Connection Requirements Specification. GEC Hub

Size: px
Start display at page:

Download "Connection Requirements Specification. GEC Hub"

Transcription

1 Connection Requirements Specification

2 Connection Requirements Specification... 1 GEC HUB General INTRODUCTION ANX Connectivity Method VAN Connectivity Method WAM Connectivity Method Setup and Connection Requirements ANX IMPLEMENTATION ANX Vendor Selection IPSEC Vendor Selection Customer Registration with the ANX Overseer Customer Contract with ANX Certified Service Provider Request Tunnel with Ford for ANX Submit Ford EDI Connection Request Form GSDB Code Testing Additional Information Firewall rules request to GSEC Firewall rules at vendor site Static routes added to Ford router ANX Process Summary ANX Work Plan VAN IMPLEMENTATION VAN Vendor Selection VAN Mailbox Setup VAN Confirmation and Connectivity Test Submit Ford EDI Connection Request Form GSDB Code Testing Typical Questions to Ask Your VAN VAN Process Summary VAN Work Plan WAM IMPLEMENTATION WAM ISP Selection FSP Submit Ford EDI Connection Request Form GECHub/WAM Mailbox Setup WAM Confirmation and Connectivity Test GSDB Code Testing Typical Questions WAM Process Summary WAM Work Plan Addendum 1 WAM Process and Procedures WAM FAQs...20 Page 2 of 21 Date Issued: 04/26/2007

3 Revision Number Revision History Date Revision Author Description /11/2001 Gordon Draper Draft Release /27/2002 Steve Novotny WAM Section Addition 1.1 6/19/2002 Gordon Draper 2.3 WAM implementation user profile added 1.4 9/19/03 Gordon Draper ANX links and connectivity form information updated. Section updated tokens no longer required /18/04 Kathie Jahn Revised with update ANX Tunnelz information, updated VAN Flow, Added COVISINT to the list of vans /15/07 Michael Janeczko Removed names, removed links to pages down a URL tree, adjusted spacing /03/09 Amy Fei Remove IBM Advantis from VAN Connectivity Method /03/09 Amy Fei Correct the VAN connectivity list Page 3 of 21 Date Issued: 04/26/2007

4 1. General 1.1 Introduction This document addresses the setup requirements for new trading partners / vendors with no previous Electronic Data Interchange (EDI) traffic with the Ford Motor Company. The EDI application and translation exist entirely on the Global Electronic Commerce (GEC) Hub. In particular, the document addresses connectivity requirements for EDI by using an Advanced Network Exchange (ANX) connection, a Value Added Network (VAN) connection, or a Public Internet/ISP Web Access Module (WAM) connection ANX Connectivity Method The first method of connecting to the Ford requires an ANX connection for EDI data transfers. Understanding the various ANX service requirements is key to the successful implementation of EDI. The services are as follows: ANX Service Provider (required) IPSEC Security Service Provider (optional) ANX Overseer Group (required) The ANX Service Provider is responsible for providing the ANX circuit and router. Estimate approximately 60 days to get an ANX circuit installed once the circuit is ordered. Add an additional week for some of the post circuit installation implementation steps. This will include filling out and returning to Ford representatives some required documents for establishing a secure tunnel. There are several ANX Certified Service Providers (CSP's). The list of CSP's includes MCI, AT&T, Ameritech, Ideal Technology Solutions, BCE Emergis, Equant Network Services, and Global Crossing. Please reference the website for a list of CSPs. These providers typically charge a one-time installation service fee and a monthly ANX service fee w/access. Fees vary by provider. Please check with the CSPs for pricing information. The IPSEC Security Service Provider is responsible for providing additional hardware (if required), software and services for firewall and IPSEC security management. This service is only required if you chose to out-source this operation. The service provider typically charges a one-time IPSEC product installation fee and a monthly IPSEC service fee. Please check with your ANX Service Provider for details. The ANX Overseer Group is responsible for enforcing the Service Level Agreement (SLA) and uptime requirements (99.965% network availability) of the ANX network. As a result, trading partners must pay a onetime fee along with an annual fee. Please reference the website for pricing details VAN Connectivity Method The second method of connecting to the Ford requires the use of a VAN connection for EDI data transfers. The VAN provides services that are similar to that of an ANX Service Provider and must be registered by the Ford Motor Company. The current list of registered VAN's is as follows: 1.) EasyLink 2.) GE/GXS 3.) Sterling Commerce 4.) Kleinschmidt 5.) COVISINT 6.) iconnect 7.) INOVIS/HARBINGER Page 4 of 21 Date Issued: 04/26/2007

