Network Integration Guide Planning

Size: px
Start display at page:

Download "Network Integration Guide Planning"

Transcription

1 Title page Nortel Application Gateway 2000 Nortel Application Gateway Release 6.3 Network Integration Guide Planning Document Number: NN Document Release: Standard Date: October 2008 Year Publish FCC TM Copyright Nortel Networks. All Rights Reserved. Sourced in Canada LEGAL NOTICE While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, the Nortel logo, the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks. All other trademarks are the property of their respective owners.

2

3 Contents Audience v Organization v Conventions vi Related Documentation vi CHAPTER 1 Overview 1 Voice Office 1 Security 2 Deployment Planning 2 Network Impacts 3 CHAPTER 2 Security Planning 5 Application Gateway Security Overview 5 General Security Issues 7 Application Gateway Security Solutions 9 Authentication 9 Secure Socket Layer 10 Cookies and Secure Cookies 11 Other Security Features 11 CHAPTER 3 Deployment Planning 13 Overview 13 The Application Gateway Pre-Installation Checklist 14 Considerations for Integrating the Application Gateway into an IP Phone Enterprise 14 Location of Call Servers, IP Phones, and LDAP Servers 15 Location of Web/Intranet Content 15 Administration and Redundancy Requirements 15 Relative Performance of Network Segments 16 Quality of Service (QoS) 16 Sample Configurations 17 iii

4 Contents Application Gateway Location Relative to a Firewall or Router 17 Application Gateway Operation with a Router 18 CHAPTER 4 Network Impacts 19 I NDEX iv

5 Preface This preface describes who should read the Application Gateway Network Integration Guide, how it is organized, and its document conventions. Audience This installation guide is intended for IT professionals and other individuals responsible for determining how the Application Gateway is to integrate into a network. Organization This guide is organized as follows: Chapter Title Description Chapter 1 Overview Provides an executive summary of this guide. Chapter 2 Security Planning Provides a starting point for security planning and contains a general discussion of security issues. Chapter 3 Deployment Planning Discusses issues to consider when planning how to integrate the Application Gateway into your network and contains sample configurations. Chapter 4 Network Impacts Provides a summary of how Application Gateway operation impacts a network. v

6 Conventions This guide uses the following conventions: Convention boldface font boldface screen font Description Commands and HTML element names are in boldface. Information you must enter is in boldface screen font. Notes use the following conventions: Note Means reader take note. Notes contain helpful suggestions or other important information. Tips use the following conventions: Tip Means the following information will help you solve a problem. The tips information might not be troubleshooting or even an action, but could be useful information. Cautions use the following conventions: Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. Related Documentation For additional information about the Application Gateway, refer to these guides: Application Gateway Hardware Installation Guide Application Gateway Administration Guide vi

7 Chapter 1 Overview This document discusses issues to consider when planning how the Application Gateway will integrate into your network. Topics covered include the basic functions and operation of the Application Gateway, with emphasis on security and the interactions between the Application Gateway and your network. This chapter provides an executive summary of network integration considerations. The Nortel Application Gateway delivers business applications to the screens and speakers of Internet-enabled IP telephones. Voice Office Voice Office is a suite of packaged telephony applications that requires no development work. The Voice Office Application Suite enables enterprises to further leverage their IP telephony investments and increase workforce productivity by delivering converged applications to the screens and speakers of IP phones. Voice Office applications include: Express Directory provides an LDAP-based, organization-wide directory with high-speed, real-time pruning. This new directory user interface reduces the time to look-up and dial in by 75% compared to current solutions. Zone Paging enables authorized users to page to groups of IP telephones in specific zones without the expense of installing an overhead paging system Broadcast Server delivers priority messages such as emergency, IT, and weather alerts in the form of text, graphics and audio alerts to IP telephones. 1

8 Chapter 1 Security Overview Security The Application Gateway is a transparent network appliance that implements and supports industry-standard security techniques. The Application Gateway sits behind a corporate firewall and is resistant to invasion. It has been tested to ensure that it has no high- or medium-risk security vulnerabilities, and no UNIX, Web server, URL, or port vulnerabilities. The Application Gateway fully complies with the security protocols used by IP telephones. For example, if your IP telephones support secure communications, the Application Gateway connection with the telephones will be secure. The Application Gateway uses only published interfaces to IP telephones and systems. For a more in-depth discussion of Application Gateway security, see Chapter 2, Security Planning. Deployment Planning The Application Gateway installs into any network infrastructure without requiring changes to the existing hardware or back-end software. The Application Gateway sits in front of content servers and works with other networking products such as cache engines, web servers, firewalls, and routers. 2

