FDS manual File Delivery Services SFTP and FTP file transfer

Similar documents
FDS manual File Delivery Services SFTP and FTP file transfer

FDS BCM migration user guide File Delivery Services Converting to a location-redundant FDS platform

File transfer clients manual File Delivery Services

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

Service Managed Gateway TM. Configuring IPSec VPN

Network Services Internet VPN

Industrial Control System Security white paper

SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity.

Network Security Policy

Networking interview questions

"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

VI. Corente Services Client

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Virtual private networks

Network Security and Cryptography. 2 September Marking Scheme

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

ET4254 Communications and Networking 1

Barracuda Link Balancer

E-Commerce. Infrastructure I: Computer Networks

Application of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Table of Contents 1 GRE Configuration Point to Multi-Point GRE Tunnel Configuration 2-1

VII. Corente Services SSL Client

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

ONE OFFICE LITE - PRODUCT SPECIFICATION

CyberP3i Course Module Series

Designing Windows Server 2008 Network and Applications Infrastructure

APA Web Services Access Request

Chapter 3 LAN Configuration

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

Microsoft Installing, Configuring, and Administering Microsoft Exchange 2003 Server Implementing &Managing MS Exchange Server 2003

Service Description Safecom Customer Connection Version 3.5

Virtual Private Networks (VPNs)

Cryptography and Network Security. Sixth Edition by William Stallings

Chapter 9. Firewalls

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

APA Automatic Nomination System. FTPS Access Request. For Gas Transmission Customers

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

IPv6 migration challenges and Security

Network Integration Guide Planning

IBM emessage Version 9 Release 1 February 13, User's Guide

COMPUTER NETWORK SECURITY

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

MTA_98-366_Vindicator930

Network Service Description

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

Security Annex for Firewalls Additional Terms for Firewall Service

Virtual Private Networks

NetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers

Unified Messaging Guide for Cisco Unity Connection Release 11.x

Identity Firewall. About the Identity Firewall

Intranets and Virtual Private Networks (VPNs)

Wireless-G Router User s Guide

Electronic Data Interchange

Designing an Exchange 2000/2003 Routing Group Connector Topology

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Network Configuration Example

Introduction to Networking

Security. Reliability

Internet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide

AVEVA Global. Release 12.0.SP6 WCF. User Bulletin

Contents. Configuring SSH 1

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Introduction to TCP/IP

Windows 2000 minimum SP3, Windows Server 2003, Windows XP minimum SP2, Windows 7 d. TCP/IP Communication at the ATM with connectivity to Internet

SFT User Manual C:D. Secure File Transfer with Connect:Direct. Document date: 15 November 2016 Classification: Open Version: 4.0

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

Customer Managed Connectivity - Milan

Oracle Cloud. Using Oracle Network Cloud Service - FastConnect Standard Edition E

R5: Configuring Windows Server 2008 R2 Network Infrastructure

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

HikCentral V.1.1.x for Windows Hardening Guide

Distributed System Chapter 16 Issues in ch 17, ch 18

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

ZENworks for Desktops Preboot Services

Secure VPNs for Enterprise Networks

Archiving Service Administrator Guide

HikCentral V1.3 for Windows Hardening Guide

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0

Application Layer. Presentation Layer. Session Layer. Transport Layer. Network Layer. Data Link Layer. Physical Layer

Integrating WX WAN Optimization with Netscreen Firewall/VPN

Evolution Of The Need For IAM. Securing connections between people, applications, and networks

Junos Security (JSEC)

D-Link DSR Series Router

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Contents. Configuring GRE 1

Configuring SSL CHAPTER

Transcription:

FDS manual File Delivery Services SFTP and FTP file transfer

Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) IT261 FDS Operation E-mail: fds@post.ch Version 8.3 / February 2016 Download the latest version from: https://www.post.ch/fds FDS manual Version 8.3 / February 2016 page 2

