Deploying Internet Applications Using HTTP- Enabled Oracle Developer Server. Technical White Paper March 1999

Size: px
Start display at page:

Download "Deploying Internet Applications Using HTTP- Enabled Oracle Developer Server. Technical White Paper March 1999"

Transcription

1 Deploying Internet Applications Using - Enabled Oracle Developer Technical White Paper

2 Deploying Internet Applications Using -Enabled Oracle Developer INTRODUCTION Purpose This document discusses issues related to the secure deployment of Oracle Developer Forms-based applications over the Internet using the -enabled Oracle Developer. This paper describes components, security features, performance issues, and the minimum requirements for using /1.1, firewall technology, and Oracle Developer on the Internet. It also provides a server-side configuration to illustrate the concepts described in this paper. This paper is not intended to compare in depth firewall strategies, security considerations, or other deployment options. You will be referred to other documents at various points within this white paper. Audience This document is intended for anyone who: Requires an understanding of how -enabled Oracle Developer will impact and integrate into their network environment. Will design or deploy Oracle Developer applications for delivery over the Internet. Will manage the network, Web server, or firewall environments related to Oracle Developer. After reading this document, you should have a good understanding of how the Oracle Developer works, the components involved, and how they are integrated. Overview This document consists of two parts. Part 1 describes the protocol and how it has been integrated into the Oracle Developer architecture. Part 2 describes the various components for deploying the -enabled Oracle Developer, and gives a sample server-side configuration. 1

3 The discussion in Part 2 assumes the network environment shown in Figure 1: Private Network Web Browser Oracle JInitiator Firewall/ Proxy The Internet Firewall/ Proxy / Net8 Net8 Demilitarized Zone Web Oracle Developer Private Network Oracle Database Figure 1: Network Environment Assumed in this White Paper PART 1: AND THE ORACLE DEVELOPER SERVER ARCHITECTURE WHY USE? Before the great explosion of interest in the World Wide Web, it was common practice to run utilities or programs on the Internet that would interrogate specified remote computers to locate friends or colleagues and see if they where "logged on." You could then communicate with them in real-time over the network, or connect temporarily to their disk drive to exchange files. The Internet was virtually wide open and trusted with very little security. However, because there are a tremendous number of users, networks, and companies connected to the Internet today, security has become a huge concern. Companies are securing their networks to prevent uncontrolled or unsolicited access to their private networks from the "outside." Firewall Technology Companies have the ability, through firewall technology, to limit the kinds of communication between their private networks and the Internet. A firewall can disable many common services at the packet or port level, allowing in only the types of communications that are absolutely essential to the company's business. Some of the more commonly "allowed" services are SMTP, DNS, FTP, RealAudio, and of course,. For more information, see TCP/IP Network Administration, O Reilly & Associates, Inc. Proxy Software It is also important to keep local host machines "unknown" or "anonymous" when they are connected to the Internet or are providing services to the Internet. The less that people know about your internal network, the less chance you have of being attacked. Proxy software and network address translation is used to keep computers and their real IP addresses private. See Building Internet Firewalls, O Reilly & Associates, Inc. Virtual Private Networks (VPN) Virtual Private Networks are yet another method for enabling privacy over public networks like the Internet. Typically this technology involves (among other things) encrypting all communication that travels over the Internet between two well-defined private networks. A VPN generally involves strict 2

4 firewall and encryption standardization between the involved networks. See Deploying Applications on the Web with Oracle Developer : Intranet, Extranet, Internet, Hubert Bakker, Oracle Corporation. is one of the most widely used protocols for deploying applications on the Internet. Organizations can now 'lock-down" their firewalls and allow only traffic, which greatly enhances the security of their private networks. Most firewall companies support the standard in their products, and many organizations are willing to allow traffic in and out of their private networks. Typically is used as the transport for WWW based communication. It allows us to view HTML pages over the Internet using a Web browser such as Netscape Navigator or Internet Explorer. However, as a generic protocol, can be used for many tasks beyond just browsing the Web. ORACLE DEVELOPER SERVER Oracle Developer includes three application server components: Forms : Used to deploy enterprise-class, Forms business applications on the Internet. Reports : Used to deploy enterprise Reports on the Internet. Graphics : Used to deploy Graphical reports on the Internet. This paper discusses only the Forms component. In addition, for the purposes of the remainder of this paper, the term "Oracle Developer " refers to the "Forms." (See to Part 2 for a more detailed description of the Forms.) The Forms enables organizations to run scaleable, secure, and sophisticated new or existing Oracle Developer applications over the Internet. Many organizations want to expand application deployment beyond the local area network by taking advantage of the Internet. The Forms is a specialized and optimized application server for deploying Forms applications to an Internet-based network (such as the Internet, an extranet, or a corporate intranet). Oracle Developer delivers built-in functionality and out-of-the-box service to ensure that applications scale and perform over any Internet network. The Forms can be used in two modes for deploying applications sockets and. Forms Communication Modes Sockets The Forms component of Oracle Developer was designed like many other Internet-based technologies to use "sockets" for communication. "Sockets" is a standard programming interface to TCP/IP. A simple way to think of sockets is to imagine a numbering system for programs that communicate over the network. Typically these programs have a "client" part and a "server" part. The client and server identify themselves by their socket or port numbers (among other things). Communication between the client and server parts of a program are done over what is called a "socket connection." A common example of using a socket is when specifying an URL that has a non-standard port number (for example, http// The number "9000" is the socket to which the client browser 3

