HTTPS File Transfer. Specification

Size: px
Start display at page:

Download "HTTPS File Transfer. Specification"

Transcription

1 HTTPS File Transfer Specification Version Apr-2017

2 Date Version Description 30-Aug Original Version 30-Jun Added FAQ 29-Jun ilink administration added 1-Sep Updated for new layout 4-Apr Revised TLS version to 1.2 minimum Page 2

3 Table of Contents 1 Introduction Quick Start Integration Options ilink connectivity setup ilink URLs Setup Connectivity Form Using the Command Line Scripts Downloading curl Configuration Uploading Files Example File Names Handling Errors Downloading Files Example Handling Errors Developing Custom HTTPS Connectivity Recommendations Handling Errors Installing the Client Certificate Protecting Your Certificate Upgrading Your Certificate Appendix: File Transfer Protocol Uploading Files HTTP Request HTTP Response Handling Errors Listing Files for Download HTTP Request Page 3

4 7.2.2 HTTP Response Handling Errors Downloading a File HTTP Request HTTP Response Handling Errors Deleting a File HTTP Request HTTP Response Handling Errors Appendix: Westpac HTTPS addresses Test Environment Production Environment Appendix D FAQ Page 4

5 1 Introduction This document defines Westpac s WIBS HTTPS file transfer protocol. The HTTPS file transfer protocol allows partners to transfer files securely and reliably over the internet. It provides a standard mechanism for transport using existing infrastructure (such as web servers, proxy servers and firewalls). Communication uses standard TCP/IP ports to prevent the need for network firewall changes. SSL is used to provide encryption of data between partners, and authorisation assures the identity of each partner. The intended audience of this document is: Server administrators who wish to use the provided command line scripts, and Software developers who wish to implement this messaging protocol in their software. Knowledge of HTTP and SSL is assumed. Page 5

6 2 Quick Start Customer task Westpac task 1. Qvalent implementation consultant creates an ilink test account for the customer s technical contact. 2. Customer contact completes ilink connectivity form in test ilink. 3. Customer develops HTTPS connectivity solution 4. Qvalent implementation consultant configures file routing. 5. Customer undertakes testing in the test environment. 6. Once customer is satisfied that testing is complete a sign off is required to progress into production. 7. Qvalent implementation consultant creates an ilink production account for the customer s technical contact. 8. Customer contact completes ilink connectivity form in production ilink. 9. Qvalent implementation consultant configures file routing. 10. Customer tests the HTTPS connection in the live environment. 11. Once this testing is successful customers can perform low value live testing of the other Westpac products that are being implemented. Page 6

7 3 Integration Options The HTTPS file transfer service is provided to allow your system to easily upload files to Westpac and download files from Westpac. You have two integration options: 1. Use the provided command-line scripts. These scripts use the curl commandline program and standard in and out streams to transfer files. Minimal configuration work is required. 2. Write code to generate HTTPS requests sent to Westpac and interpret the responses you receive. A moderate amount of development work is required, and you will need previous expertise with HTTPS. These options are further detailed in the following sections. Page 7

8 4 ilink connectivity setup In the early stages of your Westpac project you will be asked to provide the contact details of the IT person who will be responsible for setting up your HTTPS connection. Once these details are received you will be provided with an ilink login to enter your IP addresses. The ilink connectivity process has the following steps 1. The Qvalent implementation consultant will provide the user s technical contact with a login to the ilink test instance. 2. Fill in the setup connectivity form and submit 3. Notify your Qvalent and Westpac implementation managers that you have completed the connectivity form 4. The Qvalent implementation consultant will configure the file routing and notify all stakeholders when this is done 5. User to send and receive test files to confirm the HTTPS connection 6. Once the Qvalent implementation consultant has received confirmation that all relevant testing has been completed steps 1 5 will need to be repeated in the production environment. 4.1 ilink URLs Test Production Setup Connectivity Form To setup your connectivity, click the Connectivity menu option at the top of the screen, then press the Setup Connectivity button. The Setup Connectivity will be displayed where you can enter the following details: PGP Key If you have elected to PGP encrypt files sent to Westpac, upload your PGP key here. Otherwise, this field will not be shown on the screen. IP addresses The WIBS solution has a white list of IP addresses accepted for each user. Users need to provide the IP address or addresses that their incoming requests will be coming from, this is the external IP address taking into account any proxy servers or other externally facing network infrastructure. This can be found by logging on to ilink on your server and taking the browser address shown in the IP addresses section of the connectivity form. After you press Save, you will see the WIBS server details on the Setup connectivity page. Westpac s key this is the public key that you will need to use to decrypt the files you receive from WIBS. This will only be displayed if encryption is enabled. Your key - You can use these fields during testing to confirm which keys you have loaded into ilink. This will only be displayed if encryption is enabled. Your credentials - This section contains the details of the client certificate that you will use to authenticate with the WIBS server. IP Addresses lists the IP addresses allowed to access this connectivity Page 8

