REGISTRATION DATA INTERFACE SPECIFICATION

Size: px
Start display at page:

Download "REGISTRATION DATA INTERFACE SPECIFICATION"

Transcription

1 REGISTRATION DATA INTERFACE SPECIFICATION DEFINITIONS Data Transfer Catalogue DCC Status DCC Status File Electricity Registration Data Provider Gas Registration Data Provider Hot Standby Router Protocol Network Address Translation Registration Data File Registration Data Update File Registration Data Refresh File Means the Data Transfer Catalogue as published on the Master Registration Agreement Service Company website at providing logical definition of the data flows used to communicate information between electricity industry participants Means the status of each Electricity Metering Point or Gas Supply Meter Point with respect to whether a Smart Metering System is Enrolled or Withdrawn Means the file produced by DCC and transferred to each Network Party detailing the DCC Status of each Electricity Metering Point or Gas Supply Meter Point registered to that Network Party. Means a Registration Data Provider which sends and receives Electricity Registration Data. Means a Registration Data Provider which sends and receives Gas Registration Data. Means the published protocol used to provide redundancy and thus establish a fault-tolerant default gateway, in this case the Registration Data Interface Means the internet standard method of modifying Internet Protocol (IP) network address information using a traffic routing device, for the purpose of remapping one IP address into another Means the file or files produced by each Network Party and transferred to the DCC detailing the Registration Data pursuant to section E1. Means the Registration Data File containing periodic updates to Registration Data. Means the Registration Data File containing updates to Registration Data for a partial or full list of Metering Points or Supply Metering Points. 02.Registration_Data_Interface_Specification_consultation_version 1

2 Response File Supported Version 1. INTRODUCTION Means a file produced whilst processing a data file containing either successful acknowledgement records or validation error records recorded in processing. Means the latest version of the Data Transfer Catalogue data flow that the DCC supports for use with the Registration Data Interface as listed and as updated from time to time on the DCC web site. Document Purpose Pursuant to [E2.8], this document is the Electricity Registration Data Interface Specification and Gas Registration Data Interface Specification. 2. REGISTRATION DATA INTERFACE Establishment of the REGIS logical connection 1.1 The DCC shall make the Registration Data Interface available on an Internet Protocol version 4 address range. 1.2 Each Network Party shall use Network Address Translation to remap internal Internet Protocol addresses to the published DCC provided Internet Protocol addresses at the Network Party s firewall prior to accessing the Registration Data Interface. 1.3 Each Network Party shall use Network Address Translation to remap incoming DCC traffic Internet Protocol addresses from the published Internet Protocol addresses at the Network Party s firewall to the reserved Internet Protocol addresses within their subnet. Secure Shell File Transfer Protocol transfers 1.4 The Registration Data Interface shall utilise the Secure Shell File Transfer Protocol between the RDP Systems and the DCC Systems. 1.5 The DCC and each Network Party shall implement the Secure Shell File Transfer Protocol interface in a standard format conforming to the following internet standards as defined in the referenced Request for Comments (RFC) as published by the Internet Engineering Task Force (IETF) and the Internet Society at 02.Registration_Data_Interface_Specification_consultation_version 2

3 editor.org/rfc.html (b) (c) (d) (e) (f) Secure Shell (SSH) protocol, in accordance with RFC 4251, RFC 4252 and RFC 4253 In accordance with RFC 4251, RFC 4252, RFC 4253 and RFC 959 (File Transfer Protocol) for the purposes of error handling The Transport Layer shall use encrypted communications using the AES (Advanced Encryption Standard), FIPS-197, in CBC mode (AES-128- CBC) The Transport Layer shall use Message Authentication Code (MAC) communications using the Hash-based Message Authentication Code (HMAC) construct for calculating the MAC in accordance with RFC 2104, combined with the hash function SHA1 (HMAC-SHA1) The Transport Layer shall use Raw DSS (Digital Signature Standard) Keys in SSH-DSS format Access to the Secure Shell File Transfer Protocol interface shall be authenticated by mutual Public Key Authentication in line with RFC The DCC and each Network Party shall use DCCKI certificates for the purposes of signing and authenticating files, as defined in 1.10, 1.11 and The DCC and each Network Party shall follow the relevant steps in the process below when sending or receiving data files required under Section E2.1, Section E2.2 and Section E2.4. The sending and receiving party shall: structure data files it provides under E2.1, Section E2.2 and Section E2.4 in accordance with the structures defined in 1.22, 1.23, 1.24, 1.30, 1.32 and 1.33 of this document and shall include a unique sequential file sequence number in accordance with 1.17and 1.26 (b) sign the file in accordance with 1.10 and 1.11 (c) connect to the recipient s Secure Shell File Transfer Protocol server using 02.Registration_Data_Interface_Specification_consultation_version 3

4 the DCC Gateway Connection. (d) (e) (f) (g) (h) (i) (j) initiate the transfer of the file to the relevant delivery directory on the recipient s Secure Shell File Transfer Protocol server utilising Secure Shell File Transfer Protocol push mechanisms for all file exchanges authenticate the source of the file through verifying that the file has been digitally signed in accordance with 1.12, validating the file sequence using the unique sequence number as defined in 1.17and 1.26 and validating the file structure against the structure as defined in 1.22, 1.23, 1.24, 1.30, 1.32 and 1.33 of this document where the recipient is unable to authenticate the file pursuant to 1.7(e) the recipient shall raise an Incident as defined in the Registration Data Incident Management Policy where the Network Party is unable to validate the file structure pursuant to 1.7(e) the Network Party shall generate a Response File as defined in 1.23(d) or 1.32(b) within this document. The Response File will then be signed and sent to DCC using the steps outlined immediately above in 1.7 to (d) and on receipt of the Response File containing validation errors the DCC shall raise an Incident as defined in the Registration Data Incident Management Policy where the DCC is unable to validate the file structure pursuant to 1.7(e) the DCC shall raise an Incident as defined in the Registration Data Incident Management Policy where the Network Party or DCC is able to successfully authenticate and validate the file pursuant to 1.7(e), the recipient Network Party or DCC shall process each record within the file and perform record level validation where the Network Party is unable to successfully validate and process each record within the file pursuant to 1.7(i) the Network Party shall generate a Response File as defined in 1.23(d) and 1.32(b) within this document. The Response File will then be signed and sent to DCC using the steps outlined immediately above in 1.7 to (d) and on receipt of the Response File 02.Registration_Data_Interface_Specification_consultation_version 4

