Installation Guide. How to install the Active Security monitoring component for int.eu.grid JRA1
|
|
- Madeline Gaines
- 5 years ago
- Views:
Transcription
1 Installation Guide How to install the Active Security monitoring component for int.eu.grid JRA1 Document Filename: Workpackage: Partner(s): Lead Partner: Config ID: Document classification: Installation Guide JRA1 TCD TCD i2g-asi-monitoring-install PUBLIC Abstract: This document describes what you need to know as an installer of the Active Security monitoring component.
2 Delivery Slip Name Partner Date Signature From Stuart Kenny TCD Nov 2006 Verified By Approved By Document Log Version Date Summary of changes Author Nov 2006 First public version Stuart Kenny Jan 2007 Update installation procedure Stuart Kenny 2/11 PUBLIC Installation Guide
3 Contents Contents CopyrightNotice 4 1 About the Software Software Components Dependencies Installation in the int.eu.grid Testbed Manual Post Installation Steps Manual Installation 8 4 Running and Testing 9 5 EDG License Agreement 10 Installation Guide PUBLIC 3/11
4 Contents Copyright Notice Copyright (c) 2006 by Stuart Kenny. All rights reserved. Use of this product is subject to the terms and licenses stated in the EDG license agreement. Please refer to Chapter 5 for details. Snort is a registered trademark of SourceFire, INC. All rights reserved. This research is partly funded by the European Commission IST-RI Project Interactive European Grid. 4/11 PUBLIC Installation Guide
5 1 About the Software The Active Security task proposes to consider security measures for an interactive framework, and subsequently to enhance interactive operation with active security tools. The architecture of the Active Security Infrastructure (ASI), is divided into two layers: Monitoring and control layer Analysis layer Communication between the two layers is provided by R-GMA, a grid monitoring and information system, originally developed by the European DataGrid project, and currently being re-engineered as part of EGEE. R-GMA is a relational implementation of the Global Grid Forums (GGF) Grid Monitoring Architecture. The monitoring and control layer resides at site level, i.e., the components contained in this level are to be installed on the gateway components at all sites within the int.eu.grid testbed. The layer consists of two components, Security Monitoring (SM) and the Control Engine. The purpose of the second layer of the ASI is to filter and analyse the alerts collected by the Security Monitoring component, in order to detect patterns that would signify an attempted attack on the Grid infrastructure. Because it is expected that a significant number of alerts will be generated and logged it is intended to automate this analysis as much as possible. This layer resides at the Operations Centre level, i.e., the services contained in this layer are installed only at the site responsible for grid operations, or the site responsible for overall security of the Grid testbed. This layer is composed of a series of filtering steps, from which the output of each should be a single alert of higher priority, composed from an input of multiple lower priority alerts. The first of these filtering steps is the Alert Analysis; the second is the Alert Correlation Engine. This document describes the installation of the Security Monitoring component. 1.1 Software Components This component is responsible for monitoring the state of security of the site, and for reporting detected security events to the Operations Centre. The monitoring is to be performed by standard security components (e.g., Snort [1], Tripwire [2]), which have been R-GMA-enabled. In the current implementation the initial security component used is Snort, an open-source network-based intrusion detection system. An output-plugin has been provided for Snort that makes use of the R-GMA Producer API to stream any alerts logged by Snort to the R-GMA. This results in each site streaming alerts into the information system In order for the security events detected and published by the Security Monitoring component to be collected at the operations centre a second R-GMA component, a SecondaryProducer is used. A SecondaryProducer aggregates streams from multiple Producers and stores the information into a MySQL database. By running a SecondaryProducer at the Operations Centre that queries for the events being published by the Security Monitoring component, all the events can be aggregated to form a security alert archive. Installation Guide PUBLIC 5/11
6 Chapter 1. About the Software 1.2 Dependencies For the initial deployment of the ASI in the int.eu.grid testbed the SM component is to be deployed on the Computing Element. The following lists the RPMs that should be installed on the CE node: 1. snort-rgma (a) snort (b) snort-rules (c) glite-rgma-api-c i. glite-rgma-base The CE must have a valid host certificate. It must also have access to the ASI secure R-GMA server. 6/11 PUBLIC Installation Guide