9 5 Using the Command Line Scripts Command line scripts have been provided for Unix and Windows that demonstrate the use of curl to upload and download files. The scripts have been designed to exit with an error code if the file could not be successfully uploaded or download. Error details will be written to the standard error stream. 5.1 Downloading curl You will need to download the curl client for your platform from Be sure to download the correct distribution for your server s operating system. You must download a version that includes SSL support. If you are using Windows, we recommend that you download the binary distribution listed under the heading Win32 - Generic labelled Win /XP, binary and SSL and maintained by Günter Knauf. This document does not provide a direct link because you should always download the latest version. 5.2 Configuration You need to edit the configuration script before you can use the upload or download scripts. The configuration script is named config.cmd on Windows and config.sh on Unix. Open the file in a text editor and make the following changes: 1. Set the CERT_FILE variable to the file path of your.pem certificate file, e.g. c:\filetransfer\certificate.pem 2. Set the CERT_PASSWORD variable to the password for your.pem certificate file. 3. If you require a proxy to connect to the internet: a. Uncomment the first PROXY_OPTIONS line and change proxy_address to the host name of your proxy server, and proxy_port to the port number your proxy server listens on. b. If your proxy server requires authentication, uncomment the second PROXY_OPTIONS line and change username to your proxy username and password to your proxy password. 4. If you are uploading and downloading files in the test environment, leave the BASE_URL variable set to If you are uploading and downloading files in the production environment, set the BASE_URL variable to 5. Set the CURL_EXE variable to the file path of the curl executable file, e.g. C:\curl \curl.exe 5.3 Uploading Files The upload script is named uploadfile.cmd on Windows and uploadfile.sh on Unix. It takes one argument, which is the file name to send to Westpac. The file contents are read from standard in. Page 9

10 5.3.1 Example The following example shows how to send a file from the file system: Windows: Unix: uploadfile.cmd mts _01.txt < c:\mts txt uploadfile.sh mts _01.txt < c:\mts txt Note that this allows the file name sent to Westpac to be different from the file name on disk. Important Security Note: If the file contains credit card numbers, PCI DSS regulations require that you do not store the file unencrypted on disk. Instead, you must decrypt the file in memory and stream that data to the input stream of the upload script File Names The file name sent to Westpac must be unique. If you send a different file with the same name as a previous file, you will receive a HTTP 400 Bad Request error response. To ensure uniqueness of file names, include the file type, date and a daily sequence number in the file name Handling Errors If you receive a network error while transmitting your file, you can simply run the same upload command again (re-using the same file name). This will never result in a duplicate file because Westpac will silently ignore duplicate files with the same name. If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 5.4 Downloading Files The download files script is named downloadfiles.cmd on Windows and downloadfiles.sh on Unix. It downloads all your available files and removes them from the download list (preventing duplicate downloads). By default, the file contents are echoed to standard out. You will need to modify this script to save the files to an appropriate location and trigger any required file processing. Important Security Note: If the file contains credit card numbers, PCI DSS regulations require that you do not store the file unencrypted on disk. Instead, you must read the standard out stream from the script and encrypt the file in memory before saving it to disk Example To download all available files, run the following command: Windows: Unix: downloadfiles.cmd downloadfiles.sh Handling Errors To download the available files, the script performs the following operations: 1. Get a list of all the available files. 2. For each file in that list: a. Download the file. Page 10

11 b. If the file has not already been processed, run your custom file processing. c. Delete the file (removing it from the available file list). Operations 1, 2a and 2c can fail due to network errors. In that event, simply run the download script again and the file will be downloaded again. The file is not deleted until it is downloaded and processed, which allows you to retry the download operation in the event of a failure. If you receive an error not related to network connectivity or your processing, it is likely a configuration issue you need to investigate based on the error message provided. Page 11