5 containing validation errors the DCC shall raise an Incident as defined in the Registration Data Incident Management Policy (k) where the DCC is unable to successfully validate and process each record within the file pursuant to 1.7(i) the DCC shall raise an Incident as defined in the Registration Data Incident Management Policy Security Requirements 1.8 The DCC shall allocate to each Network Party a separate directory within the Secure Shell File Transfer Protocol server and permit access only to write files and obtain directory listings within their assigned directory, and not to read, modify and delete files. 1.9 Prior to sending a file via the Registration Data Interface, the DCC and each Network Party shall establish a Transport Layer Security session. The DCC and each Network Party shall implement Transport Layer Security in a standard format conforming to: 1. The Transport Layer shall use Transport Layer Security version 1.2 as specified in Request for Comments (RFC) 5246 as published by the Internet Engineering Task Force (IETF) and the Internet Society at 2. The Transport Layer shall utilise the cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 as catalogued and further defined by the Internet Assigned Numbers Authority within the Cipher Suite Registry at 3. The Transport Layer Security connection shall be established between a non-dcc PEP and the DCC's PEP 4. Each Network Party shall ensure that DCCKI Certificates are used to establish the Transport Layer Security connection 02.Registration_Data_Interface_Specification_consultation_version 5

6 1.10 The DCC and each Network Party shall sign each file sent via the Registration Data Interface with the appropriate DCCKI digital signing key in accordance with FIPS digital signature standard using SHA-256 hashing algorithm and encrypting the derived hash using a RSA Digital Signing Algorithm of 2048-bit modulus in accordance with PKCS # The DCC and each Network Party shall apply to the entire file the SHA-256 hashing algorithm generated in accordance with 1.10 of this document, including the header and trailer. The DCC and the Network Party shall convert the resulting 2048 bits Octet digital signature to Base64 and append within the file itself to the trailer with a preceding, separator The DCC and each Network Party shall use the organisation identifier within the header of the file to retrieve the appropriate public key. The DCC and each Network Party shall perform a SHA-256 hashing algorithm on the file excluding the signature and verify the signature in accordance with FIPS Interface Error Handling 1.13 Where an error is encountered, the DCC and each Network Party shall raise an Incident in accordance with the Registration Data Incident Management Policy. The following errors can occur when using the Registration Data Interface: Connection failure Any connection failure or file transfer failure that occurs when sending files via the Registration Data Interface; (b) Transport authentication failure Failure to establish a TLS session in accordance with 1.9 when trying to send a file via the Registration Data Interface; (c) Digital signature verification failure This occurs when the digital signature on a Registration Data file cannot be verified in accordance with Registration_Data_Interface_Specification_consultation_version 6

7 (d) File processing failure This occurs when a Registration Data File cannot be validated in accordance with Registration Data file formats. (e) SFTP access failure This occurs when the DCC and the Network Party cannot establish an SFTP connection in accordance with INTERFACE FILES General Obligations 1.14 The DCC shall maintain a separate unique reference number for each Network Party, common across all files it sends through the Registration Data Interface to that Network Party. Each Network Party shall check this common sequence number in order to detect duplicate, missing or out-of sequence files as defined in the process step 1.7(e) and may if necessary raise an Incident as defined in the Registration Data Incident Management Policy Each Network Party and the DCC shall not use file compression on files transferred through the Registration Data Interface The DCC shall maintain a minimum of 24 months of the required historic Registration Data within DCC Systems. Electricity Registration Data File Structure and Data Formats 1.17 Each Electricity Network Party shall maintain a unique reference number for files, maintained across all files it sends through the Registration Data Interface. Each file shall include this unique reference number within the file header, taken from a monotonically increasing number generator. The DCC shall check this unique reference number in order to detect duplicate, missing or out-of sequence files as defined in the process step 1.7(e). 02.Registration_Data_Interface_Specification_consultation_version 7

8 1.18 Each Electricity Network Party shall provide Registration Data Update Files to the schedule as outlined in the DCC Gateway Connection & Codes of Connection 3.4 and 3.5 irrespective of whether there are Registration Data updates to convey. Where there are no Registration Data updates, each Electricity Network Party shall provide a Registration Data Update File containing the standard header, trailer and unique sequence number record and no further data records Each Electricity Network Party shall provide refresh Registration Data Files where the DCC requests in accordance with Section [E2.7] and may provide up to one unsolicited partial refresh Registration Data Refresh File each day Each Electricity Network Party shall employ a file naming convention that ensures that each of the files it sends through the Registration Data Interface has a unique name For electricity Registration Data Files, DCC shall employ a file naming convention that ensures that each file sent through the Registration Data Interface has a unique name, using the following items separated by the underscore character, giving the overall naming layout: DCCO_D0123_ where: (b) (c) DCCO is the organisation identifier (As defined by the MRA) D0123 is the flow reference (As defined by the MRA) is the unique reference number (unique within DCC files for each Electricity Network Party) 02.Registration_Data_Interface_Specification_consultation_version 8

9 1.22 Each Electricity Network Party shall ensure that all files contain header and trailer records that conform to the formats as detailed below: File Header Data Item Format Comment File Identifier CHAR(10) File identifier - unique within Market Participant (i.e. the file unique sequence number) Data flow and Version Number From Market Participant Role Code CHAR(8) CHAR(1) Dxxxxnnn Consists of 5 char data flow reference followed by 3 character flow version number - where n has a range of 0-9 e.g. 001, e.g. Registration systems have value P From Market Participant Id CHAR(4) e.g. DCC has value DCCO To Market Participant Role Code CHAR(1) e.g. DCC has value Z To Market Participant Id CHAR(4) e.g. DCC has value DCCO File creation timestamp CHAR(14) DATETIME (GMT) DCC is using UTC Sending Application Id CHAR (5) Application identifier. For possible future use Receiving Application Id CHAR (5) Application identifier. For possible future use Broadcast CHAR (1) For possible future use. Test data flag CHAR (4) Indicates whether or not this file contains test data. (b) File Trailer Data Item Format Comment File identifier CHAR(10) File identifier - unique within Market Participant Total Group Count INT (10) Total number of Groups in file excluding header/trailer Checksum INT (10) Checksum Flow count INT (8) Number of flow instances excluding file header/trailer File completion timestamp CHAR(14) DATETIME (GMT) DCC is using UTC 02.Registration_Data_Interface_Specification_consultation_version 9