5 8.) EDS*Elit For more information on registered VAN s, reference the website Please consult your VAN for details WAM Connectivity Method The third method of connecting to the Ford requires the use of a public Internet connection for EDI data exchange. The WAM (Web Access Module) user utilizes a local ISP (Internet Service Provider) to access the GECHub through the Trading Partners FSP (Ford Supplier Network) account. The selection of the ISP is not controlled by Ford Motor Company. For more information on the WAM, reference the website (2.3 WAM Implementation section) 2.0 Setup and Connection Requirements This section of the document outlines the best practices used to setup a trading partner with Ford Motor Company via EDI. 2.1 ANX Implementation To implement an ANX connection, complete sections through ANX Vendor Selection It is up to the trading partner to select their service provider. See the ANX Website for a current list of ANX CSP's. Trading partners are encouraged to obtain multiple quotes before making a decision. The selection and how it occurs is completely determined by the trading partner. The CSP can help the trading partner determine the amount of bandwidth required for the connection. The adding partner must determine the bandwidth before the ANX registration process can be completed. Trading Partner Action Item Determine bandwidth requirements and select ANX Certified Service Provider IPSEC Vendor Selection The ANX Service Providers can recommend IPSEC vendors, if your staff needs assistance with this task. The IPSEC vendor addresses firewall administration, security, and encryption. Trading Partner Trading Partner Action Item Select IPSEC Vendor, if required Customer Registration with the ANX Overseer The Trading Partner will need to register with the ANX as an ANX Trading Partner. Online registration is available through the ANX web site at The ANX registration form will require the Trading Partner to indicate the connection size and (bandwidth) needed. Once the registration paperwork has been submitted to and processed by the ANX, a trading partner number will be assigned to the Trading Partner. The processing of paperwork and assignment of trading partner number takes a minimum of 10 business days. Trading Partner Action Item Register with ANX Page 5 of 21 Date Issued: 04/26/2007

6 2.1.4 Customer Contract with ANX Certified Service Provider Since legal issues sometimes need to be resolved between the Trading Partner and the service provider, the signing of an actual contract can sometimes become a bottleneck. The customer must have registered with ANX and must have been assigned a trading partner number before a service provider will process an order. Trading Partner Action Item Sign CSP contract Request Tunnel with Ford for ANX Once the Trading Partner is fully connected to the ANX network, the Trading Partner should access the GSEC external website and submit one of the following forms indicated on: Assumptions for Internet VPN Users : 1) Trading Partner must already have high-speed internet connection 2) Trading Partner must have the expertise necessary to configure and bring the tunnel up on their end. 3) The only IPSec devices supported by Ford are the Checkpoint Firewall-1 (version4.1 or higher), Cisco PIX firewall or Cisco IOS. Should any other products be selected, the Trading Partner will have The sole responsibility of establishing the tunnel including troubleshooting connectivity problems. 4) This connection is strictly for Gateway-Gateway VPN's. We do not allow client VPN connections. This process created a secure tunnel to Ford's Firewall. A tunnel is an encrypted, authenticated communications path into the Ford Network. Ford and the Trading Partner then exchange a token data packet (between the Firewalls) to enable the secured tunnel. When Ford has completed the tunnel request, Ford will send an acknowledgement to the technical contact listed on the form. Trading Partner Action Item Submit appropriate tunnel request form Submit Ford EDI Connection Request Form Once the Trading Partner is fully connected to the ANX network, the Trading Partner should access the GSEC external website and submit a " EDI Connection Request " form via the following URL: The submission will be acknowledged via back to the EDI analyst named on the form within 24 hours of submission. These requests are processed in sequential order. A Ford EDI Analyst will contact the Trading Partner within 1-8 days to begin the connectivity testing process. At this time the Trading Partner will be expected to begin the testing process. Trading Partner Action Items Submit "EDI Connection Request " form GSDB Code The Ford buyer will issue a Trading Partners a GSDB code (some Trading Partners may already have several). The GSDB code is used as the ID for the Trading Partner's mailbox when it is created. The GSDB code is often referred to as the Trading Partner, Vendor ID supplier code. To assist Trading Partners in identifying the correct code - Use the Trading Partner/supplier code listed on checks received from Ford Motor Company Check with Trading Partner A/R or Buyer for a Trading Partner/supplier code Trading Partner Action Item - Validate or Obtain a GSDB Code Page 6 of 21 Date Issued: 04/26/2007

7 2.1.8 Testing Be sure to test the following: Connectivity test to the ANX Network Loop back test to the Complete system test Trading Partner Action Item Perform connectivity test to the ANX Network, Loop back test to the GEC Hub and Complete system test Additional Information Listed below is some additional information to assist you with firewall rules and routing Firewall rules request to GSEC Ford allows ALL outbound access. Therefore, if Ford initiates access, there are no firewall rules required on the Ford side. If the requirement is for Trading Partner initiated access to a Ford System, the Ford System must be a Properly Administered Host (PAH) and the GSEC team must process this request, ensuring that the appropriate Ford firewall rules are put in place. Depending on the type of access requested, Ford may require the following information: Source IP addresses Destination IP addresses TCP/IP ports required If the destination address is a Ford system (the application request is initiated by the Trading Partner's host), then the Ford system has to be a Properly Administered Host (PAH). The customer on the Ford side should verify that the Ford system is a PAH. If it is not already a PAH, it must meet the PAH requirements and be submitted as a PAH to the appropriate group Firewall rules at vendor site Ford will supply the Trading Partner or IPSEC vendor with the necessary IP addresses Static routes added to Ford router If necessary, static routes are configured on either or both sides of the connection. Page 7 of 21 Date Issued: 04/26/2007

8 ANX Process Summary Select CSP Select Connection Option Select IPSEC Product Register with ANX Visit or call Sign Contracts for Services Complete Installation & Configuration for Circuit and IPSEC Device Complete Subscription Assessment and Pay Fees to ANX ANX Member (Subscribed) Submit the Following Forms to Ford Select Connectivity method from: EDI Connection request Page 8 of 21 Date Issued: 04/26/2007

