FDS manual File Delivery Services SFTP and FTP file transfer
|
|
|
- Drusilla Hubbard
- 9 years ago
- Views:
Transcription
1 FDS manual File Delivery Services SFTP and FTP file transfer
2 Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) IT261 FDS Operation Version 8.3 / February 2016 Download the latest version from: FDS manual Version 8.3 / February 2016 page 2
3 Table of contents 1. Introduction Post CH Ltd FDS model Overview Supported protocols Connection types FDS service File Delivery System Where are the file delivery services? File Transfer Protocols FTP SFTP Recommended clients Delivery and collection from an external server Using the File Delivery Service Security User name (login) Password policy FTP SFTP Link encryption For all connection types MPLS/IPSS LAN-LAN Configurations FDS client-server configuration File transfer server DNS caching Ports User name (login) Directories File names SFTP General information Send public key to Post CH Ltd Dealing with keys Annex B. Information about using FDS General terms and conditions/restrictions Restrictions in data delivery (Client FDS server) Data delivery requirements (FDS server target system) Requirements and restrictions in data collection on third-party systems Annex D. Glossary FDS manual Version 8.3 / February 2016 page 3
4 1. Introduction File Delivery Services (FDS) is a service provided by the Information Technology (IT) service unit of Post CH Ltd. FDS acts as a gateway in the IT security system between Swiss Post s Intranet and external networks. It enables files and applications to be exchanged among internal and external partners of Post CH Ltd. This manual describes how files can be transferred via the FDS server of Post CH Ltd. The service is available to anyone who has a file transfer client installed on their computer and the required account. Swiss Post IT assumes no responsibility for the accuracy of the information in this manual. Subject to errors and amendments. FDS manual Version 8.3 / February 2016 page 4
5 2. Post CH Ltd FDS model 2.1 Overview FDS was introduced in It was launched in the context of the data transmission and communication project of the then PostFinance organisation. The first files were transferred via Kermit, FTP and FTAM. In 1995, the service was extended for file transfer with CONNECT:Direct. In 2002, FDS was expanded to include the FDS-SSH system (FTP over SSH sometimes called Secure FTP), while the FTAM and Kermit protocols were discontinued. SFTP (SSH File Transfer Protocol) was introduced in 2007 and marked the change to a new technology and a new generation. The FDS-SSH service became obsolete as a result and, as of mid-2010, was no longer continued. The use of the protocol FTP over the internet is disallowed for security reasons for new customers since June Existing customers will have to migrate to the protocol SFTP until October 2016 at the latest. 2.2 Supported protocols FTP (File Transfer Protocol) - for file transfers over the internet only until October SFTP (SSH File Transfer Protocol) 2.3 Connection types Three types of connections are available: Internet MPLS/IPSS leased connections, IPSS Swisscom network Intranet for Post CH Ltd internal partners/applications The installation dates of the network provider have to be taken into consideration when coordinating new leased connections and MPLS. Leased connections are only used if another type of connection is more expensive than a leased connection, or in the event that special security requirements make them necessary. ADSL connections are only possible in combination with a provider via the Internet. The use of SFTP with an adequate key length makes the utilisation of leased lines and VPN unnecessary as both do not offer additional security. FDS manual Version 8.3 / February 2016 page 5
6 3. FDS service 3.1 File Delivery System The file delivery system is based on a special mail-boxing system, which accommodates the tightened security requirements that pertain to the Internet, extranet and intranet. 3.2 Where are the file delivery services? FDS constitutes an application server, database server and several perimeter servers. All of the components are located in different zones (DMZ) of the IX platform. The IX platform is a security zone protected by firewalls and is located between the Post CH Ltd network (Intranet) and the external networks (Internet, leased connections). The file transfer and database servers are located in a highly-protected zone: access to this zone is highly restricted. The perimeter servers are in zones of lesser security, in which access via clients is permitted. The client/server connections from external networks and from the internal Post CH Ltd network always run via the perimeter servers. The FDS service is geographically redundant and is configured to remain available even after the complete outage of one data center. 