10 1.23 Each Electricity Network Party shall provide the following files, which are to conform to the latest Supported Version of the specified data flow structures as defined in the Data Transfer Catalogue. Initial upload and full Registration Data Refresh File To provide the DCC with an initial population of Registration Data and any subsequent full Registration Data refresh, each Electricity Network Party shall send a Registration Data Refresh File as specified in the Data Transfer Catalogue D0353 data flow. (b) Daily Registration Data Update File To notify the DCC of any changes to relevant Registration Data, each Electricity Network Party shall send a Registration Data Update File as specified in the Data Transfer Catalogue D0348 data flow. (c) Registration Data Refresh File - Partial refresh To provide the DCC with a partial refresh of Registration Data, each Electricity Network Party shall send a Registration Data Refresh File as specified in the Data Transfer Catalogue D0349 data flow. (d) Response File - DCC Status update rejections To notify the DCC of any data records rejected during processing of a DCC Status File due to validation errors, each Electricity Network Party shall send a Response File as specified in the Data Transfer Catalogue D0351 data flow. (e) Response File - DCC Status update acknowledgement To notify the DCC of successful processing of the Status Update file, each Electricity Network Party shall send a Response File as specified in the Data Transfer Catalogue D0172 data flow. 02.Registration_Data_Interface_Specification_consultation_version 10

11 1.24 The DCC shall provide the following files to each Electricity Network Party conforming to the data flow structures as defined in the Data Transfer Catalogue: DCC Status File To notify Electricity Network Parties of DCC Status updates, the DCC shall send a DCC Status File as specified in the Data Transfer Catalogue D0350 data flow Each Electricity Network Party shall provide Registration Data Refresh Files utilising the Secure File Transfer Protocol connection or via an alternative means as agreed between the DCC and the Electricity Network Party. Gas Registration Data File Structure and Data Formats 1.26 Each Gas Network Party shall maintain a unique reference number for files, maintained across all files it sends through the Registration Data Interface. Each file (with the exception of the multiple file confirmation file as defined in 1.32(c)) shall include this unique reference number within the file header, taken from a monotonically increasing number generator. The DCC shall check this unique reference number in order to detect duplicate, missing or out-of sequence files as defined in the process step 1.7(e) The DCC shall use and each Gas Network Party shall use industry standard comma separated file format for exchanging files. Files sent shall: (b) (c) (d) (e) (f) Include fields which are comma-separated Only use ASCII characters Not exceed the field lengths shown below at 1.32 and exclude any opening and closing double quotation marks or comma separators Not pad values that are less than the maximum field length Enclose text fields with opening and closing double quotation marks, but use no quotation marks in date and numeric fields Ensure blank fields contain no characters other than opening and closing 02.Registration_Data_Interface_Specification_consultation_version 11

12 double quotation marks for text fields 1.28 Each Gas Network Party shall employ the file naming convention described below in to (e), ensuring that each file sent through the DCC Gateway has a unique name. Within the names shown in to (e): PN indicates that the files are production (will be TN for test); nnnnnn will be the sequence number of the file in question; and xxx will be the file type (ERR, FRJ or DXR) as detailed in 1.34 File naming conventions: (b) (c) (d) (e) Registration Data Update File: XOS01.PNnnnnnn.XDO Registration Data Refresh File also used for initial population: XOS02.PNnnnnnn.XDO Daily DCC Status Files: DCC01.PNnnnnnn.DXI Response Files from Daily DCC Status File processing will be: XOS01.PNnnnnnn.xxx Multiple file confirmation file where Registration Data has been split into multiple Registration Data Files: XOS02.PNnnnnnn.TOK 1.29 In the circumstance where Registration Data Files need to be split into multiple files due to size limitations; each Gas Network Party shall additionally provide a multiple file confirmation file confirming the number of files within the set as defined in 1.32(c) and with the file naming convention defined in 1.28(e) Each Gas Network Party shall ensure that all files (with the exception of the multiple file confirmation file as defined in 1.32(c)) contain header and trailer records that conform to the formats as detailed below. File Header Field Name Length Description 02.Registration_Data_Interface_Specification_consultation_version 12

13 Transaction Organisation Id Text 3 Value: A00 Numeric 10 An reference which uniquely identifies the sending System User / Organisation For example: DCC is File Text 3 An application specific code used to identify the structure and the usage of the file. The allowable values are: XDO ERR FRJ DXI DXR Registration Data File Response File - record level validation failure Response File - file level validation failure DCC Status File Response File - DCC Status update response Creation Date Date 8 The date on which the file was generated. Format : YYYYMMDD Creation Time Text 8 The time (UTC) at which the file was generated (within the Creation Date) Generation Number Format : HHMMSS Numeric 6 A sequence number which represents an issue of a file from the Network Party or DCC (indicated by the organisation id). Each file sent either from the Network Party to DCC or from DCC to the Network Party will have a unique consecutively increasing number. File Trailer Field Name Length Description Transaction Record Count Text 3 Value: Z99 Numeric 10 The number of detail records contained within the file. This should not include the standard header and the standard trailer but should include any file specific headers if specified for this file i.e. only A00 and Z99 records are excluded. 02.Registration_Data_Interface_Specification_consultation_version 13

14 1.31 Each Gas Network Party shall provide daily Registration Data Update Files irrespective of whether there are Registration Data updates to convey. Where there are no updates to provide the Registration Data Update File will contain the standard header, file sequence number and trailer and no data records Each Gas Network Party shall provide files to the DCC conforming to the following data flow structures: Registration Data Update Files Registration Data updates shall be contained within a single file type (Ref XDO) and shall consist of up to 3 different types of data record per update as detailed below. Where Registration Data needs to be split into multiple Registration Data Update Files due to size limitations, the data for a specific MPRN shall not be split between files. (i) Data Notifications (Ref E47, including data items for the Supply Meter Point such as Address, Postcode & UPRN) Field Name Optionality Length Description Transaction Meter Point Reference MPRN Status Source Registration Id Mandatory Text 3 Value: E47 Mandatory Number 10 A unique identifier for the point at which a meter is, has been or will be connected to the gas network. Mandatory Text 2 The current status of the operability of the meter. Mandatory Text 3 Unique ID to identify the GT or igt which has sent the data. 02.Registration_Data_Interface_Specification_consultation_version 14

15 Field Name Optionality Length Description Meter Point Address Meter Point Postcode Market Sector Flag Unique Property Reference Number Optional Text 250 Standard PAF Format Address for the Supply Meter Point. This field will be a concatenated form of the elements of the Supply Meter Point Address available. The address will be separated within the text delimiters (double quotation marks) by commas. The address will be represented in a consistent manner in the following order: Plot Number, Building Number, Sub Building Name, Building Name, Principal Street, Dependent Locality Post Town. If no address field data has been provided, the field will be blank denoted as ",,,,,," Optional Text 9 Standard PAF Post Code as defined in the PAF digest. The postcode will comprise the concatenated outcode and incode, separated by a space. Optional Text 1 A code that specifies that the site is used for Domestic or Industrial purposes. The allowable values are: D Domestic or I Industrial. Optional Text 12 A Unique Property Reference Number. It is a unique reference number that can be linked to further address information that is collated and provided by the Ordnance Survey Group. This field will not be populated until governance is agreed. (delivered as Null) (ii) Organisation Notifications (Ref. E48, including details of the various organisations associated with the MPRN such as Supplier, Meter Asset Manager and Network Operator). Field Name Optionality Length Description Transaction Mandatory Text 3 Value: E48 02.Registration_Data_Interface_Specification_consultation_version 15

