Ultra Gateway Platform System Administration Guide, Release 6.9

Total Page:16

File Type:pdf, Size:1020Kb

Ultra Gateway Platform System Administration Guide, Release 6.9 Ultra Gateway Platform System Administration Guide, Release 6.9 First Published: 2019-08-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2019 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE About this Guide xxix Conventions Used xxix Related Documentation xxxi Contacting Customer Support xxxi CHAPTER 1 Ultra Services Platform (USP) Introduction 1 USP Introduction 1 USP Architecture 2 USP VNF Architecture 3 Ultra Element Manager (UEM) 3 Life Cycle Manager 6 Service Configuration Manager 7 Service Level Agreement Manager 7 Control Function 10 Service Function 11 Network Function 12 Application Function 13 USP VNF Types 14 Ultra Gateway Platform 15 Ultra Service Framework 15 Ultra Automation Services 16 AutoIT 17 AutoDeploy 19 AutoVNF 21 Ultra Web Services 24 USP VNF Component Redundancy and Availability 25 Ultra Gateway Platform System Administration Guide, Release 6.9 iii Contents Platform Requirements 25 UEM Redundancy 25 CF Redundancy 26 SF Redundancy 26 NF Redundancy 27 AF Redundancy 27 Ultra Service Component (USC) Redundancy 27 ICSR Support 27 CHAPTER 2 Introduction to UGP 29 Product Description 29 Hypervisor Requirements 29 Underlying Infrastructure for the System 29 DI Network 31 Network Requirements 32 Jumbo Frames 33 Record Storage 34 Orchestration Network 34 Service Network 34 Packet Flows 34 Packets Received on SF Demux VM 34 Packets Received on SF Session VM 35 DPDK Internal Forwarder 36 Bandwidth Requirements 37 Feature Set 38 Interfaces and Addressing 38 Encryption 39 Security 39 Orchestration 39 Provisioning 40 Boot Sequence 40 CF Boot Sequence 40 SF Boot Sequence 41 Capacity, CEPS and Throughput 41 Ultra Gateway Platform System Administration Guide, Release 6.9 iv Contents Diagnostics and Monitoring 41 Cisco Prime Analytics 41 StarOS UGP Build Components 42 Software Installation and Network Deployment 42 CHAPTER 3 System Operation and Configuration 43 Terminology 43 Contexts 43 Logical Interfaces 43 Management Interface 44 Bindings 44 Services 44 AAA Servers 45 Subscribers 45 How the System Selects Contexts 46 Context Selection for Context-level Administrative User Sessions 46 Context Selection for Subscriber Sessions 49 Understanding Configuration Files 49 IP Address Notation 50 IPv4 Dotted-Decimal Notation 50 IPv6 Colon-Separated-Hexadecimal Notation 51 CIDR Notation 51 Alphanumeric Strings 52 Character Set 52 Quoted Strings 53 CHAPTER 4 Getting Started 55 Initial StarOS Configuration 55 Using the StarOS CLI for Initial Configuration 55 Configuring System Administrative Users 57 Limiting the Number of Concurrent CLI Sessions 57 Automatic Logout of CLI Sessions 58 Configuring the System for Remote Access 58 Configuring SSH Options 60 Ultra Gateway Platform System Administration Guide, Release 6.9 v Contents SSH Host Keys 61 Setting SSH Key Size 61 Configuring SSH Key Generation Wait Time 62 Specifying SSH Encryption Ciphers 62 MAC Algorithm Configuration 63 Generating SSH Keys 65 Setting SSH Key Pair 65 Authorized SSH User Access 66 Authorizing SSH User Access 66 SSH User Login Restrictions 67 Creating an Allowed Users List 67 SSH User Login Authentication 68 Secure Session Logout 68 Changing Default sshd Secure Session Logout Parameters 69 SSH Client Login to External Servers 69 Setting SSH Client Ciphers 69 Setting Preferred Authentication Methods 70 Generating SSH Client Key Pair 71 Pushing an SSH Client Public Key to an External Server 72 Enabling NETCONF 72 Configuring the Management Interface with a Second IP Address 72 VM Hardware Verification 73 CHAPTER 5 System Settings 75 Verifying and Saving Your Interface and Port Configuration 75 Configuring System Timing 76 Setting the System Clock and Time Zone 76 Verifying and Saving Your Clock and Time Zone Configuration 76 Configuring Network Time Protocol Support 77 Configuring NTP Servers with Local Sources 78 Using a Load Balancer 78 Verifying the NTP Configuration 78 Configuring Software RSS 80 DI-Network RSS Encryption 80 Ultra Gateway Platform System Administration Guide, Release 6.9 vi Contents Feature Summary and Revision History 80 Feature Changes 81 Command Changes 81 Configuring SF Boot Configuration Pause 81 Enabling CLI Timestamping 82 Configuring CLI