9 Chapter 1 Overview Network Impacts The Application Gateway is designed for flexible network deployment. The location of an Application Gateway in a network is largely based on the configuration of the existing network. Regardless of the network deployment chosen, the only requirements that must be met to ensure correct operation are as follows: The client devices (IP telephones) must be able to contact the Application Gateway on the network. The Application Gateway must be able to contact the servers that have the requested content. Content may be generated by servers on the local network and the Web. For a more information about Application Gateway deployment planning, see Chapter 3, Deployment Planning. Network Impacts Sending a page or broadcasting a message through the Voice Office applications occupies audio bandwidth at a rate of 85.6 Kilobits per second. For more information on Application Gateway network impacts, see Chapter 4, Network Impacts. 3

10 Chapter 1 Overview Network Impacts 4

11 Chapter 2 Security Planning Security is a major issue in conducting any business. This chapter provides an overview of Application Gateway security. This chapter is not intended to be a comprehensive guide to planning a security strategy, as these issues will vary by organization. However, this chapter provides a starting point for security planning and outlines how the Application Gateway is capable of addressing a wide range of business and enterprise policy requirements. The following topics describe Application Gateway security: Application Gateway Security Overview, page 5 General Security Issues, page 7 Application Gateway Security Solutions, page 9 Application Gateway Security Overview The Application Gateway is a transparent network appliance. It leverages existing security infrastructure to provide seamless, end-to-end, secure communication between devices and enterprise application servers. The Application Gateway sits behind a corporate firewall, uses standard security mechanisms, and is resistant to invasion. Many devices, including IP telephones, lack security and encryption features. The Application Gateway, when used with secure web and application servers, can reduce the potential security issues associated with using such equipment. Because IP phones themselves do not have security policies, communication between the Application Gateway and IP phones is over an insecure channel. However, the Application Gateway can be deployed behind a firewall to provide a secure gateway to protect IP telephone connections beyond the firewall. The Application Gateway uses standard protocols for IP phone requests and responses. 5

12 Chapter 2 Security Planning Application Gateway Security Overview The Application Gateway is a hardened application server and can be installed in any network with confidence that it introduces no additional security risks or liabilities. The Application Gateway has the following characteristics: It is not possible to determine what operating system is running on the Application Gateway. Is not general purpose. Only the processes that are running are externally visible. Unnecessary services (such as login and listener services) and unnecessary modules are removed from the Application Gateway operating system. All services interfaces are closed, providing nothing that a worm or virus could attack. As a result, the Application Gateway is not vulnerable to worms and viruses that are compiled for traditional operating systems and is fully protected against worms, viruses, and other Internet attacks. In this respect, the Application Gateway appliance is more like a closed router rather than a server. Cannot be logged into. You cannot log into the operating system, only the server software, if authenticated. Has few open ports and those ports send packets directly to Application Gateway processes. Uses only published interfaces to IP telephones and systems. Port requirements are detailed in the Pre-Installation Checklist. Can be fully configured only over an SSL channel that requires authentication. Minimal configuration is available through a serial port. Installation requires physical access to the device. Has cryptographically secure licensing. Supports 196-bit TLS SSL encryption, as well as lower and higher bit values defined in your certificate. You might prefer to lower the encryption if performance is more important than security. Provides SSL sessions, with support for HTTPS, IMAPS, POPS, and SSMTP. SSL support enables deployment of the Application Gatewaybehind a firewall in order to provide a secure gateway to protect IP telephone connections beyond the firewall. The Application Gateway relies on a customer-provided firewall for protection from Denial of Service (DoS) attacks. 6

