2013 Registrar Accreditation Agreement
本文引用ICANN文档 来源>>27 June 2013 This REGISTRAR ACCREDITATION AGREEMENT (this "Agreement")is by andbetween the Internet Corporation forAssigned Names and Numbers,a Californianon-profit,public benefit corporation (“ICANN”),and [Registrar Name],aOrganization type and jurisdiction,and shall be deemed made on at Los Angeles,California,USA.1.DEFINITIONS. For purposes of this Agreement,the following definitions shall apply:1.1 “Account Holder”means the person or entity thatis paying for the Registered Name or otherwise controls the management of the registered name,when thatperson or entity is not the Registered Name Holder.1.2 "Accredited"or“Accreditation”means to identify and set minimum standards for the performance of registration functions,to recognize persons or entitiesmeeting those standards,and to enter into an accreditation agreement that sets forth the rules and procedures applicable to the provision of RegistrarServices.1.3 “Affiliate”means a person or entity that,directly or indirectly,through one or more intermediaries,Controls,is controlled by,or is under common control with, the person or entity specified. 1.4 “Affiliated Registrar”is another Accredited registrar thatis an Affiliate of Registrar.1.5 “Applicable Registrar Family”means,with respect to Affiliated Registrars,such Affiliated Registrar as a group.1.6 “Consensus Policy”has the meaning set forth in the Consensus Policiesand Temporary Policies Specification attached hereto.1.7 “Control”(including the terms“controlled by"and“under common controlwith")means the possession,directly or indirectly,of the power to direct or cause the direction of the management or policies of a person or entity,whether through the ownership of securities,as trustee or executor,by serving as an employee ora member of aboard of directors or equivalent governing body, by contract, by credit arrangement or otherwise.1.8 "DNS" refers to the Internet domain-name system. 1.9 The "Effective Date" is .1.10 The "Expiration Date" is .1.11 "gTLD" or “gTLDs” refers to the top-level domain(s) of the DNS delegated by ICANN pursuant to a registry agreement that is in full force and effect, other than any country code TLD (ccTLD) or internationalized domain name (IDN) country code TLD.1.12 "gTLD Zone-File Data" means all data contained in a DNS zone file for the registry, or for any subdomain for which Registry Services are provided and that contains Registered Names, as provided to nameservers on the Internet.1.13 “Illegal Activity” means conduct involving use of a Registered Namesponsored by Registrar that is prohibited by applicable law and/or exploitation of Registrar’s domain name resolution or registration services in furtherance ofconduct involving the use of a Registered Name sponsored by Registrar that is prohibited by applicable law.1.14 “Personal Data" refers to data about any identified or identifiable natural person.1.15 "Registered Name" refers to a domain name within the domain of agTLD,whether consisting of two (2) or more (e.g., john.smith.name) levels, about which a gTLD Registry Operator (or an Affiliate or subcontractor thereof engaged inproviding Registry Services) maintains data in a Registry Database, arranges forsuch maintenance, or derives revenue from such maintenance. A name in a Registry Database maybe a Registered Name eventhough it does not appear in a zone file(e.g., a registered but inactive name).1.16 "Registered Name Holder" means the holder of a Registered Name.1.17 The word "registrar," when appearing without an initial capital letter, refers to a person or entity that contracts with Registered Name Holders and with a Registry Operator and collects registration data about the Registered Name Holders andsubmits registration information for entry in the Registry Database.1.18 “Registrar Approval” means the receipt of either of the following approvals:1.18.1 The affirmative approval of Applicable Registrars accounting for 90% of the Total Registered Names Under Management by the ApplicableRegistrars; provided that, for purposes of calculating the Total Registered Names Under Management by Applicable Registrars, the Total Registered Names Under Management by each Applicable Registrar Family shall not exceed the Total Registered Names Under Management of the Applicable Registrar Family that is the fifth largest Applicable Registrar Family(measured by number of Registered Names Under Management),both for purposes of the numerator and the denominator; or1.18.2 The affirmative approval of 50% plus one of the Applicable Registrars that participate in the process to approve or disapprove (i.e. vote for oragainst,but not abstain or otherwise fail to vote) aproposed amendmentunder Section 6, and the affirmative approval of Applicable Registrarsaccounting for 66.67% of the Total Registered Names Under Management by all Applicable Registrars; provided that, for purposes of calculating the Total Registered Names Under Management by Applicable Registrars, the TotalRegistered Names Under Management by each Applicable Registrar Family shall not exceed the total Registered Names Under Management of theApplicable Registrar Family that is the fifth largest Applicable Registrar Family (measured by number of Registered Names Under Management), both for purposes of the numerator and the denominator. An example of these calculations is set forth in Appendix 1 attached hereto.1.19 "Registrar Services" means the services subject to this Agreement provided by a registrar in connection with agTLD, and includes contracting with RegisteredName Holders, collecting registration data about the Registered Name Holders, and submitting registration information for entry in the Registry Database.1.20 "Registry Data" means all Registry Database data maintained in electronic form, and shall include gTLD Zone-File Data, all data used to provide RegistryServices and submitted by registrars in electronic form, and all other data used to provide Registry Services concerning particular domain name registrations ornameservers maintained in electronic form in a Registry Database.1.21 "Registry Database" means a database comprised of data about one or more DNS domain names within the domain of a registry that is used to generate either DNS resource records that are published authoritatively or responses to domain- name availability lookup requests or Whois queries, for some or all of those names.1.22 A "Registry Operator" is the person or entity then responsible, in accordance with an agreement between ICANN (or its assignee) and that person or entity (those persons or entities) or, if that agreement is terminated or expires, in accordancewith an agreement between the US Government and that person or entity (those persons or entities), for providing Registry Services for a specific gTLD.1.23 "Registry Services," with respect to a particular gTLD, shall have the meaning defined in the agreement between ICANN and the Registry Operator for that gTLD. 1.24 A “Reseller” is a person or entity that participates in Registrar’s distribution channel for domain name registrations (a) pursuant to an agreement, arrangement or understanding with Registrar or (b) with Registrar’s actual knowledge, provides some or all Registrar Services, including collecting registration data aboutRegistered Name Holders, submitting that data to Registrar, or facilitating the entry of the registration agreement between the Registrar and the Registered NameHolder.1.25 “Restricted Amendment” means (i) an amendment of the Consensus Policies and Temporary Policies Specification or (ii) the term of this Agreement as specified in Section 5.1, as such term maybe extended pursuant to Section 5.2.1.26 A Registered Name is "sponsored" by the registrar that placed the recordassociated with that registration into the registry. Sponsorship of a registration may be changed at the express direction of the Registered Name Holder or, in the event a registrar loses Accreditation, in accordance with then-current ICANN Specifications and Policies.1.27 “Specifications and/or Policies” include Consensus Policies, Specifications(such as the Whois Accuracy Program Specification) referenced in this Agreement, and any amendments, policies, procedures, or programs specifically contemplated by this Agreement or authorized by ICANN’sBylaws.1.28 "Term of this Agreement" begins on the Effective Date and continues to theearlier of (a) the Expiration Date, or (b) termination of this Agreement.1.29 “Total Registered Names Under Management” means the total number ofRegistered Names sponsored by all Applicable Registrars as reflected in the latest monthly reports submitted to ICANN by Registrars.1.30 “Whois Accuracy Program Specification” means the Whois Accuracy Program Specification attached hereto, as updated from time to time in accordance with this Agreement.1.31 “Whois Specification” means the Registration Data Directory Service (Whois) Specification attached hereto, as updated from time to time in accordance with this Agreement.1.32 “Working Group” means representatives of the Applicable Registrars andother members of the community that the Registrar Stakeholder Group appoints, from time to time,to serve as a working group to consult on amendments to the Applicable Registrar Agreements (excluding bilateral amendments pursuant to Section 6.9). ICANN OBLIGATIONS.2.1 Accreditation. During the Term of this Agreement and subject to the termsand conditions of this Agreement, Registrar is hereby Accredited by ICANN to act as a registrar (including to insert and renew registration of Registered Names in theRegistry Database) for gTLDs.2.2 Registrar Use of ICANN Name, Website and Trademarks. ICANN herebygrants to Registrar anon-exclusive, worldwide, royalty-free license during the Term of this Agreement (a) to state that it is Accredited by ICANN as a registrar for gTLDs, and (b) to link to pages and documents within the ICANN website. Subject to theterms and conditions set forth in the Logo License Specification attached hereto, ICANN hereby grants to Registrar anon-exclusive, worldwide right and license to use the Trademarks (as defined in the Logo License Specification). No other use of ICANN's name, website or Trademarks is licensed hereby. This license may not beassigned or sublicensed by Registrar to any other party, including, without limitation, any Affiliate of Registrar or any Reseller.2.3 General Obligations of ICANN. With respect to all matters that impact the rights, obligations, or role of Registrar, ICANN shall during the Term of thisAgreement:2.3.1 exercise its responsibilities in an open and transparent manner;2.3.2 not unreasonably restrain competition and, to the extent feasible, promote and encourage robust competition;2.3.3 not apply standards, policies, procedures or practices arbitrarily, unjustifiably, or inequitably and not single out Registrar for disparatetreatment unless justified by substantial and reasonable cause; and2.3.4 ensure, through its reconsideration and independent review policies, adequate appeal procedures for Registrar, to the extent it is adverselyaffected by ICANN standards, policies, procedures or practices.2.4 Use of ICANN Accredited Registrars. In order to promote competition in theregistration of domain names, and in recognition of the value that ICANN-Accredited registrars bring to the Internet community, ICANN has ordinarily required gTLDregistries under contract with ICANN to use ICANN-Accredited registrars, andICANN will during the course of this agreement abide by any ICANN adoptedSpecifications or Policies requiring the use of ICANN-Accredited registrars by gTLD registries. REGISTRAR OBLIGATIONS.3.1 Obligations to Provide Registrar Services. During the Term of this Agreement,Registrar agrees that it will operate as a registrar for one or more gTLDs in accordance with this Agreement.3.2 Submission of Registered Name Holder Data to Registry. During the Term of this Agreement:3.2.1 As part of its registration of Registered Names in agTLD, Registrar shall submit to, or shall place in the Registry Database operated by, theRegistry Operator for the gTLD the following data elements:3.2.1.1 The name of the Registered Name being registered;3.2.1.2 The IP addresses of the primary nameserver and secondary nameserver(s) for the Registered Name;3.2.1.3 The corresponding names of those nameservers;3.2.1.4 Unless automatically generated by the registry system, the identity of the Registrar;3.2.1.5 Unless automatically generated by the registry system, the expiration date of the registration; and3.2.1.6 Any other data the Registry Operator requires be submitted to it.The agreement between the Registry Operator of agTLD and Registrar may, if approved by ICANN in writing, state alternative required data elementsapplicable to that gTLD, in which event, the alternative required dataelements shall replace and supersede Subsections 3.2.1.1 through 3.2.1.6stated above for all purposes under this Agreement but only with respect to that particular gTLD. When seeking approval for alternative required data elements, the data elements set forth in Subsections 3.2.1.1 through 3.2.1.6 should be considered suggested minimum requirements.3.2.2 Within seven (7) days after receiving any updates from the Registered Name Holder to the data elements listed in Subsections 3.2.1.2, 3.1.2.3, and3.2.1.6 for any Registered Name that Registrar sponsors, Registrarshall submit the updated data elements to, or shall place those elements in the Registry Database operated by, the relevant Registry Operator.3.2.3 In order to allow reconstitution of the Registry Database in the event of an otherwise unrecoverable technical failure or a change in the designated Registry Operator, within ten (10) days of any such request by ICANN, Registrarshall submit an electronic database containing the data elements listed in Subsections 3.2.1.1 through 3.2.1.6 for all active records in theregistry sponsored by Registrar, in a format specified by ICANN, to the Registry Operator for the appropriate gTLD.3.3 Public Access to Data on Registered Names. During the Term of this Agreement:3.3.1 At its expense, Registrarshall provide an interactive webpage and,with respect to any gTLD operating a “thin” registry, a port 43 Whois service (each accessible via both IPv4 and IPv6) providing free public query-based access to up-to-date (i.e., updated at least daily) data concerning all activeRegistered Names sponsored by Registrar in any gTLD. Until otherwise specified by a Consensus Policy, such data shall consist of the following elements as contained in Registrar's database:3.3.1.1 The name of the Registered Name;3.3.1.2 The names of the primary nameserver and secondary nameserver(s) for the Registered Name;3.3.1.3 The identity of Registrar (which maybe provided through Registrar's website);3.3.1.4 The original creation date of the registration; 3.3.1.5 The expiration date of the registration;3.3.1.6 The name and postal address of the Registered Name Holder;3.3.1.7 The name, postal address,e-mail address, voice telephonenumber, and (where available) fax number of the technical contact for the Registered Name; and3.3.1.8 The name, postal address,e-mail address, voice telephone number, and (where available) fax number of the administrative contact for the Registered Name.The agreement between the Registry Operator of agTLD and Registrar may, if approved by ICANN in writing, state alternative required data elementsapplicable to that gTLD, in which event, the alternative required dataelements shall replace and supersede Subsections 3.3.1.1 through 3.3.1.8stated above for all purposes under this Agreement but only with respect to that particular gTLD.3.3.2 Upon receiving any updates to the data elements listed in Subsections3.3.1.2, 3.3.1.3, and 3.3.1.5 through 3.3.1.8 from the Registered Name Holder, Registrarshall promptly update its database used to provide the public access described in Subsection 3.3.1.3.3.3 Registrar may subcontract its obligation to provide the public access described in Subsection 3.3.1 and the updating described in Subsection 3.3.2,provided that Registrarshall remain fully responsible for the proper provision of the access and updating.3.3.4 Registrarshall abide by any Consensus Policy that requires registrars to cooperatively implement a distributed capability that provides query-based Whois search functionality across all registrars. If the Whois serviceimplemented by registrars does not in a reasonable time provide reasonably robust, reliable,and convenient access to accurate and up-to-date data, the Registrarshall abide by any Consensus Policy requiring Registrar, ifreasonably determined by ICANN to be necessary (considering suchpossibilities as remedial action by specific registrars), to supply data from Registrar's database to facilitate the development of a centralized Whois database for the purpose of providing comprehensive Registrar Whoissearch capability.3.3.5 In providing query-based public access to registration data asrequired by Subsections 3.3.1 and 3.3.4, Registrarshall not impose terms and conditions on use of the data provided, except as permitted by anySpecification or Policy established by ICANN. Unless and until ICANNestablishes a different Consensus Policy, Registrarshall permit use of data it provides in response to queries for any lawful purposes except to: (a) allow, enable, or otherwise support the transmission bye-mail, telephone, postalmail, facsimile or other means of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existingcustomers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of any Registry Operator or ICANN-Accredited registrar, except as reasonably necessary to register domain names or modify existing registrations.3.3.6 In the event that ICANN determines, following analysis of economic data by an economist(s) retained by ICANN (which data has been madeavailable to Registrar), that an individual or entity is able to exercise market power with respect to registrations or with respect to registration data used for development of value-added products and services by third parties,Registrarshall provide third-party bulk access to the data subject to public access under Subsection 3.3.1 under the following terms and conditions:3.3.6.1 Registrarshall make a complete electronic copy of the data available at least one (1) time per week for download by third parties who have entered into a bulk access agreement with Registrar. 3.3.6.2 Registrar may charge an annual fee, not to exceed US$10,000, for such bulk access to the data.3.3.6.3 Registrar's access agreementshall require the third party to agree not to use the data to allow, enable, or otherwise support anymarketing activities, regardless of the medium used. Such mediainclude but are not limited toe-mail, telephone, facsimile, postal mail, SMS, and wireless alerts.3.3.6.4 Registrar's access agreementshall require the third party to agree not to use the data to enable high-volume, automated, electronicprocesses that send queries or data to the systems of any RegistryOperator or ICANN-Accredited registrar, except as reasonablynecessary to register domain names or modify existing registrations.3.3.6.5 Registrar's access agreement must require the third party to agree not to sell or redistribute the data except insofar as it has been incorporated by the third party into a value-added product or service that does not permit the extraction of a substantial portion of the bulk data from the value-added product or service for use by other parties.3.3.7 To comply with applicable statutes and regulations and for otherreasons,ICANN may adopt a Consensus Policy establishing limits (a) on the Personal Data concerning Registered Names that Registrar may makeavailable to the public through a public-access service described in thisSubsection 3.3 and (b) on the manner in which Registrar may make such data available. Registrarshall comply with any such Consensus Policy.3.3.8 Registrarshall meet or exceed the requirements set forth in the Whois Specification.3.4 Retention of Registered Name Holder and Registration Data.3.4.1 For each Registered Name sponsored by Registrar within agTLD,Registrarshall collect and securely maintain, in its own electronic database, as updated from time to time:3.4.1.1 the data specified in the Data Retention Specification attached hereto for the period specified therein;3.4.1.2 The data elements listed in Subsections 3.3.1.1 through 3.3.1.8;3.4.1.3 the name and (where available) postal address, e-mail address, voice telephone number, and fax number of the billing contact; 3.4.1.4 any other Registry Data that Registrar has submitted to the Registry Operator or placed in the Registry Database underSubsection 3.2; and3.4.1.5 the name, postal address,e-mail address, and voice telephone number provided by the customer of any privacy service or licensee of any proxy registration service, in each case, offered or made available by Registrar or its Affiliates in connection with each registration.Effective on the date that ICANN fully implements a ProxyAccreditation Program established in accordance with Section 3.14, the obligations under this Section 3.4.1.5 will cease to apply as to any specific category of data (such as postal address) that is expresslyrequired to be retained by another party in accordance with such Proxy Accreditation Program.3.4.2 During the Term of this Agreement and for two (2) years thereafter, Registrar (itself or by its agent(s)) shall maintain the following recordsrelating to its dealings with the Registry Operator(s) and Registered Name Holders:3.4.2.1 In electronic form, the submission date and time, and the content, of all registration data (including updates) submitted in electronic form to the Registry Operator(s);3.4.2.2 In electronic, paper, or microfilm form, all writtencommunications constituting registration applications, confirmations, modifications, or terminations and related correspondence withRegistered Name Holders, including registration contracts; and3.4.2.3 In electronic form, records of the accounts of all Registered Name Holders with Registrar.3.4.3 During the Term of this Agreement and for two (2) years thereafter, Registrarshall make the data, information and records specified in thisSection 3.4 available for inspection and copying by ICANN upon reasonablenotice. In addition, upon reasonable notice and request from ICANN,Registrarshall deliver copies of such data, information and records to ICANN in respect to limited transactions or circumstances that maybe the subject of a compliance-related inquiry; provided, however, that such obligationshall not apply to requests for copies of the Registrar’s entire database ortransaction history. Such copies are to be provided at Registrar’s expense. In responding to ICANN’s request for delivery of electronic data, informationand records, Registrar may submit such information in a format reasonably convenient to Registrar and acceptable to ICANN so as to minimizedisruption to the Registrar’s business. In the event Registrar believes that the provision of any such data, information or records to ICANN would violate applicable law or any legal proceedings, ICANN and Registrar agree todiscuss in good faith whether appropriate limitations, protections, oralternative solutions can be identified to allow the production of such data,information or records incomplete or redacted form, as appropriate. ICANN shall not disclose the content of such data, information or records except as expressly required by applicable law, any legal proceeding or Specification or Policy.3.4.4 Notwithstanding any other requirement in this Agreement or the DataRetention Specification, Registrarshall not be obligated to maintain records relating to a domain registration beginning on the date two (2) yearsfollowing the domain registration's deletion or transfer away to a different registrar.3.5 Rights in Data. Registrar disclaims all rights to exclusive ownership or use of the data elements listed in Subsections 3.2.1.1 through 3.2.1.3 for all RegisteredNames submitted by Registrar to the Registry Database for, or sponsored byRegistrar in, each gTLD for which it is Accredited. Registrar does not disclaim rights in the data elements listed in Subsections 3.2.1.4 through 3.2.1.6 and Subsections3.3.1.3 through 3.3.1.8 concerning active Registered Names sponsored by it in each gTLD for which it is Accredited, and agrees to grant non-exclusive, irrevocable,royalty-free licenses to make use of and disclose the data elements listed inSubsections 3.2.1.4 through 3.2.1.6 and 3.3.1.3 through 3.3.1.8 for the purpose ofproviding a service or services (such as a Whois service under Subsection 3.3.4)providing interactive, query-based public access. Upon a change in sponsorshipfrom Registrar of any Registered Name in each gTLD for which it is Accredited,Registrar acknowledges that the registrar gaining sponsorshipshall have the rights of an owner to the data elements listed in Subsections 3.2.1.4 through 3.2.1.6 and3.3.1.3 through 3.3.1.8 concerning that Registered Name, with Registrar alsoretaining the rights of an owner in that data. Nothing in this Subsection prohibitsRegistrar from (1) restricting bulk public access to data elements in a mannerconsistent with this Agreement and any Specifications or Policies or (2) transferring rights it claims in data elements subject to the provisions of this Subsection 3.5.3.6 Data Escrow. During the Term of this Agreement, on a schedule, under the terms, and in the format specified by ICANN, Registrarshall submit an electronic copy of the data described in Subsections 3.4.1.2 through 3.4.1.5 to ICANN or, at Registrar's election and at its expense, to a reputable escrow agent mutuallyapproved by Registrar and ICANN, such approval also not to be unreasonablywithheld by either party. The data shall beheld under an agreement amongRegistrar, ICANN, and the escrow agent (if any) providing that (1) the data shall be received and held in escrow, with no use other than verification that the deposited data is complete, consistent, and in proper format, until released to ICANN; (2) the data shall be released from escrow upon expiration without renewal or termination of this Agreement; and (3) ICANN's rights under the escrow agreementshall beassigned with any assignment of this Agreement. The escrowshall provide that in the event the escrow is released under this Subsection, ICANN (or its assignee) shall have anon-exclusive, irrevocable, royalty-free license to exercise (only fortransitional purposes) or have exercised all rights necessary to provide Registrar Services.3.7 Business Dealings, Including with Registered Name Holders.3.7.1 In the event ICANN adopts a Specification or Policy that is supported by a consensus of ICANN-Accredited registrars as reflected in the Registrar Stakeholder Group (or any successor group), establishing or approving aCode of Conduct for ICANN-Accredited registrars, Registrarshall abide by that Code of Conduct.3.7.2 Registrarshall abide by applicable laws and governmental regulations.3.7.3 Registrarshall not represent to any actual or potential RegisteredName Holder that Registrar enjoys access to a registry for which Registrar is Accredited that is superior to that of any other registrar Accredited for that registry.3.7.4 Registrarshall not activate any Registered Name unless and until it is satisfied that it has received a reasonable assurance of payment of itsregistration fee. For this purpose,a charge to a credit card, generalcommercial terms extended to creditworthy customers, or other mechanism providing a similar level of assurance of paymentshall be sufficient, provided that the obligation to pay becomes final and non-revocable by the Registered Name Holder upon activation of the registration.3.7.5 At the conclusion of the registration period, failure by or on behalf of the Registered Name Holder to consent that the registration be renewedwithin the time specified in a second notice or remindershall, in the absence of extenuating circumstances, result in cancellation of the registration by the end of the auto-renew grace period (although Registrar may choose to cancel the name earlier).3.7.5.1 Extenuating circumstances are defined as: UDRP action, valid court order, failure of a Registrar's renewal process (which does not include failure of a registrant to respond), the domain name is used by a nameserver that provides DNS service to third-parties (additionaltime maybe required to migrate the records managed by thenameserver), the registrant is subject to bankruptcy proceedings,payment dispute (where a registrant claims to have paid for arenewal, or a discrepancy in the amount paid),billing dispute (where a registrant disputes the amount on a bill), domain name subject tolitigation in a court of competent jurisdiction, or other circumstance as approved specifically by ICANN. 3.7.5.2 Where Registrar chooses, under extenuating circumstances,to renew a domain name without the explicit consent of the registrant, the registrar must maintain a record of the extenuating circumstances associated with renewing that specific domain name for inspection byICANN consistent with clauses 3.4.2 and 3.4.3 of this registrar accreditation agreement.3.7.5.3 In the absence of extenuating circumstances (as defined inSection 3.7.5.1 above),a domain name must be deleted within 45 days of either the registrar or the registrant terminating a registrationagreement.3.7.5.4 Registrarshall provide notice to each new registrantdescribing the details of their deletion and auto-renewal policyincluding the expected time at which anon-renewed domain name would be deleted relative to the domain's expiration date, or a date range not to exceed ten (10) days in length. If a registrar makes any material changes to its deletion policy during the period of theregistration agreement, it must make at least the same effort to inform the registrant of the changes as it would to inform the registrant ofother material changes to the registration agreement (as defined in clause 3.7.7 of the registrars accreditation agreement).3.7.5.5 If Registrar operates a website for domain name registration or renewal, details of Registrar's deletion and auto-renewal policies must be clearly displayed on the website.3.7.5.6 If Registrar operates a website for domain registration orrenewal, it should state, both at the time of registration and in a clear place on its website, any fee charged for the recovery of a domainname during the Redemption Grace Period.3.7.5.7 In the event that a domain which is the subject of a UDRPdispute is deleted or expires during the course of the dispute, thecomplainant in the UDRP dispute will have the option to renew orrestore the name under the same commercial terms as the registrant. If the complainant renews or restores the name, the name will beplaced in Registrar HOLD and Registrar LOCK status, the WHOIScontact information for the registrant will be removed, and theWHOIS entry will indicate that the name is subject to dispute. If the complaint is terminated, or the UDRP dispute finds against thecomplainant, the name will be deleted within 45 days. The registrant retains the right under the existing redemption grace periodprovisions to recover the name at anytime during the Redemption Grace Period, and retains the right to renew the name before it is deleted. 3.7.6 Registrarshall not insert or renew any Registered Name in any gTLD registry in a manner contrary to (i) any Consensus Policy stating a list orspecification of excluded Registered Names that is in effect at the time ofinsertion or renewal, or (ii) any list of names to be reserved from registration as required by the specific Registry Operator for which the Registrar isproviding Registrar Services.3.7.7 Registrarshall require all Registered Name Holders to enter into anelectronic or paper registration agreement with Registrar including at least the provisions set forth in Subsections 3.7.7.1 through 3.7.7.12, and whichagreementshall otherwise set forth the terms and conditions applicable tothe registration of a domain name sponsored by Registrar. The RegisteredName Holder with whom Registrar enters into a registration agreement must be a person or legal entity other than the Registrar, provided that Registrarmaybe the Registered Name Holder for domains registered for the purpose of conducting its Registrar Services, in which case the Registrarshall submit to the provisions set forth in Subsections 3.7.7.1 through 3.7.7.12 and shallbe responsible to ICANN for compliance with all obligations of the Registered Name Holder asset forth in this Agreement and Specifications and Policies.Registrarshall use commercially reasonable efforts to enforce compliancewith the provisions of the registration agreement between Registrar and any Registered Name Holder that relate to implementing the requirements ofSubsections 3.7.7.1 through 3.7.7.12 or any Consensus Policy.3.7.7.1 The Registered Name Holdershall provide to Registraraccurate and reliable contact details and correct and update themwithin seven (7) days of any change during the term of the Registered Name registration, including: the full name, postal address,e-mailaddress, voice telephone number, and fax number if available of the Registered Name Holder; name of authorized person for contactpurposes in the case of an Registered Name Holder that is anorganization, association, or corporation; and the data elements listed in Subsections 3.3.1.2, 3.3.1.7 and 3.3.1.8.3.7.7.2 A Registered Name Holder's willful provision of inaccurate orunreliable information, its willful failure to update informationprovided to Registrar within seven (7) days of any change, or itsfailure to respond for over fifteen (15) days to inquiries by Registrar concerning the accuracy of contact details associated with theRegistered Name Holder's registrationshall constitute a material breach of the Registered Name Holder-registrar contract and be a basis for suspension and/or cancellation of the Registered Name registration.3.7.7.3 Any Registered Name Holder that intends to license use of a domain name to a third party is nonetheless the Registered Name Holder of record and is responsible for providing its own full contact information and for providing and updating accurate technical and administrative contact information adequate to facilitate timelyresolution of any problems that arise in connection with theRegistered Name. A Registered Name Holder licensing use of aRegistered Name according to this provisionshall accept liability for harm caused by wrongful use of the Registered Name, unless itdiscloses the current contact information provided by the licensee and the identity of the licensee within seven (7) days to a partyproviding the Registered Name Holder reasonable evidence of actionable harm.3.7.7.4 Registrarshall provide notice to each new or renewed Registered Name Holder stating:3.7.7.4.1 The purposes for which any Personal Data collected from the applicant are intended;3.7.7.4.2 The intended recipients or categories of recipients of the data (including the Registry Operator and others who will receive the data from Registry Operator);3.7.7.4.3 Which data are obligatory and which data, if any, are voluntary; and3.7.7.4.4 How the Registered Name Holder or data subject can access and, if necessary, rectify the data held about them.3.7.7.5 The Registered Name Holdershall consent to the data processing referred to in Subsection 3.7.7.4.3.7.7.6 The Registered Name Holdershall represent that notice has been provided equivalent to that described in Subsection 3.7.7.4 to any third-party individuals whose Personal Data are supplied toRegistrar by the Registered Name Holder, and that the Registered Name Holder has obtained consent equivalent to that referred to in Subsection 3.7.7.5 of any such third-party individuals.3.7.7.7 Registrarshall agree that it will not process the Personal Data collected from the Registered Name Holder in away incompatiblewith the purposes and other limitations about which it has provided notice to the Registered Name Holder in accordance with Subsection 3.7.7.4 above.3.7.7.8 Registrarshall agree that it will take reasonable precautions to protect Personal Data from loss, misuse, unauthorized access ordisclosure, alteration, or destruction. 