Ensuring PCI DSS Compliance with the Mist Learning WLAN THE SAFE CHOICE FOR MISSION CRITICAL WIRELESS NETWORKS IN PCI ENVIRONMENTS

Size: px
Start display at page:

Download "Ensuring PCI DSS Compliance with the Mist Learning WLAN THE SAFE CHOICE FOR MISSION CRITICAL WIRELESS NETWORKS IN PCI ENVIRONMENTS"

Transcription

1 Ensuring PCI DSS Complince with the Mist Lerning WLAN THE SAFE CHOICE FOR MISSION CRITICAL WIRELESS NETWORKS IN PCI ENVIRONMENTS

2 Tble of Contents Ensuring PCI DSS Complince with the Mist Lerning WLAN... 1 Cloud Security... 1 Network Segmenttion... 1 Protect Network From Externl Attcks... 2 Securing Wireless in the Crdholder Dt Environment (CDE)... 3 Summry... 4

3 Ensuring PCI DSS Complince with the Mist Lerning WLAN Ensuring PCI DSS Complince with the Mist Lerning WLAN The Pyment Crd Industry Dt Security Stndrd (PCI DSS) ws creted s common stndrd to protect ginst credit crd nd pyment dt frud in the retil spce (nd other industries, like bnking, where online pyments re mde). By providing consistent nd holistic security policies nd best prctices, PCI DSS enbles security personnel nd network dministrtors to effectively thwrt vrious threts to pyment dt. The ltest version of PCI DSS which is 3.2, went into effect for ssessments in October, As one cn imgine, the network is criticl cornerstone of PCI DSS complince s it is min rtery for pssing pyment dt. PCI DSS requirements re designed to ensure tht network security opertions nd prctices eliminte or minimize known risks. Plus, they ensure tht the orgniztion defines trceble well-structured policies, procedures, nd prctices tht cn be udited. The wireless network in prticulr is especilly importnt to retil environments s business opertions nd digitl enggement technologies rely upon mobile connectivity. Point of Sle devices, scnners, brcode reders, printers, nd mobile computers, for exmple, ll operte on Wireless LANs (WLAN) tht serve s the lifeblood of retil opertions. Given the importnce of WLANs, there re two types of requirements specificlly outlined for the PCI DSS complince of wireless networks. These include: Generlly pplicble wireless requirements. These re requirements tht pply even when the wireless network is not in scope of the Crdholder Dt Environment (CDE). They include strong network segmenttion to protect the CDE network nd security ginst ttcks from rogue or unknown wireless Access Points nd clients. Securing wireless in CDE environment. These re requirements mndted for systems tht trnsmit pyment crd informtion over wireless technology. In ddition to generlly pplicble wireless requirements, they impose dditionl security requirements for chnging defult psswords nd configurtions, using strong encryption nd uthentiction, regulr updting of the system with complint softwre, nd monitoring ccess. This pper ddresses how the Mist Lerning WLAN delivers robust PCI-complint solution. Cloud Security The Mist cloud is outside the CDE environment s it does not crry ny wireless pcket dt. Regrdless, Mist tkes dditionl mesures to ensure the highest level of security in the Mist cloud. For exmple: Mist uses type2 soc2 cloud dt center. User ccess is highly restricted. Industry stndrd encryption is utilized t vrious levels. Any informtion stored in the cloud is obfuscted with n orgniztion-specific key. Security is integrted with development cycles, nd pen tests re performed to detect vulnerbilities t the network nd ppliction levels. Network Segmenttion All of the following schems cn be implemented in Mist environment to ensure network segmenttion: Physicl Segmenttion: One wy to chieve network segmenttion is to connect the wireless Access Points on wired network tht is physiclly seprte from the CDE network. This would imply hving n overly wired nd wireless infrstructure tht does not hve ny intersection with the wired network for the CDE environment. In this scheme, there is no firewll or internet connection tht is shred between the CDE nd non-cde networks. VLAN bsed logicl segmenttion: It is common to use Virtul LANs (VLANs) to segment the networks into logicl subnets. While it is possible to chieve logicl segmenttion by hving the wireless network nd the CDE in different VLANs, this methodology is not considered sfe nd secure wy to protect the network, without dequte ccess control policies between VLANs. 1