13 Chapter 2 Security Planning General Security Issues Supports digital certificates in Privacy Enhanced Mail (PEM) format that include a private key. You should install on the Application Gateway a digital X.509 certificate that belongs to your company. This will ensure that all SSL transactions will pass with no error warnings to device users. For IP phone applications which require user authentication for use, the Application Gateway uses the authentication mechanism of the phone system. The Application Gateway passes authentication requests to the configured authentication server and returns authentication replies to the requesting IP phone. The Application Gateway does not manage or retain user credentials. Can be configured to allow only previously identified application data or specified URLs to pass through it, or to prevent any access to the Internet. Implements a unique and superior cookie management technique that ensures that cookies never leave the Application Gateway and are always maintained within the enterprise firewall. The Application Gateway provides virtual cookies for devices that do not natively support cookies. Supports proxy servers firewalls that reside on hardware other than a router. Stores data securely in a proprietary format. Has been tested to ensure that it has no high- or medium-risk security vulnerabilities and no UNIX, Web server, URL, or port vulnerabilities. White box testing includes verification of memory checking, buffer overflow, and open port utilization. General Security Issues Information traveling openly across a public network is exposed to potential risks and vulnerabilities such as theft or alteration of the transmitted data, invasion by destructive programs, and access by unauthorized users. Companies must identify the vulnerabilities they deem most important to address, and then select countermeasures to protect data as it travels to and from their site. The benefits of easy data transfer must be balanced against the protection of integrity and confidentiality. In addition, good 7

14 Chapter 2 Security Planning General Security Issues security involves more than technology. Employees and partners must be aware of security issues, trained in best practices, and reminded often of the importance of security to their organization. To achieve data security, an organization must provide effective methods to ensure the following: Authentication recognizing and verifying user identity Authentication can be accomplished through a username and password; however, passwords can be stolen or revealed. Organizations often require a more stringent authentication process such as a digital certificate issued and verified by a Certificate Authority as part of a public key infrastructure (PKI) that ensures mutual identification. Confidentiality limiting data access to authorized users only The confidentiality of sensitive information such as credit card numbers, telephone numbers, and addresses needs to be protected from access by unauthorized parties. Access control limiting access to data or services After authenticating a user, the network authorizes the user to transact his or her business. A user s access level can be monitored based on the user s identification and authentication level. Different users can be granted different levels of access as needed. Integrity ensuring that data has not been altered during transmission Non-repudiation preventing disavowal of a transaction once it is completed The integrity and non-repudiation functions ensure that information arrives as intended and remains intact throughout the entire process, that certain information is available only to authorized users, and that a transaction cannot be disavowed either by the parties or the record-keeping mechanism. Encryption protecting data using a cipher 8

15 Chapter 2 Security Planning Application Gateway Security Solutions Communications security is the protection of information during transmission from unauthorized or accidental modification, destruction, and disclosure. Since it can be difficult to prevent unauthorized access to signal transmissions, the best security often involves using some form of encryption. Privacy protecting user identification and location data An important aspect of security is ensuring that sensitive user information, such as location, is not compromised or misused. For example, location information may not be necessary for a particular transaction, but it could be very valuable and collecting it is subject to misuse. Application Gateway Security Solutions Authentication The Application Gateway supports the standard tools used to provide network security. The technologies discussed in the following sections comprise an essential and trustworthy infrastructure: Authentication, page 9 Secure Socket Layer, page 10 Cookies and Secure Cookies, page 11 Other Security Features, page 11 The Application Gateway supports administrator and user logins. To reach the Application Gateway administration interface, an administrator must provide valid credentials. Administrator accounts are managed through the administration interface and administrator credentials are stored on the Application Gateway as an inaccessible, one-way hash. For IP phone users, the Application Gateway uses the authentication mechanism of the phone system for any IP phone applications which require user authentication. The Application Gateway passes authentication requests to the configured authentication server and returns authentication replies to the requesting IP phone. The Application Gateway does not manage or retain user credentials. 9

16 Chapter 2 Security Planning Application Gateway Security Solutions Secure Socket Layer The Application Gateway also protects the passwords that must be entered for connections to devices needed for operations, such as LDAP servers, SMTP servers, and so on. Any password entry required for such servers is not echoed to the screen during entry or during subsequent viewing of the configuration data, either on screen or in the system logs. All passwords stored on the Application Gateway are stored as an inaccessible, one-way hash. The Secure Socket Layer (SSL) protocol ensures privacy between communicating applications and their users on the Internet. SSL uses a program layer located between the Hypertext Transfer Protocol (HTTP) and Transmission Control Protocol (TCP) layers. SSL is included in most browsers and Web server products. Developed by Netscape, SSL has also gained the support of Microsoft and other Internet client/server developers, becoming the standard. The Application Gateway provides SSL sessions, with support for HTTPS, IMAPS, POPS, and SSMTP. SSL support enables deployment of the Application Gateway behind a firewall in order to provide a secure gateway to protect IP telephone connections beyond the firewall. The socket part of the term Secure Socket Layer refers to the socket method of passing data back and forth between a client and a server program in a network or between program layers in the same computer. SSL uses the public-and-private key encryption system from RSA Security, which also includes the use of a digital certificate. The Application Gateway supports digital certificates in Privacy Enhanced Mail (PEM) format that include a private key. You should install on the Application Gateway a digital X.509 certificate that belongs to your company. This will ensure that all SSL transactions will pass with no error warnings to device users. Certificates from Verisign and Thawte are supported. While the Application Gateway supports 196-bit TLS SSL encryption, you have the option to lower the encryption of the certificate if performance is more important than security. 10