Table of contents 1. Introduction... 4 2. Post CH Ltd FDS model... 5 2.1 Overview... 5 2.2 Supported protocols... 5 2.3 Connection types... 5 3. FDS service... 6 3.1 File Delivery System... 6 3.2 Where are the file delivery services?... 6 3.3 File Transfer Protocols... 6 3.3.1 FTP... 6 3.3.2 SFTP... 6 3.3.3 Recommended clients... 6 3.4 Delivery and collection from an external server... 7 3.5 Using the File Delivery Service... 7 4. Security... 8 4.1 User name (login)... 8 4.2 Password policy... 8 4.2.1 FTP... 8 4.2.2 SFTP... 8 4.3 Link encryption... 8 4.3.1 For all connection types... 8 4.3.2 MPLS/IPSS... 8 4.3.3 LAN-LAN... 8 5. Configurations... 9 5.1 FDS client-server configuration... 9 5.1.1 File transfer server... 9 5.1.2 DNS caching... 9 5.1.3 Ports... 9 5.1.4 User name (login)... 9 5.1.5 Directories... 9 5.1.6 File names... 9 5.2 SFTP... 9 5.2.1 General information... 9 5.2.2 Send public key to Post CH Ltd... 10 5.2.3 Dealing with keys... 10 6. Annex B. Information about using FDS... 11 6.1 General terms and conditions/restrictions... 11 6.2 Restrictions in data delivery (Client FDS server)... 11 6.3 Data delivery requirements (FDS server target system)... 11 6.4 Requirements and restrictions in data collection on third-party systems... 12 7. Annex D. Glossary... 13 FDS manual Version 8.3 / February 2016 page 3

1. Introduction File Delivery Services (FDS) is a service provided by the Information Technology (IT) service unit of Post CH Ltd. FDS acts as a gateway in the IT security system between Swiss Post s Intranet and external networks. It enables files and applications to be exchanged among internal and external partners of Post CH Ltd. This manual describes how files can be transferred via the FDS server of Post CH Ltd. The service is available to anyone who has a file transfer client installed on their computer and the required account. Swiss Post IT assumes no responsibility for the accuracy of the information in this manual. Subject to errors and amendments. FDS manual Version 8.3 / February 2016 page 4

2. Post CH Ltd FDS model 2.1 Overview FDS was introduced in 1993. It was launched in the context of the data transmission and communication project of the then PostFinance organisation. The first files were transferred via Kermit, FTP and FTAM. In 1995, the service was extended for file transfer with CONNECT:Direct. In 2002, FDS was expanded to include the FDS-SSH system (FTP over SSH sometimes called Secure FTP), while the FTAM and Kermit protocols were discontinued. SFTP (SSH File Transfer Protocol) was introduced in 2007 and marked the change to a new technology and a new generation. The FDS-SSH service became obsolete as a result and, as of mid-2010, was no longer continued. The use of the protocol FTP over the internet is disallowed for security reasons for new customers since June 2015. Existing customers will have to migrate to the protocol SFTP until December 2018 at the latest. 2.2 Supported protocols FTP (File Transfer Protocol) - for file transfers over the internet only until December 2018. SFTP (SSH File Transfer Protocol) 2.3 Connection types Three types of connections are available: Internet MPLS/IPSS leased connections, IPSS Swisscom network Intranet for Post CH Ltd internal partners/applications The installation dates of the network provider have to be taken into consideration when coordinating new leased connections and MPLS. Leased connections are only used if another type of connection is more expensive than a leased connection, or in the event that special security requirements make them necessary. ADSL connections are only possible in combination with a provider via the Internet. The use of SFTP with an adequate key length makes the utilisation of leased lines and VPN unnecessary as both do not offer additional security. FDS manual Version 8.3 / February 2016 page 5