Confirmation Prompts 82 Enabling Automatic Confirmation 82 Requiring Confirmation for autoconfirm and configure Commands 83 Requiring Confirmation for Specific Exec Mode Commands 83 Configuring System Administrative Users 84 User Name Character Restrictions 85 Configuring Context-level Administrative Users 85 Configuring Context-level Security Administrators 85 Configuring Context-level Administrators 86 Configuring Context-level Operators 86 Configuring Context-level Inspectors 87 Segregating System and LI Configurations 87 Verifying Context-level Administrative User Configuration 88 Configuring Local-User Administrative Users 89 Verifying Local-User Configuration 89 Updating Local-User Database 89 Updating and Downgrading the local-user Database 90 Restricting User Access to a Specified Root Directory 91 Configuring an SFTP root Directory 91 Associating an SFTP root Directory with a Local User 91 Associating an SFTP root Directory with an Administrator 91 Associating an SFTP root Directory with a Config Administrator 92 Configuring TACACS+ for System Administrative Users 92 Operation 92 User Account Requirements 93 TACACS+ User Account Requirements 93 StarOS User Account Requirements 94 Configuring TACACS+ AAA Services 94 Configuring TACACS+ for Non-local VPN Authentication 95 Ultra Gateway Platform System Administration Guide, Release 6.9 vii Contents Verifying the TACACS+ Configuration 95 IPv6 Address Support for TACACS+ Server 96 Separating Authentication Methods 96 Disable TACACS+ Authentication for Console 96 Disable AAA-based Authentication for Console 97 Disable TACACS+ Authentication at the Context Level 97 Limit local-user Login on Console/vty Lines 97 Limit Console Access for AAA-based Users 98 Verify Configuration Changes 98 Configuring a Chassis Key 99 Overview 99 Configuring a New Chassis Key Value 99 CLI Commands 99 Quick Setup Wizard 100 Enabling Automatic Reset of FSC Fabric 100 CHAPTER 6 Config Mode Lock Mechanisms 103 Overview of Config Mode Locking 103 Requesting an Exclusive-Lock 104 Effect of Config Lock on URL Scripts 105 Saving a Configuration File 106 Reload and Shutdown Commands 106 show administrators Command 107 CHAPTER 7 Management Settings 109 SNMP MIB Browser 109 SNMP Support 111 Configuring SNMP and Alarm Server Parameters 112 Verifying SNMP Parameters 113 Controlling SNMP Trap Generation 114 CHAPTER 8 Verifying and Saving Your Configuration 115 Verifying the Configuration 115 Feature Configuration 115 Ultra Gateway Platform System Administration Guide,
Recommended publications
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • The International Maritime Meteorological Archive
    ARCHIVAL OF DATA OTHER THAN IN IMMT FORMAT: The International Maritime Meteorological Archive (IMMA) Format Rapporteur: Scott Woodruff NOAA Earth System Research Laboratory (ESRL), Boulder, CO, USA Updated Report (14 March 2007) Update of JCOMM-SGMC-VIII/Doc.17 submitted to: Joint WMO-IOC Technical Commission for Oceanography and Marine Meteorology (JCOMM) Working Group on MMS, Subgroup on Marine Climatology (SGMC) Eighth Session, Asheville, NC, USA (10-14 April 2000) ————— Update of ETMC-I/Doc. 4.1, Appendix submitted to: JCOMM Expert Team on Marine Climatology (ETMC) First Session, Gdynia, Poland (7-10 July 2004) ————— Appendix of ETMC-II/Doc. 4.1 submitted to: JCOMM Expert Team on Marine Climatology (ETMC) Second Session, Geneva, Switzerland (26-27 March 2007) Contents Introduction Background Format Content and Structure Format Implementation References Supplements: A. Existing Formats and Codes B. Comparison of WMO IMM and ICOADS LMR Formats C. Record Types D. Field Configurations Document Revision Information Introduction 1. With increasing recognition of the importance of upgrading and maximizing the data available for analyses of the climate record (Barnett et al. 1999), efforts have intensified to digitize additional historical ship data (and metadata) that exist in many national logbook collections (Diaz and Woodruff 1999, Woodruff et al. 2004). Current efforts are focused on data during major gaps in the existing record, such as the two world wars, and adding 19th century and earlier data (e.g., Elms et al. 1993, Manabe 1999, García- Herrera et al. 2005, Woodruff et al. 2005). 2. At present, however, there is no effective, internationally agreed format for exchange of keyed historical data.