17 Chapter 2 Security Planning Application Gateway Security Solutions Cookies and Secure Cookies Other Security Features Many Internet sites do not allow entry unless cookies are enabled; many IP phones have no ability to accept cookies. Other solutions address this cookie management problem by caching cookies on the server and using some unique identifier, such as the device ID, to associate cookies with a particular user. The cookie for that particular session is included in the URL and is valid only for that session. Once the session is terminated, the cookie is flushed from the cache. This approach offers no security since the packets can be intercepted by a third party and used to spoof the content-adaptation device into sending the data to the interloper. More importantly, this approach makes no distinction between unsecured and secure cookies. The Application Gateway implements a unique and superior cookie management technique that ensures that cookies are always maintained within the enterprise firewall, retained between the Application Gateway and the application server. The Application Gateway provides virtual cookies for devices that do not natively support cookies. The device user is never aware of the cookie. Products on LANs must control access to unauthorized sites and addresses via ftp, telnet and other services. IP phone Voice Applications access only the sites configured for the applications. The Application Gateway also: Has a configurable buffer size, to control the amount of data that can be pulled into the Application Gateway before being sent to the client. If an object exceeds the maximum buffer size, the Application Gateway drops the object. Supports the upload of software upgrades over a secure SSL-protected channel. All access to the Application Gateway can be secured with SSL connections. Provides system logs that can be secured when used with a secure syslog server. 11

18 Chapter 2 Security Planning Application Gateway Security Solutions 12

19 Chapter 3 Deployment Planning The following topics describe issues to consider when planning how to integrate the Application Gateway into your network and contain sample configurations for delivering applications to IP phones: Overview, page 13 Considerations for Integrating the Application Gateway into an IP Phone Enterprise, page 14 Overview One or more Application Gateways can be installed within a LAN environment at each customer location. Sites that want to use Broadcast Server and Zone Paging across IP phones associated with multiple Application Gateways must group the Application Gateways into a cluster. An Application Gateway cluster enables the IP phones to send alerts and pages to distribution lists and zones that include phones from all Application Gateways in the cluster. For more information about clusters, refer to the Application Gateway Administration Guide. The Application Gateway sits in front of content servers and works with other networking products such as cache engines, web servers, firewalls, Virtual Private Network (VPN) solutions, and routers. Regardless of the network deployment chosen, the only requirements that must be met to ensure correct operation are as follows: The client devices (IP telephones) must be able to see the Application Gateway on the network. The Application Gateway must be able to see the requested content. Content may be generated by servers on the local network and the Web. To satisfy those requirements, you can specify gateways and static routing during Application Gateway configuration. 13

20 Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise The Application Gateway administration interface includes a variety of standard Linux monitoring applications to help you understand the networking from the Application Gateway to other devices. The monitoring applications include My traceroute, the Ethereal Network Analyzer, and xnettools. The Application Gateway Pre-Installation Checklist As one of the first steps in planning Application Gateway deployment, we recommend that you review the Pre-Installation Checklist that is provided with the Application Gateway. The checklist includes information such as the following: The software release requirements for your phone system. A list of all incoming and outgoing ports required to be open for Application Gateway usage. A list of all information that must be collected before Application Gateway installation, including the IP address and port numbers of connected devices such as LDAP servers and call servers. Considerations for Integrating the Application Gateway into an IP Phone Enterprise The choice of the best Application Gateway deployment model depends on a number of factors, including these considerations discussed in the following sections: Location of Call Servers, IP Phones, and LDAP Servers, page 15 Location of Web/Intranet Content, page 15 Administration and Redundancy Requirements, page 15 Relative Performance of Network Segments, page 16 Quality of Service (QoS), page 16 14

