File transfer clients manual File Delivery Services

Size: px
Start display at page:

Download "File transfer clients manual File Delivery Services"

Transcription

1 File transfer clients manual File Delivery Services

2 Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) IT261 FDS Operation Version 4.0 / February 2016 Download the latest version from: File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 2/29

3 Table of contents 1. General Purpose Definitions, acronyms and abbreviations Names, prices, versions, etc SFTP Introduction Security Encryption algorithms Message Authentication Codes (MAC) Public and private key Creating an SSH key pair with PuTTY Creating an SSH key pair with OpenSSH FTP brief overview Password policy Changing the password Command-Line FTP Client Graphic FTP clients WS_FTP FileZilla Transmitting data in ASCII and/or binary mode Connection to FDS Introduction Test of the connection FileZilla Importing a key with FileZilla Automatic import with PuTTY s Pageant Notes on FileZilla CuteFTP Importing a key with CuteFTP WS_FTP Professional Importing a key with WS_FTP Professional WinSCP Importing a key with WinSCP Notes on WinSCP File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 3/29

4 1. General 1.1 Purpose FDS customers use very different types of software clients and scripts to transfer data. In order to counteract this influx of clients, we have decided to test those that are used the most and to describe the most important functions and thus restrict usage and support to these areas. 1.2 Definitions, acronyms and abbreviations Word FTP SSH SCP SFTP PuTTY Definition File Transfer Protocol SSH or Secure Shell refers to both a network protocol and the respective programmes that are used to establish an encrypted connection with a remote computer in a secure manner. Secure CoPy or SCP is a protocol for the encrypted transmission of data between two computers in a computer network. SFTP or SSH File Transfer Protocol is a further development of SCP and enables the secure transmission of data to remote systems. PuTTY is a free SSH client, developed by Simon Tatham for Microsoft Windows. 1.3 Names, prices, versions, etc. Software price version* (2 2016) ftp sftp (ssh) url FileZilla (filezilla project) free yes yes ("recommended") CuteFTP Professional charged 9.0 yes yes (globalscape) WS_FTP Professional charged 12.4 yes yes (Ipswitch) WinSCP free yes yes *Although previous and future versions of software, similar to other SFTP and FTP clients should generally function without a problem with FDS, our IT unit can only provide limited support for problems that occur with versions/software not listed here. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 4/29

5 2. SFTP 2.1 Introduction SFTP (SSH Secure File Transfer Protocol) is a file transfer protocol and a secure alternative to FTP. The connection between client and server is encrypted, making it impossible for an outsider to observe and collect data. By using Public-Key authentication, the integrity and confidentiality of the data exchanged is ensured. SSH assures that data are complete and unchanged from sender to receiver. Attention: to correct common misconceptions, SFTP is not FTP over SSH (sometimes called Secure FTP), nor is it particularly like FTP at the protocol level. It should also not be confused with FTPS (FTP over SSL). The FDS SFTP server supports: version 2 SSH, version 3 SFTP protocol, inbound SCP commands using SSH/SCP protocol, as supported by OpenSSH. Note that SCP does not support list, delete or rename, transfers of files 15 Gigabytes in size, 30 concurrent inbound connections from the same user account, user account locking for 30 minutes after 5 failed attempts, SSH keys in OpenSSH, ssh.com and PuTTY format, more than 1 SSH key for each user account. The FDS SFTP server does not support: version 1 SSH, interactive shell session, transfer resumption, change of password, change of file attributes, manipulations of the directories structure. 2.2 Security The FDS customers must ensure that their file transfer software are up-to-date. It is particularly important that only encryption algorithms and message authentication codes (MAC) considered as safe are used. Post CH Ltd and its service and business units will not assume responsibility or liability for any damages that are incurred due to the use of unsecure algorithms and/or MAC methods Encryption algorithms The AES algorithm has to used and with a key length of at least 128 bits. Information Technology Post reserves the right to not support unsafe algorithms (like as example twofish, blowfish or arcfour) or algorithms with a key length < 128 bits anymore and this without advance notification Message Authentication Codes (MAC) MAC is a symmetric encryption method used to ensure the integrity of a message. A safe MAC procedure is hmac-sha Information Technology Post reserves the right to not support unsafe MAC (like as example hmac-sha1 or hmacmd5) anymore and this without advance notification. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 5/29