12 6 Developing Custom HTTPS Connectivity This section gives an overview of developing your own connectivity code to use the HTTPS file transfer service. It details the requirements of your system and gives instruction on how to integrate the file transfer protocol into your system. This section does not contain details of the file transfer protocol itself. That information is in section 7. Note that this section only gives a general overview of what needs to be done. Specific details are not provided since they vary depending on the actual technology you use. For this reason, Westpac can provide only limited assistance to customers using custom integration. We recommend that you only undertake a custom integration if you have previous experience with HTTPS and client certificates. To use the Westpac HTTPS file transfer service, you will need a HTTP client that supports the following standards: HTTP TLS 1.2 or higher Recommendations Log detailed information about each file you upload and download. This information will help you diagnose any potential problems you may encounter later. You should not log your certificate details or any full credit card numbers contained in the file. Protect your certificate file. If necessary, restrict the permissions on this file so that only your application can access the certificate. 6.2 Handling Errors If you encounter a network error or HTTP 500 response code, your system should automatically retry the request. You should wait at least 5 minutes before retrying the request, and you should only retry for a maximum of 4 hours before you investigate the cause of the issue manually. 6.3 Installing the Client Certificate You must use an SSL client certificate to communicate with the Westpac server. This certificate will be provided to you by Westpac. You may not use a certificate from another source (e.g. Verisign). Your certificate is generally provided in PKCS12 (or PFX) format. This file format requires a password for the certificate. You will be provided with this certificate password. Do not confuse this password with the password you use to login to any Westpac websites. Your certificate password will always start with a C. A few HTTP libraries require the client certificate file to be in PEM format. If this is the case, please ensure that you get the certificate in the correct format. Once you have obtained your certificate in the correct format, you must reference it from your HTTP library. The details of this will vary between HTTP libraries, so consult the documentation for your HTTP library. Page 12

13 Be sure to document the procedure to install the certificate, since the certificate must be replaced every 2 years. 6.4 Protecting Your Certificate Your certificate file is used to authorise your requests to the Westpac server. Do not give your certificate file to anyone. Never your certificate in clear text. Always use a secure method to copy your certificate file to your server. 6.5 Upgrading Your Certificate Your certificate is valid for a maximum of 2 years. When your certificate is near expiry, you will be contacted by Westpac with details on how to get a new certificate file. The steps to install your new certificate will vary depending on your technology, so it is important to document this procedure for later use. Page 13

14 7 Appendix: File Transfer Protocol This section documents the HTTPS file transfer protocol for uploading and downloading files. Authentication is based on your client certificate and the IP address that your request comes from. 7.1 Uploading Files HTTP Request To upload a file, send a HTTPS POST to the following URL: You must choose a unique file name for each file you upload. To ensure uniqueness of file names, include the file type, date and a daily sequence number in the file name. An example upload HTTP request is shown below. Note that represents an ASCII carriage-return line-feed sequence. POST /services/messaging/rest/uploadedfiles/de _01.txt HTTP/1.1 Content-Type: application/octet-stream Host: ws.support.qvalent.com:443 Content-Length: 19 This is a test file Note that no special HTTP headers are required. You simply include the file name in the URL and the file contents in the HTTP request body HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 202 Accepted The file has been accepted for processing. The file can still be rejected at a later time if it is malformed, but the file transfer has been successful. 400 Bad Request You have reused an old file name for a new file. You must use a unique file name for each file you upload. 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in Westpac s system. 404 Not Found The file name you have specified is not acceptable. The file name may contain letters, numbers underscores, dashes and full stops. Retry your upload request with a different file name. 500 Internal Server Error 503 Service Unavailable The Westpac server has encountered an internal error. Retry the same upload request again later. You have tried to upload too many files at the same time. You should upload only one file at a time. Page 14

15 An example upload HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ Accepted Content-Length: 0 Date: Mon, 30 Aug :24:20 GMT Handling Errors If you receive a network error or HTTP 500 status when transmitting your file, you can simply run the same upload command again (re-using the same file name). This will never result in a duplicate file because Westpac will silently ignore duplicate files with the same name. If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 7.2 Listing Files for Download HTTP Request To get the list of files for download, send a HTTP GET to the following URL: You can choose the format of the file list using the HTTP Accept header as shown in the following table: HTTP Accept Header text/plain text/xml or application/xml Response Format The list of files is in plain text with each file name on a different line. If no files are available for download, the HTTP status code will be 204. If files are available for download, the HTTP status code will be 200. The list of files is in XML format as shown in the example in the next section. An example HTTP request is shown below where the file list is requested in plain text format: GET /services/messaging/rest/filesfordownload/ HTTP/1.1 Accept: text/plain Host: ws.support.qvalent.com:443 An example HTTP request is shown below where the file list is requested in XML format: GET /services/messaging/rest/filesfordownload/ HTTP/1.1 Accept: application/xml Host: ws.support.qvalent.com: HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 200 OK The list of files for download is returned in the response body. 204 No Content No files are available for download (plain text only). Page 15

