VS TALKSWITCH VS THINKTEL SIP TRUNK & DID
THINKTEL COMMUNICATIONS TALKSWITCH VS TALKSWITCH VS THINKTEL SIP TRUNK & DID TA B L E O F C O N T E N T S 1.1 INTRODUCTION... 3 1.2 STARTING THE MANAGEMENT SOFTWARE... 4 1.3 IP CONFIGURATION... 5 1.4 ROUTER
More informationDEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
More informationCorso: Administering Microsoft SQL Server 2012 Databases Codice PCSNET: MSQ2-1 Cod. Vendor: 10775 Durata: 5
Corso: Administering Microsoft SQL Server 2012 Databases Codice PCSNET: MSQ2-1 Cod. Vendor: 10775 Durata: 5 Obiettivi Pianificare e installare SQL Server. Descrive i database di sistema, la struttura fisica
More informationHow To Lock A File In A Microsoft Microsoft System
Level 1 Opportunistic Locks Si intuisce che level 1 corrisponde concettualmente allo stato M di un dato in cache nel protocollo MESI A level 1 opportunistic lock on a file allows a client to read ahead
More informationSophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationIMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.
IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server
More informationUnified Threat Management
Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0
More information