6 2.3 Public and private key With the help of an encryption system, messages can be digitally signed and encrypted within a network and when the parameters are chosen carefully (e.g. key length) they will not be 'cracked' any time soon. An asymmetrical crypto-system is a type of encryption in which each of the communicating parties has a key pair. This pair is composed of a private key and a public key. The public key enables anyone to encrypt data for the holder of the private key and to check or authenticate the digital signatures. The private key enables its holder to decode data that has been encrypted with the public key and to generate or authenticate digital signatures. However, the sender needs the public key of the recipient for each encrypted transmission. This can be sent by , for example, or be downloaded from a web site. - The public key has to be sent to Swiss Post (in accordance with the instructions in the FDS letter of confirmation) and is stored on the Swiss Post FDS server. - The private key must remain on your computer and may NEVER be given to others! - The pair of keys must be generated by the participant. - FDS supports both RSA (Rivest-Shamir-Adleman) or DSA (Digital Signature Algorithm) keys algorithms. - It is required to use a minimum of 4096 bits for the generated key. NOTE: It is highly recommended to protect the key file with a passphrase. This will encrypt the private key when it is saved in a secure location on the local machine. Using passphrases for batch SSH-keys requires familiarity with the SSH-agent authentication subsystem. Participants should be aware that the use of strong encryption methods and encrypted SSH-keys is advisable but will raise administration efforts and system complexity Creating an SSH key pair with PuTTY PuTTY is an open source software for Microsoft Windows. It can be downloaded at Beside a SFTP client (putty.exe) puttygen offers the possibility to generate key pairs. Start PUTTYGEN File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 6/29

7 Check whether SSH-2 (RSA or DSA) and at least 4096 (bits) are selected and then: Click "Generate" 2048 Move the cursor over the blank area File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 7/29

8 When it is ready, the mask appears with the keys. Select "Save public key" Give the "public key" a name that makes sense, and save it File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 8/29

9 Select "Save private key" It is highly recommended to protect the key file with a passphrase. This will encrypt the private key when it is saved in a secure location on the local machine. Using passphrases for batch SSH-keys requires familiarity with the SSH-agent authentication subsystem. Participants should be aware that the use of strong encryption methods and encrypted SSH-keys is advisable but will raise administration efforts and system complexity. In this example we will continue without passphrase. PLEASE NOTE: The private key must remain on your computer and may NEVER be given to others! Give the "private key" a name that makes sense, and save it File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 9/29

10 2.3.2 Creating an SSH key pair with OpenSSH OpenSSH is available for any UNIX operating environment and common Linux distributions. Further information about OpenSSH is available at: Below is an example of the generation of a key pair using OpenSSH: ssh-keygen -b t rsa -f /tmp/demo_key -C "comment for demo key" Here is an example of a private key: # cat /tmp/demo_key -----BEGIN RSA PRIVATE KEY----- MIIJKAIBAAKCAgEAybf8vCaIZc8pSTgpbVUD3aBVC1AnKfBHIqGZA9E7w/TMcs9p meou4nfb9vhqbxptwlg/qftg6xrcxhlcjwfe3rv5eq3sbj3tvlqiz89sh/gg21si < --- SNIP --- > ACdBLStDxIURm03gmMcBhKHDq4owQlDyESva0LWhIaxFwHpzamOAbPYVqBMbqT38 Bc1eGl0EE4d3yyWoMLOpwbsbhbmjSUjVV4JeDpNciqADBK5mQ3HNGNyKNqQ= -----END RSA PRIVATE KEY----- And here is an example of a public key (this one is automatically generated with the ending.pub): # cat /tmp/demo_key.pub ssh-rsa AAAAB3NzaC1yc2EAAAADAQABA < --- SNIP --- > 6mEO5Gh28Vw== comment for demo key File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 10/29

11 3. FTP 3.1 brief overview The FTP protocol comes from the early days of the Internet, which is quite different from what it is today. At that time, data needed to be transmitted from one computer to another. There was no need for a virus scanner and firewall. The original FTP protocol therefore has a characteristic that is sometimes problematic in combination with some firewalls. To get round the typical FTP problems, a modified FTP protocol has been developed known as "Passive FTP". This is particularly an issue in relation to firewalls and Internet access. Typically, the FTP service uses two ports rather than one: port 21 for control (control port) and port 20 for the data (data port). But the main problem of FTP is its lack of security as all data including username and password are transmitted in clear text. For this reason the use of FTP is forbidden for new internet customers since June Existing customers will have to change to the protocol SFTP until December The FDS FTP server supports: transfers of files 15 Gigabytes in size, 30 concurrent inbound connections from the same user account, user account locking for 30 minutes after 5 failed attempts, change of passwords with the SITE command. The FDS FTP server does not support: transfer resumption, change of file attributes, manipulations of the directories structure. 3.2 Password policy Passwords are valid for a maximum of 90 days and have to be changed by the end of this period at the latest. If this is not done, the FDS system will no longer allow access. The last 24 defined passwords may not be used again. The new password is activated immediately. Passwords have to be at least 8 digits long and can be up to a maximum of 28 digits long. Passwords that are reset by Post CH Ltd s FDS must be changed after they have been used for the first time. Passwords must contain at least two of the following $, %, &, ^, *, numerals [0-9], uppercase letters [A-Z]. Creating passwords by simply "counting up" is not recommended (example: MyPaWo-01, MyPaWo-02, MyPaWo-03, ). Passwords must be chosen so as to be difficult to guess. Passwords should therefore not be composed of identical or consecutive letters or numbers, or of a simple row of keys on the keyboard, nor should they be made up of well-known words. 3.3 Changing the password The FTP command to change the password must follow this format: site cpwd <new-password> Below, 3 examples are given with a command line, showing two graphic FTP clients. If your graphic FTP client does not support the function "Execute FTP command" you can resort to the Windows DOS FTP client to change the password. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 11/29