    [Show full text]
  • Download Pdf Encoded Base64 Download Pdf Encoded Base64
    download pdf encoded base64 Download pdf encoded base64. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67d29af1285415e8 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Downloading a base 64 PDF from an api request in Javascript. Possibly the longest and most specific title in a tech related Medium post I’ve written to date. I had this exact issue a while ago and couldn’t seem to find any good posts or articles covering it so I thought I’d create my own for future front end devs that might have the same problem. The problem. Saving a pdf as base 64 in the backend makes sense, but to the user it’s just a random combination of numbers and letters. Luckily html natively supports parsing base64 pdfs to normal ones and downloading them like so. Which works really well in modern browsers. However, in the scenario where there’s no base64 pdf code when the user first lands on the site and they need to click a button to fetch the code from a database, how would you get this code above.
    [Show full text]
  • AMIRA Supports a Wide Range of Recording Codecs, Resolutions and Project Settings to Fit Your Needs
    AMIRA Software Update Package 5.4 U S E R M A N U A L 16 August 2018 2 Imprint Imprint Copyright © 2018 Arnold & Richter Cine Technik GmbH & Co. Betriebs KG. All rights reserved. No portions of this document may be reproduced without prior written consent of Arnold & Richter Cine Technik GmbH & Co. Betriebs KG. Specifications are subject to change without notice. Errors, omissions, and modifications excepted. AMIRA, ALEXA, ALEXA XT, ALEXA SXT, ALEXA LF and ALEXA Mini are trademarks or registered trademarks of Arnold & Richter Cine Technik GmbH & Co. Betriebs KG. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. Original version. For further assistance Arnold & Richter Cine Technik GmbH & Co. Betriebs KG Tuerkenstr. 89 D-80799 Munich, Germany E-mail: [email protected] www.arri.com/service Document revision history Document ID: 10000464 Version Release Date 1.0 K08608 12 Sep 2014 1.1 K08658 19 Dec 2014 2.0 K08781 31 Mar 2015 3.0 K08941 02 Nov 2015 4.0 K09036 23 May 2016 4.1 K09090 07 June 2016 5.0 K09396 21 June 2017 5.2 K09599 08 Dec 2017 5.3 K09696 30 May 2018 5.4 K09800 16 August 2018 Contents 3 Contents 1 For Your Safety / 为了您的安全............................................................. 9 1.1 Risk Levels and Alert Symbols / 危险级别和警示标志.......................... 9 1.2 Vital Precautions / 重要安全措施.........................................................10 1.3 General Precautions / 般安全措施.......................................................11 2 Sensor Related Information
    [Show full text]
  • Netwitness Hunting Guide Copyright © 1994-2019 Dell Inc
    NetWitness Hunting Guide Copyright © 1994-2019 Dell Inc. or its subsidiaries. All Rights Reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of EMC trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm. License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Third-Party Licenses This product may include software developed by parties other than RSA. Note on Encryption Technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC believes the information in this publication is accurate as of its publication date.
