White-paper on Security in Application Enablement Services for the Bundled and Software Only Solutions

Size: px
Start display at page:

Download "White-paper on Security in Application Enablement Services for the Bundled and Software Only Solutions"

Transcription

1 White-paper on Security in Application Enablement Services for the Bundled and Software Only Solutions Document Rev: Date 05/15/2008 Introduction The AE Services 4.2 Bundled Offer comes pre-packaged with several security features and packages. For the Software Only Offer, the customer is primarily responsible for providing security for the server. This document provides information about the security features available on the AE Server and security guidelines for both Bundled and Software Only solution customers. In general the areas covered include: 1. Firewall 2. Monitoring Software (Shell and Intrusion Detection software) 3. Network Access 4. Default Logins and RBAC (Role Based Access Control) 5. Password Management 6. Account Management and Access Control 7. AE Services Application Links 8. Session Inactivity Timeouts 9. Audit trails 10. Certificates 11. Jar File Security 12. Warning Banners 13. Linux Installation and Software 14. Vulnerability Tracking 1. Firewall Firewall software provides protection to a server from the network. RedHat Linux ES 4.6 (Version 4 Update 6) comes with a firewall software package called iptables. It controls the network packet filtering code in the Linux kernel. The Bundled Server comes pre-packaged and pre-configured with firewall software. AE Services has implemented the firewall using the Red Hat Linux iptables package. The firewall is always on by default. The firewall on the Bundled Server will keep only specific ports and port-ranges open. Traffic on all other ports will be disabled by default. The firewall is filtered for all INCOMING (/UDP) connections/packets only. All 1

2 OUTGOING (/UDP) connections/packets are not filtered for any ports. Port filtering is turned on for each NIC of the Bundled Server. For the Software Only solution, we strongly recommend enabling the firewall on the AE Services server. The firewall software should be configured to use only those ports that are absolutely required. AE Services uses the following ports by default (for the Bundled and Software Only Solutions). Where appropriate, ports only accessible via the local loopback interface are marked as Local Only. For Local Only, AES components are connecting to other internal AES components using these ports. For Inbound ports, an entity external to AES is initiating the connection. For the application protocols, this will be a client application, but for protocols like H323 and RTP, these connections are initiated during registration and call setup. For Outbound ports, AES will initiate the connection setup. Port Used For Protocol Direction 22 SSH (and SFTP and SCP) Inbound 53 DNS UDP Outbound 67 DHCP UDP 67 Outbound 80 OAM, Web Services and Licensing (disabled by default) Inbound 123 NTP UDP Local Only 162 SNMP Trap/Notification UDP Outbound 389 LDAP Local and Outbound (for authentication and authorization ) 443 OAM, Web Services, and Licensing Inbound 450 TSAPI listener Inbound TSAPI Session Local TLINKS Local Only TSAPI Session TLINKS ( 16 is max number of supported switches ) TSAPI Session Encrypted TLINKS ( 16 is max number of supported switches ) Inbound Inbound H323 Signaling Outbound System Management Service (SMS) Proxy (aka OSSI Proxy) Local Only 4721 DMCC XML Protocol (disabled by default) Inbound 4722 DMCC Secure XML Protocol Inbound 4723 TR87 TLS (disabled by default) Inbound 2

3 H323 RTP (DMCC Server-Side Media) UDP Inbound 5430 Database Local Only 5501 TSAPI Tserver Local Only 5502 TSAPI Driver Local Only 5503 DLG Local Only 5504 Transport Local Only 5505 ASAI Link Service Local Only 5678 DLG Listener Inbound H323 RAS UDP Inbound 8080,8443 Tomcat : OAM, Web Services, Licensing (8080 disabled by default) Inbound 8081,8082 JMX (Management) Local Only 8765 Transport Protocol Outbound 9998 Secure CVLAN Listener Inbound 9999 CVLAN Listener Inbound It should be noted that some of these ports and port ranges are configurable via the OAM Ports web page. On the Bundled Server, changes to the OAM Ports screen will automatically reconfigure the firewall rules. Controlling the Firewall on Bundled Solution The Bundled Server comes pre-packaged and pre-configured with firewall software. AE Services has implemented the firewall using the Red Hat Linux iptables package. The firewall is always on by default. i. Modifying the Firewall In some instances a customer or Avaya technician may want to change the port filtering rules (port or port ranges) on the firewall. It is highly recommended that the OAM Port screen be used to perform all port changes. All port value changes applied by the OAM Port screen will cause the firewall to be automatically reconfigured to support the new rules. Firewall setting modifications for ports not listed on the port screen can be done by using various options available through the Linux iptables command. The iptables command is only available to users with root (sroot) level privileges. 3

