BOSaNOVA Secure User Guide

2y ago
33 Views
5 Downloads
2.17 MB
85 Pages
Last View : 16d ago
Last Download : 3m ago
Upload by : Mariam Herr
Transcription

BOSaNOVA SecureUser Guide

The following is an abridged version of the BOSaNOVA License Agreement:Information in this manual is subject to change without advance notice. This manual is provided under thesame license agreement which covers the corresponding software and hardware.BOSaNOVA is protected by copyright law and international trade agreements. No part of this product,including software and manual may be reproduced or copied in any form or by any means withoutexpress written permission from Xorcom Ltd. Unauthorized reproduction or distribution of this programor document, or any part thereof, is subject to criminal and civil penalties.BOSaNOVA are trademarks of Xorcom Ltd. And 10Zig Inc.It shall be inferred that all registered or trademarked products referred to in this manual retain theircopyrights and trademarks. 2014 Xorcom. All rights reserved.Your feedback is valuable.If you have questions or suggestions regarding this document—numberMM0040–07, please forward them to the Bosanova TechnicalCommunication department at: info@bosanova.co.ilContact InformationBOSaNOVA, a division of Xorcom Ltd.Tel: 972 4 ilWeb site: http://www.bosanova.co.il

TABLE OF CONTENTSBOSaNOVA Secure Description. 2BOSaNOVA Secure Features. 2The Administrator . 3Opening the Administrator . 3Installation Parameters. 3Administrative Parameters. 4Connectivity. 4Installed Modules. 5Diagnostics. 5The SECURE Configurator. 6Basic . 6Advanced Tab . 7The Emulation Configurator . 9Using the Emulation Configurator . 9Sessions Tab . 9Advanced Properties Tab . 10Diagnostics. 12Secure Sockets Layer (SSL).13Overview. 13SSL prerequisites . 14Creating the System Certificate . 14Configuring SSL in BOSaNOVA Secure . 15The BOSaNOVA Emulation .17Starting BOSaNOVA Secure . 17Opening a Display or Printer Emulation Session . 17Display Emulation Sessions. 18Display Emulation Toolbar Buttons. 18Background Bitmaps in a Display Emulation . 20Image Mapping in a Display Emulation. 21Additional Image Mapping Procedures. 22Printer Emulation Sessions . 23Printer Emulation Toolbar Buttons . 23Accessing Printer Session Properties. 25General Tab . 25Previous Job Attributes Tab . 25Page Setup Tab . 25

Diagnostics . 26Page Setup Tab . 26Custom Driver Considerations. 26Copying Between Sessions or Applications . 27Switching Between Emulation Sessions. 28From the Toolbar. 28From the Menu Bar . 28From the Keyboard. 28Using Macros . 29Recording a Macro . 25Viewing a Macro . 29Playing a Macro. 30Deleting a Macro . 30The Macro Organizer and Macro Editor . 30Closing a Session . 27Stopping an Emulation Session . 31Customizing the Emulation Mouse. 32Customizing the Emulation Keyboard . 34Accessing Keyboard Customization . 34Customizing Your Keyboard . 34Mapping Editor . 37[Host Actions List] . 37PC Key . 37Mapping for PC Key . 38Deleting a Keyboard Mapping. 39Exporting a Keyboard Mapping . 39Importing a Keyboard Mapping . 40Customizing the Emulation Toolbars. 41Customizing Toolbars. 43Arranging Toolbar Buttons . 44Moving Toolbars. 44Hotkeys . 45MorphExpress . 46Displaying the MorphExpress Screen. 46Configuring MorphExpress . 46Customizing GUI Controls . 46Customizing GUI Colors . 47

Miscellaneous. 48PDE (Printer Driver Editor) . 48Euro Symbol Support. 48Host Requirements . 48Changes Required for Euro Symbol Support . 49DTF (Data Transfer Function).51Introduction to DTF . 51The DTF Wizard . 52The DTF Interface . 52The Scheduler . 53The Scheduler Interface. 53The Menus . 53The Toolbar . 54Scheduler Wizard . 54The Send Utility. 54Remote Command. 55Introduction. 55Syntax . 55Parameters . 55Examples. 56Troubleshooting .57Printer Session . 57Euro Support . 57Traces and Screen Captures . 57Recording a Telnet Trace . 57Screen Capture . 57From a Printer Session . 59Preparing the Information File . 59Collecting User Information . 60Contacting Technical Support . 61iii