3.3 File Transfer Protocols For more detailed information please consult our file transfer clients manual on FTP FTP is a file transfer protocol that does not offer any kind of protection when accessing the Internet. The risk of user names and passwords being discovered and exploited on the Internet is ever-present. FTP transmits all information (user names, passwords, data) in plain text between the client and the server. The content of the files is only protected if end-to-end encryption can be accomplished. With an FTP client, a connection with the FDS FTP server can be established via TCP/IP and the necessary commands executed. Please note that the use of the FTP protocol is totally forbidden for customers exchanging files with the Post CH Ltd over the internet. Existing customers will have to migrate to the protocol SFTP until October 2016 at the latest SFTP SFTP (SSH Secure File Transfer Protocol) is a file transfer protocol and an alternative to FTP. An uninterrupted, encrypted connection is established between the client and the server and renders data, user names and passwords illegible to attackers. The integrity and privacy of the exchanged files is ensured via public-key authentication. Public-key authentication enables clients to log in to the server without any user interaction. SSH guarantees that data is transmitted from the sender to the recipient in full and unchanged. Only SSH-2 (version 2) is supported, exclusively in combination with public-key authentication. With an SFTP client, a connection with the FDS SFTP server can be established via TCP/IP and the necessary commands executed. Please note: SFTP should not be confounded with FTPS (FTP over SSL) or FTP over SSH (sometimes called SecureFTP) Recommended clients The list of the recommended software clients can be seen in our file transfer clients manual on FDS manual Version 8.3 / February 2016 page 6
7 3.4 Delivery and collection from an external server If the FDS server is required to deliver files or collect them from the customer, a number of requirements will need to be fulfilled. These prerequisites are listed in chapter 6. Delivery and distribution of a file takes place in an events-based manner. When the file arrives, it is forwarded by the FDS server to the pre-specified destination. Specification of a certain time for the action to be executed is not possible. 3.5 Using the File Delivery Service Users who want to connect to the FDS server from outside the Post CH Ltd network are required to apply more advanced security measures, depending on the type of connection (leased connections, Internet). Administrative registration to use the FDS service is via the customer services of the service unit or business unit of Post CH Ltd. By urgent problems you can contact our hotline: +41 (0) For queries with regard to the File Delivery Services, please use the following address: [email protected] FDS manual Version 8.3 / February 2016 page 7
8 4. Security 4.1 User name (login) External participants receive their own user name for the respective service and business unit. If a customer uses the same user name for several business units of his company, Post CH Ltd assumes no liability for any damage that is incurred. This refers to damage that could occur in the event of data subsequently being accessed on Post CH Ltd. s file transfer server. 4.2 Password policy FTP When an FTP user name is installed on the FDS server, an initial password is issued. This initial password, as well as all following passwords, have to be changed by the user within 90 days at the latest. User names are blocked as soon as this period expires (for more details, please see our File transfer client manual at If a customer wishes that a password remains unchanged and does not expire, he is required to write a declaration of renunciation of liability vis-à-vis Post CH Ltd. Post CH Ltd and its service and business units will not assume responsibility or liability for any damages that are incurred due to unauthorised access. An alternative that does not involve changing the password is provided by SFTP in the form of public-key authentication SFTP Logins with the FDS server can only be executed via public-key authentication. Authentication with password is not allowed as, with SFTP, changing the password is not supported for technical reasons. 4.3 Link encryption Link encryption is not a standard service provided by the FDS services. However, it can be used as a network option. The use of SFTP with an adequate key length makes the utilisation of a link encryption unnecessary as it does not offer additional security For all connection types Client-to-server encryption is provided via the SFTP protocol and is available for all connection types MPLS/IPSS Link encryption is also supported by MPLS/IPSS. In this way, SFTP can also be used as end-to-end encryption LAN-LAN With LAN-LAN connections, link encryption can be established with both routers. FDS manual Version 8.3 / February 2016 page 8