21 Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Location of Call Servers, IP Phones, and LDAP Servers Voice application operation requires that the Application Gateway is deployed on VLAN(s) that can connect to the following services simultaneously: call servers, call management servers, IP phones, and the LDAP servers used by the Application Gateway. The Application Gateway is typically installed on the T-LAN. Most customers treat the Application Gateway as another telephone server (just like signaling servers for example). The Application Gateway is rarely installed on the C-LAN and even more rarely installed on the E-LAN. In some cases, installing on a T-LAN requires that you use both Network Interface Cards of the Application Gateway. For example, perhaps the T-LAN is completely segmented from the rest of the network and cannot talk to the LDAP server, or perhaps communications with the Call Pilot server is blocked with Access Control Lists (ACLs). Location of Web/Intranet Content If the target content, applications, and/or the IP telephones are distributed, you may want to distribute the Application Gateway as well. It is, for example, often desirable to place an Application Gateway as close to the source of content as possible (a centralized installation) when delivering application content. The Application Gateway greatly reduces the amount of content transmitted to IP telephones, resulting in lower bandwidth demands, improved server, or both. This configuration may also minimize the number of Application Gateway deployed depending on the number of phones and the demand for content delivery. On the other hand, as discussed below, it may be desirable to deploy additional Application Gateway at remote sites as a means of improving security of transmitted data. Administration and Redundancy Requirements These factors are highly dependent on requirements of the enterprise, and the Application Gateway is adaptable to these needs. It can be centrally administered or controlled from distributed locations. 15

22 Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Phone service redundancy is also a consideration in the design of an installation. If a centralized soft switch topology fails due to a hardware or network outage, the IP telephones will be unable to see the IP address of the soft switch. Without survivable remote telephony features for voice, or a redundant network infrastructure, both voice and data transmission will fail in this scenario, independent of Application Gateway redundancy. Note Providing Application Gateway redundancy does not imply that the phone services themselves are redundant. Relative Performance of Network Segments Quality of Service (QoS) An important function of an Application Gateway is that it reduces the amount of content sent, and therefore, the bandwidth needed to transmit data to an IP telephone. This may mean that it is advantageous to deploy as close to the application content as is possible, depending on network speed. The relative performance of network segments may also impact Quality of Service (QoS) considerations, as discussed below. An IP Telephony installation using dedicated Voice VLANs, and which also allows the IP telephones to access applications through an Application Gateway, must provide for at least limited data traffic. The only connection the IP telephones have is the Voice VLAN. This means that the QoS of the network may need to be adjusted to ensure that the Application Gateway has sufficient bandwidth to operate effectively. A number of variables may be involved including the volume of data requested and the response expected by users. Phone service requests and responses over HTTP are not marked. If QoS is implemented in the enterprise, the HTTP traffic coming from the IP telephone will be marked as best effort. Phone service traffic, unless implemented by the application, cannot guarantee timely HTTP content delivery to the IP telephone. 16

23 Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Sample Configurations The configuration samples included in this section describe how the Application Gateway operates in a some common network configurations. The network environment in which you are placing the Application Gateway will ultimately determine the best placement for the Application Gateway. Application Gateway Location Relative to a Firewall or Router When connecting the Application Gateway to your network, you typically place it either inside of a firewall, inside of a router, or straddling a firewall. An Application Gateway that supports Voice Office applications is typically connected to a firewall or router through one of its two Application Gateway interfaces. If the Application Gateway straddles networks, you will need to use both Application Gateway interfaces to connect the Application Gateway to the networks. One interface will connect to the DMZ (external) connection and one interface will connect to the LAN (internal) connection. 17

24 Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise When the Application Gateway straddles a firewall or is in front of a router, it will need routes for reaching any subnets that are not automatically available through your Default Gateway. You can configure the Application Gateway so that it uses your routing tables or the routes that you specify. Application Gateway Operation with a Router The following illustration shows an Application Gateway connected to a application servers through a router in an IP phone enterprise. Note The application servers in the illustration represent the variety of devices that the Application Gateway will connect to, including application and Web servers, LDAP servers, and call servers. When an IP phone requests application content, the Application Gateway accepts the request from the device and requests the content from the back-end servers. 18