3.7.7.9 The Registered Name Holdershall represent that, to the best of the Registered Name Holder's knowledge and belief, neither theregistration of the Registered Name nor the manner in which it isdirectly or indirectly used infringes the legal rights of any third party.3.7.7.10 For the adjudication of disputes concerning or arising fromuse of the Registered Name, the Registered Name Holdershall submit, without prejudice to other potentially applicable jurisdictions, to the jurisdiction of the courts (1) of the Registered Name Holder's domicile and (2) where Registrar is located.3.7.7.11 The Registered Name Holdershall agree that its registration of the Registered Name shall be subject to suspension, cancellation, or transfer pursuant to any Specification or Policy, or pursuant to anyregistrar or registry procedure not inconsistent with any Specification or Policy, (1) to correct mistakes by Registrar or the RegistryOperator in registering the name or (2) for the resolution of disputes concerning the Registered Name.3.7.7.12 The Registered Name Holdershall indemnify and holdharmless the Registry Operator and its directors, officers, employees, and agents from and against any and all claims, damages, liabilities, costs, and expenses (including reasonable legal fees and expenses)arising out of or related to the Registered Name Holder's domain name registration.3.7.8 Registrarshall comply with the obligations specified in the WhoisAccuracy Program Specification. In addition, notwithstanding anything inthe Whois Accuracy Program Specification to the contrary, Registrarshallabide by any Consensus Policy requiring reasonable and commerciallypracticable (a) verification, at the time of registration, of contact information associated with a Registered Name sponsored by Registrar or (b) periodic re- verification of such information. Registrarshall, upon notification by anyperson of an inaccuracy in the contact information associated with aRegistered Name sponsored by Registrar, take reasonable steps to investigate that claimed inaccuracy. In the event Registrar learns of inaccurate contact information associated with a Registered Name it sponsors, it shall take reasonable steps to correct that inaccuracy.3.7.9 Registrarshall abide by any Consensus Policy prohibiting orrestricting warehousing of or speculation in domain names by registrars.3.7.10 Registrarshall publish on its website(s) and/or provide a link to the Registrants’ Benefits and Responsibilities Specification attached hereto and shall not take any action inconsistent with the corresponding provisions of this Agreement or applicable law. 3.7.11 Registrarshall make available a description of the customer service handling processes available to Registered Name Holders regardingRegistrar Services, including a description of the processes for submitting complaints and resolving disputes regarding the Registrar Services.3.7.12 Nothing in this Agreement prescribes or limits the amount Registrar may charge Registered Name Holders for registration of Registered Names.3.8 Domain-Name Dispute Resolution. During the Term of this Agreement,Registrarshall have in place a policy and procedures for resolution of disputesconcerning Registered Names. Until ICANN adopts an alternative Consensus Policy or other Specification or Policy with respect to the resolution of disputes concerning Registered Names, Registrarshall comply with the Uniform Domain Name DisputeResolution Policy (“UDRP”) identified on ICANN's website(www.icann.org/general/consensus-policies.htm),as maybe modified from time to time. Registrarshall also comply with the Uniform Rapid Suspension (“URS”)procedure or its replacement, as well as with any other applicable disputeresolution procedure as required by a Registry Operator for which Registrar is providing Registrar Services.3.9 Accreditation Fees. As a condition of Accreditation, Registrarshall pay Accreditation fees to ICANN. These fees consist of yearly and variable fees.3.9.1 Registrarshall pay ICANN a yearly Accreditation fee in an amount established by the ICANN Board of Directors, in conformity with ICANN'sbylaws and articles of incorporation. This yearly Accreditation feeshall not exceed US$4,000. Payment of theyearly feeshall be due within thirty (30) days after invoice from ICANN, provided that Registrar may elect to pay the yearly fee in four (4) equal quarterly installments.3.9.2 Registrarshall pay the variable Accreditation fees established by the ICANN Board of Directors, in conformity with ICANN's bylaws and articles of incorporation, provided that in each case such fees are reasonably allocated among all registrars that contract with ICANN and that any such fees must be expressly approved by registrars accounting, in the aggregate, for payment of two-thirds of all registrar-level fees. Registrarshall pay such fees in a timely manner for so long as all material terms of this Agreement remain in fullforce and effect, and notwithstanding the pendency of any dispute between Registrar and ICANN.3.9.3 For any payments thirty (30) days or more overdue, Registrarshall pay interest on late payments at the rate of 1.5% per month or, if less, the maximum rate permitted by applicable law from later of the date of theinvoice or the date the invoice is sent pursuant to Section 7.6 of thisAgreement. On reasonable notice given by ICANN to Registrar, accountings submitted by Registrarshall be subject to verification by an audit of Registrar's books and records by an independent third-party designated by ICANN that shall preserve the confidentiality of such books and records(other than its findings as to the accuracy of, and any necessary corrections to,the accountings).3.9.4 The Accreditation fees due under this Agreement are exclusive of tax. All taxes, duties, fees and other governmental charges of any kind (including sales, turnover, services, use and value-added taxes) that are imposed by or under the authority of any government or any political subdivision thereofon the Accreditation fees for any services, software and/or hardware shall be borne by Registrar and shall not be considered apart of, a deduction from, or an offset against such Accreditation fees. All payments due to ICANN shall be made without any deduction or withholding on account of any tax, duty,charge, or penalty except as required by applicable law, in which case, thesum payable by Registrar from which such deduction or withholding is to be made shall be increased to the extent necessary to ensure that, after making such deduction or withholding, ICANN receives (free from any liability with respect thereof) a net sum equal to the sum it would have received but forsuch deduction or withholding being required.3.10 Insurance. Registrarshall maintain in force commercial general liabilityinsurance or similar liability insurance as specified by ICANN with policy limits of at least US$500,000 covering liabilities arising from Registrar's registrar businessduring the Term of this Agreement.3.11 Obligations of Registrars under common controlling interest. Registrarshall be in breach of this Agreement if:3.11.1 ICANN terminates an Affiliated Registrar's accreditation agreement with ICANN (an "Affiliate Termination");3.11.2 Affiliated Registrar has not initiated arbitration challenging ICANN's right to terminate the Affiliated Registrar's accreditation agreement under Section 5.8 of this Agreement, or has initiated such arbitration and has not prevailed;3.11.3 the Affiliate Termination was the result of misconduct that materially harmed consumers or the public interest;3.11.4 a second Affiliated Registrar has pursued, after the AffiliateTermination, the same course of conduct that resulted in the Affiliate Termination; and3.11.5 ICANN has provided Registrar with written notice that it intends to assert the provisions of this Section 3.11 with respect to Registrar, whichnoticeshall identify in reasonable detail the factual basis for such assertion, and Registrar has failed to cure the impugned conduct within fifteen (15) days of such notice.3.12 Obligations Related to Provision of Registrar Services by Third Parties.Registrar is responsible for the provision of Registrar Services for all RegisteredNames that Registrar sponsors being performed in compliance with this Agreement, regardless of whether the Registrar Services are provided by Registrar or a thirdparty, including a Reseller. Registrar must enter into written agreements with all of its Resellers that enable Registrar to comply with and perform all of its obligations under this Agreement. In addition, Registrar must ensure that:3.12.1 Its Resellers do not display the ICANN or ICANN-Accredited Registrar logo, or otherwise represent themselves as Accredited by ICANN, unless they have written permission from ICANN to do so.3.12.2 Any registration agreement used by resellershall include all registration agreement provisions and notices required bythe ICANN Registrar Accreditation Agreement and any ICANN Consensus Policies, and shall identify the sponsoring registrar or provide a means for identifying the sponsoring registrar, such as a link to the InterNIC Whois lookup service.3.12.3 Its Resellers identify the sponsoring registrar upon inquiry from the customer.3.12.4 Its Resellers comply with any ICANN-adopted Specification or Policy that establishes a program for accreditation of individuals or entities who provide proxy and privacy registration services (a “Proxy AccreditationProgram”). Among other features, the Proxy Accreditation Program may require that: (i) proxy and privacy registration services may only beprovided in respect of domain name registrations by individuals or entities Accredited by ICANN pursuant to such Proxy Accreditation Program; and (ii) Registrarshall prohibit Resellers from knowingly accepting registrationsfrom any provider of proxy and privacy registration services that is notAccredited by ICANN pursuant the Proxy Accreditation Program. Until such time as the Proxy Accreditation Program is established, Registrarshallrequire Resellers to comply with the Specification on Privacy and Proxy Registrations attached hereto.3.12.5 Its Resellers'customers are provided with a link to an ICANN webpage detailing registrant educational information, as detailed in subsection 3.16 below.3.12.6 In the event Registrar learns that a Reseller is causing Registrar to be in breach of any of the provisions of this Agreement, Registrarshall takereasonable steps to enforce its agreement with such Reseller so as to cure and prevent further instances of non-compliance. 3.12.7 Its Resellers shall publish on their website(s) and/or provide a link to the Registrants’ Benefits and Responsibilities Specification attached hereto and shall not take any action inconsistent with the corresponding provisions of this Agreement or applicable law.Registrarshall use commercially reasonable efforts to enforce compliance with the provisions of the agreement between Registrar and any Reseller that relate to the provisions of Registrar Services. 3.13 Registrar Training. Registrar's primary contact as identified in Subsection 7.6 below or designee (so long as the designee is employed by Registrar or an Affiliated Registrar) shall complete a training course covering registrar obligations underICANN policies and agreements. The course will be provided by ICANN at no expense to Registrar, and shall be available in an online format.3.14 Obligations Related to Proxy and Privacy Services. Registrar agrees to comply with any ICANN-adopted Specification or Policy that establishes a ProxyAccreditation Program. Registrar also agrees to reasonably cooperate with ICANN in the development of such program. Until such time as the Proxy AccreditationProgram is established, Registrar agrees to comply with the Specification on Privacy and Proxy Registrations attached hereto.3.15 Registrar Self-Assessment and Audits. Registrarshall complete and deliver to ICANN on a schedule and in the form specified by ICANN from time to time inconsultation with registrars a Registrar self-assessment. Registrarshall complete and deliver to ICANN within twenty (20) days following the end of each calendar year, in a form specified by ICANN a certificate executed by the president, chiefexecutive officer, chief financial officer or chief operating officer (or theirequivalents) of Registrar certifying compliance with the terms and conditions of this Agreement. ICANN may from time to time (not to exceed twice per calendar year)conduct, or engage a third party to conduct on its behalf, contractual complianceaudits to assess compliance by Registrar with the terms and conditions of thisAgreement. Any audits pursuant to this Section 3.15 shall be tailored to achieve the purpose of assessing compliance, and ICANN will (a) give reasonable advance notice of any such audit, which noticeshall specify in reasonable detail the categories ofdocuments, data and other information requested by ICANN, and (b) usecommercially reasonable efforts to conduct such audit in such a manner as to notunreasonably disrupt the operations of Registrar. As part of such audit and uponrequest by ICANN, Registrarshall timely provide all responsive documents, data and any other information necessary to demonstrate Registrar’s compliance with thisAgreement. Upon no less than ten (10) days notice (unless otherwise agreed to by Registrar), ICANN may, as part of any contractual compliance audit, conduct site visits during regular business hours to assess compliance by Registrar with theterms and conditions of this Agreement. ICANN shall not disclose Registrarconfidential information gathered through such audits except as required byapplicable law, legal proceedings, or as expressly permitted by any Specification or Policy (including ICANN’s Documentary Information Disclosure Policy, as such policy maybe amended from time to time); provided, however, that, except as required by applicable law or legal proceedings, ICANN shall not release anyinformation that Registrar has marked as, or has otherwise designated in writing toICANN as, a “confidential trade secret,” “confidential commercial information” or “confidential financial information” of Registrar. If any applicable law, legalproceeding or Specification or Policy permits such disclosure, ICANN will provide Registrar no less than fifteen (15) days notice of its intent to disclose suchinformation, unless such notice is prohibited by law or legal proceeding. Such noticeshall include to whom and in what manner ICANN plans to disclose such information.3.16 Link to Registrant Educational Information. ICANN has published aneducational webpage summarizing the terms of the Registrar AccreditationAgreement and related Consensus Policies (as of the date of this Agreement, located at:http://www.icann.org/en/registrars/registrant-rights-responsibilities-en.htm). Registrarshall provide a link to such webpage on any website it may operate fordomain name registration or renewal clearly displayed to its Registered NameHolders at least as clearly as its links to policies or notifications required to be displayed under ICANN Consensus Policies. ICANN may, in consultation with registrars, update the content and/or URL for this website.3.17 Registrar Contact, Business Organization and Officer Information. Registrar shall provide to ICANN and maintain accurate and current information as specified in the Registrar Information Specification to this Agreement. In addition, Registrar shall publish on each website through which Registrar provides or offers Registrar Services the information specified as requiring such publication in the RegistrarInformation Specification. Registrarshall notify ICANN within five (5) days of any changes to such information and update Registrar’s website(s) within twenty (20) days of any such changes.3.18 Registrar’s Abuse Contact and Duty to Investigate Reports of Abuse.3.18.1 Registrarshall maintain an abuse contact to receive reports of abuse involving Registered Names sponsored by Registrar, including reports ofIllegal Activity. Registrarshall publish an email address to receive suchreports on the homepage of Registrar's website (or in another standardized place that maybe designated by ICANN from time to time). Registrarshalltake reasonable and prompt steps to investigate and respond appropriately to any reports of abuse.3.18.2 Registrarshall establish and maintain a dedicated abuse point ofcontact, including a dedicated email address and telephone number that is monitored 24 hours a day, seven days a week, to receive reports of Illegal Activity by law enforcement, consumer protection, quasi-governmental or other similar authorities designated from time to time by the national or territorial government of the jurisdiction in which the Registrar isestablished or maintains a physical office. Well-founded reports of IllegalActivity submitted to these contacts must be reviewed within 24 hours by an individual who is empowered by Registrar to take necessary and appropriateactions in response to the report. In responding to any such reports, Registrar will not be required to take any action in contravention of applicable law.3.18.3 Registrarshall publish on its website a description of its procedures for the receipt, handling, and tracking of abuse reports. Registrarshalldocument its receipt of and response to all such reports. Registrarshallmaintain the records related to such reports for the shorter of two (2) years or the longest period permitted by applicable law, and during such period, shall provide such records to ICANN upon reasonable notice.3.19 Additional Technical Specifications to Implement IPV6, DNSSEC andIDNs. Registrarshall comply with the Additional Registrar Operations Specificationattached hereto.3.20 Notice of Bankruptcy, Convictions and Security Breaches. Registrar will giveICANN notice within seven (7) days of (i) the commencement of any of theproceedings referenced in Section 5.5.8. (ii) the occurrence of any of the matters specified in Section 5.5.2 or Section 5.5.3 or (iii) any unauthorized access to or disclosure of registrant account information or registration data. The noticerequired pursuant to Subsection (iii) shall include a detailed description of the type of unauthorized access, how it occurred, the number of registrants affected, and any action taken by Registrar in response.3.21 Obligations of Registrars Affiliated with Registry Operators. In the eventRegistrar is Affiliated with any Registry Operator or back-end registry operator (an “Affiliated Relationship”) during the Term of this Agreement, Registrarshall comply with all ICANN Specifications and Policies that maybe developed from time to time with respect to such Affiliated Relationships, and will notify ICANN within thirty(30) days of the occurrence of the event that created the Affiliate relationship (e.g., the closing of any merger, acquisition or other transaction, or the execution of any agreement, in each case, giving rise to such Affiliated Relationship).3.22 Cooperation with Emergency Registry Service Providers. In the event thatICANN transitions the operation of a registry for agTLD in which Registrar sponsors Registered Names to an emergency registry service provider, Registrarshallcooperate in all reasonable respects with such emergency registry service provider,including by entering into a registry-registrar agreement with such providernecessary to effect the transition and by providing all Registered Name Holder data reasonably requested by such emergency operator for the purpose of facilitating an efficient transition of the registry for the gTLD. PROCEDURES FOR ESTABLISHMENT OR REVISION OF SPECIFICATIONS AND POLICIES.4.1 Compliance with Consensus Policies and Temporary Policies. During the Term of this Agreement, Registrarshall comply with and implement all Consensus Policies and Temporary Policies in existence as of the Effective Date found athttp://www.icann.org/general/consensus-policies.htm,and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Policies and Temporary Policies are adopted in accordance with theprocedures and relate to those topics and subject to those limitations set forth in the Consensus Policies and Temporary Policies Specification to this Agreement. TERM, TERMINATION AND DISPUTE RESOLUTION.5.1 Term of Agreement. This Agreementshall be effective on the Effective Date and shall have an initial term running until the Expiration Date, unless soonerterminated.5.2 Renewal. This Agreement and Registrar’s Accreditation will be renewed for successive periods of five (5) years upon the Expiration Date and the expiration of each successive five-year term thereafter under the terms and conditions of thisAgreement, unless:5.2.1 at the time of such renewal, Registrar no longer meets the ICANN registrar Accreditation criteria then in effect;5.2.2 Registrar is not in compliance with its obligations under thisAgreement at the time of the Expiration Date or at the expiration of any successive five (5) year term thereafter;5.2.3 Registrar has been given notice by ICANN of three (3) or morematerial breaches of this Agreement within the two (2) years preceding the Expiration Date or the date of expiration of any successive five (5) year termthereafter; or5.2.4 this Agreement has terminated prior to the Expiration Date or the expiration date of any successive five (5) year term thereafter.In the event Registrar intendstorenew this Agreement pursuant to this Section 5.2, Registrarshall provide ICANN written notice thereof during the period that is nomore than ninety (90) days and no less than sixty (60) days prior to the Expiration Date and each successive five (5) year term thereafter. The provision of such notice shall not be a condition to renewal hereunder. Pursuant to its customary practices (as maybe modified by ICANN), ICANN will provide notice to Registrar of theExpiration Date and the date of expiration of any subsequent term hereunder. 5.3 Right to Substitute Updated Agreement. In the event that, during the Term of this Agreement, ICANN adopts a revised form Registrar accreditation agreement(the “Updated RAA”), Registrar (provided it has not received (i) a notice of breach that it has not cured or (ii) a notice of termination or suspension of this Agreement under this Section 5) may elect, by giving ICANN written notice, to enter into theUpdated RAA. In the event of such election, Registrar and ICANN shall as soon as practicable enter into the Updated RAA for the term specified in the Updated RAA, and this Agreement will be deemed terminated.5.4 Termination of Agreement by Registrar. This Agreement maybe terminated before its expiration by Registrar by giving ICANN thirty (30) days written notice. Upon such termination by Registrar, Registrarshall not be entitled to any refund of fees paid to ICANN pursuant to this Agreement.5.5 Termination of Agreement by ICANN. This Agreement maybe terminated before its expiration by ICANN in any of the following circumstances:5.5.1 There was a material misrepresentation, material inaccuracy, ormaterially misleading statement in Registrar's application for Accreditation or renewal of Accreditation or any material accompanying the application.5.5.2 Registrar:5.5.2.1 is convicted by a court of competent jurisdiction of a felony or other serious offense related to financial activities, or is judged by acourt of competent jurisdiction to have:5.5.2.1.1 committed fraud,5.5.2.1.2 committed a breach of fiduciary duty, or5.5.2.1.3 with actual knowledge (or through gross negligence) permitted Illegal Activity in the registration or use of domain names or in the provision to Registrar by any Registered Name Holder of inaccurate Whois information; or5.5.2.1.4 failed to comply with the terms of an order issued by a court of competent jurisdiction relating to the use of domain names sponsored by the Registrar;or is the subject of a judicial determination that ICANN reasonably deems as the substantive equivalent of any of the foregoing; or5.5.2.2 is disciplined by the government of its domicile for conduct involving dishonesty or misuse of funds of others; or 5.5.2.3 is the subject of anon-interlocutory order issued by a court or arbitral tribunal, in each case of competent jurisdiction, finding that Registrar has, directly or through an Affiliate, committed a specificviolation(s) of applicable national law or governmental regulation relating to cybersquatting or its equivalent; or5.5.2.4 is found by ICANN, based on its review of the findings ofarbitral tribunals, to have been engaged, either directly or through its Affiliate, in a pattern and practice of trafficking in or use of domainnames identical or confusingly similar to a trademark or service mark of a third party in which the Registered Name Holder has no rights or legitimate interest, which trademarks have been registered and arebeing used in bad faith.5.5.3 Registrar knowingly employs any officer that is convicted of amisdemeanor related to financial activities or of any felony, or is judged by acourt of competent jurisdiction to have committed fraud or breach offiduciary duty, or is the subject of a judicial determination that ICANNreasonably deems as the substantive equivalent of any of the foregoing and such officer is not terminated within thirty (30) days of Registrar’sknowledge of the foregoing; or any member of Registrar’s board of directors or similar governing body is convicted of a misdemeanor related to financial activities or of any felony, or is judged by a court of competent jurisdiction to have committed fraud or breach of fiduciary duty, or is the subject of ajudicial determination that ICANN reasonably deems as the substantiveequivalent of any of the foregoing and such member is not removed from Registrar’s board of directors or similar governing body within thirty (30) days of Registrar’s knowledge of the foregoing.5.5.4 Registrar fails to cure any breach of this Agreement within twenty- one (21) days after ICANN gives Registrar notice of the breach.5.5.5 Registrar fails to comply with a ruling granting specific performance under Sections 5.7 or 7.1.5.5.6 Registrar has been in fundamental and material breach of itsobligations under this Agreement at least three (3) times within a twelve (12) month period.5.5.7 Registrar continues acting in a manner that ICANN has reasonably determined endangers the stability or operational integrity ofthe Internet after receiving three (3) days notice of that determination.5.5.8 (i) Registrar makes an assignment for the benefit of creditors or similar act; (ii) attachment, garnishmentor similar proceedings arecommenced against Registrar, which proceedings area material threat to Registrar’s ability to provide Registrar Services for gTLDs, and are not dismissed within sixty (60) days of their commencement; (iii) atrustee,receiver, liquidator or equivalent is appointed in place of Registrar ormaintains control over any of Registrar’s property; (iv) execution is leviedupon any property of Registrar, (v) proceedings are instituted by or against Registrar under any bankruptcy, insolvency, reorganization or other lawsrelating to the relief of debtors and such proceedings are not dismissedwithin thirty (30) days of their commencement, or (vi) Registrar files forprotection under the United States Bankruptcy Code, 11 U.S.C. Section 101 etseq., or a foreign equivalent or liquidates, dissolves or otherwise discontinues its operations.5.6 Termination Procedures. This Agreement maybe terminated in circumstances described in Subsections 5.5.1 though 5.5.6 above only upon fifteen (15) dayswritten notice to Registrar (in the case of Subsection 5.5.4 occurring afterRegistrar's failure to cure), with Registrar being given an opportunity during that time to initiate arbitration under Subsection 5.8 to determine the appropriatenessof termination under this Agreement. This Agreement maybe terminatedimmediately upon notice to Registrar in circumstances described in Subsections 5.5.7 and 5.5.8.5.7 Suspension.5.7.1 Upon the occurrence of any of the circumstances set forth in Section 5.5, ICANN may, in ICANN’s sole discretion, upon delivery of a noticepursuant to Subsection 5.7.2, elect to suspend Registrar’s ability to create orsponsor new Registered Names or initiate inbound transfers of Registered Names for any or allgTLDs for a period of up to a twelve (12) monthsfollowing the effectiveness of such suspension. Suspension of a Registrar does not preclude ICANN’s ability to issue a notice of termination inaccordance with the notice requirements of Section 5.6.5.7.2 Any suspension under Subsections 5.7.1 will be effective upon fifteen(15) days written notice to Registrar, with Registrar being given anopportunity during that time to initiate arbitration under Subsection 5.8 to determine the appropriateness of suspension under this Agreement.5.7.3 Upon suspension, Registrarshall notify users, by posting a prominent notice on its website, that it is unable to create or sponsor new gTLD domain name registrations or initiate inbound transfers of Registered Names.Registrar’s noticeshall include a link to the notice of suspension fromICANN.5.7.4 If Registrar acts in a manner that ICANN reasonably determinesendangers the stability or operational integrity of the Internet and uponnotice does not immediately cure, ICANN may suspend this Agreement for five (5) working dayspending ICANN's application for more extendedspecific performance or injunctive relief under Subsection 7.1. Suspension of the Agreement under this Subsection may, at ICANN’s sole discretion, preclude the Registrar from (i) providing Registration Services for gTLDs delegated by ICANN on or after the date of delivery of such notice toRegistrar and (ii) creating or sponsoring new Registered Names or initiating inbound transfers of Registered Names for any gTLDs. Registrar must alsopost the statement specified in Subsection 5.7.3.5.8 Resolution of Disputes Under this Agreement. Subject to the limitations setforth in Section 6 and Section 7.4, disputes arising under or in connection with this Agreement, including (1) disputes arising from ICANN's failure to renew Registrar's Accreditation and (2) requests for specific performance, shall be resolved in a court of competent jurisdiction or, at the election of either party, by an arbitrationconducted as provided in this Subsection 5.8 pursuant to the InternationalArbitration Rules of the American Arbitration Association ("AAA"). The arbitration shall be conducted in English and shall occur in Los Angeles County, California, USA. Except asset forth in Section 7.4.5, there shall be one (1) arbitrator agreed by theparties from a list of AAA arbitrators, or if parties do not agree on an arbitratorwithin fifteen (15) days of the AAA request that the parties designate an arbitrator, the AAA shall choose and appoint an arbitrator, paying due regard to the arbitrator’s knowledge of the DNS. The parties shall bear the costs of the arbitration in equalshares, subject to the right of the arbitrator to reallocate the costs in their award as provided in the AAA rules. The parties shall bear their own attorneys'fees inconnection with the arbitration, and the arbitrator may not reallocate the attorneys' fees in conjunction with their award. The arbitratorshall render its decision within ninety (90) days of the conclusion of the arbitration hearing. In the event Registrar initiates arbitration to contest the appropriateness of termination of this Agreement by ICANN pursuant to Section 5.5 or suspension of Registrar by ICANN pursuant to Section 5.7.1, Registrar may at the sametime request that the arbitration panel stay the termination or suspension until the arbitration decision is rendered. Thearbitration panelshall order a stay: (i) upon showing by Registrar that continuedoperations would not be harmful to consumers or the public interest, or (ii) uponappointment by the arbitration panel of a qualified third party to manage theoperations of the Registrar until the arbitration decision is rendered. In furtherance of sub-clause (ii) above, the arbitration panel is hereby granted all necessaryauthority to appoint a qualified third-party to manage the operations of theRegistrar upon the Registrar’s request and if the panel deems it appropriate. Inselecting the third-party manager, the arbitration panelshall take intoconsideration, but shall not be bound by, any expressed preferences of Registrar. Any order granting a request for a stay must be issued within fourteen (14) days after the filing of the arbitration. If an order granting a request for a stay is not issued within fourteen (14) days, ICANN has the right to proceed with thetermination of this Agreement pursuant to Section 5.5 or suspension of theRegistrar pursuant to Section 5.7.1. In the event Registrar initiates arbitration to contest an Independent Review Panel's decision under Subsection 4.3.3 sustaining the ICANN Board of Director's determination that a specification or policy issupported by consensus, Registrar may at the sametime request that the arbitration panel stay the requirement that it comply with the policy until the arbitrationdecision is rendered, and that requestshall have the effect of staying therequirement until the decision or until the arbitration panel has granted an ICANN request for lifting of the stay. In all litigation involving ICANN concerning thisAgreement (whether in a case where arbitration has not been elected or to enforce an arbitration award), jurisdiction and exclusive venue for such litigation shall be in a court located in Los Angeles, California, USA; however, the parties shall also have the right to enforce a judgment of such a court in any court of competentjurisdiction. For the purpose of aiding the arbitration and/or preserving the rights of the parties during the pendency of an arbitration, the parties shall have the right to seek temporary or preliminary injunctive relief from the arbitration panel or in a court located in Los Angeles, California, USA, which shall not be a waiver of thisarbitration agreement.5.9 Limitations on Monetary Remedies for Violations of this Agreement. ICANN's aggregate monetary liability for violations of this Agreementshall not exceed anamount equal to the Accreditation fees paid by Registrar to ICANN under Subsection 3.9 of this Agreement during the preceding twelve-month period. Registrar'smonetary liability to ICANN for violations of this Agreementshall be limited toAccreditation fees owing to ICANN under this Agreement and, except in the case of a good faith disagreement concerning the interpretation of this agreement,reasonable payment to ICANN for the reasonable and direct costs including attorney fees, staff time, and other related expenses associated with legitimate efforts toenforce Registrar compliance with this agreement and costs incurred by ICANN torespond to or mitigate the negative consequences of such behavior for RegisteredName Holders and the Internet community. In the event of repeated willful material breaches of the agreement, Registrarshall be liable for sanctions of up to five (5)times ICANN's enforcement costs, but otherwise in no eventshall either party beliable for special, indirect, incidental, punitive, exemplary, or consequential damages for any violation of this Agreement. AMENDMENT AND WAIVER.6.1 If the ICANN Board of Directors determines that an amendment to this Agreement (including to the Specifications referred to herein, unless suchSpecifications expressly do not permit amendment thereto) and all other registrar agreements between ICANN and the Applicable Registrars (the “ApplicableRegistrar Agreements”) is desirable (each, a “Special Amendment”), ICANN mayadopt a Special Amendment pursuant to the requirements of and process set forth in this Section 6; provided that a Special Amendment may not be a RestrictedAmendment.6.2 Prior to submitting a Special Amendment for Registrar Approval, ICANN shall first consult in good faith with the Working Group regarding the form and