4 Note: By default, the firewall is automatically started when the Bundled Server boots up. The default rules that are implemented by the firewall are in /etc/init.d/iptables. A script /opt/mvap/bin/firewallupdater.sh runs each time the AE Service is started to regenerate the firewall rules based on the current port configuration settings. Any firewall changes made outside of the script will be discarded when the AE Service is restarted. In order to make the firewall changes persistent for ports not on the OAM port screen the firewall configuration script must be modified by the System Administrator to include the additional port values. For each of the below commands, the System Administrator must SSH into the Bundled Server first, and then su to the root (sroot) level account. ii. Listing the rules of the Firewall Use the following command: iptables --list --line-number --numeric This will list all the firewall rules including the Rule Numbers. There are three chains (table) for which rules will be listed. 1. INPUT - for incoming connections/packets 2. OUTPUT - for outgoing connections/packets 3. FORWARD - for forwarding packets from one host to another iii. Starting the Firewall Use the following command: service iptables start iv. Stopping the Firewall Use the following command: service iptables stop v. Restarting the Firewall At any point, if the iptable rules are misconfigured, then restarting the iptables will re-load the default iptable rules. Use the following command: service iptables restart vi. Allowing access to a port in the Firewall (see above Note) Use the following command: iptables modify --add (INPUT OUTPUT FORWARD) (tcp udp) xxxx, where xxxx is the port number to enable 4

5 For example, iptables modify --add INPUT tcp 5654 vii. Disabling access to a port in the Firewall (see above Note) Use the following command: service iptables modify --reject (INPUT OUTPUT FORWARD) (tcp udp) xxxx, where xxxx is the port number to enable For example, iptables modify --reject INPUT tcp 5660 viii. Removing a port from the Firewall (see above Note) Use the following command: iptables modify --remove (INPUT OUTPUT FORWARD) (tcp udp) xxxx, where xxxx is the port number to be removed For example, iptables modify --remove INPUT tcp 5660 ix. Allowing access to a range of ports in the Firewall (see above Note) Use the following command: iptables modify --add-range (INPUT OUTPUT FORWARD) (tcp udp) xxxx yyyy, where xxxx is the fromport and yyyy is the to-port. For example, iptables modify --add-range INPUT udp x. Removing a port range from the Firewall (see above Note) Use the following command: iptables modify --remove-range (INPUT OUTPUT FORWARD) (tcp udp) xxxx yyyy, where xxxx is the fromport and yyyy is the to-port. For example, iptables modify --remove-range INPUT udp Monitoring Software a. Software Only Solution It is strongly recommended to install intrusion detection and monitoring software on the AE Services server. There are several such software packages available like Tripwire, SNORT, etc. It is also strongly recommended to configure the Linux bash shell to log all shell command activity to Linux system logs. b. Bundled Solution i. Shell Monitoring 5

6 AE Services has configured the bash rpm to log all shell command activity to the Linux system logs in /var/log/messages. This includes any command that is typed by a user or invoked by any software within the AE Services server. System Administrators can monitor these logs for unusual system activity. ii. Tripwire AE Services uses the Tripwire software available from Fedora Linux to do system monitoring and intrusion detection. Tripwire allows System Administrators the ability to monitor for possible intrusion into a system. The Tripwire software is installed via a Linux RPM on the Bundle Server. AE Services provides an RPM to configure and start tripwire. After installation of the AE Services software, Tripwire is configured to automatically startup upon reboot. On the first startup, Tripwire builds a database of all files that it is monitoring. Thereafter periodically (once every day at 4.02 a.m.), if Tripwire detects any database changes or security violations when it runs the integrity check, it generates a report located at /var/lib/tripwire/report with any violations that were found. In addition, a SNMP Trap will be issued to each configured SNMP Trap destination. Important: It is strongly recommended to view these daily tripwire reports and clean them up appropriately. Otherwise, over time, these reports will occupy disk space. Note: It is the responsibility of the system administrator to view and delete these reports and SNMP Traps. Once the tripwire reports have been viewed, the tripwire database must be updated in order to prevent the security violation from being raised again. Since Tripwire is installed during the initial install process, a default password is generated and used to configure Tripwire. In order for Tripwire to be updated, Tripwire must be reinstalled by the System Administrator such that a valid user password is provided. This password will be used by the System Administrator to update Tripwire on all future requests. The complete set of instructions for Tripwire configuration is located in the Application Enablement Services Administration and Maintenance Guide Release 4.2, under the section titled Using Tripwire. Items 1-4 of the following command summary must be executed by a user with root (sroot) privileges. 1. Start Tripwire: Use the command: service tripwire start 2. Stop Tripwire: Use the command: service tripwire stop 6