16 HTTP Status Code Meaning 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in our system. 404 Not Found The URL in the request is incorrect. It should be /services/messaging/rest/filesfordownload/ 500 Internal Server Error The Westpac server has encountered an internal error. Retry the same request again later. An example plain text HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ OK Expires: 0 Pragma: no-cache Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate Content-Type: text/plain Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked 16 File1.txt File2.txt 0 An example XML HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ OK Expires: 0 Pragma: no-cache Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate Content-Type: text/xml Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked e8 <?xml version="1.0" encoding="utf-8"?> <downloadfilelist xmlns=" <file> <filename>file1.txt</filename> <filename>file2.txt</filename> </file> </downloadfilelist> Handling Errors Requesting the list of files for download does not change the server state in any way, so you can safely request the list as many times as you need to. If you receive a network error or HTTP 500 status when requesting the list, you can simply repeat the same request again. Page 16

17 If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 7.3 Downloading a File HTTP Request To download a file, select the file name from the list of files available for download and send a HTTP GET to the following URL: An example download HTTP request is shown below: GET /services/messaging/rest/filesfordownload/file1.txt HTTP/1.1 Host: ws.support.qvalent.com: HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 200 OK The file contents are returned in the response body. 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in our system. 404 Not Found The file name you specified no longer exists in the list of files available for download. 500 Internal Server Error The Westpac server has encountered an internal error. Retry the same download request again later. An example plain text HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ OK Expires: 0 Pragma: no-cache Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate Content-Type: application/octet-stream Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked 13 This is a test file Handling Errors Downloading a file does not change the server state in any way, so you can safely download the file as many times as you need to. If you receive a network error or HTTP 500 status when downloading the file, you can simply repeat the same download request again. Page 17

18 If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 7.4 Deleting a File HTTP Request To delete a file from the list of files available for download, send a HTTP DELETE to the following URL: An example download HTTP request is shown below: DELETE /services/messaging/rest/filesfordownload/file1.txt HTTP/1.1 Host: ws.support.qvalent.com: HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 204 No Content The file was deleted from the list successfully. 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in our system. 404 Not Found The file name you specified is not valid. Ensure that the file name you are trying to delete was copied exactly from the list of files for download. 500 Internal Server Error The Westpac server has encountered an internal error. Retry the same delete request again later. An example delete HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ No Content Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked Handling Errors If you receive a network error or HTTP 500 status, you can simply repeat the same delete request again. If the file has already been deleted, the server will ignore the delete request and return a HTTP 204 status. If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. Page 18

19 8 Appendix: Westpac HTTPS addresses 8.1 Test Environment Upload File Files for Download List Download/Delete File Production Environment Upload File Files for Download List Download/Delete File Page 19

20 Appendix D FAQ Q) I execute the downloadfile.cmd and receive the following error: Curl: (22) The requested URL returned error: 502 A) The file you are trying to fetch may have a space in its name. Contact Westpac and ask them to check that there is no space in the filenames being fetched. Page 20

SOAP File Transfer. Specification

SOAP File Transfer. Specification SOAP File Transfer Specification Version 1.4 1-Sep-2015 Date Version Description 18-Aug-2009 1.0 Original Version 30-Aug-2010 1.1 Added section on sample code 30-Jun-2011 1.2 Added FAQ section 03-Jul-2015

More information

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1 The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images

More information

Web Services User Guide

Web Services User Guide This document covers how to process XML Requests and Responses using the Secure Trading Web Services interface. Published: 28 March 2018 3.8 (a) Table of Contents 1 Introduction... 3 1.1 Required steps...