substance of such Special Amendment. The duration of such consultationshall be reasonablydetermined by ICANN based on the substance of the Special Amendment. Following such consultation, ICANN may propose the adoption of a Special Amendment bypublicly posting such amendment on its website for no less than thirty (30) calendar days (the “Posting Period”) and providing notice of such proposed amendment tothe Applicable Registrars in accordance with Section 7.6. ICANN will consider the public comments submitted on a Special Amendment during the Posting Period (including comments submitted by the Applicable Registrars).6.3 If, within one hundred eighty (180) calendar days following the expiration of the Posting Period (the “Approval Period”), the ICANN Board of Directors approves a Special Amendment (which maybe in a form different than submitted for publiccomment, but must address the subject matter of the Special Amendment posted for public comment, as modified to reflect and/or address input from the WorkingGroup and public comments), ICANN shall provide notice of, and submit, suchSpecial Amendment for approval or disapproval by the Applicable Registrars. If,during the sixty (60) calendar day period following the date ICANN provides such notice to the Applicable Registrars, such Special Amendment receives RegistrarApproval, such Special Amendmentshall be deemed approved (an “ApprovedAmendment”) by the Applicable Registrars, and shall be effective and deemed anamendment to this Agreement on the date that is sixty (60) calendar days following the date ICANN provided notice of the approval of such Approved Amendment toRegistrar (the “Amendment Effective Date”). In the event that a Special Amendment does not receive Registrar Approval, the Special Amendmentshall be deemed notapproved by the Applicable Registrars (a “Rejected Amendment”). A Rejected Amendment will have no effect on the terms and conditions of this Agreement, except asset forth below.6.4 If the ICANN Board of Directors reasonably determines that a RejectedAmendment falls within the subject matter categories set forth in Section 1.2 of the Consensus Policies and Temporary Policies Specification, the ICANN Board ofDirectors may adopt a resolution (the date such resolution is adopted is referred to herein as the “Resolution Adoption Date”) requesting an Issue Report (as such term is defined in ICANN’s Bylaws) by the Generic Names Supporting Organization (the “GNSO”) regarding the substance of such Rejected Amendment. The policydevelopment process undertaken by the GNSO pursuant to such requested Issue Report is referred to herein as a “PDP.” If such PDP results in a Final Reportsupported by a GNSO Supermajority (as defined in ICANN’s Bylaws) that either (i)recommends adoption of the Rejected Amendment as Consensus Policy or (ii)recommends against adoption of the Rejected Amendment as Consensus Policy, and, in the case of (i) above, the Board adopts such Consensus Policy, Registrarshallcomply with its obligations pursuant to Section 4 of this Agreement. In either case,ICANN will abandon the Rejected Amendment and it will have no effect on the terms and conditions of this Agreement. Notwithstanding the foregoing provisions of this Section 6.4, the ICANN Board of Directors shall not be required to initiate a PDP with respect to aRejected Amendment if, at anytime in the twelve (12) month periodpreceding the submission of such Rejected Amendment for Registrar Approval pursuant to Section 6.3, the subject matter of such Rejected Amendment was the subject of a concluded or otherwise abandoned or terminated PDP that did not result in a GNSO Supermajority recommendation.6.5 If (i) a Rejected Amendment does not fall within the subject matter categories set forth in Section 1.2 of the Consensus Policies and Temporary PoliciesSpecification , (ii) the subject matter of a Rejected Amendment was, at anytime in the twelve (12) month period preceding the submission of such RejectedAmendment for Registrar Approval pursuant to Section 6.3, the subject of aconcluded or otherwise abandoned or terminated PDP that did not result in a GNSO Supermajority recommendation, or (iii) a PDP does not result in a Final Reportsupported by a GNSO Supermajority that either (a) recommends adoption of the Rejected Amendment as Consensus Policy or (b) recommends against adoption ofthe Rejected Amendment as Consensus Policy (or such PDP has otherwise been abandoned or terminated for any reason), then, in any such case, such Rejected Amendment may still be adopted and become effective in the manner described below. In order for the Rejected Amendment to be adopted, the followingrequirements must be satisfied:6.5.1 the subject matter of the Rejected Amendment must be within the scope of ICANN’s mission and consistent with a balanced application of its core values (as described in ICANN’s Bylaws);6.5.2 the Rejected Amendment must be justified by a Substantial andCompelling Reason in the Public Interest, must be likely to promote suchinterest, taking into account competing public and private interests that arelikely to be affected by the Rejected Amendment, and must be narrowly tailored and no broader than reasonably necessary to address suchSubstantial and Compelling Reason in the Public Interest;6.5.3 to the extent the Rejected Amendment prohibits or requires conduct or activities, imposes material costs on the Applicable Registrars, and/ormaterially reduces public access to domain name services, the Rejected Amendment must be the least restrictive means reasonably available to address the Substantial and Compelling Reason in the Public Interest;6.5.4 the ICANN Board of Directors must submit the Rejected Amendment, along with awritten explanation of the reasoning related to its determination that the Rejected Amendment meets the requirements set out in subclauses(i) through (iii) above, for public comment for a period of no less than thirty(30) calendar days; and6.5.5 following such public comment period, the ICANN Board of Directors must (i) engage in consultation (or direct ICANN management to engage in consultation) with the Working Group, subject matter experts, members of the GNSO, relevant advisory committees and other interested stakeholders with respect to such Rejected Amendment for a period of no less than sixty (60) calendar days; and (ii) following such consultation, reapprove theRejected Amendment (which maybe in a form different than submitted forRegistrar Approval, but must address the subject matter of the RejectedAmendment, as modified to reflect and/or address input from the WorkingGroup and public comments) by the affirmative vote of at least two-thirds of the members of the ICANN Board of Directors eligible to vote on such matter, taking into account any ICANN policy affecting such eligibility, includingICANN’s Conflict of Interest Policy (a “Board Amendment”).Such Board Amendmentshall, subject to Section 6.6, be deemed an ApprovedAmendment, and shall be effective and deemed an amendment to this Agreement on the date that is sixty (60) calendar days following the date ICANN provided notice of the approval of such Board Amendment to Registrar (which effective dateshall bedeemed the Amendment Effective Date hereunder). Notwithstanding the foregoing,a Board Amendment may not amend the registrar fees charged by ICANN hereunder, or amend this Section 6.6.6 Notwithstanding the provisions of Section 6.5, a Board Amendmentshall not be deemed an Approved Amendment if, during the thirty (30) calendar day period following the approval by the ICANN Board of Directors of the Board Amendment,the Working Group, on the behalf of the Applicable Registrars, submits to the ICANNBoard of Directors an alternative to the Board Amendment (an “Alternative Amendment”) that meets the following requirements:6.6.1 sets forth the precise text proposed by the Working Group to amend this Agreement in lieu of the Board Amendment;6.6.2 addresses the Substantial and Compelling Reason in the PublicInterest identified by the ICANN Board of Directors as the justification for the Board Amendment; and6.6.3 compared to the Board Amendment is: (a) more narrowly tailored to address such Substantial and Compelling Reason in the Public Interest, and(b) to the extent the Alternative Amendment prohibits or requires conductoractivities, imposes material costs on Affected Registrars, or materially reduces access to domain name services, is a less restrictive means to address the Substantial and Compelling Reason in the Public Interest.Any proposed amendment that does not meet the requirements of subclauses 6.6.1 through 6.6.3 in the immediately preceding sentenceshall not be considered anAlternative Amendment hereunder and therefore shall not supersede or delay the effectiveness of the Board Amendment. If, following the submission of theAlternative Amendment to the ICANN Board of Directors, the AlternativeAmendment receives Registrar Approval, the Alternative Amendmentshallsupersede the Board Amendment and shall be deemed an Approved Amendment hereunder (and shall be effective and deemed an amendment to this Agreement on the date that is sixty (60) calendar days following the date ICANN provided notice of the approval of such Alternative Amendment to Registrar, which effective dateshall deemed the Amendment Effective Date hereunder), unless, within a period of sixty(60) calendar days following the date that the Working Group notifies the ICANNBoard of Directors of Registrar Approval of such Alternative Amendment (duringwhich time ICANN shall engage with the Working Group with respect to theAlternative Amendment), the ICANN Board of Directors by the affirmative vote of at least two-thirds of the members of the ICANN Board of Directors eligible to vote on such matter, taking into account any ICANN policy affecting such eligibility,including ICANN’s Conflict of Interest Policy, rejects the Alternative Amendment. If (A) the Alternative Amendment does not receive Registrar Approval within thirty(30) days of submission of such Alternative Amendment to the Applicable Registrars (and the Working Groupshall notify ICANN of the date of such submission), or (B)the ICANN Board of Directors rejects the Alternative Amendment by such two-thirds vote, the Board Amendment (and not the Alternative Amendment) shall be effective and deemed an amendment to this Agreement on the date that is sixty (60) calendar days following the date ICANN provided notice to Registrar (which effective dateshall deemed the Amendment Effective Date hereunder). If the ICANN Board ofDirectors rejects an Alternative Amendment, the boardshall publish a writtenrationale setting forth its analysis of the criteria set forth in Sections 6.6.1 through 6.6.3. The ability of the ICANN Board of Directors to reject an AlternativeAmendment hereunder does not relieve the Board of the obligation to ensure that any Board Amendment meets the criteria set forth in Section 6.5.1 through 6.5.5.6.7 In the event that Registrar believes an Approved Amendment does not meet the substantive requirements set out in this Section 6 or has been adopted incontravention of any of the procedural provisions of this Section 6,Registrar may challenge the adoption of such Special Amendment pursuant to the disputeresolution provisions set forth in Section 5.8, except that such arbitration shall beconducted by a three-person arbitration panel. Any such challenge must be broughtwithin sixty (60) calendar days following the date ICANN provided notice toRegistrar of the Approved Amendment, and ICANN may consolidate all challenges brought by registrars (including Registrar) into asingle proceeding. The Approved Amendment will be deemed not to have amended this Agreement during thependency of the dispute resolution process.6.8 Registrar may apply in writing to ICANN for an exemption from the Approved Amendment (each such request submitted by Registrar hereunder, an “Exemption Request”) during the thirty (30) calendar day period following the date ICANNprovided notice to Registrar of such Approved Amendment.6.8.1 Each Exemption Request will set forth the basis for such request and provide detailed support for an exemption from the Approved Amendment. An Exemption Request may also include a detailed description and support for any alternatives to, or a variation of, the Approved Amendment proposed by such Registrar. 6.8.2 An Exemption Request may only be granted upon a clear and convincing showing by Registrar that compliance with the ApprovedAmendment conflicts with applicable laws or would have a material adverse effect on the long-term financial condition or results of operations ofRegistrar. No Exemption Request will be granted if ICANN determines, in its reasonable discretion, that granting such Exemption Request would bematerially harmful to registrants or result in the denial of a direct benefit to registrants.6.8.3 Within ninety (90) calendar days of ICANN’s receipt of an Exemption Request, ICANN shall either approve (which approval maybe conditioned or consist of alternatives to or a variation of the Approved Amendment) or denythe Exemption Request in writing, during which time the Approved Amendment will not amend this Agreement.6.8.4 If the Exemption Request is approved by ICANN, the ApprovedAmendment will not amend this Agreement; provided, that any conditions, alternatives or variations of the Approved Amendment required by ICANN shall be effective and, to the extent applicable, will amend this Agreement as of the Amendment Effective Date. If such Exemption Request is denied byICANN, the Approved Amendment will amend this Agreement as of the Amendment Effective Date (or, if such date has passed, such Approved Amendmentshall be deemed effective immediately on the date of such denial), provided that Registrar may, within thirty (30) calendar daysfollowing receipt of ICANN’s determination, appeal ICANN’s decision to deny the Exemption Request pursuant to the dispute resolution procedures setforth in Section 5.8.6.8.5 The Approved Amendment will be deemed not to have amended this Agreement during the pendency of the dispute resolution process. Foravoidance of doubt, only Exemption Requests submitted by Registrar that are approved by ICANN pursuant to this Article 6 or through an arbitrationdecision pursuant to Section 5.8 shall exempt Registrar from any Approved Amendment, and no Exemption Request granted to any other ApplicableRegistrar (whether by ICANN or through arbitration), shall have any effect under this Agreement or exempt Registrar from any Approved Amendment.6.9 Except asset forth in Section 4, Subsection 5.3, this Section 6, Section 7.4 and as otherwise set forth in this Agreement and the Specifications hereto, noamendment, supplement or modification of this Agreement or any provision hereof shall be binding unless executed in writing by both parties, and nothing in thisSection 6 or Section 7.4 shall restrict ICANN and Registrar from entering intobilateral amendments and modifications to this Agreement negotiated solelybetween the two parties. No waiver of any provision of this Agreementshall bebinding unless evidenced by a writing signed by the party waiving compliance with such provision. No waiver of any of the provisions of this Agreement or failure to enforce any of the provisions hereof shall be deemed or shall constitute a waiver of any other provision hereof, nor shall any such waiver constitute a continuing waiver unless otherwise expressly provided. For the avoidance of doubt, nothing in thisSection 6 or Section 7.4 shall be deemed to limit Registrar’s obligation to comply with Section 4.6.10 Notwithstanding anything in this Section 6 to the contrary, (a) if Registrar provides evidence to ICANN’s reasonable satisfaction that the ApprovedAmendment would materially increase the cost of providing Registrar Services, then ICANN will allow up to one-hundred eighty (180) calendar days for the ApprovedAmendment to become effective with respect to Registrar, and (b) no Approved Amendment adopted pursuant to Section 6 shall become effective with respect to Registrar if Registrar provides ICANN with an irrevocable notice of termination pursuant to Section 5.4. MISCELLANEOUS PROVISIONS.7.1 Specific Performance. While this Agreement is in effect, either party may seek specific performance of any provision of this Agreement in the manner provided in Section 5.8, provided the party seeking such performance is not in material breach of its obligations.7.2 Handling by ICANN of Registrar-Supplied Data. Before receiving any Personal Data from Registrar, ICANN shall specify to Registrar in writing the purposes for and conditions under which ICANN intends to use the Personal Data. ICANN may fromtime to time provide Registrar with a revised specification of such purposes andconditions, which specificationshall become effective no fewer than thirty (30) days after it is provided to Registrar. ICANN shall not use Personal Data provided byRegistrar for a purpose or under conditions inconsistent with the specification in effect when the Personal Data was provided. ICANN shall take reasonable steps to avoid uses of the Personal Data by third parties inconsistent with the specification.7.3 Assignment; Change of Ownership or Management.7.3.1 Except asset forth in this Section 7.3.1, either party may assign ortransfer this Agreement only with the prior written consent of the other party, which shall not be unreasonably withheld. If ICANN fails to expressly provide or withhold its consent to any requested assignment (an “AssignmentRequest”) of this Agreement by Registrar within thirty (30) calendar days ofICANN’s receipt of notice of such Assignment Request (or, if ICANN hasrequested additional information from Registrar in connection with its review of such request, sixty (60) calendar days of the receipt of all requested written information regarding such request) from Registrar, ICANN shall be deemedto have consented to such requested assignment. Notwithstanding theforegoing, (i) ICANN may assign this Agreement without the consent ofRegistrar upon approval of the ICANN Board of Directors in conjunction with areorganization, reconstitution or re-incorporation of ICANN upon suchassignee’s express assumption of the terms and conditions of this Agreement, (ii) Registrar may assign this Agreement without the consent of ICANN to awholly-owned subsidiary of Registrar upon such subsidiary’s expressassumption of the terms and conditions of this Agreement, and (iii) ICANNshall be deemed to have consented to an Assignment Request in which theassignee associated with such Assignment Request is a party to a RegistrarAccreditation Agreement with ICANN on the terms set forth in this Agreement (provided that such assignee is then in compliance with the terms andconditions of such Registrar Accreditation Agreement in all materialrespects), unless ICANN provides to Registrar a written objection to such Assignment Request within ten (10) calendar days of ICANN’s receipt of notice of such Assignment Request pursuant to this Section 7.3.1.7.3.2 To the extent that an entity acquires a Controlling interest inRegistrar’s stock, assets or business, Registrarshall provide ICANN noticewithin seven (7) days of such an acquisition. Such notificationshall include a statement that affirms that Registrar meets the Specification or Policy onAccreditation criteria then in effect, and is in compliance with its obligations under this Agreement. Within thirty (30) days of such notification, ICANN may request additional information from the Registrar establishing compliancewith this Agreement, in which case Registrar must supply the requested information within fifteen (15) days. Any disputes concerning Registrar's continued Accreditation shall be resolved pursuant to Section 5.8.7.4 Negotiation Process.7.4.1 If either the Chief Executive Officer of ICANN (“CEO”) or theChairperson of the Registrar Stakeholder Group (“Chair”) desires to discussany revision(s) to this Agreement, the CEO or Chair, as applicable, shallprovide written notice to the other person, which shall set forth in reasonable detail the proposed revisions to this Agreement (a “Negotiation Notice”).Notwithstanding the foregoing, neither the CEO nor the Chair may (i) propose revisions to this Agreement that modify any Consensus Policy then existing,(ii) propose revisions to this Agreement pursuant to this Section 7.4 on orbefore June 30, 2014, or (iii) propose revisions or submit a Negotiation Notice more than once during any twelve month period beginning on July 1, 2014.7.4.2 Following receipt of the Negotiation Notice by either the CEO or the Chair, ICANN and the Working Groupshall consult in good faith negotiations regarding the form and substance of the proposed revisions to thisAgreement, which shall be in the form of a proposed amendment to thisAgreement (the “Proposed Revisions”), for a period of at least ninety (90)calendar days (unless a resolution is earlier reached) and attempt to reach a mutually acceptable agreement relating to the Proposed Revisions (the“Discussion Period”). 7.4.3 If, following the conclusion of the Discussion Period, an agreement is reached on the Proposed Revisions, ICANN shall post the mutually agreedProposed Revisions on its website for public comment for no less than thirty (30) calendar days (the “Posting Period”) and provide notice of such revisions to all Applicable Registrars in accordance with Section 7.6. ICANN and theWorking Group will consider the public comments submitted on the Proposed Revisions during the Posting Period (including comments submitted by theApplicable Registrars). Following the conclusion of the Posting Period, the Proposed Revisions shall be submitted for Registrar Approval and approval by the ICANN Board of Directors. If such approvals are obtained, theProposed Revisions shall be deemed an Approved Amendment by theApplicable Registrars and ICANN, and shall be effective and deemed anamendment to this Agreement upon sixty (60) calendar days notice from ICANN to Registrar.7.4.4 If, following the conclusion of the Discussion Period, an agreement is not reached between ICANN and the Working Group on the ProposedRevisions, either the CEO or the Chair may provide the other person written notice (the “Mediation Notice”) requiring each party to attempt to resolve the disagreements related to the Proposed Revisions through impartial,facilitative (non-evaluative) mediation in accordance with the terms andconditions set forth below. In the event that a Mediation Notice is provided,ICANN and the Working Groupshall, within fifteen (15) calendar days thereof,simultaneously post the text of their desired version of the ProposedRevisions and a position paper with respect thereto on ICANN’swebsite.7.4.4.1 The mediation shall be conducted by a single mediatorselected by the parties. If the parties cannot agree on a mediatorwithin fifteen (15) calendar days following receipt by the CEO orChair, as applicable, of the Mediation Notice, the parties will promptly select a mutually acceptable mediation provider entity, which entity shall, as soon as practicable following such entity’sselection,designate a mediator, who is a licensed attorney with generalknowledge of contract law and, to the extent necessary to mediate the particular dispute, general knowledge of the domain name system.Any mediator must confirm in writing that he or she is not, and will not become during the term of the mediation, an employee, partner, executive officer, director, or security holder of ICANN or anApplicable Registrar. If such confirmation is not provided by theappointed mediator, then a replacement mediatorshall be appointed pursuant to this Section 7.4.4.1.7.4.4.2 The mediatorshall conduct the mediation in accordancewith the rules and procedures for facilitative mediation that he or she determines following consultation with the parties. The parties shall discuss the dispute in good faith and attempt, with the mediator’s assistance, to reach an amicable resolution of the dispute.7.4.4.3 Each party shall bear its own costs in the mediation. The parties shall share equally the fees and expenses of the mediator.7.4.4.4 If an agreement is reached during the mediation, ICANNshall post the mutually agreed Proposed Revisions on its website for the Posting Period and provide notice to all Applicable Registrars in accordance with Section 7.6. ICANN and the Working Group willconsider the public comments submitted on the agreed ProposedRevisions during the Posting Period (including comments submitted by the Applicable Registrars). Following the conclusion of the Posting Period, the Proposed Revisions shall be submitted for RegistrarApproval and approval by the ICANN Board of Directors. If suchapprovals are obtained, the Proposed Revisions shall be deemed an Approved Amendment by the Applicable Registrars and ICANN, and shall be effective and deemed an amendment to this Agreement upon sixty (60) days notice from ICANN to Registrar.7.4.4.5 If the parties have not resolved the dispute for any reason by the date that is ninety (90) calendar days following receipt by the CEO or Chair, as applicable, of the Mediation Notice, the mediationshall automatically terminate (unless extended by agreement of the parties). The mediatorshall deliver to the parties a definition of the issues that could be considered in future arbitration, if invoked.Those issues are subject to the limitations set forth in Section 7.4.5.2 below.7.4.5 If, following mediation, ICANN and the Working Group have notreached an agreement on the Proposed Revisions, either the CEO or the Chair may provide the other person written notice (an “Arbitration Notice”)requiring ICANN and the Applicable Registry Operators to resolve the dispute through binding arbitration in accordance with the arbitration provisions of Section 5.8, subject to the requirements and limitations of this Section 7.4.5.7.4.5.1 If an Arbitration Notice is sent, the mediator’sdefinition of issues, along with the Proposed Revisions (be those from ICANN,Registrars or both) shall be posted for public comment on ICANN’swebsite for a period of no less than thirty (30) calendar days. ICANNand the Working Group will consider the public comments submitted on the Proposed Revisions during the Posting Period (includingcomments submitted by the Applicable Registrars),and informationregarding such comments and considerationshall be provided to the a three (3) person arbitrator panel. Each party may modify is Proposed Revisions before and after the Posting Period. The arbitration proceeding may not commence prior to the closing of such publiccomment period, and ICANN may consolidate all challenges brought by registrars (including Registrar) into asingle proceeding. Except as set forth in this Section 7.4.5.1, the arbitration shall be conductedpursuant to Section 5.8.7.4.5.2 No dispute regarding the Proposed Revisions maybesubmitted for arbitration to the extent the subject matter of theProposed Revisions (i) relates to Consensus Policy, (ii) falls within the subject matter categories set forth in Section 1.2 of the ConsensusPolicies and Temporary Policies Specification , or (iii) seeks to amend any of the following provisions or Specifications of this Agreement:Sections 2, 4 and 6; subsections 3.1, 3.2, 3.3, 3.4, 3.5, 3.7, 3.8, 3.9, 3.14, 3.19, 3.21, 5.1, 5.2 or 5.3; and the Consensus Policies and Temporary Policies Specification, Data Retention Specification, WHOIS Accuracy Program Specification, Registration Data Directory Service (WHOIS) Specification or the Additional Registrar Operation Specification.7.4.5.3 The mediator will brief the arbitrator panel regardingICANN and the Working Group’s respective proposals relating to the Proposed Revisions.7.4.5.4 No amendment to this Agreement relating to the Proposed Revisions maybe submitted for arbitration by either the WorkingGroup or ICANN,unless, in the case of the Working Group, theproposed amendment has received Registrar Approval and, in the case of ICANN, the proposed amendment has been approved by the ICANN Board of Directors.7.4.5.5 In order for the arbitrator panel to approve either ICANN or the Working Group’s proposed amendment relating to the Proposed Revisions, the arbitrator panel must conclude that such proposedamendment is consistent with a balanced application of ICANN’s core values (as described in ICANN’s Bylaws) and reasonable in light of the balancing of the costs and benefits to the business interests of theApplicable Registrars and ICANN (as applicable), and the publicbenefit sought to be achieved by the Proposed Revisions asset forth in such amendment. If the arbitrator panel concludes that eitherICANN or the Working Group’s proposed amendment relating to the Proposed Revisions meets the foregoing standard, such amendment shall be effective and deemed an amendment to this Agreement upon sixty (60) calendar days notice from ICANN to Registrar and deemed an Approved Amendment hereunder. 7.4.6 With respect to an Approved Amendment relating to an amendment proposed by ICANN, Registrar may apply in writing to ICANN for anexemption from such amendment pursuant to the provisions of Section 6.8.7.4.7 Notwithstanding anything in this Section 7.4 to the contrary, (a) ifRegistrar provides evidence to ICANN’s reasonable satisfaction that theApproved Amendment would materially increase the cost of providingRegistrar Services, then ICANN will allow up to one-hundred eighty (180)calendar days for the Approved Amendment to become effective with respect to Registrar, and (b) no Approved Amendment adopted pursuant to Section7.4 shall become effective with respect to Registrar if Registrar provides ICANN with an irrevocable notice of termination pursuant to Section 5.4.7.5 No Third-Party Beneficiaries. This Agreementshall not be construed to create any obligation by either ICANN or Registrar to any non-party to this Agreement,including any Registered Name Holder.7.6 Notices and Designations. Except as provided in Section 4.4 and Section 6, all notices to be given under this Agreementshall be given in writing at the address of the appropriate party asset forth below, unless that party has given a notice ofchange of address in writing. Each party shall notify the other party within thirty(30) days of any change to its contact information. Any written notice required by this Agreementshall be deemed to have been properly given when delivered inperson, when sent by electronic facsimile with receipt of confirmation of delivery, when scheduled for delivery by internationally recognized courier service, or when delivered by electronic means followed by an affirmative confirmation of receipt by the recipient’s facsimile machine or email server. For any notice of a newSpecification or Policy established in accordance with this Agreement, Registrar shall be afforded a reasonable period of time after notice of the establishment of such Specification or Policy is e-mailed to Registrar and posted on the ICANNwebsite in which to comply with that specification, policy or program, taking into account any urgency involved. Notices and designations by ICANN under thisAgreementshall be effective when written notice ofthem is deemed given to Registrar.If to ICANN, addressed to:Attention: Registrar Accreditation NoticesInternet Corporation for Assigned Names and Numbers12025 Waterfront Drive, Suite 300Los Angeles, California 90094-2536 USA Telephone: +1 310 823-9358Facsimile: +1 310 823-8649 If to Registrar, addressed to:[Registrar Name] [Courier Address] [Mailing Address]Attention: [contact person]Registrar Website URL: [URL] Telephone: [telephone number] Facsimile: [fax number]e-mail: [e-mail address]7.7 Dates and Times. All dates and times relevant to this Agreement or itsperformanceshall be computed based on the date and time observed in Los Angeles, California, USA.7.8 Language. All notices, designations, and Specifications or Policies made under this Agreementshall be in the English language.7.9 Counterparts. This Agreement maybe executed in one or more counterparts, each of which shall be deemed an original, but all of which together shall constitute one and the same instrument.7.10 Entire Agreement. Except to the extent (a) expressly provided in a writtenagreement executed by both parties concurrently herewith or (b) of writtenassurances provided by Registrar to ICANN in connection with its Accreditation, this Agreement (including the specifications, which form part of it) constitutes the entire agreement of the parties pertaining to the Accreditation of Registrar and supersedes all prior agreements, understandings, negotiations and discussions, whether oral or written, between the parties on that subject.7.11 Severability. If one or more provisions of this Agreement are held to beunenforceable under applicable law, the parties agree to renegotiate such provision in good faith. In the event that the parties cannot reach a mutually agreeable andenforceable replacement for such provision, then (a) such provisionshall beexcluded from this Agreement; (b) the balance of this Agreementshall beinterpreted as if such provision were so excluded; and (c) the balance of this Agreementshall be enforceable in accordance with its terms.