5 will attempt to connect. This example also suggests that there is a server running on that listens for connections on port The "sockets" mode of deployment is efficient and simple to use. The Forms runs on a networked host machine, and it "listens" on a specified socket or port for connections from the Java client running on a user machine. For this method to work, the client and server machines must be able to "see," or communicate with, one another directly on the network. It is not possible to use a server-side proxy in this mode. If the server and the client are separated by an unsecured network, like the Internet, this method has potentially severe security implications. We will discuss server-side proxies and security later in this paper. In this mode, communication is still accomplished through a "socket connection," but it is now an socket connection. In other words, all internal messaging between the Forms and the Java client is now encapsulated in packets. This means that sites that allow only traffic are now able to easily deploy Forms applications through their existing firewall with little or no change to the configuration. The fact that a proxy is used is completely transparent to the client. As far as the client knows, it has a direct connection to the Forms. The Forms "listens" for connections from the Java client rather than for proprietary connections via sockets. Because there is a firewall for security, only traffic is allowed to pass from the Internet to the Forms. Therefore, the "sockets" mode will not work. To make the "sockets" mode work through a firewall, the specific sockets or ports used by the Forms would have to be enabled on the firewall, which pierces the firewall and defeats the purpose of having one. Client requests port 9000 in sockets or mode No Firewall listening on port 9000 in sockets or mode Client requests port 9000 in sockets mode Client requests port 9000 in mode Header Firewall Firewall listening on port 9000 in sockets mode listening on port 9000 in mode Figure 2: Communication Through a Firewall Using Sockets and Modes 4

6 FIREWALLS, PROXIES, AND NETWORKS Many organizations want to take advantage of the massively distributed communication power of the Internet. In order to utilize this public network in a secure way, a good firewall strategy is essential. Proxy servers are generally part of an overall firewall strategy. They are used to proxy user requests for information outside the firewall (client-side proxy), as well as to protect available services that reside inside the firewall (server-side proxy). The -enabled Forms requires that both the clientside and server-side proxies support /1.1. The benefits of /1.1 are discussed in a later section on performance. Depending on your security requirements and how much control you want over who is allowed to access the network, there are numerous firewall strategies to be considered. Please see your firewall vendor's documentation for a more in-depth discussion on how to develop a firewall strategy. Client-Side Proxy A firewall typically exists at both the client's network and server's network. Therefore, a client application such as the Forms 's Java client is required to traverse the local firewall by way of a proxy. Typically, users use a Web browser to surf the Internet, and all of the browsers can be configured to use a local proxy server (see Figure 3). In the case of Forms, the Java client runs in the user's browser, and it knows about the client-side proxy server. All communication between the client browser/applet and the Forms passes through the client-side proxy. In the event that no client-side proxy exists, the client browser/applet talks directly over the Internet to the server-side network's firewall. In any case, the client has no knowledge of a firewall or proxy on the server-side network and thinks it is talking directly to the Forms node behind the firewall. See your browser documentation for help on using proxies. Client browser configured with local proxy Local Proxy The Internet Figure 3: Local Proxy -Side Proxy When deploying the -enabled Forms, you need a proxy between the Oracle Developer node and the Internet client. This proxy takes incoming request from clients wishing to use Forms, and forwards them through the firewall to the Forms node. When the server needs to send data back to the client, it goes through the server-side proxy. This type of proxy is referred to as a "reverse proxy" or "application proxy" and is supported by most popular firewall vendors. The proxy operates as both a server (to the client initiating the connection) and as a client (to the Forms ) on the client's behalf. If the client is given a virtual IP address or URL to connect to the Forms node, the connection is non-transparent. 5