7 2 Installation in the int.eu.grid Testbed The int.eu.grid testbed are managed by the YAIM deployment support tool. This tool allows for the automatic installation of the software on all the required node. A YAIM plugin has been provided to configure the component correctly. To install the component the following commands should be executed on the CE node. apt-get install snort-rules apt-get install snort-rgma apt-get install i2g-yaim-snort The YAIM plugin will add the Snort configuration function the node-info.def file for both the CE and glite-ce node types. To execute the configuration manually use the following command: /opt/glite/yaim/scripts/run function path-to-site-config-file config i2g snort 2.1 Manual Post Installation Steps Snort should be correctly configured by the YAIM script. In order to allow the Snort sensor to publish alerts to the Active Security R-GMA server the following information must be sent to the Active Security task team (crossgrid-mgr@cs.tcd.ie). 1. The distinguished name of host certificate of the machine that will be running Snort. This can be obtained using the following command: openssl x509 -in /etc/grid-security/hostcert.pem -noout -subject 2. The fully qualified domain name and IP address of the Snort host. It is also important that the R-GMA server, cagraidsvr09.cs.tcd.ie, is allowed access to the Snort host through any firewalls. Outbound access from the Snort host to the R-GMA server should also be allowed, for at least ports 8443 and Installation Guide PUBLIC 7/11
8 Chapter 3. Manual Installation 3 Manual Installation To manually install the Security Monitoring component the following steps should be followed. If the R-GMA API has not been previously installed: apt-get install glite-rgma-api-c Next the following Snort RPMs should be installed: apt-get install snort-rules apt-get install snort-rgma To configure Snort to log to the secure R-GMA provided by the Active Security task the following steps should be followed: 1. Copy the host certificate and key to the Snort configuration directory: cp /etc/grid-security/host*.pem /etc/snort/ chown snort:snort /etc/snort/host*.pem 2. Create the R-GMA authorization configuration file, ClientAuthentication.props in the directory /etc/snort/etc/rgma: Add the following to this file: sslcertfile=/etc/snort/hostcert.pem sslkey=/etc/snort/hostkey.pem crlenabled=true crlfiles=/etc/grid-security/certificates/*.r0 sslcafiles=/etc/grid-security/certificates/*.0 3. Create the R-GMA configuration file rgma.conf in /etc/snort/etc/rgma: Add the following line to this file: PrimaryProducer= 4. Edit the file /etc/sysconfig/snort and add the following two lines: unset X509 USER PROXY export RGMA HOME=/etc/snort Also ensure the line beginning ALERTMODE is commented out. 5. Edit the file /etc/snort/snort.conf: Add the line: output rgma: log, SITE NAME, trustfile=/etc/snort/etc/rgma/clientauthentication.props Where SITE NAME is the name of your site e.g., TCD-I2G Once these steps have been completed the post installation steps given in Section 2.1 should be followed. 8/11 PUBLIC Installation Guide
9 4 Running and Testing The R-GMA Snort monitoring is controlled using the Snort init.d script. To start the monitoring issue the following command: /etc/init.d/snortd start To stop the monitoring: /etc/init.d/snortd stop Aswell as logging to the R-GMA, any detected alerts will also be visible in the Snort log directory, /var/log/snort, by default. Installation Guide PUBLIC 9/11
10 Chapter 5. EDG License Agreement 5 EDG License Agreement Copyright (c) 2005 CrossGrid. All rights reserved. This software includes voluntary contributions made to the CrossGrid Project. For more information on CrossGrid, please see Installation, use, reproduction, display, modification and redistribution of this software, with or without modification, in source and binary forms, are permitted. Any exercise of rights under this license by you or your sub-licensees is subject to the following conditions: 1. Redistributions of this software, with or without modification, must reproduce the above copyright notice and the above license statement as well as this list of conditions, in the software, the user documentation and any other materials provided with the software. 2. The user documentation, if any, included with a redistribution, must include the following notice: This product includes software developed by the CrossGrid Project ( Alternatively, if that is where third-party acknowledgments normally appear, this acknowledgment must be reproduced in the software itself. 3. The names CrossGrid and CG may not be used to endorse or promote software, or products derived therefrom, except with prior written permission by cgoffice@cyfronet.krakow.pl. 4. You are under no obligation to provide anyone with any bug fixes, patches, upgrades or other modifications, enhancements or derivatives of the features, functionality or performance of this software that you may develop. However, if you publish or distribute your modifications, enhancements or derivative works without contemporaneously requiring users to enter into a separate written license agreement, then you are deemed to have granted participants in the CrossGrid Project a worldwide, non-exclusive, royalty-free, perpetual license to install, use, reproduce, display, modify, redistribute and sub-license your modifications, enhancements or derivative works, whether in binary or source code form, under the license conditions stated in this list of conditions. 