9 5. Configurations 5.1 FDS client-server configuration File transfer server Zone Internet and leased lines Post CH network/dmz Host name fdsbc.post.ch fdsbc.pnet.ch The distribution of the communications on two locations is accomplished with a DNS load balancing (Round- Robin). This means that, alternately, the IP addresses of the two locations are returned. It must be ensured that the communication to or from FDS is allowed in your network. Usually the network team has to allow the communication with the appropriate firewall rules. Two IP addresses are used. Those IP addresses may only be used for the configuration of the firewall rules. For the connection to FDS from your application, it is essential that you use the domain name. Both IP addresses can be determined with several DNS lookup requests. FDS supports IPv4 and IPv6. The use of IPv6 requires a continuous support of IPv6 in your infrastructure DNS caching The FDS service is operating in active/active mode on two locations. The failover mechanism is guaranteed by a Global Server Load Balancing (GSLB) infrastructure. In order for you to benefit quickly from this failover mechanism, you must ensure that no additional DNS caching is done in your environment. The Time to live (TTL) specification given from the Post CH DNS has to be respected Ports The FDS protocols are running on standard ports (21 for FTP and 22 for SFTP) User name (login) User names are defined and communicated to the customers during the initiation of the service Directories The name of the directories on the FDS server are always written in small letters with the following restrictions Characters: [ a-z ], [ 0-9 ], [. - ] ( dot, hyphen) Start: the first character has to be [ a-z ], [ 0-9 ] File names The following guidelines must be observed for the names of files in the directories on the FDS server: Characters: [ A-Z ], [ a-z ], [ 0-9 ], [. - _ ] (dot, hyphen, underscore) 5.2 SFTP General information Detailed information can be found in our file transfer clients manual on FDS manual Version 8.3 / February 2016 page 9
10 5.2.2 Send public key to Post CH Ltd A copy of the public key has to be sent to Post CH Ltd by at [email protected]. To verify the identity of the sender, the has to be sent by the registered contact person or this one has to appear at the least as cc in the exchange. If needed, there is the possibility to configure more than one public key for one user name. Likewise, different user names may use the same key if needed Dealing with keys Treat your private key like your personal credit card! Protect it against unauthorised access. FDS manual Version 8.3 / February 2016 page 10
11 6. Annex B. Information about using FDS The following succinct information describes how data is exchanged and details the FDS functions. It lays down the generally applicable rules and stipulations for transmitting files via the FDS file transfer servers. It is intended for FDS users in business units and Group companies of Post CH Ltd and their external customers. 6.1 General terms and conditions/restrictions a) FDS is not an archiving system. Collected files, which the customer has not yet deleted, are removed automatically by the server after a period of 9 days. b) Each file can be downloaded maximum 20 times. c) FDS follows a 1-minute processing rhythm. Delivered files appear 1 minute after completion of the file transfer in the recipient s mailbox. If the configuration requires that the files are forwarded to a target computer, the process can take longer depending on the size and the number of the files. d) Large files (usually ASCII files) must be transmitted in a compressed form. The sender and recipient (end-toend) shall agree on the compression method (e.g. ZIP, GZIP). e) A large number of files has to be transmitted with a correspondingly large number of file transfers (put/get) per FTP/SFTP login session. Example for 1200 files: 10 FTP connections/logins composed of 120 file transfers each. If the number of logins is too big within a certain unit of time, the Intrusion Prevention System of Post CH Ltd automatically blocks the Source IP address during 15 minutes. f) Applicator (end-to-end) solutions to optimise the file transfer are available for c) and d) as are archiving tools such as tar and ZIP. g) File transfers with SFTP may only be executed with SSH keys. Authentication via user name/password is not permitted. h) FDS does not confirm the file transfer with regard to the sender. Creation and sending confirmation is the responsibility of the recipient and is not ensured by FDS. i) If the file transfer involves data being forwarded, no order of transmission can be guaranteed. Files of different sizes can overtake each other if the data transmissions are taking place at the same time. The recipient system in the end-to-end relation is responsible for restoring the correct order of the transmitted files. j) Forwarding and distributing files is performed in an event-based manner. Time-scheduled management is not supported. k) IT must be notified in good time about the size, frequency and changes in volume of files involved in file transfers that are performed via the FDS server. This is the only way to ensure that the required capacity is made available at the requested time. l) IT must be informed about priorities for all file transfers that are performed via the FDS server and that must be adhered to in the event of escalation. Standard SLA comes into effect in all other cases. 6.2 Restrictions in data delivery (Client FDS server) When a file transfer client carries out an upload function (put) to an FDS mailbox (folder), the files from these processes are attended to on the FDS server as soon as the file transfer has been completed. Entries in the files in the upload mailboxes remain visible to the customer for two minutes (display of files via "dir" and "Is"). Deleting or renaming a sent file will have no effect: this file is forwarded to the recipient under its original file name. FDS guarantees that only completely transferred file will be processed. In case of a breakup of the connection during transfer the partially transferred file will be rejected. It is not possible to change a file attribute on FDS after the file transfer. 6.3 Data delivery requirements (FDS server target system) Files can be delivered via FDS manual Version 8.3 / February 2016 page 11