[signature page follows] IN WITNESS WHEREOF, the parties hereto have caused this Agreement to be executed in duplicate by their duly authorized representatives. ICANN By: Name: Title: [Registrar] By: Name: Title: WHOIS ACCURACY PROGRAM SPECIFICATION Registrarshall implement and comply with the requirements set forth in this Specification, as well as any commercially practical updates to this Specification that are developed byICANN and the Registrar Stakeholder Group during the Term of the Registrar Accreditation Agreement. Except as provided for in Section 3 below, within fifteen (15) days of (1) theregistration of a Registered Name sponsored by Registrar, (2) the transfer of thesponsorship of a Registered Name to Registrar, or (3) any change in the RegisteredName Holder with respect to any Registered Name sponsored by Registrar, Registrar will, with respect to both Whois information and the corresponding customer account holder contact information related to such Registered Name:a. Validate the presence of data for all fields required under Subsection 3.3.1 of the Agreement in a proper format for the applicable country or territory.b. Validate that all email addresses are in the proper format according to RFC 5322 (or its successors).c. Validate that telephone numbers are in the proper format according to the ITU-T E.164 notation for international telephone numbers (or its equivalents orsuccessors).d. Validate that postal addresses are in a proper format for the applicable country or territory as defined in UPU Postal addressing format templates, the S42address templates (as they maybe updated) or other standard formats.e. Validate that all postal address fields are consistent across fields (for example:street exists in city, city exists in state/province, city matches postal code) where such information is technically and commercially feasible for the applicablecountry or territory. f. Verify:i. the email address of the Registered Name Holder (and, if different, the Account Holder) by sending an email requiring an affirmative response through a tool-based authentication method such as providing a unique code that must be returned in a manner designated by the Registrar, orii.the telephone number of the Registered Name Holder (and, if different,the Account Holder) by either (A) calling or sending an SMS to theRegistered Name Holder’s telephone number providing a unique codethat must be returned in a manner designated by the Registrar, or (B)calling the Registered Name Holder’s telephone number and requiringthe Registered Name Holder to provide a unique code that was sent to the Registered Name Holder via web, email or postal mail.In either case, if Registrar does not receive an affirmative response from the Registered Name Holder, Registrarshall either verify the applicable contactinformation manually or suspend the registration, until such time asRegistrar has verified the applicable contact information. If Registrar doesnot receive an affirmative response from the Account Holder, Registrarshall verify the applicable contact information manually, but is not required tosuspend any registration. Except as provided in Section 3 below, within fifteen (15) calendar days after receiving any changes to contact information in Whois or the corresponding customer accountcontact information related to any Registered Name sponsored by Registrar (whetheror not Registrar was previously required to perform the validation and verificationrequirements set forth in this Specification in respect of such Registered Name),Registrar will validate and, to the extent required by Section 1, verify the changed fields in the manner specified in Section 1 above. If Registrar does not receive an affirmative response from the Registered Name Holder providing the required verification,Registrarshall either verify the applicable contact information manually or suspend the registration, until such time as Registrar has verified the applicable contact information. If Registrar does not receive an affirmative response from the Account Holder, Registrar shall verify the applicable contact information manually, but is not required to suspend any registration. Except asset forth in paragraph 4 below, Registrar is not required to perform the above validation and verification procedures in Section 1(a) through 1(f) above, if Registrarhas already successfully completed the validation and verification procedures on the identical contact information and is not in possession of facts or knowledge ofcircumstances that suggest that the information is no longer valid. If Registrar has any information suggesting that the contact information specified inSection 1(a) through 1(f) above is incorrect (such as Registrar receiving a bouncedemail notification or non-delivery notification message in connection with compliance with ICANN’s Whois Data Reminder Policy or otherwise) for any Registered Namesponsored by Registrar (whether or not Registrar was previously required to perform the validation and verification requirements set forth in this Specification in respect of such Registered Name), Registrar must verify or re-verify, as applicable, the emailaddress(es) as described in Section 1.f (for example by requiring an affirmativeresponse to a Whois Data Reminder Policy notice). If, within fifteen (15) calendar days after receiving any such information, Registrar does not receive an affirmative response from the Registered Name Holder providing the required verification, Registrarshalleither verify the applicable contact information manually or suspend the registration, until such time as Registrar has verified the applicable contact information. If, within fifteen (15) calendar days after receiving any such information, Registrar does notreceive an affirmative response from the customer paying for the Registered Name, if applicable, providing the required verification, Registrarshall verify the applicable contact information manually, but is not required to suspend any registration. Upon the occurrence of a Registered Name Holder's willful provision of inaccurate orunreliable WHOIS information, its willful failure promptly to update informationprovided to Registrar, or its failure to respond for over fifteen (15) calendar days toinquiries by Registrar concerning the accuracy of contact details associated with theRegistered Name Holder's registration, Registrarshall either terminate or suspend the Registered Name Holder’s Registered Name or place such registration on clientHoldand clientTransferProhibited, until such time as Registrar has validated the information provided by the Registered Name Holder. The terms and conditions of this Specificationshall be reviewed by ICANN inconsultation with the Registrar Stakeholder Group on or about the first anniversaryof the date that the form of this Agreement is first executed by a registrar. Nothing within this Specificationshall be deemed to require Registrar to performverification or validation of any customer account holder information where thecustomer account holder does not have any Registered Names under sponsorship of Registrar. WHOIS ACCURACY PROGRAM SPECIFICATION Registrarshall implement and comply with the requirements set forth in this Specification, as well as any commercially practical updates to this Specification that are developed byICANN and the Registrar Stakeholder Group during the Term of the Registrar Accreditation Agreement. Except as provided for in Section 3 below, within fifteen (15) days of (1) theregistration of a Registered Name sponsored by Registrar, (2) the transfer of thesponsorship of a Registered Name to Registrar, or (3) any change in the RegisteredName Holder with respect to any Registered Name sponsored by Registrar, Registrar will, with respect to both Whois information and the corresponding customer account holder contact information related to such Registered Name:a. Validate the presence of data for all fields required under Subsection 3.3.1 of the Agreement in a proper format for the applicable country or territory.b. Validate that all email addresses are in the proper format according to RFC 5322 (or its successors).c. Validate that telephone numbers are in the proper format according to the ITU-T E.164 notation for international telephone numbers (or its equivalents orsuccessors).d. Validate that postal addresses are in a proper format for the applicable country or territory as defined in UPU Postal addressing format templates, the S42address templates (as they maybe updated) or other standard formats.e. Validate that all postal address fields are consistent across fields (for example:street exists in city, city exists in state/province, city matches postal code) where such information is technically and commercially feasible for the applicablecountry or territory. f. Verify:i. the email address of the Registered Name Holder (and, if different, the Account Holder) by sending an email requiring an affirmative response through a tool-based authentication method such as providing a unique code that must be returned in a manner designated by the Registrar, orii.the telephone number of the Registered Name Holder (and, if different,the Account Holder) by either (A) calling or sending an SMS to theRegistered Name Holder’s telephone number providing a unique codethat must be returned in a manner designated by the Registrar, or (B)calling the Registered Name Holder’s telephone number and requiringthe Registered Name Holder to provide a unique code that was sent to the Registered Name Holder via web, email or postal mail.In either case, if Registrar does not receive an affirmative response from the Registered Name Holder, Registrarshall either verify the applicable contact information manually or suspend the registration, until such time asRegistrar has verified the applicable contact information. If Registrar doesnot receive an affirmative response from the Account Holder), Registrarshall verify the applicable contact information manually, but is not required tosuspend any registration. Except as provided in Section 3 below, within fifteen (15) calendar days after receiving any changes to contact information in Whois or the corresponding customer accountcontact information related to any Registered Name sponsored by Registrar (whetheror not Registrar was previously required to perform the validation and verificationrequirements set forth in this Specification in respect of such Registered Name),Registrar will validate and, to the extent required by Section 1, verify the changed fields in the manner specified in Section 1 above. If Registrar does not receive an affirmative response from the Registered Name Holder providing the required verification,Registrarshall either verify the applicable contact information manually or suspend the registration, until such time as Registrar has verified the applicable contact information. If Registrar does not receive an affirmative response from the Account Holder, Registrar shall verify the applicable contact information manually, but is not required to suspend any registration. Except asset forth in paragraph 4 below, Registrar is not required to perform the above validation and verification procedures in Section 1(a) through 1(f) above, if Registrarhas already successfully completed the validation and verification procedures on the identical contact information and is not in possession of facts or knowledge ofcircumstances that suggest that the information is no longer valid. If Registrar has any information suggesting that the contact information specified inSection 1(a) through 1(f) above is incorrect (such as Registrar receiving a bouncedemail notification or non-delivery notification message in connection with compliance with ICANN’s Whois Data Reminder Policy or otherwise) for any Registered Namesponsored by Registrar (whether or not Registrar was previously required to perform the validation and verification requirements set forth in this Specification in respect of such Registered Name), Registrar must verify or re-verify, as applicable, the emailaddress(es) as described in Section 1.f (for example by requiring an affirmativeresponse to a Whois Data Reminder Policy notice). If, within fifteen (15) calendar days after receiving any such information, Registrar does not receive an affirmative response from the Registered Name Holder providing the required verification, Registrarshalleither verify the applicable contact information manually or suspend the registration, until such time as Registrar has verified the applicable contact information. If, within fifteen (15) calendar days after receiving any such information, Registrar does notreceive an affirmative response from the customer paying for the Registered Name, if applicable, providing the required verification, Registrarshall verify the applicable contact information manually, but is not required to suspend any registration. Upon the occurrence of a Registered Name Holder's willful provision of inaccurate orunreliable WHOIS information, its willful failure promptly to update informationprovided to Registrar, or its failure to respond for over fifteen (15) calendar days toinquiries by Registrar concerning the accuracy of contact details associated with theRegistered Name Holder's registration, Registrarshall either terminate or suspend the Registered Name Holder’s Registered Name or place such registration on clientHoldand clientTransferProhibited, until such time as Registrar has validated the information provided by the Registered Name Holder. The terms and conditions of this Specificationshall be reviewed by ICANN inconsultation with the Registrar Stakeholder Group on or about the first anniversary of the date that the form of this Agreement is first executed by a registrar. Nothing within this Specificationshall be deemed to require Registrar to performverification or validation of any customer account holder information where thecustomer account holder does not have any Registered Names under sponsorship of Registrar. REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION Registration Data Directory Services. Until ICANN requires a differentprotocol, Registrar will operate a WHOIS service available via port 43 inaccordance with RFC 3912, and a web-based Directory Service providing freepublic query-based access to at least the elements set forth in Section 3.3.1.1through 3.3.1.8 of the Registrar Accreditation Agreement in the format set forth in Section 1.4 of this Specification. ICANN reserves the right to specifyalternative formats and protocols, and upon such specification, the Registrarwill implement such alternative specification as soon as reasonably practicable.Following the publication by the IETF of a Proposed Standard, Draft Standard or Internet Standard and any revisions thereto (as specified in RFC 2026) relating to the web-based directory service as specified in the IETF Web ExtensibleInternet Registration Data Service working group, Registrarshall implement the directory service specified in any such standard (or any revision thereto) nolater than 135 days after such implementation is requested by ICANN. Registrar shall implement internationalized registration data publication guidelinesaccording to the specification published by ICANN following the work of the ICANN Internationalized Registration Data Working Group (IRD-WG) and its subsequent efforts, no later than 135 days after it is approved by the ICANN Board.1.1. The format of responses shall follow a semi-free text format outline below, followed by ablank line and a legal disclaimer specifying the rights ofRegistrar, and of the user querying the database.1.2. Each data objectshall be represented as a set of key/value pairs, with lines beginning with keys, followed by a colon and a space as delimiters, followed by the value.1.3. For fields where more than one value exists, multiple numbered key/value pairs with the same keyshall be allowed (for example to list multiple name servers). The first key/value pair after a blank line should be considered the start of a new record, and should be considered as identifying that record,and is used to group data, such as hostnames and IP addresses, or a domain name and registrant information, together.1.4.Domain Name Data:1.4.1. Query format: whois –h whois.example-registrar.tld EXAMPLE.TLD 1.4.2. Response format:The format of responses shall contain all the elements and follow a semi-free text format outline below. Additional data elements can be added at the end of the text format outlined below. The data element may, at the option of Registrar, befollowed by a blank line and a legal disclaimer specifying the rights of Registrar, and of the user querying the database (provided that any such legal disclaimer must be preceded by such blank line).Domain Name: EXAMPLE.TLDRegistry Domain ID: D1234567-TLDRegistrar WHOIS Server: whois.example-registrar.tld Registrar URL:http://www.example-registrar.tldUpdated Date: 2009-05-29T20:13:00Z Creation Date: 2000-10-08T00:45:00ZRegistrar Registration Expiration Date: 2010-10-08T00:44:59ZRegistrar: EXAMPLE REGISTRAR LLC Registrar IANA ID: 5555555Registrar Abuse Contact Email:email@registrar.tld Registrar Abuse Contact Phone:+1.1235551234Reseller: EXAMPLE RESELLER1Domain Status: clientDeleteProhibited2Domain Status: clientRenewProhibitedDomain Status: clientTransferProhibited Registry Registrant ID: 5372808-ERL3Registrant Name: EXAMPLE REGISTRANT4Registrant Organization: EXAMPLE ORGANIZATION Registrant Street: 123 EXAMPLE STREETRegistrant City: ANYTOWNRegistrant State/Province: AP5 Registrant Postal Code: A1A1A16 Registrant Country: AARegistrant Phone: +1.5555551212 Registrant Phone Ext: 12347Registrant Fax: +1.5555551213 Registrant Fax Ext: 4321Registrant Email:EMAIL@EXAMPLE.TLD Registry Admin ID: 5372809-ERL8 1 Data element maybe deleted, provided that if the data element is used, it must appear at this location.2 Note: all applicable statuses must be displayed in the Whois output.3 Maybe left blank if not available from Registry.4 For the Registrant, Admin and Tech contact fields requiring a “Name” or“Organization”, the output must include either the name or organization (or both, if available).5 All “State/Province” fields maybe left blank if not available.6 All “Postal Code” fields maybe left blank if not available.7 All “Phone Ext”, “Fax” and “Fax Ext” fields maybe left blank if not available.8 Maybe left blank if not available from Registry. Admin Name: EXAMPLE REGISTRANT ADMINISTRATIVEAdmin Organization: EXAMPLE REGISTRANT ORGANIZATION Admin Street: 123 EXAMPLE STREETAdmin City: ANYTOWNAdmin State/Province: AP Admin Postal Code: A1A1A1 Admin Country: AAAdmin Phone: +1.5555551212Admin Phone Ext: 1234Admin Fax: +1.5555551213 Admin Fax Ext: 1234Admin Email:EMAIL@EXAMPLE.TLD Registry Tech ID: 5372811-ERL9Tech Name: EXAMPLE REGISTRANT TECHNICAL Tech Organization: EXAMPLE REGISTRANT LLC Tech Street: 123 EXAMPLE STREETTech City: ANYTOWNTech State/Province: AP Tech Postal Code: A1A1A1 Tech Country: AATech Phone: +1.1235551234Tech Phone Ext: 1234Tech Fax: +1.5555551213 Tech Fax Ext: 93Tech Email:EMAIL@EXAMPLE.TLDName Server: NS01.EXAMPLE-REGISTRAR.TLD10 Name Server: NS02.EXAMPLE-REGISTRAR.TLDDNSSEC: signedDelegationURL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/ Last update of WHOIS database: 2009-05-29T20:15:00Z <<< 1.5. The format of the following data fields: domain status, individual andorganizational names, address, street, city, state/province, postal code,country, telephone and fax numbers, email addresses, date and times must conform to the mappings specified in EPP RFCs 5730-5734 (or itssuccessors),and IPv6 addresses format should conform to RFC 5952 (or its successor), so that the display of this information (or values returned inWHOIS responses) can be uniformly processed and understood. Service Level Agreement for Registration Data Directory Services (RDDS)2.1 Definitions 9 Maybe left blank if not available from Registry.10 All associated nameservers must be listed. o IP address. Refers to IPv4 or IPv6 addresses without making any distinction between the two. When there is need to make a distinction, IPv4 or IPv6 isused.o Probes. Network hosts used to perform tests (see below) that are located at various global locations.o RDDS. Registration Data Directory Services refers to the collective of WHOIS and Web based WHOIS services.o RTT. Round-Trip Time or RTT refers to the time measured from the sending of the first bit of the first packet of the sequence of packets needed to make a request until the reception of the last bit of the last packet of the sequenceneeded to receive the response. If the client does not receive the wholesequence of packets needed to consider the response as received, the request will be considered unanswered.o SLR. Service Level Requirement is the level of service expected for a certain parameter being measured in a Service Level Agreement (SLA).2.2 Service Level Agreement Matrix Parameter SLR (monthly basis) RDDS RDDS availability less than or equal to 864 min of downtimeRDDS query RTT less than or equal to 4000 ms, for at least 95% of the queriesRDDS update time less than or equal to 60 min, for at least 95% of the probes Registrar is encouraged to do maintenance for the different services at the timesand dates of statistically lower traffic for each service. Since substantial downtime is already incorporated in the availability metric, planned outages or similar; anydowntime, be it for maintenance or due to system failures, will be noted simply as downtime and counted for SLA purposes.2.2.1 RDDS availability. Refers to the ability of all the RDDS services for theRegistrar to respond to queries from an Internet user with appropriate data from the relevant registrar system. If 51% or more of the RDDS testingprobes see any of the RDDS services as unavailable during a given time, the RDDS will be considered unavailable.2.2.2 WHOIS query RTT. Refers tothe RTT of the sequence of packets from the start of the TCP connection to its end, including the reception of the WHOIS response. If the RTT is 5-times or more the corresponding SLR, the RTTwill be considered undefined.2.2.3 Web-based-WHOIS query RTT. Refers tothe RTT of the sequence of packets from the start of the TCP connection to its end, including the reception of the HTTP response for only one HTTP request. If Registrarimplements a multiple-step process to get to the information, only the laststepshall be measured. If the RTT is 5-times or more the corresponding SLR, the RTT will be considered undefined.2.2.4 RDDS query RTT. Refers to the collective of “WHOIS query RTT” and “Web-based- WHOIS query RTT”.2.2.5 RDDS update time. Refers to the time measured from the receipt of an EPP confirmation to a transform command on a domain name, host or contact, up until the servers of the RDDS services reflect the changes made.2.2.6 RDDS test. Means one query sent to a particular “ IP address” of one of theservers of one of the RDDS services. Queries shall be about existing objects in the registrar system and the responses must contain the correspondinginformation otherwise the query will be considered unanswered. Querieswith an RTT 5 times higher than the corresponding SLR will be considered as unanswered. The possible results to an RDDS test are: anumber inmilliseconds corresponding to the RTT orundefined/unanswered.2.2.7 Measuring RDDS parameters. Every 5 minutes, RDDS probes will selectone IP address from all the public-DNS registered “IP addresses” of theservers for each RDDS service of the Registrar being monitored and make an “RDDS test” to each one. If an “RDDS test” result is undefined/unanswered, the corresponding RDDS service will be considered as unavailable from that probe until it is time to make a new test.2.2.8 Collating the results from RDDS probes. The minimum number of activetesting probes to consider a measurement valid is 10 at any givenmeasurement period, otherwise the measurements will be discarded and will be considered inconclusive; during this situation no fault will be flaggedagainst the SLRs.2.2.9 Placement of RDDS probes. Probes for measuring RDDS parameters shall be placed inside the networks with the most users across the differentgeographic regions; care shall betaken not to deploy probes behind high propagation-delay links, such as satellite links.2.3 Covenants of Performance MeasurementRegistrarshall not interfere with measurement Probes, including any form ofpreferential treatment of the requests for the monitored services. Registrarshallrespond to the measurement tests described in this Specification as it would do with any other request from Internet users (for RDDS). CONSENSUS POLICIES AND TEMPORARY POLICIES SPECIFICATION Consensus Policies.1.1. “Consensus Policies” are those policies established (1) pursuant to the procedure set forth in ICANN's Bylaws and due process, and (2) covering those topics listed in Section 1.2 of thisdocument. The Consensus Policy development process and procedure set forth in ICANN's Bylaws maybe revised from time to time in accordance with the process set forth therein.1.2. Consensus Policies and the procedures by which they are developed shall be designed to produce, to the extent possible, a consensus of Internet stakeholders, including registrars. Consensus Policies shall relate to one or more of the following:1.2.1. issues for which uniform or coordinated resolution is reasonably necessary tofacilitate interoperability, security and/or stability of the Internet, Registrar Services, Registry Services, or the Domain Name System (“DNS”);1.2.2. functional and performance specifications for the provision of Registrar Services;1.2.3. registrar policies reasonably necessary to implement Consensus Policies relating toagTLD registry;1.2.4. resolution of disputes regarding the registration of domain names (as opposed to the use of such domain names, but including where such policies take into account use of the domain names); or1.2.5. restrictions on cross-ownership of registry operators and registrars or Resellers and regulations and restrictions with respect to registrar and registry operations andthe use of registry and registrar data in the event that a registry operator and a registrar or Reseller are affiliated.1.3. Such categories of issues referred to in Section 1.2 shall include, withoutlimitation:1.3.1. principles for allocation of registered names in a TLD (e.g., first-come/first-served, timely renewal, holding period after expiration);1.3.2. prohibitions on warehousing of or speculation in domain names by registries orregistrars;1.3.3. reservation of registered names in a TLD that may not be registered initially or thatmay not be renewed due to reasons reasonably related to (i) avoidance of confusion among or misleading of users, (ii) intellectual property, or (iii) the technicalmanagement of the DNS or the Internet (e.g., establishment of reservations of names from registration);1.3.4. maintenance of and access to accurate and up-to-date information concerningRegistered Names and nameservers;1.3.5. procedures to avoid disruptions of domain name registrations due to suspension or termination of operations by a registry operator or a registrar, including procedures for allocation of responsibility among continuing registrars of the Registered Names sponsored in a TLD by a registrar losing accreditation; and1.3.6. the transfer of registration data upon a change in registrar sponsoring one or more Registered Names. 1.4. In addition to the other limitations on Consensus Policies, they shall not:1.4.1. prescribe or limit the price of Registrar Services;1.4.2. modify the limitations on Temporary Policies (defined below) or Consensus Policies;1.4.3. modify the provisions in the Registrar Accreditation Agreement regarding terms or conditions for the renewal, termination or amendment of the Registrar Accreditation Agreement or fees paid by Registrar to ICANN; or1.4.4. modify ICANN’s obligations to not apply standards, policies, procedures or practices arbitrarily, unjustifiably, or inequitably and to not single out Registrar for disparate treatment unless justified by substantial and reasonable cause, and exercise itsresponsibilities in an open and transparent manner. Temporary Policies. Registrarshall comply with and implement all specifications or policies established by the ICANN Board of Directors (the “Board”) on a temporary basis, if adopted by the Board by a vote of at least two-thirds of its members, so long as the Board reasonablydetermines that such modifications or amendments are justified and that immediate temporary establishment of a specification or policy on the subject is necessary to maintain the stability or security of Registrar Services, Registry Services or the DNS or the Internet ("TemporaryPolicies").2.1. Such proposed specification or policy shall be as narrowly tailored as feasible to achieve those objectives. In establishing any Temporary Policy, the Boardshall state the period of time for which the Temporary Policy is adopted and shall immediately implement theConsensus Policy development process set forth in ICANN's Bylaws.2.1.1. ICANN shall also issue an advisory statement containing a detailed explanation of its reasons for adopting the Temporary Policy and why the Board believes suchTemporary Policy should receive the consensus support of Internet stakeholders.2.1.2. If the period of time for which the Temporary Policy is adopted exceeds 90 days, the Board shall reaffirm its temporary adoption every 90 days for a total period not toexceed one year,in order to maintain such Temporary Policy in effect until such time as it becomes a Consensus Policy. If the one year period expires or, if during such one year period, the Temporary Policy does not become a Consensus Policy and is notreaffirmed by the Board, Registrarshall no longer be required to comply with or implement such Temporary Policy. Notice and Conflicts. Registrarshall be afforded a reasonable period of time following notice of the establishment of a Consensus Policy or Temporary Policy in which to comply with suchpolicy or specification, taking into account any urgency involved. In the event of a conflictbetween Registrar Services and Consensus Policies or any Temporary Policy, the ConsensusPolices or Temporary Policy shall control, but only with respect to subject matter in conflict.For the avoidance of doubt, Consensus Policies that meet the requirements of this Specification may supplement or supersede provisions of the agreements between Registrar and ICANN, but only to the extent that such Consensus Policies relate to the matters set forth in Section 1.2 and1.3 of this Specification. SPECIFICATION ON PRIVACY AND PROXY REGISTRATIONSUntil the earlier to occur of (i) January 1, 2017, and (ii) the date ICANN establishesand implements a Privacy and Proxy Accreditation Program as referenced in Section 3.14 of the Registrar Accreditation Agreement, Registrar agrees to comply, and torequire its Affiliates and Resellers to comply, with the terms of this Specification,provided that ICANN and the Working Group may mutually agree to extend the term of this Specification. This Specification may not be modified by ICANN orRegistrar. Definitions. For the purposes of this Specification, the following definitions shall apply.1.1 “P/P Customer” means, regardless of the terminology used by the P/P Provider, the licensee, customer, beneficial user, beneficiary, or other recipient of Privacy Services and Proxy Services.1.2 “Privacy Service” is a service by which a Registered Name is registered to its beneficial user as the Registered Name Holder, but for whichalternative, reliable contact information is provided by the P/P Provider for display of the Registered Name Holder’s contact information in the Registration Data Service (Whois) or equivalent services.1.3 ”Proxy Service” is a service through which a Registered Name Holderlicenses use of a Registered Name to the P/P Customer in order toprovide the P/P Customer use of the domain name, and the Registered Name Holder's contact information is displayed in the Registration Data Service (Whois) or equivalent services rather than the P/P Customer’s contact information.1.4 “P/P Provider” or “Service Provider” is the provider ofPrivacy/Proxy Services,including Registrar and its Affiliates, as applicable. Obligations of Registrar. For any Proxy Service or Privacy Service offered by the Registrar or its Affiliates, including any of Registrar's or its Affiliates’ P/P services distributed through Resellers, and used in connection withRegistered Names Sponsored by the Registrar, the Registrar and its Affiliates must require all P/P Providers to follow the requirements described in this Specification and to abide by the terms and procedures published pursuant to this Specification.2.1 Disclosure of Service Terms. P/P Providershall publish the terms and conditions of its service (including pricing), on its website and/orRegistrar’swebsite. 2.2 Abuse/Infringement Point of Contact. P/P Providershall publish a point of contact for third parties wishing to report abuse orinfringement of trademarks (or other rights).2.3 Disclosure of Identity of P/P Provider. P/P Providershall publish itsbusiness contact information on its website and/or Registrar’swebsite.2.4 Terms of service and description of procedures. The P/P Providershall publish on its website and/or Registrar’s website a copy of the P/PProvider service agreement and description of P/P Provider’s procedures for handling the following:2.4.1 The processor facilities to report abuse of a domain nameregistration managed by the P/P Provider;2.4.2 The processor facilities to report infringement of trademarks orother rights of third parties;2.4.3 The circumstances under which the P/P Provider will relaycommunications from third parties to the P/P Customer;2.4.4 The circumstances under which the P/P Provider will terminateservice to the P/P Customer;2.4.5 The circumstances under which the P/P Provider will revealand/or publish in the Registration Data Service (Whois) orequivalent service the P/P Customer’sidentity and/orcontact data; and2.4.6 A description of the support services offered by P/P Providers to P/P Customers, and how to access these services.2.5 Escrow of P/P Customer Information. Registrarshall include P/PCustomer contact information in its Registration Data Escrow deposits required by Section 3.6 of the Agreement. P/P Customer Information escrowed pursuant to this Section 2.5 of this Specification may only be accessed by ICANN in the event of the termination of the Agreement or in the event Registrar ceases business operations. Exemptions. Registrar is under no obligation to comply with the requirements of this specification if it can be shown that:3.1 Registered Name Holder employed the services of a P/P Provider that is not provided by Registrar, or any of its Affiliates; 3.2 Registered Name Holder licensed a Registered Name to another party (i.e., is acting as a Proxy Service) without Registrar’s knowledge; or3.3 Registered Name Holder has used P/P Provider contact data without subscribing to the service or accepting the P/P Provider terms andconditions. DATA RETENTION SPECIFICATION During the Term of this Agreement, for each Registered Name sponsored byRegistrar within agTLD, Registrarshall collect and securely maintain in its own electronic database (as updated from time to time) the data specifiedbelow:1.1. Registrarshall collect the following information from registrants at thetime of registration of a domain name (a “Registration”) and shall maintain that information for the duration of Registrar’s sponsorship of theRegistration and for a period of two additional years thereafter: 1.1.1. First and lastname or full legal name of registrant;1.1.2. First and lastname or, in the event registrant is a legal person, thetitle of the registrant’s administrative contact, technical contact, and billing contact;1.1.3. Postal address of registrant, administrative contact, technicalcontact, and billing contact;1.1.4. Email address of registrant, administrative contact, technicalcontact, and billing contact;1.1.5. Telephone contact for registrant, administrative contact, technicalcontact, and billing contact;1.1.6. WHOIS information, asset forth in the WHOIS Specification;1.1.7. Types of domain name services purchased for use in connectionwith the Registration; and1.1.8. To the extent collected by Registrar, “card on file,” current periodthird party transaction number, or other recurring payment data.1.2. Registrarshall collect the following information and maintain thatinformation for no less than one hundred and eighty (180) days following the relevant interaction:1.2.1. Information regarding the means and source of paymentreasonably necessary for the Registrar to process the Registration transaction, or a transaction number provided by a third partypayment processor;1.2.2. Log files, billing records and, to the extent collection andmaintenance of such records is commercially practicable orconsistent with industry-wide generally accepted standardpractices within the industries in which Registrar operates, other records containing communications source and destinationinformation, including, depending on the method of transmission and without limitation: (1) Source IP address, HTTP headers, (2) the telephone, text, or fax number; and (3) email address, Skype handle,or instant messaging identifier, associated withcommunications between Registrar and the registrant about the Registration; and1.2.3. Log files and, to the extent collection and maintenance of suchrecords is commercially practicable or consistent with industry-wide generally accepted standard practices within the industries inwhich Registrar operates, other records associated with the Registration containing dates, times, and timezones ofcommunications and sessions, including initialregistration. If, based on the receipt of either (i) a written legal opinion from a nationallyrecognized law firmin the applicable jurisdiction that states that the collectionand/or retention of any data element specified herein by Registrar is reasonably likely to violate applicable law (the “Opinion”) or (ii) a ruling of, or writtenguidance from, a governmental body of competent jurisdiction providing thatcompliance with the data collection and/or retention requirements of thisSpecification violates applicable law, Registrar determines in good faith that the collection and/or retention of any data element specified in this Specificationviolates applicable law, Registrar may provide written notice of suchdetermination to ICANN and request a waiver from compliance with specificterms and conditions of this Specification (a “Waiver Request”). Such writtennoticeshall: (i) specify the relevant applicable law, the allegedly offending datacollection and retention elements, the manner in which the collection and/orretention of such data violates applicable law, and a reasonable description ofsuch determination and any other facts and circumstances related thereto, (ii) be accompanied by a copy of the Opinion and governmental ruling or guidance, asapplicable, and (iii) be accompanied by any documentation received by Registrar from any governmental authority, in each case, related to such determination,and such other documentation reasonably requested by ICANN. Followingreceipt of such notice, ICANN and Registrarshall discuss the matter in good faith in an effort to reach a mutually acceptable resolution of the matter. Until suchtime as ICANN’s Procedure for Handling Whois Conflicts with Privacy Law ismodified to include conflicts relating to the requirements of this Specificationand if ICANN agrees with Registrar’s determination, ICANN's office of generalcounsel may temporarily or permanently suspend compliance and enforcement of the affected provisions of this Specification and grant the Waiver Request.Prior to granting any exemption hereunder, ICANN will post its determination on its website for a period of thirty (30) calendar days. Following suchmodification of ICANN’s Procedure for Handling Whois Conflicts with Privacy Law, all Waiver Requests (whether granted or denied) shall be resolvedpursuant to such modified procedures. If (i) ICANN has previously waived compliance with the requirements of anyrequirement of this Data Retention Specification in response to a WaiverRequest from aregistrar that is located in the same jurisdiction as Registrar and (ii) Registrar is subject to the same applicable law that gave rise to ICANN’sagreement to grant such waiver, Registrar may request that ICANN to grant a similar waiver, which requestshall be approved by ICANN, unless ICANNprovides Registrar with a reasonable justification for not approving such request, in which case Registrar may thereafter make an Waiver Request pursuant to Section 2 of this Data Retention Specification. Any modification of this Data Retention Specification to address violations ofapplicable lawshall only apply during the period of time that the specificprovisions of the applicable law giving rise to such violations remain in effect. If the applicable law is repealed or modified (or preempted) in a manner thatwould no longer prohibit the collection and/or retention of data andinformation as originally specified in this Data Retention Specification, Registrar agrees that the original version of this Specification will apply to the maximum extentpermitted by such modified applicable law. REGISTRAR INFORMATION SPECIFICATIONRegistrarshall provide to ICANN the information specified below, which shall be maintained in accordance with Section 3.17 of the Agreement. With regard toinformation identified below, ICANN will hold such information pursuant to the disclosure requirements set forth in Section 3.15 of the Agreement.General Information Full legal name of Registrar. Legal form of the Registrar (e.g., LLC, Corporation, Government Body, Intergovernmental Organization, etc.). The jurisdiction in which the Registrar’s business is registered for legal and financial purposes. The Registrar’s business registration number and the name of the authority that issued this number. Every business name and/or trade name used by the Registrar. Provide current documentation demonstrating that the Registrar entity islegally established and in good standing. For proof of establishment, provide charter documents or other equivalent document (e.g., membership agreement) of theentity. If the Registrar is a government body or organization, provide a certifiedcopy of the relevant statute, governmental decision or other instrument underwhich the government body or organization has been established. With respect to an entity other than a government body or organization, where no such certificates or documents are available in the Registrar's jurisdiction, an affidavit drafted and signed by a notary public or a legal practitioner duly qualified in the courts of the Registrar's jurisdiction, declaring that the organization is established and in goodstanding, must be provided. Correspondence address for the Registrar.