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Troubleshooting Guide ir Advance Series

Troubleshooting Guide ir Advance Series e Maintenance Troubleshooting Guide Last Revised 20/02/2013 Contents Introduction... 3 Possible Causes... 3 Models Supported by this Document... 3 Things to check... 4 How to check if the date, time and

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Oracle Hospitality OPERA Exchange Interface HTTP Communication Specification for Business Event XML Retrieval. October 2017

Oracle Hospitality OPERA Exchange Interface HTTP Communication Specification for Business Event XML Retrieval. October 2017 Oracle Hospitality OPERA Exchange Interface HTTP Communication Specification for Business Event XML Retrieval October 2017 Copyright 2008, 2017, Oracle and/or its affiliates. All rights reserved. This

More information

Internet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP

Internet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP Web Programming - 2 (Ref: Chapter 2) TCP/IP Basics Internet Architecture Client Server Basics URL and MIME Types HTTP Routers interconnect the network TCP/IP software provides illusion of a single network

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10 EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No

More information

BROADBEAN Administrators Guide to managing failures

BROADBEAN Administrators Guide to managing failures BROADBEAN Administrators Guide to managing failures BROADBEAN TECHNOLOGY support@broadbean.com 020 7536 1668 www.broadbean.com The purpose of this guide is to help you manage the failure notifications

More information

CYAN SECURE WEB HOWTO. SSL Intercept

CYAN SECURE WEB HOWTO. SSL Intercept CYAN SECURE WEB HOWTO January 2009 Applies to: CYAN Secure Web 1.6 and above allows you to inspect SSL encrypted traffic. Therefore all filter mechanisms can be applied to HTTPS traffic. Without, all data

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

Combating Common Web App Authentication Threats

Combating Common Web App Authentication Threats Security PS Combating Common Web App Authentication Threats Bruce K. Marshall, CISSP, NSA-IAM Senior Security Consultant bmarshall@securityps.com Key Topics Key Presentation Topics Understanding Web App

More information

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol

More information

Security Guide Release 4.0

Security Guide Release 4.0 [1]Oracle Communications Session Monitor Security Guide Release 4.0 E89197-01 November 2017 Oracle Communications Session Monitor Security Guide, Release 4.0 E89197-01 Copyright 2017, Oracle and/or its

More information

Configuring 802.1X Settings on the WAP351

Configuring 802.1X Settings on the WAP351 Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

new world ERP Server Migration Checklist New World ERP TMS

new world ERP Server Migration Checklist New World ERP TMS new world ERP Server Migration Checklist Revised 2/20/17 Table of Contents Overview... 3 Document and Build Environments... 4 Test the New Servers... 7 Cut Over to New Servers... 8 Appendix A: Server Documentation

More information

Solibri Solution Center Guide for Account Administrators

Solibri Solution Center Guide for Account Administrators Guide for Account Administrators Copyright 2016 Solibri, Inc. Content... 1 1 Terminology... 2 2 Accessing the... 4 2.1 Account Registration... 4 2.1.1 New Customer... 4 2.1.2 Existing Customer with Known

More information

Scan Report Executive Summary

Scan Report Executive Summary Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 08/28/2017 Scan expiration date: 11/26/2017 Part 2. Component

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

Gatesms.eu Mobile Solutions for Business

Gatesms.eu Mobile Solutions for Business TECHNICAL SPECIFICATIONS XML Web API GATESMS.EU, version 1.1 Prepared by: Gatesms.eu Contents Document version history...3 Security...3 General requirements...3 HTTP transmission security mechanism...3

More information

CMSC 332 Computer Networking Web and FTP

CMSC 332 Computer Networking Web and FTP CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into

More information

Configuring Cisco Unity and Unity Connection Servers

Configuring Cisco Unity and Unity Connection Servers CHAPTER 6 Configuring Cisco Unity and Unity Connection Servers Cisco Unity Servers Cisco Unity receives calls, plays greetings, and records and encodes voicemail. When a voicemail is received, Cisco Unity

More information

Compliance with RFC 3261

Compliance with RFC 3261 APPENDIX A Compliance with RFC 3261 This appendix describes how the Cisco Unified IP Phone 7960G and 7940G complies with the IETF definition of SIP as described in RFC 3261. It contains compliance information

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

How to work with HTTP requests and responses

How to work with HTTP requests and responses How a web server processes static web pages Chapter 18 How to work with HTTP requests and responses How a web server processes dynamic web pages Slide 1 Slide 2 The components of a servlet/jsp application

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Programming basics Integration Guide. Version 6.2.1

Programming basics Integration Guide. Version 6.2.1 Programming basics Integration Guide Version 6.2.1 As of: 04.10.2016 Table of Contents Programming... 4 Merchant Interface variants... 4 Security: Payment Card Industry Data Security Standard (PCI DSS)...