3. FDS service 3.1 File Delivery System The file delivery system is based on a special mail-boxing system, which accommodates the tightened security requirements that pertain to the Internet, extranet and intranet. 3.2 Where are the file delivery services? FDS constitutes an application server, database server and several perimeter servers. All of the components are located in different zones (DMZ) of the IX platform. The IX platform is a security zone protected by firewalls and is located between the Post CH Ltd network (Intranet) and the external networks (Internet, leased connections). The file transfer and database servers are located in a highly-protected zone: access to this zone is highly restricted. The perimeter servers are in zones of lesser security, in which access via clients is permitted. The client/server connections from external networks and from the internal Post CH Ltd network always run via the perimeter servers. The FDS service is geographically redundant and is configured to remain available even after the complete outage of one data center. 3.3 File Transfer Protocols For more detailed information please consult our file transfer clients manual on https://www.post.ch/fds 3.3.1 FTP FTP is a file transfer protocol that does not offer any kind of protection when accessing the Internet. The risk of user names and passwords being discovered and exploited on the Internet is ever-present. FTP transmits all information (user names, passwords, data) in plain text between the client and the server. The content of the files is only protected if end-to-end encryption can be accomplished. With an FTP client, a connection with the FDS FTP server can be established via TCP/IP and the necessary commands executed. Please note that the use of the FTP protocol is totally forbidden for customers exchanging files with the Post CH Ltd over the internet. Existing customers will have to migrate to the protocol SFTP until December 2018 at the latest. 3.3.2 SFTP SFTP (SSH Secure File Transfer Protocol) is a file transfer protocol and an alternative to FTP. An uninterrupted, encrypted connection is established between the client and the server and renders data, user names and passwords illegible to attackers. The integrity and privacy of the exchanged files is ensured via public-key authentication. Public-key authentication enables clients to log in to the server without any user interaction. SSH guarantees that data is transmitted from the sender to the recipient in full and unchanged. Only SSH-2 (version 2) is supported, exclusively in combination with public-key authentication. With an SFTP client, a connection with the FDS SFTP server can be established via TCP/IP and the necessary commands executed. Please note: SFTP should not be confounded with FTPS (FTP over SSL) or FTP over SSH (sometimes called SecureFTP). 3.3.3 Recommended clients The list of the recommended software clients can be seen in our file transfer clients manual on https://www.post.ch/fds FDS manual Version 8.3 / February 2016 page 6

3.4 Delivery and collection from an external server If the FDS server is required to deliver files or collect them from the customer, a number of requirements will need to be fulfilled. These prerequisites are listed in chapter 6. Delivery and distribution of a file takes place in an events-based manner. When the file arrives, it is forwarded by the FDS server to the pre-specified destination. Specification of a certain time for the action to be executed is not possible. 3.5 Using the File Delivery Service Users who want to connect to the FDS server from outside the Post CH Ltd network are required to apply more advanced security measures, depending on the type of connection (leased connections, Internet). Administrative registration to use the FDS service is via the customer services of the service unit or business unit of Post CH Ltd. By urgent problems you can contact our hotline: +41 (0)848 800 030 For queries with regard to the File Delivery Services, please use the following e-mail address: fds@post.ch FDS manual Version 8.3 / February 2016 page 7

4. Security 4.1 User name (login) External participants receive their own user name for the respective service and business unit. If a customer uses the same user name for several business units of his company, Post CH Ltd assumes no liability for any damage that is incurred. This refers to damage that could occur in the event of data subsequently being accessed on Post CH Ltd. s file transfer server. 4.2 Password policy 4.2.1 FTP When an FTP user name is installed on the FDS server, an initial password is issued. This initial password, as well as all following passwords, have to be changed by the user within 90 days at the latest. User names are blocked as soon as this period expires (for more details, please see our File transfer client manual at https://www.post.ch/fds). If a customer wishes that a password remains unchanged and does not expire, he is required to write a declaration of renunciation of liability vis-à-vis Post CH Ltd. Post CH Ltd and its service and business units will not assume responsibility or liability for any damages that are incurred due to unauthorised access. An alternative that does not involve changing the password is provided by SFTP in the form of public-key authentication. 4.2.2 SFTP Logins with the FDS server can only be executed via public-key authentication. Authentication with password is not allowed as, with SFTP, changing the password is not supported for technical reasons. 4.3 Link encryption Link encryption is not a standard service provided by the FDS services. However, it can be used as a network option. The use of SFTP with an adequate key length makes the utilisation of a link encryption unnecessary as it does not offer additional security. 4.3.1 For all connection types Client-to-server encryption is provided via the SFTP protocol and is available for all connection types. 4.3.2 MPLS/IPSS Link encryption is also supported by MPLS/IPSS. In this way, SFTP can also be used as end-to-end encryption. 4.3.3 LAN-LAN With LAN-LAN connections, link encryption can be established with both routers. FDS manual Version 8.3 / February 2016 page 8