* This address will be used forcontractual purposes, and the Registrar must be able to accept notices and service of legal process at this address. No Post Office boxes are allowed. Primary phone number where the Registrar can be reached for contractual purposes. Primary Fax number where the Registrar can be reached for contractual purposes. Primary Email address where the Registrar can be reached for contractual purposes. If the location or address of Registrar’s principal place of business is different from the address provided in 7, provide details including address, phone number, fax number and email address.* Provide ICANN with current documentationdemonstrating that the Registrar is legally entitled to do business in the principal place of business. Any other addresses where the Registrar will be operated or managed, ifdifferent from either its principal place of business or correspondence addressprovided above. (If so, please explain.) Provide ICANN with current documentation demonstrating that the Registrar is legally entitled to do business in each location identified. Primary contact name:TitleAddressPhone number Fax numberEmail address URL and Location of Port 43 WHOIS server.Ownership, Directors and Officers Information Full name, contact information, and position of any persons or entities owning at least 5% of the ownership interest in Registrar’s current business entity. For each person listed, please specify such person’s percentage ownership. Full name, contact information, and position of all directors of the Registrar. Full name, contact information, and position of all officers of the Registrar.* (Officer names and positions must be publicly displayed.) Full name, contact information, and position of all senior management and other key personnel overseeing the provision of Registrar Services. For every person or entity mentioned in the answers to questions 15 to 18, indicate if that person or entity:a) within the past ten years, has been convicted of a felony or of amisdemeanor related to financial activities, or has been judged by a court to have committed fraud or breach of fiduciary duty, or has been the subject of a judicial determination that is similar or related to any of these;b) within the past ten years, has been disciplined by any government orindustry regulatory body for conduct involving dishonesty or misuse of fundsof others; c) is currently involved in any judicial or regulatory proceeding that could result in a conviction, judgment, determination, or discipline of the typespecified in items 19(a) or 19(b); ord) is the subject of a disqualification imposed by ICANN.Provide details if any of the above events in (a)-(d) have occurred. List all Affiliated Registrars, if any, and briefly describe the Affiliation. For any entities listed in item 20, must provide information required in items 1-14 above. List the ultimate parent entity of the Registrar, if applicable.*Other Does the Registrar or any of its Affiliates offer any Privacy Service or ProxyService (as such terms on defined in the Specification on Privacy and ProxyRegistrations)? If yes, list the entities or individuals providing the Privacy Service or Proxy Service. For any entities listed in item 23, provide information required in 1-14 above. Does the Registrar utilize or benefit from the services of Resellers? If yes, provide alist of all such Resellers known to Registrar. The information specified in this item 26 shall be made available to ICANN upon request. At suchtime as ICANN develops a secure method for the receipt and retention of suchinformation, such information shall thereafter be provided to ICANN in accordancewith Section 3.17 of the Agreement. Items marked with “” must also be published on Registrar’swebsite. ADDITIONAL REGISTRAR OPERATION SPECIFICATION This Specification maybe modified by ICANN from time to time after consultation with the Registrar Stakeholder Group (or its successor), provided that such updates are commercially practical with respect to the registrar industry, taken as a whole. DNSSEC Registrar must allow its customers to use DNSSEC upon request by relaying orders to add, remove or change public key material (e.g., DNSKEY or DSresource records) on behalf of customers to the Registries that support DNSSEC. Such requests shall be accepted and processed in a secure manner and according to industry best practices. Registrars shall accept any public key algorithm anddigest type that is supported by the TLD of interest and appears in the registries posted at: <http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec- alg-numbers.xml> and <http://www.iana.org/assignments/ds-rr-types/ds-rr- types.xml>. All such requests shall be transmitted to registries using the EPPextensions specified in RFC 5910 or its successors. IPv6 To the extent that Registrar offers registrants the ability to register nameserver addresses, Registrar must allow both IPv4 addresses and IPv6 addresses to be specified. IDN If the Registrar offers Internationalized Domain Name (“IDN”) registrations, all new registrations must comply with RFCs 5890, 5891, 5892, 5893 and theirsuccessors. Registrarshall also comply with the IDN Guidelines athttp://www.icann.org/en/topics/idn/implementation-guidelines.htmwhichmaybe amended, modified, or superseded from time to time. Registrar must use the IDN tables published by the relevant registry. Registrants’ Benefits and Responsibilities Domain Name Registrants’ Rights: Your domain name registration and any privacy/proxy services you may use in conjunction with it must be subject to a Registration Agreement with an ICANN Accredited Registrar. • You are entitled to review this Registration Agreement at anytime, and download a copy for your records. You are entitled to accurate and accessible information about:• The identity of your ICANN Accredited Registrar;• The identity of any proxy or privacy service provider affiliated with your Registrar;• Your Registrar’s terms and conditions, including pricing information, applicable to domain name registrations;• The terms and conditions, including pricing information, applicable to any privacy services offered by your Registrar;• The customer support services offered by your Registrar and the privacy services provider, and how to access them;• How to raise concerns and resolve disputes with your Registrar and any privacy services offered by them; and• Instructions that explain your Registrar’s processes for registering, managing, transferring, renewing, and restoring your domain nameregistrations, including through any proxy or privacy services made available by your Registrar. You shall not be subject to false advertising or deceptive practices by yourRegistrar or though any proxy or privacy services made available by yourRegistrar. This includes deceptive notices, hidden fees, and any practices that are illegal under the consumer protection law of your residence. Domain Name Registrants’ Responsibilities: You must comply with the terms and conditions posted by your Registrar, including applicable policies from your Registrar, the Registry and ICANN. You must review your Registrar’s current Registration Agreement, along with any updates. You will assume sole responsibility for the registration and use of your domain name. You must provide accurate information for publication in directories such as WHOIS, and promptly update this to reflect any changes. You must respond to inquiries from your Registrar within fifteen (15) days, and keep your Registrar account data current. If you choose to have your domainname registration renew automatically, you must also keep your payment information current. 本文引用ICANN文档 来源>>2013 年 6 月 27 日 本注册商委任协议(以下简称“本协议”)由互联网名称与数字地址分配机构(ICANN)与贝锐签署,应视为在美国加州的洛杉矶签订。1.定义。针对本协议,应适用以下定义: 1.1“账户持有人”是指为注册名称支付费用或以其他方式控制注册名称管理的 个人或实体,但该个人或实体不是注册名称持有人。 1.2“认可”或“认可”是指确定和设定履行注册职能的最低标准,认可符合这 些标准的个人或实体,并签订一份认可协议,规定适用于提供注册服务的规则和 程序。 1.3“关联公司”是指直接或间接通过一个或多个中介机构控制,受或与指定的 个人或实体共同控制的个人或实体。 1.4“附属注册商”是另一个认可注册商的附属注册商。 1.5“适用注册人家庭”是指,就附属注册人而言,该附属注册人作为一个团体。 1.6“共识政策”的含义具有本协议附件中的共识政策和临时政策规范中规 的含义。 1.7“控制”(包括术语“控制”和“共同控制”)是指拥有,直接或间接的权力直接或导致的方向管理或政策的个人或实体,是否通过证券的所有权,作为受托人或执行人,作为一个雇员或通过合同担任董事会或同等管理机构的成员,通过信贷安排或其他方式。 1.8“DNS ”是指互联网域名系统。 . 1.9“gTLD ”或“gTLD ”是指ICANN根据完全有效的注册协议委托的DNS的顶级 域名,但任何国家代码TLD(ccTLD)或国际化域名(IDN)国家代码TLD除外。 1.10“gTLD区域-文件数据 ”是指注册表的DNS区域文件中包含的所有数据,或 提供注册表服务并包含注册名称的任何子域,如提供给互联网上的名称服务器。 1.11“非法活动 ”是指使用注册官赞助的注册名称和/或利用注册官的域名决议 或注册服务以促进使用注册官赞助的注册名称的行为。 1.12“个人资料 ”是指有关任何已识别或可识别的自然人的资料。 1.13“注册名称 ”是指一个域名的域名,是否包括两(2)或更多的(如john.smith.name)水平,关于gTLD注册表运营商(或其子公司或分包商从事提供 注册服务)维护注册数据库数据,安排这样的维护,或从维护中获得收入。注册 表数据库中的名称可以是已注册的名称,即使它没有出现在区域文件中(例如,已注册但不活动的名称)。 1.14“注册姓名持有人 ”是指拥有注册姓名的持有人。 1.15“注册商 ”一词在没有首字母大写字母时,是指与注册姓名持有人和注册表运营商签订合同,收集有关注册姓名持有人的登记数据并提交登记信息进入注册 表数据库的个人或实体。 1.16“注册商批准 ”是指收到下列任一项批准: 1.16.1适用注册机构占其管理的注册名称总数的90%的肯定批准;但为计算注册总数由适用注册家族成员管理的名称,每个适用注册家族成员管理的注册名 称总数不得超过第五大适用注册家族(由管理的注册家族成员管理的注 册名称总数),包括分子和分母;或250%的肯定批准加上参与流程的适用注册机构的批准。投票赞成或反对,但不弃权或以其他方式不投票)根据第6条提出的修正案,以及占所有适用注册机构管理的注册名称总数的66.67%的适用注册机构的肯定批准,但在计算适用注册机构管理的注册姓名总数时,每个适用注册机构家庭管 理的注册姓名总数不得超过第五大适用注册机构家庭管理的注册人数总数) , 包括分子和分母的目的。这些计算的一个示例见本文附录1。 1.17“注册商服务 ”是指注册商就gTLD提供的本协议规定的服务,包括与注册姓名持有人签订合同,收集注册姓名持有人的注册数据,以及提交注册数据库的注册信息。 1.18“注册数据 ”是指以电子形式保存的所有注册数据库数据,包括gTLD区域文件数据、用于提供注册服务和注册商提交的所有数据,以及用于提供注册服 务相关的注册服务的所有其他数据。 1.19“注册表数据库 ”是指数据库组成的数据关于一个或多个DNS域名的注册表, 用于生成DNS资源记录,发布权威或响应域名可用性查询请求或Whois查询,一些或所有这些名字。 1.20“注册运营商 ”是根据ICANN(或其受让人)与该个人或实体(该个人或实体 ) 之间的协议负责的个人或实体,如果该协议终止或到期,根据美国政府与该个 人或实体(该个人或实体)之间的协议为特定gTLD提供注册服务的个人或实体。 1.21关于特定gTLD的“注册中心服务 ”应具有ICANN和注册中心运营商之间关于 该gTLD的协议中定义的含义。 1.22“经销商 ”是一个人或实体参与注册的分销渠道域名注册(a)依照协议,安排或理解注册或(b)注册的实际知识,提供部分或全部注册服务,包括收集注册名称持有人注册数据,提交注册,或促进注册和注册名称持有人之间的注册协议。 1.23“限制性修订 ”系指(i)对共识政策和临时政策规范的修订,或(ii)第5节中规定的本协议条款。1、如该期限可根据第5.2条延长。 1.24注册名称是由将与该注册相关的记录纳入登记机构的注册机构“赞助 ”的。 注册的赞助可以在注册姓名持有人的明确指示下更改,或者如果注册商失去认证 , 根据当时的ICANN规范和政策更改。 1.25“规范和/或政策 ”包括本协议中引用的共识政策、规范(如Whois准确性程序规范),以及本协议特别规定的或ICANN章程授权的任何修订、政策、程序 或程序。 1.26“本协议条款 ”从生效日期开始,并持续至(a)到期日或(b)终止。 1.27“管理下的注册名称总数 ”是指注册机构向ICANN提交的最新月度报告中所 反映的由所有适用注册机构赞助的注册名称总数。 1.28“Whois准确性程序规范 ”系指根据本协议不时更新的Whois准确性程序规范。 1.29“Whois规范 ”是指根据本协议不时更新的注册数据目录服务(Whois)规范。 1.30“工作组 ”是指注册官利益相关者集团不时任命的适用注册官和社区其他 成员的代表,负责协商适用注册官协议的修订(不包括根据第6.9条进行的双边修订)。 2.ICANN义务。 2.1认证。在本协议有效期内,根据本协议的条款和条件,注册商经ICANN授权,注册商作为g tld的注册商(包括在注册数据库中插入和更新注册名称的注册)。 2.2 登记员使用 的 赋值名称与数字互联网公司名称,网站和商标。在ICANN期 间,ICANN特此向注册商授予非排他性、全球、免版税的许可,(a)声明其被ICANN 认证为g tld注册商 (b)链接到ICANN网站内的页面和文件。根据本协议所附的商 标许可规范中规定的条款和条件,ICANN特此授予注册商非排他性的、全球范围内的使用商标的权利和许可(在商标许可规范中定义)。此处不得许可对ICANN的名称、网站或商标的其他使用。注册商不得将本许可转让或再授权给任何其他方,包括但不限于注册商的任何附属机构或任何经销商。 2.3 将军义务的赋值名称与数字互联网公司对于影响注册官的权利、义务或角色的所有事项,ICANN应在本协议有效期内: 2.3.1以公开、透明的方式履行其职责; 2.3.2没有不合理地限制竞争,并在可行的范围内促进和鼓励激烈的竞争; 2.3.3不得任意、不合理或不公平地适用标准、政策、程序或做法,除 非有实质性和合理的理由,否则不得对登记官给予不同的待遇; 2.3.4通过其复议和独立的审查政策,在受到ICANN标准、政策、程序或做法的不利影响时,确保注册官有适当的上诉程序。 2.4 使用的赋值名称与数字互联网公司认可的 注册机构。为了促进竞争的域名注 册,和认可的价值ICANN认证注册商带给互联网社区,ICANN通常要求gTLD注册注 册合同使用ICANN认证注册,和ICANN将在本协议期间遵守任何ICANN采用规范或政策要求使用ICANN认证注册gTLD注册。 3.登记员义务。 3.1 义务向提供登记员服务在本协议有效期内,注册官同意其将根据本协议作 为一个或多个gtld的注册商。 3.2 提交的已注册名称支持物数据向注册表。在本协议的有效期限内: 3.2.1作为其在gTLD中注册名称的一部分,注册员应向gTLD提交以下数 据元素,或将由注册表操作员操作的注册数据库: 3.2.1.1正在注册的注册名称; 3.2.1.2注册名称的主名称服务器和辅助名称服务器(多个名称) 的IP地址; 3.2.1.3这些名称服务器的相应名称; 3.2.1.4除非由注册系统自动生成,否则注册人的身份; 3.2.1.5除非由注册系统自动生成,否则注册的截止日期; 3.2.1.6注册表操作员要求提交的任何其他数据。 其中,注册表运营商与注册表之间的协议,如经ICANN书面批准,可说明 适用于该gTLD的替代要求数据元素,在这种情况下,替代要求数据元素应 替换和取代第3款。上述2.1.1至3.2.1.6规定的内容为本协议项下的所有 目的,但仅针对该特定的gTLD。在寻求批准所需的替代数据元素时,第3.2.1.1至3.2.1.6小节中规定的数据元素应被视为建议的最低要求。 3.2.2在收到注册姓名持有人对第3.2小节中所列数据元素的任何更新后的 七(7)天内。1.2, 3.1.2.3,和3.2.1.6对于任何注册名称,注册运营商应 将更新的数据元素提交给相关注册运营商,或将这些元素放入相关注册操 作员操作的注册数据库中。 3.2.3为了允许在发生无法恢复的技术故障或指定注册表运营商的变更时, 在ICANN提出任何请求的十(10)天内,注册官须将包含第3.2.1.1至3.2.1.6款所列的数据元素的电子资料库, 提交由注册官赞助的所有有效记录,以获得适当的gTLD。 3.3 平民访问权限向数据在…上已注册 名称。在本协议的有效期限内: 3.3.1注册官应自费提供一个交互式网页,对于任何操作“瘦 ”注册表的gTLD,应提供一个端口43 Whois服务(每个服务都可通过IPv4和IPv6访问) , 提供免费的基于公共查询的最新访问(至少每日更新)有关在任何gTLD中由注册官赞助的所有有效注册名称的数据。在协商一致政策另有规定之前,该等数据应包括注册官数据库中所载的以下要素: 3.3.1.1已注册名称的名称; 3.3.1.2已注册名称的主名称服务器和次名称服务器的名称 ; 3.3.1.3注册官的身份(可通过注册官的网站提供); 3.3.1.4注册的原始创建日期; 3.3.1.5注册的截止日期; 3.3.1.6注册姓名持有人的姓名和邮寄地址; 3.3.1.7已注册姓名的技术联系人的姓名、邮寄地址、电子邮件地址 、语音电话号码和(如可用)传真号码; 3.3.1.8已注册名称的管理联系人的姓名、邮寄地址、电子邮件 地址、语音电话号码和(如可用)传真号码。 如果经ICANN书面批准,注册表运营商和注册商之间的协议可以说明适用 于该gTLD的替代要求数据元素,在这种情况下,替代要求数据元素应替换 和取代上述第3至3.3.1.8款,但仅针对该特定的gTLD。.3.1.1 3.3.2在收到对第3.3小节中列出的数据元素的任何更新后。1.2, 3.3.1.3 和3.3.1.5至3.3.1.8,注册官应及时更新其用于提供第3.3.1款所述的公众访问的数据库。 3.3.3注册官可分包其提供第3.3.1款所述的公众访问和第3.3.2款所述的更 新的义务,但注册官仍应对适当的访问和更新负全部责任。 3.3.4注册商应遵守任何共识政策,要求注册商合作实施一种分布式功能,为所有注册商提供基于查询的Whois搜索功能。如果注册官实施的Whois服务未能在合理时间内提供相当可靠、可靠和方便地获取准确和最新的数据, 则注册官须遵守任何共识政策,要求ICANN合理确定(考虑特定注册官的 补救行动),从注册官的数据库提供数据,以促进开发集中的Whois数据库, 以提供全面的Whois搜索能力。 3.3.5在按照第3.3.1和3.3.4款的要求提供基于查询的公众的注册数据访问时,注册官不得对所提供数据的使用施加条款和条件,除非ICANN制定的任 何规范或政策允许。除非和直到ICANN建立不同的共识政策,注册应当允许 使用数据提供的查询任何合法目的,除了: (a)允许,启用或支持传输通过电子邮件、邮件、邮政邮件、传真或其他方式的主动,商业广告或请求以外的实体数据接收者自己的现有客户;或(b)支持大量的、 自动化的电子 流程,将查询或数据发送到任何注册中心运营商或icann认证注册中心的系统,除非有注册域名或修改现有注册的合理需要。 3.3.6如果ICANN根据ICANN保留的经济学家分析经济数据(该数据已提供 给注册官),确定个人或实体能够对注册或第三方开发增值产品和服务的 注册数据行使市场权力,注册官应根据第3.3.1款提供第三方大量访问数 据: 3.3.6.1注册官应每周至少提供一(1)份数据的完整电子副本,供已 与注册官签订批量访问协议的第三方下载。 3.3.6.2注册商可对大量访问该数据收取不超过10,000美元的年费。 3.3.6.3注册商的访问协议应要求第三方同意不使用该数据来允许、启用或以其他方式支持任何营销活动,无论使用何种媒介。这些媒体包括但不限于电子邮件、电话、传真、邮政邮件、短信和无线警报。 3.3.6.4注册商的访问协议应要求第三方同意不使用该数据来实现大容量、 自动化、电子流程,将查询或数据发送到任何注册中心运营商或icann认证注册商的系统,除非有注册域名或修改现有注册的合理需要。 3.3.6.5注册商的访问协议必须要求第三方同意不出售或重新分发的数据,除非它已经被第三方纳入一个增值产品或服务,不允许提取的大部分批量数据的增值产品或服务供其他各方使用。 3.3.7遵守适用的法规和其他原因,ICANN可能采取共识政策建立限制(a)个 人数据有关注册姓名注册可以向公众通过公共访问服务描述本小节3.3和(b) 注册的方式提供这样的数据。注册官须遵守任何该等协商一致政策。 3.3.8注册官应满足或超过Whois规范规定的要求。 3.4 保留的已注册名称支持物和注册数据。 3.4.1对于由注册官在gTLD内赞助的每个注册名称,注册官应按不时更新的情况,在其自己的电子数据库中收集并安全维护: 3.4.1.1本协议所附的数据保留规范中规定的数据; 3.4.1.2在第3.3.1.1至3.3.1.8小节中列出的数据元素; 3.4.1.3该账单联系人的姓名和(如果可用的话)邮政地址、 电子邮件地址、语音电话号码和传真号码; 3.4.1.4注册商根据第3.2款提交或列入注册商数据库的任何其他注册商数据; 3.4.1.5任何隐私服务或任何代理注册服务的被许可人提供的名称、邮寄地址、电子邮件地址和语音电话号码,在每种情况下,由注册商或其附属机构提供或提供的。 自ICANN完全实施根据第3条建立的 代理认证计划之日起生效。14、本第3.4.1.5条下的义务将不再适用 于另一方根据该代理认证计划明确要求保留的任何特定类别的数据(如邮政地址)。 3.4.2在本协议有效期内以及之后的两(2)年内,注册机构(其代理人) 应保存其与注册机构运营商和注册姓名持有人交易的以下记录: 3.4.2.1以电子形式提交给注册表运营商的所有注册数据(包括更新)的提交日期、时间和内容; 3.4.2.2以电子、纸质或缩微胶片形式,指构成注册申请、确认、修 改或终止的所有书面通信,以及与注册姓名持有人的相关通信,包括注册合同; 3.4.2.3以电子形式,所有注册姓名持有人与注册官的帐户记录。 3.4.3在本协议有效期内及此后的两(2)年内,注册官应在收到合理通知后 , 将本第3.4条规定的数据、信息和记录提供供ICANN检查和复制。此外, 在ICANN的合理通知和要求后,注册官应将可能涉及ICANN的有限交易或情况的数据、信息和记录的副本交付ICANN;但该等义务不适用于要求注册官 整个数据库或交易历史的副本。这些副本的费用由注册官提供。在回应ICANN要求提供电子数据、资料和记录的要求时,注册官可以合理方便及ICANN可接受的格式提交该等资料,以尽量减少对注册官业务的干扰。如果 注册官认为向ICANN提供任何该等数据、信息或记录将会违反适用法律或任何法律程序,ICANN和注册官同意真诚地讨论是否可以确 定适当的限制、保护或替代解决方案,以允许以完整或修订的形式生产此 类数据、信息或记录。除非适用法律、任何法律程序或规范或政策明确要 求,否则ICANN不得披露此等数据、信息或记录的内容。 3.4.4尽管本协议或数据保留规范中有任何其他要求,注册商没有义务在域 名注册被删除或转移到另一个注册商后的两(2)年开始保存与域名注册相关 的记录。 3.5 权利 在 数据。注册官拒绝对注册官提交给注册表数据库的或在第3.2.1至3.2.3.3小节中列出的数据元素的独家所有权或使用的所有权利。.1.3注册官不否 认第3.2.1.4至3.2.1.6款和第3.3.1至3.3.3.1.8款中有关主动注册名称的权利,并同意授予非排他性、不可撤销、免版税的许可来使用和披露第3.2款中列出的数 据元素。1.4至3.3.1.3.3.3.1.8,提供3.2.1.6和3.3.3.1.3至3.3.1.8服务)。在 注册主任更改其认可后,注册主任承认获得赞助的注册主任须拥有业主对第3.2.1.4至3.2.1.6款及3.3.3.1.3至3.3.1.8款所列有关该注册名称的资料要素的 权利,注册主任亦保留该资料中拥有人的权利。本款不禁止注册官(1)以与本协议 和任何规范或政策一致的方式限制大量公众访问数据元素,或(2)根据本协议第3.5款的规定转让其在数据元素中主张的权利。 3.6 数据 托管。在本协议期限内,注册官应按照ICANN规定的格式向ICANN将第3.4.1.2至3.4.1.5款所述数据的电子副本提交给ICANN,或由注册官和ICANN共同 批准的信誉良好的托管代理,任何一方也不得无理拒绝此类批准。数据应根据注 册官、ICANN和托管代理(如有)之间的协议保存,规定(1)数据应接收和托管, 除非验证所保存的数据,直到交给ICANN; (2)数据到期时无需续期或终止; (3)ICANN在托管协议下的权利应随本协议的任何转让而转让。第三方托管应在如果根据本款解除托管,ICANN(或其受让人)应享有非排他性、不可撤销、免版 税的行使许可(仅用于过渡性目的)或已行使提供注册服务所需的所有权利。 3.7 业务交易,包括和已注册名称持有人。 3.7.1如果ICANN采用了ICANN利益相关者集团(或任何后续集团)中反映 的ICANN认可注册商共识支持的规范或政策,建立或批准ICANN认可注册商 的行为准则,注册商应遵守该行为准则。 3.7.2注册官应遵守适用的法律和政府法规。 3.7.3注册官不得向任何实际或潜在的注册姓名持有人代表注册官享有超 过任何其他注册商的注册权限。 3.7.4注册官不得启用任何注册名称,除非及直至其信纳已收到支付其注册 费的合理保证。为此目的,收取信用卡,一般商业条款扩展到有信誉良好 的客户,或其他机制提供类似水平的支付保证,只要支付义务成为最终和不可撤销的注册姓名持有人激活注册。 3.7.5在注册期结束时,如果注册姓名持有人或其代表未能同意在第二次通 知或提醒规定的时间内更新注册,则在没有减轻处罚的情况下,将导致在 自动续期宽限期结束前取消注册(尽管注册官可选择提前取消该姓名)。 3.7.5.1详尽的情况被定义为: UDRP行动,有效的法院命令,失败 的注册的更新过程(不包括注册人未能响应),域名使用名称提供 DNS服务第三方(可能需要额外的时间迁移记录管理的名称),注册 人受到破产程序,支付纠纷(注册人声称支付续期,或支付金额的 差异),账单争议(注册人对账单上的金额有争议),域名须在有 管辖权的法院提起诉讼,或经ICANN特别批准的其他情况。 3.7.5.2注册官选择,在可有可原的情况下,更新域名没有明确同意 的注册人,注册必须保持记录的情况下更新的特定域名ICANN检查符 合条款3.4.2和3.4.3注册认证协议。 3.7.5.3在没有可减轻责任的情况下(如上文第3.7.5.1节所定义) , 必须在注册商或注册人终止注册协议后45天内删除域名。3.7.5.4注册官应向每个新注册人提供通知,说明其删除和自动更新 政策的细节,包括未更新的域名相对于域名的到期日被删除的预期 时间,或不超过十(10)天的日期范围。如果注册商在注册协议期 间对其删除政策做出任何重大变更,则必须至少以同样的努力通知 注册商变更以通知注册商,如注册商(如注册商认证协议第3.7.7条中定义)。 3.7.5.5如果注册商经营一个域名注册或更新的网站,注册商的删 除和自动更新政策的细节必须在网站上清楚地显示。 3.7.5.6如果注册商经营一个域名注册或续期的网站,它应在注册 时和在其网站上明确声明,在赎回宽限期内收回域名所收取的任何费用。 3.7.5.7如果作为UDRP争议主体的域名在争议过程中被删除或到期 , 在UDRP争议中的申诉人将有权选择按照与注册人相同的商业条款 更新或恢复该名称。如果投诉人更新或恢复该名称,该名称将被放 置在注册人持有和注册人锁定状态,注册人的WHOIS联系信息将被 删除,而WHOIS条目将表明该名称存在争议。如果投诉被终止,或UDRP争议发现针对申诉人,该名称将在45天内被删除。注册人保留 现有赎回宽限期规定在赎回宽限期内任何时候收回名称的权利,并 保留在删除前更新名称的权利。 3.7.6注册不得插入或更新任何注册名称注册的方式违反(i)任何共识政策 声明列表或规范的排除注册名称插入或更新时生效,或(ii)任何名单保 留注册要求的特定注册运营商注册提供注册服务。 3.7.7注册官应要求所有注册姓名持有人与注册官签订电子或纸质注册协议 , 至少包括第3.7.7.7.1至3.7.7款中的规定。12,以及该协议另应规定适 用于由注册官赞助的域名的注册的条款和条件。与注册主任签订注册协议 的注册姓名持有人必须是注册官以外的个人或法人,但注册官可是注册域 名的注册姓名持有人,在这种情况下,注册主任须提交第3款所述的条文。 3.7.7.1至3.7.7.12,并应向ICANN负责遵守本协议、规范和政策中规定的注 册姓名持有人的所有义务。注册官应尽商业上合理的努力,强制执行注册 官与任何注册姓名持有人之间有关执行第3.7.7.7.1至3.7.7.12.款或任何 共识政策要求的注册协议的规定。 3.7.7.1注册姓名持有人应向注册员提供准确和可靠的联系方式,并 在注册姓名注册期限内进行更正和更新,包括:注册姓名持有人的 完整姓名、邮寄地址、电子邮件地址、语音电话号码和传真号码; 对于作为组织、协会或公司的注册姓名持有人,被授权人的姓名; 以及第3.3款中列出的数据元素。1.2、3.3.1.7和3.3.1.8。 3.7.7.2注册姓名持有人故意提供不准确或不可靠的信息,故意未在 任何更改后七(7)天内更新向注册商提供的信息,或未在超过十五 (15)天内询问与注册姓名持有人注册相关的联系方式的准确性,将 构成对注册姓名持有人-注册商合同的重大违约,并作为暂停和/或 取消注册姓名注册的依据。 3.7.7.3任何打算许可使用域名给第三方的注册名称持有人仍然是注册名称记录持有人,并负责提供自己的完整的联系信息,并提供和更新准 确的技术和行政联系信息,以方便及时解决与注册名称有关的任何 问题。注册姓名持有人根据本规定许可使用注册姓名应承担因错误 使用注册姓名而造成的损害的责任,除非它向提供注册姓名持有人 合理的可起诉损害证据的一方披露被许可人提供的当前联系信息和 被许可人的身份。 3.7.7.4注册官应向每位新或更新的注册姓名持有人提供通知 , 说明: 3.7.7.4.1拟从申请人处收集的任何个人资料的目的; 3.7.7.4.2数据的预期接收者或接收者的类别(包括注册表操 作员和其他将从注册表操作员接收数据的人); 3.7.7.4.3哪些数据是强制性的,如果有,哪些数据是自愿的; 3.7.7.4.4注册姓名持有人或数据主体如何访问,并在必要时 纠正其持有的数据。 3.7.7.5注册姓名持有人应同意第3.7.7.4款中提到的数据处 理。 3.7.7.6注册姓名持有人应声明已向第3.7.7.4款所述的个人资料 提供与第3.7.7.4款相同的通知,且注册姓名持有人已获得与第3.7.7.5款所述的任何此等第三方个人的同意。 3.7.7.7注册官应同意,它不会以与其根据上述第3.7.7.4款向注册 姓名持有人发出通知的目的和其他限制不兼容的方式处理从注册姓名持有人收集的个人资料。 3.7.7.8注册官应同意,其将采取合理的预防措施,以保护个人数 据不受丢失、误用、未经授权的访问或披露、更改或销毁。 3.7.7.9注册姓名持有人应声明,据注册姓名持有人所知和相信,注册姓名或注册姓名直接或间接使用的方式均不侵犯任何第三方的合法权利。 3.7.7.10对于有关使用注册名称或因使用注册名称而引起的争议, 注册姓名持有人应在不损害其他可能适用的司法管辖区的情况下, 提交注册姓名持有人的住所(1)和(2)注册官所在地的法院的管辖权。 3.7.7.11注册名称持有人应同意其注册名称应根据任何规范或政策 , 或根据任何注册机构或注册程序, (1)纠正注册机构或注册机构在 注册名称时的错误,或(2)解决有关注册名称的争议。 3.7.7.12注册姓名持有人应赔偿和保持注册运营商及其董事、官员 、雇员和代理人的任何索赔、损害、责任、成本、费用和费用(包 括合理的法律费用和费用)。 3.7.8注册官应遵守Whois准确性程序规范中规定的义务。此外,尽管在Whois准确性程序规范相反,注册官应遵守任何共识政策要求合理和商业上可行的(a)验证,在注册时,联系信息与注册名称由注册官或(b)定期再验 证的信息。注册官须在任何人通知与注册官赞助的注册姓名有关的联系资 料不准确后,应采取合理步骤调查所声称的不准确。如果注册官获悉与其 赞助的注册名称有关的联系信息不准确,则应采取合理措施纠正该不准确。 3.7.9注册商应遵守任何禁止或限制注册商的域名仓储或投机的共识政策。 3.7.10注册人应在其网站上发布(/或提供所附的注册人利益和责任规范的 链接,不得采取任何违反本协议或适用法律相应规定的行动。 3.7.11注册官应向注册姓名持有人提供有关注册官服务的客户服务处理 过程的描述,包括提交投诉和解决有关注册官服务的争议的过程的说明。 3.7.12本协议未规定或限制注册医师向注册姓名持有人收取的注册注册金额。 3.8 域名争议 解决方案。在本协议有效期内,注册官应制定解决有关注册名称争 议的政策和程序。在ICANN就解决注册名称争议采取其他共识政策或其他规范或政 策之前,注册官应遵守ICANN网站上确定的统一域名争议解决政策( “UDRP ”)(www.icann.组织/一般/共识政策。,可能不时修改。注册官还应遵守统一快速暂 停( “URS ”)程序或更换程序,以及注册官为其提供注册官服务的注册官运营商 所要求的任何其他适用的争议解决程序。 3.9认证 费用。作为认证的条件,注册官须向ICANN支付认可费。这些费 用包括年费和可变费用。 3.9.1注册官应按照ICANN的公司章程和公司章程,按ICANN董事会规定的 金额向ICANN支付年度认证费。该年度认证费用不得超过4,000美元。年费 的支付应在ICANN开具发票后三十(30)天内到期,但注册官可选择按四 (4)个等额季度分期支付年费。 3.9.2注册官应支付ICANN董事会制定的符合ICANN章程的可变认证费用,但 在每种情况下,此类费用合理分配给与ICANN签订合同的所有注册商,且任 何此类费用必须经注册商明确批准,以支付所有注册商级费用的三分之二。只要注册官与本协议的所有重要条款仍然完全有效,且注册官与ICANN之间存在任何争议,注册官应及时支付这些费用。 3.9.3对于逾期三十(30)天或以上的任何付款,注册官应按每月1.5%的 利率支付利息,或者少于适用法律允许的发票日期或根据本协议第7.6条 发送发票的日期。在ICANN向注册官发出合理通知后,注册官提交的帐目 须经审计后进行核实由ICANN指定的独立第三方提供的注册官的账簿和记录,该第三方应保留 该等账簿和记录的机密性(其对账目的准确性和任何必要的更正除外)。 3.9.4本协议项下到期的认证费用不含税费。任何政府或其任何政治部门征 收的任何形式的政府费用(包括销售、营业额、服务、使用和增值税)均应由注册官承担,不得视为认证费用的扣除或抵销的一部分。除适用法律 规定外,ICANN的所有付款不得因任何税款、关税、收费、罚款而扣除或预 扣,在这种情况下,注册官在扣除或预扣后应增加等于扣除或预扣的金额的净额。 3.10 保险。注册员应维持ICANN规定的商业一般责任保险或类似责任保险,保险 单限额至少为500,000美元,包括本协议期间注册员业务产生的责任。 3.11义务 的 注册机构在…下面常见的控制兴趣如果下列情况,注册官应违反本协议: 3.11.1 ICANN终止一个附属注册商与ICANN的认证协议(一个“ 附属公司 终止 ”); 3.11.2附属注册官未就ICANN根据本协议第5.8条终止附属注册商认可协 议的权利发起仲裁,或发起该仲裁且未胜诉; 3.11.3子公司的终止是由于严重损害消费者或公共利益的不当行为造成的; 3.11.4第二附属注册机构,在附属机构终止后,追求导致附属机构 终止的相同行为过程; 3.11.5 ICANN已向注册官发出书面通知,说明它打算主张本第3.11条关 于注册官的规定,该通知应合理详细地确定该主张的事实依据,而登记官未能在该通知发出后十五(15)天内纠正被指控的行为。 3.12义务相关向准备金的登记员服务通过 第三 各方。注册商负责为注册商赞 助商按照本协议提供的所有注册名称提供注册商服务,无论注册商服务是否由注 册商或第三方提供,包括经销商。注册商必须与其所有经销商签订书面协议,使 注册商能够遵守并履行其在本协议项下的所有义务。此外,注册官必须确保: 3.12.1其经销商不显示ICANN或ICANN认证的注册商标志,或以其他方式代 表自己被ICANN认证,除非他们得到ICANN的书面许可。 3.12.2经销商使用的任何注册协议均应包括经销商所要求的所有 注册协议规定和通知ICANN注册认证协议和任何ICANN共识政策,并应确定赞助注册或提供确 定赞助注册的方法,如到InterNIC Whois查询服务的链接。 3.12.3其经销商在客户询问后确认赞助注册商。 3.12.4其经销商遵守任何icann采用的规范或政策,这些规范或政策为提供 代理和隐私注册服务的个人或实体建立了认证计划( “代理认证计划 ”)。除其他功能外,代理认证计划可能要求: (i)代理和隐私注册服务仅由 ICANN根据该代理认证计划认证的个人或实体就域名注册提供域名注册;以 及(ii)注册商应禁止经销商在知情的情况下接受未经ICANN根据代理认证 计划认证的代理和隐私注册服务提供商的注册。在代理认证计划建立之前 , 注册商应要求分销商遵守本协议所附的隐私和代理注册规范。 3.12.5为其经销商的客户提供了一个指向ICANN网页的链接,其中 详细介绍了注册人的教育信息,详见下文第3.16小节。 3.12.6如果注册商发现经销商导致经销商违反本协议的任何规定,注册商 应采取合理步骤执行与分销商的协议,以纠正和防止进一步的不遵守情况。 3.12.7其经销商应在其网站上发布(/或提供所附的注册人利益和责任规范 的链接,不得采取任何与本协议相应规定或适用法律相一致的行动。注册商须尽商业上合理的努力,强制执行注册商与任何转售商之间的协议的规定。 3.13注册官 训练下文第7.6款所述的注册人的主要联系人或指定人(只要指定人 受雇于注册人或附属注册人)应完成一门涵盖ICANN政策和协议下注册人义务的 培训课程。本课程将由ICANN免费提供给注册主任,并须以网上格式提供。 3.14义务 相关 向 代表权 和 隐私权 服务注册官同意遵守icann采用的任何建立代 理认证计划的规范或政策。注册官还同意与ICANN合理合作开发该项目。在代理认 证计划建立之前,注册官同意遵守本协议所附的隐私和代理注册规范。 .153注册员 自我评估 和 审计。注册员须不时与注册员协商,按ICANN指定的表格 , 填写并向ICANN提交注册员自我评估。注册官应在每个日历年结束后的二十(20 ) 天内,以ICANN指定的形式,向ICANN交付由总统、首席执行官、首席财务官或 首席运营官(或其同等人员)签署的证书,证明符合本协议的条款和条件。ICANN 可以不时(每日历年不超过两次)进行行为,或聘请第三方代表其进行合同符合 性审计,以评估注册官是否遵守本协议的条款和条件。根据本第3.15条进行的任 何审计应达到评估合规性的目的,ICANN将(a)提供合理的提前通知,该通知应合 理详细说明ICANN要求的文件、数据和其他信息的类别, (b)使用商业合理努力以 不不合理地干扰注册操作的方式进行此类审计。作为审计的一部分,应ICANN的要 求,注册官应及时提供所有响应文件、数据和任何其他必要的信息,以证明注册 官遵守本协议。在不少于十(10)天的通知后(除非注册官另有同意),ICANN可 以作为任何合同合规审计的一部分,在定期营业时间进行现场访问,以评估注册 官是否遵守本协议的条款和条件。除非适用法律、法律程序或任何规范明确允许 的要求,ICANN不得披露通过此类审计收集的注册员机密信息政策(包括ICANN的文件信息披露政策,该政策可不时修订);但是,除适用法律 或法律程序要求外,ICANN不得发布任何注册官标记为或书面指定给ICANN为“机 密商业秘密 ”、“机密商业信息 ”或“机密财务信息 ”的信息。如果任何适用的 法律、法律程序或规范或政策允许披露,ICANN将在不少于十五(15)天内通知注 册官其披露该信息的意图,除非法律或法律程序禁止该通知。该等通知应包括ICANN计划向谁以及以何种方式披露该等信息。 3.16链接向 注册人 教育 信息ICANN已经发布了一个教育网页,总结了注册商认可 协议的条款和相关的共识政策 (截至本协议签订之日,位于: http://www.icann.org/en/registrars/registrant-rights-responsibilities- en.htm).注册官须在其可能运营的任何网站上提供该网页的链接,至少与ICANN 共识政策要求显示的政策或通知链接一样清晰。ICANN可与注册商协商,更新本网 站的内容和/或网址。 3.17注册官 联系 业务 组织 和 军官 信息注册官应向ICANN提供信息,并保持本协 议注册官信息规范中规定的准确和最新的信息。此外,注册官须在注册官提供或 提供服务的每个网站上公布《注册官信息规范》中指明的资料。注册官应在该等 信息的任何更改的五(5)天内通知ICANN,并在任何更改后的二十(20)天内更新 注册官的网站。 3.18注册官 滥用联系和 责任 向 调查 报告ofAbuse. 3.18.1注册官应保持虐待联系,以接收由注册官赞助的涉及注册姓名的虐 待报告,包括非法活动的报告。注册官须在注册官网站的主页(或在ICANN可能不时指定的其他标准化地点)公布一个电子邮件地址,以接收 该等报告。登记官应采取合理和迅速的步骤,调查任何有关滥用职权的报 告,并作出适当的回应。 3.18.2注册应当建立和维护一个专用的滥用接触点,包括一个专用的电 子邮件地址和电话号码监控一天24小时,一周七天,收到报告的非法活 动由执法、消费者保护、准政府或其他类似当局不时指定的国家或设立或维持实体办事处的司法辖区的领土政府。提交给这些联系人的有充 分根据的非法活动报告必须在24小时内进行审查,注册官授权该个人对该 报告采取必要和适当的行动。在回应任何此类报告时,注册官无须采取任 何违反适用法律的行动。 3.18.3注册官应在其网站上发布其接收、处理和跟踪滥用报告的程序。注 册官应记录其收到和对所有此类报告的答复。注册官应保存与该报告有关 的两(2)年或适用法律允许的最长期限,并在该期间,应在合理通知后向 ICANN提供该记录。 3.19附加 技术的 技术规格 向 实施 IPV6, 数据存储器 和 idn。注册官应遵守本 协议所附的附加注册操作规范。 3.20通知 的 破产, 定罪 和 保护措施 违反。注册官将在(i)第5.5.8条所述的任何 法律程序开始后的七(7)天内发出ICANN通知。(ii)发生第5.5.2条或第5.5.3条 规定的任何事项,或(iii)对注册人帐户信息或登记数据的任何未经授权的访问 或披露。根据第(iii)款所要求的通知,须包括未经授权进入的类型、如何发生 、受影响的注册人数,以及注册官为此而采取的任何行动。 3.21义务 的 注册机构 附属机构 和 注册表 操作员。如果注册官在本协议有效期内 隶属于任何注册运营商或后端注册运营商(一种“ 附属关系 ”),注册官应遵守 所有ICANN规范和政策,并将在产生附属关系的事件发生后三十(30)天内通知ICANN(e。g., 完成任何合并、收购或其他交易,或执行任何协议,在每种情况下 , 产生此种关联关系)。 3.22合作 和 紧急情况 注册表 服务 提供商。如果ICANN将注册商赞助注册名称的注 册操作转换到紧急注册服务提供者,注册商应在所有合理方面与紧急注册服务提 供者合作,包括与该提供商签订注册协议,并提供紧急提供商合理要求的所有注 册名称持有人数据,以促进gTLD注册的有效过渡。 4.制定或修订规范和政策的程序。 4.1 合规性 和 共识 政策 和 临时的 政策。在本协议有效期内,注册官应遵守并执 行截至生效日为止存在的所有共识政策和临时政策 http://www.icann.org/general/consensus-policies.htm,可能在未来开发和采 用按照ICANN章程,提供这样的未来的共识政策和临时政策采用按照程序和有关这 些主题和这些限制提出的共识政策和临时政策规范本协议。 5.期限、终止和争议解决。 5.1 期限 的 协议。本协议于生效日生效,初始期限持续至到期日,除非提前终止。 5.2 续订。本协议和注册商认证将在本协议有效期内连续延长五(5)年,此后根 据本协议条款规定的每个有效期为5年,除非: 5.2.1在续期时,注册商不再符合当时有效的ICANN注册商认证标准; 5.2.2注册商在到期日期或之后任何连续五(5)年期限到期时未履行其 在本协议项下的义务; 5.2.3注册官已在到期日前两(2)年或之后任何连续五(5)年到期日期内通 知本协议三(3)项或以上的重大违约; 5.2.4本协议已在到期日或此后任何连续五(5)年期限的到期日之前终 止。 如果注册官打算根据本第5.2条续签本协议,注册官应在有效期届满前不超过九十 (90)天和不少于六十(60)天以及此后的连续五(5)年内向ICANN提供书面通知 。该等通知的规定不应作为本协议项下续期的条件。根据其惯例(可能由ICANN进 行修改),ICANN将向注册官提供关于本协议项下的任何后续期限的到期日期和到 期日期的通知。 5.3 右边的 向 替代品 已更新 协议。如果在本协议期限内,ICANN采用修订形式的 注册商认可协议( “更新的RAA ”),注册商(如果未收到(i)未补救的违约通知 或(ii)根据本第5条终止或中止本协议的通知)可通过给予ICANN书面通知选择 加入更新的RAA。如果发生此类选择,注册官和ICANN应尽快进入更新的RAA中规 定的期限的更新的RAA,本协议将被视为终止。 5.4 终止 的 协议 通过 注册官。注册官可在本协议期满前给予ICANN三十(30)天 的书面通知以终止。在注册官终止后,注册官无权获得根据本协议向ICANN支付 的任何费用的退款。 5.5 终止 的 协议 通过 赋值名称与数字互联网公司有下列情况之一的,ICANN 可在本协议到期前终止: 5.5.1注册官对认证或更新认证的申请或与申请相关的任何材料中存在重 大失实陈述、重大不准确或重大误导性陈述。 5.5.2 注册人: .5.2.15被有管辖权的法院判定为与金融活动有关的重罪或其他严重罪 行,或被有管辖权的法院判定有: 5.5.2.1.1犯欺诈 5.5.2.1.2违反了受托责任 5.5.2.1.3在实际了解(或通过重大疏忽)的情况下,允许在 注册或使用域名或向注册人员提供不准确的组织信息时进行 非法活动; 5.5.2.1.4未能遵守由有管辖权的法院发出的有关使用由注册 官赞助的域名的命令的条款; 或ICANN合理认为与上述任何规定实质等同的司法裁定的主体; 5.5.2.2因涉及不诚实或滥用他人资金的行为而受到其住所地政府 的处分; 5.5.2.3是法院或仲裁法庭发布的非中间命令的主体,在每个有管辖 权的案件中,发现注册官直接或通过关联公司具体违反了与域名抢 注或其同等法规相关的适用国家法律或政府法规; 5.5.2.4由ICANN发现,基于其审查仲裁法庭的结果,已经从事,直 接或通过其子公司,在模式和实践贩卖或使用域名相同或令人困惑 的商标或服务的商标第三方商标注册的持有人没有权利或合法权益 , 商标已经注册和被恶意使用。 5.5.3注册官故意雇佣任何官员被判轻罪与金融活动或任何重罪,或由法院 管辖犯有欺诈或违反信托责任,或司法决心的主题ICANN合理认为实质性相 当于上述任何,这样的官员不会在注册的知识三十(30)天内终止;或任 何注册的董事会或类似管理机构的成员被判轻罪与金融活动或任何重罪,或由法院的管辖权犯有欺诈或违反信托责任,或司法决定,ICANN合理认为 实质性相当于上述的任何成员不会在注册了解上述三十(30)天内从注册 董事会或类似的管理机构。 5.5.4注册官未能在ICANN发出违约通知后的第20天(21)天内纠正任何 违反本协议的行为。 5.5.5注册官未能遵守第5.7或7.1条授予具体履行的裁决。 5.5.6注册官在十二(12)个月内至少三(3)次严重违反了本协议项下 的义务。 5.5.7注册官在收到三(3)天的通知后,继续以ICANN合理确定危及互联网 的稳定性或操作完整性的方式行事。 5.5.8 (i)注册官为债权人的利益或类似行为作出转让;(ii)对注册 官提起扣押、扣押或类似程序,这些程序对注册官为g tld提供注册服务 的能力构成重大威胁,而不是在其生效后六十(60)天内被驳回;(iii)指定受托人、接管人、清算人 或同等人员或控制注册官的财产;(iv)对注册官的任何财产执行, (v)注 册官根据任何破产、破产、重组或其他有关债务人救济的法律提起诉讼,此类程序在其生效后三十(30)天内不被驳回,或(vi)注册官根据美国 破产法,11 U.S.C.提出的保护申请第101节等。或外国同等物或清算、解 散或以其他方式停止其经营。 5.6 终止 程序。在上述第5.5.1款至第5.5.6款所述的情况下,本协议只能在向注 册官发出十五(15)天的书面通知后(在第5.5.4款的情况下)终止,在此期间, 注册官有机会根据第5款发起仲裁。8.以确定在本协议项下终止合同的适当性。在 第5.5.7款和第5.5.8款所述的情况下,本协议可在通知注册官后立即终止。 5.7 悬浮 5.7.1在发生第5.5条规定的任何情况后,ICANN可根据ICANN自行决定,在 根据第5.7.2款的规定发出通知后,选择暂停注册官创建或赞助新注册名 称或发起注册域名的任何或所有注册域名生效后的十二(12)个月。注册官的暂停并不排除ICANN根据第5.6条的通知要求发出终止通知的能力。 5.2.7第5.7.1款下的任何暂停将在给注册官十五(15)天书面通知后生效 , 在此期间注册官有机会根据第5.8款发起仲裁,以确定本协议下暂停的 适当性。 5.7.3在暂停后,注册官应通过在其网站上发布突出公告通知用户,它无法 创建或赞助新的gTLD域名注册或发起注册名称的入站转移。注册官的通知 须包括与ICANN的暂停通知的链接。 5.7.4如果注册官以ICANN合理确定危及互联网的稳定性或操作完整性的 方式行事,并且经通知不立即补救,ICANN可暂停本协议五(5)个工作日 , 等待ICANN根据第7.1款申请更多延长的具体性能或禁令救济。悬浮本款的协议,在ICANN的唯一判断,排除注册(i)提供注册服务委托注册通 知的日期注册和(ii)创建或赞助新的注册名称或发起入站转移注册名称 的注册域名。注册官还必须张贴第5.7款中规定的声明。 5.8 分辨率 的 争议 位于……之下 这 协议。根据第6节和第7.4节规定的限制,本协 议或与本协议有关的争议,包括(1)ICANN未能续签注册认证引起的争议和(2)具体 履行的请求,应在有管辖权的法院解决,或根据美国仲裁协会(AAA)通过第5.8 款规定的仲裁解决。仲裁应以英语进行,并应在美国加利福尼亚州的洛杉矶县进 行。除第7.4.5节规定外,双方从AAA仲裁员名单中约定一(1)名仲裁员,或者如果 双方在AAA要求双方指定仲裁员的十五(15)天内未同意仲裁员,AAA应选择并指 定一名仲裁员,充分考虑仲裁员对DNS的了解。双方应以同等的份额承担仲裁费用 , 但仲裁员有权按照AAA规则的规定在其裁决中重新分配仲裁费用。当事人应当自 行承担与仲裁有关的律师费,仲裁员不得根据裁决结果重新分配律师费。仲裁员 应在仲裁听证会结束后的九十(90)天内作出裁决。如果注册员发起仲裁,对ICANN根据第5.5条终止本协议或ICANN根据第5.7条暂停终止注册员是否合适提出 异议。注册官可同时要求仲裁小组中止终止或中止,直至作出仲裁决定。仲裁小 组应下令中止: (i)注册官证明继续经营不会损害消费者或公众利益,或(ii)仲 裁小组指定合格的第三方来管理注册官的运作,直至作出仲裁决定。为促进上述 第(ii)款,仲裁委员会特此获得一切必要的权力,根据注册委员会的要求,任 命一名合格的第三方来管理注册官的运作。在选择第三方经理时,仲裁小组应考 虑到注册官所表达的任何偏好,但不受其约束。任何批准暂缓执行请求的命令,必须在提交仲裁后的十四(14)天内发出。如果在十四(14)天内未发出批准延 期请求的命令,ICANN有权根据第5.5条继续终止本协议,或根据第5.7.1条暂停注 册官。如果注册官发起仲裁,对独立审查小组根据第4.3.3款提出的决定提出异议 , 以维持ICANN董事会认为一个规范或政策得到协商一致支持的决定,注册官可同 时要求仲裁在仲裁决定作出之前,委员会应保留遵守该政策的要求,而该要求应保留直到该 决定或仲裁小组批准ICANN解除中止请求的要求。在涉及本协议的ICANN的所有诉 讼中(无论是在未选择仲裁或执行仲裁裁决的情况下),此类诉讼的管辖权和专 属地点应在位于美国加利福尼亚州洛杉矶的法院;但是,双方也有权在任何有管 辖权的法院执行该法院的判决。为了帮助仲裁和/或保存当事人的权利在悬而未决 的仲裁,当事人有权寻求临时或初步禁令救济仲裁小组或法院位于洛杉矶,加利 福尼亚州,美国,不得放弃本仲裁协议。 5.9 限制 在…上 货币补救措施 为了违规行为 的 这 协议。ICANN违反本协议的行 为的总总额不等于注册官根据第3款向ICANN支付的认证费用。本协议在前12个月 内。注册官因违反本协议而向ICANN承担的金钱责任应限于ICANN在本协议项下的 认证费用,除对本协议的解释存在善意分歧外,应向ICANN支付合理的、直接的费 用,包括律师费、员工时间和与合法努力相关的其他相关费用,以及ICANN为应对 或减轻此类行为对注册姓名持有人和互联网社区的负面后果而产生的费用。如果 反复故意严重违反本协议,注册官应承担高达ICANN执行费用的五(5)倍的制裁,但在其他情况下,任何一方均不对任何违反本协议的特殊、间接、附带、惩罚性 、惩戒性或相应的损害赔偿负责。 6.修正案和弃权。 6.1如果ICANN董事会确定需要修订本协议(包括此处提及的规范,除非该规范 明确不允许修订)和ICANN与适用注册机构之间的所有其他注册协议( “适用注 册协议 ”)(每个均为“特别修订 ”),则ICANN可根据本第6节规定的要求和 程序采用特别修订;但特别修订不得为限制性修订。 6.2在提交特别修正案供注册官批准之前,ICANN应首先就该特别修正案的形式和 实质与工作组进行真诚的协商。该等协商的持续时间应由ICANN根据特别修正案的 实质内容合理确定。接下来的在此等协商中,ICANN可建议通过在其网站上公开张贴不少于三十(30)个日历天 (“张贴期 ”),并根据第7.6条的规定。ICANN将考虑在发布期间就特别修正案 提交的公众意见(包括适用注册机构提交的意见)。 6.3如果在发布期( “批准期 ”)到期后一百八十(180)个日历日内,ICANN董事 会批准特别修订(可能与提交公众意见的形式不同,但必须处理提交公众意见的 特别修订的主题,以反映和/或处理工作组的输入和公众意见进行修改),ICANN 应提供通知并提交该特别修订,供适用注册机构批准或不批准。如果在ICANN向适 用注册官发出通知后的六十(60)个日历日内,该特别修订收到注册官批准,该 特别修订应视为适用注册官批准( “批准修订 ”),并在ICANN发出批准注册官通 知后的六十(生效日期)被视为本协议的修订。如果特别修订未获注册官批准,则特别修订应视为未获适用注册官批准( “被拒绝修订 ”)。除以下规定外,被 拒绝的修正案对本协议的条款和条件没有任何影响。 6.4如果ICANN董事会合理地确定被拒绝修正案属于共识政策和临时政策规范第1.2 节规定的主题类别,ICANN董事会可以通过通用名称支持机构( “GNSO ”)通过决 议(通过该决议的日期称为“决议采纳日期 ”),要求该决议发布报告(ICANN章 程中定义)。GNSO根据所要求的发布报告进行的政策制定过程在此被称为“PDP ” 。如果这样的PDP结果最终报告支持GNSO绝对多数(定义在ICANN的章程), (i)建 议采用拒绝的修正案作为共识政策或(ii)建议反对采用拒绝修正案作为共识政策 ,,在上述(i),董事会采用这样的共识政策,注册官应遵守其根据本协议第4条的 义务。在任何一种情况下,ICANN都将放弃被拒绝的修正案,它对本协议的条款和 条件没有任何影响。尽管上述规定的6.4节,ICANN董事会不得启动PDP对拒绝修正 案,如果在任何时候在十二(12)个月之前提交的拒绝修正案注册批准根据第6.3 节,拒绝修正案的主题终止或被放弃或终止PDP的主体。 6.5如果(i)被拒绝的修正案不属于共识政策和临时政策规范第1.2节规定的主题类 别,(ii)被拒绝修正案的主题是在提交第6节之前的十二(12)个月内的任何时 候。3、结论的主题或放弃或终止PDP没有导致GNSO绝对多数建议,或(iii)PDP不导致最终报告支持GNSO绝对多数(a)建议采用拒绝修正案共识政策或(b)建议反 对采用拒绝修正案共识政策(或等PDP已被放弃或终止的任何原因),然后,在任 何这种情况下,这种被拒绝的修正案仍可以下列方式获得通过并生效。为了通过 被拒绝的修正案,必须满足以下要求: 6.5.1被拒绝的修正案的主题必须在ICANN的任务范围内,并与其核心价 值观的平衡应用相一致(如ICANN的章程所述); 6.5.2拒绝修正案必须合理的实质性和令人信服的原因在公共利益,必须 可能促进这样的利益,考虑竞争公共和私人利益可能受到拒绝修正案,并 且必须勉强定制,没有比合理必要的解决这样的实质性和令人信服的原因 在公共利益; 6.5.3程度拒绝修正案禁止或要求行为或活动,征收物质成本适用的注册 , 和/或大大减少公众访问域名服务,拒绝修正案必须最少限制手段合理 可以解决公共利益的实质性和令人信服的原因; 6.5.4ICANN董事会必须提交被拒绝修正案,以及关于被拒绝修正案符合上 述(i)至(iii)款规定要求的理由的书面解释,供不少于三十条的公众评 论(30) 日历日; 6.5.5这样的公众评论期后,ICANN董事会必须(i)参与协商(或直接ICANN 管理参与协商)与工作组,主题专家,GNSO的成员,相关咨询委员会和其 他相关利益相关者对这样的拒绝修正案一段不少于六十(60) 日历日;(ii)协商后,以投票的工作组和公众的意见),并考虑 影响ICANN的任何政策,包括ICANN的利益冲突政策( “董事会修正案 ”)。根据第6.6条,此类董事会修正案应视为批准修正案,并在ICANN提供的六十(60 ) 个日历日内生效(生效日期应视为本协议项下的修正案生效日期)。尽管有上 述规定,董事会修正案不得修改ICANN根据本协议收取的注册员费用,也不得修改 本第6条。 6.6尽管有第6.5节的规定,如果在ICANN董事会批准后的三十(30)个日历日的董 事会修正案期间,工作组代表适用注册人向ICANN董事会提交替代董事会修正案 ( “替代修正案 ”),则董事会修正案不应被视为批准修正案: 6.6.1阐述了工作组提出的修改本协议以代替董事会修正案的精确文本; 6.6.2陈述了由ICANN董事会确定的作为董事会修正案的理由的实质性和令 人信服的公共利益理由; 6.6.3相比董事会修正案是: (a)更狭窄地解决这样的实质性和令人信服的 原因在公共利益,和(b)在某种程度上替代修正案禁止或要求行为或活动, 强加材料成本影响注册官,或实质性减少访问域名服务,是一个较严格的手段来解决实质性和引人注目的原因在公共利益。不符合第6.6.1至6.6款要求的任何拟议修正案。3.在前一句中,不得被视为本协 议项下的替代修正案,因此不得取代或延迟董事会修正案的效力。如果在向ICANN董事会提交替代修正案后,替代修正案获得注册官的批准,替代修正案将 取代董事会修正案,并应被视为本协议下批准的修正案(并应有效并被视为对本 协议的修改ICANN向注册官提供批准该替代修订的通知后的六十(60)个日历日内,该生效日 期应视为本协议项下的修订生效日期),除非在工作组通知ICANN董事会批准该替 代修订之日起的六十(60)个日历日内(在此期间ICANN应就替代修订与工作组接 触),ICANN董事会通过至少三分之二的ICANN董事会成员的赞成票投票,考虑到 任何ICANN政策,包括ICANN的利益冲突政策,拒绝替代修正案。如果(A)替代修正 案在提交适用注册机构的替代修正案后三十(30)天内未获得注册机构批准(工 作组应通知ICANN),或(B)ICANN董事会通过三分之二投票拒绝替代修正案,董事 会修正案(而非替代修正案)应在ICANN提供注册机构通知日期后六十(60)个日 历日(生效日期应视为本协议项下的修正案生效日期)生效。如果ICANN董事会拒 绝了一个替代修正案,董事会应发布一份书面理由,阐述其对第6.6.1至6.6节中 所列标准的分析。3.ICANN董事会拒绝本协议项下的替代修正案的能力并不免除董 事会确保任何董事会修正案符合第6.5.1至第6.5.5条中规定的标准的义务。 6.7如果注册官认为经批准的修正案不符合本第6条规定的实质性要求,或违反本 第6条的任何程序规定,注册官可根据第5.8条规定的争议解决条款对该特别修正 案的通过提出质疑,但该仲裁应由三人仲裁小组进行。任何此类质疑必须在ICANN 向已批准修正案的注册人发出通知后的六十(60)个日历日内提出,ICANN可将注 册人(包括注册人)提出的所有质疑合并为单一程序。经批准的修正案将被视为 在争议解决过程的未决期间没有修改本协议。 6.8注册官可在ICANN发出经批准的修正案通知后的三十(30)个日历日内,以书 面形式向ICANN申请豁免经批准的修正案(每次由注册官提出的“豁免申请 ”)。 6.8.1每个豁免请求都将阐明该请求的基础,并为豁免于经批准的修正案提 供详细的支持。豁免申请还可包括对该等注册官提出的已批准修正案的任 何替代方案或变更的详细描述和支持。 6.8.2只有在注册官明确和令人信服的证明,遵守已批准的修正案与适用 法律相冲突,或会对注册官的长期财务状况或经营结果产生重大不利影响 时,才可批准豁免申请。如果ICANN根据其合理的酌情权确定,批准该等 豁免请求将对注册人造成重大损害,或导致拒绝对注册人提供直接利益, 则不会批准任何豁免请求。 6.8.3在ICANN收到豁免请求后九十(90) 日历日内,ICANN应批准(批准可 能具有条件或包括批准修正案的替代或变更)或书面拒绝豁免请求,在此 期间批准的修正案不会修改本协议。 6.8.4如果豁免请求经ICANN批准,则批准的修改将不会修改本协议;但ICANN要求的批准修改的任何条件、替代或变更应有效,且在适用范围内, 将在修改生效日期之前对本协议进行修改。如果ICANN拒绝该豁免请求,则 批准的修正案将在修正案生效日期修改本协议(或者如果该日期已通过,该批准的修正案应视为立即生效),但注册官可在收到ICANN决定后三十 ( 30)个日历日内对ICANN根据第5.8条规定的争议解决程序拒绝豁免请求的 决定提出上诉。 6.8.5经批准的修改将被视为在争议解决过程的未决期间没有修改本协议。 .8为免生疑问,只有注册官根据本第6条经ICANN批准或根据第5条通过的仲 裁决定提交的豁免申请才能免除注册官任何已批准的修订,而向任何其他 适用注册官提交的豁免申请(通过ICANN或仲裁)不得具有本协议的效力或 免除注册官任何已批准的修订。 6.9除第4节、第5.3节、第6节、第7.4节以及本协议和规范另有规定外,本协议 或本协议的书面规定,且本第6节或第7节均无约束力。4应限制ICANN和注册商对 双方单独协商的本协议进行双边修改和修改。对本协议任何条款的放弃均不具有 约束力,除非由放弃遵守该条款的一方签署的书面文件证明。不放弃本协议的任 何条款或未能放弃执行本协议的任何规定应被视为或构成对本协议任何其他条款的放弃,除非另有 明确规定,任何此类放弃均不构成继续放弃。为免生疑问,本节第6节或第7节中 无任何内容。4应被视为限制注册官遵守第4条的义务。 6.10尽管本第6条有任何相反的规定, (a)如果注册官提供证据证明ICANN合理满意 批准的修正案将大大增加提供注册服务的成本,那么ICANN将允许一百八十(180 ) 日历天的批准修正案对注册官生效,如果注册官根据第5.4条向ICANN提供不可 撤销的终止通知, (b)根据第6条通过的任何批准修正案将对注册官生效。 7.杂项规定。 7.1 具体的 表演虽然本协议有效,但任何一方均可按照第5.8条规定的方式寻求 具体履行本协议的任何条款,但要求履行该等义务的一方并非重大违反其义务。 7.2 处理 通过 赋值名称与数字互联网公司 的 注册商提供 数据。在收到注册官提供 的任何个人资料前,ICANN须以书面形式向注册官指明ICANN打算使用该等个人资 料的目的和条件。ICANN可不时向注册官提供有关该等目的和条件的修订规范,该 规范应在向注册官提供后不少于三十(30)天内生效。ICANN不得将注册官提供的 个人资料用于与提供个人资料时有效的规范不一致的目的或条件。ICANN应采取合理措施,避免第三方使用与规范不一致的个人数据。 7.3转让; 变更 的 所有权 或 经营7.3.1本7.3节规定除外。1、任何一方只有在另一方事先书面同意后方可转 让或转让本协议,不得无理拒绝。