12 3.3.1 Command-Line FTP Client ~> ftp d fds.post.ch Connected 220 FDS FTP Server ready. ftp_login: user `<null> pass `<null> ---> USER ftpuser1 331 Password required for ftpuser1. ---> PASS XXXX 230 User ftpuser1 logged in. ---> SYST 215 UNIX Type: A Remote system type is UNIX. ---> site cpwd 2short 550 Requested action not taken. password violates policy. ---> site cpwd this!is!good! 200 command successful. ---> QUIT 221 Goodbye Graphic FTP clients WS_FTP In order to change the password with the graphic FTP client "WS_FTP", proceed as follows: Description In the display of the FDS server, open the context menu with the right-mouse key. Select the "Operation" menu item. Screenshot Open the "FTP Commands" sub-menu followed by the "SITE" sub-menu. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 12/29

13 In the "Site command" window enter the command: site cpwd <new-password> and confirm by clicking OK. In the Log window you can check whether the command has been executed FileZilla In order to change the password with the graphic FTP client "FileZilla", proceed as follows: Description With FileZilla open, go to the "Server" menu and open the "Enter custom command" sub-menu. Screenshot In the open input window enter the command site cpwd followed by your new password. Confirm your input with OK In the Log window you can check whether the command has been executed. 3.4 Transmitting data in ASCII and/or binary mode When files are transferred we differentiate between two different modes: ASCII mode, which is exclusively for text files and binary mode, which is for all other files. ASCII Binary In ASCII mode, the line structure of the source computer is converted to the line structure of the target computer, during which code conversion can take place (e.g. EBCDIC --> ASCII). In binary mode, the file is transmitted byte by byte, which is important with regard to archive files. Binary files have to be transmitted in this mode to ensure that random byte combinations, which represent the line break to be converted (as in ASCII mode) are not changed by accident, which, in a worst-case scenario, would render the binary file useless. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 13/29

14 4. Connection to FDS 4.1 Introduction The FDS customer may use the file transfer client of their choice. Our IT unit can only provide limited support for problems that occur with versions/software not listed here as well as for the implementation of transfer solutions. The FDS server is reachable at the address fdsbc.post.ch (internet and leased lines) or fdsbc.pnet.ch (internal post network). The FDS protocols are running on standard ports (21 for FTP and 22 for SFTP). Relevant details like user name, names of directories, file names, schedule of transmission, etc. are communicated during the service ordering by the respective customer services of the business unit of Post CH Ltd. Planned service maintenances are published on Test of the connection The connection to FDS can be tested using telnet: # telnet fdsbc.post.ch 22 Trying fdsbc.post.ch... Connected to fdsbc.post.ch. Escape character is '^]'. SSH-2.0-SFTP Server # telnet fdsbc.post.ch 21 Trying fdsbc.post.ch... Connected to fdsbc.post.ch. Escape character is '^]' Welcome to Swiss Post FDS FTP Server 220 Server ready for new user. Please note: the FDS server is using 2 IP addresses. Both addresses can be identified using multiple DNS lookup (nslookup fdsbc.post.ch for instance). The IP addresses may only be used for the configuration of firewall rules. For the connection from your application to the FDS server, it is essential that you use the domain name. In case the FDS server is not reachable, please assure that your firewall does not block the connection. In order to get an efficient help from our side, it is important to provide all needed information (user name, error message, exact time of the concerned connection, file and directory names). File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 14/29

15 5. FileZilla 5.1 Importing a key with FileZilla In FileZilla you can import keys in PuTTY format as well as in OpenSSH format. Start FileZilla => Edit => Settings => SFTP => Add keyfile (then select the correct private key file) This (yellow) line indicates that the key has been imported successfully. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 15/29