7 -side Proxy Client browser (1) ( (4) ( (2) ( (3) ( Developer a.client.com a.proxy.com and a.apps.com (virtual) a.private.com Figure 4: Non-Transparent Client Request The firewall can also accept connections to the Forms using the Developer node's actual IP address. This is a transparent connection where the Forms 's actual IP address can be seen through the firewall. -side Proxy Client browser (1) ( (4) ( (2) ( (3) ( Developer a.client.com a.proxy.com a.apps.com Figure 5: Transparent Client Request Demilitarized Zone (DMZ) A DMZ is part of an overall firewall design that creates a middle network between the Internet and the corporate or private network. This middle or intermediary network is where you place services that you want available to the Internet, but that you do not want on your internal network. The multi-tiered nature of Oracle Developer is ideally suited to work with a DMZ. It is called a DMZ because it can be sacrificed if the DMZ is compromised in any way by an intruder. Even though the DMZ is a secure network, it is best to keep as little proprietary information there as possible. The Forms uses /1.1 to communicate from the DMZ (through the firewall) to the Internet. It uses Net8 from the DMZ back to the Oracle database on the private network (see Figure 1). In this scenario, Oracle Developer applications are on the DMZ, but the propriety data is in the database on the private network. Depending on the types of services provided on the DMZ and the level of security you require, the firewall can be configured to allow ONLY Net8 traffic from the DMZ to the private network. This fortifies the security to your private network if the DMZ is compromised. 6

8 Extranet As we apply more security techniques like digital certificates, access control, and VPN technology to our networks, we require a much higher level of cooperation and participation between the client networks and the server network. An extranet is essentially two or more well-described intranets that can communicate in a cooperative and secure way over the Internet. In an extranet deployment, the Forms can work in either sockets or mode, depending on the level of security through the firewall. The mode is a more generic approach to deploying applications over the Internet. It allows the widest possible audience. Therefore, the decision as to which mode to use for an extranet becomes more of a policy and performance decision. PERFORMANCE /1.1 has a number of enhanced performance features over /1.0, namely "persistent connections" and "caching." Oracle Developer attempts to take full advantage of these enhancements. Persistent Connections Historically, is a connectionless protocol, meaning that the server must build the request, service it, and then tear down the connection (for each and every request). By using "pipelining requests" or buffering multiple messages, /1.1 allows a persistent connection between the Forms and the client applet. This significantly improves network performance and reliability by reducing the number of TCP connects and disconnects. A significant difference between /1.1 and earlier versions of is that persistent connections are the default behavior of any connection (rather than an option). Unless otherwise indicated, the client and server attempt to maintain a persistent connection. Because it is not always possible to maintain a persistent connection due to latency, hardware failure, or proxy server time-out, the Forms has the ability to re-establish dropped connections in a way that is transparent to the user. Caching The latest JDK supports the ability to cache downloaded JAR files and re-use them, rather than having to download them over the network each time they are needed. Each time a cached JAR file is used, its time stamp is checked against the server's JAR file. If the server's version is more current, then the newer version is downloaded. Note that client-side cached JAR file names are based on a hash of the server URL and the server-side JAR file name. So, if you are running multiple servers for the same application, JAR files are cached for each server the first time you connect. Firewalls Check firewall documentation for performance issues and techniques related to. For example, most firewall software allows you to disable certain security features, essentially bypassing the normal proxy security checks in order to increase performance. The price for this performance is, of course, security. Security and performance considerations may be quite different depending on the type of network and security policy in place. 7

9 SCALABILITY Oracle Developer is an extremely robust, high-performance Internet deployment platform. (See the white papers Oracle Developer Scalability Testing and Oracle Developer : How to Tune for the Deployment of Internet Applications for details.) In addition, you can add Oracle Developer nodes to the middle tier, as needed, to support your user community. Latency, network bandwidth, and proxy servers (server-side and client-side) also play a role in how scaleable your application environment can be. The issue of scalability becomes a holistic approach to managing Internet, firewall, proxy, application, and database resources. SECURITY The Oracle Developer applet has been digitally signed using DSA (Digital Signature Algorithm). Please refer to the Oracle Developer documentation for information on configuring the Oracle Developer client. The low-level proprietary communication and data being sent between the Forms and the applet is encrypted using industry standard, 40-bit RSA encryption and decryption. There are many techniques for increased security over the Internet, from filtering, access control, authentication, digital certificates, and signatures, to full-scale VPNs. Please read your firewall vendor's documentation to help develop a security strategy that meets your needs. MINIMUM SYSTEM REQUIREMENTS Deploying -enabled Oracle Developer requires a thorough understanding of site security policies, network topologies as they relate to the Internet, and software and hardware systems (such as firewalls, routers, browsers, Internet Service Providers, and so on). Please see the product documentation for specific minimum requirements. Here is a list of basic requirements: Client Properly configured browser (Netscape or Internet Explorer) that is able to access the Internet. /1.1-compliant client-side firewall/proxy to support persistent connections, if used. Minimal network congestion and latency on the client network. -Side /1.1-compliant application proxy to support persistent connections. IP redirect or virtual host support to maintain anonymous middle-tier server nodes behind the firewall. Security policy. Minimal network congestion and latency on the server network. 8