7 3. Restart Tripwire: Use the command: service tripwire restart 4. View the Tripwire reports: Use the command: twprint m r -- twrfile /var/lib/tripwire/report/<filename>.twr 5. All SNMP Traps are managed from the OAM Alarm Viewer screen. This screen will allow an administrator the ability to view or clear a generated alarm. 3. Network Access a. Software Only Solution It is recommended to disable telnet, ftp, rsync and rsh as these network programs are insecure. Instead we recommend the use of SSH, SFTP and SCP. To disable telnet and the other services listed above use the chkconfig command. b. Bundled Solution The Bundled Server allows only SSH, SFTP and SCP. Telnet, ftp, rsync and rsh have been disabled. 4. Default Logins and RBAC There are 3 classes of Users on AE Services: CTI OAM Administrators User Management Administrators CTI Client Application Users The AE Services OAM web-pages provide access to CTI OAM Administrators which requires login authentication from the Linux platform or an Enterprise Directory (Active Directory, Domino, OpenLDAP, etc ). The Enterprise Directory connection from OAM supports the use of the LDAP-S (Secure LDAP) protocol. The administrator account used to access OAM is the same login that is used to access the AE server using a remote connection with a program like SSH. The OAM web-pages also provide access to User Management Administrators which requires authentication from a secure LDAP database. It is strongly recommended that all logins/passwords to the Linux platform, Web OAM (CTI and User Management) as well as the secure LDAP database (User management) be changed during first login as well as periodically. Avaya will be changing the passwords periodically (every 90 days) for all Avaya logins (craft and sroot). Customers are advised to change passwords for all customer logins. CTI Client Application Users are required by TSAPI, JTAPI, DMCC and Telephony Web Service applications in order to authenticate the application. These users may be authenticated against either the AE Services User Management LDAP database or against an Enterprise Directory. 7

8 CTI OAM Administrator Accounts CTI OAM Administrator accounts are administered in Linux or an Enterprise Directory. The administrative accounts for OAM access are role based. The appropriate roles are System Administrator, Security Administrator, Auditor, Maintenance, and BackupRestore. For authentication, accounts against the Linux platform are enforced by Linux while the accounts in the Enterprise Directory are enforced by the policies administered on the directory server. The following roles are used by OAM for RBAC. This table presents the RBAC mapping between an Enterprise Directory role and a Linux group. Role Linux Group AE Services OAM access privileges System_Administrator susers Read and write access to all operations in CTI OAM Administration: Administration Status and Control Maintenance Alarms Logs Utilities No access to User Management or Security Administration. Security_Administrator securityadmin Read and write access to Security Administration: Account Management PAM Management Login Reports Login Audit Read and write access to CTI OAM Administration Certificate Management Logs No additional access to CTI OAM Administration or User Management. Administrative role for User Management Not associated with Linux. Read and write access to User Management. No access to CTI OAM Administration or Security Administration. Note: To acquire the Administrative role for User Management, a user must have an administered account in the local LDAP data store with the 8

9 Avaya role set to userservice.useradmin. Auditor users Read-only access to the following functions in CTI OAM Administration: Administration > Security Database > CTI Users: List All Users and Search Users Certificate Management Status and Control Alarms Logs Backup_Restore backuprestore Read and write access to the following Maintenance functions: Backup Database Restore Database Avaya_Maintenance avayamaint Read and write access to the following CTI OAM Admin functions: Maintenance, Logs Utilities The following Linux accounts exist on the AES server by default. Account Name cust craft sroot Group susers securityadmin susers securityadmin root Default Password Yes Yes Yes Purpose For customer use For Avaya Technician use For Avaya Technician use Password Naming Policy See Password Management Section At least 8 chars, no dictionary words or palindromes. At least 8 chars, no dictionary words or palindromes. Password Change Policy Password should be changed by customer after initial installation and periodically there after. Will be changed periodically (every 90 days) once the system is registered with Avaya Services Will be changed periodically (every 90 days) once the system is registered with Avaya Services 9