16 5.2 Automatic import with PuTTY s Pageant "Pageant" (PuTTY authentication agent) is an SSH agent which can be used to pass on SSH authentications. Pageant can import keys and make local programmes available when requested. The interface is open, meaning that other programmes can connect up with this service by Pageant. Start PAGEANT.EXE Pageant embeds itself in the System Tray on the right underneath the Quickstart bar and shows all the sessions that are saved in Pageant. This icon appears in the task bar: File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 16/29

17 Once it has been opened the "Pageant Key List Window" opens, which at this point is still empty: Select the private key (*.ppk) via "Add Key" and confirm by clicking "Open. Only keys in PuTTY format will be accepted here. If the key appears as in the following example it has been imported correctly and is now located in the computer s memory. Diverse "SSH programmes" and above all, FileZilla, now have direct access to the key from the memory. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 17/29

18 5.3 Notes on FileZilla Swiss Post also uses an IDS/IPS system as one of its protection mechanisms. To avoid being locked out, we recommend limiting the number of transmissions taking place at the same time to one or two at the most! File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 18/29

19 6. CuteFTP 6.1 Importing a key with CuteFTP => Tools => Global Options File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 19/29

20 In Security: Select "SSH2 Security"! Activate the "Use public key authentication" field File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 20/29

21 In "Public key path" click "Folder": and select the correct key (.pub). File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 21/29

22 In "Private key path" click "Folder": and select the correct private key (.ppk). Here are the correctly imported keys: and for an automatic login without a password: Disable the "Use password authentication field"! File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 22/29

23 7. WS_FTP Professional 7.1 Importing a key with WS_FTP Professional Select => Options => SSH and => Client Keys File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 23/29

24 Select => Import => Public Key File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 24/29

25 => here select: MUSTER.pub : followed by "Open" => Next File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 25/29

26 Select => Private Key => here select: MUSTER.ppk: followed by "Open" File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 26/29

27 => Next click: "Finish" File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 27/29

28 8. WinSCP 8.1 Importing a key with WinSCP 1) Start WinSCP 2) Click Advanced 3) then click on Authentication Click " Field" and select the private key 8.2 Notes on WinSCP If you have problems with permissions after uploading files, this can be rectified by going to File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 28/29

29 "Advanced " => Transfer Setting Rule => Disable the "Set permissions" option and activate the "Ignore permissions errors" fields. "Advanced " => Transfer Setting Rule => enable the "Ignore permission error" option. File transfer clients manual Version 4.0 / February 2016 / Post CH Ltd 29/29

FDS manual File Delivery Services SFTP and FTP file transfer

FDS manual File Delivery Services SFTP and FTP file transfer FDS manual File Delivery Services SFTP and FTP file transfer Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

Common Report Engine Leipzig. Ref. 0003

Common Report Engine Leipzig. Ref. 0003 Common Report Engine 08.05.2018 Leipzig Ref. 0003 Table of Contents 1. Introduction 3 1.1 SSH File Transfer Protocol 3 1.2 SSH/SFTP tools 3 2. Setup Process 4 2.1 Generation process for public / private

More information

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers

More information

Project #6: Using ssh, scp and sftp with Key-Based Authentication

Project #6: Using ssh, scp and sftp with Key-Based Authentication Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our

More information

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal

More information

FDS manual File Delivery Services SFTP and FTP file transfer

FDS manual File Delivery Services SFTP and FTP file transfer FDS manual File Delivery Services SFTP and FTP file transfer Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

Setting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing

Setting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Version 2.0 Updated for 2017 Winter Software* Microsoft Windows 7 (64-bit) PuTTY 0.67 PuTTYgen

More information

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows

More information

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I

More information

Table of Contents 1 SSH Configuration 1-1

Table of Contents 1 SSH Configuration 1-1 Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server

More information

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers

More information

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted

More information

LAB :: Secure SHell (SSL)

LAB :: Secure SHell (SSL) LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training

More information

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY

More information

FDS BCM migration user guide File Delivery Services Converting to a location-redundant FDS platform

FDS BCM migration user guide File Delivery Services Converting to a location-redundant FDS platform FDS BCM migration user guide File Delivery Services Converting to a location-redundant FDS platform Publisher Post CH Ltd Information Technology Webergutstrasse 12 3030 Berne (Zollikofen) Switzerland Contact

More information

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server. CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection

More information

Setting up PuTTY. Version Updated for 2015 Fall (with corrections)

Setting up PuTTY. Version Updated for 2015 Fall (with corrections) Setting up PuTTY CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906 Internet Computing Version 1.9.2 Updated for 2015 Fall (with corrections)

More information

Setting up PuTTY. Software* Downoad PuTTY. Download PuTTY Download the putty.zip file. It contains several programs for SSH, SFTP, and SCP.

