OFTP / OFTP2 Data and Parameter Sheet Communication parameter for establishing partner links Last updated: 30. May 2010



Similar documents
Automotive Supply Chain Best Practices OFTP2 EXPLAINED. Version No 1.0. Date: October Copyright Odette International Ltd

OFTP 2 Secure Data Exchange Via the Internet

ELECTRONIC DATA INTERCHANGE WITH FORD for Production Suppliers EDI BROCHURE. created by GSEC-EU, Global Supplier Electronic Communications

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications

TECHNICAL WHITE PAPER COVAST OFTP ADAPTER FOR IBM WEBSPHERE PARTNER GATEWAY SEPTEMBER 2005 COPYRIGHT 2005 COVAST

PAYE Online for Employers EDI. Electronic Data Interchange (EDI) EB2 (PAYE) Information Pack

How to configure VPN function on TP-LINK Routers

How to configure VPN function on TP-LINK Routers

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

Global Data Exchange for Product Data Management based on Standards

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

Encryption of Traffic

Communications Protocol Reference

Possibilities for collaboration with Volkswagen and Audi

Configuring a VPN between a Sidewinder G2 and a NetScreen

EDI Data Exchange and Conversion Range of Functions & Services

Configuration Backup and Restore. Dgw v2.0 May 14,

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Qualified Integrators and Resellers (QIR) Implementation Statement

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

VPN Lesson 2: VPN Implementation. Summary

Virtual Private Network and Remote Access Setup

Cisco QuickVPN Installation Tips for Windows Operating Systems

Configuring Time Zone redirection on a Microsoft Terminal Server

8 Steps for Network Security Protection

SWANcloud. Security Aspects. SSC-Services GmbH Herrenberger Straße Böblingen Deutschland

8 Steps For Network Security Protection

WHMCS LUXCLOUD MODULE

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

HOB WebSecureProxy as an SSL Terminal for Clients

Weidmueller minirouter with two Ethernet ports (IE-ARM-E) Firmware (please use appl-note_router-update-en.pdf for updates)

Virtual Private Network and Remote Access

Web Authentication Application Note

RemotelyAnywhere Getting Started Guide

Configuring and Monitoring Bluecoat AntiVirus

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

Securing your Linksys Wireless Router BEFW11S4 Abstract

optipoint 410/420 S General configuration instructions for VoIP suppliers

Secure XML API Integration Guide. (with FraudGuard add in)

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: Version: 2.2

How To Send An Encrypted In Outlook 2000 (For A Password Protected ) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Saf ) On An Iphone Or

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone

ISG50 Application Note Version 1.0 June, 2011

FREQUENTLY ASKED QUESTIONS

SSL SSL VPN

Controller Management

The English translation Of MBA Standard 0301

Security Awareness. Wireless Network Security

by using the Setup Wizard in CD Disk

FieldIT Limited FieldIT CRM. Installation Manual v1.3.i3 (Enterprise Install)

How To Set up and Configure the WNA-100 Wireless Network Adapter

Netcomm NB604N. Modem Configuration Guide. Netcomm NB604N. Configuring in Layer2 PPPoE for Windows XP and 2000 IMPORTANT MESSAGE

Questionnaire Portal and EDI Usage for Data Exchange

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload For Windows For Macintosh...

EDI Agreement EDI AGREEMENT. Article 1: Object and scope. Article 2: Definitions

Lab Configuring LEAP/EAP using Local RADIUS Authentication

United States Trustee Program s Wireless LAN Security Checklist

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

Penetration Testing - a way for improving our cyber security

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Criteria for web application security check. Version

Online Banking Fraud Prevention Recommendations and Best Practices

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program).

Business ebanking Fraud Prevention Best Practices

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

electronic Initial Sample Inspection Report User manual for suppliers

emerge 50P emerge 5000P

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

ZyXEL ZyWALL P1 firmware V3.64

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

Integrating a Hitachi IP5000 Wireless IP Phone

EMR Link Server Interface Installation

Common Remote Service Platform (crsp) Security Concept

1WLAN CONFIGURATION WITH WEP

ODEX Enterprise. System Setup Guide

SIP Trunking with Elastix. Configuration Guide for Matrix SETU VTEP

Chapter 10. Network Security

SANS Institute First Five Quick Wins

GS1 Trade Sync Connectivity guide

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Server in SATATYA DVR,NVR & HVR

Monitoring DoubleTake Availability

Implementing an SSL security on AppliDis Servers running under Windows 2008 Server R2

Security. TestOut Modules

Password-based encryption in ZIP files

Best Practices Guide to Electronic Banking

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

BackupAgent LabTech Integration Installation and Usage

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

Instructions Microsoft Outlook Express Page 1

Setting up VPN connection: DI-824VUP+ with Windows PPTP client

Automatic Hotspot Logon

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

This document outlines the backend specifications of the CITI Program Single Sign On Portal.