16 Field Name Optionality Length Description Organisation Organisation Identifier Organisation Effective From Date Organisation Effective To Date Mandatory Text 3 A three character short code denoting the role performed by the Organisation being notified as being effective at the Supply Meter Point denoted in the parent record. The allowable values are: SUP Supplier; MAM Meter Asset Manager; NWO Network Operator. Mandatory Text 3 A three character short code which is assigned by the Transporter to denote the identity of the Organisation being notified as being effective at the Supply Meter Point denoted in the parent record. Mandatory Date 8 The date from which the Organisation was effective from or appointed to the Supply Meter Point denoted in the parent record. Format : YYYYMMDD Optional Date 8 Organisation s Effective To Date. Format : YYYYMMDD N.B. Where the date is , this will be treated as Null This will not be provided for Meter Asset Manager and Network Operator. (iii) Organisation Deletions (Ref. E49, including details of the various organisations previously associated with the MPRN which are now to be deleted). This record type is used to delete future dated organisations which will no longer come into effect due to other data changes. For example where a new Meter Asset Manager is due to be associated with an MPRN, but a change of supplier occurs before the effective date and the supplier assigns their own Meter Asset Manager. 02.Registration_Data_Interface_Specification_consultation_version 16

17 Field Name Optionality Length Description Transaction Organisation Organisation Identifier Organisation Effective From Date Organisation Effective To Date Mandatory Text 3 Value: E49 Mandatory Text 3 A three character short code denoting the role performed by the Organisation being notified as being effective at the Supply Meter Point denoted in the parent record. The allowable values are: SUP Supplier; MAM Meter Asset Manager; NWO Network Operator. Mandatory Text 3 A three character short code which is assigned by the Transporter to denote the identity of the Organisation being notified as being effective at the Supply Meter Point denoted in the parent record. Mandatory Date 8 The date from which the Organisation was effective from or appointed to the Supply Meter Point denoted in the parent record. Format : YYYYMMDD Optional Date 8 Organisation s Effective To Date. Format : YYYYMMDD NB Where the date is , this will be treated as Null (b) Response File - DCC Status update responses Following the processing of the DCC Status File (file format described in 1.33) each Gas Network Party shall provide a Response File indicating whether each of the DCC Status update records (record reference E45 ) was accepted or rejected. For each E45 record in the incoming DXI DCC Status File there will be a corresponding E46 record (as described immediately below) in the DXR Response File. If the E45 record is processed successfully, the outcome code in the E46 record will be "AC" and if unsuccessful the outcome code is RJ. Where the outcome is RJ the rejection reason will be notified to the DCC through an S72 record or records directly following the E Registration_Data_Interface_Specification_consultation_version 17

18 (i) The format of an E46 record is as follows: Field Name Optionality Length Description Transaction Mandatory Text 3 Value: E46 Outcome Code Mandatory Text 2 Details whether the request has been accepted or rejected. AC Accepted RJ Rejected. Meter Point Reference Mandatory Number 10 DCC Service Flag DCC Service Effective From Date Mandatory Text 1 Service flag provided by the DCC. The allowable values are: A Active S Suspended W Withdrawn Mandatory Date 8 The date the DCC Service Flag (provided above) is effective from. Format : YYYYMMDD (ii) The format of an S72 record is as follows: Field Name Transaction Rejection Code Optionality Length Description Mandatory Text 3 Value: S72 Mandatory Text 8 The unique reference number identifying the reason for the validation failure. One of the following two values: MPO00001 Supply Meter Point does not exist DCC00001 DCC Service Flag value is not recognised (c) Multiple file confirmation file Where Registration Data needs to be split into multiple files due to size limitations, each Gas Network Party shall provide an additional file confirming the number of files within the set. 02.Registration_Data_Interface_Specification_consultation_version 18

19 Field Name Optionality Length Description File Name Mandatory Text 18 Record Count Mandatory Number 10 The number of detail records contained within the file. This should not include the standard header and the standard trailer but should include any file specific headers if specified for this file i.e. only A00 and Z99 records are excluded The DCC shall provide files to each Gas Network Party conforming to the following data flow structure: DCC Status File To notify each Gas Network Party of DCC Status updates the DCC shall send a single DCC Status File (Ref DXI) that shall consist of a single data record per update (Ref. E45). The format of an E45 record is as follows: Field Name Optionality Length Description Transaction Meter Point Reference DCC Service Flag DCC Service Effective From Date (b) Mandatory Text 3 Value: E45 Mandatory Number 10 Mandatory Text 1 Service flag provided by the DCC. The allowable values are: A Active S Suspended W Withdrawn Mandatory Date 8 The date the DCC Service Flag (provided above) is effective from. Format : YYYYMMDD 02.Registration_Data_Interface_Specification_consultation_version 19

20 1.34 Each Gas Network Party shall create and send the Response Files as defined in 1.34 and (b) below, in response to failures in validation of the DCC Status File. On receipt of the Response File DCC shall raise an Incident as defined in the DCC Registration Data Incident Management Policy. Record level format failure Response File To record any record level format validation errors found in processing the DCC Status File, the Gas Network Party shall create a Response File with header and trailer as defined in 1.30 and one or more record level error records as detailed below. The file name will be as defined in 1.28(d) with suffix ERR. Field Name Optionality Length Description Transaction Rejection Code File Reference Rejection Description Mandatory Text 3 Value: E01 Mandatory Text 8 The unique reference number identifying the reason for the validation failure as defined in the Error Code under 1.34(c) Mandatory Number 10 The unique reference number of the file that was received and processed. Mandatory Text 250 Description of the error found and which record/field it occurred as defined in the Rejection Reason under 1.34(c). (b) Response File - File level rejection To record any file level format validation errors found in processing the DCC Status File, the Network Party shall create a Response File with header and trailer as defined in 1.30 and the file name will be as defined in 1.28(d) with suffix FRJ. File level validation failures will be contained within a single file and will consist of 2 different types of data record per file Rejected File (record reference S71) and Rejection Details (record reference S72). There will be one S71 record followed by one or more S72 records. 02.Registration_Data_Interface_Specification_consultation_version 20