10 Performance A minimal amount of latency between the Forms and the Java client is required to maintain consistent and reliable performance. The actual acceptable percentage of latency is difficult to determine and is really a moving target due to constant innovation. Due to the unpredictable nature of the Internet, it is important to develop techniques for troubleshooting the network in the event of performance degradation. Keep in mind that a poorly maintained network will have a degenerative impact on the network computing architecture and will result in poor user response time as well as intermittent disconnects between the Forms and the Java client. PART 2: CONFIGURATION ORACLE DEVELOPER SERVER COMPONENTS This section contains descriptions of the components related to the Forms and how to configure them. As mentioned in the overview, the network design shown in Figure 1 is assumed for the sake of discussion. The Forms and the Web server reside in a DMZ. An /1.1-compliant firewall/proxy connects the DMZ to the Internet and acts as a secure router from the DMZ to the corporate intranet. The Oracle database runs on the private corporate intranet. The Java client connects from a remote intranet that is connected to the Internet by an /1.1-compliant firewall/proxy. Oracle JInitiator Oracle JInitiator enables users to run Oracle Developer applications using Netscape Navigator or Internet Explorer. Oracle JInitiator allows you to specify the use of a specific Java Virtual Machine (JVM) on Web clients, rather than relying on the browser's default JVM. It is implemented as a plug-in for Netscape Navigator or as an ActiveX component for Microsoft Internet Explorer. Oracle JInitiator is automatically downloaded to a client's machine the first time a client's browser encounters an HTML file that specifies the use of Oracle JInitiator. Web A Web server is needed to enable the client browser to access the initial HTML file that specifies: The use of Oracle JInitiator. Where to find the -enabled Java client. What port the Oracle Developer Forms Listener is running on. Other runtime parameters passed to the Java client. -Enabled Java Client This is the client-side Java code (downloaded at runtime, except for cached JAR files) that communicates with the Forms processes using as the transport. The code runs in the client's Web browser with the JInitiator plug-in. Forms Listener 9

11 The Forms Listener running in mode listens for connections from the -enabled Java client. It listens on a port specified when the Forms Listener process is started. Once a request is made by the Java client, the Forms Listener spawns a Forms Runtime process to maintain the connection with the Java client. The server creates a session ID that is used in all subsequent communication between the server and the client. The session ID is used to reconnect the server and client should the persistent connection be broken. Note that if multiple Forms Listeners are deployed on one physical computer (for example, to support multiple languages), each Forms Listener will listen on its own specified port number (such as 9000, 9001, 9002). Forms Runtime The Forms Runtime is a process spawned by the Forms Listener to maintain a connection to a Java client. Every header passed between the runtime and the client contains the session ID created by the Forms Listener when the connection was first established. This ID helps maintain state between runtime and client even if persistence is lost. JAR (Java ARchive) files JAR stands for Java ARchive. It is a file format based on the popular ZIP file format. JAR is used for aggregating many files into one. Although JAR can be used as a general archiving tool, the primary motivation for its development was so that Java clients and their requisite components (class files, images, and sounds) could be downloaded to a browser in a single transaction, rather than opening a new connection for each file. Downloading a single file greatly improves the speed at which an applet can be loaded onto a Web page. The JAR format supports compression, which reduces the size of the file and improves the download time still further. Additionally, individual entries in a JAR file may be digitally signed by the applet author to authenticate their origin. -Side Firewall As described earlier in this paper, the server-side firewall needs to be /1.1-compliant in order to promote persistent, connection-oriented communication between the Forms and the Java client. Be sure the firewall supports transparency and service redirection (non-transparency) to allow proxy access to the Forms behind the firewall. 10

12 The following figure should help you visualize where and how the components need to be integrated: client-side firewall/proxy server-side firewall/proxy Web Browser Oracle JInitiator Oracle Java Client (downloaded at runtime ) Cached JAR files The Internet Net8 Net8 HTML HTML HTML Oracle Database Web (Java Client,JAR files ) Oracle Forms Listener Oracle Forms Runtime Figure 6: Oracle Developer Component Distribution SAMPLE SERVER-SIDE CONFIGURATION In this example, assume the following, as illustrated in Figure 7: The Forms and Web server are deployed from the DMZ. The firewall is configured to accept requests from the Internet for the Forms and the Web server via a virtual IP address. For this example, the Forms and Web server virtual IP address is The client sees only the virtual IP address ( ) when it connects to the Forms. Connections from the Forms back to the client contain the virtual IP as the source address. The database resides on the private intranet. The firewall is configured to allow only Net8 traffic between the DMZ and the intranet. (The firewall will not allow any traffic whatsoever from the Internet to the intranet.) The firewall is acting not only as the firewall, but also as the router/gateway between the three networks ( , and ). Note: To simplify examples, IP addresses are used, rather than host names. 11