9 ANX Work Plan Task Task Id 1 Select ANX Certified Service Provider (please reference section for detail) Responsible Prerequisite Duration Organization Task Trading Partner N/A Variable 2 Identify bandwidth requirements (please reference section for detail) 3 Complete ANX Registration Form and submit to ANX (please reference section for detail) 4 Negotiate contractual issues (please reference section for detail) 5 Receive Trading Partner ID from ANX (please reference section for detail) 6 Submit order for ANX connectivity through CSP (please reference section for detail) 7 Select IPSEC solution (please reference section for detail) Trading Partner in N/A Variable conjunction with the Certified Service Provider Trading Partner 1 1 business Trading Partner in conjunction with the Certified Service Provider 8 ANX connectivity configuration Certified Service Provider 9 Fully Subscribed: Full ANX network connectivity installed at Trading Partner site (including IPSEC gateway). Test tunnel to ANX established and working. ** All dedicated ANX customers will need to sign up for ANXtunnelz Service through N/A day Variable Trading Partner 3 7 to 10 business days Trading Partner 3,4 1 business day Trading Partner in 1 Variable conjunction with the Certified Service Provider Certified Service Provider business days 4,5,8 1 business day 10 Submit tunnel request to Ford via Trading Partner 9 1 business day (Reference section for detail) 11 Exchange IP and port information with Trading Partner by or telephone call 12 Complete tunnel request between Ford and Trading Partner 13 Submit EDI Connection Request form to Ford thome.asp (Reference section for detail) Ford, Trading Partner Ford, Trading Partner Ford, Trading Partner 10 1 business day 10, business days 12 Variable Page 9 of 21 Date Issued: 04/26/2007

10 14 Submit firewall rules for Ford IPSEC gateway to GSEC (needed for Trading Partner initiation only. All traffic initiated by Ford is allowed by default) (Reference section for detail) 15 Complete firewall rules for Ford IPSEC gateway (Reference section for detail) Ford 12 1 business day Ford business days Page 10 of 21 Date Issued: 04/26/2007

11 2.2 VAN Implementation To implement a VAN connection, complete sections through VAN Vendor Selection The Trading Partner will have to select a Ford approved VAN. Trading Partner Action Items Select Ford approved VAN VAN Mailbox Setup The VAN will create an account and/or mailbox ID(s) and setup Trade relationships with Trading Partner. Trading Partner Action Items Check status of VAN account VAN Confirmation and Connectivity Test Trading Partner verifies confirmation of mailbox setup with VAN and begins connectivity testing with VAN. Trading Partner Action Items Verify mailbox setup and begin testing Submit Ford EDI Connection Request Form Once the Trading Partner is fully connected to the VAN network, the Trading Partner should access the GSEC external website and submit a "Ford EDI Connection Request " form via the following URL: The submission will be acknowledged via back to the EDI analyst named on the form. These requests are processed in sequential order. A Ford EDI Analyst will contact the Trading Partner within 1-8 business days At this time the Trading Partner will be expected to begin the testing process (send/receive of data across this connection). The form should contain the following key information: Company Name VAN Information Ford Supplier Mailbox Codes Trading Partner Action Items Submit "Ford EDI Connection Request " form Trading Partner Action Items Check status of VAN account and trading partner (i.e. Ford) Page 11 of 21 Date Issued: 04/26/2007

12 2.2.5 GSDB Code See section for GSDB Code. Trading Partner Action Item Validate GSDB Code Testing Be sure to test the following: Connectivity test to the VAN Network Complete system test Trading Partner Action Items - Perform connectivity test to the VAN Network and Complete system test Typical Questions to Ask Your VAN Listed below are some typical questions in selecting a VAN Do you impose a sign up fee? What is your monthly service fee? What is your fee per mailbox? What is your per character or volume fee? What is your thru-put capability? Page 12 of 21 Date Issued: 04/26/2007

13 2.2.9 VAN Process Summary Trading Partner selects a Ford approved VAN Trading Partner will establish a trading relationship with VAN VAN will create account and/or mailbox ID(s) and Trade relationships Trading Partner verifies VAN set up and begins connectivity testing with VAN Trading Partner submits "EDI Connection Request" form to Ford will contact Trading Partner to setup a test date Page 13 of 21 Date Issued: 04/26/2007

14 VAN Work Plan Task Task Responsible Prerequisite Duration Id Organization Task 1 Select Ford Approved VAN Trading Partner N/A Variable 2 Request an account and/or mailbox ID(s) from the VAN Trading Partner in conjunction with 1 Variable 3 Create account and/or mailbox ID's and setup Trade relationships 4 Send appropriate confirmations to Trading Partner 5 Trading Partner verifies confirmations and conducts connectivity test 6 The "EDI Connection Request " form is submitted on equesthome.asp VAN VAN in conjunction with Ford 1,2 Variable VAN 3 Variable Trading Partner in conjunction with VAN 4 Variable Trading Partner 6 1 business day 7 Assign an analyst to the test the EDI Ford 7 Variable Connection (please reference section for detail) 8 Test date notification Ford 9 Variable Note The above work plan takes on average business days to complete. 2.3 WAM Implementation Before implementing the WAM solution the following considerations should be taken into account. The WAM, (WEB Access Module) as of this writing, IS NOT AN APPORVED Q1 SOLUTION. Suppliers who are required to obtain, or intend on obtaining, a Q1 rating from Ford Motor Company should not choose the WAM as their primary EDI Solution. The WAM does not fill the requirement of a fully integrated EDI solution. The WAM is intended as a low cost solution for suppliers whose EDI volume is extremely low. While it is hard to specifically quantify, the following criteria could be used. Daily volume of fewer than 10 EDI documents, or 10 ASN with less than 20 parts total. File sizes that range less than 100kb, from tests run it is estimated that 100kb will take approximately 5 minutes to down load. The current process of uploading or down loading documents via the WAM will only accommodate single file transfer. Page 14 of 21 Date Issued: 04/26/2007