4 Ensuring PCI DSS Complince with the Mist Lerning WLAN Firewll seprtion: If the wireless LAN is connected to the CDE, instituting Firewll between the Wireless network nd the CDE network is n cceptble form of segmenttion tht conforms to PCI DSS 3.2 requirements. Softwre defined policy engine. Mist s integrted WxLAN policy engine cn be used to isolte ny wireless trffic into the CDE environment. Mist delivers powerful pltform when it comes to creting policies for role, user, ppliction nd resource bsed ccess on the network vi its inline policy engine - WxLAN. The Mist wireless infrstructure llows policies to be enforced on ny wired network with ccess to the LAN blocked for ll WLANs configured in the system. Protect Network From Externl Attcks To ensure the wireless network is complint with the generlly pplicble requirements for PCI DSS, retilers need to py specil ttention to the following: Rogue Devices: These re ccidentl or mlicious Access Points on the wired network tht cn be used to violte internl networks with ccess to ll network resources. Honeypot devices: these re ccidentl or mlicious Access Points tht msquerde s snctioned Access Points beconing retiler s Access Points. Non-complint nd unsnctioned Access Points: These rnge for Access Points tht my be snctioned Access Points but out of complince running old firmwre without criticl security fixes. Similrly, these my lso include Access Points tht re neighbors s well s those cusing indvertent interference to the wireless opertions inside the four wlls of retil store or wrehouse. Two ctivities re required for hndling these externl devices, often referred to s Wireless Intrusion Detection nd Prevention (WIDS/ WIPS): Monitor the RF environment to find nd nlyze the existence of bove. Isolte ny Wi-Fi Access Points not used to trnsmit or receive crdholder dt. Trditionlly there hve been severl wys in which WLAN vendors hve ddressed the bove requirements for WIDS/WIPS complince: Prt time scnning. In this mode, Access Points when not serving clients scn the spectrum for rogue devices. This is lmost kin to hving security solution tht only works some of the time not 24x7. Dedicted Access Points provide 24x7 security monitoring of the wireless spectrum. While this does protect the network ll the time, it explodes the deployment cost for dditionl AP s with ssocited instlltion cost of PoE cble runs to the IDF/MDF to power up the sensors. Some vendors use dul-bnded rdios in Access Points, nd stel rdio within n Access Point for sensor implementtion leding to nightmres in chnnel plnning nd insufficient coverge for clients in the network. Some vendors, while offering tri-rdio Access Point solution with dedicted third rdio, deploy complete overly monitoring solutions orthogonl to the rest of the Wireless infrstructure nd Controller solution with isolted islnds of dt sources, dtbses, visuliztion nd even seprte controls for rdio configurtion, control nd provisioning. The Mist Access Points provide continuous 24x7 scnning of the spectrum longside 2.4Ghz nd 5Ghz client ccess. This llows Mist to continully scn the spectrum for rogues, honeypots, interferers nd for other nomlies such s unsuccessful connection ttempts t site (which my be source for DDOS ttck). In ddition, unlike trditionl vendors, the Mist pltform mintins stte mchine nd bseline on key metrics for every physicl device (Access Point, clients) nd logicl entity (loction, site, site-groups) tht complements flow informtion nd rich elstic cloud dt store. Mist s AI powered infrstructure identifies unusul ctivity t every level of the network nd this wy the Mist pltform cn detect existing nd zero-dy threts. In ddition, Mist s loction technology cn be used to ccurtely locte ccidentl or mlicious rogue devices nd 2