5. Configurations 5.1 FDS client-server configuration 5.1.1 File transfer server Zone Internet and leased lines Post CH network/dmz Host name fdsbc.post.ch fdsbc.pnet.ch The distribution of the communications on two locations is accomplished with a DNS load balancing (Round- Robin). This means that, alternately, the IP addresses of the two locations are returned. It must be ensured that the communication to or from FDS is allowed in your network. Usually the network team has to allow the communication with the appropriate firewall rules. Two IP addresses are used. Those IP addresses may only be used for the configuration of the firewall rules. For the connection to FDS from your application, it is essential that you use the domain name. Both IP addresses can be determined with several DNS lookup requests. FDS supports IPv4 and IPv6. The use of IPv6 requires a continuous support of IPv6 in your infrastructure. 5.1.2 DNS caching The FDS service is operating in active/active mode on two locations. The failover mechanism is guaranteed by a Global Server Load Balancing (GSLB) infrastructure. In order for you to benefit quickly from this failover mechanism, you must ensure that no additional DNS caching is done in your environment. The Time to live (TTL) specification given from the Post CH DNS has to be respected. 5.1.3 Ports The FDS protocols are running on standard ports (21 for FTP and 22 for SFTP). 5.1.4 User name (login) User names are defined and communicated to the customers during the initiation of the service. 5.1.5 Directories The name of the directories on the FDS server are always written in small letters with the following restrictions Characters: [ a-z ], [ 0-9 ], [. - ] ( dot, hyphen) Start: the first character has to be [ a-z ], [ 0-9 ] 5.1.6 File names The following guidelines must be observed for the names of files in the directories on the FDS server: Characters: [ A-Z ], [ a-z ], [ 0-9 ], [. - _ ] (dot, hyphen, underscore) 5.2 SFTP 5.2.1 General information Detailed information can be found in our file transfer clients manual on https://www.post.ch/fds FDS manual Version 8.3 / February 2016 page 9

5.2.2 Send public key to Post CH Ltd A copy of the public key has to be sent to Post CH Ltd by e-mail at fds@post.ch. To verify the identity of the sender, the e-mail has to be sent by the registered contact person or this one has to appear at the least as cc in the e-mail exchange. If needed, there is the possibility to configure more than one public key for one user name. Likewise, different user names may use the same key if needed. 5.2.3 Dealing with keys Treat your private key like your personal credit card! Protect it against unauthorised access. FDS manual Version 8.3 / February 2016 page 10

6. Annex B. Information about using FDS The following succinct information describes how data is exchanged and details the FDS functions. It lays down the generally applicable rules and stipulations for transmitting files via the FDS file transfer servers. It is intended for FDS users in business units and Group companies of Post CH Ltd and their external customers. 6.1 General terms and conditions/restrictions a) FDS is not an archiving system. Collected files, which the customer has not yet deleted, are removed automatically by the server after a period of 9 days. b) Each file can be downloaded maximum 20 times. c) FDS follows a 1-minute processing rhythm. Delivered files appear 1 minute after completion of the file transfer in the recipient s mailbox. If the configuration requires that the files are forwarded to a target computer, the process can take longer depending on the size and the number of the files. d) Large files (usually ASCII files) must be transmitted in a compressed form. The sender and recipient (end-toend) shall agree on the compression method (e.g. ZIP, GZIP). e) A large number of files has to be transmitted with a correspondingly large number of file transfers (put/get) per FTP/SFTP login session. Example for 1200 files: 10 FTP connections/logins composed of 120 file transfers each. If the number of logins is too big within a certain unit of time, the Intrusion Prevention System of Post CH Ltd automatically blocks the Source IP address during 15 minutes. f) Applicator (end-to-end) solutions to optimise the file transfer are available for c) and d) as are archiving tools such as tar and ZIP. g) File transfers with SFTP may only be executed with SSH keys. Authentication via user name/password is not permitted. h) FDS does not confirm the file transfer with regard to the sender. Creation and sending confirmation is the responsibility of the recipient and is not ensured by FDS. i) If the file transfer involves data being forwarded, no order of transmission can be guaranteed. Files of different sizes can overtake each other if the data transmissions are taking place at the same time. The recipient system in the end-to-end relation is responsible for restoring the correct order of the transmitted files. j) Forwarding and distributing files is performed in an event-based manner. Time-scheduled management is not supported. k) IT must be notified in good time about the size, frequency and changes in volume of files involved in file transfers that are performed via the FDS server. This is the only way to ensure that the required capacity is made available at the requested time. l) IT must be informed about priorities for all file transfers that are performed via the FDS server and that must be adhered to in the event of escalation. Standard SLA comes into effect in all other cases. 6.2 Restrictions in data delivery (Client FDS server) When a file transfer client carries out an upload function (put) to an FDS mailbox (folder), the files from these processes are attended to on the FDS server as soon as the file transfer has been completed. Entries in the files in the upload mailboxes remain visible to the customer for two minutes (display of files via "dir" and "Is"). Deleting or renaming a sent file will have no effect: this file is forwarded to the recipient under its original file name. FDS guarantees that only completely transferred file will be processed. In case of a breakup of the connection during transfer the partially transferred file will be rejected. It is not possible to change a file attribute on FDS after the file transfer. 6.3 Data delivery requirements (FDS server target system) Files can be delivered via FDS manual Version 8.3 / February 2016 page 11