10 rasaccess remote Yes For remote modem access. Only provides access to PPP, still need to use one of the above accounts to access the system. At least 8 chars, no dictionary words or palindromes. None. Note: Direct root login is disabled for both SSH (only on the Bundled Server) and Web OAM. The above platform logins provide specific access to resources on the AE Services server. For example, a root level login will be allowed to restart AE Services on the platform. While from OAM, any login belonging to the group susers can restart AE Services. All logins will have access to the AE Services logs under /var/log/avaya/aes. Note: By default the root account is disabled on the Bundled Server and the sroot account is used by Avaya Services to obtain root level access. Be aware that the root account may be re-enabled by setting the root password.. Passwords for all Linux accounts are stored securely by the Linux platform. User Management Administrator Accounts User Management Administrators are authenticated against a Local LDAP store on the AES server. Account Name Default Password Password Naming Policy craft Yes Controlled by Avaya Services avaya Yes See Password Management Section Password Change Policy None None, should be changed by customer after initial installation and periodically there after User Management uses roles for authorization purposes. User Administrators must have the userservice.useradmin role set. A User Administrator can create other user accounts and then assign them a userservice.useradmin role to create other User Administrators. Passwords are stored MD5 encrypted by the LDAP server backing User Management. 10

11 CTI Client Application User Accounts The AES services TSAPI, JTAPI, Telephony Web Service and DMCC each authenticate a connecting client application and authorize the control of devices by the client application. The CTI user directly associated with the client application can be authenticated either against the local User Management LDAP (default) or an Enterprise Directory (like Active Directory). Authorization is performed on the AES server using the Secure Database (SDB) feature. The SDB can be optionally enabled or disabled. By default the SDB is disabled. In the disabled state, a user has the ability to control any device registered on AES including devices belonging to another user. In the enabled state, a user must be authorized in the SDB to control a device. The user may be optionally categorized as having Unrestricted Access or Restricted Access. By default a user is granted Restricted Access Note: A user with Unrestricted Access has the ability to control any device registered on AES. In order to add a user into the SDB, the user must be created in User Management as a CTI user. If the SDB is disabled and an Enterprise Directory is used for authentication, a user does not have to be created in User Management. The DMCC service uses a Communication Manager (CM) Station extension and password to register a DMCC device on behalf of the client application. It is strongly recommended that each DMCC device have its own unique password administered in CM for a corresponding extension (station). CM allows up to 8 digit passwords for each extension. A possible configuration exists where a user application may not have to be aware of a device s password for registration. If the SDB is enabled and a user is configured in the SDB for Unrestricted Access, the registration process will succeed when a password is not supplied as long as the extension s class of restriction (COR) on CM has the options Can Be Service Observed: and Can Be A Service Observer: set to yes. This feature is only available on CM 5.1 and higher. Otherwise the user application must be aware of the password for each device for the registration process to succeed. See the chapter titled The Security Database, of the Application Enablement Services Administration and Maintenance Guide Release 4.2 for details on configuration of the various authentication options. The following table outlines the services that perform administration and authorization on the AE Services server. 11

12 Service Name DMCC (formerly CMAPI) User Type CTI Authentication Yes, against local LDAP or Enterprise Directory TSAPI CTI Yes, against local LDAP or Enterprise Directory JTAPI CTI Yes, against local LDAP or Enterprise Directory Authorization Uses the Security Database (SDB) which specifies which devices a user is allowed to control. The SDB feature is disabled by default. The client must provide the password for each CM extension (device) registered on this connection. Uses the Security Database (SDB) which specifies which devices a user is allowed to control. The SDB feature is disabled by default. Uses security database which specifies which devices a user is allowed to control. The SDB feature is disabled by default. CVLAN CTI No Only accepts connections from an administered set of clients DLG CTI No Only accepts connections from an administered set of clients Telephony Web Services CTI Yes, against local LDAP or Enterprise Directory Uses security database which specifies which devices a user is allowed to control. The SDB feature is disabled by default. User Management Web Services User Admin Yes, against local LDAP or Enterprise Directory Users must have userservice.useradmin roles set to perform User Management Administration. SMS (System Management Web Services) CM User Yes, against CM. Must provide OSSI username and password Internal Unprivileged Linux Accounts For security reasons, services on the AE Services server run as unprivileged Linux users. Since each service execute as an unprivileged user, each service will have access permissions equivalent to that of the unprivileged user. Direct login access to these unprivileged accounts is disabled. Examples of these internal unprivileged accounts 12