如果ICANN未能在收到转让请求通知后三 十(30)个日历日内明确提供或拒绝同意本协议的任何请求转让( “转让请 求 ”)(或者,如果ICANN要求注册官提供有关审查该请求的额外信息,在 收到有关该请求的所有书面信息后的六十(60)个日历日内),ICANN应被 视为同意该请求的转让。尽管有上述规定, (i)经ICANN董事会批准,ICANN 可未经注册官同意而转让本协议重组、重组或重组ICANN等受让人的明确承担本协议的条款和条件,(ii)注册可以分配本协议不同意ICANN注册的全资子公司的子公司的明示承担本 协议的条款和条件,和(iii)ICANN应被视为同意转让请求,其中与该转让 请求相关的受让人与ICANN签订了注册认证协议(前提是该受让人在所有重 要方面均符合该注册认证协议的条款和条件),除非ICANN在根据本第7.3.1 条收到该转让请求通知后十(10)个日历日内向注册官对该转让请求提出书 面异议。 7.3.2如果一个实体获得了注册官的股票、资产或业务的控股权益,注册官 应在该等收购后的七(7)天内提供ICANN通知。该等通知应包括一份声明,确 认注册人员符合当时有效的认证规范或政策标准,并符合其在本协议项下的 义务。在通知后三十(30)天内,ICANN可以向注册官提供额外的信息,以 遵守本协议,在这种情况下,注册官必须在十五(15)天内提供所要求的信 息。任何有关注册官继续认证的争议,应根据第5.8条予以解决。 7.4 谈判 过程。 7.4.1如果是ICANN的首席执行官( “CEO ”)或注册利益相关者集团主席( “主席 ”)希望讨论本协议的任何修订,首席执 行官或主席应向对方提供书面通知,合理详细说明本协议的建议修订( “谈 判通知 ”)。尽管有上述规定,首席执行官和主席均不得(i)修改本协议,(ii)在2014年6月30日或之前根据第7.4节修改本协议,或(iii)在2014 年7月1日开始的任何12个月期间提出修改或提交谈判通知。 7.4.2在收到首席执行官或该公司的谈判通知后ICANN主席和工作组应就本协议拟议修订的形式和实质进行真诚协商(本 协议拟议修订),至少九十(90)个日历天(除非提前达成决议),并试 图就拟议修订达成双方可接受的协议( “讨论期 ”)。 7.4.3如果,在讨论期结束后,一个协议是就拟议修订达成协议,ICANN应在其网站上不少于三十(30)个日历天( “ 发布期 ”)发布双方同意的建议修订以征求公众意见,并根据第7.6条向所 有适用的注册商提供此类修订的通知。ICANN和工作组将审议在发布期间对 拟议修订所提交的公众意见(包括适用登记处所提交的意见)。在发布期结 束后,建议的修订应提交注册官批准和ICANN董事会批准。如果获得此类批 准,建议的修订应被适用的注册官和ICANN视为批准的修订,并在ICANN向注 册官发出六十(60)个日历天的通知后被视为对本协议的修订。 7.4.4如果,在讨论期结束后,一个协议是ICANN与拟议修订工作组未达成协议,首席执行官或主席可提供对方书面通 知( “调解通知 ”),要求双方根据以下条款和条件通过公正、促进(非评 估)调解来解决与拟议修订相关的分歧。如果提供了调解通知,ICANN和工 作组应在其十五(15)个日历日内,同时在ICANN的网站上发布他们所需的 建议修订版本的文本和与其相关的立场文件。 7.4.4.1调解应由双方选定的一名调解员进行。如果双方不能在收到 调解通知的首席执行官或主席后的十五(15)个日历日内就调解人 达成一致,双方将立即选择一个双方都可接受的中介供应商实体,该实体应在该实体的选择后尽快指定一名调解员,并在调解特定争 议的必要程度上,具有域名系统的一般知识。任何调解人必须以书 面确认他或她不是,在调解期间也不会成为ICANN的雇员、合伙人、 执行董事、董事或证券持有人或适用的注册官。如果指定的调解员 未提供此类确认,则应根据本节第7.4.4.1条指定一名替代调解员。 7.4.4.2调解人应按照其与当事人协商后确定的便利性调解的规则和 程序进行调解。双方应真诚地讨论争议,并试图在调解人的协助下,友好解决争议。 7.4.4.3当事各方应自行承担调解费用。双方应当平分调解人的 费用和费用。 7.4.4.4如果在调解期间达成协议,ICANN应在其网站上发布双方同意的建议修订,并根据第7节ICANN向所有适用的注册机构发出 通知,工作组将考虑在发布期间对商定的建议修订提交的公众意见 (包括适用注册机构提交的意见)。在发布期结束后,建议的修订 应提交注册官批准和ICANN董事会批准。如果获得此等批准,建议的 修订应作为适用注册官和ICANN批准的修订,并在ICANN向注册官发 出六十(60)天通知后视为对本协议的修订。 7.4.4.5如果双方在调解通知首席执行官或主席收到调解通知后九 十(90)个日历日内未因任何原因解决争议,调解将自动终止(除 非经双方同意延长)。调解人应向各方提供在未来仲裁中可能考虑 的问题的定义。这些问题受以下第7.4.5.2节规定的限制。 7.4.5.如果经过调解,ICANN和工作组没有就拟议修订达成协议,首席执行官或主席可提供他人书面通知( “仲裁通知 ”) , 要求ICANN和适用注册运营商通过有约束力的仲裁通过仲裁解决争议 , 遵守本第7.4.5节的要求和限制。 7.4.5.1如果发出仲裁通知,调解人对问题的定义以及拟议的修订 ( 来自ICANN、注册官或两者的修订)应张贴在ICANN的网站上供公众 评论,为期不少于三十(30)个日历天。ICANN和工作组将审议在发 布期间对拟议修订提交的公众意见(包括适用注册官提交的意见), 有关此类意见和审议的信息应提供给三(3)人仲裁员小组。各方可 以在发布期之前和之后进行建议修改。仲裁程序不得在该公众评论期结束前开始,ICANN可将登记官(包括登 记官)提出的所有挑战合并为单一程序。但本节第7.4.5节中规定 的除外。1、仲裁应按照第5条的规定进行.8.7.4.5.2对于拟议修订的争议, (i)涉及共识政策,(ii)属于共识 政策和临时政策规范第1.2节规定的主题类别;或(iii)寻求修改 本协议的以下任何条款或规范:第2、第4和第6节;第3小节。1,3.2, 3.3, 3.4, 3.5, 3.7, 3.8, 3.9, 3.14, 3.19, 3.21, 5.1、5.2或5.3;以及共识政策和临时政策规范、数据保留规范、WHOIS精 度程序规范、注册数据目录服务(WHOIS)规范或附加注册商操作规范。 7.4.5.3调解人将向仲裁员小组介绍ICANN和工作组各自关于建议修 订的建议。 7.4.5.4本协议有关建议修订的修正案不得提交工作组或ICANN仲裁 , 除非工作组的建议修正案已获得注册官批准,而对于ICANN,建议的修正案已获得ICANN董事会的批准。 7.4.5.5为了让仲裁小组批准ICANN或工作组提出的与建议修订有关 的修正案,仲裁小组必须认为,该提出的修订符合ICANN的核心价值(见ICANN的章程),并且根据适用的注册商和ICANN(如适用)的 业务利益的成本和利益,以及该修订中规定的建议修订寻求实现的 公共利益。如果仲裁小组认为ICANN或工作组提出的修正案符合上述 标准,则在ICANN通知注册官后视为本协议的修订,并视为本协议项 下的批准修正案。 7.4.6就ICANN提出的已批准的修订,注册主任可根据第6.8条的规定以书 面向ICANN申请豁免该修订。 7.4.7尽管本第7.4节有任何相反的规定, (a)如果注册提供证据ICANN的合理满意度,批准修正案将大大增加了提供注册服务 的成本,然后ICANN将允许180(180) 日历天批准修正案对注册生效,和(b) 根据第7.4条通过的任何批准修正案,如果注册向ICANN提供根据第5.4条不 可撤销的终止通知,对注册生效。 7.5 不 第三方 受益人。本协议不应被解释为ICANN或注册商对本协议的任何非参 与方承担任何义务,包括任何注册姓名持有人。 7.6 注意事项 和 指定。除第4.4条和第6条规定外,根据本协议发出的所有通知应 在下列相关方的地址以书面形式发出,除非该方已发出书面地址变更通知。(如 有变更,双方应在三十(30)天内通知另一方。本协议要求的任何书面通知应被 视为亲自送达,通过电子传真并确认送达,通过国际公认的快递服务计划送达,或通过电子方式送达,然后通过收件人的传真机或电子邮件服务器肯定确认收到 。对于根据本协议建立的新规范或政策的任何通知,注册官应在通过电子邮件通 知给注册官并发布在ICANN网站上,以遵守该规范、政策或计划的任何紧急情况后 , 给予一段合理的时间。ICANN根据本协议项下的通知和指定在视为书面通知注册 官时生效。 7.7 日期 和 乘以与本协议或其履行相关的所有日期和时间应根据美国加利福尼亚州洛杉矶的日期和时间计算。 7.8 语言根据本协议所发出的所有通知、名称、规格或政策均应使用英文版本。 7.9 对应的。本协议可签署一份或多份副本,每一份均应视为正本,但所有副本 均应构成同一份文书。 7.10 全部的 协议。除非(a)在双方同时签署的书面协议或(b)注册官向ICANN提供 的书面保证,否则本协议(包括构成认证一部分的规范)构成双方关于注册认证 的全部协议,并取代双方之前的所有协议、谅解、谈判和讨论,无论是口头的还 是书面的。7.11可分割性。如果本协议的一项或多项条款在适用法律下被认为不可执行,双 方同意善意地重新协商该条款。如果双方不能就该条款达成双方同意和可执行的替代协议,则(a)该条款应被排除在本协议之外; (b)本协议的余额应解释为该条 款被排除; (c)本协议的余额应根据其条款强制执行。 WHOIS精度程序规范 注册官应执行并遵守本规范中规定的要求,以及ICANN和注册官利益相关者集团在注册官 认证协议期限内对本规范进行的任何商业实用更新。 1.除下文第3条规定外,在(1)注册官赞助的注册名称注册后十五(15)天内将注册名 称转交给注册官,或(3)注册名称持有人对注册官赞助的任何注册名称的任何变更 , 注册官将就Whois信息和与该注册名称相关的相应客户帐户持有人联系信息: a.在适用的国家或地区,以适当的格式验证本协议第3.3.1款所要求的所有领域的 数据的存在。 b.根据RFC5322(或其后继者),验证所有的电子邮件地址都是正确的格式。 c.根据ITU-T E,验证电话号码的格式是否正确。164国际电话号码(或其等效或 后继号码)。 d.验证邮政地址是否符合UPU邮政寻址格式模板、S42地址格式中定义的适用国家 或地区)或其他标准格式的适当格式。 e.验证所有邮政地址字段在不同字段之间是一致的(例如:城市存在街道,城市 位于州/省,城市与邮政编码匹配),这些信息在技术上和商业上在适用的国家或地区是可行的。 f.验证: i.注册姓名持有人的电子邮件地址(如果不同,还有帐户持有人的电子 邮件地址),通过基于工具的认证方法,如提供必须以注册官指定的 方式返回的唯一代码, ii.注册姓名持有人的电话号码(如果不同,账户持有人)通过(A)电话或 发送短信到注册姓名持有人的电话号码提供一个独特的代码,必须返回 以注册官指定的方式,或(B)叫注册姓名持有人的电话号码,要求注册 姓名持有人提供一个唯一的代码发送到通过网络、电子邮件或邮政邮件。 在任何一种情况下,如注册官没有收到注册姓名持有人的肯定答复,注册 官应手动核实适用的联系信息,或暂停注册,直到注册官核实适用的联系 信息为止。如果注册官没有收到帐户持有人的肯定答复,注册官应手动核 实适用的联系信息,但不需要暂停任何注册。 2.除下文第3节规定外,在收到Whois中的联系信息或与注册官赞助的任何注册名称相关 的相应客户帐户联系信息的任何变更后的十五(15)个日历日内(无论注册官之前是 否需要执行本规范中关于该注册名称的验证和验证要求),注册官将在第1节要求的 范围内,按照上述第1节规定的方式验证更改的字段。如果注册官没有收到提供所需 验证的注册姓名持有人的肯定答复,注册官应手动核实适用的联系信息,或暂停注册 , 直到注册官核实适用的联系信息为止。如果注册官没有收到帐户持有人的肯定答复 , 注册官应手动核实适用的联系信息,但不需要暂停任何注册。 3.除下文第4段规定外,如果注册官已经成功完成了对相同联系信息的验证和验证程序, 且不知道该信息不再有效,则注册官不需要执行上述第1(a)至1(f)条中的上述验证和 验证程序。 4.如果注册官有任何信息表明上述第1(a)至1(f)节中指定的联系信息不正确(如注册官 收到符合ICANN的Whois数据提醒政策的退回电子邮件通知或未送达通知信息)(无论 注册官之前是否需要执行本规范中关于该注册名称的验证和验证要求),注册官必须 验证或重新验证第1节中所述的电子邮件地址(es)。f(例如,要求对Whois数据提 醒政策通知作出肯定的回应)。如果注册官在收到任何此类信息后十五(15)个日历 日内未收到提供所需验证的注册姓名持有人的肯定答复,注册官应手动核实适用的联 系信息或暂停注册,直到注册官核实适用的联系信息。如果注册官在收到任何此类信 息后的十五(15)个日历日内,注册官没有收到支付注册名称的客户的肯定答复,如 果适用,提供必要的验证,注册官应核实适用手动提供联系信息,但不需要暂停任何注册。 5.如果注册姓名持有人故意提供不准确或不可靠的WHOIS信息,故意未能及时更新提供给 注册官的信息,或注册官超过十五(15)个日历询问与注册姓名持有人注册相关的联 系方式的准确性,注册官应终止或暂停注册姓名持有人的注册姓名,或在客户和客户 上注册,直到注册官确认注册姓名持有人提供的信息为止。 6.本规范的条款和条件应在本协议形式的第一天或前后由ICANN与注册利益相关者集团 协商审查本规范的条款和条件。 7.如果客户账户持有人没有任何注册名称,则本规范中的任何内容均不得视为要求注 册官对任何客户账户持有人信息进行验证或验证。 注册数据目录服务(WHOIS)规范 1.注册数据目录服务。在ICANN需要不同的协议之前,注册商将根据RFC 3912运行 通过端口43可用的WHOIS服务,以及基于web的目录服务,提供至少对第3.3.1.1至3.3.1节中规定的元素的免费公共查询访问。按照本规范第1.4节中 规定的格式签署注册商认证协议。ICANN保留指定替代格式和协议的权利,根 据该规范,注册官将在合理可行的范围内尽快实施该替代规范。在IETF发布有关IETF标准、可扩展互联网注册数据服务工作组中规定的基于 IETF的标准及其任何修订(RFC2026中规定)后,注册官应在ICANN要求后135 天内实施任何此类标准(或任何修订)中规定的目录服务。注册官应在ICANN 国际化注册数据工作组(IRD-WG)的工作及其在ICANN董事会批准后135天内, 根据ICANN发布的规范实施国际化注册数据发布指南。 1.1.答复的格式应遵循以下半免费文本格式,后面是空行和法律免责声明, 说明注册官和用户查询数据库的权利。 1.2.每个数据对象应表示为一组键/值对,行以键开头,后面是冒号,空格作 为分隔符,后面是值。 1.3.对于存在多个值的字段,应允许具有相同键的多个编号键/值对(例如,列出多个名称服务器)。空白行之后的第一个键/值对应被视为新记录的 开始,并应被视为识别该记录,并用于将数据,如主机名和IP地址,或域 和注册人信息分组在一起。 1.4.域名数据: 1.4.1.查询格式:whois-hwhois。注册商示例。tld示例。.4.2.TLD 1响 应格式:回复的格式应包含所有元素,并遵循以下半自由文本格式的大纲。可以在文本的 末尾添加其他数据元素格式概述如下。根据注册官的选择,数据元素后面可以有一个空行和一个法律免 责声明,说明注册官和用户查询数据库的权利的免责声明(但任何此类法律免责 声明之前必须有该空行)。 域名:示例。TLD 注册表域ID: D1234567-TLD WHOIS服务器: whois。注册商示例。tld 注册网址: http://www。注册商示例。tld 更新日期:2009年05月29日T20:13:00Z 创建日期:2000年10-08T00:45:00Z 注册商注册截止日期:2010年10-08T00:44:59Z注册商:示 例注册商有限责任公司 注册官IANA身份证:55555555 注册商滥用联系电子邮件:电子邮件@注册商。tld 注册员滥用联系电话: +1。1235551234 经销商:示例经销商1 域状态:禁止删除的客户端2 域状态:客户端禁止更新 域状态:客户端禁止传输 注册表注册人号: 5372808-ERL3 注册人姓名:实例注册人4 注册者组织:示例组织 登记人街: 123号例子街 注册城市:任何城镇 注册国家/省:AP5 注册商邮政编码:A1A1A16 注册国:AA 注册人电话: +1.5555551212 注册电话分机: 12347 注册人传真: +1.5555551213 注册人传真分机: 4321 注册者电子邮件:电子邮件@示例。TLD 注册表管理ID: 5372809-ERL8 1可以删除数据元素,但如果使用了数据元素,则它必须出现在这个位置。 2注意:所有适用的状态都必须显示在Whois输出中。 3如果不能从注册表中获得此信息,则可以留空。 4对于需要“名称 ”或“组织 ”的注册人、管理员和技术联系人字段,输出必须 包括名称或组织(如果有,两者都包括)。 5如果不可用,所有“州/省 ”字段可能保留为空。 6如果不可用,所有“ 邮政编码 ”字段可能保留为空。 7如果无法提供电话,所有“传真 ”和“传真 ”字段可以留空。 8如果不能从注册表中获得此信息,则可以留空。 管理机构:注册人组织管理机构: 123号街 管理城市:任何城镇 管理州/省:AP 管理邮政编码:A1A1A1 管理国家:AA 管理员电话: +1.5555551212 行政电话分机:1234 管理员传真: +1.5555551213 管理传真分机:1234 管理员电子邮件: EMAIL@EXAMPLE.TLD 注册表技术ID: 5372811-ERL9 技术名称:实例注册人的技术 技术组织:实例注册人有限责任公司 科技街: 123例街 科技城:任何城镇 技术国家/省:AP 技术邮政编码:A1A1A1 技术国家:AA 技术电话: +1。1235551234 技术电话分机:1234 技术传真: +1.5555551213 技术传真分机:93 电子邮件:电子邮件@示例。TLD 名称服务器: NS01。注册商示例。TLD10 名称服务器: NS02。注册商示例。TLD DNSSEC:签署代表团 ICANN WHOIS数据问题报告系统的URL:http://wdprs.国 际的。net/ 最近更新的WHOIS数据库: 2009-05-29T20:15:00Z <<< 1.5.以下数据字段的格式:域状态、个人和组织名称、地址、街道、城市、 州/省、邮政编码、国家、电话和传真号码、电子邮件地址、 日期和时间必须符合EPPRFC5730-5734(或其后继者)中指定的映射,IPv6地址格式 应符合RFC5952(或其后继者),以便这些信息(或WHOIS响应中返回的值 ) 可以统一处理和理解。 2.注册数据目录服务的服务级别协议(RDDS) 9如果不能从注册表中获得此信息,则可以留空。 10必须列出所有关联的名称服务器。 o IP地址。指IPv4或IPv6地址,但两者之间没有任何区别。当需要进行区分 时,将使用IPv4或IPv6。 o探测器。用于执行位于不同全局位置的测试(见下文)的网络主机。 o RDDS.注册数据目录服务是指WHOIS和基于Web的WHOIS服务的集合。 o RTT.往返时间或RTT是指从发送发出请求所需的分组序列的第一分组的第一 比特到接收接收响应所需的序列的最后一个比特的时间。如果客户端没有 接收到考虑所收到的响应所需的整个数据包序列,则该请求将被视为未被 响应。 o SLR.服务级别要求是服务级别协议(SLA)中测量的某个参数的服务级别。 2.2服务水平协议矩阵 参数 单反(月) 睡眠呼吸障碍 RDDS可用 小于或等于864 min的停机时 间RDDS查询RTT 小于或等于4000 ms,至少有95%的 查询RDDS更新 时间 小于或等于60 min,至少为95%的 探针 鼓励注册官在每项服务的流量较低的时间和日期为不同的服务进行维修。由于大 量停机已经纳入可用性指标、计划停机或类似指标;任何停机时间,无论是维护 或系统故障,都将被简单地记录为停机时间,并计入SLA目的。 2.2.1 RDDS可用性。指所有RDDS服务,注册员可以使用相关注册员系统的适当数 据响应互联网用户的查询。如果51%或更多的RDDS测试探测器在给定的时 间内认为任何一个RDDS服务都不可用,则该RDDS将被视为不可用。 2.2.2 WHOIS查询RTT。是指从TCP连接开始到其结束的数据包序列的RTT,包括接 收WHOIS响应。如果RTT是相应单反的5倍或以上,则RTT将被视为未定义。2.2.3基于Web的-WHOIS查询RTT。是指从TCP连接开始到其结束的数据包序列的RTT,包括仅接收到一个HTTP请求的HTTP响应。如果注册官实施多步骤获取信息,只 测量最后一步。如果RTT是相应单反的5倍或以上,则RTT将被视为未定义。 2.2.4 RDDS查询RTT。是指“WHOIS查询RTT ”和“基于web的WHOIS查询 RTT ”的集合。 2.2.5 RDDS更新时间。指从收到EPP确认到域名、主机或联系人的转换命令的时间 , 直到RDDS服务的服务器反映所做的更改。 2.2.6 RDDS测试。表示发送到一个RDDS服务的服务器的特定“IP地址 ”的一个查 询。查询应在注册商系统中关于现有的对象,并且响应必须包含相应的信 息,否则查询将被视为未应答。RTT比相应的单反高5倍的查询将被视为未 应答。RDDS测试的可能结果是:以毫秒对应的RTT为单位的数字或未定义/ 未回答的数字。 2.2.7测量RDDS参数。每5分钟,RDDS探测将从所有注册商的每个RDDS服务服务器 的dns注册“IP地址 ”中选择一个IP地址,并对每个服务器进行“RDDS测试 ”。如果“RDDS测试 ”结果未定义/未回答,相应的RDDS服务将被视为从该 探测不可用,直到需要进行新的测试。 2.2.8整理来自RDDS探针的结果。在任何给定的测量周期内,认为测量有效的最小 数量为10,否则测量将被丢弃并被认为不确定;在这种情况下,单反不会 标记故障。 2.2.9放置RDDS探针。测量RDDS参数的探头应放置在不同地理区域内用户最多的 网络内;应注意不要在高传播延迟链路后部署探头,如卫星链路。 2.3绩效测量的契约 注册官不得干涉测量探头,包括对被监控服务请求的任何形式的优惠待遇。注册 官应像响应互联网用户(对于RDDS)的任何其他要求一样,响应本规范中所述的 测量测试。 共识政策和临时政策规范 1.共识政策。 1.1.“共识政策 ”是指(1)根据ICANN的章程和正当程序制定的程序,以及(2)涵盖本文件第1.2 节所列主题的政策。ICANN章程中规定的共识政策制定程序和程序可根据其中规定的程序不 时进行修订。 1.2.协商一致政策及其制定程序的设计应尽可能使包括登记商在内的互联网利益相关者达成 共识。共识政策应涉及以下一种或多项政策: 1.2.1.合理需要统一或协调解决的问题 促进因特网、注册商服务、注册表服务或域名系统( “DNS ”)的互操作 性、安全性和/或稳定性; 1.2.2.提供注册官服务的功能和性能规范; 1.2.3.注册商的政策合理必要,以执行有关的共识政策 一个gTLD注册表; 1.2.4.解决有关域名注册的争议(与使用此类域名,但包括此类政策考虑使用域名的情况);或 1.2.5.对注册中心经营者和注册商或经销商的交叉所有权的限制和如果注册商运营商和注册商或分销商有关联,有关注册商和注册商操作以及使 用注册商和注册商数据的法规和限制。.3.1第1.2节中所述的此类问题应包括,但不限于: 1.3.1.TLD中注册名称的原则(如先到/先得, 及时续期,到期后的持有期); 1.3.2.禁止注册机构或域名的仓储或投机 主管注册者 1.3.3.在TLD中注册名称的保留,可能最初注册或 不得因与(i)避免用户之间的混淆或误导,(ii)知识产权,或(iii)DNS或互联 网的技术管理(e。g.,设立登记时姓名的保留处); 1.3.4.维护和获取准确的和最新的信息有关已注册的名称和名称服务器; 1.3.5.避免因注册运营商或注册商暂停或终止业务而中断域名注册的程序,包括在失去 认可的注册商在TLD中赞助的持续注册商之间分配责任的程序; 1.3.6.在注册主任更改赞助一个或多个注册资料时,转移注册资料 注册名称。 1.4.除对协商一致意见政策的其他限制外,它们不得: 1.4.1.规定或限制注册商服务的价格; 1.4.2.修改对临时政策(定义如下)或协商一致政策的限制; 1.4.3.修改注册注册商认可协议中有关条款或注册商续期、终止或修改认可协议的条件,或注册商向ICANN支付的费用;或 1.4.4.修改ICANN对不适用标准、政策、程序或实践的义务武断、不合理或不公平,除非有实质性和合理的理由,否则不得给予不同的待遇 , 并以公开和透明的方式行使其责任。2.临时的 政策。 注册官应遵守并实施ICANN董事会( “董事会 ”)临时制定的所有规范或政策, 如果董事会由至少三分之二的成员投票通过,只要董事会合理地确定这些修改或修订是合理 的,并且必须立即临时建立关于该主题的规范或政策,以维持注册服务、注册服务或DNS或互 联网(“临时政策”)的稳定或安全。 .1.2.建议的规范或政策应尽可能狭隘以实现这些目标。在制定任何临时政策时,董事会应说明采用临时政策的时间,并应立即实施 ICANN章程中规定的共识政策制定过程。 .1.1.2 ICANN还应发布一份包含其详细说明的咨询声明采用临时政策的理由,以及董事会认为这种临时政策应得到互联网利益攸关方 的一致支持。 2.1.2.如果采用临时保单的时间超过90天,则委员会应重申每90天通过一次临时政策,总期间不超过一年,以保持该临时政策有 效,直到其成为协商一致政策为止。如一年期间届满,或在该一年期间,临时政策 未成为共识政策,并未得到董事会的重申,则注册主任将不再被要求遵守或执行该 临时政策。 通知 和 冲突。注册官应在收到建立协商一致政策或临时政策的通知后,向其提供一段合理的 时间,并考虑到所涉及的任何紧急情况。如果注册服务与一致政策或任何临时政策之间存在冲突,则一致政策或临时政策应控制,但仅涉及冲突的主题。为免生疑问,符合本规范要求 的协商一致政策可补充或取代注册官与ICANN之间协议的规定,但仅在该等协商一致政策与第1.2条中规定的事项和 本规范的1.3。 关于隐私和代理注册的规范 在(i)2017年1月1日和(ii)ICANN建立并实施注册商认证协议第3.14节中引用的 隐私和代理认证计划的日期之前,注册商同意遵守,并要求其关联方和分销商遵 守本规范的条款,前提是ICANN和工作组可以共同同意延长本规范的期限。本规范 不得由ICANN或注册官修改。 定义。对于本规范而言,应适用以下定义。 1.1“损益客户 ”是指,无论损益所使用的术语隐私服务和代理服务的提供者、被许可人、客户、受益用户、受益 人或其他接受者。 1.2“隐私服务 ”是一种注册注册姓名的服务作为注册姓名持有人的受益用户,但P/P提供商提供替代可靠的联系信 息,以便在注册数据服务(Whois)或同等服务中显示注册姓名持有人 的联系信息。 1.3“代理服务 ”是指注册姓名持有人通过的服务许可使用注册名称给P/P客户,以提供P/P客户使用该域名的机会,注 册名称持有人的联系信息显示在注册数据服务(Whois)或同等服务中 , 而不是P/P客户的联系信息。 1.4“P/P提供商 ”或“服务提供商 ”是隐私/代理的提供商 服务,包括注册官及其附属公司。 2.义务 的 注册官。 对于注册商或其关联公司提供的任何代理服务或隐私服务 , 包括注册商或其关联公司通过经销商分销的P/P服务,并与注册商赞助, 注册商及其关联公司必须要求所有P/P供应商遵循本规范中描述的要求,并 遵守根据本规范发布的条款和程序。 2.1 公开 的 服务 条款。损益提供商应公布条款和其服务条件(包括定价),在其网站和/或注册商的网站上。 2.2 Abuse/Infringement 观点 的 联系 损益供应商应发布希望报告滥用或侵犯商标(或其他权利)的第三方的联络 点。 2.3 公开 的 身份 的 P/P 提供程序。 损益提供商应公布其信息 在其网站和/或注册商的网站上的商业联系信息。 2.4 条款 的 服务 和 描述 的 程序P/P供应商应在其网站和/或注册商网站上发布一份供应商供应商服务协议及 供应商处理以下程序的说明: 2.4.1报告滥用域名的进程或工具 由损益提供商管理的注册; 2.4.2报告商标或商标侵权行为的程序或设施 第三方的其他权利; 2.4.3损益供应商将中继的情况 第三方与损益客户的沟通; 2.4.4损益提供商将终止的情况 为损益表客户提供服务; 2.4.5损益表提供商将披露的情况和/或在注册数据服务(Whois)或同等服务中发布损益客户 的身份和/或联系数据; 2.4.6由损益表供应商提供的支持服务的描述 P/P客户,以及如何访问这些服务。 2.5 托管 的 P/P 客户信息注册官应包括P/P本协议第3.6条要求的其登记数据托管存款中的客户联系信息。只有 在本协议终止或注册商终止业务运营的情况下,ICANN才能访问根据 本规范第2.5节托管的P/P客户信息。 3.豁免。如果可以证明以下情况,注册官没有义务遵守本规范的 要求: 3.1注册姓名持有人使用损益供应商的服务 未由注册官或其任何附属公司提供; 3.2注册姓名持有人将注册姓名许可给另一方(即在注册员不知情的情况下充当代理服务); 3.3注册姓名持有人使用P/P提供者联系数据订阅该服务或接受P/P供应商的条款和条件。 数据保留规范 1.在本协议有效期内,对于注册官在gTLD内赞助的每个注册名称,注册官应收集 并安全地保存在其自己的电子数据库(不时更新)以下数据: 1.1.注册人须向注册人收集以下资料域名的注册时间(以下简称“注册 ”),并须在注册官赞助注册期间及 其后的额外两年内保存该资料: 1.1.1 注册人姓名或法定全称; 1.1.2 姓名和姓,或如果注册人是法人,则为注册人的行政联系人、技术联系人和账单联系人的头衔; 1.1.3 注册人的邮寄地址、行政联系人、技术联系人、账单联系人; 1.1.4 注册人的电子邮件地址、行政联系人、技术联系人、账单联系人; 1.1.5 注册人的电话联系人、行政联系人、技术联系人和账单联系人; 1.1.6 WHOIS信息,如WHOIS规范中所述; 1.1.7.购买供连接的域名服务类型 与注册; 1.1.8.在注册官收集的范围内,“卡片存档 ”,当期 第三方交易编号,或其他经常性支付数据。 1.2.注册官应收集以下资料并维持相关互动后不少于一百八十(180)天的信息: 1.2.1.有关付款方式和付款来源的信息注册官处理注册交易或第三方支付处理者提供的交易号码; 1.2.2. 日志文件,账单记录,以及收集和维持该等记录在商业上是可行的,或符合注册商经营的行业内 普遍公认的标准做法包含通信源和目的地信息的记录,包括,根据传输方式,但不 限于: (1)源IP地址、HTTP头、 (2)电话、文本或传真号码; (3) 与注册人和注册人之间的通信相关的电子邮件地址、注册处理 或即时通讯标识符; 1.2.3. 日志文件和,包括收集和维护这些文件记录在商业上是可行的,或符合注册商经营的行业内全行业普遍 接受的标准惯例,而与注册相关的其他记录则包括通信和会议的 日期、时间和时区,包括初始注册。 2.如果收到(i)适用司法管辖区的国家认可律师事务所的书面法律意见,声明注册 官收集和/或本协议规定的任何数据元素的保留有可能违反适用法律( “意见 ” ) , 或(ii)具有司法管辖权的政府机构的裁决或书面指导,规定遵守本规范 的数据收集和/或保留要求违反适用法律,注册官真诚地确定,收集和/或保留 本规范中规定的任何数据元素违反了适用法律,注册官可向ICANN提供书面通知 , 并要求放弃遵守本规范的特定条款和条件( “放弃请求 ”)。该书面通知应 : (i)规定相关适用法律、涉嫌违规的数据收集和保留要素、收集和/或保留违 反适用法律的方式,以及对该裁定和与之相关的任何其他事实和情况的合理描 述,(ii)附一份意见和政府裁决或指导的副本,以及(iii)注册从任何政府 当局收到的任何文件,以及ICANN合理要求的其他文件。在收到该通知后,ICANN和注册官应真诚地讨论该事项,以努力达成双方都可接受的解决方案。直 到ICANN处理Whois与隐私法冲突的程序被修改为包括与本规范要求相关的冲突 , 如果ICANN同意注册官的决定,ICANN总法律顾问办公室可暂时或永久暂停遵 守本规范受影响的规定,并授予豁免请求。在授予本协议项下的任何豁免之前 , ICANN将在其网站上发布其决定,为期三十(30)个日历日。在ICANN处理与 隐私法冲突的程序修改后,所有弃权请求(无论批准或拒绝)应按照修改后的 程序解决。 3.如果(i) ICANN先前响应位于注册商同一管辖区的注册商的放弃请求而放弃遵 守本数据保留规范的任何要求;(ii)注册商受导致ICANN同意授予该放弃的 同一适用法律约束,注册商可要求ICANN批准类似的放弃,该请求应由ICANN 批准,除非ICANN向注册商提供了不批准该请求的合理理由,在这种情况下, 注册官可根据本数据保留规范第2节提出弃权请求。 4.本数据保留规范针对违反适用法律的任何修改仅适用于适用法律的具体规定仍 然有效的时间内。如果适用法律被废除或修改(或抢占)的方式不再禁止收集 和/或保留数据保留规范,注册同意本规范的原始版本将适用于修改适用法律 允许的最大程度。 注册商信息规范 注册官应向ICANN提供以下规定的信息,这些信息应按照本协议第3.17条进行 维护。关于以下确定的信息,ICANN将根据本协议第3.15节中规定的披露要求 持有此类信息。 一般信息 1.注册官的法定姓名。 2.司法常务官的法律形式(例如,有限责任公司、公司、政府机构、政 府间组织等)。 3.注册官的业务为法律和财务目的而注册的司法管辖区。 4.注册官的商业注册号码和发出该号码的当局的名称。 5.注册官使用的每一个商业名称和/或商名称。 6.提供现有的文件,证明注册官实体是合法建立的,并且信誉良好。对于成立证 明,请提供实体的特许文件或其他同等文件(如会员协议)。如果注册官是一个 政府机构或组织,请提供一份已建立政府机构或组织的相关法规、政府决定或其 他文书的认证副本。对于政府机构或组织以外的实体,如注册官管辖范围内没有 此类证书或文件,则由公证人或注册官管辖法院的合法执业者起草并签署的宣誓书,宣布该组织已成立并成立 站立,必须提供。 7.注册主任的通讯地址。此地址将用于合同目的,注册官必须能够接受此地址的 通知和法律程序服务。不允许使用邮政信箱。 8.为合同目的可以联系登记官的主要电话号码。 9.为合同目的可以联系注册官的主要传真号码。 10.为合同目的联系注册官的主要电子邮件地址。 11.如注册主任的主要营业地点或地址与7中提供的地址不同,请提供包括地址、 电话号码、传真号码和电子邮件地址。向ICANN提供现有文件,证明注册官有权 在主要营业地点做生意。 12.注册官将经营或管理的任何其他地址,如果与上述提供的主要营业地点或通 信地址不同。(如果有,请进行解释。)向ICANN提供当前的文件,证明注册官 在法律上有权在确定的每个地点做生意。 13.主要联系人姓名: 标题 地址 电话号码 传真号码 电子邮件地址 14.43 WHOIS服务器的URL和位置。 所有权、董事和高级管理人员信息15.拥有注册商当前业务实体至少5%所有权权益的任何个人或实体的完整姓名、联 系信息和职位。对于列出的每个人,请指定该人的所有权百分比。 16.注册主任所有董事的全部姓名、联系信息和职位。 17.注册官所有官员的姓名、联系信息和职位。(官员的姓名和职位必须公开 显示。) 18.所有高级管理人员和监督注册人员服务提供的其他关键人员的完整姓名、 联系信息和职位。 19.对于问题15至18的回答中提到的每一个人或实体,表明该人或实体: a)在过去十年内,被判犯有重罪或与金融活动有关的轻罪,或被法院判定有欺诈或违反信托责任,或一直是一个主题 与这些事项类似或相关的司法裁定; b)在过去十年内,曾因涉及不诚实或滥用他人资金的行为而受到任何政府 或行业监管机构的纪律处分; c)目前参与的任何司法或监管程序,可能导致第19(a)或第19(b)项中规 定的类型的定罪、判决、裁定或纪律; d)是被ICANN强制取消资格的对象。如果在(a)-(d)中发生了上述任何一个事件,请提供详细信息。 20.列出所有附属注册人,如果有的话,并简要描述附属机构。 21.对于第20项中列出的任何实体,必须提供上述第1-14项中要求的信息。 22.如果适用,请列出注册商的最终父实体。 23.注册商或其任何附属公司是否提供任何隐私服务或代理服务(如隐私和代理注 册规范中定义的条款)?如果是,请列出提供隐私服务或代理服务的实体或个人。 24.对于第23项所列的任何实体,请提供上述第1-14项所要求的信息。 25.注册官是否利用或从经销商的服务中获益? 26.如果是,请提供注册官已知的所有此类经销商的名单。本项目26中规定的信 息应根据要求提供给ICANN。在ICANN制定接收和保留此类信息的安全方法时,该 信息应根据本协议第3.17条提供给ICANN。 标有“ ”的物品亦必须在注册主任的网站上公布。 附加的注册商操作规范 ICANN可在与注册商利益相关者集团(或其继任者)协商后,不时修改本规范,但 此等更新对整个注册商行业具有商业实用性。 1.数据存储器 注册商必须允许其客户根据要求使用DNSSEC,并代表客户向注册商发送添加、 删除或更改公钥材料(如DNSKEY或DS资源记录)的订单,以支持DNSSEC。此类 请求应以安全的方式和根据行业最佳实践进行接受和处理。注册商应接受由相 关TLD支持并出现在位于: <http://www.iana.org/assignments/dns-sec-alg -numbers/dns-sec-地址号的注册商中的任何公钥算法和摘要类型。xml>和http://www.iana.org/assignments/ds-rr-types/ds-rr-类型。xml.所有此 类请求都应使用RFC 5910中规定的EPP扩展或其后续版本传输给注册中心。 2.IPv6 如果注册商向注册商提供注册名称服务器地址的能力,则注册商必须允许同 时指定IPv4地址和IPv6地址。 3.综合数字网 如果注册商提供国际化域名( “IDN ”)注册,所有新注册必须符合注册注册 证书5890、5891、5892、5893及其继任者。注册官还应遵守IDN指南 http://www.icann.org/en/topics/idn/implementation-guidelines.htm是哪 个可不时被修改、修改或取代。注册商必须使用相关注册表发布的IDN表。 注册人的利益和责任 领域名称登记人的权利 1.您的域名注册和您可能同时使用的任何隐私/代理服务必须与ICANN认证注册商 签订注册协议才能进行注册。 您有权随时审阅本注册协议,并下载一份记录副本。 2.您有权获得有关以下方面的准确和可获取的信息: 您的ICANN认证注册官的身份;与您的注册人有关的任何代理或隐私服务提供商的身份; 您的注册人的条款和条件,包括适用于域名注册的价格信息; 该条款和条件,包括价格信息,适用于您的注册官提供的任何隐私服务; 由注册官和隐私服务提供商提供的客户支持服务,以及如何访问它们; 如何与你的注册主任及他们提供的任何隐私服务提出关注及解决纠纷;及 说明你的注册员的注册过程的说明,管理、转移、更新和恢复您的域名注册,包括通过您的注册商提供的任何 代理或隐私服务。 3.您不得受到您的注册官提供的虚假广告或欺骗行为的约束,也不得受到您的注 册官提供的任何代理或隐私服务的约束。这包括欺骗性的通知、隐藏的费用, 以及任何根据你住所的消费者保护法规定的非法行为。 领域名称登记人的职责: 1.您必须遵守您的注册官张贴的条款和条件,包括您的注册官、注册处和 ICANN的适用政策。 2.您必须审查您的注册商的当前注册协议,以及任何更新。 3.您将全权承担注册和使用您的域名的责任。 4.您必须提供准确的信息,以便在WHOIS等目录中发布,并及时更新,以反映 任何更改。 5.您必须在十五(15)天内回复您的注册人员的查询,并保持您的注册人员帐户 数据的最新状态。如果您选择让您的域名注册自动更新,您还必须保持您的 支付信息的最新状态。
向日葵SDK文档
概述SLAPI是贝锐有限公司开发的一套基于产品向日葵的开发库,该库可以实现以点对点为通讯方式的远程桌面、远程文件、远程开机以及用户自定义的远程数据通讯。使用该开发库时,开发者无须关心点到点之间的通讯细节,以及通讯方式。SLAPI会以P2P或服务器中转等方式为通讯提供可靠的数据传输服务。 开发者账号使用SLAPI之前,你需要先拥有一个贝锐帐户,可以通过https:www.oray.com的右上角的注册按钮进行注册。如图: 拥有帐户后,进入http://open.oray.com(开放平台的网址),进入开发者认证页面,填写必要资料并提交开发者申请。如图: 注册后,进入我的应用页面创建应用,创建成功后,在应用详情中看到自己的APPID 和 APP KEY,有了这两个信息,就可以使用SLAPI来开发自己的应用了。如图: 支持平台目前SLAPI支持Window,Linux,Mac系列平台,而其他系统平台也将会尽快推出。 支持语言目前SLAPI以纯C加二进制库实现方式提供接口,只要你的开发环境可以调用C函数即可。 模型通常情况下开发出的应用会是2个APP,一个主控制端,一个被控制端,当然为了主控端得到被控端的连接信息,你可能会需要第三个自行开发的应用充当中间人的角色来传递连接信息。以下为一个完整应用的拓扑图: 主控与被控是两个大的对象,在它们内部维护了很多会话,这些会话可以动态的创建与销毁,每个会话都有各自特殊的功能,如图:Desktop会话可以实现主控与被控之间的远程桌面,File会话可以实现远程文件功能。 “你的服务器”用来传递被控端的连接信息与会话信息,让主控制端可以与被控制端进行通讯。 而“OrayServer”则默默的在背后为你的应用程序提供必要的通讯服务,保证你应用的数据传输。 使用规范 目录结构在开发库下你可以看到以下目录include、lib、bin、doc、samples。 include目录:所有SLAPI使用的API头文件,目前只有slsdk.h文件,用户只需要包含该文件即可使用SLAPI所有功能 bin目录:放有SLAPI运行时库,Windows下为slsdk.dll文件,运行时请将它放到运行程序所在的目录。放有SLAPI编译所需要的链接库,Windows下为slsdk.lib,编译时请链接该库 doc目录:所有SLAPI的使用说明与相关文档 samples目录:所有SLAPI应用实例 使用开发库分为三个阶段,1:环境初始化,2:创建主/被控制端,3:创建会话。 环境初始化使用SLInitialize函数初始化SLAPI环境。同样在进程退出前请调用SLUninitialize函数退出并析构整个环境。 另外在整个生命期中,可以使用SLGetLastError函数来获取当前的错误代码,方便你调试自己的应用程序,也可以使用SLSetLastError函数来设置当前的错误代码。最后,可以使用SLGetErrorDesc函数将错误代码转化为文本信息,方便查看。 创建被控制端使用SLCreateClient函数创建被控制端,然后使用SLSetClientCallback函数设置被控制端的事件回调函数,这样就可以获取控制端的状态和事件信息。 使用SLClientLogin函数来登录到贝锐服务器,登录成功后利用SLGetClientAddress函数来获取被控制端的连接信息,使用此信息主控端就可以与被控制端通讯了。注意:当回调事件为SLCLIENT_EVENT_ONLOGIN时,才算登录成功。 当不再使用这个被控制端时,可以使用SLDestroyClient函数将其销毁。 创建主控制端使用SLCreateRemote函数创建主控制端。 使用SLDestroyRemote函数销毁主控制端 创建被控制端会话当被控制端创建完后,就可以创建会话了,每种功能的会话都有固定的API来创建,如SLCreateClientSession函数用来创建远程桌面的会话,所有创建后的会话,都可以使用SLDestroyClientSession函数来销毁。 被控制端创建的所有会话都有一个会话序列号(字符串形式),使用该序列号,主控制端就可以连接指定会话了,这个序列号可以使用SLGetSessionName函数来获取。 最后所有的会话在API中都定义为SLSESSION类型,主控制端也是如此。 注意:被控端会话只能使用一次,一旦被主控端连接该会话后就失效,不能再连接。请销毁后再创建新的使用。被控端会话可以同时创建多个 创建主控制端会话当主控制端创建完后,就可以创建会话了,每种功能的会话都有固定的API来创建,如SLCreateRemoteSession函数用来创建远程桌面的会话,该函数创建的会话用来和被控制端使用SLCreateClientSession创建出来的会话对接并通讯。 主控制端创建会话与被控制端创建会话略有不同,它需要提供被控制端的连接信息和会话序列号信息,这两个信息可以使用上面所提到的SLGetClientAddress函数和SLGetSessionName函数来获取。 快速集成集成的大致流程如下图所示。如果远程只是软件产品的一小部分,可直接在发起远程的时候顺序调用上述API,而不必在程序初始化阶段就调用登录的API(这样做相当于是与服务器保持长连接,Demo示例为此模式),建议是在需要远程的时候登录,断开远程的时候销毁。 WEB 服务当开启了web服务后,可以用websocket连接进来控制或获取被控端的状态。 协议说明Web服务传输协议用的是json格式数据包。每个json数据包里都应该包含id和name字段。Id是一个不重复的整形,name是调用的方法名。 例子: { “id” : 1, //包id “name” : “newsession” //方法名,newsession为创建一个新的远程会话 “type” : type //会话类型 }如果调用的方法有附带参数,要把参数放在data字段下。 例子: { “id” : 2, //包id “name” : “destroysession”, //方法名,destroysession为销毁会话 “data” : { “sessionid” : 1 //销毁sessionid等于1的会话 } }服务端收到请求数据后,返回请求的id、name以及处理结果code,code等于0表示成功,其他值参考SLGetLastError的返回值 例子: { “id” : 1, //包id “name” : “newsession”, //方法名,newsession为创建一个新的远程桌面会话 “code” : 0, //操作结果,0表示成功 “data” : { “sessionid” : 0 //sessionid “address” : “xxxxxx” //服务器地址 “sessionname” : “xxxxxx” //session } }客户端接收到返回值后,应该判断id是否为发出请求的id,确保正确的收到返回结果。 Web 服务提供的方法Web每一次发送请求都会得到对应请求操作的执行结果,即一问一答;对于特定的事件,服务器内部会创建额外的监听,当状态发生改变,会主动以事件通知的形式推送给客户端。为了保证Web多连接的同步,服务器的被动响应和主动通知都采用广播的形式,一旦外部操作或内部变化,所有的连接都能及时收到同一通知。 下表1-7为web的请求方式及返回说明,8为服务器主动通知事件,9为会话回调通知。 1.OPENID登录 name: ”login_openid” 参数: openid:开发者的ID号 openkey:开发者ID对应的验证码 例子: { “id” : 1, “name” : “login_openid”, “data” : { “openid” : “xxxxxx”, “openkey” : “xxxxxx” } } 返回: { “id” : 1, “name” : “login\_openid”, “data” : “”, “code” : 0 //参考10.错误代码 } 2.License登录 name: ”login\_license” 参数: address:服务器地址 license:服务器license 例子: { “id” : 1, “name” : “login\_license”, “data” : { “address” : “xxxxxx”, “license” : “xxxxxx” } } 返回: { “id” : 1, “name” : “login\_license”, “data” : “”, “code” : 0 //参考10.错误代码 } 3.注销 name: ”logout” 例子: { “id” : 2, “name” : “logout”, } 返回: { “id” : 2, “name” : “logout”, “code” : 0 //参考10.错误代码 } 4.创建远程桌面会话 name: ”newsession” 例子: { “id” : 3, “name” : “newsession” “type” :0 } 返回: { “id” : 3, “name” : “newsession”, “code” : 0, //参考10.错误代码 “data” : { “address” : “xxxxxx”, “sessionid” : 0, “sessionname” : “xxxxxx” } } 5.销毁会话 name: ”destroysession” 参数: sessionid: 要销毁的sessionid 例子: { “id” : 4, “name” : “destroysession”, “data” : { “sessionid” : 1 } } 返回: { “id” : 4, “name” : “destroysession”, “data” : “”, “code” : 0 //参考10.错误代码 } 6.开启远程桌面 name: ”assist” 参数: address: 地址 session:会话 例子: { “id” : 5, “name” : “assist”, “data” : { “address” : “xxxxxx”, “session” : ”xxxxxx” } } 返回: { “id” : 5, “name” : “assist”, “data” : “”, “code” : 0 //参考10.错误代码 } 7.获取当前状态 name: ”get_status” 例子: { “id” : 6, “name” : “get\_status”, } 返回: { “id” : 6, “name” : “get\_status”, “code” : 0, //参考10.错误代码 “data” : { “is\_logginned” : true, “session” : [ { “addr” : “xxxxxx”, “connected” : true, “name” : “xxxxxx”, “sessionid” : 0 } { .... } ... { ... } ] //session集合 } } 8.事件通知 事件通知是服务端主动推送的,为了防止id重复,所以json包是不带id字段的 name: ”event” 参数: evnet: 事件ID 例子: { “name” : “evnet”, “data” : { “evnet” : 1 //参考11.被控端事件代码 } } 注:登录会触发连接,登录成功(or失败)事件,注销会触发断开连接事件。 9.会话回调通知 当创建一个会话后,会建立一个关于此会话的回调接口,当此会话状态发生变化时,会触发此回调事件。 name: ”sessionevt” 参数: evt: 事件ID id: 会话ID 例子: { “name” : “sessionevt”, “data” : { “evnet” : 1, //参考12.会话事件代码 “id” : 0 //会话ID } } 注:assist会触发其连接事件,destory和手动关闭会触发其断开连接事件。 扩展可以根据自己的需求对协议进行扩展。调用APISlSetWebServerFilter方法可以设置一个过滤方法,在过滤方法里,你可以尽情发挥。 提示: SlWebServerSend方法可以想web客户端发送数据。 过滤方法里返回true,代表已经处理了该数据,底层将不会再处理 API 详细说明 SLInitialize原型:bool SLInitialize(void); 功能:初始化正个SLAPI环境 返回:是否初始化成功 说明:在调用所有其他任何API之前调用,总之是应用程序中第一个调用的API SLUninitialize原型:bool SLUninitialize(void); 功能:退出并析构整个SLAPI环境 返回:是否成功 说明:程序退出前调用,总之是应用程序中最后一个调用的API SLGetLastError原型:SLERRCODE SLGetLastError(void) 功能:获取最后的错误码 返回:返回SLERRCODE错误码 说明:除了SLInitialize函数之外,任何API函数返回错误时,都可以用该API来获取失败的原因。该错误码是基于TLS的,线程上保持安全。 SLSetLastError原型:bool SLSetLastError(SLERRCODE errCode) 功能:设置最后的错误码 返回:是否设置成功 说明:通常情况下用户不需要使用该API来设置错误码。 SLGetErrorDesc原型:const char* SLGetErrorDesc(SLERRCODE errCode) 功能:获取错误码详细说明 返回:详细信息,如果错误码不存在则返回“未知错误” SLCreateClient原型:SLCLIENT SLCreateClient(void) 功能:创建一个被控制端环境 返回:返回被控制端环境值,如果创建失败则返回SLCLIENT_INVAILD 说明:返回值将用于后面很多的被控制端API函数中 SLDestroyClient原型:bool SLDestroyClient(SLCLIENT client) 功能:销毁一个被控制端环境 参数:client 由SLCreateClient创建出来的值 返回:是否销毁成功 说明:参数必须是由SLCreateClient函数创建出来的值,否则可能产生未定义后果 SLStartWebServer原型:SUNLOGIN_API bool SLStartWebServer(SLCLIENT client, unsigned int nPort=0); 功能:开启web监听服务,用户可以用websocket连接进来控制或查看状态 参数: client 由SLCreateClient创建出来的被控制端环境 nPort 要监听的端口号,默认是17801 返回:如果创建失败则返回false 说明:web监听服务的协议参考 SLStopWebServer原型:SUNLOGIN_API bool SLStopWebServer(SLCLIENT client); 功能:关闭web监听服务 参数: client 由SLCreateClient创建出来的被控制端环境 返回:如果失败则返回false SlSetWebServerFilter原型:SUNLOGIN_API bool SlSetWebServerFilter(SLCLIENT client,SLWEB_FILTER filter); 功能:关闭web监听服务 参数: client 被控制端环境 filter 函数指针 返回:如果失败则返回false SlWebServerSend原型:SUNLOGIN_API bool SlWebServerSend(SLCLIENT client,const void* pdata,unsigned int size); 功能:向web客户端发送数据 参数: client 被控制端环境 data 指向数据的指针 size 数据长度 返回:如果失败则返回false SLSetClientCallback原型:bool SLSetClientCallback(SLCLIENT client, SLCLIENT_CALLBACK pfnCallback, unsigned long custom) 功能:设置被控制端事件回调函数 参数: client 由SLCreateClient创建出来的被控制端环境 pfnCallback 回调函数,当被控制端发生事件时,会通过该函数回调 cusom 用户自定义参数,回调时内部程序会将此参数一并回调 返回:是否设置成功 SLClientLoginWithOpenID原型:bool SLClientLoginWithOpenID(SLCLIENT client, const char pstrOpenID, const char pstrOpenKey, const char* pstrDomain = “”, bool bUseSSL = false) 功能:被控制端登录服务器 参数: client 由SLCreateClient创建出来的被控制端环境 pstrOpenID 开发者的ID号 pstrOpenKey 开发者ID对应的验证码 pstrDomain OpenID登陆验证所指定的服务器的域名(可以默认) bUseSSL 配合pstrDomain使用,是否使用SSL 返回:是否登录出错,登录错出会返回false,但返回true不代码登录成功,如果想知道登录成功,必须通过回调SLCLIENT_EVENT_ONLOGIN事件得知 说明:开发者ID和验证码获取方式可参见本文“开发者账号”段落 SLClientLoginWithLicense原型:bool SLClientLoginWithLicense(SLCLIENT client, const char szAddr, const char szLic) 功能:被控制端登录服务器 参数: client 由SLCreateClient创建出来的被控制端环境 szAddr 服务器地址 szLic 服务器lincese 返回:是否登录出错,登录错出会返回false,但返回true不代码登录成功,如果想知道登录成功,必须通过回调SLCLIENT_EVENT_ONLOGIN事件得知 说明:该方法是提供给购买了定制服务器的用户使用的 SLClientIsOnLoginned原型:bool SLClientIsOnLoginned(SLCLIENT client) 功能:被控制端是否已经登录服务器 参数: client 由SLCreateClient创建出来的被控制端环境 返回:是否已经登录服务器 SLCreateClientSession原型:SLSESSION SLCreateClientSession(SLCLIENT client, ESLSessionType eType) 功能:在被控制端环境中创建一个远程会话 参数: client 由SLCreateClient创建出来的被控制端环境 eType 会话类型 返回:会话,如果失败则返回SLSESSION_INVAILD SLDestroyClientSession原型:bool SLDestroyClientSession(SLCLIENT client, SLSESSION session) 功能:销毁一个会话 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 返回:是否销毁成功 说明:session必须是由SLCreateClient***Session函数创建出来的Session值,不然可能产生未定义后果 SLEnumClientSession原型:unsigned int SLEnumClientSession(SLCLIENT client, SLSESSION* pSessionArray, unsigned int nArraySize) 功能:销毁一个会话 参数: client 由SLCreateClient创建出来的被控制端环境 pSessionArray 会话数组用于返回数据 nArraySize 会话数组长度,一般填256 返回:返回了多少个会话 说明:session必须是由SLCreateClient***Session函数创建出来的Session值,不然可能产生未定义后果 SLGetClientAddress原型:const char* SLGetClientAddress(SLCLIENT client) 功能:获取被控制端连接地址 参数:client 由SLCreateClient创建出来的被控制端环境 返回:地址 说明:必须在收到SLCLIENT_EVENT_ONLOGIN事件后,即使用开发者账号登录成功后才能调用本API,不然返回的值将是无效值。将该返回值告诉主控端,主控端就可以和该被控制端通讯了 SLGetClientSessionName原型:const char* SLGetClientSessionName(SLCLIENT client, SLSESSION session) 功能:获取被控制端某个会话的值 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 返回:会话值 说明:通过该值主控制端才能使用该会话的服务 SLClientSessionSendData原型:unsigned long SLClientSessionSendData(SLCLIENT client, SLSESSION session, const char* lpData, unsigned long nLen) 功能:会话发送数据 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 lpData 发送的数据 nLen 发送的数据长度 返回:实际发送的字节数,返回0表示出错 说明:目前只适用于DataTrans类型的会话 SLClientSessionRecvData原型:unsigned long SLClientSessionRecvData(SLCLIENT client, SLSESSION session, char* lpData, unsigned long nLen) 功能:会话接收数据 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 lpData 接收数据 nLen 准备接收的数据长度 返回:实际收到的字节数,返回0表示出错 说明:目前只适用于DataTrans类型的会话 SLGetClientSessionOpt原型:bool SLGetClientSessionOpt(SLCLIENT client, SLSESSION session, ESLSessionOpt eOpt, char* pOptVal, unsigned int nOptLen) 功能:获取被控制端某个会话某个属性值 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 eOpt 属性名 pOptVal 属性值 nOptLen 属性值长度 返回:是否获取成功 SLSetClientSessionOpt原型:bool SLSetClientSessionOpt(SLCLIENT client, SLSESSION session, ESLSessionOpt eOpt, const char* pOptVal, unsigned int nOptLen) 功能:设置被控制端某个会话某个属性值 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 eOpt 属性名 pOptVal 属性值 nOptLen 属性值长度 返回:是否设置成功 SLCreateRemote原型:SLREMOTE SLCreateRemote(void) 功能:创建一个控制端环境 返回:返回被控制端环境值,如果创建失败则返回SLREMOTE_INVAILD 说明:返回值将用于后面很多的主控制端API函数中 SLDestroyRemote原型:bool SLDestroyRemote(SLREMOTE remote) 功能:销毁一个控制端环境 参数:remote 由SLCreateRemote创建出来的主控制端环境 返回:是否销毁成功 说明:参数必须是由SLCreateRemote函数创建出来的值,否则可能产生未定义后果 SLSetRemoteCallback原型:bool SLSetRemoteCallback(SLREMOTE remote, SLREMOTE_CALLBACK pfnCallback, unsigned long custom) 功能:设置主控制端事件回调函数 参数: remote 由SLCreateRemote创建出来的主控制端环境 pfnCallback 回调函数,当被控制端发生事件时,会通过该函数回调 cusom 用户自定义参数,回调时内部程序会将此参数一并回调 返回:是否设置成功 SLCreateRemoteSession原型:SLSESSION SLCreateRemoteSession(SLREMOTE remote, ESLSessionType eType, const char pstrAddress, const char pstrSession) 功能:创建远程会话 参数: remote 由SLCreateRemote创建出来的主控制端环境 eType 会话类型 pstrAddress 远程被控制端地址,由SLGetClientAddress函数返回的值 pstrSession 远程桌面会话名,由SLGetSessionName函数返回的值 返回:会话,如果失败则返回SLSESSION_INVALD SLCreateRemoteEmptySession原型:SLSESSION SLCreateRemoteEmptySession(SLREMOTE remote, ESLSessionType eType) 功能:创建远程空会话 参数: remote 由SLCreateRemote创建出来的主控制端环境 eType 会话类型 返回:会话,如果失败则返回SLSESSION_INVALD 说明:和SLCreateRemoteSession不同的是创建一个空会话,不进行连接,后面必须再使用SLConnectRemoteSession来连接会话 SLConnectRemoteSession原型:SLSESSION SLConnectRemoteSession(SLREMOTE remote, SLSESSION session, const char pstrAddress, const char pstrSession) 功能:连接远程空会话 参数: remote 由SLCreateRemote创建出来的主控制端环境 pstrAddress 远程被控制端地址,由SLGetClientAddress函数返回的值 pstrSession 远程桌面会话名,由SLGetSessionName函数返回的值 返回:会话,如果失败则返回SLSESSION_INVALD 说明:只用于SLCreateRemoteEmptySession创建出来的会话 SLDestroyRemoteSession原型:bool SLDestroyRemoteSession(SLREMOTE remote, SLSESSION session) 功能:销毁一个会话 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 由SLCreateRemote***Session创建出来的会话值 返回:是否销毁成功 说明:session必须是由SLCreateRemote***Session函数创建出来的Session值,不然可能产生未定义后果 SLRemoteSessionSendData原型:unsigned long SLRemoteSessionSendData(SLCLIENT client, SLSESSION session, const char* lpData, unsigned long nLen) 功能:会话中发送数据,另一端会话会收到数据 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 lpData 发送的数据 nLen 发送的数据长度 返回:实际发送的字节数 说明:目前只适用于DataTrans类型的会话 SLRemoteSessionRecvData原型:unsigned long SLRemoteSessionRecvData(SLREMOTE remote, SLSESSION session, char* lpData, unsigned long nLen) 功能:会话接收数据 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 lpData 接收数据 nLen 准备接收的数据长度 返回:实际收到的字节数,返回0表示出错 说明:目前只适用于DataTrans类型的会话 SLGetRemoteSessionOpt原型:bool SLGetRemoteSessionOpt(SLCLIENT client, SLSESSION session, ESLSessionOpt eOpt, char* pOptVal, unsigned int nOptLen) 功能:获取主控制端某个会话某个属性值 参数: client 由SLCreateRemote创建出来的主控制端环境 session 会话 eOpt 属性名 pOptVal 属性值 nOptLen 属性值长度 返回:是否获取成功 SLSetRemoteSessionOpt原型:bool SLSetRemoteSessionOpt(SLREMOTE remote, SLSESSION session, ESLSessionOpt eOpt, const char* pOptVal, unsigned int nOptLen) 功能:设置主控制端某个会话某个属性值 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 eOpt 属性名 pOptVal 属性值 nOptLen 属性值长度 返回:是否设置成功 SLSetDesktopSessionPos原型:bool SLSetDesktopSessionPos(SLREMOTE remote, SLSESSION session, int x,int y,int width,int height) 功能:设置远程桌面窗口的大小 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 x x坐标 y y坐标 width宽度 height高度 返回:是否设置成功 SLSetClientProxy原型:bool SLSetClientProxy(SLCLIENT client, const SLPROXY_INFO& proxy) 功能:设置被控端代理 参数: client 由SLCreateClient创建出来的被控制端环境 proxy代理信息 返回:是否设置成功 SLSetRemoteProxy原型:bool SLSetRemoteProxy(SLREMOTE remote, const SLPROXY_INFO& proxy) 功能:设置被控端代理 参数: remote由SLCreateRemote创建出来的主控制端环境 proxy代理信息 返回:是否设置成功 SLSetDesktopSessionVisible原型:bool SLSetDesktopSessionVisible( SLREMOTE remote, SLSESSION session ) 功能:设置显示远程桌面 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 返回:是否设置成功 SLGetDesktopSessionOriginSize原型:bool SLGetDesktopSessionOriginSize( SLREMOTE remote, SLSESSION session, int width, int height ); 功能:获取远程桌面原图大小 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 width 桌面原图宽度 height 桌面原图高度 返回:是否设置成功 SLLoginWithOpenID原型:bool SLLoginWithOpenID(SLCLIENT client, const char pstrOpenID, const char pstrOpenKey, const char* pstrDomain = “”, bool bUseSSL = false) 功能:功能同SLClientLoginWithOpenID, 简化名称 参数: client 由SLCreateClient创建出来的被控制端环境 pstrOpenID 开发者的ID号 pstrOpenKey 开发者ID对应的验证码 pstrDomain OpenID登陆验证所指定的服务器的域名(可以默认) bUseSSL 配合pstrDomain使用,是否使用SSL 返回:是否设置成功 SLClientSendFile原型:SLUINT32 SLAPI SLClientSendFile(SLCLIENT client, SLSESSION session, const wchar_t* filepath, bool resume ) 功能:发送一个文件 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 filepath 发送文件的路径 resume 是否断点续传,否则重新发送文件 返回:文件id, 0代表失败 SLClientKillFile原型:bool SLAPI SLClientKillFile(SLCLIENT client, SLSESSION session, SLUINT32 fid ) 功能:取消发送文件 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 fid 文件id 返回:是否成功 SLClientGetFileName原型:const wchar_t* SLAPI SLClientGetFileName( SLCLIENT client, SLSESSION session, SLUINT32 fid ) 功能:获取文件路径名称 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 fid 文件id 返回:文件路径名称 SLClientGetFileSize原型:SLUINT64 SLAPI SLClientGetFileSize( SLCLIENT client, SLSESSION session, SLUINT32 fid ) 功能:获取传输的文件大小 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 fid 文件id 返回:文件大小 SLClientGetFileTransfered原型:SLUINT64 SLAPI SLClientGetFileTransfered( SLCLIENT client, SLSESSION session, SLUINT32 fid ) 功能:获取文件已传输的大小 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 fid 文件id 返回:文件已传输的大小 SLClientFileIsTransfering原型:bool SLAPI SLClientFileIsTransfering( SLCLIENT client, SLSESSION session, SLUINT32 fid ) 功能:文件是否正在传输中 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 fid 文件id 返回:true 正在传输,false 其他状态 SLClientFileIsDone原型:bool SLAPI SLClientFileIsDone( SLCLIENT client, SLSESSION session, SLUINT32 fid ); 功能:文件传输是否完成 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 fid 文件id 返回:true 传输完成 false 其他状态 SLClientFileIsKilled原型:bool SLAPI SLClientFileIsKilled( SLCLIENT client, SLSESSION session, SLUINT32 fid ); 功能:文件是否被取消传输 参数: client 由SLCreateClient创建出来的被控制端环境 session 会话 fid 文件id 返回:true 传输被取消 false 其他状态 SLRemoteSendFile原型:SLUINT32 SLAPI SLRemoteSendFile(SLREMOTE remote, SLSESSION session, const wchar_t* filepath, bool resume ) 功能:发送一个文件 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 filepath 发送文件的路径 resume 是否断点续传,否则重新发送文件 返回:文件id, 0代表失败 SLRemoteKillFile原型:bool SLAPI SLRemoteKillFile(SLREMOTE remote, SLSESSION session, SLUINT32 fid ) 功能:取消发送文件 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 fid 文件id 返回:是否成功 SLRemoteGetFileName原型:const wchar_t* SLAPI SLRemoteGetFileName( SLREMOTE remote, SLSESSION session, SLUINT32 fid ) 功能:获取文件路径名称 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 fid 文件id 返回:文件路径名称 SLRemoteGetFileSize原型:SLUINT64 SLAPI SLRemoteGetFileSize(SLREMOTE remote, SLSESSION session, SLUINT32 fid ) 功能:获取传输的文件大小 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 fid 文件id 返回:文件大小 SLRemoteGetFileTransfered原型:SLUINT64 SLAPI SLRemoteGetFileTransfered(SLREMOTE remote, SLSESSION session, SLUINT32 fid ) 功能:获取文件已传输的大小 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 fid 文件id 返回:文件已传输的大小 SLRemoteFileIsTransfering原型:bool SLAPI SLRemoteFileIsTransfering(SLREMOTE remote, SLSESSION session, SLUINT32 fid ) 功能:文件是否正在传输中 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 fid 文件id 返回:true 正在传输,false 其他状态 SLRemoteFileIsDone原型:bool SLAPI SLRemoteFileIsDone( SLREMOTE remote, SLSESSION session, SLUINT32 fid ); 功能:文件传输是否完成 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 fid 文件id 返回:true 传输完成 false 其他状态 SLRemoteFileIsKilled原型:bool SLAPI SLClientFileIsKilled( SLREMOTE remote, SLSESSION session, SLUINT32 fid ); 功能:文件是否被取消传输 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 fid 文件id 返回:true 传输被取消 false 其他状态 SLCreateClientEx原型:bool SLAPI SLCreateClientEx( SLMODE mode ); 功能:根据应用(UI,Service)场景创建向日葵客户端 参数: mode - 应用场景 返回:返回被控制端环境值,如果创建失败则返回SLCLIENT_INVAILD SLOpenClientLog原型:bool SLAPI SLOpenClientLog(SLCLIENT client, const char* path); 功能:启用被控制端的日志输出 参数: client 由SLCreateClient创建出来的被控制端环境 path 日志的输出路径 返回:是否设置成功 SLOpenRemoteLog原型:bool SLAPI SLOpenRemoteLog(SLREMOTE remote, const char* path); 功能:启用主控制端的日志输出 参数: remote由SLCreateRemote创建出来的主控制端环境 path 日志的输出路径 返回:是否设置成功 SLSetCmdSessionPos原型:bool SLSetCmdSessionPos(SLREMOTE remote, SLSESSION session, int x,int y,int width,int height) 功能:设置远程CMD窗口的大小 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 x x坐标 y y坐标 width宽度 height高度 返回:是否设置成功 SLSetCameraSessionPos原型:bool SLSetCameraSessionPos(SLREMOTE remote, SLSESSION session, int x,int y,int width,int height) 功能:设置远程摄像头窗口的大小 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 x x坐标 y y坐标 width宽度 height高度 返回:是否设置成功 SLRemoteCameraOpen原型:bool SLAPI SLRemoteCameraOpen(SLREMOTE remote, SLSESSION session, LONG dev_id); 功能:打开一个远程摄像头设备 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 dev_id 摄像头的唯一标识,由SLRemoteCameraGetList函数获取 返回:是否打开成功 SLRemoteCameraClose原型:bool SLAPI SLRemoteCameraClose(SLREMOTE remote, SLSESSION session); 功能:关闭当前正在使用的远程摄像头设备 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 返回:是否关闭成功 SLRemoteCameraSetDefinition原型:bool SLAPI SLRemoteCameraSetDefinition(SLREMOTE remote, SLSESSION session, ESLVideoDefinition eVD); 功能:设置当前摄像头的清晰度 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 eVD ESLVideoDefinition枚举值,主要有标清,高清,超清 返回:是否设置成功 SLRemoteCameraGetList原型:unsigned int SLAPI SLRemoteCameraGetList(SLREMOTE remote, SLSESSION session, CAMERA_INFO* infos = NULL, unsigned int nSize = 0); 功能:获取远程摄像头列表并返回摄像头个数,当infos为空时,此函数仅返回摄像头个数 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 infos CAMERA_INFO结构体数组,用于保存摄像头列表 nSize 结构体数组大小 返回:返回摄像头设备个数 SLDiscoverWoiDevice原型:bool SLAPI SLDiscoverWoiDevice(SLCLIENT client); 功能:扫描局域网内的开机棒设备,并通过SLCLIENT_WOI_CALLBACK回调返回设备的SN号 参数: client 由SLCreateClient创建出来的被控制端环境 返回:发送扫描请求成功或失败 SLBindWoiDevice原型:bool SLAPI SLBindWoiDevice(SLCLIENT client, const char pstrSN, const char pstrMac, const char* pstrPassword); 功能:绑定局域网内的开机棒设备,并通过SLCLIENT_WOI_CALLBACK回调返回绑定结果 参数: client 由SLCreateClient创建出来的被控制端环境 pstrSN 要绑定的开机棒的SN号 pstrMac 要绑定开机的MAC地址(AABBCCDDEEFF) pstrPassword 远程开机密码,与MAC地址一起唤醒设备 返回:发送绑定设备请求成功或失败 SLUnBindWoiDevice原型:bool SLAPI SLUnBindWoiDevice(SLCLIENT client, const char pstrSN, const char pstrMac, const char* pstrPassword); 功能:解绑局域网内的开机棒设备,并通过SLCLIENT_WOI_CALLBACK回调返回解绑结果 参数: client 由SLCreateClient创建出来的被控制端环境 pstrSN 要解绑的开机棒的SN号 pstrMac 要绑定开机的MAC地址(AABBCCDDEEFF) pstrPassword 远程开机密码,与MAC地址一起解绑设备 返回:发送解绑设备请求成功或失败 SLSetClientWOICallback原型:bool SLAPI SLSetClientWOICallback(SLCLIENT client, SLCLIENT_WOI_CALLBACK pfnCallback, unsigned long custom); 功能:设置远程开机棒事件回调,包括发现,绑定和解绑 参数: client 由SLCreateClient创建出来的被控制端环境 pfnCallback 回调函数,当操作开机棒发生事件时,会通过该函数回调 cusom 用户自定义参数,回调时内部程序会将此参数一并回调 返回:设置回调成功或失败 SLSetRemoteWOIControl原型:bool SLSetRemoteWOIControl(SLREMOTE remote, const char* pstrAddress, unsigned int nPort); 功能:设置远程开机服务器的ip和控制端口 参数: remote 由SLCreateRemote创建出来的主控制端环境 pstrAddress 远程开机服务器的IP地址 nPort 远程开机服务器的web控制端口 返回:设置成功或失败 SLSendWakeupCommand原型:bool SLAPI SLSendWakeupCommand(SLREMOTE remote, const char pstrMac, const char pstrPassword); 功能:发送远程唤醒指令 参数: remote 由SLCreateRemote创建出来的主控制端环境 pstrMac 待唤醒设备的Mac地址(AABBCCDDEEFF) pstrPassword 远程开机密码,与MAC地址一起唤醒设备 返回:发送唤醒成功或失败 SLSetRemoteWOICallback原型:bool SLAPI SLSetRemoteWOICallback(SLREMOTE remote, SLREMOTE_WOI_CALLBACK pfnCallback, unsigned long custom); 功能:设置远程开机事件回调 参数: remote 由SLCreateRemote创建出来的主控制端环境 pfnCallback 回调函数,当远程开机指令响应时,会通过该函数回调 cusom 用户自定义参数,回调时内部程序会将此参数一并回调 返回:设置回调成功或失败 SLGetRemoteSysinfo原型:unsigned int SLAPI SLGetRemoteSysinfo(SLREMOTE remote, SLSESSION session, const char pstrQuery, const char pstrContent); 功能:获取远程客户端的系统信息 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 pstrQuery 查询字符串\<参见13> pstrContent 查询内容\<参见13> 返回:当前操作的执行的编号(自1开始递增) SLHideRemoteDesktopToolbarItem原型:bool SLAPI SLHideRemoteDesktopToolbarItem(SLREMOTE remote, SLSESSION session, SLDesktopControlType eType); 功能:根据枚举值隐藏远程桌面工具栏上的对应模块 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 eType 远程桌面工具栏上各控制模块的枚举值[SLDesktopControlType] 返回:是否设置成功 SLGetRemoteDesktopDevList原型:unsigned int SLAPI SLGetRemoteDesktopDevList(SLREMOTE remote, SLSESSION session, SLDesktopDevType eType, SLBASE_INFO* infos = 0, unsigned int nSize = 0); 功能:获取远程桌面屏幕,会话,分辨率的信息列表并返回相应模块的个数,当infos为空时,此函数仅返回模块个数 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 eType 远程桌面中各信息模块的枚举值[SLDesktopDevType] infos SLBASE_INFO结构体数组,用于保存基本信息列表 nSize 结构体数组大小 返回:返回模块个数 SLSendRemoteDesktopCommand原型:bool SLAPI SLSendRemoteDesktopCommand(SLREMOTE remote, SLSESSION session, SLDesktopCommandType eType, unsigned int nIndex = 0); 功能:发送远程桌面控制命令 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 eType 远程桌面中各命令模块的枚举值[SLDesktopCommandType] nIndex 索引值,只针对于切换屏幕,切换会话,切换分辨率等选择性的命令有效 返回:是否执行成功 SLGetRemoteDesktopCurState原型:bool SLAPI SLGetRemoteDesktopCurState(SLREMOTE remote, SLSESSION session, SLDesktopStateType eType, unsigned int& nState); 功能:得到枚举的模块的当前状态值 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 eType 远程桌面中各状态模块的枚举值[SLDesktopStateType] nState [in]状态值,保存状态模块的当前状态值或索引值 返回:是否执行成功 SLRemoteDesktopScreenShot原型:bool SLAPI SLRemoteDesktopScreenShot(SLREMOTE remote, SLSESSION session, const char* filepath); 功能:截取一张远程桌面图像并保存 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 filepath 截屏文件的绝对路径(包含文件名) 返回:是否截屏成功 SLRemoteDesktopStartRecord原型:bool SLAPI SLRemoteDesktopStartRecord( SLREMOTE remote, SLSESSION session, const char* filepath ); 功能:远程桌面时,开启录像功能开始录像 参数: remote由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 filepath 保存的录屏文件的全路径,包含文件名(后缀一般为.ts) 返回:是否开启录像成功 SLRemoteDesktopStopRecord原型:void SLAPI SLRemoteDesktopStopRecord( SLREMOTE remote, SLSESSION session ); 功能:远程桌面时,停止当前录像 参数: remote由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 返回:无 SLSetRemoteDesktopPlatform原型:bool SLAPI SLSetRemoteDesktopPlatform(SLREMOTE remote, SLSESSION session, SLPlatformType eType); 功能:远程桌面时手动设置被控制端的平台信息,主要用于在主控端显示不同样式的控制菜单 参数: remote由SLCreateRemote创建出来的主控制端环境 session 主控端桌面会话 eType被控端平台枚举值[SLPlatformType] 返回:是否设置成功 SLClientStartChat原型:bool SLAPI SLClientStartChat(SLCLIENT client, SLSESSION session, bool bShow = true); 功能:被控端主动发起聊天,弹出聊天窗口 参数: client由SLCreateClient创建出来的被控制端环境 session 被控端桌面会话 bShow 是否显示窗口。