13 The Internet Database (SID=apps) ( ) virtual IP: Firewall/Proxy Web (port 80) Developer (port 9000) ( ) Intranet DMZ Figure 7: Network Configuration Used in this Example Client Browser The client uses the following URL to launch the application: Web The Web server is configured to run on the same machine as the Forms ( ). We will use the same virtual IP address to access the Web server ( ). Location of Web server DMZ ( ) Physical host IP address Virtual host IP address Listener port 80 Startup HTML path Oracle JInitiator download path /startup/startup.html /download/jinit11521.exe Forms When we start the Forms, we want to tell it which mode to run in (sockets or ) and which port to listen to (9000,9001, and so on). Location of Forms DMZ ( ) Physical host IP address Virtual host IP address Listener port 9000 Mode 12

14 Here is the command for starting the Forms in our example: ifsrv60 -listen port=9000 mode= Check the documentation for platform-specific command syntax. Oracle Database Location of database server Intranet ( ) Physical host IP address SID apps Startup.html The first thing you need to do in the startup.html file is tell the client browser to use the JInitiator enhancement. The mechanism for doing this is different for Netscape and Internet Explorer. For Netscape, use the <EMBED> tag with the following parameters: <EMBED type="application/x-jinit-applet;version= " pluginspage = " For Internet Explorer, use the <OBJECT> tag with the following parameters: > <OBJECT classid="clsid:9f77a997-f0f3-11d c04fc990dc" codebase=" <PARAM NAME="type" VALUE="application/x-jinit-applet;version= "> Next, tell the browser to download the applet, JAR files, and parameters that will be used by the running applet when it connects to the Forms. For Netscape: <EMBED type="application/x-jinit-applet;version= " pluginspage = " For the "" implementation of the Forms, specify "oracle.forms.engine.main" rather than "oracle.forms.engine.main" for the java_code parameter. java_code = "oracle.forms.engine.main" java_archive = "JAR files (e.g. oracles.jar)" 13

15 The proxyhost and proxyport parameters are designed to tell the client which local proxy host and port to use. Most browsers have the local client-side proxy configured, and unless you have a reason to specify an alternative client-side proxy, it is recommended that you disable these parameters by setting the proxyhost and proxyport to the serverhost and serverport respectively. Please be aware that this is the functionality at the time of writing this paper. Check the release notes for the latest information. ProxyHost = " " proxyport = "9000" serverhost = serverport = "9000" Next, you make the call from the DMZ to the intranet. Here you are attempting to log into the apps database via Net8. The firewall will accept routes from the DMZ to the intranet. serverapp = "default" serverargs = "module=fndscsgn userid=applsyspub/pub@apps FNDNAM=apps"> </EMBED> For Internet Explorer: <OBJECT classid="clsid:9f77a997-f0f3-11d c04fc990dc" codebase=" > <PARAM NAME="type" VALUE="application/x-jinit-applet;version= "> <PARAM NAME = CODE VALUE = "oracle.forms.engine.main" > <PARAM NAME = ARCHIVE VALUE = "JAR files (e.g. oracles.jar, appss.jar)" > <PARAM NAME = "proxyhost" VALUE =" "> <PARAM NAME = "proxyport" VALUE ="9000"> <PARAM NAME = "serverhost" VALUE =" "> <PARAM NAME = "serverport" VALUE ="9000"> <PARAM NAME = "serverapp" VALUE ="default"> <PARAM NAME = "separateframe" VALUE ="TRUE"> <PARAM NAME = "serverargs" VALUE ="module=fndscsgn userid=applsyspub/pub@apps FNDNAM=apps"> </OBJECT> 14

16 REFERENCES 1) TCP/IP Network Administration, O Reilly & Associates, Inc. 2) Deploying Applications on the Web with Oracle Developer : Intranet, Extranet, Internet, Hubert Bakker, Oracle Corporation 3) Building Internet Firewalls, O Reilly & Associates, Inc. 4) Oracle Developer Scalability Testing, Barry Hiern, Oracle Corporation 5) Oracle Developer : How to Tune for the Deployment of Internet Applications, Nigel Ferris, Oracle Corporation 15

17 Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA U.S.A. Worldwide Inquiries: Fax Deploying Internet Applications Using -Enabled Oracle Developer, Technical White Paper Copyright Oracle Corporation 1999 All Rights Reserved This document is provided for informational purposes only, and the information herein is subject to change without notice. Please report any errors herein to Oracle Corporation. Oracle Corporation does not provide any warranties covering and specifically disclaims any liability in connection with this document. Oracle is a registered trademark. All other company and product names mentioned are used for identification purposes only and may be trademarks of their respective owners. 16

