PeSIT (embedded) fields

An embedded PeSIT server is available after a community adds a PeSIT transport for picking up messages from integration or a PeSIT transport for receiving messages from partners. You can change the server’s settings and advanced options.

To change settings:

  1. Select System management > Manage embedded servers. Or, click Trading configuration on the toolbar.
  2. On the Communities page, click the link near the bottom of the page named Manage all embedded servers.

The following are the maintenance fields for an embedded Transfer CFT (PeSIT) transport server that has been added by a community.

Settings tab

  • Server name – A name you give the transport server to distinguish it from other embedded servers. This field gets its initial value when you type it in the delivery exchange wizard.
  • Host – The fully qualified domain name of the computer on which the embedded server runs. Interchange detects this setting; you cannot change it.
  • Port – The port on which the server listens for connection requests.

DMZ ports tab

Note   This tab displays in the user interface only if your software license enables Secure Relay DMZ nodes. The tab only applies to servers used for trading and not integration.
  • Enable DMZ port forwarding – Select this check box if you want the external firewall or load balancer to send inbound connections to Secure Relay DMZ nodes rather than directly to embedded servers in the protected network.
  • In the simplest case there is one DMZ port with the same value as the corresponding embedded server port in the protected network. If you add a machine to your cluster and return to the DMZ ports tab, another DMZ port automatically is added in sequence. This happens because every machine in the cluster that can host the embedded server must be assigned a unique corresponding port in the DMZ.
  • Click the port field to display a list of ports already in use.
  • Enable security termination in DMZ – Select this check box to have various security functions performed in the DMZ. If connections are via SSL, the secure connection is terminated at the router agent in the DMZ. For delivery exchanges that require a user name and password to connect (for example, FTP, SFTP, WebDAV), the router agent authenticates the user.
  • Enable IP address checking in DMZ – Select this check box to have Interchange check partners’ IP addresses against a whitelist of authorized IP addresses. Connections from unknown IP addresses are not allowed.
  • Match IP address against partner definition: When IP address checking is enabled, select this check box to have the router agent check whether the partner is registered to the IP address. If not selected, the agent only checks the user’s credentials. (This control is not available to all types of servers.)
  • Zone – If you want to receive messages through a Secure Relay DMZ zone, select a zone. This drop-down field is available only if zones have been set up.

See Port forwarding details for more information.

Advanced tab

  • Minimum threads –The least number of threads must dedicate to the server.
  • Maximum threads –The most threads can dedicate to the server.
  • Read timeout (seconds) – How many seconds of inactivity to allow before Interchange terminates the connection.
  • Server timeout (milliseconds) – Controls how long the server waits after receiving a file to see if the client is going to be sending another file on the same session. Setting this too low may cause abort errors on the client side. Setting this too high may cause tread pool depletion on Interchange side.
  • Connection timeout (seconds) –Time in seconds Interchange waits for a connection to the delivery exchange before the attempt times out. Although the default value is 30 seconds, this may be longer than the interval allowed by your operating system (OS). For example, Windows XP by default allows a maximum timeout of 20 seconds. The actual connect timeout interval is the lesser of the OS timeout and the value set in Interchange.
  • Transfer timeout - server mode (seconds) – Time in seconds a transfer times out.
  • Network timeout (seconds) – Time in seconds the network times out.
  • Protocol timeout (seconds) – Time in seconds the protocol times out.
  • Send buffer (resize) – This represents the largest of chunk of data, in bytes, to be transferred at one time. For high-speed networks, this should be 32,700 bytes, which is the default value.
  • In addition, this value is related to the client setting for record length on the PeSIT parameters tab. The value of this field must be the same or larger than the value of the record length field.
  • Do not change this value unless advised by the administrator of the component.
  • The parenthetical term after the field name ( rusize) is the term for this setting.
  • Kb per sync point (pacing) – Each time an amount of data equal to this value has been sent, the client is expected to ask the server to confirm whether data totaling this value has been received. The server responds optionally with a confirmation. This represents a check point in the progress of a file transfer. If a connection is lost before a file transfer has been completed, the transfer resumes, upon restart of the transport, at the point of the last successful check point.
  • The default value is 1024 kilobytes (1 megabyte). Do not change this value unless advised by the administrator of the component.
  • The parenthetical term after the field name ( pacing) is the term for this setting.
  • Max outstanding sync points (chkw) –This controls how many check point cycles the client waits for the server to respond to a request to confirm file-transfer progress. For example, if the value of Kb per sync point (pacing) is 1024 (1 megabyte) and the value of this field is 1, the client stops sending data after 1024 kilobytes unless the server responds, although the transfer remains active. If this value is 2, the client keeps sending until 2 megabytes (1024 x 2) of data are sent, and so on.
  • If the client’s value for this field is 0 (zero), the client does not ask the server to confirm at intervals the amount of data received. If the server’s value for this field is 0, the server does not send confirmations at intervals of data received.
  • The default value is 3. Do not change this value unless advised by the administrator of the component.
  • The parenthetical term after the field name ( chkw) is the term for this setting.
  • Override SSL and TLS cipher suites – Select this option and then use the Add and Remove buttons to specify the cipher suites supported for the embedded server.
  • If you do not select this option, all cipher suites are supported by default. Keeping the default cipher list is less secure than specifying a restricted set of cipher suites.
  • The cipher suites that are displayed in the "Available" column depend on your runtime environment (JRE version, IACK or FIPS enablement, Secure Relay configuration, ....).
  • The default order in the "Available" column is the preferred order of use. Once ciphers are moved to the Selected column, you can arrange the order. Interchange uses the ciphers in the order listed.
  • A cipher suite is a collection of security algorithms used in making connections via Secure Sockets Layer or Transport Layer Security. For example, an SSL or TLS protocol requires signing messages using a message digest algorithm. But the choice of algorithm is determined by the particular cipher suite being used for the connection. Typically, you can select an MD5 or SHA digest algorithm.
  • Of the many algorithms for encrypting data and computing the message authentication code, there are varying levels of security. Some provide the highest levels of security, but require a large amount of computation for encryption and decryption. Others are less secure, but provide rapid encryption and decryption. The length of the key used for encryption affects the level of security. The longer the key, the more secure the data.
  • The option for overriding cipher suites lets you select the level of security that suits your needs and enables communicating with others who might have different security requirements. For example, when an SSL connection is established, the client and server exchange information about the cipher suites they have in common. Then they communicate using the common cipher suite that offers the highest level of security. If they do not have a cipher suite in common, secure communication is not possible.
  • In versions of Interchange earlier than Interchange 5.9, cipher suites configuration was handled by a file named sslciphersuites.xml. As data in that file is saved in the database, the custom cipher suites configuration is retained upon upgrading and is displayed in the Selected list under the option in the user interface. The sslciphersuites.xml file is no longer used.

Related topic s

Related Links