25 Chapter 4 Network Impacts For best performance, the Application Gateway should be placed on the data VLAN. Voice Office traffic over the data VLAN will be prioritized lower than phone calls, which go over the voice VLAN. Use of Voice Office applications will have the following network impacts: Telephone registration with the Application Gateway is the equivalent of a standard web request. Browsing in Express Directory generates minimal noise. Sending a page to a zone occupies audio bandwidth at a rate of 85.6 Kilobits per second (Kbps). If a page is sent to a zone that contains 100 phones, the page is sent 100 times (to each phone separately), just like a phone call to each phone. However, a page goes over the data VLAN, so it is prioritized lower than phone calls, which go over the voice VLAN. To determine expected bandwidth impact of paging, use the following formula: (Number of pages in the busy hour) x (Average number of recipients) x (Average length of a page, in seconds) x 85.6 Kbps Suppose that 5 pages are sent during the busy hour to 10 recipients and that the pages average 60 seconds in length. The bandwidth impact for the paging would be 5 x 10 x 60 x 85.6, or 256,800 Kbps. Broadcasting a message occupies audio bandwidth at a rate of 85.6 Kbps. The message size is determined by multiplying the size of the data (voice/text/image) times the number of phones to which the broadcast is pushed. To determine expected bandwidth impact of broadcasting a message, use the following formula: 19

26 Chapter 4 Network Impacts (Number of broadcast messages in the busy hour) x (Average number of recipients) x (Average broadcast size, in bytes) x 85.6 Kbps Suppose that 5 broadcasts are sent during the busy hour to 10 recipients and that the broadcasts average 30 bytes in size. The bandwidth impact for the broadcasts would be 5 x 10 x 30 x 85.6, or 128,400 Kbps. 20

27 Index A access control 8 Application Gateway and authentication 7 buffer 11 clusters 13 cookie management 7 forced secure connections 11 interfaces 6 network impact 19 network location 2 operating system 6 operation with router 18 application server connection, illustrated 18 authentication 8 IP phones 9 requests from applications 7 solutions 9 B Broadcast Server 2 network impact 19 C certificate support 7, 10 clusters 13 confidentiality 8 cookie management 7 cookies 11 D deployment overview 2, 13 with firewall 17 with router 17 with server load balancer 17 digital certificate support 7, 10 E encryption 8 TLS SSL 6, 10 Express Directory 1 F firewall connection, illustrated 17 I integrity 8 IP phone enterprise application server connection, illustrated 18 authentication 9 21

28 Index N network impacts 19 non-repudiation 8 P passwords 9 port requirements 6 Pre-Installation Checklist 14 privacy 9 proxy servers 7 V Voice Office applications 1 Z Zone Paging 1 network impact 19 S security application authentication 7 features 6 IP phones 5 of software upgrades 11 overview 2 system logs 11 server load balancer connection, illustrated 17 SSL and performance 10 session support 6, 10 22

29

30 Family Product Manual Contacts Copyright FCC notice Trademarks Document number Product release Document release Date Publish Nortel Application Gateway 2000 Network Integration Guide Planning Copyright Nortel Networks. All Rights Reserved. LEGAL NOTICE While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, the Nortel logo, the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks. All other trademarks are the property of their respective owners. Publication number: NN Document release: Standard Date: October 2008 Sourced in Canada To provide feedback or report a problem in this document, go to

Administration Guide Configuration and Operation

Administration Guide Configuration and Operation Title page Nortel Application Gateway 1000/2000 Nortel Application Gateway Release 6.1 Administration Guide Configuration and Operation Document Number: NN42360-600 Document Release: Standard 01.07 Date:

More information

Hardware Installation Guide Installation (x3350)

Hardware Installation Guide Installation (x3350) Title page Nortel Application Gateway 2000 Nortel Application Gateway Release 6.3 Hardware Installation Guide Installation (x3350) Document Number: NN42400-300 Document Release: Standard 04.03 Date: January

More information

Siebel CRM. Siebel Security Hardening Guide Siebel Innovation Pack 2015 E

Siebel CRM. Siebel Security Hardening Guide Siebel Innovation Pack 2015 E Siebel CRM Siebel Security Hardening Guide Siebel Innovation Pack 2015 E24815-01 May 2015 Siebel Security Hardening Guide, Siebel Innovation Pack 2015 E24815-01 Copyright 2005, 2015 Oracle and/or its affiliates.