Error Messages . 62Error Codes . 62Error Categories . 62Administrator Errors (ADM) . 63TCP/IP Configurator Errors (TPC) . 64Emulation Configurator Errors (BPC) . 66Display Emulation Errors (EML) . 67Message or Text Errors (BSV) . 68Driver Errors (BCD) . 69Kernel Engine Error Messages (KRN) . 73WinSock Return Codes. 74ivBOSaNOVA Secure

BOSaNOVA Secure CONFIGURATIONAND ADMINISTRATIONBOSaNOVA Secure includes several modules or components to help youconfigure, administer, and customize the software. These are:1 The AdministratorUse to set and maintain overall parameters, see p. 3 The TCP/IP ConfiguratorUse to define the TCP/IP connection, proxy servers, and ports, see p. 6 The Emulation ConfiguratorUse to define emulation sessions, see p. 9 The BOSaNOVA EmulationThe environment in which you run your host applications, see p. 13 MorphExpressA tool that converts your host screen into a GUI screen, see p. 42 Printer Driver EditorUse to customize the printer driver, see p. 44 Data Transfer FunctionA 32-bit Windows utility for transferring data in either direction between aPC and a host, see p. 47 Remote CommandSend an AS/400 CL command to a host system from a PC, see p. 53

BOSaNOVA Secure DESCRIPTIONBOSaNOVA Secure combines TN5250E display emulation with DTFsoftware in a package that is specifically designed for direct BOSaNOVA-to-AS/400 or iSeries connectivity.BOSaNOVA Secure includes the following program modules: Display/Printer Emulation provides TN5250E display and printeremulation Printer Driver Editor enables you to customize the printer driver DTF (Data Transfer Functions) is a 32-bit Windows utility for transferringdata between a BOSaNOVA Secure and its hostBOSaNOVA Secure Features2 supports up to 32 simultaneous display and/or printer emulation sessions includes MorphExpress for converting host screens to true GUI screenswithout changing the host application supports Text Assist supports 3477FC devices (132-column display with color) supports PC and Terminal styles for keyboards, allowing you to work witheither a 101/102-key keyboard or 122-key keyboard supports the Euro symbol includes comprehensive keyboard mapping and customization, using Shift,Caps Lock, Alt, Ctrl, function keys, etc. includes Print Preview, which displays print output before sending the printjob to the physical printer includes Printer Session Properties, for modifying printer session settings includes customizable “floating” toolbars and Internet Explorer-typetoolbar buttons supports user-definable macros includes BOSaNOVA EHLLAPI/DDE Interface 32, which sets a standardIBM EHLLAPI-style interface for enhancing interaction between hostsessions and Windows applicationsBOSaNOVA Secure

THE ADMINISTRATORThe Administrator provides an overall view of various parameters relating toyour installation of BOSaNOVA Secure. The Administrator also enables youto run certain administrative procedures.Opening the AdministratorTo open the Administrator:1.Click the Windows Start button.2.Select All Programs3.SelectBOSaNOVA Secure.The top pane of the Administrator uses a Windows-style tree structure todisplay the parameters and installed modules. To use this structure: An item preceded by a plus sign ( ) contains nested items. Click the plussign to expand the item (display the nested folders). An item preceded by a minus sign (-) is already fully expanded. Click theminus sign to collapse that part of the tree. Names of parameter sets appear in black, while the current status valuesappear in blue. Values always appear in arrow brackets ( ). When you select a parameter set or installed module in the top pane, thebuttons and controls that configure or run that parameter set or moduleappear in the bottom pane.Installation ParametersWhen Installation Parameters, in the top pane of the Administrator, isexpanded, the following parameters are displayed:Product VersionThe installed version of BOSaNOVA Secure. Technical Support ask forthis number if you contact them for help.Installation TypeStandalone for BOSaNOVA Secure.Installation PathThe path to which BOSaNOVA Secure is installed.Installation SetThe set number.Product IDThe BOSaNOVA Secure product ID. Technical Support will ask for thisnumber if you contact them for help.The Administrator3