SFTP (SSH File Transfer Protocol) or FTP (RFC 959) however only within the intranet of the Post CH Ltd To enable the FDS service to deliver files, the following requirements must be in place at both the internal and external Post CH Ltd recipients: Permanent network connections such as WAN Access (MPLS) or Internet with IPSec-VPN The system must be available 24/7 Operative Computer Centre operation must be ensured Contact persons for support (phone numbers, e-mail) and availability must be ensured. 6.4 Requirements and restrictions in data collection on third-party systems FDS is able to collect files automatically via FTP and SFTP on third-party systems. This function should only be used in exceptional cases. Requirements: Permanent network connections such as WAN Access (MPLS) or Internet with IPSec-VPN The system must be available 24/7 Operative Computer Centre operation must be ensured Contact persons for support (phone numbers, e-mail) and availability must be ensured. Restrictions: This service is not offered if time-critical data have to be collected at intervals shorter than 30 minutes. The files to be downloaded have to be placed in directories having invariable names. FDS does not support the download of files from variable directories (e.g. directories names which contain the actual date). FDS manual Version 8.3 / February 2016 page 12

7. Annex D. Glossary D DMZ Demilitarised Zone A DMZ is located at a separate LAN connection in the firewall between an internal network and an insecure network, e.g. the Internet. Servers that provide services for users of the Internet (e.g. www or e-mail) are often set up in a DMZ. Ideally the DMZ is between two physically separated firewalls. The outer firewall protects against attacks from outside and monitors all attempts to access the DMZ from the Internet. The inner firewall checks attempts to access the internal network from the DMZ and vice versa. It represents the second line of defence in case the outer firewall is penetrated. The advantage of this is that the internal network continues to be protected even if an attacker gets through to the web server. DNS The Domain Name System (DNS) is one of the most important services on the Internet. Its main task is to translate "Internet addresses" names into the respective IP address. E End-to-end The relation between an application (e.g. EGA-B) of a business unit at Post CH Ltd (e.g. PostFinance Ltd) and the application belonging to the external customer. F FDS File Delivery Services is a service provided by the Post CH Ltd Information Technology (IT) service unit. FDS acts as a proxy in the IT security system between Post CH Ltd s Intranet and external networks. It enables files and applications to be exchanged among internal and external partners of Post CH Ltd. FTP File Transfer Protocol is a network protocol specified in RFC 959 from 1985 to transfer files across TCP/IP networks. The protocol enables files to be exchanged between different computers, regardless of their operating system and physical location. I IPSS LAN Interconnect over IPSS is a service provided by Swisscom. It connects local networks to form a single corporate-wide communication infrastructure. IPSS is Swisscom s own solution and applies cutting-edge technology. The MPLS technology applied here (Multi Protocol Label Switching) enables greater flexibility with respect to the bandwidth. The service is provided completely by Swisscom Enterprise Solution. http://www.swisscom.com/es/ M MPLS Multi Protocol Label Switching (MPLS) is an implementation of Label Switching. These technique takes the burden off the routers involved in transporting a data package, as the level of complexity is reduced to a single switch. The aim here is to establish a specific connection channel at the beginning of the data transmission. In this process the routers no longer need to check the recipients of the data packages being forwarded, instead they simply forward the packages in accordance with the previously specified connection, without any further processing. S SFTP SSH File Transfer Protocol (SFTP) is a further development of SCP and enables secure data transmission and allows clients to access files on remote systems. The protocol has no authentication procedure or any encryption. These functions have to be taken over the underlying SSH protocol. SFTP should not be confused with Secure FTP or with FTP over SSL. SSH SSH enables cryptographically secure communication in insecure and secure networks. It provides a high level of security. Reliable mutual authentication of the partners as well as integrity and privacy of the exchanged data is supported. SSH guarantees the complete and unchanged transmission of the data from the sender to the recipient. T Time to live Time to Live (TTL) is a mechanism that limits the lifespan or lifetime of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, data is discarded FDS manual Version 8.3 / February 2016 page 13