
REFINITIV EIKON NETWORKING GUIDE Eikon 4.0 An LSEG Business | refinitiv.com 2 Version history Document version Summary of Changes 1.1 − Various minor structural and textual changes. − Added section regarding SSL inspection − Removed Time Series proxy. − Note added regarding change to privileges in the installation directory. − Changed support to TLS 1.2 only (due to vulnerabilities in 1.0 and 1.1). − Removed Refinitiv Managed section – no longer supported 1.0 Initial version of the rebranded Refinitiv Eikon Networking Guide Refinitiv Eikon Networking Guide Document Version 1.1 3 Contents About this document .............................................................................................................. 5 Intended readership ............................................................................................................ 5 In this guide ........................................................................................................................ 5 Eikon System and network tests ............................................................................................ 6 Eikon Desktop deployment profiles........................................................................................ 7 Customer Managed ............................................................................................................ 7 Elektron Managed Services ................................................................................................ 8 Refinitiv Hosted .................................................................................................................. 8 Customer connectivity overview ............................................................................................ 9 Financial Community Network and Delivery Direct ............................................................. 9 Generic protocols and ports ................................................................................................ 15 HTTP compliancy and settings ............................................................................................ 16 HTTPS tunneling .............................................................................................................. 16 HTTP user agent .............................................................................................................. 16 Content filtering ................................................................................................................... 18 Executable names ............................................................................................................... 20 Executable files (Core package) ....................................................................................... 20 Executable files in apps .................................................................................................... 20 Proxy authentication protocols ............................................................................................. 22 Basic authentication ......................................................................................................... 22 Windows NT LAN Manager (NTLM) authentication .......................................................... 22 Kerberos authentication .................................................................................................... 23 Qualified proxy ................................................................................................................. 23 Proxy script ...................................................................................................................... 24 Internet property settings ..................................................................................................... 25 Certificate management ...................................................................................................... 27 SSL inspection support ..................................................................................................... 27 Certificate authorities ........................................................................................................ 27 Certificate revocation ........................................................................................................ 28 Refinitiv Data Management Solutions .................................................................................. 33 Eikon configuration services ................................................................................................ 34 Basic configuration ........................................................................................................... 34 Deployment mode levels .................................................................................................. 34 Elektron managed services ................................................................................................. 36 DACS server .................................................................................................................... 36 Refinitiv Eikon Networking Guide Document Version 1.1 4 Elektron managed services protocol and port ................................................................... 36 Elektron real-time proxy .................................................................................................... 36 Time series proxy ............................................................................................................. 37 Appendix A: Eikon support tools .......................................................................................... 38 Dump Uploader ................................................................................................................ 38 Appendix B: United States Federal Information Processing Standard (FIPS) ...................... 39 Windows FIPS mode ........................................................................................................ 39 Appendix C: Customer Managed over Internet .................................................................... 40 Defined host name ........................................................................................................... 40 DNS ................................................................................................................................. 40 Appendix D: List of Acronyms .............................................................................................. 42 Refinitiv Eikon Networking Guide Document Version 1.1 About this document 5 About this document Intended readership This document is intended for users who are responsible for the deployment of Refinitiv Eikon at customer sites. Such as: − Eikon Support Group − Field Service Engineers − Client Implementation Specialists, and − Customer On-Boarding Specialists It is also useful for the IT or Networking personnel of Eikon customers for planning Eikon deployment. In this guide This guide provides an overview of network setup requirements for Eikon. It contains details about TCP/IP standard ports, network routing, DNS, and other relevant network information. Important: Refinitiv does not divulge IP address information under any circumstances. This would prevent us from changing IP addresses, when needed and without notification. Additionally, these IP addresses may not always be under our direct control. Product Change Notification 11803 – Refinitiv domains For further information, refer to PCN 11803. Refinitiv Eikon Networking Guide Document Version 1.1 Eikon System and network tests 6 Eikon System and network tests To ensure your computer and network meet the requirements to install and run Eikon, use the testing tool that is available on the Eikon download site: eikon.tr.com. Refinitiv is migrating to the following sites: − eikon.refinitiv.com, for Internet users, and − eikon.extranet.refinitiv.biz, for private network users. Refinitiv Eikon Networking Guide Document Version 1.1 Eikon Desktop deployment profiles 7 Eikon Desktop deployment profiles Customer Managed Refinitiv Customer Managed connectivity is an option for customers who are co-located in a Refinitiv Network Point of Presence (N-PoP). It enables customers to provide their own access circuit or cross-connect between the Refinitiv-managed Customer Premises Equipment (CPE) and the Refinitiv N-PoPs, which are in key financial centers globally. Customers use their own preferred supplier of network connectivity between their network and the Refinitiv aggregation router. This is particularly useful for customers that co-locate or are in the same carrier hotel as a Delivery Direct N-PoP. Refinitiv Eikon Networking Guide Document Version 1.1 Eikon Desktop deployment profiles 8 Elektron Managed Services From July 2021, Refinitiv will no longer support the Thomson Reuters (Refinitiv Managed) Eikon deployment option. For further information, see PCN 12260, End of Support for TR Managed Eikon & Edge for Eikon Devices. Refinitiv Hosted The Refinitiv Hosted solution is fully hosted by Refinitiv and no infrastructure is required on the customer site, apart from an Internet Service Provider (ISP). Eikon accesses streaming services and the time series service over the Internet. Internet The Internet is enabling an increasing number of customers to connect with the global financial community worldwide. Internet connectivity is enabling cost effective, high- performance, resilient, and flexible access in more places globally. It enables customers to make their own choice of service provider and take
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages43 Page
-
File Size-