Setting up PuTTY. Software* Downoad PuTTY. Download PuTTY Download the putty.zip file. It contains several programs for SSH, SFTP, and SCP. Software* Setting up PuTTY Microsoft Windows 7 PuTTY 0.65 PuTTYgen 0.65 WinSCP 5.7.5 CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906

More information

Bitnami Apache Solr for Huawei Enterprise Cloud

Bitnami Apache Solr for Huawei Enterprise Cloud Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,

More information

KB How to upload large files to a JTAC Case

KB How to upload large files to a JTAC Case KB23337 - How to upload large files to a JTAC Case SUMMARY: This article explains how to attach/upload files larger than 10GB to a JTAC case. It also and describes what files can be attached/uploaded to

More information

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13.

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13. Software* Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP

More information

ssh and handson Matsuzaki maz Yoshinobu 1

ssh and handson Matsuzaki maz Yoshinobu  1 ssh and handson Matsuzaki maz Yoshinobu maz@iij.ad.jp 1 Secure Shell (ssh) Replacement for unsecure tools/protocols rsh and telnet Usually listen on tcp/22 Whole communication is encrypted

More information

Enable SSH Access on the Tenable Virtual Appliance (4.4.x-4.7.x) Last Revised: February 27, 2018

Enable SSH Access on the Tenable Virtual Appliance (4.4.x-4.7.x) Last Revised: February 27, 2018 Enable SSH Access on the Tenable Virtual Appliance (4.4.x-4.7.x) Last Revised: February 27, 2018 Table of Contents Introduction 3 Requirements 4 Terminology 5 Generate the Key File 6 Generate a Key for

More information

Ross Whetten, North Carolina State University

Ross Whetten, North Carolina State University Your First EC2 Cloud Computing Session Jan 2013 Ross Whetten, North Carolina State University BIT815 notes 1. After you set up your AWS account, and you receive the confirmation email from Amazon Web Services

More information

Secure File Transfer Protocol (SFTP) Data Submission Users Manual. July 2017, Version 1.6

Secure File Transfer Protocol (SFTP) Data Submission Users Manual. July 2017, Version 1.6 Secure File Transfer Protocol (SFTP) Data Submission Users Manual July 2017, Version 1.6 DOCUMENT CHANGE HISTORY Version Number Date Page(s) Affected 1.0 June 2012 Initial version 1.1 March 2013 Formatting

More information

SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity.

SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity. SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity. Version 1.2 April 2017 Contents Overview... 3 BB-SFTP Functionality... 3 Bloomberg SFTP Connectivity

More information

XFTP 6 User Guide. A Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.

XFTP 6 User Guide. A Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc. XFTP 6 User Guide A Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2018 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been

More information

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config

More information

Application Note. Configuring SSH on Vocality units. Software From V07_04_01. Revision v1.5

Application Note. Configuring SSH on Vocality units. Software From V07_04_01. Revision v1.5 Application Note Configuring SSH on Vocality units Software From V07_04_01 Revision v1.5 Publish Date November 2017 AN309 CONFIGURING SSH SSH requires the Security software (RTUSEC) and a Feature Key on

More information

2-1-1 ssh Secure SHell

2-1-1 ssh Secure SHell 2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup 1 Communicate Safely with Remote Systems 2 What is Safely Authentication I am Assured of Which Host I am Talking

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.2 October 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH

More information

LRS File Transfer Service

LRS File Transfer Service LRS File Transfer Service Version 2 User Guide October 27, 2017 Introduction The LRS File Transfer Service offers customers a secure way to send and receive files using HTTPS or FTPS protocols. This can

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

Implementing Secure Shell

Implementing Secure Shell Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms,

More information

Telnet/SSH. Connecting to Hosts. Internet Technology 1

Telnet/SSH. Connecting to Hosts. Internet Technology 1 Telnet/SSH Connecting to Hosts Internet Technology 1 What is Telnet? Method for connecting to hosts Enables remote login (rlogin) to computers on the Internet One computer can connect to another to use

More information

IT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1

IT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1 IT Services Security The Dark Arts Of SSH Author: John Curran Version: 0.1 STATUS\ REVISION HISTORY Date Version Description 0.1-0.9 Review preparation 1.0 Presented to business & retained by Information