Administrative ParametersWhen Administrative Parameters in the top pane of the Administrator isexpanded, the following parameters are displayed:Host Language/CountryThe host keyboard ID (language), the host EBCDIC code page used, andthe EBCDIC/ASCII translation table that is used. These values weredefined when you installed BOSaNOVA Secure.Euro Support is enabled from the Host Language/Country parameter. Ifyou select this option and your Windows system and the host are set tosupport the euro symbol, BOSaNOVA Secure uses euro symbolcompliant keyboard type and code page IDs when allocating a session andEBCDIC/ANSI and ANSI/EBCDIC tables with euro symbol support. Ifyour host or Windows system do not support the euro symbol, do notselect this checkbox. See “Euro Symbol Support” on page 44 for detailson system requirements, changes, and patches.LicenseDisplays the license type.ConnectivityWhen Connectivity, in the top pane of the Administrator, is expanded, thefollowing parameter is displayed:Connection TypeTCP/IPRun(This button is disabled for the TCP/IP connection type.)ConfigureClick to open the TCP/IP Configurator to configure the connection.4BOSaNOVA Secure

Installed ModulesExpand Installed Modules to view all currently installed BOSaNOVA Securecomponents. Choices made during installation determine which modules exist.Display/Printer EmulationClick Configure to run the Emulation Configurator. Use the EmulationConfigurator to change the parameters that control the look and operationof BOSaNOVA Secure’s emulation.DTFDTF is a 32-bit Windows utility for transferring data between a client andits host. (See “DTF (Data Transfer Function)” on page 47.)DiagnosticsIf you contact Technical Support with a problem, they may ask you to providethem with special files to help them solve it. This process is explained in“Traces and Screen Captures” on page 55.Expand Diagnostics in the Administrator display tree to display the followingparameter: Troubleshooting InformationClick Collect Technical Information to open the User Informationdialog box; fill in the information requested to create the informationfile (default Bsinfo.bts).You must close all sessions before accessing Diagnostics.The Administrator5

THE TCP/IP CONFIGURATORUse the TCP/IP Configurator to configure parameters for your BOSaNOVASecure to host communication. The TCP/IP Configurator opens automaticallywhen you start BOSaNOVA Secure. You can access it any time to changeparameters.Starting the TCP/IP Configurator1.Close all sessions.2.From the Start menu, select All Programs3.Click4.Expand Connectivity in the top pane.5.Click Connection Type.BOSaNOVA Secure.6. In the bottom pane, click Configure. The TCP/IP Configurator isdisplayed.Using the TCP/IP ConfiguratorConfigurator parameters are divided between two tabs, Basic and Advanced.BasicUse the Basic tab to add, modify, or delete host systems and to define securityparameters.For a detailed explanation of the TCP/IP Configurator Basic tab:61.Open the online Help.2.Click Contents.3.Expand the Components book.4.Select The TCP/IP Configurator.5.In the Basic section of that topic click Details. The topic entitled BasicTab (TCP/IP Configurator) is displayed.BOSaNOVA Secure

Advanced TabUse this tab to set advanced parameters for the TCP/IP connection.The top pane of the Advanced Tab uses a Windows-style tree structure todisplay the parameters. To use this structure: An item preceded by a plus sign ( ) contains nested items. Click the plussign to expand the item (display the nested folders). An item preceded by a minus sign (-) is already fully expanded. Click theminus sign to collapse that part of the tree. The names of the parameter sets appear in black, while the current statusvalues appear in blue. Values always appear in arrow brackets ( ).When you change a parameter, it appears in red until you click OK. When you select a parameter set in the top pane, the buttons and controlsthat configure or run that parameter set appear in the bottom pane.Select a parameter in the top pane and use the dialog box that appears in thebottom pane to define or modify the connection.For a detailed explanation of the TCP/IP Configurator Advanced tab:1.Open the online Help.2.Click Contents.3.Expand the Components book.4.Select The TCP/IP Configurator.5.In the Advanced section of that topic click Details. The topic entitledAdvanced Tab (TCP/IP Configurator) is displayed.The TCP/IP Configurator7