5 Ensuring PCI DSS Complince with the Mist Lerning WLAN provide loction-bsed ccess to resources. Mist s Mchine Lerning frmework cn be extended to behviorl nlytics whereby client device cpbilities cn be checked ginst the norml bseline nd lerts generted when key postures chnge (e.g. 4x4 client device ppers s 2x2 device or client device snctioned for Cliforni loction ppers to ccess the network from New York). Securing Wireless in the Crdholder Dt Environment (CDE) As mentioned bove, the second set of requirements pplies to wireless devices on the sme network where credit crd dt is hndled. Mist llows you to conduct PCI scn for the VLAN s nd Wireless LAN s in scope, nd helps you remedite both the vulnerbilities on the wireless network nd enforce policies on the wireless mngement system. The following is how Mist ddresses the min requirements for these in scope wireless networks to be PCI DSS complint: PCI DSS REQUIREMENTS V3.2 FOR WIRELESS MIST CONFORMS MIST VALUE PROPOSITION Current network digrm tht identifies ll connections between the crdholder dt environment nd other networks, including ny Mist s PCI scn report identifies the list of wireless SSIDs nd Access Points tht connect with the CDE. wireless networks For wireless environments connected to the crdholder dt environment or trnsmitting crdholder dt, chnge ALL wireless vendor defults t instlltion, including but not limited to defult wireless encryption keys, psswords, nd SNMP community strings. Mist does not hve defult psswords, encryption keys or SNMP community strings. 2.4 Mintin n inventory of system components tht re in scope for PCI DSS. Mintin n inventory of system components tht re in Mist provides list of wireless networks nd Access Points tht re in scope of PCI DSS. scope for PCI DSS Ensure wireless networks trnsmitting crdholder dt or connected to the crdholder dt environment, use industry best prctices to implement strong encryption for uthentiction nd trnsmission. 6.2 Ensure tht ll system components nd softwre re protected from known vulnerbilities by instlling pplicble vendor-supplied security ptches. Instll criticl security ptches within one month of relese. Note: Criticl security ptches should be identified ccording to the risk rnking process defined in Requirement Limit ccess to system components nd crdholder dt to only those individuls whose job requires such ccess. Mist supports strong encryption stndrds, including WPA2-PSK, nd WPA2-Enterprise with AES encryption. As prt of its PCI scn report, Mist clls out ny wek encryption used on SSID in scope of the CDE. Mist mkes vilble the ltest relesed firmwre tht includes ny criticl fix required for the integrity of the wireless network. Mist identifies ny Access Point tht hs not yet been upgrded to the ltest firmwre. Wireless network ccess is restricted to uthorized dministrtors. All uthorized dministrtors re listed on the Mist PCI scn report. 7.2 Estblish n ccess control system(s) for systems components tht restricts ccess bsed on user s need to know, nd is set to deny ll Mist Network Administrtors re ssigned roles with limited scope of ccess. Defult dministrtor role is Observer (View-only). unless specificlly llowed Assign ll users unique ID before llowing them to ccess system components or crdholder dt. 8.2 In ddition to ssigning unique ID, ensure proper useruthentiction mngement for non-consumer users nd dministrtors on ll system components by employing t lest one of the following methods to uthenticte ll users: Something you know, such s pssword or pssphrse Something you hve, such s token device or smrt crd Something you re, such s biometric Mist s PCI scn report identifies the list of wireless SSIDs nd Access Points tht connect with the CDE. All Mist dministrtors re uthenticted using complex psswords. 3