More information

Oracle Utilities Opower Secure File Transfer Specification

Oracle Utilities Opower Secure File Transfer Specification Oracle Utilities Opower Secure File Transfer Specification E84784-01 Specification Version Number: v1-1-0 Last Update: September 14, 2018 Oracle Utilities Opower Secure File Transfer Specification E84784-01

More information

UNIVERSITY OF CYPRUS Computer Science Department

UNIVERSITY OF CYPRUS Computer Science Department UNIVERSITY OF CYPRUS Computer Science Department ΕΠΛ 660 Information Retrieval and Search Engines A guide for connecting to LInC 1 -powered cloud-based Virtual Machines Lab instructor: Pavlos Antoniou

More information

ICE Clear Netherlands

ICE Clear Netherlands ICE Clear Netherlands MANAGED FILE TRANSFER (MFT) USER GUIDE VERSION 1.0 02 December 2016 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent

More information

Bitnami MariaDB for Huawei Enterprise Cloud

Bitnami MariaDB for Huawei Enterprise Cloud Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)

More information

Ftp Command Line Manual Windows User Password

Ftp Command Line Manual Windows User Password Ftp Command Line Manual Windows User Password SSH Guide SFTP on Mac OS X SFTP on Windows The most straight forward way to use SFTP is through the command line. a command line, you can alternately use an

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

Web Portal User Guide Leap GIO Public. Leap GIO Public. New Generation - Web Portal User Guide. Copyright 2017 by Leap Solutions Asia Co., Ltd.

Web Portal User Guide Leap GIO Public. Leap GIO Public. New Generation - Web Portal User Guide. Copyright 2017 by Leap Solutions Asia Co., Ltd. New Generation - Web Portal User Guide 1 Page Contents 1 General... 3 1.1 Overview... 3 1.2 Definition... 3 1.3 Access the Web Portal... 3 2 Sign-Up... 4 2.1 Personal Account... 4 2.2 Corporate Account...

More information

ECC FILE TRANSFER SERVICE USER-GUIDE. Release 006 Date

ECC FILE TRANSFER SERVICE USER-GUIDE. Release 006 Date ECC FILE TRANSFER SERVICE USER-GUIDE Release 006 Date 2017-01-13 1 Content 1 General... 3 2 File transfer service via FTP... 4 2.1 FTPS (FTPeS FTP with explicit SSL/TLS)... 4 2.1.1 Setting up the FTPS

More information

Configuring SSH Public Key Authentication

Configuring SSH Public Key Authentication 6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running

More information

Configuring SSH and Telnet

Configuring SSH and Telnet 6 CHAPTER This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Information About SSH and Telnet, page 6-1

More information

Titan FTP Server SSH Host Key Authentication with SFTP

Titan FTP Server SSH Host Key Authentication with SFTP 2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River

More information

Bitnami MySQL for Huawei Enterprise Cloud

Bitnami MySQL for Huawei Enterprise Cloud Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load

More information

Using keys with SSH Rob Judd

Using keys with SSH Rob Judd Using keys with SSH Rob Judd (rjudd@mlug.missouri.edu) Introduction SSH is a drop-in replacement for telnet that allows encrypted network connections. There are two main versions, 1.5 SSH-1 and 2.0 SSH-2

More information

If you prefer to use your own SSH client, configure NG Admin with the path to the executable:

If you prefer to use your own SSH client, configure NG Admin with the path to the executable: Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP addresses that administrative

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

Joint Venture Hospital Laboratories. Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.

Joint Venture Hospital Laboratories. Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl. Joint Venture Hospital Laboratories Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.org For Secure File Transfers via the Internet Introduction Version 2.2 April

More information

ECC File Transfer Service

ECC File Transfer Service ECC File Transfer Service User-Guide 11.01.2018 Leipzig Ref. 008 Table of Contents 1 GENERAL 3 2 FILE TRANSFER SERVICE VIA FTP 4 2.1 FTPS (FTPES FTP with explicit SSL/TLS) 4 2.1.1 Setting up the FTPS access

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

This document is intended to help you connect to the CVS server on a Windows system.

This document is intended to help you connect to the CVS server on a Windows system. Sourceforge CVS Access Sourceforge CVS Access... 1 Introduction... 1 Tools... 1 Generate Public / Private Keys... 1 Configuring Sourceforge Account... 4 Loading Private Keys for Authentication... 7 Testing

More information

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA

More information

Bitnami MEAN for Huawei Enterprise Cloud

Bitnami MEAN for Huawei Enterprise Cloud Bitnami MEAN for Huawei Enterprise Cloud Description Bitnami MEAN Stack provides a complete development environment for mongodb and Node.js that can be deployed in one click. It includes the latest stable

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data

More information

Using

Using Using www.bcidaho.net Blue Cross supports a wide variety of clients and protocols for uploading and downloading files from our servers, including web-based tools, traditional clients and batch processing.