More information

Internet Script Editor

Internet Script Editor ISE Application, page 1 ISE Functionality, page 1 ISE Requirements, page 2 TLS Requirements for ISE, page 2 ISE Installation and Upgrades, page 5 Troubleshooting Tools for, page 7 ISE Application You can

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Enhancements Added support for VLProxy thread dumps in support bundles. Requires VersaLex or later.

Enhancements Added support for VLProxy thread dumps in support bundles. Requires VersaLex or later. * RELEASE 2.9-2011/11/14 * - Added support for VLProxy thread dumps in support bundles. Requires VersaLex 4.3.42 or later. - VLProxy takes approximately 90 seconds to recognize that a VLTrader has abnormally

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Quick Installation Guide for Oracle Identity Management 11g Release 1 (11.1.1) E10033-01 May 2009 This guide is designed to help you quickly install the most common Oracle Identity

More information

System Administration

System Administration Most of SocialMiner system administration is performed using the panel. This section describes the parts of the panel as well as other administrative procedures including backup and restore, managing certificates,

More information

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

Etasoft XT Server 1.x

Etasoft XT Server 1.x Etasoft XT Server 1.x XT Server is a set of tools for automated data translation, validation and file processing. Setup Install software using setup program xtserver_setup.exe. Package contains both GUI

More information

USER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?

USER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password? USER GUIDELINES Revision 1.8 20 August, 2015 Q 1. How can I log into my webmail? Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

Scan Report Executive Summary

Scan Report Executive Summary Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 11/20/2017 Scan expiration date: 02/18/2018 Part 2. Component

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

Troubleshooting CHAPTER

Troubleshooting CHAPTER CHAPTER 10 This chapter provides information for diagnosing and correcting common problems that may occur when you install and operate the client adapter. The following topics are covered in this chapter:

More information

Highwinds CDN Content Protection Products. August 2009

Highwinds CDN Content Protection Products. August 2009 Highwinds CDN Content Protection Products August 2009 1 Highwinds CDN Content Protection Products August 2009 Table of Contents CDN SECURITY INTRO... 3 CONTENT PROTECTION BY CDN DELIVERY PRODUCT... 3 HTTP

More information

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates. Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4

More information

eroaming platform Secure Connection Guide

eroaming platform Secure Connection Guide eroaming platform Secure Connection Guide Contents 1. Revisions overview... 3 2. Abbrevations... 4 3. Preconditions... 5 3.1. OpenSSL... 5 3.2. Requirements for your PKCS10 CSR... 5 3.3. Java Keytool...

More information

RESTFUL WEB SERVICES - INTERVIEW QUESTIONS

RESTFUL WEB SERVICES - INTERVIEW QUESTIONS RESTFUL WEB SERVICES - INTERVIEW QUESTIONS http://www.tutorialspoint.com/restful/restful_interview_questions.htm Copyright tutorialspoint.com Dear readers, these RESTful Web services Interview Questions

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

TACHO ONLINE API. TUNGVOGNSSPECIALISTEN APS Københavnsvej 265, DK-4000 Roskilde

TACHO ONLINE API. TUNGVOGNSSPECIALISTEN APS Københavnsvej 265, DK-4000 Roskilde 2018 TACHO ONLINE API TUNGVOGNSSPECIALISTEN APS Københavnsvej 265, DK-4000 Roskilde CONTENT What s new?... 5 Tacho activities... 5 Welcome... 5 More information... 5 Terminology... 5 TVS... 5 Tacho Online...

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

The CartIt Commerce System Installation Guide

The CartIt Commerce System Installation Guide The CartIt Commerce System Installation Guide On Windows Operating Systems Version 8.0 February 3, 2003 Copyright 2001 CartIt Corporation. All Rights Reserved. Page 1 of 10 THE CART IT COMMERCE SYSTEM

More information

AppDirector and AppXcel With Oracle Application Server 10g Release 3 ( ) - Oracle SOA Suite Enterprise Deployment

AppDirector and AppXcel With Oracle Application Server 10g Release 3 ( ) - Oracle SOA Suite Enterprise Deployment AppDirector, AppXcel with Oracle SOA Suite 7/16/2008 TESTING & INTEGRATION GROUP AppDirector and AppXcel With Oracle Application Server 10g Release 3 (10.1.3.1.0) - Oracle SOA Suite Enterprise Deployment

More information

Oracle Hospitality OPERA Exchange Interface Communication Vendor Specification. October 2017

Oracle Hospitality OPERA Exchange Interface Communication Vendor Specification. October 2017 Oracle Hospitality OPERA Exchange Interface Communication Vendor Specification October 2017 Copyright 1987, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