5. DISCLAIMER THIS SOFTWARE IS PROVIDED BY THE CROSSGRID PROJECT AND CONTRIBUTORS S ISAND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF SATISFACTORY QUALITY, AND FIT- NESS FOR A PARTICULAR PURPOSE OR USE ARE DISCLAIMED. THE CROSSGRID PROJECT AND CONTRIBUTORS MAKE NO REPRESENTATION THAT THE SOFTWARE, MODIFICA- TIONS, ENHANCEMENTS OR DERIVATIVE WORKS THEREOF, WILL NOT INFRINGE ANY PATENT, COPYRIGHT, TRADE SECRET OR OTHER PROPRIETARY RIGHT. 6. LIMITATION OF LIABILITY THE CROSSGRID PROJECT AND CONTRIBUTORS SHALL HAVE NO LIABILITY TO LICENSEE OR OTHER PERSONS FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIM- ITATION, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, LOSS OF USE, DATA OR PROFITS, OR BUSINESS INTERRUPTION, HOWEVER CAUSED AND ON ANY THEORY OF CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTH- ERWISE, ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 10/11 PUBLIC Installation Guide
11 Bibliography Bibliography [1] Snort. April [2] Open source Tripwire. April Installation Guide PUBLIC 11/11
User Guide. How to use the Active Security monitoring component for int.eu.grid JRA1
User Guide How to use the Active Security monitoring component for int.eu.grid JRA1 Document Filename: Workpackage: Partner(s): Lead Partner: Config ID: Document classification: User Guide JRA1 TCD TCD
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008
IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,
More informationEcma International Policy on Submission, Inclusion and Licensing of Software
Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009
IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose
More informationEcma International Policy on Submission, Inclusion and Licensing of Software
Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being
More informationOpen Source Used In TSP
Open Source Used In TSP 3.5.11 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
More informationBar Code Discovery. Administrator's Guide
Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4
More informationOCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)
OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection
More informationIntel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3)
Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3) Overview Changes History Installation Package Contents Known Limitations Attributions Legal Information Overview The
More informationOpen Source Used In Cisco Configuration Professional for Catalyst 1.0
Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on
More informationANZ TRANSACTIVE MOBILE for ipad
ANZ TRANSACTIVE MOBILE for ipad CORPORATE CASH AND TRADE MANAGEMENT ON THE GO QUICK REFERENCE GUIDE April 2016 HOME SCREEN The home screen provides immediate visibility of your favourite accounts and transactions
More informationSDLC INTELLECTUAL PROPERTY POLICY
SDLC INTELLECTUAL PROPERTY POLICY Last Revised: 11/14/17 1. Introduction. This Intellectual Property Policy ( Policy ) governs intellectual property rights of the SDL Consortium ( SDLC ) and its Members
More informationHYDRODESKTOP VERSION 1.4 QUICK START GUIDE
HYDRODESKTOP VERSION 1.4 QUICK START GUIDE A guide to using this free and open source application for discovering, accessing, and using hydrologic data February 8, 2012 by: Tim Whiteaker Center for Research
More informationDocumentation Roadmap for Cisco Prime LAN Management Solution 4.2
Documentation Roadmap for Cisco Prime LAN Thank you for purchasing Cisco Prime LAN Management Solution (LMS) 4.2. This document provides an introduction to the Cisco Prime LMS and lists the contents of
More informationSMS2CMDB Project Summary v1.6
SMS2CMDB Project Summary v1.6 Project Abstract SMS2CMDB provides the capability to integrate Microsoft Systems Management Server (MS- SMS) data with BMC Atrium CMDB (Atrium CMDB) and the BMC Remedy Asset
More informationColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions
ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions Date Generated: 2018/09/10 Apache Tomcat ID: 306 Apache Foundation and Contributors This product includes software
More informationAdditional License Authorizations for HPE OneView for Microsoft Azure Log Analytics
Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics Product Use Authorizations This document provides Additional License Authorizations for HPE OneView for Microsoft Azure
More informationPRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )
PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT
More informationUS Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Service Data Objects (SDO) DFED Sample Application README Copyright IBM Corporation, 2012, 2013 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract
More informationMoodle. Moodle. Deployment Guide
Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationCA File Master Plus. Release Notes. Version
CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
More informationDistributed Intelligent Capture. Integration Guide
Distributed Intelligent Capture Integration Guide July 2014 www.lexmark.com Contents 2 Contents Overview... 3 Getting started... 4 Understanding the integration process... 4 Configuring the engines...