15 When down loading planning releases or ship schedules the file format is UN EDIFACT the guidelines for messages can be found at Web forms are available for Planning Releases, Ship Schedules, and the ASN only. The view is one part at a time one release or ASN at a time. The forms can be printed from your browser. An FSP (Ford Supplier Network) account is required to implement WAM EDI. The WAM (Web Access Module) is a web interface that communicates with the mailbox system. Suppliers that are setup for the WAM access it via the Ford Supplier Network portal using a standard web browser (Internet Explorer 5.5 or Netscape 4.7) Suppliers need the following setup before they can get to the WAM: 1. FSP account set up through Covisint. 2. mailbox with password hard coded for FSP access. 3. WAM account (with or without web forms). They must visit in order to request a WAM setup. a. to [email protected] for questions concerning WAM setup. 4. Internet account from local ISP (Internet Service Provider) 5. EDI software if not using predefined forms. If after reviewing the above considerations a supplier feels they fit the profile of a WAM user then proceed with the steps to implement the WAM. To implement a Web Access Module (WAM) connectivity solution complete steps through WAM ISP Selection The Trading Partner must select an Internet Service Provider. It does not matter what ISP is selected as Ford Motor Company has no guidelines or requirements for Internet Service Providers FSP The Trading Partner MUST have an active FSP (Ford Supplier Portal) account requested by their CSA via: They must also request an EDI access via the FSP through this website Submit Ford EDI Connection Request Form In order for the Trading Partner to be fully connected to via the WAM, the Trading Partner must access the GSEC external website and submit a "Ford EDI Connection Request " form to the following URL: The submission will be acknowledged via back to the EDI analyst named on the form within 24 hours of submission. These requests are processed in sequential order. A Ford EDI Analyst will contact the Trading Partner within 1-8 business days to test the ability to send/receive data across this connection The form should contain the following key information: Company Name and GSDB Code Page 15 of 21 Date Issued: 04/26/2007

16 Ford Plant Mailbox Codes WEB EDI with or without forms. Transactions required. (Currently available DELFOR (Material Release/830), DELJIT (Ship Schedule/862), DESADV (ASN/856). Trading Partner Action Items Submit "Ford EDI Connection Request " form Trading Partner Action Items Check status of WAM connectivity (i.e. Ford) GECHub/WAM Mailbox Setup The Ford Connectivity Team will create an account and/or mailbox ID(s) and setup Trade relationships with Trading Partner and Ford sites. Trading Partner Action Items Check status of WAM account WAM Confirmation and Connectivity Test Trading Partner verifies confirmation of mailbox setup with Ford Connectivity Team and begins connectivity testing to GECHub via WAM GSDB Code See section for GSDB Code Testing Be sure to test the following: Connectivity test to the WAM/ via the FSP portal. Complete system test Trading Partner Action Items - Perform connectivity test via the WAM and complete system test Typical Questions Do we currently have an FSP (Ford Supplier Network) account necessary to implement WAM EDI functionality? Do we supply Ford Motor Company with less than 20 parts? Do we send no more that 10 ASN's per day to Ford Plant locations? Since the WAM is not considered by the Ford Supplier Performance Group to be an integrated EDI solution (necessary to maintain a Q1 rating) is the negative impact to our current or future Q1 rating an important consideration for our company? Page 16 of 21 Date Issued: 04/26/2007

17 2.3.9 WAM Process Summary Trading Partner decides they low-volume and fit the profile for WAM EDI Connectivity Trading Partner will establish business relationship with an ISP Trading Partner will request set up EDI Access Token via the FSP Trading Partner submits "EDI Connection Request" form to Information included will be Company Name, GSDB Code and Ford Plant codes. Ford verifies that Trading Partner "EDI Connection Request" form is complete and sets up Trading Relationships. Ford will contact Trading Partner to setup a test date. Page 17 of 21 Date Issued: 04/26/2007

18 WAM Work Plan Task Task Responsible Prerequisite Duration Id Organization Task 1 Select Internet Service Provider Trading Partner N/A Variable 2 CSA to request an FSP account (if not in place) Trading Partner in 1 Variable and EDI Access. conjunction with VAN 3 The "EDI Connection Request" form is Trading Partner 1, 2 Variable submitted to 4 Create account and/or mailbox ID's and setup Ford Connectivity 1-3 Variable Trade relationships Team 5 Send appropriate confirmations to Trading Ford Connectivity 1-4 Variable Partner Team. 6 Trading Partner verifies confirmations and requests connectivity test. Trading Partner 1-5 Variable 7 Assign an analyst to the test the EDI Ford 1-6 Variable Connection (please reference section for detail) 8 Test date notification Ford 1-7 Variable Note The above work plan takes on average business days to complete Addendum 1 WAM Process and Procedures Brief description: The WAM (Web Access Module) is a web interface to communicate with the mailbox system. Suppliers that are setup for the WAM access it via the Ford Supplier Network portal using a standard web browser (Internet Explorer 5.5 or Netscape 4.7). The WAM allows a user to download their data one transaction at a time and upload their data one file at a time. In general, the business team recommends the WAM be used for suppliers that send no more than 10 ASN's or documents daily and supply less than 20 parts. For those sending documents other than ASN's, document size should be limited to that WAM is NOT considered a fully integrated EDI solution for those suppliers that need to meet their Q1 ratings. Important background information: The WAM can be viewed two ways. WAM with web forms and WAM without web forms. WAM without web forms: WAM without web forms is for suppliers that have EDI software/translator and can input/output raw EDI to/from their EDI translator. WAM with web forms: WAM with web forms is for suppliers that do not have an EDI translator and need a low cost alternative for a standard EDI translator. Web forms can parse raw EDI, such as material releases and shipping schedules sent by Ford to its suppliers, and present it in a human readable/printable format. Web forms can also allow a user to Page 18 of 21 Date Issued: 04/26/2007