More information

Cisco Expressway with Jabber Guest

Cisco Expressway with Jabber Guest Cisco Expressway with Jabber Guest Deployment Guide First Published: Decemeber 2016 Cisco Expressway X8.9 Cisco Jabber Guest Server 10.6.9 (or later) Cisco Systems, Inc. www.cisco.com Contents Preface

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

Broadcast Server User Guide Configuration and Operation

Broadcast Server User Guide Configuration and Operation Title page Nortel Application Gateway 2000 Nortel Application Gateway Release 6.3 Configuration and Operation Document Number: NN42360-102 Document Release: Standard 04.01 Date: October 2008 Year Publish

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information

H3C SecBlade SSL VPN Card

H3C SecBlade SSL VPN Card H3C SecBlade SSL VPN Card Super Administrator Web Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 5PW105-20130801 Copyright 2003-2013, Hangzhou H3C Technologies

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

Campus Network Design

Campus Network Design Design Principles Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Design Principles Task in Network Design Plan phase

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Oracle Hospitality Inventory Management Security Guide Release 9.1 E

Oracle Hospitality Inventory Management Security Guide Release 9.1 E Oracle Hospitality Inventory Management Security Guide Release 9.1 E97550-01 June 2018 Copyright 2001, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016 Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E69079-01 June 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided

More information

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3. INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview AKAMAI WHITE PAPER Enterprise Application Access Architecture Overview Enterprise Application Access Architecture Overview 1 Providing secure remote access is a core requirement for all businesses. Though

More information

Avaya Converged Platform 130 Series. idrac9 Best Practices

Avaya Converged Platform 130 Series. idrac9 Best Practices Avaya Converged Platform 130 Series idrac9 Best Practices Release 4.0 December 2018 2018 Avaya Inc. All Rights Reserved Notice While reasonable efforts were made to ensure that the information in this

More information

CallPilot 5.0 Library Listing

CallPilot 5.0 Library Listing NN44200-117 Document status: Standard Document version: 0102 Document date: 24 January 2009 All Rights Reserved Sourced in Canada The information in this document is subject to change without notice The

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

IBM SmartCloud Notes Security

IBM SmartCloud Notes Security IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM

More information

Cloud Link Configuration Guide. March 2014

Cloud Link Configuration Guide. March 2014 Cloud Link Configuration Guide March 2014 Copyright 2014 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under and are subject to the terms of

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring a SonicWALL VPN solution with an Avaya IP Telephony Infrastructure using Avaya Aura Communication Manager Branch in a Converged

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

Installation and Configuration Guide for Visual Voic Release 8.5

Installation and Configuration Guide for Visual Voic Release 8.5 Installation and Configuration Guide for Visual Voicemail Release 8.5 Revised October 08, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

BCM50 Rls 6.0. Router - IP Firewall. Task Based Guide

BCM50 Rls 6.0. Router - IP Firewall. Task Based Guide BCM50 Rls 6.0 Router - IP Firewall Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

CYAN SECURE WEB Installing on Windows

CYAN SECURE WEB Installing on Windows CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Safeguarding Cardholder Account Data

Safeguarding Cardholder Account Data Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Yealink VCS Network Deployment Solution

Yealink VCS Network Deployment Solution Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating

More information

Xerox Mobile Print Solution

Xerox Mobile Print Solution Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

Recommendations for Device Provisioning Security

Recommendations for Device Provisioning Security Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic

More information

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017 Oracle Hospitality Cruise AffairWhere Security Guide Release 2.2.5 E85968-01 April 2017 Copyright 2006, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Oracle Hospitality OPERA Property Management Security Guide Versions: Part Number: E

Oracle Hospitality OPERA Property Management Security Guide Versions: Part Number: E Oracle Hospitality OPERA Property Management Security Guide Versions: 5.0.05.00 Part Number: E67891-01 May 2016 Copyright 2015, Oracle and/or its affiliates. All rights reserved. This software and related

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Wave 5.0. Wave OpenVPN Server Guide for Wave 5.0

Wave 5.0. Wave OpenVPN Server Guide for Wave 5.0 Wave 5.0 Wave OpenVPN Server Guide for Wave 5.0 2015 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Vertical

More information

Three interface Router without NAT Cisco IOS Firewall Configuration

Three interface Router without NAT Cisco IOS Firewall Configuration Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

Enhancing VMware Horizon View with F5 Solutions

Enhancing VMware Horizon View with F5 Solutions Enhancing VMware Horizon View with F5 Solutions VMware Horizon View is the leading virtualization solution for delivering desktops as a managed service to a wide range of devices. F5 BIG-IP devices optimize