    [Show full text]
  • Ariba Buyer Configuration Guide Iii Table of Contents
    Ariba Buyer™ Configuration Guide Release 9r1 Document Version 21 August 2013 Copyright © 1996–2012 Ariba, Inc. All rights reserved. This documentation, as well as the Ariba software and/or services described in it, contain proprietary information. They are provided under a license or other agreement containing restrictions on use and disclosure and are also protected by copyright, patent and/or other intellectual property laws. Except as permitted by such agreement, no part of the document may be reproduced or transmitted in any form by any means, electronic, mechanical or otherwise, without the prior written permission of Ariba, Inc. Ariba, Inc. assumes no responsibility or liability for any errors or inaccuracies that may appear in the documentation. The information contained in the documentation is subject to change without notice. Ariba, the Ariba logo, AribaLIVE, SupplyWatch, Ariba.com, Ariba.com Network and Ariba Spend Management. Find it. Get it. Keep it. and PO-Flip are registered trademarks of Ariba, Inc. Ariba Procure-to-Pay, Ariba Buyer, Ariba eForms, Ariba PunchOut, Ariba Services Procurement, Ariba Travel and Expense, Ariba Procure-to-Order, Ariba Procurement Content, Ariba Sourcing, Ariba Savings and Pipeline Tracking, Ariba Category Management, Ariba Category Playbooks, Ariba StartSourcing, Ariba Spend Visibility, Ariba Analysis, Ariba Data Enrichment, Ariba Contract Management, Ariba Contract Compliance, Ariba Electronic Signatures, Ariba StartContracts, Ariba Invoice Management, Ariba Payment Management, Ariba Working Capital Management, Ariba Settlement, Ariba Supplier Information and Performance Management, Ariba Supplier Information Management, Ariba Discovery, Ariba Invoice Automation, Ariba PO Automation, Ariba Express Content, Ariba Ready, and Ariba LIVE are trademarks or service marks of Ariba, Inc.
    [Show full text]
  • Werkzeug Documentation (1.0.X) Release 1.0.1
    Werkzeug Documentation (1.0.x) Release 1.0.1 Pallets May 11, 2021 Contents 1 Getting Started 3 1.1 Installation................................................3 1.2 Werkzeug Tutorial............................................5 1.3 API Levels................................................ 13 1.4 Quickstart................................................ 14 2 Serving and Testing 21 2.1 Serving WSGI Applications....................................... 21 2.2 Test Utilities............................................... 26 2.3 Debugging Applications......................................... 32 3 Reference 37 3.1 Request / Response Objects....................................... 37 3.2 URL Routing............................................... 55 3.3 WSGI Helpers.............................................. 69 3.4 Filesystem Utilities............................................ 76 3.5 HTTP Utilities.............................................. 76 3.6 Data Structures.............................................. 85 3.7 Utilities.................................................. 101 3.8 URL Helpers............................................... 109 3.9 Context Locals.............................................. 116 3.10 Middleware................................................ 119 3.11 HTTP Exceptions............................................ 124 4 Deployment 131 4.1 Application Deployment......................................... 131 5 Additional Information 137 5.1 Important Terms............................................. 137 5.2 Unicode.................................................
    [Show full text]
  • Mom Documentation Release 0.1.3
    mom Documentation Release 0.1.3 Yesudeep Mangalapilly July 30, 2015 Contents 1 Getting the library 3 2 User Guides 5 2.1 Contributing...............................................5 3 API Documentation 7 3.1 mom ...................................................7 3.2 Codecs.................................................. 28 3.3 Cryptography primitives......................................... 46 3.4 Networking................................................ 51 3.5 Operating System helpers........................................ 52 4 Contribute 55 4.1 Contributing............................................... 55 5 Indices and tables 57 Python Module Index 59 i ii mom Documentation, Release 0.1.3 Mother of all our Python projects. Batteries for Python. Contents 1 mom Documentation, Release 0.1.3 2 Contents CHAPTER 1 Getting the library $ pip install mom or $ git clone git://github.com/gorakhargosh/mom.git or $ git clone http://code.google.com/p/python-mom/ $ cd mom $ python setup.py install 3 mom Documentation, Release 0.1.3 4 Chapter 1. Getting the library CHAPTER 2 User Guides 2.1 Contributing Welcome hackeratti! So you have got something you would like to see in mom? Whee. This document will help you get started. 2.1.1 Important URLs mom uses git to track code history and hosts its code repository at github. The issue tracker is where you can file bug reports and request features or enhancements to mom. 2.1.2 Before you start Ensure your system has the following programs and libraries installed before beginning to hack: 1. Python 2. git 3. ssh 2.1.3 Setting up the Work Environment mom makes extensive use of zc.buildout to set up its work environment. You should get familiar with it. Steps to setting up a clean environment: 1.