6 Ensuring PCI DSS Complince with the Mist Lerning WLAN Restrict physicl ccess to wireless ccess points, gtewys, hndheld devices, networking/communictions hrdwre, nd Mist Access Points cn be mde physiclly secure with the help of screws nd brckets vilble s prt of the ccess point kit. Additionl telecommuniction lines. physicl security is supported with the Kensington lock slot on the Access Point Implement udit trils to link ll ccess to system components to ech individul user Write logs for externl-fcing technologies onto secure, centrlized, internl log server or medi device Implement processes to test for the presence of wireless ccess points (802.11), nd detect nd identify ll uthorized nd unuthorized wireless ccess points on qurterly bsis. Note: Methods tht my be used in the process include but re not limited to wireless network scns, physicl/logicl inspections of system components nd infrstructure, network ccess control (NAC), or wireless IDS/IPS. Whichever methods re used, they must be sufficient to detect nd identify both uthorized nd unuthorized devices. All system ccess, updtes nd configurtion chnges re trcked in n udit log. All event logs re stored in centrlized servers in the Mist cloud pltform hosted in Type 2 SOC 2 Dt Center. Mist WIDS/WIPS llows detection of uthorized nd unuthorized ccess points on the network, eliminting the need for mnully intensive wireless scns. Specificlly, rogue Access Point detection nd continment protects the CDE network from being compromised. Summry As orgniztions rely more on wireless networks s key enbler for business services, PCI DSS requires creful ttention to WLAN security. Fortuntely, Mist hs you covered. By protecting wireless networks form externl ttck nd ensuring dt trnsferred on CDE networks is lwys secure, the Mist Lerning WLAN is sfe choice for mission criticl wireless networks in PCI environments. The key difference in the Mist rchitecture is how the workflows hve been stremlined to enble cohesive experience for network IT, Security Opertions Tems, Mrketing nd other lines of business. With Mist, ccess lyer connectivity nd ssocited pplictions is now ll bout delivering comprehensive, mzing nd secure experience. 4

Information regarding

Information regarding Informtion regrding LANCOM Advnced VPN Client 3.13 Copyright (c) 2002-2017 LANCOM Systems GmbH, Wuerselen (Germny) LANCOM Systems GmbH does not tke ny gurntee nd libility for softwre not developed, mnufctured

More information

y^fi Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments - Service Providers Version 3.

y^fi Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments - Service Providers Version 3. y^fi Security Stndrds Council Pyment Crd Industry (PCI) t Security Stndrd Attesttion of Complince for Onsite Assessments - Service Providers Version 3.2 Section 1: Assessment Informtion Instructions for

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

Sage CRM 2018 R1 Software Requirements and Mobile Features. Updated: May 2018

Sage CRM 2018 R1 Software Requirements and Mobile Features. Updated: May 2018 Sge CRM 2018 R1 Softwre Requirements nd Mobile Fetures Updted: My 2018 2018, The Sge Group plc or its licensors. Sge, Sge logos, nd Sge product nd service nmes mentioned herein re the trdemrks of The Sge

More information

McAfee Network Security Platform

McAfee Network Security Platform Mnger Applince Quick Strt Guide Revision B McAfee Network Security Pltform This guide is high-level description of how to instll nd configure the Mnger Applince. For more detiled instlltion informtion,

More information

Sage CRM 2017 R3 Software Requirements and Mobile Features. Updated: August 2017

Sage CRM 2017 R3 Software Requirements and Mobile Features. Updated: August 2017 Sge CRM 2017 R3 Softwre Requirements nd Mobile Fetures Updted: August 2017 2017, The Sge Group plc or its licensors. Sge, Sge logos, nd Sge product nd service nmes mentioned herein re the trdemrks of The

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

Release Notes for. LANCOM Advanced VPN Client 4.10 Rel

Release Notes for. LANCOM Advanced VPN Client 4.10 Rel Relese Notes for LANCOM Advnced VPN Client 4.10 Rel Copyright (c) 2002-2018 LANCOM Systems GmbH, Wuerselen (Germny) LANCOM Systems GmbH does not tke ny gurntee nd libility for softwre not developed, mnufctured

More information

Sage CRM 2017 R2 Software Requirements and Mobile Features. Revision: IMP-MAT-ENG-2017R2-2.0 Updated: August 2017

Sage CRM 2017 R2 Software Requirements and Mobile Features. Revision: IMP-MAT-ENG-2017R2-2.0 Updated: August 2017 Sge CRM 2017 R2 Softwre Requirements nd Mobile Fetures Revision: IMP-MAT-ENG-2017R2-2.0 Updted: August 2017 2017, The Sge Group plc or its licensors. Sge, Sge logos, nd Sge product nd service nmes mentioned

More information

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER

More information

vcloud Director Service Provider Admin Portal Guide 04 OCT 2018 vcloud Director 9.5

vcloud Director Service Provider Admin Portal Guide 04 OCT 2018 vcloud Director 9.5 vcloud Director Service Provider Admin Portl Guide 04 OCT 208 vcloud Director 9.5 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