13 include apache (used by Apache web server), tomcat5 (used by Tomcat web server) and avaya (used for AES services like TSAPI, Transport etc ). 5. Linux Password Management Password management is the enforcement of a set of rules or laws that govern the creation and lifecycle of a password. This includes the combination of characters that will be allowed to be composed together to form a password, the life expectancy of a valid password before a new one has to be created, and the lockout period for invalid login attempts among other password usage items. This feature requires role privileges for a Security Administrator. The following table specifies the configurable password rules provided by the OAM interface. Password Rules Default Value Minimum password length. 8 Minimum digits required for password complexity. 1 Minimum upper characters required for password complexity. 1 Minimum lower characters required for password complexity. 1 Minimum special characters required for password complexity. 1 Minimum number of character difference between passwords 2 Number of times a user is prompted for a valid password 3 Max invalid consecutive logins before account is locked 3 Lockout account duration after reaching max invalid logins 60 seconds Max number of days a password maybe used. 60 Minimum number of days between password changes. 1 Number of days warning given before a password expires. 10 Once a user account enters the password expiration warning period, an indication will be provided from the OAM interface listing the number of days left. A Change Password screen will be available from OAM once this message is displayed to allow a user the ability to change their password. A remote SSH connection to the AES server will only inform the user of the number of days left before the account is locked. The user will have to use the Linux command passwd in order to change their password. 6. Account Management and Access Control Using the OAM interface, a Security Administrator has the ability to create, modify, delete, lock or unlock a Linux based user account. In addition, the Security Administrator has the ability to view a login report of all the Linux accounts available on the AE Server 13

14 or a detailed login report of an individual account. Each individual detailed report will include the users associated Linux groups, RBAC roles, account lock status, shell access privileges, and their password management statistics. The following table represents additional capabilities available using OAM and their default values. Additional Account Mgmt and Access Control Features Default Value Allow user access to the Linux shell Disabled Force password change on first login. No Limit the number of simultaneous logins. 10 Restrict server access based on the time/day of the week. None Enable a login audit process to disable unused Linux accounts. Disabled 7. AE Services Application Links (Bundled and Software Only solution) The AE Services server uses several links to communicate with applications as well as Communication Manager. Link Name DMCC (Formerly CMAPI) TR87 TSAPI/JTAPI CSTA 1 ASN.1 CVLAN DLG H.323 Signaling RTP AEP Secure Transport Link Connection Between Application and AE Services AES and MS LCS or OCS Application and AE Services Application and AE Services Application and AE Services AE Services and Communication Manager AE Services and Communication Manager AE Services and Communication Manager Connection Type Used By DMCC service Encrypted (4.2) Yes by default. TR87 interface Yes TSAPI/JTAPI service CVLAN service DLG service No, UDP DMCC service UDP DMCC service TSAPI, JTAPI, CVLAN, DMCC Call Information Yes based on config Yes based on config Yes based on config Yes based on config Yes 14

15 OSSI HTTPS AE Services and Communication Manager Web Services Application or Webbrowser and AE Services System Management Service (SMS) Web OAM, System Management Service (SMS), Telephony Service, User Service Yes Yes Important: It is strongly recommended that the applications using Telephony Services, User Service and System Management Services (SMS) use the HTTPS link for maximum security. 8. Session Inactivity Inactivity timeouts are implemented for users logged into a Linux shell via SSH (Bundled Server only) or into the OAM web interface. The following table summarizes the inactivity timeouts for these connections. Service Name Session Inactivity Customizable SSH (shell) Web OAM Yes (default = 30 minutes) Yes (requires root access) Yes (default = 30 minutes) Yes (requires root access) See Appendix A for details on modifying the default timeout values. 9. Audit Trails An audit trail/log is a chronological sequence of records showing who has accessed a computer system and what operations a user performed during a given period of time. Audit trails in AES are recorded in reference to two basic areas, Linux based shell commands and any OAM based changes. AE Services has configured the bash rpm on the Bundled Server to log all shell command activity to the Linux system logs in /var/log/messages. This includes login attempts (success and failure) and any command that is typed by a user or invoked by any software within the AE Services server. This provides an audit trail for all shell activity. Any configuration changes using the OAM interface will be logged including all login attempts into the web interface. The OAM interface is mainly backed by a relational database. As part of the OAM logging process, the logs will contain the login name of the 15