More information

Additional laboratory

Additional laboratory Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops

More information

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Windows Compute Resource www.redcedartech.com. Setting up a Windows-to-Windows Compute Resource Contents Introduction 1 On Remote Machine

More information

Tectia Client/Server 6.4 (Windows) Quick Start Guide

Tectia Client/Server 6.4 (Windows) Quick Start Guide Tectia Client/Server 6.4 (Windows) Quick Start Guide 02 January 2017 Tectia Client/Server 6.4 (Windows): Quick Start Guide 02 January 2017 Copyright This software and documentation are protected by international

More information

General Document Exchange via ShareFile

General Document Exchange via ShareFile General Document Exchange via ShareFile For security reasons, Ringgold uses the ShareFile portal for all documents exchange. We provide a choice of two different ways to submit files to Ringgold via ShareFile:

More information

SSH and keys. Network Startup Resource Center

SSH and keys. Network Startup Resource Center SSH and keys Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

TSMC NA Secure Chamber Quick Start Guide V2.3

TSMC NA Secure Chamber Quick Start Guide V2.3 TSMC NA Secure Chamber Quick Start Guide V2.3 1. TSMC NA Secure Chamber supports windows client only, please use windows to connect to your chamber. 2. Citrix Receiver supports version 11 or above only,

More information

CS321: Computer Networks FTP, TELNET, SSH

CS321: Computer Networks FTP, TELNET, SSH CS321: Computer Networks FTP, TELNET, SSH Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in FTP File Transfer Protocol (FTP) is the standard protocol provided

More information

Securing Mainframe File Transfers and TN3270

Securing Mainframe File Transfers and TN3270 Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for

More information

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files Version 1.33 November 2017 Table of Content 1. Introduction... 3 2. Technical Pre-Conditions... 3 2.1. Hardware

More information

Sterling Money Market Data Collection: Technical instructions for the transmission

Sterling Money Market Data Collection: Technical instructions for the transmission Sterling Money Market Data Collection: Technical instructions for the transmission of form SMMD Version 5.0 February 2017 Contents page 1. Introduction...3 2. Transfer Process...4 2.1. Sending files...4

More information

Firewalls can prevent access to the Unix Servers. Please make sure any firewall software or hardware allows access through Port 22.

Firewalls can prevent access to the Unix Servers. Please make sure any firewall software or hardware allows access through Port 22. EINSTEIN OVERVIEW Einstein (Einstein.franklin.edu) and Codd (codd.franklin.edu) are two servers that are used for many Computer Science (COMP) courses. Students will be directed to use either Einstein

More information

SFTP Service (ORK-TR)

SFTP Service (ORK-TR) SFTP Service (ORK-TR) Version 1.3 BME VERSION CONTROL TABLE Version Date Changes / Modifications Author 1.0 09/10/2017 N/A Ignacio Herrero 1.1 23/10/2017 Corrections Ignacio Herrero 1.2 24/10/2017 Addition

More information

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the

More information

KEIL software. Index of contents UPDATE. 1. Important information 1.1. What has changed?

KEIL software. Index of contents UPDATE. 1. Important information 1.1. What has changed? Index of contents 1. Important information 1.1. What has changed? 2. Update 2.1. Settings and file backup 2.2. FTP Upload 2.3. Permissions 2.4. Do update 3. Possible problems 2003-2007,, all rights reserved

More information

Configuring the WT-4 for ftp (Infrastructure Mode)

Configuring the WT-4 for ftp (Infrastructure Mode) Configuring the WT-4 for ftp (Infrastructure Mode) Configuring the WT-4 for ftp (Infrastructure Mode) Windows 7 This document provides basic instructions on configuring the WT-4 wireless transmitter and

More information

WinSCP. Author A.Kishore/Sachin

WinSCP. Author A.Kishore/Sachin WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

Manual Ftp Windows 7 Server Configure Secure

Manual Ftp Windows 7 Server Configure Secure Manual Ftp Windows 7 Server Configure Secure File & Windows Explorer can handle connections to FTP servers. Books Hardware Security Blog In this guide, we will show you how to use Windows Explorer and

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

1. INTRODUCTION to AURO Cloud Computing

1. INTRODUCTION to AURO Cloud Computing 1. INTRODUCTION to AURO Cloud Computing Welcome to AURO! The purpose of this document is to help you get started with using AURO s Public Cloud Compute. This document covers how to setup and launch a virtual

More information

Author A.Kishore/Sachin WinSCP

Author A.Kishore/Sachin   WinSCP WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