Migrating vrealize Automation to 7.3 or March 2018 vrealize Automation 7.3

Migrating vrealize Automation to 7.3 or March 2018 vrealize Automation 7.3 Migrting vrelize Automtion to 7.3 or 7.3.1 15 Mrch 2018 vrelize Automtion 7.3 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

vcloud Director Tenant Portal Guide vcloud Director 9.1

vcloud Director Tenant Portal Guide vcloud Director 9.1 vcloud Director Tennt Portl Guide vcloud Director 9.1 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout this documenttion, submit

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

LoRaWANTM Concentrator Card Mini PCIe LRWCCx-MPCIE-868

LoRaWANTM Concentrator Card Mini PCIe LRWCCx-MPCIE-868 Dt Sheet LoRWANTM Concentrtor Crd Mini PCIe LRWCCxMPCIE868 LoRWANTM Concentrtor Crd bsed on Semtech SX30 nd SX308 Chips in Mini PCIe Form Fctor The nfuse LRWCCxMPCIE fmily of crds enble OEMs nd system

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

c360 Add-On Solutions

c360 Add-On Solutions c360 Add-On Solutions Functionlity Dynmics CRM 2011 c360 Record Editor Reltionship Explorer Multi-Field Serch Alerts Console c360 Core Productivity Pck "Does your tem resist using CRM becuse updting dt

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

STRM Installation Guide

STRM Installation Guide Security Thret Response Mnger Relese 2013.2 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-09-15 Copyright Notice Copyright 2014 Juniper

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-208 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Bonded Internet. Architecture Examples for Replacing or Enhancing Customer MPLS Networks

Bonded Internet. Architecture Examples for Replacing or Enhancing Customer MPLS Networks Bonded Internet Architecture Exmples for Replcing or Enhncing Customer MPLS Networks Bonded Internet Ensuring business customers hve: Fst, Relible, nd Secure ccess to their Cloud pplictions nd services

More information

COMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA: In order to lern which questions hve een nswered correctly: 1. Print these pges. 2. Answer the questions. 3. Send this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

Enginner To Engineer Note

Enginner To Engineer Note Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

USER EXPERIENCE. A better client experience starts here.

USER EXPERIENCE. A better client experience starts here. USER EXPERIENCE A better client experience strts here. Why MyRepCht...... 3 Fetures + Benefits..... 4 Why use My Rep Cht s n Advisor 5 Integrtes with your CRM... 6 Archiving + Prtnerships... 7 Convert

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

McAfee Network Security Platform

McAfee Network Security Platform 10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 About EsyMP Multi PC Projection Meeting Styles Proposed by EsyMP Multi PC Projection... 5 Holding Meetings Using Multiple Imges... 5 Holding Remote Meetings

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

NetBackup 5200 Release 1.1 Quick Installation Guide

NetBackup 5200 Release 1.1 Quick Installation Guide NetBckup 5200 Relese 1.1 Quick Instlltion Guide Revision: 01 Dte: 2010-08-30 Environment Check Before Instlltion You cn instll the NetBckup 5200 pplince in stndrd 19-inch cbinet (with n AC distribution

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Coprocessor memory definition. Loic Pallardy / Arnaud Pouliquen

Coprocessor memory definition. Loic Pallardy / Arnaud Pouliquen Coprocessor memory definition Loic Pllrdy / Arnud Pouliquen Objective 2 The gol of following slides is to sum up on-going discussion in OpenAP weekly bout Remoteproc/Rpmsg memory lloction. Following proposl

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision C McAfee Network Security Pltform (40 Gigit Active Fil-Open Bypss Kit Guide) McAfee Network Security Pltform IPS Sensors, when deployed in-line, route ll incoming trffic through designted port

More information

vcloud Director Tenant Portal Guide vcloud Director 9.0

vcloud Director Tenant Portal Guide vcloud Director 9.0 vcloud Director Tennt Portl Guide vcloud Director 9.0 vcloud Director Tennt Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre We site t: https://docs.vmwre.com/ The VMwre We