DRAFT COPY

DRAFT COPY Inter-Entity Payment Protocol (IPP) The Inter-Entity Payment Protocol (IPP) facilitates adhoc interactions between independent accounting systems on the web. It is a server-to-server protocol. 1 Brands,

More information

Australia Online Forms for Research Software User Manual

Australia Online Forms for Research Software User Manual Australia Online Forms for Research Software User Manual Version 1.3 Released 21 August 2010 2 P a g e A u s t r a l i a O n l i n e F o r m s f o r R e s e a r c h Contents 1. Introduction 5 2. Getting

More information

Oracle Payment Interface Oracle Hospitality Simphony FE MGDH Installation Guide Release E April 2017

Oracle Payment Interface Oracle Hospitality Simphony FE MGDH Installation Guide Release E April 2017 Oracle Payment Interface Oracle Hospitality Simphony FE MGDH Installation Guide Release 6.1.1 E85861-01 April 2017 Copyright 2010, 2017, Oracle and/or its affiliates. All rights reserved. This software

More information

Install and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.2 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

Information About SIP Compliance with RFC 3261

Information About SIP Compliance with RFC 3261 APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information

More information

Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus

Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus This document will take you through setting up your Clark Exchange mailbox in Outlook 2003 from off-campus. This will

More information

Network Working Group Internet Draft: SMTP Authentication Document: draft-myers-smtp-auth-00.txt April SMTP Service Extension for Authentication

Network Working Group Internet Draft: SMTP Authentication Document: draft-myers-smtp-auth-00.txt April SMTP Service Extension for Authentication HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 10:24:33 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 01 May 1995 22:00:00 GMT ETag: "361c6c-32a5-2fa559e0" Accept-Ranges: bytes Content-Length: 12965 Connection:

More information

DTrade Frequently Asked Questions (FAQs)

DTrade Frequently Asked Questions (FAQs) DTrade Frequently Asked Questions (FAQs) BASIC USE Q: I m new to DTrade. Where can I find information on how to start using DTrade? A: The DTrade Information Center web page is accessible via the DDTC

More information

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.): Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 02/18/2018 Scan expiration date: 05/19/2018 Part 2. Component

More information

REST. Lecture BigData Analytics. Julian M. Kunkel. University of Hamburg / German Climate Computing Center (DKRZ)

REST. Lecture BigData Analytics. Julian M. Kunkel. University of Hamburg / German Climate Computing Center (DKRZ) REST Lecture BigData Analytics Julian M. Kunkel julian.kunkel@googlemail.com University of Hamburg / German Climate Computing Center (DKRZ) 11-12-2015 Outline 1 REST APIs 2 Julian M. Kunkel Lecture BigData

More information

Installation guide for Choic Multi User Edition

Installation guide for Choic Multi User Edition Installation guide for ChoiceMail Multi User Edition March, 2004 Version 2.1 Copyright DigiPortal Software Inc., 2002 2004 All rights reserved ChoiceMail Multi User Installation Guide 1. Go to the URL

More information

Vendor Interface Specification

Vendor Interface Specification Connecticut XIX HIPAA Translator Vendor Interface Specification DXC Technology 195 Scott Swamp Road Farmington, CT 06032, USA Page 1 of 31 Version 4.0 -- Approval Date November April 10, 2017 Table of

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Integration Architecture Of SDMS

Integration Architecture Of SDMS Integration Architecture Of SDMS 20 May 2017 Version 1.0 (Rakesh Ranjan, Consultant-IT) Table of Content 1 ABOUT SDMS...2 2 OBJECTIVE & STRUCTURE OF THIS DOCUMENT...2 3 TRANSACTIONAL SERVICES...3 3.1 HIGH

More information

Accella Toolbar. User Guide. Release 20.0

Accella Toolbar. User Guide. Release 20.0 Accella Toolbar User Guide Release 20.0 Table of Contents 2 Introduction... 9 2.1 About Accella Toolbar... 9 2.2 About This Guide... 9 2.3 Accessing Toolbar... 9 2.4 First Time Login... 10 2.5 Subsequent

More information

CONFIGURATION MANUAL. English version

CONFIGURATION MANUAL. English version CONFIGURATION MANUAL English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the

More information

Telephony Toolbar Enterprise. User Guide

Telephony Toolbar Enterprise. User Guide Telephony Toolbar Enterprise User Guide Release 4.4 October 2009 Table of Contents 1 Summary of Changes... 7 1.1 Changes for this Release... 7 2 About This Guide... 8 2.1 Open Telephony Toolbar-Corporate...