如果为true,则为初始化创建窗口(仅针对Mac OSX有效) 返回:是否发起成功 SLClientEnableControl原型:bool SLAPI SLClientEnableControl(SLCLIENT client, SLSESSION session, bool bEnable); 功能:被控端切换控制/观看模式 参数: client由SLCreateClient创建出来的被控制端环境 session 被控端桌面会话 bEnable是否为控制模式 返回:是否切换成功 SLGetClientSessionConnection原型:bool SLAPI SLGetClientSessionConnection(SLCLIENT client, SLSESSION session, bool& isp2p, bool& islocal); 功能:获取被控端当前会话的连接信息(是否是p2p连接,是否是本地局域网互联) 参数: client由SLCreateClient创建出来的被控制端环境 session 会话 isp2p 是否是p2p连接 islocal 是否是本地局域网互联 返回:是否获取成功 SLGetRemoteSessionConnection原型:bool SLAPI SLGetRemoteSessionConnection(SLREMOTE remote, SLSESSION session, bool& isp2p, bool& islocal); 功能:获取主控端当前会话的连接信息(是否是p2p连接,是否是本地局域网互联) 参数: remote由SLCreateRemote创建出来的主控制端环境 session 会话 isp2p 是否是p2p连接 islocal 是否是本地局域网互联 返回:是否获取成功 SLSetSshSessionPos原型:bool SLSetSshSessionPos(SLREMOTE remote, SLSESSION session, int x,int y,int width,int height) 功能:设置远程SSH窗口的大小 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 x x坐标 y y坐标 width宽度 height高度 返回:是否设置成功 SLSetFileMgrSessionPos原型:bool SLSetFileMgrSessionPos(SLREMOTE remote, SLSESSION session, int x,int y,int width,int height) 功能:设置远程文件管理窗口的大小 参数: remote 由SLCreateRemote创建出来的主控制端环境 session 会话 x x坐标 y y坐标 width宽度 height高度 返回:是否设置成功 会话属性 概述每种类型的会话都可以设置其属性达到不同的效果,如远程桌面可以设置eSessionOpt_window来设置其远程桌面的显示窗口,同样也可以获取某个属性的属性值。 ESLSessionOpt枚举了所有可以使用的会话属性,你可以使用SLGetClientSessionOpt和SLSetRemoteSessionOpt来获取会话属性,可以使用SLSetClientSessionOpt和SLSetRemoteSessionOpt来设置会话属性。 有的属性只能用在被控制端,有的属性只能用在主控制端,有的两者都可以使用,有的属性只能设置不能获取,有的属性只能获取不能设置。以下将详细介绍各个属性的使用方式。 eSLSessionOpt_window适用环境:主控制端环境 适用会话:远程桌面会话,远程CMD会话,远程摄像头会话 适用方式:设置 功能:设置主控制端显示远程桌面的窗口句柄 参数: pOptVal 窗口句柄指针,在Windows下为HWND* nOptLen 窗口句柄字节数,在Windows下为sizeof(HWND) eSLSessionOpt_deviceSource适用环境:被控制端环境 适用会话:远程声音会话 适用方式:设置/获取 功能:设置被控制端传出声音是从声卡上传出还是麦克风传出 参数: pOptVal 是否为麦克风传出,bool类型,true为是,false为否(即声卡传出) nOptLen bool类型长度,即1个字节 eSLSessionOpt_connected适用环境:被控制端环境 适用会话:所有会话 适用方式:获取 功能:获取当前会话是否已经连接还是未连接 参数: pOptVal 是bool类型,true为已连接,false为未连接 nOptLen bool类型长度,即1个字节 eSLSessionOpt_ipport适用环境:主控制端环境 适用会话:所有会话 适用方式:设置 功能:设置端口转发的本地服务的ip地址和端口 参数: pOptVal const char*类型,格式为 ip:port,具体请参考示例程序 nOptLen const char*类型长度 eSLSessionOpt_savepath适用环境:主控被控制端环境 适用会话:所有会话 适用方式:设置 功能:设置文件传输保存路径 参数: pOptVal const wchar_t* 类型 nOptLen const wchar_t 类型长度 2,具体请参考示例程序 错误代码代码(code) 定义 说明0 SLERRCODE_SUCCESSED 成功1 SLERRCODE_INNER 内部错误2 SLERRCODE_UNINITIALIZED 未初始化3 SLERRCODE_ARGS 参数错误4 SLERRCODE_NOTSUPPORT 不支持5 SLERRCODE_CONNECT_FAILED 网络连接失败6 SLERRCODE_CONNECT_TIMEOUT 网络连接超时7 SLERRCODE_SESSION_NOTEXIST 会话不存在8 SLERRCODE_SESSION_OVERFLOW 会话溢出9 SLERRCODE_SESSION_WRONGTYPE 会话类型错误10 SLERRCODE_EXPIRED OPENID过期11 SLERRCODE_REQUEST_FREQUENT 请求频繁 被控端事件代码代码(code) 定义 说明0 SLCLIENT_EVENT_ONCONNECT 连接成功1 SLCLIENT_EVENT_ONDISCONNECT 断开连接2 SLCLIENT_EVENT_ONLOGIN 登录成功3 SLCLIENT_EVENT_ONLOGINFAIL 登录失败4 SLCLIENT_EVENT_ONCHANNELSFULL 连接通道已满5 SLCLIENT_EVENT_ONCHECKCFAIL 检查通道数失败 会话事件代码代码(code) 定义 说明1 eSLSessionEvent_OnConnected 连接成功2 eSLSessionEvent_OnDisconnected 断开连接3 eSLSessionEvent_OnDisplayChanged 分辨率改变4 eSLSessionEvent_OnNewFiletrans 新文件传输5 eSLSessionEvent_OnGetRemoteSysinfo 远程系统信息回调 远程客户端系统信息当主控端和被控端建立远程系统信息的连接后,主控端可以调用SLGetRemoteSysinfo函数来获取和修改被控端系统的一些基本信息,其中包括性能检测、事件查看、进程信息、服务、本地用户和组、共享资源和环境变量等信息。具体指令和响应数据结构如下表所示(获取信息返回xml数据结构,执行命令返回JSON数据结构): 系统信息 参数1(QueryStri
中国联通黑名单-人联网应用限制IP&网段
腾讯云 华为云 阿里云 1.12.36.0/22 1.178.32.0/19 8.128.0.0/10 1.12.40.0/21 14.137.128.0/18 8.208.0.0/16 1.12.48.0/20 39.156.192.0/22 8.209.0.0/18 1.12.64.0/18 43.225.140.0/22 8.209.65.0/24 1.12.128.0/17 43.254.0.0/22 8.209.66.0/23 1.13.0.0/20 43.255.104.0/22 8.209.68.0/22 1.13.16.0/21 45.199.144.0/22 8.209.72.0/21 1.13.24.0/24 45.249.212.0/24 8.209.80.0/20 1.13.79.0/24 49.0.192.0/20 8.209.96.0/19 1.13.80.0/20 49.0.224.0/19 8.209.128.0/17 1.13.96.0/19 49.4.0.0/17 8.210.0.0/15 1.13.128.0/19 60.204.0.0/16 8.212.0.0/14 1.13.160.0/22 94.74.64.0/18 8.216.0.0/13 1.13.164.0/23 103.31.200.0/22 14.1.112.0/22 1.13.168.0/21 103.69.140.0/22 39.96.0.0/13 1.13.176.0/20 103.161.220.0/23 39.104.0.0/14 1.13.192.0/18 103.239.72.0/23 39.108.0.0/16 1.14.0.0/18 103.240.156.0/22 42.96.128.0/17 1.14.64.0/21 103.255.60.0/22 42.120.0.0/15 1.14.72.0/22 110.41.0.0/16 42.156.128.0/17 1.14.76.0/23 110.238.64.0/19 45.113.40.0/22 1.14.90.0/23 110.238.96.0/24 47.52.0.0/16 1.14.92.0/22 110.238.104.0/21 47.53.0.0/17 1.14.96.0/19 110.238.112.0/20 47.53.128.0/24 1.14.128.0/17 114.115.128.0/17 47.53.130.0/23 1.15.0.0/16 114.116.0.0/16 47.53.132.0/22 1.116.0.0/15 114.119.128.0/18 47.53.136.0/21 14.22.0.0/21 116.63.0.0/16 47.53.144.0/20 14.22.8.0/24 116.66.184.0/22 47.53.160.0/19 14.22.33.0/24 116.205.0.0/18 47.53.192.0/18 14.29.105.0/24 116.205.128.0/17 47.56.0.0/15 14.116.230.0/23 117.78.0.0/18 47.74.0.0/15 14.116.232.0/24 119.3.0.0/16 47.76.0.0/14 14.116.247.0/24 119.8.0.0/16 47.80.0.0/13 14.119.113.0/24 119.12.160.0/20 47.88.0.0/16 14.215.26.0/24 119.13.64.0/19 47.89.0.0/18 27.155.116.0/22 119.13.96.0/20 47.89.64.0/20 27.221.15.128/25 119.13.160.0/20 47.89.80.0/22 27.221.42.0/24 120.46.0.0/16 47.89.86.0/23 27.221.44.128/25 120.234.186.0/23 47.89.91.0/24 36.110.185.0/24 120.238.27.0/24 47.89.92.0/22 36.155.162.0/23 121.36.0.0/15 47.89.96.0/20 36.155.164.0/22 121.91.152.0/21 47.89.112.0/21 36.155.168.0/21 121.91.168.0/21 47.89.120.0/23 36.155.176.0/20 121.91.200.0/21 47.89.123.0/24 36.155.192.0/19 122.8.128.0/18 47.89.124.0/22 36.155.224.0/21 122.9.0.0/17 47.89.128.0/17 36.155.232.0/22 122.9.128.0/18 47.90.0.0/15 36.155.236.0/24 122.9.192.0/19 47.92.0.0/14 36.155.240.0/20 122.9.236.0/22 47.96.0.0/12 36.158.243.0/24 122.9.240.0/20 47.112.0.0/14 36.158.244.0/22 122.112.128.0/17 47.116.0.0/15 36.248.4.0/24 123.60.0.0/17 47.118.0.0/20 36.248.10.0/23 123.60.192.0/18 47.118.16.0/21 36.248.13.0/24 123.249.0.0/17 47.118.24.0/22 39.156.115.0/24 124.70.0.0/16 47.118.28.0/23 39.156.116.0/23 124.71.0.0/17 47.118.31.0/24 42.81.168.0/21 124.71.128.0/18 47.118.32.0/19 42.81.176.0/22 124.71.192.0/19 47.118.64.0/18 42.81.180.0/24 124.71.224.0/20 47.118.128.0/17 42.187.128.0/17 124.71.248.0/21 47.119.0.0/16 42.192.0.0/15 139.9.0.0/16 47.120.0.0/13 42.194.128.0/17 139.159.128.0/17 47.189.0.0/16 43.128.0.0/16 140.207.249.0/26 47.235.0.0/22 43.129.0.0/18 140.207.249.64/28 47.235.4.0/24 43.129.64.0/19 140.210.128.0/19 47.235.6.0/23 43.129.96.0/23 140.210.192.0/19 47.235.9.0/24 43.129.100.0/22 140.210.224.0/20 47.235.10.0/23 43.129.104.0/21 154.83.0.0/23 47.235.12.0/22 43.129.112.0/20 156.227.22.0/23 47.235.16.0/20 43.129.128.0/17 156.232.16.0/20 47.235.32.0/19 43.130.0.0/20 156.249.32.0/20 47.235.64.0/18 43.130.16.0/22 159.138.0.0/19 47.235.128.0/17 43.130.20.0/24 159.138.32.0/20 47.236.0.0/14 43.130.26.0/23 159.138.48.0/22 47.240.0.0/19 43.130.28.0/22 159.138.52.0/23 47.240.32.0/21 43.130.32.0/19 159.138.55.0/24 47.240.40.0/22 43.130.64.0/20 159.138.56.0/21 47.240.44.0/23 43.130.80.0/23 159.138.64.0/21 47.240.47.0/24 43.130.84.0/22 159.138.72.0/22 47.240.48.0/20 43.130.88.0/22 159.138.76.0/23 47.240.64.0/18 43.130.96.0/19 159.138.79.0/24 47.240.128.0/17 43.130.128.0/24 159.138.80.0/20 47.241.0.0/16 43.130.192.0/23 159.138.96.0/19 47.242.0.0/17 43.130.194.0/24 159.138.128.0/17 47.242.128.0/20 43.130.224.0/20 182.160.0.0/19 47.242.144.0/23 43.130.240.0/21 182.160.32.0/20 47.242.146.0/24 43.130.248.0/22 182.160.48.0/22 47.242.148.0/22 43.130.252.0/23 182.160.56.0/21 47.242.152.0/21 43.130.254.0/24 190.92.192.0/18 47.242.160.0/19 43.131.0.0/18 202.170.88.0/21 47.242.192.0/18 43.131.64.0/19 218.245.64.0/18 47.243.0.0/16 43.131.96.0/20 47.244.0.0/15 43.131.112.0/21 47.246.0.0/21 43.131.120.0/24 47.246.8.0/23 43.131.128.0/19 47.246.11.0/24 43.131.192.0/20 47.246.12.0/24 43.131.208.0/21 47.246.14.0/23 43.131.216.0/22 47.246.16.0/21 43.131.220.0/23 47.246.24.0/23 43.131.224.0/19 47.246.26.0/24 43.132.0.0/24 47.246.28.0/22 43.132.43.0/24 47.246.32.0/19 43.132.44.0/22 47.246.64.0/18 43.132.48.0/21 47.246.128.0/17 43.132.64.0/24 47.250.0.0/16 43.132.66.0/23 47.251.0.0/20 43.132.68.0/22 47.251.32.0/19 43.132.72.0/23 47.252.0.0/15 43.132.74.0/24 47.254.0.0/16 43.132.80.0/22 58.96.160.0/19 43.132.84.0/23 59.82.0.0/16 43.132.88.0/22 59.110.0.0/16 43.132.93.0/24 60.205.0.0/16 43.132.94.0/23 101.37.0.0/16 43.132.96.0/23 101.132.0.0/17 43.132.99.0/24 101.132.128.0/19 43.132.100.0/22 101.132.160.0/20 43.132.104.0/21 101.132.176.0/22 43.132.112.0/20 101.132.180.0/23 43.132.128.0/17 101.132.182.0/24 43.133.0.0/18 101.132.183.0/26 43.133.64.0/19 101.132.183.64/27 43.133.96.0/20 101.132.183.96/31 43.133.112.0/21 101.132.183.98/32 43.133.120.0/22 101.132.183.100/30 43.133.124.0/24 101.132.183.104/29 43.133.128.0/17 101.132.183.112/28 43.134.0.0/16 101.132.183.128/25 43.135.0.0/17 101.132.184.0/21 43.135.128.0/19 101.132.192.0/18 43.135.160.0/20 101.133.0.0/16 43.135.176.0/21 101.200.0.0/15 43.135.184.0/22 103.15.96.0/22 43.135.192.0/20 106.11.0.0/16 43.135.208.0/21 106.14.0.0/15 43.135.216.0/22 110.75.224.0/19 43.135.220.0/23 110.76.32.0/19 43.136.0.0/22 110.173.192.0/20 43.136.4.0/24 112.73.64.0/18 43.136.128.0/21 112.74.0.0/16 43.136.136.0/23 112.124.0.0/19 43.136.140.0/22 112.124.32.0/21 43.136.144.0/20 112.124.40.0/22 43.136.160.0/22 112.124.44.0/23 43.136.164.0/23 112.124.46.0/24 43.137.0.0/19 112.124.47.0/28 43.137.32.0/23 112.124.47.16/29 43.137.144.0/22 112.124.47.24/31 43.137.152.0/21 112.124.47.26/32 43.137.184.0/24 112.124.47.28/30 43.137.188.0/22 112.124.47.32/27 43.137.214.0/23 112.124.47.64/26 43.137.216.0/23 112.124.47.128/25 43.137.219.0/24 112.124.48.0/20 43.137.220.0/22 112.124.64.0/18 43.137.240.0/22 112.124.128.0/17 43.137.244.0/24 112.126.0.0/16 43.137.247.0/24 114.55.0.0/16 43.138.0.0/18 114.215.0.0/18 43.138.64.0/19 114.215.64.0/19 43.138.96.0/22 114.215.96.0/20 43.138.128.0/18 114.215.112.0/21 43.138.192.0/19 114.215.120.0/22 43.138.224.0/22 114.215.124.0/23 43.152.0.0/22 114.215.126.0/28 43.152.6.0/24 114.215.126.17/32 43.152.10.0/23 114.215.126.18/31 43.152.13.0/24 114.215.126.20/30 43.152.14.0/23 114.215.126.24/29 43.152.22.0/23 114.215.126.32/27 43.152.24.0/22 114.215.126.64/26 43.152.44.0/23 114.215.126.128/25 43.152.53.0/24 114.215.127.0/24 43.152.58.0/23 114.215.128.0/17 43.152.60.0/24 115.29.108.56/29 43.152.62.0/24 115.29.108.64/26 43.152.64.0/24 115.29.108.128/25 43.152.66.0/23 115.29.109.0/24 43.152.68.0/22 115.29.110.0/23 43.152.72.0/22 115.29.112.0/20 43.152.80.0/20 115.29.128.0/17 43.152.192.0/19 116.62.0.0/16 43.152.224.0/20 116.211.167.0/24 43.152.240.0/21 116.211.168.0/22 43.152.248.0/24 116.211.172.0/23 43.153.0.0/16 116.211.174.0/24 43.154.0.0/15 116.251.65.0/26 43.156.0.0/15 116.251.65.64/27 43.158.0.0/16 116.251.65.96/28 43.159.0.0/17 116.251.65.128/27 43.159.128.0/20 116.251.65.160/28 43.159.144.0/21 116.251.65.177/32 43.159.152.0/22 116.251.65.178/31 43.159.156.0/23 116.251.65.180/30 43.242.252.0/22 116.251.65.184/29 43.243.247.0/25 116.251.65.192/26 43.247.196.0/22 116.251.66.32/27 43.250.144.0/24 116.251.66.64/26 45.40.192.0/20 116.251.66.128/25 45.40.208.0/21 116.251.72.0/29 45.40.224.0/19 116.251.72.8/30 45.113.68.0/22 116.251.72.28/30 49.7.70.0/23 116.251.72.32/28 49.7.72.0/23 116.251.72.48/29 49.7.74.0/24 116.251.72.56/30 49.7.105.0/24 116.251.72.84/30 49.7.106.0/23 116.251.72.88/29 49.7.108.0/23 116.251.72.96/27 49.51.0.0/19 116.251.72.128/27 49.51.32.0/20 116.251.72.160/29 49.51.48.0/21 116.251.72.168/30 49.51.62.0/23 116.251.72.180/30 49.51.64.0/19 116.251.72.184/29 49.51.96.0/21 116.251.72.192/28 49.51.104.0/22 116.251.72.212/30 49.51.108.0/23 116.251.72.216/29 49.51.128.0/17 116.251.72.224/27 49.232.0.0/14 118.31.0.0/16 58.49.219.0/24 118.178.0.0/16 58.61.164.128/25 118.190.0.0/16 58.87.64.0/18 119.23.0.0/16 58.144.128.0/22 119.38.128.0/19 58.144.132.0/24 119.38.160.0/24 58.144.159.0/24 119.38.161.0/25 58.144.176.0/22 119.38.161.192/26 58.144.180.0/23 119.38.163.0/24 58.144.200.0/22 119.38.164.0/22 58.144.204.0/23 119.38.168.0/21 58.144.206.0/24 119.38.176.0/20 58.212.179.0/24 120.24.0.0/15 58.217.164.0/23 120.27.6.0/24 58.217.185.0/24 120.27.13.0/24 58.217.187.0/24 120.55.0.0/16 58.217.190.0/24 120.76.0.0/16 58.217.224.0/24 120.77.0.0/17 58.217.230.0/24 120.77.128.0/18 58.217.253.0/24 120.77.192.0/20 58.217.254.0/24 120.77.208.0/22 58.246.163.0/24 120.77.212.0/26 58.251.149.0/24 120.77.212.64/28 58.251.150.0/24 120.77.212.80/30 59.83.202.0/23 120.77.212.85/32 59.83.204.0/23 120.77.212.86/31 59.83.206.0/24 120.77.212.88/29 60.28.1.128/25 120.77.212.96/27 60.28.187.128/25 120.77.212.128/25 60.28.215.0/24 120.77.213.0/24 60.28.233.0/25 120.77.214.0/23 60.217.249.0/24 120.77.216.0/21 60.217.253.0/25 120.77.224.0/19 61.135.167.0/24 120.78.0.0/15 61.135.191.0/24 121.29.18.0/24 61.144.238.128/27 121.29.51.0/24 61.151.176.0/23 121.40.0.0/14 61.151.184.0/23 121.89.165.0/24 61.151.191.0/24 121.89.207.0/24 61.151.193.0/24 121.196.0.0/14 61.151.208.0/23 123.56.0.0/15 61.152.88.0/24 139.129.0.0/16 61.152.100.0/24 139.196.0.0/16 61.156.196.192/26 139.224.0.0/16 61.164.140.0/24 140.205.2.0/23 61.172.204.0/24 140.205.4.0/22 61.174.242.0/24 140.205.8.0/21 61.181.203.0/24 140.205.16.0/20 61.181.204.0/24 140.205.32.0/19 61.241.26.0/23 140.205.64.0/18 61.241.52.0/22 140.205.128.0/17 61.241.56.0/23 147.139.0.0/16 61.241.58.0/24 149.129.0.0/20 61.242.177.0/24 149.129.32.0/22 61.242.178.0/24 149.129.36.0/24 62.234.0.0/16 149.129.37.0/27 64.71.138.0/25 149.129.37.32/30 81.68.0.0/14 149.129.37.36/31 82.156.0.0/16 149.129.37.148/30 82.157.0.0/17 149.129.37.152/29 82.157.128.0/18 149.129.37.160/27 82.157.192.0/19 149.129.37.192/26 82.157.224.0/20 149.129.38.0/23 82.157.240.0/23 149.129.40.0/21 94.191.0.0/17 149.129.48.0/20 101.32.0.0/16 149.129.64.0/18 101.33.0.0/22 149.129.128.0/17 101.33.4.0/23 157.119.194.0/23 101.33.6.0/24 161.117.0.0/16 101.33.8.0/21 163.181.22.0/24 101.33.16.0/22 163.181.24.0/24 101.33.20.0/23 163.181.33.0/24 101.33.22.0/24 163.181.35.0/24 101.33.24.0/24 163.181.37.0/24 101.33.26.0/23 170.33.0.0/24 101.33.29.0/24 170.33.13.0/24 101.33.30.0/24 170.33.14.0/24 101.33.32.0/20 170.33.16.0/20 101.33.48.0/21 170.33.80.0/24 101.33.56.0/24 182.92.0.0/17 101.33.60.0/22 198.11.128.0/18 101.33.64.0/24 203.107.0.0/19 101.33.66.0/23 203.107.32.0/20 101.33.68.0/22 203.107.54.0/23 101.33.72.0/21 203.119.128.0/17 101.33.80.0/21 205.204.96.0/19 101.33.90.0/23 218.11.0.0/24 101.33.99.0/24 218.244.128.0/19 101.33.100.0/22 222.26.168.7/32 101.33.104.0/21 222.26.168.9/32 101.33.112.0/20 222.26.168.11/32 101.33.196.0/22 222.26.168.12/32 101.33.200.0/21 101.33.208.0/21 101.33.216.0/22 101.33.220.0/23 101.33.222.0/24 101.33.224.0/19 101.34.0.0/15 101.42.64.0/18 101.42.128.0/17 101.43.0.0/16 101.67.4.0/22 101.67.8.0/23 101.89.40.0/21 101.89.48.0/21 101.91.1.0/24 101.91.2.0/23 101.91.4.0/24 101.91.16.0/21 101.91.29.0/24 101.91.30.0/23 101.91.32.0/23 101.91.34.0/24 101.91.41.0/24 101.91.42.0/24 101.206.154.0/24 101.226.80.0/22 101.226.84.0/24 101.226.98.0/25 101.226.232.0/24 101.227.140.0/24 101.227.218.0/23 101.227.220.0/23 103.7.28.0/23 103.38.116.0/22 103.52.216.0/22 103.95.52.0/24 103.150.199.0/24 103.205.139.128/26 103.238.16.0/22 106.38.225.0/24 106.39.180.0/24 106.39.183.0/24 106.39.184.0/24 106.39.186.0/24 106.52.0.0/14 106.119.170.0/23 106.119.172.0/22 106.119.176.0/24 106.120.154.0/24 109.244.0.0/16 110.40.128.0/17 110.42.128.0/17 110.53.246.0/24 111.10.9.0/24 111.10.10.0/23 111.10.12.0/22 111.10.16.0/24 111.10.50.0/23 111.10.57.0/24 111.10.58.0/23 111.13.4.0/23 111.13.13.0/24 111.13.72.0/23 111.13.80.0/23 111.13.83.0/24 111.13.84.0/24 111.13.200.0/22 111.13.240.0/22 111.30.148.0/23 111.30.150.0/24 111.30.156.0/23 111.30.166.0/23 111.30.177.0/24 111.30.178.0/23 111.30.180.0/22 111.30.184.0/22 111.30.188.0/23 111.31.187.0/24 111.31.188.0/24 111.33.182.0/24 111.48.139.0/24 111.48.140.0/24 111.161.44.0/24 111.229.0.0/16 111.230.0.0/15 112.49.56.0/23 112.49.62.0/23 112.64.235.0/24 112.64.236.0/23 112.65.192.0/22 112.80.250.0/23 112.86.230.0/24 112.90.2.0/23 112.90.4.0/23 112.90.8.0/23 112.90.10.0/24 112.90.13.0/24 112.90.14.128/25 112.90.15.0/24 112.90.34.0/23 112.90.136.0/23 112.95.129.0/28 112.95.129.16/29 112.95.129.56/29 113.99.136.0/21 113.108.64.0/24 113.108.67.0/25 113.108.72.128/25 113.108.73.0/25 113.108.76.0/24 113.108.77.0/25 113.108.78.0/24 113.108.80.128/25 113.108.81.0/24 113.108.82.0/23 113.108.84.0/23 113.108.86.0/24 113.108.87.0/25 113.108.89.0/24 113.108.91.0/25 113.108.92.0/23 113.108.237.0/24 113.142.8.0/22 113.142.12.0/23 113.142.74.0/24 113.200.130.0/24 113.207.30.0/24 113.250.0.0/21 113.250.17.0/24 113.250.18.0/24 113.250.23.0/24 113.250.24.0/24 114.80.26.0/23 114.80.28.0/24 114.80.109.0/24 114.117.0.0/20 114.117.32.0/23 114.117.128.0/21 114.117.160.0/19 114.117.192.0/19 114.117.224.0/20 114.117.240.0/21 114.117.248.0/22 114.117.252.0/24 114.132.0.0/16 114.221.144.0/21 114.222.112.0/23 114.222.114.0/24 115.159.0.0/16 115.236.132.0/22 115.236.136.0/23 116.6.239.128/28 116.6.239.240/28 116.31.64.0/22 116.31.68.0/23 116.128.142.0/23 116.128.144.0/23 116.128.168.0/21 116.162.31.0/24 116.162.32.0/22 116.162.36.0/23 116.211.193.0/24 117.62.240.0/22 117.131.24.0/23 117.131.28.0/22 117.135.129.0/24 117.135.130.0/24 117.135.139.0/24 117.135.156.0/23 117.135.158.0/24 117.135.160.0/24 117.135.162.0/24 117.144.232.0/23 117.174.133.0/24 117.174.134.0/23 117.177.252.0/22 117.184.232.0/22 117.184.236.0/23 117.184.254.0/23 117.185.26.0/25 117.185.31.0/24 117.185.112.0/22 117.185.118.0/25 117.185.140.0/23 117.185.142.0/24 118.24.0.0/15 118.89.0.0/16 118.112.0.0/22 118.112.4.0/24 118.123.232.0/22 118.123.236.0/23 118.123.250.0/23 118.123.252.0/24 118.126.64.0/18 118.143.194.0/24 118.195.128.0/17 119.6.208.0/21 119.6.216.0/22 119.6.220.0/24 119.6.231.0/24 119.27.160.0/19 119.28.0.0/15 119.45.0.0/16 119.84.159.0/24 119.91.0.0/16 119.145.22.248/29 119.147.3.0/24 119.147.4.0/22 119.147.8.0/21 119.147.16.0/24 119.147.17.0/25 119.147.18.0/23 119.147.20.0/23 119.147.32.0/25 119.147.68.0/24 119.147.73.0/24 119.147.74.0/23 119.147.76.0/24 119.147.78.0/23 119.147.95.0/24 119.147.179.0/24 120.53.0.0/16 120.88.56.0/23 120.204.4.0/24 120.204.13.0/24 120.204.24.0/23 120.204.206.0/23 120.232.18.0/23 120.232.20.0/22 120.232.24.0/24 120.232.195.0/24 120.241.127.0/24 120.241.128.0/21 120.241.136.0/22 120.241.140.0/23 120.241.149.0/24 120.241.150.0/23 121.4.8.0/21 121.4.16.0/20 121.4.32.0/19 121.4.64.0/18 121.4.128.0/17 121.5.0.0/16 121.14.74.0/23 121.14.76.0/22 121.14.80.0/24 121.14.81.0/25 121.14.83.0/24 121.14.91.0/25 121.14.95.128/25 121.14.96.0/24 121.14.100.0/23 121.14.102.0/24 121.14.106.0/25 121.14.107.0/27 121.14.107.128/25 121.14.108.0/24 121.51.0.0/16 122.51.0.0/16 122.96.64.0/23 122.152.192.0/18 122.193.7.0/24 122.228.242.128/25 122.246.18.0/25 123.123.188.0/22 123.125.43.0/24 123.125.44.0/24 123.125.119.0/24 123.151.156.0/23 123.151.158.0/24 123.151.183.0/24 123.206.0.0/15 124.64.206.0/24 124.64.207.0/27 124.64.207.32/28 124.64.207.48/29 124.64.207.56/30 124.64.207.60/31 124.64.207.62/32 124.64.207.64/26 124.64.207.128/25 124.115.3.0/25 124.156.0.0/16 124.220.0.0/17 124.220.128.0/18 124.220.192.0/20 124.220.208.0/23 124.220.210.0/24 124.221.0.0/16 124.222.0.0/16 124.223.0.0/17 124.223.128.0/18 124.223.192.0/19 124.223.224.0/23 125.39.14.0/23 125.39.120.0/22 125.39.124.0/24 125.39.127.0/24 125.62.23.192/26 125.94.56.0/21 128.108.0.0/16 129.28.0.0/16 129.204.0.0/16 129.211.0.0/16 129.226.0.0/16 132.232.0.0/16 134.175.0.0/16 139.45.198.0/27 139.155.0.0/16 139.186.0.0/16 139.199.0.0/16 140.143.0.0/16 140.206.160.0/22 140.207.182.0/23 140.207.184.0/25 140.207.187.0/24 140.207.191.0/25 140.249.68.0/22 140.249.72.0/23 146.56.192.0/18 148.70.0.0/16 150.109.0.0/16 150.138.135.0/25 150.158.0.0/16 152.109.136.0/23 152.136.0.0/16 153.3.50.0/23 153.3.136.0/23 153.3.148.0/22 153.3.227.0/24 153.3.244.0/22 153.37.100.0/23 154.8.128.0/17 154.83.18.0/24 156.240.88.0/23 157.148.32.0/21 157.148.40.0/23 157.148.42.0/24 157.255.8.0/21 158.79.1.0/24 159.75.0.0/16 162.14.0.0/16 162.62.0.0/20 162.62.16.0/21 162.62.24.0/22 162.62.28.0/23 162.62.32.0/22 162.62.36.0/24 162.62.41.0/24 162.62.42.0/23 162.62.44.0/22 162.62.48.0/20 162.62.64.0/18 162.62.128.0/20 162.62.145.0/24 162.62.146.0/23 162.62.148.0/22 162.62.152.0/24 162.62.172.0/22 162.62.176.0/21 162.62.184.0/23 162.62.186.0/24 162.62.190.0/23 162.62.192.0/19 162.62.224.0/21 162.62.232.0/23 162.62.234.0/24 162.62.236.0/22 163.177.6.0/23 163.177.28.0/22 170.106.0.0/18 170.106.64.0/19 170.106.96.0/20 170.106.112.0/21 170.106.120.0/22 170.106.124.0/23 170.106.126.0/24 170.106.128.0/19 170.106.160.0/20 170.106.176.0/21 170.106.184.0/24 170.106.186.0/23 170.106.188.0/22 170.106.192.0/21 170.106.200.0/22 171.214.4.0/23 171.220.224.0/24 172.81.192.0/18 175.6.87.0/24 175.6.88.0/22 175.24.0.0/16 175.27.0.0/16 175.178.0.0/17 175.178.128.0/18 175.178.192.0/19 175.178.224.0/20 175.178.240.0/21 175.178.248.0/22 175.178.252.0/24 180.87.170.0/24 180.96.10.0/24 180.96.32.0/24 180.97.124.0/23 180.109.156.0/22 180.109.168.0/22 180.163.36.0/23 182.140.198.0/23 182.140.200.0/22 182.140.204.0/23 182.254.0.0/24 182.254.4.0/22 182.254.8.0/21 182.254.16.0/20 182.254.32.0/21 182.254.40.0/22 182.254.44.0/23 182.254.46.0/24 182.254.48.0/20 182.254.64.0/19 182.254.96.0/24 182.254.99.0/24 182.254.100.0/22 182.254.104.0/21 182.254.112.0/23 182.254.115.0/24 182.254.116.0/22 182.254.120.0/21 182.254.128.0/18 182.254.192.0/19 182.254.224.0/20 182.254.240.0/21 182.254.248.0/23 182.254.251.0/24 182.254.252.0/22 183.56.147.0/24 183.60.0.0/23 183.60.5.0/24 183.60.6.0/24 183.60.64.0/22 183.60.68.0/23 183.60.74.0/23 183.60.76.0/23 183.60.78.0/24 183.60.80.0/21 183.60.89.128/25 183.60.114.0/23 183.60.116.0/23 183.60.118.0/24 183.60.240.0/21 183.60.248.0/23 183.60.250.0/25 183.61.96.0/21 183.61.104.0/23 183.61.106.0/24 183.61.107.0/25 183.66.96.0/22 183.66.100.0/24 183.131.196.0/23 183.134.22.0/25 183.134.207.0/24 183.194.189.0/24 183.194.190.0/23 183.194.198.0/23 183.194.204.0/24 183.194.221.0/24 183.194.223.0/24 183.194.236.0/22 183.222.140.0/23 183.222.224.0/22 183.232.12.0/22 183.232.16.0/24 183.232.17.0/25 183.232.164.0/22 183.232.175.0/28 183.232.181.0/24 183.232.182.0/23 183.232.184.0/24 183.232.224.0/24 183.247.244.0/22 183.247.248.0/23 188.131.128.0/17 192.144.128.0/17 193.112.0.0/16 202.104.241.0/25 202.106.18.0/23 202.163.2.0/23 203.184.142.128/26 203.195.128.0/17 203.205.128.0/23 203.205.134.0/23 203.205.136.0/21 203.205.144.0/22 203.205.154.0/23 203.205.157.0/24 203.205.159.0/24 203.205.176.0/22 203.205.187.0/24 203.205.188.0/24 203.205.190.0/23 203.205.193.0/24 203.205.194.0/23 203.205.196.0/23 203.205.218.0/23 203.205.220.0/22 203.205.224.0/24 203.205.232.0/21 203.205.240.0/24 203.205.242.0/24 203.205.244.0/23 203.205.248.0/21 210.22.241.0/24 210.22.242.0/23 210.22.244.0/24 210.51.43.0/24 210.51.44.0/24 210.73.160.0/19 210.82.56.0/24 210.82.58.0/24 210.82.111.240/29 210.180.74.0/23 210.192.102.0/26 211.56.92.0/23 211.56.94.0/24 211.100.32.0/23 211.136.108.0/23 211.139.164.200/29 211.139.164.208/28 211.139.188.48/28 211.152.128.0/22 211.152.132.0/23 211.152.136.0/22 211.152.144.0/22 211.152.148.0/23 211.152.152.0/22 211.152.156.0/24 211.159.128.0/17 212.64.0.0/17 212.129.128.0/17 218.12.96.0/22 218.12.104.0/23 218.12.106.0/24 218.18.95.128/25 218.98.60.0/22 218.107.15.0/24 219.146.241.0/24 219.151.128.0/23 219.153.75.0/24 220.194.80.0/23 220.194.89.0/24 220.194.90.0/24 220.194.109.0/24 220.194.110.0/24 220.194.117.0/24 220.194.118.0/23 220.194.120.0/24 220.196.80.0/23 220.196.142.0/23 220.196.150.0/23 220.248.42.0/24 221.130.6.32/28 221.130.15.0/24 221.178.64.0/22 221.178.68.0/24 221.179.18.160/27 221.179.19.16/28 221.179.19.128/26 221.181.80.0/23 221.181.82.0/24 221.198.68.0/22 221.216.8.0/22 221.238.35.0/24 221.238.41.0/24 221.238.92.0/24 221.238.94.0/24 222.73.73.0/24 222.73.74.0/23 222.73.76.0/22 222.73.80.0/24 222.138.197.0/24 222.141.28.0/24 222.186.183.0/24 223.166.252.0/23 223.167.222.0/23 223.167.238.0/23 223.167.240.0/24
花生壳盒子使用教程
1. 产品介绍 1.1 包装清单 1.2 设备指示灯 1.3 接口介绍 2. 联网方式 2.1 有线联网 2.1.1 DHCP方式联网 花生壳盒子的有线联网方式默认为有线DHCP联网,接入网线后,无需其他操作,花生壳盒子指示灯显示为白色即为联网成功。 2.1.2 静态IP方式联网 若花生壳盒子所在网络未开启DHCP,且花生壳盒子指示灯显示为红灯闪烁,需要给花生壳盒子设置静态IP。 (1)下载设备助手 在与花生壳盒子相同局域网的电脑设备上,访问花生壳管理平台登录页,点击右上角“设备助手”下载并安装。 (2)设置静态IP 运行设备助手工具后,设备助手将自动扫描识别出同一局域网内的花生壳盒子。点击右侧【设置】->【有线设置】->【静态IP】,设置花生壳盒子获取的IP信息,点击“确定”,花生壳盒子指示灯显示为白色即为联网成功。 2.2 WiFi联网 花生壳盒子的有线联网方式默认为有线DHCP联网,若花生壳盒子需切换连接的网络为无线网络时,需进行花生壳盒子的WiFi设置切换至无线网络联网。 (1)下载设备助手 在与花生壳盒子相同局域网的电脑设备上,访问http://b.oray.com 花生壳管理平台登录页,点击右上角“设备助手”下载并安装。 (2)设置WiFI ①运行设备助手工具后,设备助手将自动扫描识别出同一局域网内的花生壳盒子。点击右侧【设置】->【WiFi设置】,设置花生壳盒子连接的无线网路及其密码,点击“确定”。 注意:花生壳盒子目前仅支持连接的2.4G的无线网络。 ②WiFi连接成功后,再次点击助手工具上的【WiFi设置】,WiFi名称已变成蓝色字体,代表当前的WiFi连接成功。 3. 花生壳盒子激活 (1)首次使用花生壳盒子,需要进行激活才可使用。使用电脑访问花生壳管理平台登录页,输入花生壳盒子背面的SN码与初始密码(admin)登录进去管理页面。 (2)登录进入后,页面提供2种激活方式:扫码激活与密码激活,可根据实际情况灵活选择激活方式。 扫码激活 使用绑定贝锐账号的花生壳管理APP或微信对页面出现的二维码进行扫码激活。 密码激活 输入已注册的贝锐账号密码激活。 注意:激活成功后会赋予此账号的密码给花生壳盒子,下次通过SN码登录花生壳管理平台时,输入SN码与账号的密码即可登录。 (3)激活成功后,可进入花生壳平台进行更多操作。 4. 场景部署 4.1 远程办公(象过河ERP系统) 4.1.1 部署环境 某公司部署象过河进销存软件,总部部署象过河ERP服务器端,内网IP地址及访问端口为192.168.61.54:8089。总部接入花生壳盒子后,将象过河ERP服务器的内网IP及端口映射为花生壳外网域名,分部的象过河ERP访问端可通过填写花生壳外网域名及映射的端口号连接至象过河ERP服务器,实现对企业进销存业务管理。 4.1.2 服务器端设置 (1)按步骤要求安装象过河服务器软件,在选择组件步骤中选择“服务器程序”,后续按指示继续安装并运行象过河ERP服务器。 4.1.3 内网穿透 (1)在花生壳管理平台【内网穿透】,点击<添加映射>,创建象过河ERP服务器的映射。 (2)填写新增映射信息(下面展示添加TCP类型的映射): 序号 内容 说明 ① 映射类型 选择“常规应用”,适合远程桌面、SSH、数据库、联机游戏等;常见TCP应用,不支持浏览器访问 ② 应用名称 自定义填写 ③ 映射协议 TCP:适用于准确性要求高的数据传输,如文件传输、远程访问等 ④ 外网域名 选择账号下的域名 ⑤ 外网端口 选择外网访问时所需填写的端口。其中动态端口为系统随机生成的端口号,映射删除后无法恢复;支持选择固定端口 ⑥ 内网主机 所映射的服务器内网IP地址(象过河ERP服务器内网IP地址) ⑦ 内网端口 所映射的服务服务器内网端口(象过河ERP服务器端口号) ⑧ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑨ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑩ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 (3)映射创建完成,象过河ERP访问端可通过填写花生壳外网域名及映射的端口号连接至象过河ERP服务器。 4.1.4 访问端设置 (1)安装并运行象过河ERP访问端,点击【选择账套】,应用服务器地址填写象过河ERP服务器映射的花生壳外网域名,通讯端口号填写象过河ERP服务器映射的花生壳外网域名端口号,点击 <连接测试> ,测试成功之后点击 <确定>。 (2)服务器连接设置完成后,使用账号密码登录正常登录进行进销存业务管理。 4.2 网站搭建(内网Web服务IIS) 4.2.1 部署环境 企业或个人搭建网站服务器,但无固定的公网IP,无法实现外网访问内网搭建的网站服务。通过接入花生壳盒子,将内网搭建的网站映射至外网,即可实现外网访问内网搭建的网站服务。 4.2.2 安装IIS服务 以Windows Server 2012系统服务器为例,在【服务器管理器】->【添加角色和功能】,按步骤进行安装操作。 ①在【安装类型】中,选择【基于角色或基于功能的安装】,然后点击下一步; ②在【服务器选择】中,选择【从服务器池中选择服务】,并在服务器池内选择当前操作系统,点击下一步; ③在【服务器角色】中,勾选【Web服务器(IIS)】,并点击下一步; ④在【功能】选项中,勾选【.NET Framework 3.5 功能】,点击下一步; 确认安装的服务清单,点击【安装】,等待IIS服务安装完成。 4.2.3 网站配置 (1)进入Windows系统的【计算机管理】->【服务和应用程序】,选中Internet 信息服务(IIS)管理器的站点主页,鼠标右键点击“添加网站”,并填写网站存放路径、服务器内网地址及网站访问端口。 (2)网站配置完成,在本地浏览器上成功访问http://192.168.31.119.128:88 ,IIS服务搭建成功。 4.2.4 内网穿透 (1)在花生壳管理平台【内网穿透】,点击<添加映射>,创建网站服务器的映射。 (2)填写新增映射信息(下面展示添加HTTPS类型的映射): 序号 内容 说明 ① 映射类型 选择“网站应用”,适合网页类站点,支持80/443端口;外网通过浏览器输入域名即可直接访问 ② 应用名称 自定义填写 ③ 映射协议 HTTPS:用于创建加密安全的网站,可在浏览器访问,外网端口443,花生壳已自动部署SSL证书,本地无需额外部署「注意」:一个域名仅支持添加一条HTTPS映射HTTP:用于搭建HTTP协议的站点,非加密访问,默认端口80 ④ 外网域名 选择用于外网访问的域名,选择账号下所拥有HTTPS映射证书的域名 ⑤ 内网主机 所映射的服务器内网IP地址(网站服务器的IP地址) ⑥ 内网端口 所映射的服务服务器内网端口(网站服务器的端口) ⑦ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑧ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑨ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 (3)映射创建完成,外网开发人员访问花生壳外网地址即可访问网站服务器。 4.3 安防监控(海康威视) 4.3.1 部署环境 公共场所的视频监控是安防系统的重要组成部分,为便于统一远程监控管理,将部署基于网络传输的远程视频监控,在无固定的公网IP,无法实现远程视频监控管理功能。通过接入花生壳盒子,可将内部监控系统轻松映射到外网,轻松实现远程监控管理,无需人员到现场设置。 4.3.2 监控部署 在内网环境中部署视频监控设备。当监控设备部署完成后,设置监控服务器的网络配置。监控服务器内网IP为192.168.1.101;内网HTTP端口为80,用于web访问监控服务器;服务端口为8000,用于传输监控摄像头画面。 4.3.3 内网穿透 分别设置监控服务器的HTTP80端口映射以及服务端口8000端口映射,即可实现外网远程视频监控。 监控服务器web访问映射 (1)在花生壳管理平台【内网穿透】,点击<添加映射>,创建监控服务器web访问的映射。 (2)填写新增映射信息(下面展示添加HTTPS类型的映射): 序号 内容 说明 ① 映射类型 选择“网站应用”,适合网页类站点,支持80/443端口;外网通过浏览器输入域名即可直接访问 ② 应用名称 自定义填写 ③ 映射协议 HTTPS:用于创建加密安全的网站,可在浏览器访问,外网端口443,花生壳已自动部署SSL证书,本地无需额外部署「注意」:一个域名仅支持添加一条HTTPS映射HTTP:用于搭建HTTP协议的站点,非加密访问,默认端口80 ④ 外网域名 选择用于外网访问的域名,选择账号下所拥有HTTPS映射证书的域名 ⑤ 内网主机 所映射的服务器内网IP地址(监控服务器的IP地址) ⑥ 内网端口 所映射的服务服务器内网端口(监控服务器的HTTP端口) ⑦ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑧ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑨ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 (3)映射创建完成,外网监控中心人员访问花生壳外网域名即可访问监控服务器。 监控服务器数据传输映射 (1)在花生壳管理平台【内网穿透】,点击<添加映射>,创建监控服务器数据传输的映射。 (2)填写新增映射信息(下面展示添加TCP类型的映射): 序号 内容 说明 ① 映射类型 选择“常规应用”,适合远程桌面、SSH、数据库、联机游戏等;常见TCP应用,不支持浏览器访问 ② 应用名称 自定义填写 ③ 映射协议 TCP:适用于准确性要求高的数据传输,如文件传输、远程访问等 ④ 外网域名 选择账号下的域名 ⑤ 外网端口 选择外网访问时所需填写的端口。其中动态端口为系统随机生成的端口号,映射删除后无法恢复;支持选择固定端口 ⑥ 内网主机 所映射的服务器内网IP地址(监控服务器内网IP地址) ⑦ 内网端口 所映射的服务服务器内网端口(监控服务器的服务端口号) ⑧ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑨ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑩ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 (3)映射创建后,因视频数据传输的协议需要端口一对一映射才能正常传输,所以需要将监控服务器的服务端口号改成与花生壳TCP映射的端口一致。点击“编辑”,将监控服务器的服务端口号设置为与外网映射一致的端口号20563。 (4)映射设置完成。 4.3.4 修改服务端口 进入监控服务器后台的网络配置,需同步修改监控服务器的服务端口号与外网映射一致的端口号20563,才能正常传输视频画面数据。 4.3.5 外网访问 在外网环境下,打开浏览器访问花生壳https映射,即可访问监控服务器及其监控数据。 4.4 文件分享(Serv-U) 4.4.1 部署环境 在异地办公或出差期间,FTP服务器结合花生壳的内网穿透功能可以实现远程文件访问和管理。用户能够随时查看、编辑和共享远程存储的文件,提高工作效率和协作能力。 4.4.2 搭建Serv-U 按指示填写信息并安装Serv-U FTP服务器: ①安装Serv-U服务器 ②新建域,并定义域使用的协议及其对应的端口(开启http协议,端口号设为88) ③新建域账号及其密码 ④设置域用户的根目录地址 ⑤授权上面新建域账号的访问权限 搭建完成后,本地浏览器访问Serv-U FTP服务器本地IP地址及端口,即可访问Serv-U FTP服务器站点及指定的文件目录。 4.4.3 内网穿透 (1)在花生壳管理平台【内网穿透】,点击<添加映射>,创建Serv-U服务器的映射。 (2)填写新增映射信息(下面展示添加HTTPS类型的映射): 序号 内容 说明 ① 映射类型 选择“网站应用”,适合网页类站点,支持80/443端口;外网通过浏览器输入域名即可直接访问 ② 应用名称 自定义填写 ③ 映射协议 HTTPS:用于创建加密安全的网站,可在浏览器访问,外网端口443,花生壳已自动部署SSL证书,本地无需额外部署「注意」:一个域名仅支持添加一条HTTPS映射HTTP:用于搭建HTTP协议的站点,非加密访问,默认端口80 ④ 外网域名 选择用于外网访问的域名,选择账号下所拥有HTTPS映射证书的域名 ⑤ 内网主机 所映射的服务器内网IP地址(Serv-U服务器的IP地址) ⑥ 内网端口 所映射的服务服务器内网端口(Serv-U服务器的端口) ⑦ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑧ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑨ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 (3)映射创建完成,外网开发人员访问花生壳外网地址即可访问网站服务器。 4.5 远程数据(SQL Server数据库) 4.5.1 部署环境 数据库服务器部署在内网时,本地局域网内的设备可登录访问到数据库。若数据库服务器所在的网络环境无公网IP时,可通过接入花生壳盒子,实现外网设备访问内网的数据库服务器。 4.5.2 部署SQL Server数据库 本地部署SQL Server数据库后,可通过本地服务器IP地址登录访问数据库。 4.5.3 内网穿透 (1)在花生壳管理平台【内网穿透】,点击<添加映射>,创建SQL Server服务器的映射。 (2)填写新增映射信息(下面展示添加TCP类型的映射): 序号 内容 说明 ① 映射类型 选择“常规应用”,适合远程桌面、SSH、数据库、联机游戏等;常见TCP应用,不支持浏览器访问 ② 应用名称 自定义填写 ③ 映射协议 TCP:适用于准确性要求高的数据传输,如文件传输、远程访问等 ④ 外网域名 选择账号下的域名 ⑤ 外网端口 选择外网访问时所需填写的端口。其中动态端口为系统随机生成的端口号,映射删除后无法恢复;支持选择固定端口 ⑥ 内网主机 所映射的服务器内网IP地址(SQL Server服务器内网IP地址) ⑦ 内网端口 所映射的服务服务器内网端口(SQL Server服务器端口号) ⑧ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑨ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑩ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 (3)映射创建完成,外网运维人员可通过访问花生壳外网地址即可登录访问数据库。 4.5.4 外网访问 在外网环境下,外网运维人员可通过访问花生壳外网地址即可登录访问数据库。
花生壳客户端教程