More information

Scenarios for IT Automating IT. 21 AUG 2018 VMware Validated Design 4.3 VMware Validated Design for IT Automating IT 4.3

Scenarios for IT Automating IT. 21 AUG 2018 VMware Validated Design 4.3 VMware Validated Design for IT Automating IT 4.3 Scenrios for IT Automting IT 21 AUG 2018 VMwre Vlidted Design 4.3 VMwre Vlidted Design for IT Automting IT 4.3 Scenrios for IT Automting IT You cn find the most up-to-dte technicl documenttion on the VMwre

More information

McAfee Network Security Platform

McAfee Network Security Platform NTBA Applince T-200 nd T-500 Quick Strt Guide Revision B McAfee Network Security Pltform 1 Instll the mounting rils Position the mounting rils correctly nd instll them t sme levels. At the front of the

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 About EsyMP Multi PC Projection Meeting Styles Proposed by EsyMP Multi PC Projection... 5 Holding Meetings Using Multiple Imges... 5 Holding Remote Meetings

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision D McAfee Network Security Pltform (NS5x00 Quick Strt Guide) This quick strt guide explins how to quickly set up nd ctivte your McAfee Network Security Pltform NS5100 nd NS5200 Sensors in inline

More information

Maintenance Guide PN 38L6404, EC M13180

Maintenance Guide PN 38L6404, EC M13180 IBMTS7610ndTS7620ProtecTIER Dedupliction Applince Express Mintennce Guide PN 38L6404, EC M13180 V3.3.6 GA32-2232-04 IBMTS7610ndTS7620ProtecTIER Dedupliction Applince Express Mintennce Guide PN 38L6404,

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Scenarios. VMware Validated Design for IT Automating IT 4.0 EN

Scenarios. VMware Validated Design for IT Automating IT 4.0 EN Scenrios VMwre Vlidted Design for IT Automting IT 4.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To check for

More information

Installation and Upgrade on Windows Server 2008 When the Secondary Server is Virtual VMware vcenter Server Heartbeat 6.5 Update 1

Installation and Upgrade on Windows Server 2008 When the Secondary Server is Virtual VMware vcenter Server Heartbeat 6.5 Update 1 Instlltion nd Upgrde on Windows Server 2008 When the Secondry Server is Virtul VMwre vcenter Server Hertet 6.5 Updte 1 This document supports the version of ech product listed nd supports ll susequent

More information

Cumulus POS 02/19/2018. User Reference Manual

Cumulus POS 02/19/2018. User Reference Manual Cumulus POS Cumulus POS 02/19/2018 User Reference Mnul This mnul, s well s the softwre described in it, is furnished under license nd my only be used or copied in ccordnce with the terms of such license.

More information

Transitioning to NEMSIS 3

Transitioning to NEMSIS 3 TRANSITIONING TO NEMSIS 3 LOCAL EMS SERVICES 1 Trnsitioning to NEMSIS 3 Resources for Locl EMS Services TRANSITIONING TO NEMSIS 3 LOCAL EMS SERVICES 2 Index Getting Strted FAQs for Leders Trnsition Checklist

More information

Release Notes for. LANtools Software Release RU6

Release Notes for. LANtools Software Release RU6 Relese Notes for LANtools Softwre Relese 10.12 RU6 Copyright (c) 2002-2018 LANCOM Systems GmbH, Wuerselen (Germny) LANCOM Systems GmbH does not tke ny gurntee nd libility for softwre not developed, mnufctured

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol (VoIP)

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

IBM System Storage SAN Volume Controller. Troubleshooting Guide IBM

IBM System Storage SAN Volume Controller. Troubleshooting Guide IBM IBM System Storge SAN Volume Controller Troubleshooting Guide IBM Note Before using this informtion nd the product it supports, red the informtion in Notices on pge 309. This edition pplies to version

More information

SPARC T7-2 Server. Product Overview

SPARC T7-2 Server. Product Overview O R A C L E D A T A S H E E T SPARC T7-2 Server Orcle s SPARC T7 nd M7 servers re the world s most dvnced systems for enterprise worklods, with unique cpbilities for informtion security, dtbse nd Jv ccelertion.