12 SFTP (SSH File Transfer Protocol) or FTP (RFC 959) however only within the intranet of the Post CH Ltd To enable the FDS service to deliver files, the following requirements must be in place at both the internal and external Post CH Ltd recipients: Permanent network connections such as WAN Access (MPLS) or Internet with IPSec-VPN The system must be available 24/7 Operative Computer Centre operation must be ensured Contact persons for support (phone numbers, ) and availability must be ensured. 6.4 Requirements and restrictions in data collection on third-party systems FDS is able to collect files automatically via FTP and SFTP on third-party systems. This function should only be used in exceptional cases. Requirements: Permanent network connections such as WAN Access (MPLS) or Internet with IPSec-VPN The system must be available 24/7 Operative Computer Centre operation must be ensured Contact persons for support (phone numbers, ) and availability must be ensured. Restrictions: This service is not offered if time-critical data have to be collected at intervals shorter than 30 minutes. The files to be downloaded have to be placed in directories having invariable names. FDS does not support the download of files from variable directories (e.g. directories names which contain the actual date). FDS manual Version 8.3 / February 2016 page 12
13 7. Annex D. Glossary D DMZ Demilitarised Zone A DMZ is located at a separate LAN connection in the firewall between an internal network and an insecure network, e.g. the Internet. Servers that provide services for users of the Internet (e.g. www or ) are often set up in a DMZ. Ideally the DMZ is between two physically separated firewalls. The outer firewall protects against attacks from outside and monitors all attempts to access the DMZ from the Internet. The inner firewall checks attempts to access the internal network from the DMZ and vice versa. It represents the second line of defence in case the outer firewall is penetrated. The advantage of this is that the internal network continues to be protected even if an attacker gets through to the web server. DNS The Domain Name System (DNS) is one of the most important services on the Internet. Its main task is to translate "Internet addresses" names into the respective IP address. E End-to-end The relation between an application (e.g. EGA-B) of a business unit at Post CH Ltd (e.g. PostFinance Ltd) and the application belonging to the external customer. F FDS File Delivery Services is a service provided by the Post CH Ltd Information Technology (IT) service unit. FDS acts as a proxy in the IT security system between Post CH Ltd s Intranet and external networks. It enables files and applications to be exchanged among internal and external partners of Post CH Ltd. FTP File Transfer Protocol is a network protocol specified in RFC 959 from 1985 to transfer files across TCP/IP networks. The protocol enables files to be exchanged between different computers, regardless of their operating system and physical location. I IPSS LAN Interconnect over IPSS is a service provided by Swisscom. It connects local networks to form a single corporate-wide communication infrastructure. IPSS is Swisscom s own solution and applies cutting-edge technology. The MPLS technology applied here (Multi Protocol Label Switching) enables greater flexibility with respect to the bandwidth. The service is provided completely by Swisscom Enterprise Solution. M MPLS Multi Protocol Label Switching (MPLS) is an implementation of Label Switching. These technique takes the burden off the routers involved in transporting a data package, as the level of complexity is reduced to a single switch. The aim here is to establish a specific connection channel at the beginning of the data transmission. In this process the routers no longer need to check the recipients of the data packages being forwarded, instead they simply forward the packages in accordance with the previously specified connection, without any further processing. S SFTP SSH File Transfer Protocol (SFTP) is a further development of SCP and enables secure data transmission and allows clients to access files on remote systems. The protocol has no authentication procedure or any encryption. These functions have to be taken over the underlying SSH protocol. SFTP should not be confused with Secure FTP or with FTP over SSL. SSH SSH enables cryptographically secure communication in insecure and secure networks. It provides a high level of security. Reliable mutual authentication of the partners as well as integrity and privacy of the exchanged data is supported. SSH guarantees the complete and unchanged transmission of the data from the sender to the recipient. T Time to live Time to Live (TTL) is a mechanism that limits the lifespan or lifetime of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, data is discarded FDS manual Version 8.3 / February 2016 page 13
File transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Royal Mail Business Integration Gateway Specification
FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
The Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
How To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
WinSCP for Windows: Using SFTP to upload files to a server
WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Experian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Understand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]
Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
Chapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Firewall Environments. Name
Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
PolyServe Understudy QuickStart Guide
PolyServe Understudy QuickStart Guide PolyServe Understudy QuickStart Guide POLYSERVE UNDERSTUDY QUICKSTART GUIDE... 3 UNDERSTUDY SOFTWARE DISTRIBUTION & REGISTRATION... 3 Downloading an Evaluation Copy
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Secure Friendly Net Detection Server. July 2006
Secure FND Server Secure Friendly Net Detection Server July 2006 Disclaimer Considerable care has been taken in the preparation and publication of this manual, errors in content, typographical or otherwise
Enterprise Broadband Customer Service Description
BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...
Configuring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Global Protect SSL VPN Overview This document gives you an overview on how to configure
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Accessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering
Network Security by David G. Messerschmitt Supplementary section for Understanding Networked Applications: A First Course, Morgan Kaufmann, 1999. Copyright notice: Permission is granted to copy and distribute
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
Figure 41-1 IP Filter Rules
41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
System to System Interface Guide
System to System Interface Guide Overview What does this guide cover? This guide describes the interface definition to firms intending to submit their TRS Product Sales Data (PSD) or Securities Trades
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
axsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Communication Protocol Adapters in Sterling Integrator. 2009 IBM Corporation
Communication Protocol Adapters in Sterling Integrator Agenda Overview of communications adapters in Sterling Integrator (SI) Important concepts Perimeter Server Mailbox Key management HTTP(S) related
Device Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. [email protected]
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. [email protected] Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
Machine control going www - Opportunities and risks when connecting a control system to the Internet
B&R Industrial Automation Corp. 1325 Northmeadow Parkway, S-130 Tel: (770) 772-0400 E-mail: [email protected] Roswell, Georgia 30076 Fax: (770) 772-0243 Internet: www.br-automation.com Machine
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
File Transmission Methods Monday, July 14, 2014
Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and
WWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP
WWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP Table OF Contents WWA FTP AND SFTP CONNECTION GUIDE... 3 What is FTP:... 3 What is SFTP:... 3 Connection to WWA VIA FTP:... 4 FTP
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
How To Set Up An Ipa Ez On A Pc Or Mac Or Macbook Or Ipa Or Ipamorade
Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...
You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource
The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF
KM-1820 FS-1118MFP. Network Scanner Setup Guide
KM-180 FS-1118MFP Network Scanner Setup Guide Introduction Trademark Information About this Guide Important Microsoft, Windows, Windows NT and Internet Explorer are registered trademarks of Microsoft
Kerio Control. Step-by-Step Guide. Kerio Technologies
Kerio Control Step-by-Step Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration of the local network which uses the Kerio
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
Methods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
SFTP (Secure Shell FTP using SSH2 protocol)
SFTP (Secure Shell FTP using SSH2 protocol) Technical Manual March 2014 1. Contents 1. 1. Table of contents 2. Introduction... 3 3. Criteria for SFTP... 5 4. Preparations for connecting to SFTP... 7 5.
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
ADSL MODEM. User Manual V1.0
ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