More informationPanasonic Audio Player 2 User Guide
Panasonic Audio Player 2 User Guide ASIO is a trademark and software of Steinberg Media Technologies GmbH. Overview Panasonic Audio Player 2 is simple GUI audio player software for Windows and Mac OS with
More informationOpen Source and Standards: A Proposal for Collaboration
ETSI Workshop on Open Source and ization: Legal Interactions September 16, 2016 Sophia Antipolis Open Source and s: A Proposal for Collaboration David Marr VP & Legal Counsel Open Source Group Qualcomm
More informationHALCoGen TMS570LS31x Help: example_sci_uart_9600.c
Page 1 of 6 example_sci_uart_9600.c This example code configures SCI and transmits a set of characters. An UART receiver can be used to receive this data. The scilin driver files should be generated with
More informationTable of Contents Overview...2 Selecting Post-Processing: ColorMap...3 Overview of Options Copyright, license, warranty/disclaimer...
1 P a g e ColorMap Post-Processing Plugin for OpenPolScope software ColorMap processing with Pol-Acquisition and Pol-Analyzer plugin v. 2.0, Last Modified: April 16, 2013; Revision 1.00 Copyright, license,
More informationTheGreenBow VPN Client ios User Guide
www.thegreenbow.com TheGreenBow VPN Client ios User Guide Property of TheGreenBow 2018 Table of Contents 1 Presentation... 3 1.1 TheGreenBow VPN Client... 3 1.2 TheGreenBow VPN Client main features...
More informationPRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program )
PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT
More informationTechnics Audio Player User Guide
Technics Audio Player User Guide Overview Technics Audio Player is simple GUI audio player software for Windows and Mac OS with high-resolution audio data processing capabilities. When connected to Technics
More informationLoadMaster VMware Horizon (with View) 6. Deployment Guide
LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the
More informationAvaya VPN Client Software Release 10.05_100
Avaya VPN Client Software Release 10.05_100 1. Release Summary Release Date: September 1 st, 2011 Purpose: Software maintenance release to address customer requests and software issues. 2. Important Notes
More informationFOR TCG ACPI Specification
ERRATA Errata Version 0.3 August 25, 2017 FOR TCG ACPI Specification Specification Version 1.20 Revision 8 January 19th, 2017 Contact: admin@trustedcomputinggroup.org Copyright TCG 2017 Disclaimers, Notices,
More informationOracle Auto Service Request
Oracle Auto Service Request Exadata Database Machine Quick Installation Guide Release 4.5 E23333-07 July 2013 Oracle Auto Service Request (ASR) is a secure, scalable, customer-installable software feature
More informationERRATA FOR. Protection Profile PC Client Specific TPM. Errata Version 1.0 June 16, 2018 DRAFT. Specification Version 1.
ERRATA Errata Version 1.0 June 16, 2018 DRAFT FOR Protection Profile PC Client Specific TPM June 16, 2018 Contact: admin@trustedcomputinggroup.org Copyright TCG 2003-2018 Disclaimers, Notices, and License
More informationSplunk. Splunk. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationAPPLICATION NOTE. Atmel AT03261: SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) SAM D20 System Interrupt Driver (SYSTEM INTERRUPT)
APPLICATION NOTE Atmel AT03261: SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) ASF PROGRAMMERS MANUAL SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) This driver for SAM D20 devices provides an
More informationSkyPilot OS Installation: Fedora Core 5
SkyPilot OS Installation: Fedora Core 5 PN 671-00024-01 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.