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure COURSE OVERVIEW This five-day instructor-led course introduces students to network and applications infrastructure concepts and configurations provided by Window Server 2008. Students will be able to acquire

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Smart Agent Configuration Guide Release 2.1 (Service Pack)

Smart Agent Configuration Guide Release 2.1 (Service Pack) Release 2.1 (Service Pack) 16-601314 Issue 2.1 April 2006 Copyright 2006, Avaya Inc. All Rights Reserved Notice Every effort was made to ensure that the information in this document was complete and accurate

More information

Cisco Unified MeetingPlace Integration

Cisco Unified MeetingPlace Integration CHAPTER 14 This chapter covers system-level design and implementation of Cisco Unified MeetingPlace 5.4 in a Cisco Unified Communications Manager 5.x environment. The following aspects of design and configuration

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

Simple and Powerful Security for PCI DSS

Simple and Powerful Security for PCI DSS Simple and Powerful Security for PCI DSS The regulations AccessEnforcer helps check off your list. Most merchants think they are too small to be targeted by hackers. In fact, their small size makes them

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

DEPLOYMENT GUIDE HOW TO DEPLOY MICROSOFT SHAREPOINT 2016 WITH A10 THUNDER ADC

DEPLOYMENT GUIDE HOW TO DEPLOY MICROSOFT SHAREPOINT 2016 WITH A10 THUNDER ADC DEPLOYMENT GUIDE HOW TO DEPLOY MICROSOFT SHAREPOINT 2016 WITH A10 THUNDER ADC OVERVIEW Microsoft SharePoint Server 2016 is a collaboration platform that organizations of all sizes can use to improve the

More information

Sharing a Cisco Unity Voice Mail Box between Two or More IP Phones

Sharing a Cisco Unity Voice Mail Box between Two or More IP Phones Sharing a Cisco Unity Voice Mail Box between Two or More IP Phones Document ID: 41600 Contents Introduction Before You Begin Conventions Prerequisites Components Used Network Diagram Cisco Unity Configuration

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand

More information

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Unified Communications in RealPresence Access Director System Environments

Unified Communications in RealPresence Access Director System Environments [Type the document title] 2.1.0 March 2013 3725-78704-001A Deploying Polycom Unified Communications in RealPresence Access Director System Environments Polycom Document Title 1 Trademark Information POLYCOM

More information

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance Application Note Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance This application note describes how to configure a zone-based firewall on the Cisco ISA500 security appliance.

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Colubris Networks Configuration Guide

Colubris Networks Configuration Guide Colubris Networks Configuration Guide Release 5.1 (October 2006) 43-10-0000-02 Copyright 2006 Colubris Networks, Inc. All rights reserved, including those to reproduce this document or parts thereof in

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

Syncplicity Panorama with Isilon Storage. Technote

Syncplicity Panorama with Isilon Storage. Technote Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate

More information

Secure Industrial Automation Remote Access Connectivity. Using ewon and Talk2M Pro solutions

Secure Industrial Automation Remote Access Connectivity. Using ewon and Talk2M Pro solutions ewon Security Paper Secure Industrial Automation Remote Access Connectivity Using ewon and Talk2M Pro solutions www.ewon.us Last Modified: January 13, 2015 Overview ewon is a global provider of secure

More information

Microsoft Internet Security & Acceleration Server Overview

Microsoft Internet Security & Acceleration Server Overview Microsoft Internet Security & Acceleration Server 2006 Overview 1 What is ISA Server 2006? Three Deployment Scenarios Making Exchange, SharePoint and Web application servers available for secure remote

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Accessing the Ministry Secure File Delivery Service (SFDS)

Accessing the Ministry Secure File Delivery Service (SFDS) Ministry of Health Services Accessing the Ministry Secure File Delivery Service (SFDS) A Guide for New Users To SFDS And Digital Certificate Installation May 2004 Preface Purpose Audience Structure This

More information

White paper. Keys to Oracle application acceleration: advances in delivery systems.

White paper. Keys to Oracle application acceleration: advances in delivery systems. White paper Keys to Oracle application acceleration: advances in delivery systems. Table of contents The challenges of fast Oracle application delivery...3 Solving the acceleration challenge: why traditional

More information

vcenter Operations Management Pack for NSX-vSphere

vcenter Operations Management Pack for NSX-vSphere vcenter Operations Management Pack for NSX-vSphere vcenter Operations Manager 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information