21 (i) The format of an S71 record is as follows: Field Name Optionality Length Description Transaction Mandatory Text 3 Value: S71 File Reference Mandatory Text 30 The unique reference number of the file that was received and processed. (ii) The format of an S72 record is as follows: Field Name Optionality Length Description Transaction Rejection Code Mandatory Text 3 Value: S72 Mandatory Text 8 The unique reference number identifying the reason for the validation failure as defined in the Error Code under 1.34(d) (c) Record level - Error codes Error Code CSV00010 CSV00011 CSV00012 CSV00013 CSV00014 CSV00015 CSV00019 CSV00020 CSV00021 CHK00036 Rejection Reason Transaction type not recognized - <Record identifier> Invalid character - <Record identifier>, <Field number> Invalid numeric field, <Record identifier>, <Field number> Premature end of record - <Record identifier> Invalid record termination - <Record identifier> Invalid text field - <Record identifier>, <Field number> Record too short - <Record identifier> Mandatory field expected - <Record identifier>, <Field number> Invalid Date/Time field - <Record identifier>, <Field number> Mandatory record not supplied - <Record identifier> 02.Registration_Data_Interface_Specification_consultation_version 21

22 (d) File level - Error codes Error Code FIL00013 FIL00014 FIL00015 FIL00016 FIL00017 FIL00018 FIL00019 Rejection Reason Organisation ID on Header cannot be found Organisation ID on the Header does not match the Sender's ID File on the Header is not the same as that in File Name Generation Number on the Header is not the same as that in File Name A file has previously been received & processed with this Generation Number A count of Detail Records in the File does not match that held on the Trailer Invalid Record found 02.Registration_Data_Interface_Specification_consultation_version 22

REGISTRATION DATA INTERFACE SPECIFICATION

REGISTRATION DATA INTERFACE SPECIFICATION REGISTRATION DATA INTERFACE SPECIFICATION DEFINITIONS Data Transfer Catalogue DCC Status DCC Status File Electricity Registration Data Provider FTP FTPS Gas Registration Data Provider Hot Standby Router

More information

REGISTRATION DATA INTERFACE SPECIFICATION

REGISTRATION DATA INTERFACE SPECIFICATION REGISTRATION DATA INTERFACE SPECIFICATION DEFINITIONS In this document, except where the context otherwise requires: expressions defined in section A of the Code (Definitions and Interpretation) have the

More information

Electricity Registration Data Interface Specification

Electricity Registration Data Interface Specification Electricity Registration Data Interface Specification Author: DCC Version: Date: 04/08/201428/07/2014 Formatted: Fo Dark Blue 1.2 Contents 1 Introduction... 5 1.1 Document Purpose... 5 1.2 Document Scope...

More information

Threshold Anomaly Detection Procedures (TADP)

Threshold Anomaly Detection Procedures (TADP) Threshold Anomaly Detection Procedures (TADP) DCC Public Page 1 of 14 Contents 1 Introduction... 3 2 DCC Anomaly Detection Threshold Consultation... 4 3 Notification of Anomaly Detection Thresholds...

More information

Error Handling Strategy. DCC Guidance Document

Error Handling Strategy. DCC Guidance Document Error DCC Guidance Document Date: June 2016 Classification: DCC Public Table of Contents 1 Introduction... 3 1.1 Purpose... 3 1.2 Scope... 3 1.3 General Provisions... 3 2 Error Management... 4 2.1 Error

More information

Patient Reported Outcome Measures (PROMs)

Patient Reported Outcome Measures (PROMs) Patient Reported Outcome Measures (PROMs) Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification DCCKI Interface Design Specification and DCCKI Repository Interface Design Specification 1 INTRODUCTION Document Purpose 1.1 Pursuant to Section L13.13 of the Code (DCCKI Interface Design Specification),

More information

Co-Ordinated Retail Market Message Guide

Co-Ordinated Retail Market Message Guide Co-Ordinated Retail Market Message Guide ROI Implementation Market Gateway Activity Document Information Business Area: Status: Author/s: ESB Networks Final ESBN Version Number: 3.1 Reason for Change Co-Ordinated

More information

ELECTRONIC FILE TRANSFER SPECIFICATION

ELECTRONIC FILE TRANSFER SPECIFICATION S ELECTRONIC FILE TRANSFER SPECIFICATION COUNT: Page 1 of 29 DOCUMENT APPROVAL ROLE NAME SIGNATURE DATE Author Ben Haworth 19/03/2014 Editor Nicole Williamson-Ashi 11/11/2015 Reviewer Mark Pearce 20/11/2015

More information

Co-Ordinated Retail Market Message Guide

Co-Ordinated Retail Market Message Guide Co-Ordinated Retail Market Message Guide ROI Implementation - Customer Data and Agreements Document Information Business Area: Status: Author/s: ESB Networks Final ESBN Version Number: 3.1 Reason for Change

More information

Error Handling Strategy

Error Handling Strategy Handling Strategy Draft DCC Guidance Document June 2016 Page 1 of 13 Contents 1. Introduction 3 1.1. Purpose 3 1.2. Scope 3 1.3. General Provisions 3 2. Management 5 2.1. Classification 5 2.2. Handling

More information

APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION SEC SUBSIDIARY DRAFT

APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION SEC SUBSIDIARY DRAFT APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION SEC SUBSIDIARY DRAFT Term DNS Interface Transaction MPLS PEP SAML Smart Card Token Defined Terms Expansion (with Explanation) Domain Name System

More information

Co-Ordinated Retail Market Message Guide

Co-Ordinated Retail Market Message Guide Co-Ordinated Retail Market Message Guide ROI Implementation - Meter Works Document Information Business Area: Status: Author/s: ESB Networks Final ESBN Version Number: 3.1 Reason for Change Co-Ordinated

More information

USER FILE DESIGN SPECIFICATION

USER FILE DESIGN SPECIFICATION USER FILE DESIGN SPECIFICATION COUNT: Page 1 of 45 DOCUMENT APPROVAL ROLE NAME SIGNATURE DATE AUTHOR Ben Haworth 20/03/2014 EDITOR Nicole Williamson-Ashi 12/11/2015 REVIEWER Mark Pearce 20/11/2015 DOCUMENT

More information

R1.4 - DCC DRAFT - SEC 5.x Appendix AH. Version AH 1.0. Appendix AH. Self-Service Interface Design Specification

R1.4 - DCC DRAFT - SEC 5.x Appendix AH. Version AH 1.0. Appendix AH. Self-Service Interface Design Specification Version AH 1.0 Appendix AH Self-Service Interface Design Specification 1 s In this document, except where the context otherwise requires: expressions defined in Section A1 of the Code (s) have the same

More information

APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION

APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION s In this document, except where the context otherwise requires: expressions defined in Section A1 of the Code (s) have the same meaning as is set

More information

APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION

APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION APPENDIX XXX SELF-SERVICE INTERFACE DESIGN SPECIFICATION s In this document, except where the context otherwise requires: expressions defined in Section A1 of the Code (s) have the same meaning as is set

More information

Electricity Registration Data Interface Code of Connection

Electricity Registration Data Interface Code of Connection Electricity Registration Data Interface Code of Connection Author: DCC Version: v1.2 Date: 04/08/2014 Page 1 of 29 Contents 1 Introduction... 4 1.1 Document Purpose... 4 1.2 Document Scope... 4 1.3 d documents...