16 individual making the change, the date/time of the change, the IP address of the connecting system, and a synopsis of the before and after data changes. The following is a summary of the log file locations. Service Name SSH (shell) Web OAM (CTI OAM) Audit Trail Locations /var/log/messages /var/log/avaya/aes/oam-admin Web OAM (User Admin access) /var/log/avaya/aes/tomcat/ws_cus_authentication.log 10. Certificates Certificates are used on the AE Server to provide a secure form of communication with remote hosts using the SSL/TLS protocol. Before the AES 4.2 release, a separate certificate, either one self-signed or signed by a CA, was used by Apache, Tomcat, DMCC and TR87. With the use of the OAM Certificate Management web pages these services are now able to use the same server-side certificate provided by and signed by a customer s CA. The Host Authentication and Authorization (AA) feature available on the AE Server is used to provide an additional layer of validation for connecting remote hosts that want to communicate with the AE Services DMCC or TR87. The Host AA feature is configurable using the OAM web interface. This feature validates the client certificate received by the server against a set of credentials. Two areas of validation exist. The first area of validation, which is focused on authentication, verifies that the certificate received from the client is valid. For instance, the certificates Not Valid Before and Not Valid After Date are checked against the server s current date/time. In addition, the certificate is verified to be signed by a trusted CA. The second area of validation, which is focused on authorization, determines if the Common Name (CN) in the client certificate matches one of the CN s listed on the server as a trusted host. If the client certificate fails the basic certificate validation or if the CN does not match any of the specified trusted hosts, the connection will be refused and a log message will be created. By default this feature is disabled for DMCC. TR87 has the authorization feature disabled and the authentication feature enabled by default. On the client application server, the DMCC Java SDK only has the ability to validate the received AES server certificate is signed by a trusted CA and the certificates Not Valid Before and Not Valid After Date is valid. The ability to verify a certificate s CN against a trusted host list is not provided by the SDK. The client side validation feature is controlled with the use of a SDK property. By default this feature is displayed. 16

17 11. JAR File Security AE Services digitally signs each of the jar files provided by the AES platform. Digitally signed jars provide a way to protect jar files from tampering which include modification or deletion of existing files in the jar or the addition of new files after the jar has been created. If this remained unchecked the ability for someone to rewrite or remove a file as a way to circumvent a security feature or obtain sensitive data remained plausible. For example, if someone is able to replace a piece of code that handles incoming digits, the user will be able to rewrite and replace the existing file to capture all the entered digits and send them off to another server or address for retrieval. When a jar file security violation is detected, AE Services will not start and a security violation message will be logged. In addition, the OAM CTI Administration main page will list the name of each jar file which failed validation. 12. Warning Banners a. PAM Issue Before a user logs into the AES server using a SSH connection or the web OAM interface they are presented with a legal warning banner (disclaimer). The issue banner may be disabled or modified by an administrator using the OAM interface with a login role of a Security Administrator. The issue banner is enabled by default and a default message is displayed. b. PAM MOTD (Message of the Day) After a user logs into the AES server using a SSH connection or the web OAM interface they are presented with an MOTD message banner. The MOTD banner may be disabled or modified by an administrator using the OAM interface with a login role of a Security Administrator. The MOTD banner is disabled by default. Service Name Banner Customizable via OAM SSH (shell) Yes Yes Web OAM Yes Yes 13. Linux Installation and Software a. Software Only Solution AE Services 4.2 requires RedHat Linux ES 4.6 operating system. We recommend that a minimum installation of RedHat Linux be performed. This will ensure 17

18 only the minimal required software RPMS are installed which will greatly lessen security risks. See the Application Enablement Services Installation and Upgrade Guide for a Software-Only Offer Release 4.2 for further details. b. Bundled Solution The Bundled Server comes pre-packaged with RedHat Linux ES 4.6 along with AE Services software. The Bundled Server has only the minimum Linux software RPMs that are required for the proper functioning of the OS. This also means that only those Linux services that are absolutely needed by AE Services have been enabled on the box. This way only those ingress software ports have been enabled that are really needed. This reduces the security risk significantly. See the Application Enablement Services Installation and Upgrade Guide for a Bundled Server Release 4.2 for further details. 14. Vulnerability Tracking (Bundled and Software Only solution) Avaya has an active organization which tracks security advisories and susceptibility of Avaya products to vulnerabilities described in those advisories. This organization coordinates these advisories issued by vendors who supply operating systems or software components to Avaya. To sign up for advisory notification, please go to and Select "My e-notifications". For more detail on Avaya tracking policies and practices, please see: Avaya's Product Security Vulnerability Response Policy Avaya's Security Vulnerability Classification Policy 18

19 APPENDICES These following appendices outline some potential options for configuration changes that may help make the AE Services Bundled Server more secure. This configuration changes require root access and would typically need to be performed by Avaya Services technician running as sroot. 1. Configuration options for changing inactivity timeouts for shell and OA&M access APPENDIX A Inactivity timeouts Both Shell and OA&M access provide default 30 minute inactivity timeouts. Sometimes customers may have requirements for lower timeouts. The following shows how these inactivity timeouts can be modified. 1) To modify the OA&M inactivity timeout, do the following: a. cd $CATALINA_HOME/webapps/MVAP/WEB-INF b. edit web.xml c. Modify the session-timeout element (this value is in minutes). The default entry (30 minutes) looks like. <session-timeout>30</session-timeout> d. Restart tomcat for the change to take effect 2) To modify the bash shell inactivity timeout, do the following: a. cd /etc/profile.d b. Edit mvap.sh c. Change TMOUT value. This value is seconds. The default entry looks like export TMOUT=1800 to change to 15 minutes for instance do the following: export TMOUT=900 d. Changes will take effect for all subsequent shell logins 19