Oracle Reports 6.0 New Features. Technical White Paper November 1998

Oracle Reports 6.0 New Features. Technical White Paper November 1998 Oracle Reports 6.0 New Features Technical White Paper Oracle Reports 6.0 New Features PRODUCT SUMMARY In today's fast-moving, competitive business world up to date information is needed for the accurate,

More information

X100 ARCHITECTURE REFERENCES:

X100 ARCHITECTURE REFERENCES: UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion

More information

Oracle Forms Developer Release 6i Patch 2

Oracle Forms Developer Release 6i Patch 2 Oracle Forms Developer Release 6i Patch 2 Deploying Forms Applications to the Web with the Oracle Internet Application Server for Windows and UNIX October 2000 Part No. A86202-01 This book contains the

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Oracle Hospitality Cruise Fine Dining System Security Guide Release E

Oracle Hospitality Cruise Fine Dining System Security Guide Release E Oracle Hospitality Cruise Fine Dining System Security Guide Release 9.0.2.29 E99054-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE

A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE Table of Contents 1. Introduction... 2 2 Deployment Prerequisites... 2 3 Oracle E-Business Topology... 3 4 Accessing the Thunder ADC Application

More information

Oracle Event Processing Extreme Performance on Sparc T5

Oracle Event Processing Extreme Performance on Sparc T5 Oracle Event Processing Extreme Performance on Sparc T5 An Oracle Event Processing (OEP) Whitepaper ORACLE WHITE PAPER AUGUST 2014 Table of Contents Introduction 2 OEP Architecture 2 Server Architecture

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

Configuring F5 for SSL Intercept

Configuring F5 for SSL Intercept Configuring F5 for Welcome to the F5 deployment guide for configuring the BIG-IP system for SSL intercept (formerly called with Air Gap Egress Inspection). This document contains guidance on configuring

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

Web Serving Architectures

Web Serving Architectures Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic.

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic. White Paper February 2005 McAfee Network Protection Solutions Encrypted Threat Protection Network IPS for SSL Encrypted Traffic Network IPS for SSL Encrypted Traffic 2 Introduction SSL Encryption Overview

More information

Managing Oracle9iAS Forms Services Using Oracle Enterprise Manager. An Oracle White Paper April 2002

Managing Oracle9iAS Forms Services Using Oracle Enterprise Manager. An Oracle White Paper April 2002 Managing Oracle9iAS Forms Services Using Oracle Enterprise Manager An Oracle White Paper April 2002 Managing Oracle9iAS Forms Services Using Oracle Enterprise Manager ABOUT THIS PAPER...3 THE ENTERPRISE

More information

Deploy VPN IPSec Tunnels on Oracle Cloud Infrastructure. White Paper September 2017 Version 1.0

Deploy VPN IPSec Tunnels on Oracle Cloud Infrastructure. White Paper September 2017 Version 1.0 Deploy VPN IPSec Tunnels on Oracle Cloud Infrastructure White Paper September 2017 Version 1.0 Disclaimer The following is intended to outline our general product direction. It is intended for information

More information

Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0

Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0 Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0 High Availability for Windows NT An Oracle Technical White Paper Robert Cheng Oracle New England Development Center System Products

More information

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017 Oracle Hospitality Cruise AffairWhere Security Guide Release 2.2.5 E85968-01 April 2017 Copyright 2006, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

TechNote AltitudeCDN OmniCache Integration with Microsoft Teams Live Events

TechNote AltitudeCDN OmniCache Integration with Microsoft Teams Live Events TechNote AltitudeCDN OmniCache Integration with Microsoft Teams Live Events Version 1.0 AltitudeCDN TM OmniCache is a robust proxy cache that enables the efficient delivery of HTTP Live Streaming (HLS)

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc.

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc. Getting Started Citrix Secure Gateway Version 1.0 Citrix Systems, Inc. Copyright and Trademark Notice Information in this document is subject to change without notice. Companies, names, and data used in

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Remote Desktop Services. Deployment Guide

Remote Desktop Services. Deployment Guide Deployment Guide UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

Syncplicity Panorama with Isilon Storage. Technote

Syncplicity Panorama with Isilon Storage. Technote Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

Application Firewalls

Application Firewalls Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed

More information

the Corba/Java Firewall

the Corba/Java Firewall Firewall Security for Corba and J2EE/EJB with the IIOP Domain Boundary Controller Corba and Java-RMI based applications can be directly and securely made accessible to users outside the internal network,

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002 Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network

More information

CYAN SECURE WEB Installing on Windows

CYAN SECURE WEB Installing on Windows CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content

More information

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002 Managing Oracle Real Application Clusters An Oracle White Paper January 2002 Managing Oracle Real Application Clusters Overview...3 Installation and Configuration...3 Oracle Software Installation on a

