My Account Log in

3 options

Secure production deployment of B2B solutions using WebSphere business integration connect / Geert Van de Putte ... [et al.].

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Putte, Geert van de., Author.
Series:
IBM redbooks.
Redbooks
Language:
English
Subjects (All):
Industrial marketing--Planning.
Industrial marketing.
Industrial marketing--Security measures.
Computer networks--Security measures.
Computer networks.
WebSphere.
Physical Description:
xxvi, 452 p. : ill.
Edition:
1st ed.
Place of Publication:
Research Triangle Park, N.C. : IBM Corp., International Technical Support Organization, c2005.
Language Note:
English
Summary:
Many business-to-business (B2B) deployments are unsuccessful due to the lack of proper planning prior to installing and configuring the software solution. Also, it is often forgotten that implementing a B2B solution has implications for the overall IT infrastructure. Network security, network availability, and application integration are all equally required of a successful B2B solution implementation. In this IBM Redbooks publication, we start with a discussion about topics that a B2B consultant needs to know before working on a B2B project. A deep understanding of the B2B product, an understanding of business issues, and network technologies are all required. The second part of this book discusses the typical phases of a B2B project, starting with assessment meetings and ending with post-production support. In the last part of this book, we discuss the production implementation of WebSphere® Business Integration Connect within a topology that consists of two DMZs, a reverse proxy and a load balancer. Within this environment, we have implemented the exchange of EDI documents within AS2 messages over Secure HTTP (HTTPS). Please note that the additional material referenced in the text is not available from IBM.
Contents:
Front cover
Contents
Figures
Tables
Notices
Trademarks
Preface
The team that wrote this redbook
Become a published author
Comments welcome
Part 1 Preparing for a B2B project
Chapter 1. Overview
1.1 The business of B2B
1.1.1 Business requirements
1.2 Book layout
1.2.1 Part 1. Preparing for a B2B project
1.2.2 Part 2. Managing a B2B project
1.2.3 Part 3. Implementing a B2B solution
1.3 B2B deployment methodology overview
Chapter 2. Introducing WebSphere Business Integration Connect
2.1 Features of WebSphere Business Integration Connect
2.2 WebSphere Business Integration Connect Architecture
2.2.1 Runtime components
2.2.2 Configuration components
2.2.3 Profile management
2.3 B2B features and standards
2.3.1 Transport options
2.3.2 Messaging protocol options
2.3.3 Business document formats
2.3.4 Security options in WebSphere Business Integration Connect
2.4 Integration options
Chapter 3. Aspects of security
3.1 Overview
3.2 Areas of B2B security
3.2.1 Deployment security
3.2.2 Connection security
3.2.3 Document security
3.2.4 Access control
3.3 Security technologies
3.3.1 Reverse proxy server
3.3.2 Firewalls
3.3.3 Network Address Translation
3.3.4 Port Address Translation
Chapter 4. Implementation topologies
4.1 Deployment overview
4.1.1 WebSphere Business Integration Connect components
4.1.2 Database
4.1.3 WebSphere MQ
4.1.4 Firewalls and Proxies
4.2 Distributed-Dual DMZ, Reverse Proxy with Failover
4.2.1 Deployment considerations
4.2.2 Inbound data flow
4.2.3 Outbound data flow
4.2.4 Pros
4.2.5 Cons
4.2.6 Variations of the reverse proxy scenario
4.3 Distributed-Single DMZ
4.3.1 Deployment considerations
4.3.2 Inbound data flow
4.3.3 Outbound data flow
4.3.4 Pros.
4.3.5 Cons
4.3.6 Variations of the Single DMZ Scenarios
Part 2 Managing a B2B project
Chapter 5. Introduction to B2B projects
5.1 B2B deployment methodology overview
5.1.1 Knowledge transfer and training
5.1.2 Discovery
5.1.3 Planning
5.1.4 Installation
5.1.5 Customization
5.1.6 Testing
5.1.7 Production deployment
5.1.8 Partner ramping
5.1.9 Support
5.2 B2B project scenario overview
5.2.1 Overview of Company E
5.2.2 Business environment
5.2.3 Technical environment
5.2.4 Organizational challenges
5.2.5 New business strategy
5.2.6 Current projects
Chapter 6. Project Espresso: Discovery phase
6.1 Company E discovery overview
6.1.1 Task review
6.2 B2B deployment assessment
6.2.1 Project Expresso deployment assessment agenda
6.2.2 Project Expresso deployment assessment presentation
6.3 Roles and responsibilities
6.4 Assessment meeting results
6.4.1 Business objectives
6.4.2 Technical environment review
6.4.3 Community profile
6.4.4 Data flow and integration
6.4.5 Environment, architecture and implementation discussion
6.5 Requirements and scope document
Chapter 7. Project Espresso: Planning phase
7.1 Company E planning overview
7.1.1 Task review
7.2 Requirements and follow-up meetings
7.3 Project plan
7.4 Installation and deployment plan
7.4.1 Firewall configuration plan
7.4.2 Reverse proxy configuration plan
7.4.3 Load balancer configuration plan
7.4.4 WebSphere MQ configuration
7.4.5 Database loader deployment plan
7.4.6 Product installation deployment plan
7.4.7 Product configuration plan
7.4.8 Community manager configuration plan
7.4.9 Community participant configuration plan
7.4.10 Certificate deployment plan
7.5 Testing plan
7.6 Training plan
7.7 Support plan.
7.7.1 How to discover or detect problems with transactions
7.7.2 How to report problems
7.7.3 How to resolve reported problems
7.7.4 How to maintain the system
Chapter 8. Project Espresso: Testing phase
8.1 Testing overview
8.1.1 Task review
8.2 Test plan review
8.3 Execute the Test Plan
8.4 Performance testing
8.4.1 Performance concepts
8.4.2 Performance tuning
8.4.3 WebSphere Business Integration Connect sizing
Chapter 9. Project Espresso: Production deployment phase
9.1 Production Deployment overview
9.1.1 Task review
9.2 Review the deployment plan
9.3 Create production environment
9.4 Verify component installation
Chapter 10. Project Espresso: Partner ramping phase
10.1 Company E Partner Ramping overview
10.1.1 Task review
10.2 Trading partner review
10.3 Trading Partner ramping process
10.4 Trading Partner ramping plan
Chapter 11. Project Espresso: Support phase
11.1 Company E Support overview
11.1.1 Task review
11.2 Ramping support
11.3 Monitoring and support best practices
11.3.1 Alerts
11.3.2 Monitoring
11.3.3 Debugging
11.3.4 JACL scripts
11.3.5 Console configuration
11.3.6 Profile configuration