19 manually enter data into a web form, as in the case of an advance ship notice, and submit it to the. As of June 18, 2002 the web forms currently available are the planning release, ship schedule and the ASN. The ASN form requires users to fill in the information manually on line. How the FSP/WAM link works: High Level View A supplier logs into the FSP site. Under the heading of "Web EDI" they will see all of the GSDB codes they are allowed to view on the WAM. They choose a GSDB code and are then logged into the WAM. Upon entering they are taken to their inbox for that particular GSDB code. There they are allowed to view transactions such as material releases and shipping schedules sent from Ford. They can also go in the outbox, create an ASN and submit it to a particular Ford location. The Details Suppliers need the following setup before they can get to the WAM: 1. FSP account. 2. mailbox with password hard coded for FSP access. 3. WAM account (with or without web forms). They must log in to to have account setup. to [email protected] for questions concerning WAM setup. Suppliers accessing the WAM via the FSP web site must have an FSP account that has been granted the WEB EDI token. Suppliers can request FSP accounts and the WEB EDI token from their Corporate Security Administrator (CSA). The WEB EDI token is a permissions token granted to an FSP account that enables them to see a predefined list of GSDB codes setup in the WAM. The first time a supplier tries to access the WAM via FSP they will have to modify their page content to include the WEB EDI link. This can be done by clicking on "modify page" in the upper right corner of the main FSP page and following the instructions on the next page to add the WEB EDI "channel". Once added, the supplier will then see their GSDB codes under the WEB EDI heading on their main FSP page. When the supplier clicks on one of the WEB EDI GSDB codes the FSP logs the supplier into the WAM for that particular GSDB code. Process for connection to the WAM (Web Access Module)/Web EDI For anyone outside the Ford firewall (suppliers) the connection to the WAM is via the FSP website. Suppliers accessing the WAM via the FSP web site must have an FSP account that has been granted the web EDI token. Suppliers can request FSP accounts and the web EDI token from their Corporate Security Administrator (CSA). The web EDI token is a permissions token granted to an FSP account that enables them to see a predefined list of GSDB codes setup in the WAM. The first time a supplier tries to access the WAM via FSP they will have to modify their page content to include the web EDI link. This can be done by clicking on "modify page" in the upper right corner of the main FSP page and following the instructions on the next page to add a "channel". Once added the supplier will then see their GSDB codes under the web EDI heading on their main FSP page. In Summary - The supplier must have: A. FSP account ( FSP.ford.com) with web EDI token. B. mailbox with password hard coded for FSP access. C. WAM account (with or without web forms). D. Internet account from local ISP (Internet Service Provider). E. EDI Software (Optional). Procedure 1. Go to Page 19 of 21 Date Issued: 04/26/2007

20 2. Select your Geographic Region 3. Select Solmis Migration/Replacement 4. Scroll down and Select EDI Connection Request 5. Fill out form and Select New EDI Connection 6. Select on drop-down menu Web Access Module WAM 7. Answer all questions - a. Current EDI Connection to Ford None (New) b. New EDI Connection to Ford Web Access Module (WAM) c. EDI Hardware/Software i. Translation Sftw Select your EDI software or Other ii. Platform Select your platform or Other 8. Transaction Types 830, 856, 862 (DELFOR/DESADV/DELJIT - These are the current forms available and generally selected for low volume WAM users). 9. Mailbox (GS Sender Enter all of the mailbox/supplier codes you wish to access). 10. Addition Information - Comments (example) No current EDI software implemented for WAM Will use WAM Forms. 11. Submit Form If you have any questions [email protected] WAM FAQs What is the WAM? WAM or Web EDI is the Web Access Module. It is a low-cost EDI solution for low-volume suppliers to Ford Motor Company. Suppliers are set up for the WAM come in through the Ford Supplier Network portal. What is the overall functionality (capability) of the WAM? The WAM can be viewed two ways. WAM with web forms and WAM without web forms. WAM without web forms: WAM without web forms is for suppliers that have EDI software (translator) and can input/output raw EDI to and from their EDI translator. WAM with web forms: WAM with web forms is for suppliers that do not have an EDI translator and need a low cost alternative for a standard EDI translator. Web forms can parse raw EDI, such as material releases and shipping schedules sent to Ford to its suppliers, and present it in a human readable/printable format. Web forms can also allow a user to manually enter data into a web form. Such as an advance ship notice, and submit it to the. Does my company need Internet Access? Yes. Your company must have an Internet Access account with a local certified Internet Service Provider (ISP). What kind of software will I need? You will need to have an Internet Browser on your PC such as Internet Explorer version 5.5 or Netscape Navigator version 4.7 or above. As stated above it is not necessary to have EDI software if you are going to use the Web Forms method only. Page 20 of 21 Date Issued: 04/26/2007