More information

AUTACK. Secure authentication and acknowledgement message. Edition 2012

AUTACK. Secure authentication and acknowledgement message. Edition 2012 Secure authentication and acknowledgement message Edition 2012 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5 5. Segments Layout... 6 6. Example(s)...

More information

Automated Meter Reading: MAM Manual V4.0

Automated Meter Reading: MAM Manual V4.0 Automated Meter Reading: MAM Manual V4.0 23/05/2013-1 - AMR MAM Manual V4.0 Table of Contents 1. Introduction...4 1.1 Overview of AMR Service...4 1.2 Communications...4 1.3 Service Levels and Read Deliveries...4

More information

AUTACK. Secure authentication and acknowledgement message. Edition 2016

AUTACK. Secure authentication and acknowledgement message. Edition 2016 EANCOM 2002 S4 Secure authentication and acknowledgement message Edition 2016 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5 5. Segments Layout...

More information

File Names and Formats

File Names and Formats File Names and Formats Electricity Reconciliation Manager This document lists the file name and file format for each file transferred to and from the reconciliation manager under Part 15 of the Code effective

More information

Co-Ordinated Retail Market Message Guide

Co-Ordinated Retail Market Message Guide Co-Ordinated Retail Market Message Guide ROI Implementation - Data Processing Document Information Business Area: Status: Author/s: ESB Networks Final ESBN Version Number: 3.1 Reason for Change Co-ordinated

More information

UK LINK ACCESS DOCUMENT

UK LINK ACCESS DOCUMENT UK LINK ACCESS DOCUMENT UKLAD3 UK LINK FILE TRANSFER DEFINITION Page 1 of 29 VERSION CONTROL Version COR Date of change 8 CORs: July 2014 Approved 1000.1 2355 9.2 Live COR353 8 / COR315 1.1 August 2015

More information

SIX Trade Repository AG

SIX Trade Repository AG January 2018 Client Table of contents 1.0 Introduction 4 1.1 Purpose 4 1.2 Acronyms 4 1.3 Version table 4 2.0 Overview of systems and workflows 4 3.0 Input connectivity options 6 3.1 FTS-Gateway 6 3.1.1

More information

Reconciliation User Guide

Reconciliation User Guide Reconciliation User Guide This document provides information on interfacing with the reconciliation manager and the reconciliation system under Part 15 of the Electricity Industry Participant Code (The

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

Registration Data Incident Management Policy

Registration Data Incident Management Policy Registration Data Incident Management Policy Author: DCC Operational Policy Draft Version 1 Date: 1 st May 2014 Page 1 of 23 Contents 1 Document History 4 1.1 Document Location 4 1.2 Review Dates 4 1.3

More information

SELF SERVICE INTERFACE CODE OF CONNECTION

SELF SERVICE INTERFACE CODE OF CONNECTION SELF SERVICE INTERFACE CODE OF CONNECTION Definitions SSI Administration User Identity Management System Identity Provider Service Policy Enforcement Point (or PEP) SAML Security Patch Smart Card Token

More information

SWG-F D6 MESSAGE IMPLEMENTATION GUIDELINE OF THE UN/EDIFACT SECURE AUTHENTICATION & ACKNOWLEDGEMENT MESSAGE AUTACK. DRAFT 0.6m

SWG-F D6 MESSAGE IMPLEMENTATION GUIDELINE OF THE UN/EDIFACT SECURE AUTHENTICATION & ACKNOWLEDGEMENT MESSAGE AUTACK. DRAFT 0.6m SWG-F D6 MESSAGE IMPLEMENTATION GUIDELINE OF THE UN/EDIFACT SECURE AUTHENTICATION & ACKNOWLEDGEMENT MESSAGE AUTACK DRAFT 0.6m This simplified Message Implementation Guide is designed to accommodate the

More information

Electricity Information Exchange Protocols (EIEP)

Electricity Information Exchange Protocols (EIEP) The Authority is currently updating the numbering and formatting in this document and an updated document will be released soon. Electricity Information Exchange Protocols (EIEP) Functional Specification

More information

DCC Connection Guidance

DCC Connection Guidance DCC Connection Guidance Guidance to assist SEC Parties understand the connections and connection types that are required to connect to the DCC Service Author: Operations Date: 19/01/2015 DCC PUBLIC Page

More information

SMKI Repository Interface Design Specification TPMAG baseline submission draft version 8 September 2015

SMKI Repository Interface Design Specification TPMAG baseline submission draft version 8 September 2015 SMKI Repository Interface Design Specification DCC Public Page 1 of 21 Contents 1 Introduction 3 1.1 Purpose and Scope 3 1.2 Target Response Times 3 2 Interface Definition 4 2.1 SMKI Repository Portal

More information

Electricity Registration Data Interface Code of Connection

Electricity Registration Data Interface Code of Connection Electricity Registration Data Interface Code of Connection Author: DCC Version: v1.21.21 Date: 04/08/201421/07/201418 July 27 March 2014 Page 1 of 32 Contents 1 Introduction... 4 1.1 Document Purpose...

More information

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT FOR SHARED SERVICES (SHRD) Version: 1.0 Status: FINAL Date: 06/12/2017 Contents 1 EUROSYSTEM SINGLE MARKET INFRASTRUCTURE GATEWAY (ESMIG)... 6 1.1 Overview...