11.3.7 Disaster recovery
11.3.8 Archive process
11.3.9 Logs
11.3.10 Data security
11.4 Support process and issue resolution
Part 3 Implementing a B2B solution
Chapter 12. Validating the environment
12.1 Create a validation checklist
12.2 Validate hardware and operating system
12.3 Validate network
12.4 Verifying software levels
12.4.1 Verifying DB2
12.4.2 Verifying WebSphere MQ
12.4.3 Enabling DB2 stored procedures
12.5 Review validation results
Chapter 13. Implementing a firewall
13.1 Network services and vulnerability
13.1.1 Minimizing security risk: Introducing the firewall.
13.2 Introduction to firewall
13.3 Firewall types
13.4 Functional components of a firewall
13.4.1 Packet-filtering router
13.4.2 Application-level gateway
13.4.3 Network Address Translation
13.5 Firewall architecture
13.5.1 Packet filtering firewall
13.5.2 Dual-homed gateway firewall
13.5.3 Screened host firewall
13.5.4 Screened subnet firewall
13.6 Implementing firewalls in our B2B solution
13.6.1 Firewall1
13.6.2 Firewall2
13.6.3 Firewall3
13.7 Limitations of a firewall
Chapter 14. Implementing a proxy server
14.1 Overview of proxy servers
14.2 Reverse proxy
14.3 Discussing the data flow
14.4 Configuring the IBM HTTP server as reverse proxy
14.4.1 Create an administrator user ID and password
14.4.2 Configure the IBM HTTP server
14.5 Validating the reverse proxy
14.6 Using IBM HTTP Server V2.x as reverse proxy
Chapter 15. Deploying the solution
15.1 Overview
15.2 Software installation
15.2.1 Adding user accounts on the DB2 server
15.2.2 Installing database schema
15.2.3 WebSphere MQ configuration
15.2.4 Installing the DB2 Client
15.2.5 Installing WebSphere MQ Client and JMS libraries
15.2.6 Installing the common share files
15.2.7 Adding a Windows user ID and group
15.2.8 Installing the Document Manager
15.2.9 Installing the Community Console
15.2.10 Installing the receiver
15.3 Initial server configuration
15.4 Hub configuration
15.4.1 Create targets
15.4.2 Create interactions
15.4.3 Create community manager
15.4.4 Create community participant
15.5 Community Manager configuration
15.5.1 Create a gateway
15.5.2 Provide B2B capabilities
15.6 Community Participant configuration
15.7 Configure participant connection
Chapter 16. Implementing a load balancer
16.1 Load balancing overview.
16.1.1 WebSphere Edge Server
16.1.2 Load balancer
16.2 Load balancing using Media Access Control (MAC) forwarding
16.2.1 How it works
16.2.2 Overall solution design
16.2.3 Load balancing deployment design
16.3 Install WebSphere Edge Server Network Dispatcher
16.4 Configure Network Dispatcher for load balancing
16.4.1 Start Network Dispatcher
16.4.2 Configure Network Dispatcher with the Dispatcher GUI
16.4.3 Configuring the cluster IP address on the network adapter
16.4.4 Aliasing the cluster address on the load-balancing servers
16.5 Validate the load balancing environment
16.6 IP session affinity
16.7 Access the components
Chapter 17. Troubleshooting the deployment
17.1 Configuration issues for multihomed servers
17.2 Execution issues
17.2.1 System log files
17.2.2 Analyze traffic on your network
17.2.3 Reprocessing failed events and business documents
17.3 Performance Issues
17.3.1 Increase the Receiver timeout setting
17.3.2 Insufficient virtual memory for DB2 agents
17.3.3 Optimizing database query performance
17.3.4 Avoiding out-of-memory errors
17.3.5 Avoid long processing time on large, encrypted AS documents
Chapter 18. Implementing HTTPS
18.1 Overview of SSL and the SSL handshake
18.2 SSL data flow
18.3 Firewall changes
18.3.1 Validating the firewalls
18.4 Configuring the IBM HTTP Server 1.3.x for SSL
18.4.1 Create a key store file
18.4.2 Generate a self-signed certificate
18.4.3 Configure the IBM HTTP Server for SSL
18.4.4 Validating the reverse proxy
18.5 Using IBM HTTP Server V2.x as a reverse proxy
18.6 Establishing trust from the proxy server to the Console
18.6.1 Validating the reverse proxy
18.7 Enforcing SSL connections to the Community Console
18.7.1 Validating the changes
18.8 SSL with Load Balancer.
18.8.1 Configuring the Cluster IP address on the Network Adapter.
Notes:
"This edition applies to Version 4, Release 2, Modification 2 of WebSphere Business Integration Connect Advanced (product number 5724-E75) and Version 4, Release 2, Modification 2 of WebSphere Business Integration Connect Enterprise (product number 5724-E78)."
"May 2005."
Includes bibliographical references and index.
OCLC:
935397436

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account