21 How do I know if my company fits the profile of a WAM user? You must have a valid GSDB code from purchasing. If you supply Ford with less that 20 parts overall, submit less than 10 Advanced Shipping Notices per day and a Q1 rating is not important to doing business with Ford than you fit the profile. Will the WAM affect my Q1 rating? Yes. Since the WAM is NOT a fully integrated solution (computer to computer) as deemed necessary by the Ford Supplier Performance Group, your Q1 rating will be in jeopardy. Will my company need an FSP account? Yes. That can be obtained by going to: and filling out the form. This should be done by your company's CSA (Corporate Security Administrator). How does the FSP/WAM link work? After WAM setup is complete, a supplier logs into the FSP site. Under the heading of "WEB EDI" they will see all of the GSDB codes they are allow to view on the WAM. They choose a GSDB code and are then logged into the WAM. Upon entering they are taken to their inbox for that particular GSDB code. There they are allowed to view transactions such as material releases and shipping schedules sent from Ford. They can also go into the outbox and create an ASN and submit it to a particular Ford location. What procedure should I then follow to get my company signed up for the WAM? Make sure that you have the following: 1. GSDB Code. 2. FSP Account 3. Web EDI Token 4. mailbox with password hard-coded for FSP Access. 5. WAM Account. Log into - to have account set up. - You can [email protected] for question concerning WAM setup. What additional steps do I need to follow to get started on the WAM? Suppliers accessing the WAM via the FSP web site must have an FSP account that has been granted the WEB EDI token. Suppliers can request FSP accounts and the WEB EDI token from their Corporate Security Administrator (CSA). The WEB EDI toke is a permissions token granted to an FSP account that enables them to see a predefined list of GSDB codes setup in the WAM. The first time a supplier tries to access the WAM via FSP they will have to modify their page content to include the WEB EDI link. This can be done by clicking on "modify page" in the upper right corner of the main FSP page and following the instructions on the next page to add the WEB EDI "channel". Once added, the supplier will then see their GSDB codes under the WEB EDI heading on their main FSP page. When the supplier clicks on one of the WEB EDI GSDB codes the FSP logs the supplier into the WAM for that particular GSDB code. Page 21 of 21 Date Issued: 04/26/2007

ELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications

ELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD for Production s EDI BROCHURE created by GSEC-EU, Global Electronic Communications Page 1 of 22 Brochure map EDI Brochure Overview Who is GSEC? What is EDI? Advantages

More information

Instruction for GEC Hub Request submission

Instruction for GEC Hub Request submission Instruction for GEC Hub Request submission Table of Contents How to submit connection request to GEC Hub... 2 How to submit mailbox profile change request to GEC Hub... 3 How to submit inquiry request

More information

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is

More information

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Configuring IPsec VPN with a FortiGate and a Cisco ASA Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site

More information

Using IPsec VPN to provide communication between offices

Using IPsec VPN to provide communication between offices Using IPsec VPN to provide communication between offices This example provides secure, transparent communication between two FortiGates located at different offices using route-based IPsec VPN. In this

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Time Warner Cable Business Class IP VPN & Managed IP VPN User Guide

Time Warner Cable Business Class IP VPN & Managed IP VPN User Guide Time Warner Cable Business Class IP VPN & Managed IP VPN User Guide Table of Contents 1. TWCBC IP VPN & Managed IP VPN Service Overview... 4 2. How to Order New Services... 5 2.1 Mobile IP VPN Client Licenses...

More information

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Application Note Startup Tool - Getting Started Guide

Application Note Startup Tool - Getting Started Guide Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

Support Handbook. Performance EDI. October 2007. Document Title Section Title

Support Handbook. Performance EDI. October 2007. Document Title Section Title Support Handbook Performance EDI October 2007 Document Title Section Title 2 Table of Contents Welcome to EasyLink Performance EDI Support...3 Support Overview...4 Maximizing your Support Interaction...6

More information

Configuring a VPN for Dynamic IP Address Connections

Configuring a VPN for Dynamic IP Address Connections Configuring a VPN for Dynamic IP Address Connections Summary A Virtual Private Network (VPN) is a virtual private network that interconnects remote (and often geographically separate) networks through

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched

More information

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall. Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall Overview This document describes how to implement IPSec with pre-shared secrets

More information

Ford ANX Troubleshooting Procedure for use by Trading Partners

Ford ANX Troubleshooting Procedure for use by Trading Partners Ford AX Troubleshooting Procedure for use by Trading Partners Step 1: Verify Internal Routing on Trading Partner etwork Verify packets are routing correctly through Trading Partner LA/WA and Trading Partner

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

How do I set up a branch office VPN tunnel with the Management Server?