More informationBar Code Discovery. Administrator's Guide
Bar Code Discovery Administrator's Guide September 2016 www.lexmark.com Contents 2 Contents Overview... 3 Optimizing bar code detection...4 Optimizing bar code detection...4 Configuring the application...5
More informationVMware vcenter Log Insight Manager. Deployment Guide
VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationInstalling the Shrew Soft VPN Client
Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
More informationQuarkXPress Server Manager 8.0 ReadMe
QuarkXPress Server Manager 8.0 ReadMe CONTENTS Contents QuarkXPress Server Manager 8.0 ReadMe...3 What's New in QuarkXPress Server Manager 8...4 Deprecated features, new stubs, and deploying SDK classes...4
More informationLicense, Rules, and Application Form
Generic Interface for Cameras License, Rules, and Application Form GenICam_License.doc Page 1 of 11 Table of Contents 1 OVERVIEW... 4 2 SUBJECT OF THE GENICAM LICENSE... 4 3 RULES FOR STANDARD COMPLIANCY...
More informationMigration Tool. Migration Tool (Beta) Technical Note
Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
More informationTERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT
TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",
More informationTWAIN driver User s Guide
4037-9571-05 TWAIN driver User s Guide Contents 1 Introduction 1.1 System requirements...1-1 2 Installing the TWAIN Driver 2.1 Installation procedure...2-1 To install the software...2-1 2.2 Uninstalling...2-1
More informationHYDRODESKTOP VERSION 1.1 BETA QUICK START GUIDE
HYDRODESKTOP VERSION 1.1 BETA QUICK START GUIDE A guide to help you get started using this free and open source desktop application for discovering, accessing, and using hydrologic data. September 15,
More informationiwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP)
iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) June 11, 2015 Chapter 1 Files This section describes the files iwrite utilizes. 1.1 report files An iwrite report consists
More informationSNP Launchpad. Version: December SNP Schneider-Neureither & Partner AG
Version: 12.10 December 2012 SNP Schneider-Neureither & Partner AG Dossenheimer Landstr. 100 D-69121 Heidelberg Tel.: +49 6221 6425-0 Fax: +49 6221 6425-20 E-Mail: info@snp-ag.com www.snp-ag.com Page 1
More informationHYDROOBJECTS VERSION 1.1
o HYDROOBJECTS VERSION 1.1 July, 2008 by: Tim Whiteaker Center for Research in Water Resources The University of Texas at Austin Distribution The HydroObjects software, source code, and documentation are
More informationKEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide
KEMP LBaaS Red Hat OpenStack Driver Installation Guide VERSION: 2.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
More informationAdobe Connect. Adobe Connect. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationCopyright PFU LIMITED
-------------------------------------------------------- PaperStream Capture 1.0.12 README File -------------------------------------------------------- Copyright PFU LIMITED 2013-2015 This file contains
More informationQuick Start Guide. BlackBerry Workspaces app for Android. Version 5.0
Quick Start Guide BlackBerry Workspaces app for Android Version 5.0 Published: 2017-01-22 SWD-20170122060917401 Contents Overview... 4 Browse workspaces, folders, and files... 5 Create new workspaces,
More informationProgressBar Abstract
Doc type here 1(21) ProgressBar Abstract The WireFlow progressbar module is an easy way to add progress bars to an application. It is easy to customize the look of the displayed progress window, since
More informationAccuTerm 7 Internet Edition Connection Designer Help. Copyright Schellenbach & Assoc., Inc.
AccuTerm 7 Internet Edition Connection Designer Help Contents 3 Table of Contents Foreword 0 Part I AccuTerm 7 Internet Edition 6 1 Description... 6 2 Connection... Designer 6 3 Internet... Client 6 4
More informationPacket Trace Guide. Packet Trace Guide. Technical Note
Packet Trace Guide Technical Note VERSION: 2.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
More informationRSA Two Factor Authentication
RSA Two Factor Authentication Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationNTLM NTLM. Feature Description
Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationRelease Information. Revision History. Version: build 018 Release Date: 23 rd November 2011
Version: 02.00.2 build 018 Release Date: 23 rd November 2011 Release Date Version 02.00.2 Build 018 23 rd November 2011 Release Information Release Type: General Availability Supported Cyberoam Versions:
More informationMile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com
Mile Terms of Use Effective Date: February, 2018 Version 1.1 Feb 2018 [ Mile ] Overview The following are the terms of an agreement between you and MILE. By accessing, or using this Web site, you acknowledge
More informationD3.5 Mockups of the CROWD4ROADS mobile app
CROWD4ROADS CROWD sensing and ride sharing FOR ROAD Sustainability Project Number: 687959 D3.5 Mockups of the CROWD4ROADS mobile app Lead Beneficiary: Nature/Dissemination Level: Work Package/Task: Editor:
More informationEpic. Epic Systems. Deployment Guide
Epic Systems Deployment Guide VERSION: 1.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are
More informationPreface. Audience. Cisco IOS Software Documentation. Organization
This preface describes the audience, organization, and conventions of this publication, and provides information on how to obtain related documentation. Cisco documentation and additional literature are
More informationMagicInfo Express Content Creator
MagicInfo Express Content Creator MagicInfo Express Content Creator User Guide MagicInfo Express Content Creator is a program that allows you to conveniently create LFD content using a variety of templates.