California ISO MRI-Settlements Secure File Transfer Protocol (SFTP) Connectivity Instructions

California ISO MRI-Settlements Secure File Transfer Protocol (SFTP) Connectivity Instructions California ISO MRI-Settlements Secure File Transfer Protocol (SFTP) Connectivity Instructions Version: 1.0 March 28, 2014 Prepared By: IT/Business Solutions/INambiar Page 1 Revision History Date Version

More information

Ftp Command Line Manual Windows Example Port 22

Ftp Command Line Manual Windows Example Port 22 Ftp Command Line Manual Windows Example Port 22 Session, Logging, Console/scripting mode, Operations, Configuration enables passive ( =on ) or active ( =off ) transfer mode (FTP protocol only). winscp.exe

More information

Bitnami Dolibarr for Huawei Enterprise Cloud

Bitnami Dolibarr for Huawei Enterprise Cloud Bitnami Dolibarr for Huawei Enterprise Cloud Description Dolibarr is an open source, free software package for small and medium companies, foundations or freelancers. It includes different features for

More information

Tectia Client/Server 6.3 (Windows) Quick Start Guide

Tectia Client/Server 6.3 (Windows) Quick Start Guide Tectia Client/Server 6.3 (Windows) Quick Start Guide 30 March 2016 Tectia Client/Server 6.3 (Windows): Quick Start Guide 30 March 2016 Copyright This software and documentation are protected by international

More information

Bitnami JRuby for Huawei Enterprise Cloud

Bitnami JRuby for Huawei Enterprise Cloud Bitnami JRuby for Huawei Enterprise Cloud Description JRuby is a 100% Java implementation of the Ruby programming language. It is Ruby for the JVM. JRuby provides a complete set of core built-in classes

More information

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING & Table of Contents CUSTOMER CONTROL PANEL... 2 LOGGING IN... 2 RESET YOUR PASSWORD... 2 DASHBOARD... 3 HOSTING & EMAIL... 4 WEB FORWARDING... 4 WEBSITE... 5 Usage... 5 Subdomains... 5 SSH Access... 6 File

More information

Overcoming Remote Desktop Challenges with

Overcoming Remote Desktop Challenges with Overcoming Remote Desktop Challenges with SPONSORED BY A BWW Media Group Brand By Michael Otey Michael Otey is president of TECA, Inc., which focuses on Windows and SQL Server product development and consulting.

More information

The Desktop Sharing Handbook. Brad Hards

The Desktop Sharing Handbook. Brad Hards Brad Hards 2 Contents 1 Introduction 5 2 The Remote Frame Buffer protocol 6 3 Using Desktop Sharing 7 3.1 Desktop Sharing Main Window.............................. 7 3.1.1 Connection Details.................................

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

SSH Configuration Mode Commands

SSH Configuration Mode Commands The Secure Shell Configuration Mode is used to manage the SSH server options for the current context. Command Modes You must use the ssh generate key command in Context Configuration Mode to generate the

More information

MOVEit Transfer Getting Started Guide

MOVEit Transfer Getting Started Guide MOVEit Transfer Getting Started Guide Copyright 1991-2016 Ipswitch, Inc. All rights reserved. This document, as well as the software described in it, is furnished under license and may be used or copied

More information

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1 Table of Contents 1 FTP and SFTP Configuration 1-1 Introduction to FTP and SFTP 1-1 Introduction to FTP 1-1 Introduction to SFTP 1-1 FTP Configuration 1-2 FTP Configuration: A Switch Operating as an FTP

More information

Quick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1

Quick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1 Quick Note 24 Extracting the debug.txt file from a TransPort Digi Technical Support February 2016 Page 1 Contents 1 Introduction... 3 2 Version... 4 3 FTP method... 5 3.1 FTP Using FileZilla FTP Client...

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro InterScan Messaging Security Suite Last Modified: Tuesday, April 25, 2017 Event Source Product Information: Vendor: Trend Micro Event

More information

Instruction Manual "Schaeffler FileExchange" Solution. Instruction Manual: "Schaeffler FileExchange" Solution

Instruction Manual Schaeffler FileExchange Solution. Instruction Manual: Schaeffler FileExchange Solution Instruction Manual "Schaeffler FileExchange" Solution Instruction Manual: "Schaeffler FileExchange" Solution Brief Description This instruction manual describes how you can use the Schaeffler FileExchange

More information

Logging in to the CLI

Logging in to the CLI Contents Logging in to the CLI 1 Login methods 1 Logging in through the console port 2 Introduction 2 Configuration procedure 2 Logging in through the AUX port 5 Configuration prerequisites 5 Configuration

More information