The Advanced tab includes the following parameter sets: Telnet Proxy ServerUse this parameter set to define or modify the connection to the Telnetproxy server. SOCKS Proxy ServerUse this parameter set to define or modify the connection to theSOCKS proxy server. FTP Proxy ServerUse this parameter set to define or modify the connection to the FTPproxy server. LPD PortUse this parameter set to define or modify the LPD port. Keep Alive ModeWhen enabled, Keep Alive Mode maintains a connection between anidle emulation session and the AS/400. In the event of a connectionfailure, or after an AS/400 IPL procedure, Keep Alive Mode often helpsreconnect the emulation. The following options are available: NoneKeep Alive Mode is disabled. No-opOne of two minor buffers which track communication between theclient and the AS/400. This buffer can identify both idle sessionsand disconnected sessions. Enter the interval, measured inseconds, between signals. Time-markWe recommend this setting, the second of two minor buffers whichtrack communication between the client and the AS/400. Thisbuffer can identify both idle sessions and disconnected sessions.Enter the interval, measured in seconds, between signals. SSL CertificateUse this parameter set to identify the SSL Certificate. This parameter isavailable only when running BOSaNOVA Secure.Allow non-trusted certificates to encrypt the content of the traffic butdisregard verification of the recipient.8BOSaNOVA Secure

THE EMULATION CONFIGURATORUse the Emulation Configurator to change the parameters that control the lookand operation of the BOSaNOVA Secure emulation and to define sessions.You can access the Emulation Configurator while the emulation is running, butyou can not add or change sessions while sessions are open.Starting the Emulation ConfiguratorWhen the Emulation is closed:1.From the Start menu, select All ProgramsBOSaNOVA Secure2.Click3.Select Display/Printer Emulation in the top pane.4.Click Configure in the bottom pane.From the Emulation Click Select Filefrom the emulation toolbar, orRun Configurator from the emulation menu bar.Using the Emulation ConfiguratorConfigurator parameters are divided between two tabs, Sessions and AdvancedProperties.Sessions TabFor adding, modifying, or deleting display and printer emulation sessions. ForBOSaNOVA Connect, SSL is enabled via this tab.For a detailed explanation of the Sessions tab:1.Open the online Help.2.Click Contents.3.Expand the Components book.4.Select The Emulation Configurator.5.In the Sessions section of that topic click Details. The topic entitledSession Tab is displayed.The Emulation Configurator9

Advanced Properties TabUse this dialog box to add, modify, or delete display and printer emulationsessions, as well as for defining sets of global parameters.For a detailed explanation of the parameter sets on the Advanced Propertiestab:1.Open the online Help.2.Click Contents.3.Expand the Components book.4.Select The Emulation Configurator.5. In the Advanced Properties section of that topic click Details. The topicentitled Advanced Properties Tab is displayed.The Advanced Properties tab includes the following parameter sets: SessionsThis parameter lists the number of display and printer emulationsessions currently defined. In the bottom section, you can add a newsession or remove all the sessions. KeyboardThis set displays the type and style of the keyboard. You can changethe keyboard style and type and other customization options. MouseUse this branch to select from the available mouse functions.10BOSaNOVA Secure

Sign-on ScreenThis set contains parameters for defining what actions BOSaNOVASecure takes at the host sign-on screen. MorphExpressThis set contains parameters for defining the way the GUI elementsappear on the screen. Image MappingImage Mapping defines the graphics that will be displayed on asession’s screen. External Applications ToolbarThis toolbar is used to run programs from a display session. Macro OrganizerThe Macro Organizer interface displays a list of existing macros andbuttons for managing the macros. Use the Macro Organizer to add,edit, order, import, export, etc. host session macros. Display PropertiesUse this dialog box to set color schemes, map host attributes to differentcolors, and define GUI controls. Session PreferencesUse this dialog box to define parameters that affect the display sessionenvironment such as the display font and ruler type. OptionsThis set contains parameters for setting various emulation options. DiagnosticsThis set contains parameters for running diagnostic traces or recordingscreens for troubleshooting.The Emulation Configurator11

DiagnosticsIf you contact Technical Support with a problem, they may ask you to providethem with special files to help them solve it. This process is explained in“Traces and Screen Captures” on page 55.Expand Diagnostics in the Administrator display tree to display the followingparameter: Troubleshooting InformationClick Collect Technical Information to open the User Informationdialog box; fill in the information requested to create the informationfile (default Bsinfo.bts).You must close all sessions before running Diagnostics.12BOSaNOVA Secure