Avaya MultiVantage Application Enablement Services Administration and Maintenance Guide Release 4.2

Avaya MultiVantage Application Enablement Services Administration and Maintenance Guide Release 4.2 Avaya MultiVantage Application Enablement Services Administration and Maintenance Guide Release 4.2 02-300357 Issue 10 May 2008 2005-2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts

More information

Avaya Aura Application Enablement Services Administration and Maintenance Guide

Avaya Aura Application Enablement Services Administration and Maintenance Guide Avaya Aura Application Enablement Services Administration and Maintenance Guide Release 6.3 02-300357 June 2014 2014 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Security Configuration Guide P/N 300-010-493 Rev A05

Security Configuration Guide P/N 300-010-493 Rev A05 EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

Determine if the expectations/goals/strategies of the firewall have been identified and are sound. Firewall Documentation Develop background information about the firewall(s) in place: Segment diagrams Software Hardware Routers Version levels Host names IP addresses Connections Specific policies for

More information

Application Enablement Services. Web Services Programmer Guide Release 4.1 An Avaya MultiVantage Communications Application

Application Enablement Services. Web Services Programmer Guide Release 4.1 An Avaya MultiVantage Communications Application Application Enablement Services Web Services Programmer Guide Release 4.1 An Avaya MultiVantage Communications Application 02-300362 Issue 4.0 December 2007 2007 Avaya Inc. All Rights Reserved Notice While

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Configuring CSS Remote Access Methods

Configuring CSS Remote Access Methods CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

What is included in the ATRC server support

What is included in the ATRC server support Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Avaya Port Matrix: Avaya Diagnostic Server 2.5

Avaya Port Matrix: Avaya Diagnostic Server 2.5 Avaya Matrix: Avaya Diagnostic Server 2.5 Issue 1.1 March 2015 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011 Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,

More information

Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.0(2)

Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.0(2) Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.0(2) This guide provides an overview of the Disaster Recovery System, describes how to use the Disaster

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

Virtual Appliance Installation Guide

Virtual Appliance Installation Guide > In This Chapter Document: : Installing the OpenManage Network Manager Virtual Appliance 2 Virtual Appliance Quick Start 2 Start the Virtual Machine 6 Start the Application 7 The Application is Ready

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

Linux FTP Server Setup

Linux FTP Server Setup 17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1)

Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1) Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.5(1) This guide provides an overview of the Disaster Recovery System, describes how to use the Disaster

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

SnapLogic Sidekick Guide

SnapLogic Sidekick Guide SnapLogic Sidekick Guide Document Release: October 2013 SnapLogic, Inc. 2 West 5th Avenue, Fourth Floor San Mateo, California 94402 U.S.A. www.snaplogic.com Copyright Information 2011-2013 SnapLogic, Inc.

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

Release Notes for Dominion SX Firmware 3.1.6

Release Notes for Dominion SX Firmware 3.1.6 Release Notes for Dominion SX Firmware 3.1.6 Release Notes Version: 4.0 Release Notes Date: December 4, 2008 Effective: Immediately Applicability: The 3.1.6 Release is applicable to the Dominion SX. SX

More information

Tunnels and Redirectors

Tunnels and Redirectors Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...

More information

Release Notes for SIP Enablement Services Release 3.1.2 Service Pack 2

Release Notes for SIP Enablement Services Release 3.1.2 Service Pack 2 Release Notes for SIP Enablement Services Release 3.1.2 Service Pack 2 Target Products: SIP Enablement Services Release 3.1.2 Release Notes Issue 1.0 August 4, 2008 What s Fixed in Service Pack 2 What

More information

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara Guardian Digital WebTool Firewall HOWTO by Pete O Hara Guardian Digital WebTool Firewall HOWTO by by Pete O Hara Revision History Revision $Revision: 1.1 $ $Date: 2006/01/03 17:25:17 $ Revised by: pjo

More information

PowerChute TM Network Shutdown Security Features & Deployment

PowerChute TM Network Shutdown Security Features & Deployment PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network

More information

IFS CLOUD UPLINK INSTALLATION GUIDE

IFS CLOUD UPLINK INSTALLATION GUIDE IFS CLOUD UPLINK INSTALLATION GUIDE ABSTRACT This guide describes how to install IFS Cloud Uplink. UPLINK VERSION 4.13 PREPARE THE WEB SERVER THAT SERVES IFS EXTENDED SERVER Since the user credentials