More information

Scenarios. VMware Validated Design 4.0 VMware Validated Design for IT Automating IT 4.0

Scenarios. VMware Validated Design 4.0 VMware Validated Design for IT Automating IT 4.0 Scenrios VMwre Vlidted Design 4.0 VMwre Vlidted Design for IT Automting IT 4.0 Scenrios You cn find the most up-to-dte technicl documenttion on the VMwre wesite t: https://docs.vmwre.com/ If you hve comments

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following: Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Troubleshooting Guide

Troubleshooting Guide IBM System Storge SAN Volume Controller Troubleshooting Guide GC27-2284-06 Note Before using this informtion nd the product it supports, red the informtion in Notices on pge 351. This edition pplies to

More information

Printing for Professionals

Printing for Professionals Printing for Professionls Quick Setup Guide Version 0 USA/CAN Quick Setup Guide Strt Here Before you cn use the mchine, red this Quick Setup Guide for the correct setup nd instlltion. IMPORTANT DO NOT

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

HFX 100 Tx and HFX 100 Rx User Guide

HFX 100 Tx and HFX 100 Rx User Guide This guide describes the function, instlltion nd opertion of the trnsmitter nd receiver. Unless otherwise stted, the terms HFX 100, HDMI extender, nd extender refer to both units. The term trnsmitter refers

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Address/Data Control. Port latch. Multiplexer

Address/Data Control. Port latch. Multiplexer 4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Upgrade. 13 FEB 2018 VMware Validated Design 4.2 VMware Validated Design for Software-Defined Data Center 4.2

Upgrade. 13 FEB 2018 VMware Validated Design 4.2 VMware Validated Design for Software-Defined Data Center 4.2 Upgrde 13 FEB 2018 VMwre Vlidted Design 4.2 VMwre Vlidted Design for Softwre-Defined Dt Center 4.2 Upgrde You cn find the most up-to-dte technicl documenttion on the VMwre wesite t: https://docs.vmwre.com/

More information

License Manager Installation and Setup

License Manager Installation and Setup The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.

More information

TECHNICAL NOTE MANAGING JUNIPER SRX PCAP DATA. Displaying the PCAP Data Column

TECHNICAL NOTE MANAGING JUNIPER SRX PCAP DATA. Displaying the PCAP Data Column TECHNICAL NOTE MANAGING JUNIPER SRX PCAP DATA APRIL 2011 If your STRM Console is configured to integrte with the Juniper JunOS Pltform DSM, STRM cn receive, process, nd store Pcket Cpture (PCAP) dt from

More information

The Search for Optimality in Automated Intrusion Response

The Search for Optimality in Automated Intrusion Response The Serch for Optimlity in Automted Intrusion Response Yu-Sung Wu nd Surbh Bgchi (DCSL) & The Center for Eduction nd Reserch in Informtion Assurnce nd Security (CERIAS) School of Electricl nd Computer

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-148 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION Overview LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION 4.3.1.0 Due to the complex nture of this updte, plese fmilirize yourself with these instructions nd then contct RGB Spectrum

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Scenarios. VMware Validated Design for IT Automating IT EN

Scenarios. VMware Validated Design for IT Automating IT EN Scenrios VMwre Vlidted Design for IT Automting IT 3.0.2 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To check

More information

OPERATION MANUAL. DIGIFORCE 9307 PROFINET Integration into TIA Portal

OPERATION MANUAL. DIGIFORCE 9307 PROFINET Integration into TIA Portal OPERATION MANUAL DIGIFORCE 9307 PROFINET Integrtion into TIA Portl Mnufcturer: 2018 burster präzisionsmesstechnik gmbh & co kg burster präzisionsmesstechnik gmbh & co kg Alle Rechte vorbehlten Tlstrße

More information

Passwords Passwords Changing Passwords... <New Passwords> 130 Setting UIM PIN... <UIM PIN/UIM PIN2> 130 Unlocking a Locked UIM...