More informationMyCreditChain Terms of Use
MyCreditChain Terms of Use Date: February 1, 2018 Overview The following are the terms of an agreement between you and MYCREDITCHAIN. By accessing, or using this Web site, you acknowledge that you have
More informationCopyright PFU LIMITED 2016
-------------------------------------------------------- PaperStream Capture Lite 1.0.1 README File -------------------------------------------------------- Copyright PFU LIMITED 2016 This file contains
More informationDefiniens. Image Miner bit and 64-bit Editions. Release Notes
Definiens Image Miner 2.0.2 32-bit and 64-bit Editions Release Notes Definiens Documentation: Image Miner 2.0.2 Release Notes Imprint 2012 Definiens AG. All rights reserved. This document may be copied
More informationSite Impact Policies for Website Use
Site Impact Policies for Website Use Thank you for visiting the Site Impact website (the Website ). We have set up some ground rules to ensure protection of our rights and yours. Site Impact reserves the
More informationLoadMaster Clustering
Introduction LoadMaster Clustering Feature Description VERSION: 9.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
More informationOKI DICOM Embedded Printer DICOM Printing Function User's Guide
OKI DICOM Embedded Printer DICOM Printing Function User's Guide C610 DM / C711 DM / C831 DM / C910 DM ES6410 DM / ES7411 DM / ES8431 DM / ES9410 DM Important note: This manual describes all the functionalities
More informationCompatibility Matrix. Good Control and Good Proxy. June 4, 2018
Compatibility Matrix Good Control and Good Proxy June 4, 2018 Published: 2018-06-04 SWD-20180604161707961 Contents Introduction... 4 Legend... 4 Good Control server... 5 Operating system...5 Database server...5
More informationWatch 4 Size v1.0 User Guide By LeeLu Soft 2013
Watch 4 Size v1.0 User Guide By LeeLu Soft 2013 Introduction Installation Start using W4S Selecting a folder to monitor Setting the threshold Setting actions Starting the monitor Live Log Using monitor
More informationHYCU SCOM Management Pack for F5 BIG-IP
USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This
More informationOpen Source Used In c1101 and c1109 Cisco IOS XE Fuji
Open Source Used In c1101 and c1109 Cisco IOS XE Fuji 16.8.1 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco
More informationERRATA FOR. TCG TPM I2C Interface Specification. Errata Version 1.0 April 6, Family 2.0 Level 00 Revision 1.
ERRATA Errata Version 1.0 April 6, 2017 FOR TCG TPM I2C Interface Specification Family 2.0 August 05, 2016 Contact: admin@trustedcomputinggroup.org Copyright TCG 2003-2017 Disclaimers, Notices, and License
More informationMQ Port Scan Installation and Operation Manual
MQ Port Scan Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com MQPS Installation and
More informationJD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide. for the Oracle Application Server
JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide for the Oracle Application Server April 2006 JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide Copyright 2006, Oracle.
More informationGrid-wide Intrusion Detection
Grid-wide Intrusion Detection Stuart Kenny and Brian Coghlan Trinity College Dublin, Ireland email: [stuart.kenny, coghlan]@cs.tcd.ie phone: (+353 1) 6081797, fax: (+353 1) 6772204 Abstract We describe
More informationInstallation and Configuration Guide
Installation and Configuration Guide BlackBerry Blend Version 1.2 Published: 2015-07-06 SWD-20150706173035792 Contents About BlackBerry Blend... 4 BlackBerry Blend architecture... 4 Security... 5 IT policy
More informationTECHNICAL REPORT TR-027. SNMP-based ADSL LINE MIB. Issue: 1.0 Issue Date: September The Broadband Forum. All rights reserved.