More information

Oracle Insurance Rules Palette

Oracle Insurance Rules Palette Oracle Insurance Rules Palette Security Guide Version 10.2.0.0 Document Part Number: E62439-01 August, 2015 Copyright 2009, 2015, Oracle and/or its affiliates. All rights reserved. Trademark Notice Oracle

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12 Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access

More information

Network Integration Guide Planning

Network Integration Guide Planning Title page Nortel Application Gateway 2000 Nortel Application Gateway Release 6.3 Network Integration Guide Planning Document Number: NN42360-200 Document Release: Standard 04.01 Date: October 2008 Year

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

An Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach

An Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach An Oracle White Paper November 2012 Primavera Unifier Integration Overview: A Web Services Integration Approach Introduction Oracle s Primavera Unifier offers an extensible interface platform based on

More information

Bastion Hosts. Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y

Bastion Hosts. Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y Bastion Hosts Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Disclaimer The following is intended to outline our general product direction. It is intended

More information

Active Directory in Networks Segmented by Firewalls

Active Directory in Networks Segmented by Firewalls Active Directory in Networks Segmented by Firewalls Microsoft Corporation Published: July 2002 Updated: October 2004 Abstract Microsoft Active Directory service domain controllers are increasingly being

More information

The DNS. Application Proxies. Circuit Gateways. Personal and Distributed Firewalls The Problems with Firewalls

The DNS. Application Proxies. Circuit Gateways. Personal and Distributed Firewalls The Problems with Firewalls Network Security - ISA 656 Application Angelos Stavrou August 20, 2008 Application Distributed Why move up the stack? Apart from the limitations of packet filters discussed last time, firewalls are inherently

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

13. Databases on the Web

13. Databases on the Web 13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface

More information

April Understanding Federated Single Sign-On (SSO) Process

April Understanding Federated Single Sign-On (SSO) Process April 2013 Understanding Federated Single Sign-On (SSO) Process Understanding Federated Single Sign-On Process (SSO) Disclaimer The following is intended to outline our general product direction. It is

More information

Oracle Business Intelligence Discoverer

Oracle Business Intelligence Discoverer Oracle Business Intelligence Discoverer Configuration Guide 10g Release 2 (10.1.2.0.0) Part No. B13918-01 September 2004 Oracle Business Intelligence Discoverer Configuration Guide, 10g Release 2 (10.1.2.0.0)

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client. Introduction: Intended Audience The StrideLinx Remote Access Solution is designed to offer safe and secure remote access to industrial equipment worldwide for efficient remote troubleshooting, programming

More information

An Oracle White Paper September Security and the Oracle Database Cloud Service

An Oracle White Paper September Security and the Oracle Database Cloud Service An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Oracle Hospitality Inventory Management Security Guide Release 9.1 E

Oracle Hospitality Inventory Management Security Guide Release 9.1 E Oracle Hospitality Inventory Management Security Guide Release 9.1 E97550-01 June 2018 Copyright 2001, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are

More information

Oracle Clusterware 18c Technical Overview O R A C L E W H I T E P A P E R F E B R U A R Y

Oracle Clusterware 18c Technical Overview O R A C L E W H I T E P A P E R F E B R U A R Y Oracle Clusterware 18c Technical Overview O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Table of Contents Introduction 1 Cluster Domains 3 Conversions 3 Oracle ACFS Remote Service 5 Single Network

More information

Adding Mobile Capability to an Enterprise Application With Oracle Database Lite. An Oracle White Paper June 2007

Adding Mobile Capability to an Enterprise Application With Oracle Database Lite. An Oracle White Paper June 2007 Adding Mobile Capability to an Enterprise Application With Oracle Database Lite An Oracle White Paper June 2007 Adding Mobile Capability to an Enterprise Application With Oracle Database Lite Table of

More information

Remote Desktop Services Deployment Guide

Remote Desktop Services Deployment Guide Deployment Guide VERSION: 10.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

An Oracle Technical White Paper September Oracle VM Templates for PeopleSoft

An Oracle Technical White Paper September Oracle VM Templates for PeopleSoft An Oracle Technical White Paper September 2010 Oracle VM Templates for PeopleSoft 1 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes

More information

Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked

Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Secure Communications Stay-Linked Secure Communications Guide Page 1 Rev. 10.0.0 Dated: 04/26/10 Table

More information

An Oracle White Paper. Released April 2013

An Oracle White Paper. Released April 2013 Performance and Scalability Benchmark: Siebel CRM Release 8.1.1.4 Industry Applications and Oracle 11.2.0.3 Database on Oracle's SPARC T5 Servers and Oracle Solaris An Oracle White Paper Released April