    [Show full text]
  • 1 Proposed IMMA Revisions
    Proposed IMMA Revisions Revised DRAFT, 19 August 2015 (v21) Scott Woodruff, Dave Berry, Philip Brohan, Eric Freeman, Zaihua Ji, Elizabeth Kent, Sandy Lubker, Shawn Smith, Steve Worley et al. Introduction Format changes—to yield IMMA version 1—are marked below in blue within Supplement C of the current IMMA (version 0) documentation. The abbreviated version of the documentation (http://icoads.noaa.gov/e-doc/imma/R2.5-imma_short.pdf) includes Supp. D, providing details on individual field configurations; whereas the complete documentation (http://icoads.noaa.gov/e-doc/imma/R2.5-imma.pdf) also provides additional background in its main text and in Supps. A-B, including more detailed comparisons between IMMA and international exchange (IMMT/IMMPC) formats. Detailed background/discussion notes for the Core and attachments (attms) appear following each table below. When significant changes or additions to attm content were needed (i.e. for Immt, Mod-qc, and Meta-vos) a revised attm was created with a new table number and new attachment ID (ATTI), but the old configuration was retained as a deprecated attm. The Nocn, Ecr, Rean-qc, Ivad, Error, and Uida attms are new, and the Auto, Nocq, Alt-qc, Track, and Hist attms are proposed (with many details of the proposed attms to be finalized; including any new field abbreviations, which need to be checked for uniqueness to avoid possible overlaps with already defined field abbreviations). The following items discuss aspects of the planned changes in greater detail: 1. Abbreviated structural element names in italics: A new IMMA documentation feature— to enhance communication—is that the Core and attms (e.g.
    [Show full text]
  • Testowanie Bezpieczeństwa Aplikacji Internetowych. Receptury
    Testowanie bezpieczeñstwa aplikacji internetowych. Receptury Autor: Paco Hope, Ben Walther T³umaczenie: Rados³aw Meryk ISBN: 978-83-246-2208-5 Tytu³ orygina³u: Web Security Testing Cookbook Format: 168x237, stron: 312 Poznaj i wykorzystaj mechanizmy testowania zabezpieczeñ, a nikt nie przeœlizgnie siê przez Twoj¹ witrynê! • Jak zainstalowaæ i skonfigurowaæ narzêdzia do testowania zabezpieczeñ? • Jak szybko i sprawnie znaleŸæ problemy w aplikacjach? • Jak wykorzystywaæ testy powtarzalne? Witryny internetowe oraz ich aplikacje stanowi¹ swoist¹ wirtualn¹ furtkê do wszystkich korporacji i instytucji. Jak zatem zadbaæ, aby nikt niepo¿¹dany nie przedosta³ siê do œrodka? Co sprawia, ¿e witryna jest naprawdê bezpieczna? I w jaki sposób testowaæ aplikacjê, aby nie by³ to proces ¿mudny i czasoch³onny, a raczej sprawny i skuteczny? Oto rozwi¹zanie — niniejsza ksi¹¿ka zawiera proste receptury, dziêki którym z ³atwoœci¹ znajdziesz luki w aplikacjach, zanim zrobi¹ to ró¿ni hakerzy. Ksi¹¿ka „Testowanie bezpieczeñstwa aplikacji internetowych. Receptury” to napisany zrozumia³ym jêzykiem podrêcznik, dziêki któremu szybko poznasz mechanizmy testowania zabezpieczeñ. Praktyczne przyk³ady zawarte w tym przewodniku sprawi¹, ¿e szybko nauczysz siê w³¹czaæ systemy zabezpieczeñ do standardowych procedur kontroli aplikacji. Bez problemu stworzysz testy dotycz¹ce funkcji AJAX, a tak¿e przeprowadzisz rozbudowane, wieloetapowe testy podatnoœci na klasyczne problemy: skrypty krzy¿owe oraz wstrzykiwanie kodu. • Bezpieczeñstwo oprogramowania • Instalacja darmowych narzêdzi
    [Show full text]
  • Werkzeug Documentation (0.15.X) Release 0.15.6