More information

Pretty Good Privacy (PGP

Pretty Good Privacy (PGP PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Pretty Good Privacy (PGP

More information

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

WP195 Capacity Market and CFD Metered Data

WP195 Capacity Market and CFD Metered Data WP195 Capacity Market and CFD Metered Data EMRS Working Practice Public Version: 4.0 Date: 6 December 2017 Table of Contents Change Amendment Record 3 1. Introduction 4 1.1 Scope and Purpose 4 1.2 Main

More information

SSH Algorithms for Common Criteria Certification

SSH Algorithms for Common Criteria Certification The feature provides the list and order of the algorithms that are allowed for Common Criteria Certification. This module describes how to configure the encryption, Message Authentication Code (MAC), and

More information

Virtual Private Networks

Virtual Private Networks EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,

More information

Rules on Standards for Requesting and Exchanging Site-Specific Historic Usage Information for Retail Electricity and Natural Gas Markets

Rules on Standards for Requesting and Exchanging Site-Specific Historic Usage Information for Retail Electricity and Natural Gas Markets Rule 010 Rules on Standards for Requesting and Exchanging Site-Specific Historic Usage Information for Retail Electricity and Natural Gas Markets This rule was approved by the Alberta Utilities Commission

More information

Error Handling Strategy

Error Handling Strategy Error Handling Strategy Author: DCC Operational Policy Draft Version 1 Date: 1 st May 2014 Page 1 of 13 Contents 1. Document History 3 1.1 Document Location 3 1.2 Review Dates 3 1.3 Revision History 3

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

TECHNICAL SPECIFICATION

TECHNICAL SPECIFICATION TECHNICAL SPECIFICATION IEC/TS 62351-5 Edition 2.0 2013-04 Power systems management and associated information exchange Data and communications security Part 5: Security for IEC 60870-5 and derivatives

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

SMPTE Standards Transition Issues for NIST/FIPS Requirements

SMPTE Standards Transition Issues for NIST/FIPS Requirements SMPTE Standards Transition Issues for NIST/FIPS Requirements Contents 2010.5.20 DRM inside Taehyun Kim 1 Introduction NIST (National Institute of Standards and Technology) published a draft special document

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

UDG Interface Specification

UDG Interface Specification Please respond to: LME IT Solutions Delivery THE LONDON METAL EXCHANGE 10 Finsbury Square, London EC2A 1AJ Tel +44 (0)20 7113 8888 Registered in England no 2128666. Registered LME.COM 1 INTRODUCTION...

More information

DESCRIPTION OF UK LINK. July Version 1.1 For Approval. Deleted: June Formatted: Highlight. Formatted: Highlight

DESCRIPTION OF UK LINK. July Version 1.1 For Approval. Deleted: June Formatted: Highlight. Formatted: Highlight DESCRIPTION OF UK LINK July 2017 Version 1.1 For Approval Deleted: June Formatted: Highlight Formatted: Highlight Version Control Version COR Date of Change Changes 1 Draft - June 2017 Update to reflect

More information

Secure File Transfer Protocol (SFTP) Data Submission Users Manual. July 2017, Version 1.6

Secure File Transfer Protocol (SFTP) Data Submission Users Manual. July 2017, Version 1.6 Secure File Transfer Protocol (SFTP) Data Submission Users Manual July 2017, Version 1.6 DOCUMENT CHANGE HISTORY Version Number Date Page(s) Affected 1.0 June 2012 Initial version 1.1 March 2013 Formatting

More information

8. Network Layer Contents

8. Network Layer Contents Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group < 2004-05-172004-05-17 IEEE C802.16e-04/67r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Enhancement of 802.16e to Support Secure EAP PKM messages

More information

Data Enquiry Service. User Guide

Data Enquiry Service. User Guide Data Enquiry Service User Guide Table of Contents 1. Introduction... 2 2. Getting Started with Data Enquiry... 3 2.1 Xoserve Service Portal Login 3 2.2 Industrial and Commercial Customer Users Only 5 2.3

More information

SEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy

SEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy Draft Version AG 1.1 Deleted: 0 Appendix AG Incident Management Policy 1 Definitions In this document, except where the context otherwise requires: Expressions defined in section A of the Code (Definitions

More information

Part 1 DETAIL OF DISCUSSION REQUEST / MARKET CHANGE REQUEST. RoI Request Originator Name. Theresa O Neill Date Raised 02/03/2015

Part 1 DETAIL OF DISCUSSION REQUEST / MARKET CHANGE REQUEST. RoI Request Originator Name. Theresa O Neill Date Raised 02/03/2015 Market Change Request 1140 Introduction of Eircodes into the Retail Market in Ireland Status Issued to Market Priority High Status Date 22/08/2018 Date Version Reason for Change Version Status 02/03/2015

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

NI Market Message Implementation Guide Meter Works

NI Market Message Implementation Guide Meter Works NI Market Message Implementation Guide Meter Works Document Information Business Area: NIE Status: Baseline Author/s: Version Number: 2.4.1 Document Updates Name Date Reason Version Shane O Neill Patrick

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident

More information

Balancing and Settlement Code. Multiple BM Unit. Instruction Processing Specification. Version 2.0. Effective Date: 8 August 2008

Balancing and Settlement Code. Multiple BM Unit. Instruction Processing Specification. Version 2.0. Effective Date: 8 August 2008 Balancing and Settlement Code Multiple BM Unit Instruction Processing Specification Version 2.0 Effective Date: 8 August 2008 Balancing and Settlement Code Page 1 of 14 8 August 2008 Contents Table 1 Introduction...

More information

The IPsec protocols. Overview

The IPsec protocols. Overview The IPsec protocols -- components and services -- modes of operation -- Security Associations -- Authenticated Header (AH) -- Encapsulated Security Payload () (c) Levente Buttyán (buttyan@crysys.hu) Overview

More information

Implementation Guide for Delivery Notification in Direct

Implementation Guide for Delivery Notification in Direct Implementation Guide for Delivery Notification in Direct Contents Change Control... 2 Status of this Guide... 3 Introduction... 3 Overview... 3 Requirements... 3 1.0 Delivery Notification Messages... 4

More information

SVA Data Catalogue Volume 1

SVA Data Catalogue Volume 1 Volume 1: Data Interfaces Volume 1 Abstract This document defines the data interfaces required by Supplier Volume Allocation under the BSC. All of the interfaces are cross-referenced to the relevant Programme

More information

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48 I N D E X Numerics A 3DES (Triple Data Encryption Standard), 48 Access Rights screen (VPN 3000 Series Concentrator), administration, 316 322 Action options, applying to filter rules, 273 adding filter

More information

UK LINK MANUAL FILE TRANSFER DEFINITION. May Version 13 For Approval. FILE TRANSFER DEFINITION David Addison 27/2/ :43 Deleted: USER GUIDE

UK LINK MANUAL FILE TRANSFER DEFINITION. May Version 13 For Approval. FILE TRANSFER DEFINITION David Addison 27/2/ :43 Deleted: USER GUIDE UK LINK MANUAL David Addison 22/2/2017 12:17... [1] May 2017 Rachel Hinsley 3/5/2017 16:26 Version 13 For Approval Rachel Hinsley 2/5/2017 09:18 Copyright Notice... [2] 016 Page 1 VERSION CONTROL Version

More information

SFT User Manual C:D. Secure File Transfer with Connect:Direct. Document date: 15 November 2016 Classification: Open Version: 4.0

SFT User Manual C:D. Secure File Transfer with Connect:Direct. Document date: 15 November 2016 Classification: Open Version: 4.0 SFT User Manual C:D Secure File Transfer with Connect:Direct Document date: 15 November 2016 Classification: Open Version: 4.0 Copyright equensworldline SE and/or its subsidiaries. All rights reserved.