SECURE SOCKETS LAYER (SSL)BOSaNOVA Secure provides SSL asymmetric encryption and serverauthentication with self-signed certificates thereby ensuring secure display andprinter sessions across TCP/IP networks. This chapter describes how to set upthe iSeries and the Windows based PC to enable SSL.OverviewWhen information is sent over the Internet or Intranet, several security risksexist. EavesdroppingThe information remains intact but its privacy is compromised. ModificationThe original information is changed or replaced and then sent to therecipient. ImpersonationThe information passes to a person who poses as the intended recipient.The Secure Sockets Layer (SSL) protocol safeguards against these threats.Confidentiality and integrity are guaranteed through asymmetric encryption.Authentication is provided through digital certificates.Asymmetric encryption, also known as public key cryptography, is anencryption method that uses a two-part key: a public key and a private key. Tosend an encrypted message, the recipient’s public key is used. To decrypt themessage, the recipient uses the private key.A certificate is an item of information that binds the details of an individual ororganization to their public key. There are two types of certificates: Certificate issued by a Certificate AuthorityA Certificate Authority (CA) is a third party, trusted by bothcommunicating parties, that is responsible for both the contents andownership of a certificate. The certificate is signed with the CA’s privatekey. This guarantees its authenticity and integrity. There are several wellknown CA companies including VeriSign, Inc. and Thawte, Ltd. Self-signed CertificateA certificate where the Issuer and Subject are the same.When a server sends its certificate to a client, the process is called serverSec

The Administrator 3 THE ADMINISTRATOR The Administrator provides an overall view of various parameters relating to your installation of BOSaNOVA Secure. The Administrator also enables you to run certain administrative procedures. Opening the Administrator To open the Admi

Related Documents:

a speci c, commonly used, case of secure computation. To implement secure computation and secure key storage on mobile platforms hardware solutions were invented. One commonly used solution for secure computation and secure key storage is the Secure Element [28]. This is a smart card like tamper resistant

64. 64. Abstract. This design guide details the secure data center solution based on the Cisco Application Center Infrastructure (ACI). The Cisco Secure Firewall and Cisco Secure Application Deliver Controller (ADC) solutions are used to secure access to the workloads in an ACI data center. Target Audience.

Secure Shell is a protocol that provides authentication, encryption and data integrity to secure network communications. Implementations of Secure Shell offer the following capabilities: a secure command-shell, secure file transfer, and remote access to a variety of TCP/IP applications via a secure tunnel.

Reports are retained on the Secure FTP Server for 45 days after their creation. Programmatic Access: sFTP The PayPal Secure FTP Server is a secure File Transfer Protoc ol (sFTP) server. Programmatic access to the Secure FTP Server is by way of any sFTP client. Secure FTP Server Name The hostname of the Secure FTP Server is as follows: reports .

Reflection for Secure IT Help Topics 7 Reflection for Secure IT Help Topics Reflection for Secure IT Client features ssh (Secure Shell client) ssh2_config (client configuration file) sftp (secure file transfer) scp (secure file copy) ssh-keygen (key generation utility) ssh-agent (key agent) ssh-add (add identities to the agent) ssh-askpass (X11 passphrase utility)

Feb 04, 2015 · Stewart Secure Email User Guide – March 2015 2 Registering, Logging In, and Password Resets Secure email will arrive in your email inbox just as any other email. The first time you receive a secure email, you will be required to register to create an account for the Stewart Secure

Bank of America 5 Replying to Your Secure Message After you open a secure message, click Reply to send a Secure Reply message back to the original sender. When available, clicking ReplyAll sends a Secure Reply message to the sender and other recipients on the original email. Additional recipients CANNOT be added to the secure message. To receive a copy of your reply message, check the Send me .

00_Crawford_Price_BAB1407B0153_Prelims.indd 1 11/11/2014 7:36:56 PM. 1 INTRODUCING GROUPWORK Chapter summary In this chapter you will learn about the overall purpose, aims, scope and features of this book how the book is structured and the brief contents of each chapter how the book is aligned with a range of national standards and requirements related to professional social work .