How do I set up a branch office VPN tunnel with the Management Server? Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels

More information

V310 Support Note Version 1.0 November, 2011

V310 Support Note Version 1.0 November, 2011 1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6

More information

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Enterprise Security Interests Require SSL with telnet server from outside the LAN Create and Use an SSL on Goals Provide secure and encrypted 5250 data stream conversations with the server (including authentication) use a digital certificate we create with Digital Manager Show a client

More information

Chapter 8 Advanced Configuration

Chapter 8 Advanced Configuration Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently

More information

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card

More information

Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support

Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Title: Single Static IP Customer Owned LAN Router Support Version 1.0 Summary: Use the following method to

More information

Ariba Network Quick Start Guide for Suppliers

Ariba Network Quick Start Guide for Suppliers Ariba Network Quick Start Guide for Suppliers Table of Contents Managing Roles and Users...3 Creating a Role... 3 Creating a User... 5 Modifying a User... 7 Account Configuration...8 Company Profile...

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

nexvortex Setup Guide

nexvortex Setup Guide nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex

More information

C-more Remote Access with Apple ipad or iphone Tutorial

C-more Remote Access with Apple ipad or iphone Tutorial C-more Remote Access with Apple ipad or iphone Tutorial P a g e 2 Introduction: This script will walk you through the basic process of setting up the remote access with an Apple ipad with the Remote Access

More information

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

USER MANUAL. CTBTO Remote Access VPN using Cisco AnyConnect

USER MANUAL. CTBTO Remote Access VPN using Cisco AnyConnect USER MANUAL CTBTO Remote Access VPN using Cisco AnyConnect 1 Table of Contents I. Purpose... 4 II. Scope... 4 III. Definitions and Acronyms... 4 IV. Background... 5 V. Requirements... 5 VI. General Installation

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

Ariba SN Getting Started with Ariba EDI. April 2004

Ariba SN Getting Started with Ariba EDI. April 2004 Ariba SN Getting Started with Ariba EDI April 2004 Copyright 1996-2004 Ariba, Inc. Ariba and the Ariba logo are registered trademarks of Ariba, Inc. Ariba Spend Management, Ariba Spend Management. Find

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Port forwarding and viewing your IP camera from the internet

Port forwarding and viewing your IP camera from the internet Spy On A Bird TM Port forwarding and viewing your IP camera from the internet IP206W IP207W 12201 N NC Hwy 150 Suite 22 PMB 244 Winston Salem, NC 27127 Phone: 800-606-6428 www.spyonabird.com E-mail: [email protected]

More information

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing

More information

PaymentNet Federal Card Solutions Cardholder FAQs

PaymentNet Federal Card Solutions Cardholder FAQs PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Version Date Status Owner. 1.0 2009-02-04 Released for HiPath OpenOffice ME V1 F. Kneissl / K.-W. Weigt

Version Date Status Owner. 1.0 2009-02-04 Released for HiPath OpenOffice ME V1 F. Kneissl / K.-W. Weigt History of Change Version Date Status Owner 1.0 2009-02-04 Released for HiPath OpenOffice ME V1 F. Kneissl / K.-W. Weigt 1.1 2010-09-01 Update for OpenScape Office MX V2 and hints for Fax F. Kneissl 1.2

More information

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different

More information

Configuring PDM. Starting PDM with Internet Explorer CHAPTER

Configuring PDM. Starting PDM with Internet Explorer CHAPTER CHAPTER 4 This section describes how to configure your PDM. It includes the following topics: Starting PDM with Internet Explorer, page 4-1 Starting PDM with Netscape Navigator, page 4-2 Using the PDM

More information

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

Integrating Skype for SIP with UC500

Integrating Skype for SIP with UC500 Integrating Skype for SIP with UC500 Version 1.1 2008 Cisco Systems, Inc. All rights reserved. 1 TABLE OF CONTENTS 1 OVERVIEW... 3 1.1 INTRODUCTION... 3 1.2 SCOPE... 3 1.3 REVISION CONTROL... 3 1.4 RESTRICTIONS...

More information

Method 1: SecuRemote Client VPN Software

Method 1: SecuRemote Client VPN Software There are two methods currently available for connectivity from LEA (law enforcement agency) to TBI headquarters for the purpose of accessing the Fusion Center systems (for the purpose of this connectivity,

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

Using ipass Secure Anywhere. Secure Remote Access for Hallmark Independent Retailers

Using ipass Secure Anywhere. Secure Remote Access for Hallmark Independent Retailers Secure Remote Access for Hallmark Independent Retailers ipass Inc. Managed Network Services 125 Technology Drive, Suite 100 Irvine, CA 92618 USA www.ipass.com +1 949-681-5076 +1 949-681-5114 fx TABLE OF

More information

PI Cloud Connect Overview

PI Cloud Connect Overview PI Cloud Connect Overview Version 1.0.8 Content Product Overview... 3 Sharing data with other corporations... 3 Sharing data within your company... 4 Architecture Overview... 5 PI Cloud Connect and PI

More information

B. KTT Web-based File Transfer

B. KTT Web-based File Transfer B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.

More information

Configuring a WatchGuard SOHO to SOHO IPSec Tunnel

Configuring a WatchGuard SOHO to SOHO IPSec Tunnel Configuring a WatchGuard to IPSec Tunnel This document describes the procedures required to configure an IPSec tunnel between two WatchGuard Firebox s (version 2.3.x). The following WatchGuard products

More information

Ariba Supplier Network Getting Started with EDI. Release: 44 April 2007 Document Version: A

Ariba Supplier Network Getting Started with EDI. Release: 44 April 2007 Document Version: A Ariba Supplier Network Getting Started with EDI Release: 44 April 2007 Document Version: A Copyright 1996 2007 Ariba, Inc. All rights reserved. This documentation, as well as the Ariba software and/or