Connecting to the E-Conference (test conference)

Transcription:

1. General information This page has to be filled in for establishing an connection as well as for an connection. Company address (name and address) Contact Data exchange SSID SFID Password Supported OFTP versions ( supports also) OFTP/ system in use parameters 1) Solution indenture number IP address Used port port (default port is: 3305 for, 6619 for ) responsible person parameters 1) IP address Used port (default port is 6619) person responsible parameters 1) Call number Fixed line IP address Comments Our parameters Your parameters 1) Only the communication option where both partners have agreed in advance is to be entered. Specifications in the following table on page 2 are only necessary if is used by both partners. - 1 -

2. Specifications for the encrypted data exchange via This page is to be filled out only if shall be employed. Both partners should specify the transport medium agreed upon in advance. Agreed transport medium Supported by us Please tick where applicable Supported by you Encryption necessary Applied encryption options te: When using, the encryption does only provide for extra security if applied close to applications in place of the DMZ. Supported Cipher Suites Certificate used for encryption Key usage verification Provider: Provider: Automated certificate exchange Data compression EERP signing (only when using ) - 2 -

3. Explanations 3.1 General information The data and parameter sheet serves as documentation of the data and parameters of both partners for establishing an OFTP connection. Therefore, the partners have to clarify in advance, which OFTP version and what kind of transport medium shall be employed. 3.2 Application flow description - assumes the active part for establishing the connection, discussing open questions with the partner, arranging the exchange of the required certificates for the encrypted data transfer and initiating a test data exchange, after the connection has been established. - begins to fill out the sheet und sends it to partner B, who returns it back again to partner A according to his own specifications. Afterwards, the connection is being established, possibly under exchanging certificates between both partners and with confirmation of completion, respectively to each other. te: It might become a common practice, especially for OEMs, that a partner sends a pre-filled sheet as standard to his data exchange partners. 3.3 Further explanatory notes On page 1 (general Information) This page is always to be filled out for both, the installation of and the connection. - The option EERP signing on page 2 means signing the hash of the received file, providing for extra transfer security of the files; however, being relevant only when using. An additional YES or NO flag for the SFID ID requires a signed EERP. On page 2 (specifications for the encrypted data exchange) This page is to be filled out only if both partners want to use. - A transport medium specified by partner A is to be chosen respectively by partner B and to be filled out accordingly. If not possible, partner A and B have to agree upon another transport medium. - As a rule for using, the software can do without encryption and data compression, being operated by the router by default. However, encryption in the software could provide for extra security unless employed at the DMZ (location of the router), but close to application in the internal company network, or if the data transfer shall be signed. - The identical selection of the encryption option isn t mandatory for both partners. In particular, it is possible to make use of different certificate-generating services. Odette International offers especially for the data exchange with the issue of certificates. This ensures a high security for the data exchange partners by examination the authenticity of the certificate applicant by the national car organizations (https://www.odetteca.com). - It is important to rule out data manipulation and misusage when using connections via the, by accurate verification and confirmation of the partner with the implementation of the connection via phone or fax. - The data compression option is part of the data transfer, being operated very efficiently, along with the encryption within the software. Further data compression beyond with zip, tar, etc. will remain unaffected; however, the need is to be taken into consideration. Further detailed information can be obtained from the following documents: VDA: OFTP 2 Secure Data Exchange via the Guideline for the practical application, Version 1.1 (German and English) Odette: Implementation Guidelines (Englisch) - 3 -

Example: Parameter specifications for the data exchange via the 1. General information This page has to be filled in for establishing an connection as well as for an connection. Company address (name and address) Contact Data exchange Odette Parameter SSID SFID Password EERP signing (only when using ) Supported OFTP versions ( supports also) OFTP/ in use Our parameters Automotive Company AG Postfach 999 71057 Stuttgart Germany Hans Maier Phone: +49-711-33 44 55-66 Fax: +49-711-33 44 55-10 Email: hans.maier@automotiv.de O00xx000yyy AUTOzzzzABCD Hugo System A, Version x.y Your parameters Supplier Company SA Rue de la Republique Paris France Paul Belmondo Phone : +33-3-12 34 45 67 Fax +33-3-89 12 34 56 Email: Paul.belmondo@supplier.fr 000aaa000bbb AutoccccEFGH Juliett System B, Version x parameters Solution indenture number IP address Used port port (default port is: 3305 for, 6619 for ) responsible person - - parameters IP address Used port (default port is 6619) responsible person 53.111.222.33 Port 6619 Paul Mueller, phone. +49-711-11-12 Fax +49-711-11-5678 email:paul.mueller@automotiv.com 53.444.555.66 Port 6619 Francis Dupont, phone +33-3- 12 34 46 Email : F.dupont@supplier.fr parameters Call number Fixed line IP address - - Comments Please announce the completion of the connection by fax We support ENGDAT V3-4 -

2. Specifications for the encrypted data exchange via Agreed transport medium Supported by us Please tick where applicable Supported by you Encryption necessary Applied encryption options te: When using, the encryption does only provide for extra security if applied close to applications in place of the DMZ. Supported Cipher Suites Certificate used for encryption Key usage verification 3DES 3DES Provider: Odette Provider: Verysecure Automated certificate exchange Data compression EERP signing (only when using ) - 5 -