Passwords Passwords Changing Passwords... <New Passwords> 130 Setting UIM PIN... <UIM PIN/UIM PIN2> 130 Unlocking a Locked UIM... Psswords Psswords... 128 Chnging Psswords... 130 Setting UIM PIN... 130 Unlocking Locked UIM... 131 Restricting the Hndset Opertions Locking Function... 131 Locking the

More information

Installation manual. Daikin Altherma low temperature monobloc option box EK2CB07CAV3. Installation manual. English

Installation manual. Daikin Altherma low temperature monobloc option box EK2CB07CAV3. Installation manual. English Instlltion mnul Dikin Altherm low temperture monobloc option box EKCB07CAV Instlltion mnul Dikin Altherm low temperture monobloc option box English Tble of Contents Tble of Contents About the documenttion.

More information

M-Historian and M-Trend

M-Historian and M-Trend Product Bulletin Issue Dte June 18, 2004 M-Historin nd The M-Historin mnges the collection nd rchiving of trend dt, nd enles the presenttion of rchived trend dt in the ssocited softwre component. M-Historin

More information

Installation Guide AT-VTP-800

Installation Guide AT-VTP-800 Velocity 8 Touch Pnel The Atlon -BL nd -WH re 8 touch pnels in blck nd white, respectively, for the Atlon Velocity Control System. They feture contemporry, refined styling for modern presenttion environments

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.1 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information

Zenoss Resource Manager Installation Guide

Zenoss Resource Manager Installation Guide Zenoss Resource Mnger Instlltion Guide Relese 6.1.1 Zenoss, Inc. www.zenoss.com Zenoss Resource Mnger Instlltion Guide Copyright 2018 Zenoss, Inc. All rights reserved. Zenoss, Own IT, nd the Zenoss logo

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

Backup and Restore. 20 NOV 2018 VMware Validated Design 4.3 VMware Validated Design for Software-Defined Data Center 4.3

Backup and Restore. 20 NOV 2018 VMware Validated Design 4.3 VMware Validated Design for Software-Defined Data Center 4.3 20 NOV 2018 VMwre Vlidted Design 4.3 VMwre Vlidted Design for Softwre-Defined Dt Center 4.3 You cn find the most up-to-dte technicl documenttion on the VMwre wesite t: https://docs.vmwre.com/ If you hve

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Tixeo compared to other videoconferencing solutions

Tixeo compared to other videoconferencing solutions compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VMware Horizon JMP Server Installation and Setup Guide. Modified on 06 SEP 2018 VMware Horizon 7 7.6

VMware Horizon JMP Server Installation and Setup Guide. Modified on 06 SEP 2018 VMware Horizon 7 7.6 VMwre Horizon JMP Server Instlltion nd Setup Guide Modified on 06 SEP 2018 VMwre Horizon 7 7.6 You cn find the most up-to-dte technicl documenttion on the VMwre wesite t: https://docs.vmwre.com/ If you

More information

VMware Cloud Foundation Site Protection and Disaster Recovery Guide. VMware Cloud Foundation 3.0.1

VMware Cloud Foundation Site Protection and Disaster Recovery Guide. VMware Cloud Foundation 3.0.1 VMwre Cloud Foundtion Site Protection nd Disster Recovery Guide VMwre Cloud Foundtion 3.0.1 VMwre Cloud Foundtion Site Protection nd Disster Recovery Guide You cn find the most up-to-dte technicl documenttion

More information

Zenoss Core Installation Guide

Zenoss Core Installation Guide Zenoss Core Instlltion Guide Relese 6.1.0 Zenoss, Inc. www.zenoss.com Zenoss Core Instlltion Guide Copyright 2018 Zenoss, Inc. All rights reserved. Zenoss, Own IT, nd the Zenoss logo re trdemrks or registered

More information

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application.

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application. ICB Asset Ticket Genertor Opertor s Guide Septemer, 2016 Septemer, 2016 NOTES Opertor s Guide ICB Asset Ticket Genertor Softwre Instlltion nd Opertion This document contins informtion for downloding, instlling,

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information