More information

Scenario: IPsec Remote-Access VPN Configuration

Scenario: IPsec Remote-Access VPN Configuration CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

OfficeConnect Internet Firewall 25 Internet Firewall DMZ. QuickStart Guide (3C16770, 3C16771)

OfficeConnect Internet Firewall 25 Internet Firewall DMZ. QuickStart Guide (3C16770, 3C16771) OfficeConnect Internet Firewall 25 Internet Firewall DMZ QuickStart Guide (3C16770, 3C16771) Checking Package Contents Getting Started Thank you for purchasing the OfficeConnect Internet Firewall. The

More information

Contents. Introduction. Prerequisites. Requirements. Components Used

Contents. Introduction. Prerequisites. Requirements. Components Used Contents Introduction Prerequisites Requirements Components Used Background Information Configure Step 1. Configure the Firepower User Agent for Single-Sign-On Step 2. Integrate the Firepower Management

More information

MFC7840W Windows Network Connection Repair Instructions

MFC7840W Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

AT&T Online Fax User Guide Version 1.0

AT&T Online Fax User Guide Version 1.0 AT&T Online Fax User Guide Version 1.0 Welcome to AT&T Website Solutions SM We are focused on providing you the very best web hosting service including all the tools necessary to establish and maintain

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

FortiVoice. Version 7.00 VoIP Configuration Guide

FortiVoice. Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide Revision 2 14 October 2011 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms are subject

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Configuring the PIX Firewall with PDM

Configuring the PIX Firewall with PDM Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

Taulia Supplier Portal User Guide

Taulia Supplier Portal User Guide Taulia Supplier Portal User Guide Version 2.1 Taulia Inc. Taulia GmbH 201 Mission Street, Ste. 900 Gladbacher Strasse 74 San Francisco, CA 94105 Phone +1 (415) 376 8280 40219 Düsseldorf Germany Fax +1

More information

The Secure Web Access Solution Includes:

The Secure Web Access Solution Includes: F5 - AppDome Partnership F5 and AppDome share a vision that BYOD users should benefit from secure access to enterprise internal portals for increased productivity. With the exponential growth of mobile

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

ERserver. iseries. Remote Access Services: PPP connections

ERserver. iseries. Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.

More information

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network Configuring an IPsec VPN to provide ios devices with secure, remote access to the network This recipe uses the IPsec VPN Wizard to provide a group of remote ios users with secure, encrypted access to the

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

P-660R-TxC Series. ADSL2+ Access Router. Quick Start Guide

P-660R-TxC Series. ADSL2+ Access Router. Quick Start Guide P-660R-TxC Series ADSL2+ Access Router Quick Start Guide Version 3.40 Edition 1 2/2006 Overview The P-660R-TxC ADSL2+ access router is the ideal device for small networks connecting to the Internet via

More information

APNT#1184 WAN or Internet Access to GP-Pro EX. Introduction

APNT#1184 WAN or Internet Access to GP-Pro EX. Introduction Application Note #1184: WAN or Internet Access to GP-Pro EX Introduction This Application Note is intended to assist users in using GP-Pro EX features over a wide area network (WAN) or Internet connection.

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection This setup example uses the following network settings: In our example the IPSec VPN tunnel is established between two LANs: 192.168.0.x

More information

Connecting an Android to a FortiGate with SSL VPN

Connecting an Android to a FortiGate with SSL VPN Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must

More information

CareGiver Remote Support Information Technology FAQ

CareGiver Remote Support Information Technology FAQ CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver

More information

TELEPHONE MAN OF AMERICA. Earning Your Business Every Step of the Way!

TELEPHONE MAN OF AMERICA. Earning Your Business Every Step of the Way! TELEPHONE MAN OF AMERICA Earning Your Business Every Step of the Way! Specializing in Telecom Equipment of all Brands, Carrier Services, Technician Services, Maintenance Agreements & Purchasing Excess

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc. Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc. Introduction In this whitepaper, we will configure a VPN tunnel between two SonicWALLs running SonicOS 2.0 Enhanced that

More information

The Softshare Network

The Softshare Network The Softshare Network The ease of Internet communications has made many traditional VANs (value-added networks) obsolete. But not Softshare. Long ago, we realized the benefits of Internet-based communications.

More information

April 2010. 2007, 2008, 2009, 2010 GXS, Inc. All Rights Reserved.

April 2010. 2007, 2008, 2009, 2010 GXS, Inc. All Rights Reserved. April 2010 2007, 2008, 2009, 2010 GXS, Inc. All Rights Reserved. Licenses and Trademarks All product names are copyrights and registered trademarks/tradenames of their respective owners. Information in

More information

Check Point FW-1/VPN-1 NG/FP3

Check Point FW-1/VPN-1 NG/FP3 Check Point FW-1/VPN-1 NG/FP3 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Networking Security IP packet security

Networking Security IP packet security Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

Government of Saskatchewan Executive Council. Oracle Sourcing isupplier User Guide

Government of Saskatchewan Executive Council. Oracle Sourcing isupplier User Guide Executive Council Oracle Sourcing isupplier User Guide Contents 1 Introduction to Oracle Sourcing and isupplier...6 1.0 Oracle isupplier...6 1.1 Oracle Sourcing...6 2 Customer Support...8 2.0 Communications

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115

More information