    Werkzeug Documentation (0.15.x) Release 0.15.6 Pallets Jan 26, 2020 Contents 1 Getting Started 3 1.1 Installation................................................3 1.2 Transition to Werkzeug 1.0........................................5 1.3 Werkzeug Tutorial............................................6 1.4 API Levels................................................ 14 1.5 Quickstart................................................ 15 2 Serving and Testing 21 2.1 Serving WSGI Applications....................................... 21 2.2 Test Utilities............................................... 26 2.3 Debugging Applications......................................... 32 3 Reference 37 3.1 Request / Response Objects....................................... 37 3.2 URL Routing............................................... 54 3.3 WSGI Helpers.............................................. 67 3.4 Filesystem Utilities............................................ 74 3.5 HTTP Utilities.............................................. 74 3.6 Data Structures.............................................. 83 3.7 Utilities.................................................. 99 3.8 URL Helpers............................................... 106 3.9 Context Locals.............................................. 112 3.10 Middleware................................................ 115 3.11 HTTP Exceptions............................................ 121 4 Deployment 127 4.1 Application Deployment......................................... 127 5 Contributed Modules 133 5.1 Contributed
    [Show full text]
  • Search Improvement Within the Geospatial Web in the Context of Spatial Data Infrastructures
    2012 22 Aneta Jadwiga Florczyk Search improvement within the geospatial web in the context of spatial data infrastructures Departamento Informática e Ingeniería de Sistemas Director/es Zarazaga Soria, Francisco Javier López Pellicer, Francisco Javier Tesis Doctoral Autor Director/es UNIVERSIDAD DE ZARAGOZA Repositorio de la Universidad de Zaragoza – Zaguan http://zaguan.unizar.es Departamento Director/es Tesis Doctoral SEARCH IMPROVEMENT WITHIN THE GEOSPATIAL WEB IN THE CONTEXT OF SPATIAL DATA INFRASTRUCTURES Autor Aneta Jadwiga Florczyk Director/es Zarazaga Soria, Francisco Javier López Pellicer, Francisco Javier UNIVERSIDAD DE ZARAGOZA Informática e Ingeniería de Sistemas 2012 Repositorio de la Universidad de Zaragoza – Zaguan http://zaguan.unizar.es Departamento Director/es Tesis Doctoral Autor Director/es UNIVERSIDAD DE ZARAGOZA Repositorio de la Universidad de Zaragoza – Zaguan http://zaguan.unizar.es SEARCH IMPROVEMENT WITHIN THE GEOSPATIAL WEB IN THE CONTEXT OF SPATIAL DATA INFRASTRUCTURES Aneta Jadwiga Florczyk PhD DISSERTATION RESEARCH ADVISORS Dr. Francisco Javier Zarazaga–Soria Dr. Francisco Javier López–Pellicer May 2012 Computer Science and Systems Engineering Department Universidad de Zaragoza © Copyright by author, copyrightyear All Rights Reserved iii Acknowledgments I would like to thank all members of the IAAA research group of the University of Zaragoza, to which I had pleasue belong during the thesis development, for their collaboration and support in any aspect, and especially, my research advisors, F.Javier Zarazaga–Soria and F.Javier López–Pellicer for their endless forbearance and patience. Also, I would like to express my gratitude to members of the IFGI of the University of Muenster, Germany, and every other person I have met there, who made effort to make my stay a wonderful ex- perience, which has contributed to my profesional and personal development.
    [Show full text]