More information

BEAAquaLogic. Service Bus. MQ Transport User Guide

BEAAquaLogic. Service Bus. MQ Transport User Guide BEAAquaLogic Service Bus MQ Transport User Guide Version: 3.0 Revised: February 2008 Contents Introduction to the MQ Transport Messaging Patterns......................................................

More information

CONTENTS IN DETAIL INTRODUCTION 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 2 CONFIGURING PHP 19

CONTENTS IN DETAIL INTRODUCTION 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 2 CONFIGURING PHP 19 CONTENTS IN DETAIL INTRODUCTION xiii 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 #1: Including Another File as a Part of Your Script... 2 What Can Go Wrong?... 3 #2:

More information

TOA4 Remote Procedure Call (RPC) API

TOA4 Remote Procedure Call (RPC) API TOA4 Remote Procedure Call (RPC) API Introduction The purpose of the TOA4 RPC API is to allow external software applications to exchange data with TOA4 and activate certain TOA4 functions. The TOA4 RPC

More information

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification DCCKI Interface Design Specification and DCCKI Repository Interface Design Specification 1 INTRODUCTION Document Purpose 1.1 Pursuant to Section L13.13 of the Code (DCCKI Interface Design Specification),

More information

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Microsoft OWA 2013 IIS Integration

Microsoft OWA 2013 IIS Integration Microsoft OWA 2013 IIS Integration Contents 1 Introduction 2 Compatibility 3 Prerequisites 4 File Downloads 5 Architecture 6 Installation 6.1 Software Installation 6.2 Configuration of the IIS Filter 6.2.1

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Header Status Codes Cheat Sheet

Header Status Codes Cheat Sheet Header Status Codes Cheat Sheet Thanks for downloading our header status codes cheat sheet! Below you ll find all the header status codes and their meanings. They are organized by sections, starting with

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Destiny Library Manager

Destiny Library Manager Destiny Library Manager Setting Up One Search Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and

More information

Easy UI Solution 2.1 Installation Guide

Easy UI Solution 2.1 Installation Guide Easy UI Solution 2.1 Installation Guide Thank you for selecting our product. This guide is intended for System Administrators, and describes how to install Easy UI Solution 2.1 (hereafter referred to as

More information

Cisco Prime Optical 9.5 Basic External Authentication

Cisco Prime Optical 9.5 Basic External Authentication Cisco Prime Optical 9.5 Basic External Authentication June 6, 2012 This document describes the basic external authentication functionality in Cisco Prime Optical 9.5 running on a Solaris server. External

More information

Oracle Communications WebRTC Session Controller

Oracle Communications WebRTC Session Controller Oracle Communications WebRTC Session Controller Security Guide Release 7.0 E40975-01 November 2013 Oracle Communications WebRTC Session Controller Security Guide, Release 7.0 E40975-01 Copyright 2013,

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter Release 12.2.1.1.0 E73562-01 June 2016 Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter, Release 12.2.1.1.0 E73562-01 Copyright 2015,

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

How SMART (Secure Malware Alert and Removal Tool) Works

How SMART (Secure Malware Alert and Removal Tool) Works FAQ How SMART (Secure Malware Alert and Removal Tool) Works 1. SMART downloads a copy of the files from your server to ours. 2. SMART scans a file for any malicious code on our end. 3. From here, there

More information

Kernel Migrator. for SharePoint. Configuration Guide

Kernel Migrator. for SharePoint. Configuration Guide Kernel Migrator for SharePoint Table of Contents 1. System Requirements... 4 1.1 Minimum System Requirements... 4 1.2 Required Operating Systems... 4 1.3 Supported Virtual Environment... 4 1.4 Supported

More information

Crystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS)

Crystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS) Overview Contents This document provides an overview to web server technology particularly Microsoft s Internet Information Server (IIS) and its relationship with. Although this article has been written

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident

More information

Aspera Connect Mac: OS X 10.6, 10.7, 10.8, Revision: Generated: 11/11/ :29

Aspera Connect Mac: OS X 10.6, 10.7, 10.8, Revision: Generated: 11/11/ :29 Aspera Connect 3.5.2 Mac: OS X 10.6, 10.7, 10.8, 10.9. 10.10 Revision: 3.5.2.95905 Generated: 11/11/2014 17:29 Contents 2 Contents Introduction... 3 System Requirements... 4 Setting up Connect... 5 Part

More information