TECHNICAL REPORT Issue: 1.0 Issue Date: September 1999 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized to create guidelines for broadband network
More informationACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES
ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES Information Security Team DePaul University 1 East Jackson Boulevard Chicago, Illinois 60604 US https:/infosec.depaul.edu/ 13th December
More informationHitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between
between Hitachi ID Systems, Inc. (hereinafter referred to as "HIDS", "we" and/or "us") and LICENSEE (see below) (hereinafter referred to as "LICENSEE" and/or "you".) (Please complete ALL fields below by
More informationDisaster Recovery Guide
Disaster Recovery Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180628140917721 Contents Overview... 4 Servers and services... 4 About BEMS servers... 4 BlackBerry Proxy... 5 Example of
More informationJD Edwards World EDI Error Notification. Version A9.2
JD Edwards World EDI Error Notification Version A9.2 Revised June 8, 2009 Copyright Notice Copyright 2009, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation
More informationEnd User License Agreement
End User License Agreement Kyocera International, Inc. ( Kyocera ) End User License Agreement. CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS ( AGREEMENT ) BEFORE USING OR OTHERWISE ACCESSING THE SOFTWARE
More informationServerStatus Installation and Operation Manual
ServerStatus Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com ServerStatus Installation
More informationRelease Notes. BlackBerry Enterprise Identity
Release Notes BlackBerry Enterprise Identity Published: 2018-03-13 SWD-20180606100327990 Contents New in this release...4 Fixed issues...5 Known issues... 6 Legal notice...8 New in this release New in
More informationSAM4 Reset Controller (RSTC)
APPLICATION NOTE AT06864: SAM4 Reset Controller (RSTC) ASF PROGRAMMERS MANUAL SAM4 Reset Controller (RSTC) This driver for SAM devices provides an interface for the configuration and management of the
More informationTCG. TCG Certification Program. TNC Certification Program Suite. Document Version 1.1 Revision 1 26 September 2011
TCG Certification Program TNC Certification Program Suite Document Version 1.1 Revision 1 26 September 2011 Contact: admin@trustedcomputinggroup.org TCG TCG PUBLISHED Copyright TCG 2009-2011 Copyright
More informationpyserial-asyncio Documentation
pyserial-asyncio Documentation Release 0.4 pyserial-team Feb 12, 2018 Contents 1 Short introduction 3 2 pyserial-asyncio API 5 2.1 asyncio.................................................. 5 3 Appendix
More informationUser Guide. Calibrated Software, Inc.
User Guide Calibrated Software, Inc. Copyright 2008 Calibrated Software, Inc. All rights reserved. www.calibratedsoftware.com Your rights to the software are governed by the accompanying Software License
More informationDAP Controller FCO
Release Note DAP Controller 6.40.0412 FCO 2016.046 System : Business Mobility IP DECT Date : 30 June 2016 Category : Maintenance Product Identity : DAP Controller 6.40.0412 Queries concerning this document
More informationHyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide
Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc..
More informationVolume Disaster Recovery Preparation Express Guide
ONTAP 9 Volume Disaster Recovery Preparation Express Guide August 2018 215-11187_F0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use this guide... 4 Volume disaster recovery
More informationAbout This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010
This guide describes how to use Cisco Network Analysis Module Traffic Analyzer 4.2 (NAM 4.2) software. This preface has the following sections: Chapter Overview, page xvi Audience, page xvii Conventions,
More informationMultipoint Temperature NET Data Logger
Multipoint Temperature NET Data Logger Version 7.1 NET HV_Setup Software Guide [Windows XP/Vista/7] ~ 1 ~ NET THR HV Revision 120218 [Ver. 1.0.1A] Contents 1. How to setup the NET Data Logger?... 3 2.
More informationNovell extend INSTALLING NOVELL EXTEND
Novell extend 5.0 www.novell.com INSTALLING NOVELL EXTEND Legal Notices Copyright 2003 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval
More informationDefiniens. Tissue Studio Release Notes
Definiens Tissue Studio 3.0.1 Release Notes Definiens Documentation: Definiens Tissue Studio 3.0.1 Release Notes Imprint 2012 Definiens AG. All rights reserved. This document may be copied and printed
More informationEdge Security Pack (ESP)
Edge Security Pack (ESP) VERSION: 1.2 UPDATED: SEPTEMBER 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 22 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..
More informationLOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³
LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³ EXHIBIT B-2 LICENSEE: Address: Attention: Phone: Fax: Email: Account #: CERTIPORT LOGO LICENSE AGREEMENT Authorized Testing Centers This Logo License Agreement
More information