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2 JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Load Balancing Clearswift Secure Web Gateway

Load Balancing Clearswift Secure Web Gateway Load Balancing Clearswift Secure Web Gateway Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING

More information

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department Ahsay Replication Server v5.5 Administrator s Guide Ahsay TM Online Backup - Development Department October 9, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. Author:

More information

Asterisk SIP Trunk Settings - Vestalink

Asterisk SIP Trunk Settings - Vestalink Asterisk SIP Trunk Settings - Vestalink Vestalink is a new SIP trunk provider that has sprung up as a replacement for Google Voice trunking within Asterisk servers. They offer a very attractive pricing

More information

Pre Sales Communications

Pre Sales Communications Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

MyPBX Security Configuration Guide

MyPBX Security Configuration Guide MyPBX Security Configuration Guide Version: V1.4 Date: March 25 th, 2013 Yeastar Technology Co., Ltd. http://www.yeastar.com 1/16 Contents 1. Security Configuration for Web GUI..3 1.1 Change the default

More information

Getting Started with RES Automation Manager Agent for Linux

Getting Started with RES Automation Manager Agent for Linux Getting Started with RES Automation Manager Agent for Linux Contents Chapter 1: Introduction 1 Chapter 2: Prerequisites and General Guidelines 2 Chapter 3: Installation 3 3.1 Manual Installation... 3 3.2

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2 JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

First Steps after Installation Guide

First Steps after Installation Guide First Steps after Installation Guide Index 1. Login to your IVR 2. License activation 3. Security Recommendations 4. Configure your first SIP extension or device 5. Configure your first SIP trunk 6. Configure

More information

Ositech FoIP Gateway User Manual

Ositech FoIP Gateway User Manual Ositech FoIP Gateway User Manual Document Status: Released Revision : H Document # : 48x503-xxx Page 1 of 45 Revision History DATE REV REASON June 23, 2008 A Initial Document Creation (Based on embedded

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

OnCommand Unified Manager 6.3

OnCommand Unified Manager 6.3 OnCommand Unified Manager 6.3 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

Analyze Traffic with Monitoring Interfaces and Packet Forwarding

Analyze Traffic with Monitoring Interfaces and Packet Forwarding Analyze Traffic with Monitoring Interfaces and Packet Forwarding Published: 2016-04-08 This guide explains how to configure an ExtraHop appliance to analyze network traffic using both monitoring interfaces

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.0

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.0 JAMF Software Server Installation and Configuration Guide for OS X Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

TestKings.6207.49Questions. Avaya Aura Contact Recording and Avaya Aura Quality Monitoring Implementation Exam

TestKings.6207.49Questions. Avaya Aura Contact Recording and Avaya Aura Quality Monitoring Implementation Exam TestKings.6207.49Questions Number: 6207 Passing Score: 800 Time Limit: 120 min File Version: 4.4 http://www.gratisexam.com/ 6207 Avaya Aura Contact Recording and Avaya Aura Quality Monitoring Implementation

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information

Codes of Connection for Devices Connected to Newcastle University ICT Network

Codes of Connection for Devices Connected to Newcastle University ICT Network Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review Connection Broker Managing User Connections to Workstations, Blades, VDI, and more Security Review Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com 465 Waverley

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

F-Secure Internet Gatekeeper

F-Secure Internet Gatekeeper F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

Setup Cisco Call Manager on VMware

Setup Cisco Call Manager on VMware created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

Corporate and Payment Card Industry (PCI) compliance

Corporate and Payment Card Industry (PCI) compliance Citrix GoToMyPC Corporate and Payment Card Industry (PCI) compliance GoToMyPC Corporate provides industryleading configurable security controls and centralized endpoint management that can be implemented

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Administration Guide BES12. Version 12.3

Administration Guide BES12. Version 12.3 Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.0

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.0 JAMF Software Server Installation and Configuration Guide for Linux Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Configuring Secure Socket Layer (SSL)

Configuring Secure Socket Layer (SSL) 7 Configuring Secure Socket Layer (SSL) Contents Overview...................................................... 7-2 Terminology................................................... 7-3 Prerequisite for Using

More information

Setting up pfsense as a Stateful Bridging Firewall.

Setting up pfsense as a Stateful Bridging Firewall. Setting up pfsense as a Stateful Bridging Firewall. Contents Contents Setting up pfsense as a Stateful Bridging Firewall.... 1 What king of system these directions will try and help you create.... 1 Selecting

More information

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able

More information