More information

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even

More information

WP24 CFD Settlement: Required Information

WP24 CFD Settlement: Required Information WP24 Settlement: Required Information Working Practice Public Version: 3.0 Date: 16 May 2018 Table of Contents Change Amendment Record 3 1. Introduction 4 1.1 Scope and Purpose 4 1.2 Main Users and Responsibilities

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 19 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear, the Board's access to other sources

More information

Arkansas All-Payer Claims Database (APCD) Onboarding Packet

Arkansas All-Payer Claims Database (APCD) Onboarding Packet Arkansas All-Payer Claims Database (APCD) Onboarding Packet October 2018 Introduction The onboarding packet contains information for submitting entities (SEs) to establish connectivity for secure data

More information

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4

More information

Symantec Security Information Manager FIPS Operational Mode Guide

Symantec Security Information Manager FIPS Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide The software described in this book is furnished

More information

XML FILE DESIGN SPECIFICATION

XML FILE DESIGN SPECIFICATION XML FILE DESIGN SPECIFICATION FILE REF: File Reference: S03P5 v1.1 COUNT: Page 1 of 12 DATE: Created on 09/02/2016 06:39:00 DOCUMENT APPROVAL ROLE NAME SIGNATURE DATE AUTHOR Ben Haworth 01/10/2015 EDITOR

More information

NIST Cryptographic Toolkit

NIST Cryptographic Toolkit Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Web Security Web is now widely used by business, government, and individuals But Internet and Web are

More information

MSATS PROCEDURES: CATS PROCEDURE PRINCIPLES AND OBLIGATIONS

MSATS PROCEDURES: CATS PROCEDURE PRINCIPLES AND OBLIGATIONS MSATS PROCEDURES: CATS PROCEDURE PRINCIPLES AND OBLIGATIONS PPEPARED FOR: Electricity PREPARED BY: Retail Markets and Metering DOCUMENT NO: MT_RT1700v004.03.8 VERSION NO: 4.03.8 EFFECTIVE DATE: 15 May

More information

Oracle Cloud Using Oracle IoT Connected Worker Cloud Service

Oracle Cloud Using Oracle IoT Connected Worker Cloud Service Oracle Cloud Using Oracle IoT Connected Worker Cloud Service 17.4.5 E84369-02 December 2017 Oracle Cloud Using Oracle IoT Connected Worker Cloud Service, 17.4.5 E84369-02 Copyright 2017, Oracle and/or

More information

ECAS. Conversion Specification. Provided to ECAS. Issue 4.1. Document No.

ECAS. Conversion Specification. Provided to ECAS. Issue 4.1. Document No. ECAS Mobile Conversion Specification Location Provided to ECAS Issue 4.1 Document No. Document Information Document Title Mobile Location Conversion Specification Filename Mobile Location Conversion Specification

More information

The EN-4000 in Virtual Private Networks

The EN-4000 in Virtual Private Networks EN-4000 Reference Manual Document 8 The EN-4000 in Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission

More information

Oracle Responsys Classic Connect

Oracle Responsys Classic Connect http://docs.oracle.com Oracle Responsys Classic Connect User Guide 2018, Oracle and/or its affiliates. All rights reserved 13-Sep-2018 Contents 1 Connect 5 2 Creating Export Jobs in Classic Connect 6 2.1

More information

UK LINK DESCRIPTION UK LINK DESCRIPTION DOCUMENT

UK LINK DESCRIPTION UK LINK DESCRIPTION DOCUMENT DOCUMENT Version Control Version COR Date of Change Changes 1 Draft - June 2017 Update to reflect implementation of UNC Modification 0565A. Author David Addison 1.1.For Approval July 2017 Minor amendment

More information

Oracle Utilities Opower Interval Data Transfer Standards

Oracle Utilities Opower Interval Data Transfer Standards Oracle Utilities Opower Interval Data Transfer Standards E84788-01 Specification Version Number: v1-6-0 Last Update: May 08, 2018 Oracle Utilities Opower Interval Data Transfer Standards E84788-01 Copyright

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

Fleet Account Data Transmission

Fleet Account Data Transmission Fleet Account Data Transmission Interface Control Document Prepared for: Version 1.23 June 14, 2018 Table of Contents Contents 1. Document Revision History... 5 2. Document Acronyms and Definitions...

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Summary of PGP Services

Summary of PGP Services Table 15.1 Summary of PGP Services Function Algorithms Used Description Digital signature Message encryption Compression Email compatibility DSS/SHA or RSA/SHA CAST or IDEA or Three-key Triple DES with

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

XOSERVE LIMITED SERVICES SCHEDULE FOR THE PROVISION OF NON-CODE USER PAYS SERVICES (REFERENCE NUMBER XNCUP(SS)05) DATED 20 INTRODUCTION

XOSERVE LIMITED SERVICES SCHEDULE FOR THE PROVISION OF NON-CODE USER PAYS SERVICES (REFERENCE NUMBER XNCUP(SS)05) DATED 20 INTRODUCTION XOSERVE LIMITED SERVICES SCHEDULE FOR THE PROVISION OF NON-CODE USER PAYS SERVICES (REFERENCE NUMBER XNCUP(SS)05) DATED 20 INTRODUCTION 1 This services schedule forms part of the framework contract for

More information

Employment Information System (EIS) File Format Layouts Last update September 25, 2017

Employment Information System (EIS) File Format Layouts Last update September 25, 2017 Employment Information System (EIS) File Format Layouts Last update Illinois State Board of Education 100 North First Street Springfield, IL 62777-0001 TABLE OF CONTENTS Change History... 3 Employment

More information

Lecture 12 Page 1. Lecture 12 Page 3

Lecture 12 Page 1. Lecture 12 Page 3 IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

: Practical Cryptographic Systems March 25, Midterm

: Practical Cryptographic Systems March 25, Midterm 650.445: Practical Cryptographic Systems March 25, 2010 Instructor: Matthew Green Midterm Name: As with any exam, please do not collaborate or otherwise share information with any other person. You are

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Internet Engineering Task Force (IETF) Request for Comments: 6403 Category: Informational ISSN: M. Peck November 2011

Internet Engineering Task Force (IETF) Request for Comments: 6403 Category: Informational ISSN: M. Peck November 2011 Internet Engineering Task Force (IETF) Request for Comments: 6403 Category: Informational ISSN: 2070-1721 L. Zieglar NSA S. Turner IECA M. Peck November 2011 Suite B Profile of Certificate Management over

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will

More information

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information