More information

Firepower Threat Defense Site-to-site VPNs

Firepower Threat Defense Site-to-site VPNs About, on page 1 Managing, on page 3 Configuring, on page 3 Monitoring Firepower Threat Defense VPNs, on page 11 About Firepower Threat Defense site-to-site VPN supports the following features: Both IPsec

More information

Oracle Database Vault

Oracle Database Vault Oracle Database Vault Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Executive Overview 2 Installation 3 Pre-Installation Notes 3 Separation of Duty 3 Separation of Duty Matrix 4 Oracle Database

More information

Oracle Application Server 10g (9.0.4): Manually Managed Cluster. An Oracle White Paper June 2004

Oracle Application Server 10g (9.0.4): Manually Managed Cluster. An Oracle White Paper June 2004 Oracle Application Server 10g (9.0.4): Manually Managed Cluster An Oracle White Paper June 2004 Oracle Application Server 10g (9.0.4): Manually Managed Cluster Introduction to Oracle Application Server

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

Cisco Expressway with Jabber Guest

Cisco Expressway with Jabber Guest Cisco Expressway with Jabber Guest Deployment Guide First Published: Decemeber 2016 Cisco Expressway X8.9 Cisco Jabber Guest Server 10.6.9 (or later) Cisco Systems, Inc. www.cisco.com Contents Preface

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

TN3270 AND TN5250 INTERNET STANDARDS

TN3270 AND TN5250 INTERNET STANDARDS 51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

OCUG Prague 2004 A&CM Focus Group: OPA 4.5 https/ssl Configuration. Implementing https/ssl with the. Applications 4.5. Consulting.

OCUG Prague 2004 A&CM Focus Group: OPA 4.5 https/ssl Configuration. Implementing https/ssl with the. Applications 4.5. Consulting. Implementing https/ssl with the Oracle Pharmaceutical Applications 4.5 Presented by Sunil ilg. Singh of fdbms Consulting. Acknowledgements Thanks to the OCUG and Administration and Configuration Management

More information

Deployment Guide AX Series with Oracle E-Business Suite 12

Deployment Guide AX Series with Oracle E-Business Suite 12 Deployment Guide AX Series with Oracle E-Business Suite 12 DG_OEBS_032013.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Prerequisites... 4 3 Oracle E-Business Topology... 5 4 Accessing the AX Series

More information

Developer Marketing: Build a Web Server Using Microsoft IIS 4.0 CBT Skill Builder Courseware

Developer Marketing: Build a Web Server Using Microsoft IIS 4.0 CBT Skill Builder Courseware Software Announcement April 10, 2001 Developer Marketing: Build a Web Server Using Microsoft IIS 4.0 CBT Skill Builder Courseware Overview Build your skills for Microsoft Certified Systems Engineer (MCSE)

More information

Indicate whether the statement is true or false.

Indicate whether the statement is true or false. Indicate whether the statement is true or false. 1. Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall s database or violations of those rules. 2.

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

GoToMyPC Corporate Product Guide

GoToMyPC Corporate Product Guide GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center

More information

Extreme Performance Platform for Real-Time Streaming Analytics

Extreme Performance Platform for Real-Time Streaming Analytics Extreme Performance Platform for Real-Time Streaming Analytics Achieve Massive Scalability on SPARC T7 with Oracle Stream Analytics O R A C L E W H I T E P A P E R A P R I L 2 0 1 6 Disclaimer The following

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

Configuring OpenVPN on pfsense

Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Posted by Glenn on Dec 29, 2013 in Networking 0 comments In this article I will go through the configuration of OpenVPN on the pfsense platform.

More information

Oracle Database Vault

Oracle Database Vault An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command

More information

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle s BEA WebLogic Version 1.0 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s BEA WebLogic Prerequisites and

More information

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

PULSE CONNECT SECURE APPCONNECT

PULSE CONNECT SECURE APPCONNECT PULSE CONNECT SECURE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Product Release 8.1 Document Revision 1.0 Published:

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks WJ Buchanan. ASMN (1) Advanced Security and Mobile Networks Unit 1: Network Security Application Presentation Session Transport Network Data Link Physical OSI Application Transport Internet Internet model

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2008

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2008 Rapid Bottleneck Identification A Better Way to do Load Testing An Oracle White Paper June 2008 Rapid Bottleneck Identification A Better Way to do Load Testing. RBI combines a comprehensive understanding

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

AccuTerm 7 Internet Edition Connection Designer Help. Copyright Schellenbach & Assoc., Inc.

AccuTerm 7 Internet Edition Connection Designer Help. Copyright Schellenbach & Assoc., Inc. AccuTerm 7 Internet Edition Connection Designer Help Contents 3 Table of Contents Foreword 0 Part I AccuTerm 7 Internet Edition 6 1 Description... 6 2 Connection... Designer 6 3 Internet... Client 6 4

More information