花生壳8客户端是一款用于实现远程访问和管理设备的工具,无需依赖公网IP,简单易用、高安全性、支持多平台使用。为用户提供了简单而安全的远程访问和管理设备的方式。无论是个人用户还是企业用户,都可以通过该客户端轻松地实现设备的远程访问和管理。 花生壳8客户端可进行远程文件、端口、域名管理等功能。数据传输稳定性强、安全性高,轻松搭建各类映射场景。 下面给大家详细介绍花生壳8的使用。 1.下载、安装和登录 1.1 下载 进入花生壳官网下载页面,点击“免费下载”即可下载V8.13版本客户端【点击下载】。 1.2 安装 ①双击运行安装程序,进入安装向导 ②确定程序安装位置,点击<立即安装> ,等待程序自动安装即可 1.3 登录 花生壳客户端支持两种登录方式,分别是扫码登录与账号登录。 (1)扫码登录 使用微信或花生壳APP扫一扫客户端出现的二维码登录。 (2)账号登录 ①输入已注册贝锐账号登录 ②若忘记账号密码,可以点击<忘记密码> 对账号重置密码 ③若未注册账号,点击<注册账号> 跳转到账号注册页面,注册后再登录 2.内网穿透 2.1 客户端添加映射 (1)打开花生壳客户端,在【内网穿透】界面中点击 <+> 按钮。 (2)跳转至花生壳管理平台,点击<添加映射>,添加映射。 2.1.1 TCP常规应用场景 序号 选项 描述 ① 映射类型 选择“常规应用”,适合远程桌面、SSH、数据库、联机游戏等;常见TCP应用,不支持浏览器访问 ② 应用名称 自定义填写 ③ 映射协议 TCP:用于准确性要求高的数据传输,如文件传输、远程访问等,不支持创建网站或在浏览器访问「注意」:串口TCP必须将当前账号登录到花生壳盒子后,才能成功创建 ④ 外网域名 用于外网访问的域名,选择账号下所拥有的域名 ⑤ 外网端口 选择外网访问时所需填写的端口。其中动态端口为系统随机生成的端口号,映射删除后无法恢复;支持选择固定端口(删除映射后可重复使用) ⑥ 内网主机 所映射的服务器内网IP地址 ⑦ 内网端口 所映射的服务服务器内网端口 ⑧ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑨ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑩ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 2.1.2 代理服务器应用场景 代理服务器映射仅提供给付费级别的特殊用户使用,如有需要请联系客服。 2.1.3 网站应用场景 序号 选项 描述 ① 映射类型 选择“网站应用”,适合网页类站点,支持80/443端口;外网通过浏览器输入域名即可直接访问 ② 应用名称 自定义填写 ③ 映射协议 HTTPS:用于创建加密安全的网站,可在浏览器访问,外网端口443,花生壳已自动部署SSL证书,本地无需额外部署「注意」:一个域名仅支持添加一条HTTPS映射HTTP:用于搭建HTTP协议的站点,非加密访问,默认端口80 ④ 外网域名 用于外网访问的域名,选择账号下所拥有的域名;若使用HTTPS协议,需选择账号下所拥有HTTPS映射证书的域名 ⑤ 外网端口 选择外网访问时所需填写的端口。HTTPS外网端口外网端口443;HTTP外网端口默认为80,选择外网访问时所需填写的端口。其中动态端口为系统随机生成的端口号,映射删除后无法恢复;支持选择固定端口(删除映射后可重复使用) ⑥ 内网主机 所映射的服务器内网IP地址 ⑦ 内网端口 所映射的服务服务器内网端口 ⑧ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑨ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 ⑩ 访问规则 支持映射设置访问密码进行二次校验访问;支持设置指定时间、区域、IP、浏览器、系统等方式进行应用访问限制【点击查看访问控制帮助教程】 2.2 映射管理 (1)查看映射 新增映射后,在主界面可以查看新增的映射信息,客户端右侧显示当前映射的诊断信息。 (2)分享映射 点击<分享>可将此映射地址通过二维码方式分享出去。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)注意:映射类型为HTTPS的情况才支持二维码方式分享。 (3)编辑映射 点击<编辑>按钮,跳转至花生壳管理平台修改映射信息。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意: ①花生壳程序是映射本地内网服务实现外网访问 ②若异地登录花生壳,将会导致已设置的本地内网服务映射失效 ③若有多个地点的服务需要发布,建议通过多个账号进行映射操作** 3. 远程文件 用户通过远程文件功能快速实现文件共享,轻松实现将电脑文件分享到外网,通过浏览器即可远程访问。【点击查看花生壳文件分享帮助教程】 3.1 新增文件库 (1)在【远程文件】界面中点击<+> 按钮。 (2)选择需要共享的文件目录(例:G:\test),并点击<下一步>。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:暂不支持共享一级目录,如电脑C盘、D盘等;以及C盘下的文件目录。** (3)跳转至花生壳管理平台,填写新增文件库信息。 选项 描述 文件库名称 自定义填写 访问地址 选择外网访问远程文件的域名注意:域名需已开通HTTPS功能 访问用户 设置外网访问文件时所需的用户名注意:不超过16位字符 访问密码 设置外网访问文件时所需的密码注意:字符范围6-16位,支持字母、数字、英文符号 带宽 标准带宽为10M,支持升级更高带宽享受更快访问速度 (4)点击<确定> 后,可以生成相应的外网访问地址,远程文件库添加成功。 3.2 文件库管理 右键指定的文件库,进行编辑、删除等操作。 3.3 增加访问带宽 选择指定的文件库,在右侧带宽选项中,升级更高带宽享受更快访问速度。 4. 场景映射 4.1 客户端添加映射 选择对应的场景映射服务,点击<开通> ,根据页面提示完成开通流程即可添加场景映射。 下面以3389远程桌面及SSH映射为例,展示其场景映射的使用效果。 4.1.1 3389远程桌面 如开通远程RDP服务场景映射,系统会自动创建内网端口为3389的https映射。内网端口不支持修改,仅能修改内网IP。 在电脑的远程桌面连接,输入访问地址并点击“连接”,即可输入windows系统的用户名及密码即可进入windows桌面进行操作。 ![]( https://storage-cdn.oray.com/help/70e954fb13a4a5422b78517d21c33476) 花生壳V8.13支持web访问方式进行windows桌面远程访问。在场景映射中,点击3389的映射域名,将跳转为web方式访问windows桌面远程访问,输入windows系统的用户名及密码即可进入windows桌面进行操作。 4.1.2 SSH映射 如开通远程SSH服务场景映射,系统会自动创建内网端口为22的的HTTPS映射,外网端口为系统随机分配的5位数端口。内网端口不支持修改,仅能修改内网IP。 在远程登录客户端,输入访问地址及端口后打开会话,即可在窗口中输入远程服务器的用户名及密码即可登录。 ![]( https://storage-cdn.oray.com/help/70e954fb13a4a5422b78517d21c33476)**花生壳V8.13支持web访问方式进行SSH登录。**在场景映射中,点击SSH的映射域名,将跳转为web方式访问SSH远程登录。输入远程服务器的用户名及密码即可登录。 5. 配件中心 更加丰富的配件设置,可以前往贝锐花生壳管理查看并管理。 配件中心共有四种配置,分别为映射设置、参数配置、安全配置、特殊配置。 5.1 映射配置 管理更多花生壳映射类型,支持更多访问协议。 映射配置功能 说明 映射保留 保留30天无流量的映射,同时保留其映射的随机端口 HTTPS加密映射 自动化部署HTTPS证书并加密访问【点击查看设置HTTPS映射教程】 5.2 参数配置 升级映射基础配置,提高映射访问质量。 参数配置功能 说明 国内线路迁移 使用国内服务器可提高转发稳定性及访问速度【线路迁移使用帮助】 超级带宽 可自由分配带宽至多个映射中使用,提升映射访问速度 夜间带宽 每天18:00-次日8:00,所有映射带宽提升100%,且速度不低于5Mbps 固定端口 变更映射时,映射端口固定不变 5.3 安全配置 设定黑白名单,有效抵御恶意访问。 安全中心功能 说明 威胁情报 实时监测登录花生壳客户端的PC设备状态及时上报异常【点击查看威胁情报使用帮助】 监控告警 当映射/流量异常及登录花生壳客户端的PC设备上线/下线进行消息通知推送【点击查看监控告警使用帮助】 访问控制 精准控制访问权限,为用户发布提供更安全可靠的内网穿透【点击查看访问控制使用帮助】 5.4 特殊配置 开放系列特殊配件,满足用户的差异化应用场景需求。 特殊配置功能 说明 登录线路设置 选择与映射服务器当前网络出口归属地相同的登录线路 访问IP策略 默认支持外网IPv4访问,开启后将支持IPv6访问【点击查看IPv6访问策略】 HTTP请求头部扩展 通过X-Forward-for跳过代理可获取访问来源的真实IP 通道连接模式 根据访问量选择适合的连接模式 客户端通信加密 使用SHA256算法 +SSL证书加密通信。支持客户端3.8及以上版本、花生壳盒子1.3及以上版本 客户端可查看到已开通服务和数量,点击<管理> 按钮可跳转至贝锐花生壳管理平台进行设置。 6.域名管理 展示当前账号下域名相关信息。 ①展示当前账号下的域名总数,其中所包含的顶级域名数和壳域名数 ②点击<列表按钮>跳转至花生壳管理平台的域名列表进行更多操作,如查看域名的子域名、续费等 ③当前账号下域名的映射开关 ④选中域名的详细信息、诊断信息和诊断内网服务 7.发现好玩 为用户提供花生壳客户端使用干货、贝锐花生壳产品活动及热门配件等。 8.相关设置 8.1 客户端设置 点击客户端右上角<三> ,进入客户端的设置。 (1)常规设置 选项 描述 开机启动花生壳 设置花生壳客户端是否跟随系统启动 仅以服务方式运行(无任务栏图标) 可设置花生壳客户端以服务进程方式运行,不在电脑任务栏右下角显示客户 无操作5分钟,自动锁定客户端 勾选后,若5分钟无操作客户端程序,客户端自动进入锁定状态,需输入账号 网卡:当电脑有多网卡时可设置客户端走哪个网卡的网络。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:此功能要在账号未登录时设置。** (2)版本更新 显示当前客户端的版本号,还可以检查客户端的更新情况。 (3)移动管理 扫描二维码即可下载“花生壳管理”APP。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:花生壳管理APP仅用于远程管理,花生壳客户端仍需保持登录。** (4)帮助中心 ①查看服务代码、注册时间、登录地点信息(IP、地区、宽带)、操作系统、本机内网IP ②人工支持:可查看花生壳客户端使用文档,也可通过客服工单、购买咨询电话、远程协助及钻石VIP服务获得技术支持 (5)意见反馈 填写您在使用花生壳软件过程中的意见和建议,以促进软件优化。 8.2 其他设置 (1)清除DNS缓存 点击后清除本机的DNS缓存,及时更新域名指向。 (2)查看日志 日志用于记录客户端运行过程中的异常信息,帮助用户快速定位客户端运行中出现的问题。 (3)锁定 锁定花生壳客户端程序,防止他人修改映射内容及配置选项,凭账号密码解锁。 (4)重登 重新登录当前花生壳账号。 (5)注销登录 退出当前客户端的登录账号。 8.3 工具箱 点击左下方“工具箱”按钮,即可使用诊断工具箱协助排查内网穿透异常情况。 至此,windows版贝锐花生壳客户端使用帮助介绍完毕,若需了解更多请联系客服进行咨询。
Windows版使用教程
GeoTrust证书安装指南(Windows版)
目录 1、证书简介 2、证书开通 2.1、提交资料 2.2、邮件验证 2.3、证书颁发 3、证书安装 3.1、IIS站点部署 3.2、Tomcat站点部署 3.3、Apache站点部署 3.4、Nginx站点部署 ———————————————— 1、证书简介 GeoTrust SSL证书是数字证书的一种,类似于驾驶证、护照或营业执照。 SSL证书遵守加密协议,在验证服务器身份后颁发,具有服务器身份验证和数据传输加密功能,用于保障在Internet上数据传输安全,利用数据加密(Encryption)技术,可确保数据在网络上之传输过程中不会被截取及窃听。 在申请SSL证书之前,需先准备证书请求文件(CSR)及证书私钥(KEY)。 CSR是原始文件,包含了您的服务器信息和单位信息,需要提交给CA认证中心进行审核。以下是申请证书流程图,颁发周期为7个工作日内。 注意:KEY及CSR文件可由Oray客服协助生成并发送给到用户,用户需妥善保管及备份。 2、证书开通 2.1、提交资料 选择需要的SSL证书类型,点击立即购买,按照页面提示填写对应的信息。(购买戳我) 注意: ①GeoTrust证书必须为企业用户才可进行申请; ②为避免CSR有误导致审核失败,建议勾选“Oray协助”生成CSR请求文件,若有相关经验也可选择自行生成,参考帮助:CSR生成指南 ; ③ 身份证及申请表为选填部分,可选择不上传提交。 2.2、身份验证 下单购买成功后,会有Oray客服联系用户获取企业资料及确认验证方式。 (1)电话验证 用户提交企业资料后,这边会拨打所申请企业的联系电话进行验证,核实申请人是否为企业职工,验证通过后才可进行邮件验证。 (2)邮件验证 Oray客服会联系用户获取管理员邮箱,以便于发送邮件进行验证。若您的域名没有搭建邮件服务,可由Oray协助您完成验证。 注释:什么是管理员邮箱? 认证系统为了确认您对所申请的域名拥有管理权,会发电子邮件到指定的管理员邮箱中。 例:您申请的证书域名为domain.com,可供选择的管理员邮箱如下: postmaster@domain.com admin@domain.com administrator@domain.com webmaster@domain.com hostmaster@domain.com 只需选择其中一个并提交给到客服人员,验证邮件就会发送到指定的邮箱中,用户需留意查收验证邮件。 收到的验证邮件内容如下图所示,点击邮件中的链接(蓝色字体部分),跳转到验证页面,点击“Approve”完成邮件验证。 2.3、证书颁发 完成邮件验证身份后,购买的SSL证书最终将以邮件的方式发送给到用户购买时所填写的电子邮箱中。 范例(仅供参考): 邮件内容中包含中级证书的下载链接及域名证书内容,需进行合并使用。 首先在桌面空白处,鼠标右键新建文本文档,把域名证书及中级证书,合并在一起,最后生成命名为server,后缀为crt的文件 注意:顺序不能调动,上面为域名证书,下面为中级证书,中间不留空。 3、证书安装 材料准备: (1) 域名证书与中级证书合成的CRT文件:server.crt (2) 申请证书前生成的私钥文件:domian.key 注意: 若由Oray协助生成CSR文件,则KEY文件也会一并提供给到用户; 若用户CSR文件自行生成,则KEY文件用户也会拥有。具体参考:CSR生成指南 Key文件具体如下所示: 目前Windows常见站点服务类型有IIS、Tomcat、Apache及Nginx四种,下面将一一进行证书安装介绍。 注意:证书格式转换问题可联系我司客服进行协助处理。 3.1、IIS站点部署 IIS部署SSL证书前,需通过第三方转换平台将证书文件及私钥文件转换为PFX格式。 注意:需自定义PFX密码,用于安装证书时的校验。 然后打开IIS管理器,在主页中,找到并双击“服务器证书”; 点击右侧操作栏“导入”按钮,选择PFX文件,输入前面转换时定义的密码; 证书导入成功,下面则需配置到搭建的站点中; 进入到所搭建的网站服务器---操作栏中点击“绑定”; 把证书绑定到网站的配置如下,类型选“https”、IP地址“全部未分配”、端口“443”、SSL证书“选择导入对应的SSL证书”,最后点击“确定”; 至此,Windows下的IIS站点SSL证书部署完成,直接通过https://域名即可进行加密访问。 3.2、Tomcat站点部署 Tomcat部署SSL证书前,需将证书文件及私钥文件转换为JKS格式。 注意:需自定义设置JKS密码,用于安装证书时的校验。 转换格式成功后,将证书文件放置在Tomcat文件目录下,并以文本方式编辑配置文件server.xml; 在配置文件中新增下图红色框内容: 注意:keystoreFile后面需加上JKS文件路径, keystorePass则是JKS校验密码。 至此,Windows下的Tomcat SSL证书部署完成,直接通过https://域名即可进行加密访问。 注意:不同Tomcat版本,修改server.xml的方式不同,请参考tomcat说明: Tomcat 8.0 - http://tomcat.apache.org/tomcat-8.0-doc/ssl-howto.html Tomcat 7.0 - http://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html Tomcat 6.0 - http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html Tomcat 5.5 - http://tomcat.apache.org/tomcat-5.5-doc/ssl-howto.html Tomcat 5.0 - http://tomcat.apache.org/tomcat-5.0-doc/ssl-howto.html Tomcat 4.1 - http://tomcat.apache.org/tomcat-4.1-doc/ssl-howto.html 3.3、Apache站点部署 Apache部署证书无需转换格式,直接将证书文件放于站点安装目录中; 打开Apache安装目录下conf目录中的ssl.conf文件,找到以下两个选项; 去除前面的“#”,并填写正确的文件路径,证书就部署成功啦!~ 至此,Windows下的Apache SSL证书部署完成,直接通过https://域名即可进行加密访问 3.4、Nginx站点部署 Nginx部署证书无需转换格式,直接将证书文件放于站点安装目录中; 打开安装目录中的配置文件:nginx.conf,新增下图内容: Windows下的Nginx站点SSL证书部署完成,直接通过https://域名即可进行加密访问。 至此,RapidSSL证书Windows系统安装指南介绍结束。
RapidSSL证书安装指南(Windows版)
目录 1、证书简介 2、证书开通 2.1、提交资料 2.2、邮件验证 2.3、证书颁发 3、证书安装 3.1、IIS站点部署 3.2、Tomcat站点部署 3.3、Apache站点部署 3.4、Nginx站点部署 ———————————————————————————— 1、证书简介 RapidSSL证书是数字证书的一种,类似于驾驶证、护照或营业执照。 SSL证书遵守加密协议,在验证服务器身份后颁发,具有服务器身份验证和数据传输加密功能,用于保障在Internet上数据传输安全,利用数据加密(Encryption)技术,可确保数据在网络上之传输过程中不会被截取及窃听。 在申请SSL证书之前,需先准备证书请求文件(CSR)及证书私钥(KEY)。 CSR是原始文件,包含了您的服务器信息和单位信息,需要提交给CA认证中心进行审核。以下是申请证书流程图,颁发周期为7个工作日内。 注意:KEY及CSR文件可由贝锐客服协助生成并发送给到用户,用户需妥善保管及备份。 2、证书开通 2.1、提交资料 选择需要的SSL证书类型,点击立即购买,按照页面提示填写对应的信息。(购买戳我) 注意: ① 为避免CSR有误导致审核失败,建议勾选“贝锐协助”生成CSR请求文件; ② 如果有相关经验,可选择自行生成,参考帮助:CSR生成指南 ; ③ 身份证及申请表为选填部分,可选择不上传提交。 2.2、邮件验证 下单购买成功后,贝锐客服会联系用户获取管理员邮箱,以便于发送邮件进行验证。若您的域名没有搭建邮件服务,可由贝锐协助您完成验证。 注释:什么是管理员邮箱? 认证系统为了确认您对所申请的域名拥有管理权,会发电子邮件到指定的管理员邮箱中。 例: 您申请的证书域名为domain.com,可供选择的管理员邮箱如下: postmaster@domain.com admin@domain.com administrator@domain.com webmaster@domain.com hostmaster@domain.com 只需选择其中一个并提交给到客服人员,验证邮件就会发送到指定的邮箱中,用户需留意查收验证邮件。 收到的验证邮件内容如下图所示,点击邮件中的链接(红色划线部分),跳转到验证页面; 点击“Approve”完成邮件验证。 2.3、证书颁发 完成邮件验证身份后,购买的SSL证书最终将以邮件的方式发送给到用户购买时所填写的电子邮箱中。范例(仅供参考): 邮件内容中包含中级证书的下载链接及域名证书内容,需进行合并使用。 首先在桌面空白处,鼠标右键新建文本文档,把域名证书及中级证书,合并在一起,最后生成命名为server,后缀为crt的文件。 注意:顺序不能调动,上面为域名证书,下面为中级证书,中间不留空。 3、证书安装 材料准备: (1) 域名证书与中级证书合成的CRT文件:server.crt (2) 申请证书前生成的私钥文件:domian.key 注意: 若由贝锐协助生成CSR文件,则KEY文件也会一并提供给到用户; 若用户CSR文件自行生成,则KEY文件用户也会拥有。具体参考:CSR生成指南 Key文件具体如下所示: 目前Windows常见站点服务类型有IIS、Tomcat、Apache及Nginx四种,下面将一一进行证书安装介绍。 注意:证书格式转换问题可联系我司客服进行协助处理。 3.1、IIS站点部署 IIS部署SSL证书前,需通过第三方转换平台将证书文件及私钥文件转换为PFX格式。 注意:需自定义PFX密码,用于安装证书时的校验。 然后打开IIS管理器,在主页中,找到并双击“服务器证书”; 点击右侧操作栏“导入”按钮,选择PFX文件,输入前面转换时定义的密码; 证书导入成功,下面则需配置到搭建的站点中; 进入到所搭建的网站服务器---操作栏中点击“绑定”; 把证书绑定到网站的配置如下,类型选“https”、IP地址“全部未分配”、端口“443”、SSL证书“选择导入对应的SSL证书”,最后点击“确定”; 至此,Windows下的IIS站点SSL证书部署完成,直接通过https://域名即可进行加密访问。 3.2、Tomcat站点部署 Tomcat部署SSL证书前,需将证书文件及私钥文件转换为JKS格式。 注意:需自定义设置JKS密码,用于安装证书时的校验。 转换格式成功后,将证书文件放置在Tomcat文件目录下,并以文本方式编辑配置文件server.xml; 在配置文件中新增下图红色框内容: 注意:keystoreFile后面需加上JKS文件路径, keystorePass则是JKS校验密码。 至此,Windows下的Tomcat SSL证书部署完成,直接通过https://域名即可进行加密访问。 注意:不同Tomcat版本,修改server.xml的方式不同,请参考tomcat说明: Tomcat 8.0 - http://tomcat.apache.org/tomcat-8.0-doc/ssl-howto.html Tomcat 7.0 - http://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html Tomcat 6.0 - http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html Tomcat 5.5 - http://tomcat.apache.org/tomcat-5.5-doc/ssl-howto.html Tomcat 5.0 - http://tomcat.apache.org/tomcat-5.0-doc/ssl-howto.html Tomcat 4.1 - http://tomcat.apache.org/tomcat-4.1-doc/ssl-howto.html 3.3、Apache站点部署 Apache部署证书无需转换格式,直接将证书文件放于站点安装目录中; 打开Apache安装目录下conf目录中的ssl.conf文件,找到以下两个选项; 去除前面的“#”,并填写正确的文件路径,证书就部署成功啦!~ 至此,Windows下的Apache SSL证书部署完成,直接通过https://域名即可进行加密访问 3.4、Nginx站点部署 Nginx部署证书无需转换格式,直接将证书文件放于站点安装目录中; 打开安装目录中的配置文件:nginx.conf,新增下图内容: Windows下的Nginx站点SSL证书部署完成,直接通过https://域名即可进行加密访问。 至此,RapidSSL证书Windows系统安装指南介绍结束。
OrayOS 系统固件使用手册
1. 本地管理 系统安装完成并接入网络后,在浏览器输入OrayOS默认管理IP地址:10.168.1.1,跳转本地管理初始化页面进行配置使用。 1.1 初始设置 完成两步初始配置后,进入设备管理页面。 ①设置上网方式 ②设置设备管理密码 1.2 系统信息 系统信息组件显示当前设备信息、网络信息及组网信息,三大信息模块。以便管理员直观掌握设备使用状况。 1.2.1 设备信息 显示安装OrayOS系统的设备基本信息。 初次登录本地管理,需激活安装OrayOS系统的设备SN码。点击“未激活”,可通过登录贝锐帐号方式或手机+验证码免密方式激活设备SN码。 1.2.2 网络信息 显示设备的端口状态及网络状态。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581) 注意:MTU,网络最大传输单元。即网络中可传输数据包的最大尺寸值,默认值1500。 1.2.3 组网信息 显示本设备所在的智能网络的成员信息,包括成员名称、连接类型、上/下行速率等。【点击查看智能组网教程】 1.3 网络设置 1.3.1 上网设置 在当前界面可以查看当前设备网络信息和上网方式等。 1.3.1.1 切换上网方式 主网络切换上网方式,可选择带宽拨号/动态IP/静态IP上网方式。 上网方式 说明 带宽拨号 填写对应宽带线路的帐号密码,拨号成功后,状态会显示已连接。并且下方的IP,网关,DNS等会自动显示获取到的地址信息 动态IP 路由器自动获取上层设备分配的IP上网 静态IP 手动输入路由器的WAN IP、子网掩码、网关和DNS联网 1.3.2 局域网设置 局域网是指在某一区域内由多台计算机互联成的计算机组。局域网专用性非常强,具有比较稳定和规范的拓扑结构。 设备安装OrayOS可进行内网IP、掩码及DNS域名解析地址等局域网设置。 1.3.3 网络检测 网络检测设置同步至设备底层进行网络状态检测,为网络稳定提供重要支撑。【点击查看网络检测设置】 1.4 更多设置 更多功能需前往云管理平台设置。(详细功能查看第4章) 2.云管理 通过浏览器访问贝锐蒲公英硬件云管理登录地址:pgybox.com,输入OrayOS固件的的SN码及管理密码(默认管理密码admin),即可完成首次登录。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:首次登录云管理平台需绑定贝锐账号后,方可进行更多操作。** 2.1 网络状态 网络状态可查看以下信息: 设备信息:设备名称,设备SN码,广域网IP地址,局域网IP地址 本地设备:查看本地连接设备列表 智能组网:此路由器是否有加入组网里面 WAN口实时网络状态:可以查看WAN口网络实时的使用情况 2.2 组网管理 在路由器管理页面——智能组网栏中,可对已经创建好的网络进行组网成员列表查看、访问控制、重启组网服务、加密传输及转发设置等。 2.2.1 成员列表 路径:智能组网——成员列表 在此可查看智能组网成员的网络状况、连接类型、传输速度等。 2.2.2 访问控制 路径:智能组网——访问控制 允许或禁止路由器下设备访问权限。 主要应用于智能组网中,与其他网络成员互联时设备访问控制。开启控制开关,选择控制类型,勾选对应的主机点击添加即可。 2.2.3 重启组网服务 路径:智能组网——重启组网服务 重启智能组网服务,大概需要1分钟,不影响成员的网络,但重启过程中会断开网络成员之间的连接。可选择立即重启或自定义时间重启。 2.2.4 转发设置 路径:智能组网——转发设置 开启蒲公英路由器WAN口的入站路由转发功能,实现上层设备访问蒲公英路由器下层的设备,包括蒲公英组网中的成员。 P2P设置可自定义设置P2P通信端口及开启P2P加速提高其连接访问速度。 2.2.5 P2P设置 P2P设置可自定义设置P2P通信端口及开启P2P加速提高其连接访问速度。 2.3 系统设置 2.3.1 系统信息 路径:系统设置——系统信息 可看到当前网口状态、上网信息、局域网信息、以及设备信息。 2.3.2 修改密码 路径:系统设置——修改密码 修改路由器管理密码,至少8位不能超过16位,区分大小写。 2.3.3 远程协助 路径:系统设置——远程协助 开启此功能后,允许技术顾问远程协助调试此路由器。 2.3.4 系统升级 路径:系统设置——系统升级 升级路由器系统,分稳定版与开发版两种: ①稳定版是面向大众用户的,功能全面,能够满足消费者日常使用需求,更加着重系统稳定性; ②开发版是面向发烧友用户的,除了包含稳定版的功能特性以外,开发版着重于功能尝鲜和快速更迭。 2.3.5 组件升级 路径:系统设置——组件升级 对系统的指定功能组件进行升级。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581) 注意:若单独升级某个组件,再升级整个路由器的系统,路由器系统会覆盖单独升级的组件。 2.3.6 重启路由器 路径:系统设置——重启路由器 重启路由器目前有两种方式:立即重启和自定义重启。 立即重启大概需要2分钟,重启过程中会断开网络和WiFi。 自定义可以设置每日或每周固定一个时间点进行重启。 2.3.7 备份与恢复 路径:系统设置——备份与恢复 支持备份路由器的配置并导出,也能够支持导入恢复原先的设置。 2.3.8 优化调度中心 路径:系统设置——优化调度中心 支持不同模式调整系统调度策略,得到不同场景下的最优体验。 2.4 网络设置 2.4.1 上网设置 路径:网络设置——上网设置 通过“上网设置”——“立即前往”,可以进入到本地管理设置上网方式; ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:此功能只能在路由器本地管理才能进行设置。** 2.4.2 局域网设置 路径:网络设置——局域网设置 ①路由器IP及子网掩码:编辑路由器局域网IP地址、子网掩码默认为255.255.255.0 ②MTU值:网络MTU即最大传输单元,系统默认使用 1500 字节。通常情况下这个参数不用设置,保持默认即可。不恰当的 MTU 设置可能导致网络性能变差甚至无法使用 ③设置DNS:设置路由器下层设备的DNS,为所指定的DNS ④启用IPv6:设置IPv6地址的ULA前缀及前缀长度 2.4.3 DHCP设置 2.4.3.1 DHCP(IPV4) (1)服务器设置 ①DHCPv4开关:DHCP功能开关,默认开启状态 ②IP地址范围:允许自动分配的IP地址的范围 ③租用时间:终端端在超过租用时间没有传输数据包,终端将重新获取IP (2)设备列表 DHCP设备列表,显示设备对应的IP地址、MAC地址、IP地址的分配方式。 (3)静态分配 实现内网客户端以DHCP方式获取到指定的IP地址。可以在此处添加,对应IP和MAC关系,这样此MAC获取地址时就会分配静态绑定的IP。 2.4.3.2 DHCP(IPV6) (1)服务器设置 ①DHCPv6开关:DHCP功能开关,默认开启状态 ②IP地址范围:允许自动分配的IP地址的范围 ③租用时间:终端端在超过租用时间没有传输数据包,终端将重新获取IP (2)设备列表 当DHCPv6模式为服务器时,DHCP设备列表显示设备对应的IP地址、MAC地址、DUID、接口等信息。 (3)邻居表 当DHCPv6模式为中继时,邻居表显示下层设备的MAC地址、IPV6地址、接口等信息。 2.4.4 网络MTU 路径:网络设置——网络MTU 网络MTU即最大传输单元,系统默认使用1500字节。通常情况下这个参数不用设置,保持默认即可。不恰当的MTU设置可能导致网络性能变差甚至无法使用。 2.4.5 智能QoS 路径:网络设置——智能QoS 设备带宽控制,就是限制网络内每台设备的最大带宽,防止个别设备占用过多带宽资源而影响其他设备的正常上网。 2.4.6 MAC地址克隆 路径:网络设置——MAC地址克隆 MAC地址是网卡的物理地址,部分运营商为了限制上网个数采用静态IP+MAC地址绑定的方法给设备分配网络,通过MAC地址克隆的功能,就可以实现多个设备共用一个MAC上网,解决运营商限制上网个数的问题。 2.4.7 自定义Hosts 路径:网络设置——自定义Hosts 手动设置Hosts记录,将IP与域名进行绑定。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:局域网下的设备需要将DNS设置为自动获取才可以生效。** 2.4.8 静态路由 路径:网络设置——静态路由 指由用户或网络管理员手工配置的路由信息。 配置参数:接口、目的地址、子网掩码、网关地址及跃点数。 用户或网络管理员手动配置路由信息,使设备指定接口访问目标地址时,数据从指定的网关进行发送。静态路由一般适用于比较简单的网络环境,在这样的环境中,网络管理员易于清楚地了解网络的拓扑结构,便于设置正确的路由信息。 2.4.9 端口映射 路径:网络设置——端口映射 设置端口转发规则,将内部服务IP及端口映射出外部。 自定义虚拟服务器名称,填写内网服务器IP,内部端口号及外部端口号。 2.4.10 DMZ 路径:网络设置——DMZ 将设备的所有服务端口开放到外网。DMZ相当于映射所有的端口,并且直接把主机暴露在网关中,比端口映射方便但是不安全。 2.4.11 UPnP设置 路径:网络设置——UPnP设置 UPnP(即插即用)协议:简化智能设备的联网过程。在结合了UPnP技术的设备以物理形式连接到网络中之后,它们可以通过网络自动彼此连接在一起,使得设备间彼此可以自动连接和协同工作。 2.4.12 分组设置 路径:网络设置——用户组设置 实现上网行为管理的基础,针对不同类型的对象进行分组管理,可设置IP组、MAC组、时间组及域名组进行管理。 2.5 行为管理 2.5.1 上网权限控制 路径:行为管理——上网权限控制 设置只允许/禁止对应MAC地址设备上网的功能。 (1)MAC上网控制:通过MAC地址允许或拒绝无线网络中的计算机访问广域网,有效控制无线网络内用户的上网权限。 (2)定时上网控制:通过设置IP组和实现组对应IP网络段的设备在指定的时间允许上网。 2.5.2 网址访问控制 路径:行为管理——网址访问控制 通过阻止名单和允许名单的方式,实现控制内网客户端在指定时间里允许/禁止访问某些网页的目的。根据页面提示,选择控制模式,域名、IP及时间。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:对不同分组设定不同限制,若同一个用户在不同的组里,则会执行优先级高的访问控制。** 2.5.3 网址浏览记录 路径:行为管理——网址浏览记录 开启网址浏览记录,讲记录保存路由器下联终端设备的网址浏览记录。若浏览记录过多可点击【清理】;可点击【导出】批量导出浏览记录;还可根据IP/MAC地址、起始时间、终止时间进行针对性的网址浏览记录查询。 2.6 安全管理 2.6.1 ARP绑定 路径:安全管理——ARP绑定作用:地址解析协议,是根据IP地址获取物理地址的TCP/IP协议。 类别: ①普通绑定:IP与MAC为默认分配,自行修改不影响正常使用; ②唯一绑定:IP与MAC为强制绑定,未正确匹配则无法上网。 2.6.2 ACL规则 路径:安全管理——ACL规则 作用:通过此功能可以有效地控制用户对网络的访问,从而最大程度地保障网络安全。配置ACL后,可以限制网络流量,允许特定设备访问,指定转发特定端口数据包等。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意: ①当多条规则产生冲突时,系统仅会执行优先级最高的ACL规则; ②若使用ACL规则,请前往智能组网-转发设置关闭WAN入站路由转发。** 点击“添加”进行添加ACL规则设置,需填写以下参数: (1)添加地址 名称 说明 源地址 指明此数据包是由哪个IP发送出来的 目标地址 指明此数据包的目的地址是哪个IP。可选择添加用户组或手动输入IP或IP段进行添加 (2)添加规则 名称 说明 协议 设置此规则所走的协议,可选择任意 动作 接受或拒绝此数据 源端口 接受或拒绝的起始端口 接受或拒绝的起始端口 目标端口 特定目标的端口 进接口 设置数据的接口来源 出接口 出接口 时间组 定义此规则生效的具体时间 是否启用 开关此规则设置是否生效 2.6.3 防火墙设置 路径:安全管理——防火墙设置 (1)禁止内网PING 路由 禁止局域网客户端 PING路由 LAN 口与 WAN口 IP 地址。 (2)禁止外网PING 路由 禁止外网 PING路由 WAN口的 IP地址。 (3)禁止客户端 tracert 路由跟踪 禁止用户使用 tracert 命令来追踪路由到达目标地址的路径。 (4)防止SYN Flood攻击 在进行标准的TCP连接时,防止TCP-SYN Flood攻击。 2.6.4 连接数限制 控制IP组经过本设备的协议连接数。 2.7应用工具 2.7.1 网络工具 路径:应用工具——网络工具 提供三种网络工具给到用户进行检测。 ping:用来检测网络的连通情况和分析网络速度。 tracert:路由跟踪实用程序,用于确定IP数据包访问目标所采取的路径。 route:用来显示、人工添加和修改路由表项目。 2.7.2 SNMP服务 路径:应用工具——SNMP服务 SNMP为环境管理协议,规定了在网络环境中对设备进行监视和管理的标准化管理框架、通信的公共语言、相应的安全和访问控制机制。网络管理员使用该功能可以查询设备信息、修改设备的参数值、监控设备状态、自动发现网络故障和生成报告等。 2.7.3 日志中心 路径:应用工具——日志中心 系统日志:记录设备系统7天的固件运行事件; 操作日志:记录近7天用户对云管理每个功能操作日志。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:路由器还原出厂设置或重启时,默认清除所有日志信息。** 2.8 应用中心 特色功能支持花生壳动态域名解析、向日葵远程开机、文件共享三大官方应用。 2.8.1 花生壳动态域名解析 路径:应用中心——花生壳动态域名解析 将内网搭建的服务通过花生壳下的域名解析至外网,外网通过域名就可以直接访问到用户在内网搭建的服务。通过花生壳管理APP/微信扫一扫扫码激活设备, 激活后设备密码将同步为【首个登录帐号】的密码; 后续更换设备登录帐号,设备密码将不会进行同步。 2.8.2 向日葵远程开机 路径:应用中心——向日葵远程开机 蒲公英路由器自带向日葵局域网版开机功能,现已升级为无忧版。可远程控制路由器下联的主机设备开机。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意: 被开机设备的主板机网卡须支持并开启WOL功能。** 2.8.3 文件共享 路径:应用中心——文件共享 当设备USB接口接入存储设备时启用文件共享功能。【点击查看详细帮助】 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意: ①支持共享的USB文件系统格式有FAT、NTFS、exFAT以及Ext2/3/4; ②可对共享进行用户名密码验证,访问该共享的设备需输入所设置的用户名密码才能访问。** 3. 管理平台 贝锐蒲公英管理平台:https://console.sdwan.oray.com/ ,可打破地域、网络环境限制,快速实现OrayOS与其他硬件、贝锐蒲公英客户端异地组网,轻松完成互联互通。贝锐蒲公英管理平台提供跨平台、跨系统远程运维、异常状态实时告警及行为追溯,严谨的身份认证管理、终端安全认证及访问控制,高效安全的集中管理,灵活应对用户不同使用需求,实现降本增效。 至此,OrayOS X86系统固件介绍完毕,若遇到产品相关问题,可【点击联系客服】寻求帮助。
GeoTrust证书安装指南(Linux版)
目录 1、证书简介 2、证书开通 2.1、提交资料 2.2、邮件验证 2.3、证书颁发 3、证书安装 3.1、Tomcat站点部署 3.2、Apache站点部署 3.3、Nginx站点部署 ———————————————— 1、证书简介 GeoTrust SSL证书是数字证书的一种,类似于驾驶证、护照或营业执照。 SSL证书遵守加密协议,在验证服务器身份后颁发,具有服务器身份验证和数据传输加密功能,用于保障在Internet上数据传输安全,利用数据加密(Encryption)技术,可确保数据在网络上之传输过程中不会被截取及窃听。 在申请SSL证书之前,需先准备证书请求文件(CSR)及证书私钥(KEY)。 CSR是原始文件,包含了您的服务器信息和单位信息,需要提交给CA认证中心进行审核。以下是申请证书流程图,颁发周期为7个工作日内。 注意:KEY及CSR文件可由贝锐客服协助生成并发送给到用户,用户需妥善保管及备份。 2、证书开通 2.1、提交资料 选择需要的SSL证书类型,点击立即购买,按照页面提示填写对应的信息。(购买戳我) 注意:①GeoTrust证书必须为企业用户才可进行申请; ②为避免CSR有误导致审核失败,建议勾选“贝锐协助”生成CSR请求文件,若有相关经验也可选择自行生成,参考帮助:CSR生成指南 ; ③ 身份证及申请表为选填部分,可选择不上传提交。 2.2、身份验证 下单购买成功后,会有贝锐客服联系用户获取企业资料及确认验证方式。 (1)电话验证 用户提交企业资料后,这边会拨打所申请企业的联系电话进行验证,核实申请人是否为企业职工,验证通过后才可进行邮件验证。 (2)邮件验证 贝锐客服会联系用户获取管理员邮箱,以便于发送邮件进行验证。若您的域名没有搭建邮件服务,可由贝锐协助您完成验证。 注释:什么是管理员邮箱? 认证系统为了确认您对所申请的域名拥有管理权,会发电子邮件到指定的管理员邮箱中。 例:您申请的证书域名为domain.com,可供选择的管理员邮箱如下: postmaster@domain.com admin@domain.com administrator@domain.com webmaster@domain.com hostmaster@domain.com 只需选择其中一个并提交给到客服人员,验证邮件就会发送到指定的邮箱中,用户需留意查收验证邮件。 收到的验证邮件内容如下图所示,点击邮件中的链接(蓝色字体部分),跳转到验证页面,点击“Approve”完成邮件验证。 2.3、证书颁发 完成邮件验证身份后,购买的SSL证书最终将以邮件的方式发送给到用户购买时所填写的电子邮箱中。 范例(仅供参考): 邮件内容中包含中级证书的下载链接及域名证书内容,需进行合并使用。 首先在桌面空白处,鼠标右键新建文本文档,把域名证书及中级证书,合并在一起,最后生成命名为server,后缀为crt的文件 注意:顺序不能调动,上面为域名证书,下面为中级证书,中间不留空。 3、证书安装 材料准备: (1) 域名证书与中级证书合成的CRT文件:server.crt (2) 申请证书前生成的私钥文件:domian.key 注意: 若由贝锐协助生成CSR文件,则KEY文件也会一并提供给到用户; 若用户CSR文件自行生成,则KEY文件用户也会拥有。具体参考:CSR生成指南 Key文件具体如下所示: 目前Linux常见站点服务类型有Tomcat、Apache及Nginx四种,下面将一一进行证书安装介绍。 注意:证书格式转换问题可联系我司客服进行协助处理。 3.1、Tomcat站点部署 Tomcat部署SSL证书前,需通过第三方转换平台将证书文件及私钥文件转换为JKS格式。 注意:需自定义设置JKS密码,用于安装证书时的校验。 转换格式成功后,将证书文件放置在Tomcat文件目录下,编辑Tomcat的配置文件server.xml . 在配置文件中新增下图红色框内容: 注意: ① 配置文件修改前建议先进行备份; ② keystoreFile后面需加上JKS文件路径, keystorePass则是JKS校验密码。 至此,Linux下的Tomcat站点SSL证书部署完成,直接通过https://域名即可进行加密访问。 注意:不同Tomcat版本,修改server.xml的方式不同,请参考tomcat说明: Tomcat 8.0 - http://tomcat.apache.org/tomcat-8.0-doc/ssl-howto.html Tomcat 7.0 - http://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html Tomcat 6.0 - http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html Tomcat 5.5 - http://tomcat.apache.org/tomcat-5.5-doc/ssl-howto.html Tomcat 5.0 - http://tomcat.apache.org/tomcat-5.0-doc/ssl-howto.html Tomcat 4.1 - http://tomcat.apache.org/tomcat-4.1-doc/ssl-howto.html 3.2、Apache站点部署 Apache部署证书无需转换格式,直接将证书文件放于站点安装目录中; 进入/etc/httpd/conf/,打开httpd.conf文件; 去掉“Include conf.d/*.conf”前面的“#”号; 进入/etc/httpd/conf.d,打开ssl.conf文件; 找到下方红框的两个选项,去除前面的“#”号,并输入准确的证书路径; 至此,Linux下的Apache SSL证书部署完成,直接通过https://域名即可进行加密访问. 3.3、Nginx站点部署 Nginx部署证书无需转换格式,直接将证书文件放于站点安装目录中; 打开安装目录中的配置文件:nginx.conf 在配置文件中新增下图内容: Linux下的Nginx站点SSL证书部署完成。直接通过https://域名即可进行加密访问。 至此,RapidSSL证书Linux系统安装指南介绍结束
RapidSSL证书安装指南(Linux版)
目录 1、证书简介 2、证书开通 2.1、提交资料 2.2、邮件验证 2.3、证书颁发 3、证书安装 3.1、Tomcat站点部署 3.2、Apache站点部署 3.3、Nginx站点部署 ———————————————————————————— 1、证书简介 RapidSSL证书是数字证书的一种,类似于驾驶证、护照或营业执照。 SSL证书遵守加密协议,在验证服务器身份后颁发,具有服务器身份验证和数据传输加密功能,用于保障在Internet上数据传输安全,利用数据加密(Encryption)技术,可确保数据在网络上之传输过程中不会被截取及窃听。 在申请SSL证书之前,需先准备证书请求文件(CSR)及证书私钥(KEY)。 CSR是原始文件,包含了您的服务器信息和单位信息,需要提交给CA认证中心进行审核。以下是申请证书流程图,颁发周期为7个工作日内。 注意:KEY及CSR文件可由贝锐客服协助生成并发送给到用户,用户需妥善保管及备份。 2、证书开通 2.1、提交资料 选择需要的SSL证书类型,点击立即购买,按照页面提示填写对应的信息。(购买戳我) 注意: ① 为避免CSR有误导致审核失败,建议勾选“贝锐协助”生成CSR请求文件; ② 如果有相关经验,可选择自行生成,参考帮助:CSR生成指南 ; ③ 身份证及申请表为选填部分,可选择不上传提交。 2.2、邮件验证 下单购买成功后,贝锐客服会联系用户获取管理员邮箱,以便于发送邮件进行验证。若您的域名没有搭建邮件服务,可由贝锐协助您完成验证。 注释:什么是管理员邮箱? 认证系统为了确认您对所申请的域名拥有管理权,会发电子邮件到指定的管理员邮箱中。 例: 您申请的证书域名为domain.com,可供选择的管理员邮箱如下: postmaster@domain.com admin@domain.com administrator@domain.com webmaster@domain.com hostmaster@domain.com 只需选择其中一个并提交给到客服人员,验证邮件就会发送到指定的邮箱中,用户需留意查收验证邮件。 收到的验证邮件内容如下图所示,点击邮件中的链接(红色划线部分),跳转到验证页面; 点击“Approve”完成邮件验证。 2.3、证书颁发 完成邮件验证身份后,购买的SSL证书最终将以邮件的方式发送给到用户购买时所填写的电子邮箱中。 范例(仅供参考): 邮件内容中包含中级证书的下载链接及域名证书内容,需进行合并使用。 首先在桌面空白处,鼠标右键新建文本文档,把域名证书及中级证书,合并在一起,最后生成命名为server,后缀为crt的文件。 注意:顺序不能调动,上面为域名证书,下面为中级证书,中间不留空。 3、证书安装 材料准备: (1) 域名证书与中级证书合成的CRT文件:server.crt (2) 申请证书前生成的私钥文件:domian.key 注意: 若由贝锐协助生成CSR文件,则KEY文件也会一并提供给到用户; 若用户CSR文件自行生成,则KEY文件用户也会拥有。具体参考:CSR生成指南 Key文件具体如下所示: 目前Linux常见站点服务类型有Tomcat、Apache及Nginx四种,下面将一一进行证书安装介绍。 注意:证书格式转换问题可联系我司客服进行协助处理。 3.1、Tomcat站点部署 Tomcat部署SSL证书前,需通过第三方转换平台将证书文件及私钥文件转换为JKS格式。 注意:需自定义设置JKS密码,用于安装证书时的校验。 转换格式成功后,将证书文件放置在Tomcat文件目录下,编辑Tomcat的配置文件server.xml . 在配置文件中新增下图红色框内容: 注意: ① 配置文件修改前建议先进行备份; ② keystoreFile后面需加上JKS文件路径, keystorePass则是JKS校验密码。 至此,Linux下的Tomcat站点SSL证书部署完成,直接通过https://域名即可进行加密访问。 注意:不同Tomcat版本,修改server.xml的方式不同,请参考tomcat说明: Tomcat 8.0 - http://tomcat.apache.org/tomcat-8.0-doc/ssl-howto.html Tomcat 7.0 - http://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html Tomcat 6.0 - http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html Tomcat 5.5 - http://tomcat.apache.org/tomcat-5.5-doc/ssl-howto.html Tomcat 5.0 - http://tomcat.apache.org/tomcat-5.0-doc/ssl-howto.html Tomcat 4.1 - http://tomcat.apache.org/tomcat-4.1-doc/ssl-howto.html 3.2、Apache站点部署 Apache部署证书无需转换格式,直接将证书文件放于站点安装目录中; 进入/etc/httpd/conf/,打开httpd.conf文件; 去掉“Include conf.d/*.conf”前面的“#”号; 进入/etc/httpd/conf.d,打开ssl.conf文件; 找到下方红框的两个选项,去除前面的“#”号,并输入准确的证书路径; 至此,Linux下的Apache SSL证书部署完成,直接通过https://域名即可进行加密访问. 3.3、Nginx站点部署 Nginx部署证书无需转换格式,直接将证书文件放于站点安装目录中; 打开安装目录中的配置文件:nginx.conf 在配置文件中新增下图内容: Linux下的Nginx站点SSL证书部署完成。直接通过https://域名即可进行加密访问。 至此,RapidSSL证书Linux系统安装指南介绍结束
贝锐蒲公英客户端 for Windows教程
贝锐蒲公英客户端6.0版本实现管理和组网功能二合一,满足用户软硬件一键组网快速开局的需求。 1.登录方式 贝锐蒲公英客户端 for Windows支持多种登录方式,分别是:免密登录、账号登录、微信授权登录、认证源登录和扫码登录。 1.1 免密登录 点击手机登录图标,输入UID或贝锐账号绑定的手机号码,以及接收手机验证码进行登录。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581) 注意:若手机号码有绑定UID及贝锐账号,使用免密登录则优先使用UID身份信息验证登录。 1.2 账号登录 输入已注册的贝锐帐号/UID/UID所绑定的手机号及密码登录。 1.2.1 贝锐账号登录 使用贝锐账号及其密码在蒲公英客户端上进行登录。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:若贝锐账号为手机号码且手机号码绑定了UID,只会验证UID绑定手机号+UID密码,输入贝锐账号密码无法通过验证。** 1.2.2 UID登录 若原先已经通过贝锐账号登录生成UID,则可通过该UID以及设置的密码在蒲公英客户端上进行登录。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:若手机号码绑定了UID,可通过·UID绑定手机号+UID密码进行登录。** 1.3 微信授权登录 点击微信登录图标,弹出微信授权页面,登录已绑定UID或贝锐账号的微信,扫描界面的二维码授权登录即可。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:若微信有绑定UID及贝锐账号,使用微信授权登录则优先使用UID身份信息验证登录。** 1.4 认证源登录 输入企业认证源ID,选择认证平台,跳转至相关应用授权登录。【点击查看认证源使用教程】 1.5 扫码登录 选择“扫码登录”方式,使用手机端最新版的贝锐蒲公英客户端APP扫描访问端显示的二维码并确认登录。 2.功能介绍 贝锐蒲公英客户端Windows版主界面分为四个部分:①总控制台、②我的网络、③安全中心、④推荐中心、⑤菜单栏。 2.1 总控制台 2.1.1 基础功能 ①使用成员身份UID登录:显示当前成员的名称,服务等级、服务到期时间、UID、网络ID信息、所属的网络名称 使用贝锐账号身份登录:该模块将显示自动分配的成员的名称,服务等级、服务到期时间、快捷免密管理平台入口、贝锐账号/网络ID信息、所属名称 ②开关可以开启/关闭蒲公英组网的连接 ③“最近登录”中显示当前访问端登录的地区、时间 、点击“更多”,可查看最近登录的设备列表 ④显示当前客户端的加密模式类型 ⑤显示智能组网内管理员发布的网络资源 ⑥点击可查看当前UID成员与组网内其他成员的传输类型、传输速率 ⑦推荐最近热门功能 使用成员身份UID登录 使用贝锐账号身份登录 2.1.2 高级功能 点击“更多”,侧拉列表展示所有的高级功能。 ①WiFi认证 当企业使用蒲公英无线设备部署安全易用的企业无线网络,企业员工可通过贝锐蒲公英客户端一键连接企业无线WiFi。一人一账一密,无需配置证书或手动输入密码,减少沟通成本,方便快捷,提高企业内部无线网络的安全性。 若使用贝锐账号登录,将显示WiFi认证配置入口。【点击查看企业WiFi使用帮助】 ②云应用 当服务端成员发布应用后,客户端在“云应用”处输入服务器端的虚拟IP及云应用访问密码,即可访问服务器发布的应用。【查看详细使用帮助】 若使用贝锐账号登录,将显示云应用配置入口。 ③虚拟串口 通过客户端创建虚拟串行端口,已达到与连接物理串口相同的管理操作,如远程调试串口设备等。【查看详细使用帮助】 2.2 我的网络 “我的网络”首页,显示设备所属组网的基本信息,如网络ID、网络类型等。点击“查看”组网的网络公告、网络资源、旁路信息、DNS信息,将显示对应的的信息。 “我的网络”模块中显示当前成员所在的网络及其他网络成员在线状态,如果智能组网存在多级结构,支持多级分组显示。 软件成员,还可以查看成员的IP地址、成员类型、连接类型以及网络检测等。 硬件成员,可查看成员的IP地址,成员类型,连接类型,网络检测PING。点击“查看子设备”,查看连接在此硬件成员下的子设备,包括设备名称、设备IP,并支持复制设备IP地址。 2.3 安全中心 2.3.1 账号安全管理 可以修改账号密码、解绑/绑定贝锐账号相关的手机号及微信。 使用UID身份登录,修改账号密码、解绑/绑定贝锐账号相关的手机号及微信,仅对UID所绑定的信息进行操作。 使用贝锐账号身份登录,修改账号密码、解绑/绑定贝锐账号相关的手机号及微信,将跳转至贝锐管理平台修改贝锐账号所绑定的信息。 2.3.2 历史登录设备 查看最近登录的设备、最后登录的时间和登录地址。点击“查看”,可查看历史登录设备的登录记录。 2.4 推荐中心 2.4.1 为你推荐 推荐最近热门功能,点击可了解相关功能介绍。 2.4.2 解决方案 提供场景应用解决方案咨询快捷入口,点击可了解相关解决方案信息。 2.4.3 硬件组网 蒲公英硬件相关介绍,点击可了解其硬件详细信息。 3.菜单栏 点击蒲公英客户端软件左下角菜单按钮,可以对客户端进行常规的设置、客户端诊断、查看使用帮助、版本信息和日志、重登、切换账号和退出客户端等操作。 3.1 通用设置 3.1.1 启动运行 ①开机启动:开机自动启动访问端程序 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:系统的快速启动会导致客户端设置里关闭开机启动无效** ②自动登录:自动登录最后一次使用的账号,特殊情况下不会自动重登 ③登录自动连接组网:登录贝锐蒲公英客户端软件后自动连接组网 ④仅以后台服务方式运行:程序在后台运行,任务栏不显示程序图标 ⑤定时检测系统代理:定时检测软件安装的系统是否开启代理 3.1.2 安全验证 强制校验证书保障数据通信安全,避免遭受攻击。 3.1.3 显示语言 自定义贝锐蒲公英客户端的显示语言。可选择简体中文或英文。 3.1.4 P2P通信端口 默认随机端口,可选固定端口用于P2P连接,端口范围有限。 3.2 我的消息 查看客户端上的通知消息,如服务到期提醒,优惠信息提醒等。 3.3 诊断功能 查看客户端与服务器的各项连接情况,如有异常,可联系技术客服咨询。 3.4 使用帮助 点击“使用帮助”跳转到贝锐官网查看贝锐蒲公英客户端for Windows的使用帮助。 3.5 其他功能 3.5.1 关于 查看客户端的版本信息,可检查更新。 3.5.2 锁定 点击“锁定”,把蒲公英客户端软件进行锁定,需输入该成员的登录密码访客解锁,若该成员有绑定手机,可切换为手机验证码进行解锁。 3.5.3 建议反馈 点击“建议反馈”,留下您在使用贝锐蒲公英客户端软件过程中宝贵的意见和建议并发送至贝锐。 3.5.4 查看日志 点击查看日志,直接跳转到蒲公英访问端日志存放目录,当蒲公英客户端使用有异常时,可将日志文件打包发送给技术客服协助解决。 3.5.5 重新登录 点击“重新登录”,客户端将会重登。 3.5.6 切换账号 点击“切换账号”,可切换曾登录过的账号,也可添加新账号进行切换,最多可添加3个账号。 3.5.7 退出账号 点击“退出账号”,蒲公英客户端将退出登录,若勾选“清除当前账号信息”选项,将不保留当前登录的账号信息,并直接退出客户端程序。 至此,贝锐蒲公英客户端for Windows教程介绍完毕,若有其他疑问可联系客服进行咨询。
管理APP for Android & iOS
为了方便广大用户使用和管理花生壳,推出了手机端管理APP。管理APP支持远程管理花生壳,比如新增/编辑映射、管理智能硬件等。 下面请看花生壳管理APP的使用步骤(以Android端为例)。 1. APP下载与登录 1.1 下载 ① 在应用市场搜索并下载; ② 花生壳官网或客户端扫码下载。 1.2 登录 花生壳管理APP支持以下的登录方式,选择其中一种完成登录即可: ① 账号密码登录; ② 微信授权登录; ③ 免密登录(手机号码+验证码方式); ④ Apple ID登录(仅限iOS设备)。 2. 界面介绍 2.1 映射 此界面可以查看当前帐号或子帐号的在线/离线状态、服务等级、自定义映射及场景映射信息等,并支持在贝锐花生壳管理上直接创建和修改映射内容。 2.1.1 帐号与服务 (1)帐号信息 ① 显示帐号名、服务版本和到期时间 ② 可为本帐号修改备注,查看登录信息、花生壳状态(在线or离线)、公网IP(当前网络出口IP)和重登花生壳(发送指令重登花生壳客户端) ③ 点击界面上方帐号切换按钮,可以选择添加子帐号、切换登录 (2)服务 ① 查看当前服务版本 ② 点击<续费>跳转至操作页面 2.1.2 配件 显示当前帐号的配置内容,如配件中心、映射数、超级带宽。 2.1.2.1 配件中心 可以查看帐号下所拥有的配置功能,支持对配件进行管理。帐号等级不同,支持开通的配置内容有所不同,下面以精英版服务的帐号为例。 (1)辅助配件 选项 描述 超级带宽 超级带宽5M起步,性价比高延迟低 夜间带宽 开启后,18:00~次日8:00所有映射带宽提升100% 固定端口 查看帐号下已有的固定端口,作用是删除映射重建,可复用购买的端口号 国内线路迁移 顶级域名设置映射默认走海外转发服务器,购买线路迁移服务并完成域名备案后,可将顶级域名的映射迁移到国内服务器,以提升映射访问速度和稳定性 免费流量 付费用户每月不限流量使用 域名 查看帐号下所拥有的域名,及其诊断信息 (2)映射、安全配件 配件类型 选项 描述 映射配件 HTTPS加密映射 自动化部署HTTPS证书以加密访问HTTP协议应用,用户服务器无需部署SSL证书,内网穿透HTTP转化为HTTPS使用443端口映射 映射保留 30天无流量的映射自动保留,系统不自动删除 安全配件 访问IP白名单 指定白名单内的IP地址能访问帐号下的映射 访问IP黑名单 指定黑名单内的IP地址禁止访问帐号下的映射 (3)特殊配件 选项 描述 请求头扩展 支持通过X-Forward-for获取真实访问来源的IP 通道直连模式 根据访问量选择适合的链接模式 访问IP策略 可设置IPV4、IPV6的访问策略 登录线路设置 提供七大线路选择,选择与服务器当前网络相同的登录线路获得更流畅的网络体验 客户端通信加密 花生壳客户端通过SSL的方式与花生壳服务器建立连接,使数据更加安全。同时兼容适配各类特殊的网络,可在有防火墙和使用特殊协议的环境下开通使用 2.1.3 自定义映射 在贝锐花生壳管理上可以添加、删除、编辑映射。 2.1.3.1 添加映射 点击<+>新增映射按钮,根据实际情况填写映射信息。有四种映射类型选择:TCP、HTTPS、HTTP、Socks5。 名称 功能 TCP 用于准确性要求高的数据传输,如文件传输、远程访问等,不支持创建网站或在浏览器访问 HTTPS 用于安全性要求高的网站类数据传输,外网端口443,花生壳已自动部署SSL证书,本地无需额外部署支持在用户和服务器之间实现加密访问,有效防止隐私信息被窃取,提升客户对企业网站的信任度;花生壳HTTPS映射已自动部署加密证书,本地应用无需再次部署 HTTP 用于搭建HTTP协议的站点,非加密访问,默认端口80 Socks5 用于特殊环境下需要使用代理才能访问的应用,禁止用于违法违规应用 为了响应《互联网信息服务管理办法》及配合公安部门对违法行为的打击,Socks5映射仅提供给付费级别的特殊用户使用,如有需要请联系客服 2.1.3.2 示例 (1)下面以创建TCP映射(发布Windows远程桌面)为例,演示映射内容如何填写; 选项 描述 映射名称 为当前映射设置名称,以方便区分和记忆 映射类型 选择TCP 映射模板 选择Windows远程桌面 外网域名 选择用于外网访问的域名地址 外网端口 动态端口指生成映射后由系统自动分配5位数的端口号;固定端口需另外购买,在有效期内即使映射删除后也可重复使用。根据实际情况选择即可 内网主机 填写服务器的局域网IP地址 内网端口 填写当前服务应用的内网端口号 带宽 用户根据帐号等级可分配给当前映射的带宽数量,也可以根据需求升级带宽,带宽升级后可有效提升映射的访问速度,每条映射可分配的带宽上限为10Mbps 确认映射内容填写无误,点击<保存>即可。 2.1.3.3 其他操作 在“自定义映射”列表中,对选中的映射左滑,可进行诊断、编辑和删除操作。 (1)编辑映射 点击<编辑>,支持修改映射的应用名称、内网主机IP、内网端口和带宽的参数。 (2)诊断、删除 ① 点击<诊断>,可查看当前映射的诊断信息,其中包含了域名解析是否成功、是否连接转发服务器成功以及内网服务的诊断状态。当遇到映射异常或无法使用时,可将诊断信息截图后提供给技术工程师协助判断问题 ② 点击<删除>,可将当前的映射删除。若当前映射的外网端口是动态端口,删除后端口无法恢复 2.1.4 场景映射 花生壳提供单独付费的场景映射服务,特点有: ① 不占用帐号原有的映射数 ② 每条映射带宽为3M(用于远程群晖NAS设备映射可享10M标准带宽) ③ 目前支持场景映射类型:幻兽帕鲁、远程群晖NAS设备、我的世界游戏联机、3389远程桌面、远程 MySQL数据库、远程SQL Server数据库、远程SSH服务等 场景映射需单独开通后才可使用,开通后,系统会为你自动创建对应的映射,外网端口为系统随机分配的5位数端口(使用HTTPS协议的映射除外),内网端口不支持修改,仅能修改内网IP。 注意:场景映射价格以官网为准。 2.1.5 文件分享 花生壳提供文件分享服务,特点有: ① 本地化存储文件 ② 共享空间不限量 ③ 通过浏览器即可远程访问,隐私安全有保障 文件分享需单独开通后才可使用,选择需购买文件库数量,确认无误后结算即可开通完成。【点击查看花生壳文件分享帮助教程】 2.2 设备 这里可以管理帐号下已绑定的智能硬件,包括花生壳硬件设备以及内嵌了花生壳功能的其它设备。 2.2.1 添加设备 2.2.1.1 通过SN码添加 在右上角点击<+>按钮,选择“添加设备”,根据提示输入设备的SN码添加设备。 2.2.1.2 扫描二维码添加 在右上角点击<+>按钮,选择“扫一扫”,扫描花生壳智能硬件背面的二维码进行添加。 2.2.1.3 局域网扫描添加 在右上角点击<+>按钮,选择“局域网扫描”,贝锐花生壳管理会自动扫描与手机连接相同网络的花生壳硬件设备。 扫描完成后,输入设备密码,即可将花生壳硬件绑定到当前登录的帐号下。 2.2.2 管理设备 在设备列表中,点击对应在线的智能硬件设备,可对设备进行管理。 选项 描述 设备信息 显示设备型号、SN码和MAC地址 登录帐号 查看或更换设备当前登录的帐号,可登录其他贝锐帐号登录 网络设置 可修改智能硬件的上网方式,支持DHCP和静态IP方式上网 内核版本 查看或检查更新当前硬件的内核版本 重启和重置 重启或重置当前硬件(重置后需重新绑定及登录帐号) 2.2.2.1 激活设备 ① 如果添加的是已激活的设备,无需重复激活 ② 如果添加的是全新或已重置的花生壳硬件,需激活设备才能正常使用 激活步骤如下: 在设备列表中,点击对应在线需激活的花生壳智能硬件设备,选择设备登录帐号,等待设备激活成功后,即可成功绑定在帐号下。 2.2.3 解绑设备 已添加到帐号下的设备,在设备列表中,长按对应的设备,点击<解除管理>,可将此智能设备从当前帐号下中移除,不影响智能设备已登录帐号登录状态。 2.3 发现 在【发现】模块中,可以查看花生壳相关的干货教程、学生计划。 2.4 我的 在【我的】模块中,可以查看帐号名称、服务代码、进入硬件商城、阳光小店、查看我的兑换、实名认证、我的消息、使用手册、联系我们的方式和关于花生壳等。 2.4.1 硬件商城 点击<硬件商城>,跳转到花生壳硬件的购买页面,可自行选购。 2.4.2 阳光小店 点击<阳光小店>,进入贝锐阳光小店,可通过做任务的方式收集阳光,收集的阳光可兑换相关的服务内容。 2.4.3 我的兑换 在<我的兑换>中,可输入兑换码进行兑换贝锐产品。 2.4.4 实名认证 查看帐号实名认证状态和信息,支持进行实名认证操作和更新实名认证信息。 2.4.5 我的消息 查看我的消息通知。 2.4.6 使用手册 查看花生壳软硬件产品的详细使用教程。 2.4.7 联系我们 通过不同方式向花生壳工作人员寻求帮助。 2.4.8 关于花生壳 查看花生壳官网地址、官方微信公众号、隐私政策、用户许可协议、当前版本是否为最新以及提交意见至花生壳以促进产品改进优化。 2.5 设置 在客户端右上角点击<设置>图标按钮,进入贝锐花生壳管理的设置界面。 2.5.1 修改手机号 修改花生壳帐号绑定的手机号,经原手机号码或邮箱验证后可修改。 2.5.2 修改密码 修改花生壳帐号登录密码,经原手机号码或邮箱验证通过后可修改。 2.5.3 绑定微信 绑定微信帐号后可使用微信方式登录贝锐花生壳管理。 2.5.4 个性化推荐 开启后,系统根据个性化为用户推荐不同的信息。 2.5.5 主题模式 开启后,贝锐花生壳管理将跟随系统打开或关闭暗黑模式。 2.5.6 消息设置 根据实际需要开启/关闭帐号或系统的通知消息。 2.5.7 系统权限设置 设置系统的相机、麦克风、拨打电话和通知的权限。 2.5.8 个人信息收集清单 查看贝锐花生壳管理个人信息收集清单。 2.5.9 第三方信息共享清单 查看贝锐花生壳管理第三方信息共享清单。 2.5.10 注销帐号 彻底注销帐号,经原手机号码或邮箱验证通过后,按照指示完成注销。 2.5.11 退出当前帐号 点击<退出当前帐号>,花生壳帐号自动退出,并返回到登录界面。 关于贝锐花生壳管理安卓版软件的使用介绍到此结束,如果在使用过程中遇到问题,可登录官网发起工单咨询,感谢您的观看。 2.1 映射 2.1.1 界面功能介绍 (1)自定义映射 此界面可以查看当前账号或子账号的在线/离线状态、服务等级、配件服务等;点击“升级“或“续费”可开通服务和配件; (2)场景映射 可查看添加的自定义映射及场景映射信息,并支持在花生壳管理APP上直接创建和修改映射内容。 2.1.2 新增映射 点击新增映射按钮“+”,根据页面要求完善映射信息: 选项 描述 映射名称 为当前映射设置名称,以方便区分和记忆 映射类型 提供TCP、HTTPS类型选择,根据所搭建的应用服务选择映射类型。如网站服务可选HTTPS、远程桌面选择TCP 映射模板 提供了Windows远程桌面、SSH服务和SQL Server服务的模板,选择模板后自动填充映射的内网主机和端口信息(支持修改) 外网域名 选择用于外网访问的域名地址 外网端口 动态端口:生成映射后由系统自动分配5位数的端口号;固定端口:需另外购买,在有效期内即使映射删除后也可重复使用。根据实际情况选择即可 内网主机 填写服务器的局域网IP地址 内网端口 填写当前服务应用的内网端口号 带宽 用户根据账号等级可分配给当前映射的带宽数量,也可以根据需求升级带宽,带宽升级后可有效提升映射的访问速度,每条映射可分配的带宽上限为10Mbps 以上映射信息内容确认填写无误后,点击“保存”,映射添加成功。(下图以远程桌面为例) ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581) 注意: ①花生壳程序是映射本地内网服务实现外网访问 ②若异地登录花生壳,将会导致已设置的本地内网服务映射失效 ③若有多个地点的服务需要发布,建议通过多个账号进行映射操作 2.1.3 诊断、编辑和删除 在“自定义映射”列表中,对选中的映射左滑,可进行诊断、编辑和删除操作。 (1)编辑映射 点击“编辑”,支持修改映射的应用名称、内网主机IP、内网端口和带宽的参数; (2)诊断、删除 ① 点击“诊断”,可查看当前映射的诊断信息,其中包含了域名解析是否成功、是否连接转发服务器成功以及内网服务的诊断状态。当遇到映射异常或无法使用时,可将诊断信息截图后提供给技术工程师协助判断问题; ② 点击“删除”,可将当前的映射删除,若映射的外网端口是动态端口,删除后端口无法恢复。 2.2 设备 在【设备】界面,展示当前账号下可管理的硬件设备,包括花生壳硬件设备以及内嵌了花生壳功能的其它设备(如蒲公英设备内嵌的花生壳)。 2.2.1 添加设备 可通过添加设备(输入设备SN码)、扫一扫(扫描设备二维码)和局域网扫描3种方式把设备绑定在账号下进行管理。 2.2.2 管理设备 点击已绑定在账号下的花生壳硬件设备,可以查看设备的详细信息及对设备进行管理: 选项 描述 设备信息 显示设备型号、SN码和MAC地址 登录账号 管理设备所登录的账号,可登录其他贝锐账号登录,或当前绑定花生棒设备的账号登录 网络设置 若设备为花生壳盒子/花生棒,支持设置其网络 内核版本 查看或检查更新当前硬件的内核版本 重启和重置 重启或重置当前硬件(重置后需重新绑定及登录账号) 2.3 发现 (1)干货 可查看花生壳软件和硬件相关的使用小技巧,以及不同场景下的应用案例干货。 (2)计划 可查看花生壳当前正在进行的活动内容。 2.4 我的 (1)设置 在【我的】界面右上角点击设置图标按钮,进入设置界面。 选项 描述 修改手机号 按提示操作可更换账号绑定的手机号 修改密码 修改账号密码 绑定微信 将账号与微信绑定后,即可通过微信登录花生壳管理APP 个性化推荐 个性化推送促销优惠活动 主题模式 可选择手动开启/关闭或跟随系统启用不同的主题模式 消息设置 可设置接收/拒收花生壳推送的账号通知或系统消息 系统权限设置 获取手机系统相关权限设置 个人信息收集清单 使用本软件的个人信息收集清单 第三方信息共享清单 使用本软件的第三方信息共享清单 注销账号 注销登录当前账号 退出当前账号 退出当前登录账号并返回至登录界面。 (2)【我的】界面主要有以下功能 选项 描述 功能入口 硬件商城、阳光小店和我的兑换功能入口 实名认证 查看账号实名认证状态和信息,支持进行实名认证操作和更新实名认证信息 我的消息 查看我的消息通知 使用手册 查看花生壳软硬件产品的详细使用教程 联系我们 通过个不同方式向花生壳工作人员寻求帮助 关于花生壳 查看花生壳官网、官网微信、隐私政策、用户许可协议,并检查花生壳管理APP的更新情况 关于移动端花生壳管理APP的使用介绍到此结束,如果在使用过程中遇到问题,欢迎咨询花生壳工作人员获得帮助,感谢您的观看。 联系方式: ① 技术工单 ② 电话联系:400-601-0000转3
Registrants' Benefits and Responsibilities(注册人的实益与责任)
本文引用ICANN文档 来源>> Domain Name Registrants' Rights: Your domain name registration and any privacy/proxy services you may use in conjunction with it must be subject to a Registration Agreement with an ICANN Accredited Registrar. You are entitled to review this Registration Agreement at any time, and download a copy for your records. You are entitled to accurate and accessible information about: The identity of your ICANN Accredited Registrar; The identity of any proxy or privacy service provider affiliated with your Registrar; Your Registrar's terms and conditions, including pricing information, applicable to domain name registrations; The terms and conditions, including pricing information, applicable to any privacy services offered by your Registrar; The customer support services offered by your Registrar and the privacy services provider, and how to access them; How to raise concerns and resolve disputes with your Registrar and any privacy services offered by them; and Instructions that explain your Registrar's processes for registering, managing, transferring, renewing, and restoring your domain name registrations, including through any proxy or privacy services made available by your Registrar. You shall not be subject to false advertising or deceptive practices by your Registrar or though any proxy or privacy services made available by your Registrar. This includes deceptive notices, hidden fees, and any practices that are illegal under the consumer protection law of your residence. Domain Name Registrants' Responsibilities: You must comply with the terms and conditions posted by your Registrar, including applicable policies from your Registrar, the Registry and ICANN. You must review your Registrar's current Registration Agreement, along with any updates. You will assume sole responsibility for the registration and use of your domain name. You must provide accurate information for publication in directories such as WHOIS, and promptly update this to reflect any changes. You must respond to inquiries from your Registrar within fifteen (15) days, and keep your Registrar account data current. If you choose to have your domain name registration renew automatically, you must also keep your payment information current. 本文引用ICANN文档 来源>> 域名注册人的权利: 您的域名注册以及在注册域名时可能使用的任何隐私/代理服务必须受与 ICANN 认证注册服务机构签署的《注册协议》约束。 您有权在任何时候审核该《注册协议》,并下载一份副本存档。 您有权获得以下可访问的准确信息: 您的 ICANN 认证注册服务机构的身份; 该注册服务机构附属的任何代理或隐私服务提供商的身份; 注册服务机构规定的条款与条件,包括适用于域名注册的定价信息; 适用于注册服务机构旗下任何隐私服务的条款与条件,包括定价信息; 您的注册服务机构及隐私服务提供商提供的客户支持服务,以及如何获取这些服务; 如何向您的注册服务机构及其任何隐私服务提出顾虑和解决争议;以及 有关注册服务机构规定的域名注册、管理、转移、续费和恢复流程(包括通过该域名注册机构提供的任何代理或隐私服务注册、管理、转移、续费和恢复域名)的说明。 您不应受注册服务机构或其旗下任何代理或隐私服务提供的虚假广告或欺诈行为的影响。这包括:欺诈性通知、隐藏费用或任何不符合您所在区域的消费者保护法的违法行为。 域名注册人的责任: 必须遵守注册服务机构发布的条款与条件,包括注册服务机构、注册管理机构和 ICANN 规定的所有适用政策。 必须审核当前与注册服务机构签署的《注册协议》及其更新条款。 必须自行承担域名注册和使用所产生的全部责任。 必须提供准确的信息以便在 WHOIS 等目录中发布,并在此等信息有任何变更时及时更新。 必须在十五 (15) 日内对注册服务机构的询问作出回复,并确保使用最新的注册服务机构帐户数据。此外,若选择自动续用域名注册,您还必须确保提供最新的付款信息。
路由器本地管理功能介绍
一.概述 蒲公英路由器固件版本ROM 5.0发布啦! 本次固件迭代优化了路由器本地管理页面,调整界面UI以支持更多功能设置。 下面我们来看下具体的界面及功能介绍。 二.进入本地管理 (1)PC或移动端连接蒲公英路由器; (2)打开浏览器,键入oraybox.com或IP:10.168.1.1,进入蒲公英路由器登录界面; (3)填写路由器管理密码。默认密码为admin,即可登录进入本地管理。 三.本地管理功能 1.系统信息 系统信息组件显示当前路由器信息、网络信息、终端信息及组网信息,四大信息模块。以便管理员直观掌握设备使用状况。 1.1.路由器信息 路由器信息模块,显示本设备基本信息。<表1.1>为该模块内容说明。 1.2.网络信息 网络信息模块,显示设备的端口状态及网络状态。<表1.2>为该模块内容说明。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:MTU,网络最大传输单元。即网络中可传输数据包的最大尺寸值,默认值1500。** 1.3.终端信息 终端信息模块,显示与本设备直连的设备信息。管理员可查看直连设备的使用及限速状况。<表1.3>为该模块内容说明。 1.3.1.流量统计图 路径:【系统信息-终端信息-流量消耗-统计图图标】流量统计图每15分钟记录一次流量使用情况,流量统计图可显示24小时内流量使用情况。 1.3.2.连接数列表 路径:【系统信息-终端信息-连接数-查看】查看连接数可显示直连设备相关数据流信息。 1.4.组网信息 组网信息模块,显示设备所在的组网名称及其组网成员信息。<表1.4>为该模块内容说明。 2.网络设置 网络设置组件由上网设置、局域网设置、WIFI设置及网络检测,四大模块组成。 2.1.上网设置 上网设置,显示当前连接网络的方式和IP信息、备用网络相关信息及网络诊断。 2.1.1.切换上网方式 路径:【网络设置-上网设置-切换上网方式】主网络切换上网方式,可选择带宽拨号、动态IP、静态IP及无线中继作本设备上网方式。选种相应方式后填写相关内容即可上网。 2.1.2.备用网络 路径:【网络设置-上网设置-备用网络设置】,设置备用网络,上网方式仅可选择无线中继,其上网方式为连接其他无线设备进行上网。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:若需设置备用网络,则主网络上网方式不可选择无线中继。** 2.1.3.网络诊断 网络诊断.可帮助管理员排除网络断点,提高故障处理效率。 2.2.局域网设置 路径:【网络设置-上网设置-网络诊断】局域网设置显示当前设备的局域网IP信息、DHCP状态及WEB管理端口。 2.2.1.DHCP状态 路径:【网络设置-局域网设置-DHCP状态】开启DHCP,可设置接入设备获取的IP地址范围及获取IP后得租用时间。 2.2.2.WEB管理端口 路径:【网络设置-局域网设置-WEB管理端口】WEB管理端口,可更改本地管理WEB页面端口。 2.3.WiFi设置 WiFi设置显示无线网络信息,包括2.4G和5GWiFi信息、信号强度、访客WiFi信息、限速设置。 2.3.1. 2.4G/5GWiFi 路径:【网络设置-WiFi设置-2.4/5GWiFi】2.4G/5GWiFi功能部件,可设置开启2.4G和5G频段的无线网络信号。相应可设置其无线网络名称、密码、无线频宽模式、信号强度和无线信道。<表2.1>为2.4G/5GWiFI模块说明。 2.3.2.访客WiFi 有临时上网需求,可开启访客WiFi并对其进行限速设置。访客WiFi网络功能默认关闭。 2.4.网络检测 网络检测设置同步至设备底层进行网络状态检测,为网络稳定提供重要支撑。<表2.2>为网络检测模块说明。 3.高级设置 3.1.端口映射 设置端口转发规则,可以将WAN口公网IP地址的多个端口映射成内部不同IP的不同端口。 3.2.DMZ 开启DMZ功能,可把内网IP与WAN口公网IP进行一对一转换。 3.3.静态路由 配置静态路由,可使设备指定接口访问目标地址时,数据从指定的网关进行发送。 ![]( https://storage-cdn.oray.com/help/6f490f98a2991293fb09579b2872e581)**注意:跃点数为本设备到目标地址所经过的网络设备数。** 3.4.VLAN 开启VLAN功能可以在路由器多个LAN口下配置IP网段。实现隔离广播域有效地控制广播风暴的发生;局域网隔离使网络的拓扑结构更灵活。【此功能仅部分型号支持】 3.5.SNMP 开启SNMP功能,使用户能够管理网络效能,发现并解决网络问题以及规划网络增长。通过SNMP接收消息及时获知网络情况。<表3.1>为SNMP模块说明。 3.6.VPN客户端 VPN客户端支持设置L2TP、PPTP、IPSec三种传统VPN,异地用户可通过VPN拨号访问内网资源。设置传统VPN需使用一个公网IP作VPN服务器地址,蒲公英智能组网可代替传统VPN,无需公网IP即可搭建虚拟局域网,快速部署、远程管理,高效运维。【此功能仅部分型号支持】 4.更多功能 如需实现SD-WAN智能组网等更多功能,可前往蒲公英云管理平台设置。
搭建可外网访问的私有网盘(KIFTD+花生壳内网穿透)
前言 企业人员在家办公时需获取企业内部文件,考虑到隐私性和安全性,其需要一款可外网访问的私有网盘。 外网访问可以通过花生壳内网穿透实现,所以关键是找到一款私有网盘,有朋友给我推荐了KIFTD这一软件,体验下来,简单易上手,且各种该有的功能都有,好了,那就它了。 下面给大家分享下如何用KIFTD+花生壳搭建可外网访问的私有网盘。 1. KIFTD配置 1.1 安装 KIFTD是一款面向个人、团队、小型组织的网盘服务器系统,而且是开源的。 有能力的大佬可以对它定制开发,戳它官网链接下载。 KIFTD安装及其简单,套用该软件开发者的话来说,就是轻轻松松3分钟,事实上也确实如此。 本地有java环境的话,甚至不用3分钟。(如果没有java环境,可以先去下个java8,下载地址) 注: 一般下载KIFTD时选择从阿里云下载,避免GitHub偶尔打不开。 1.2 运行 KIFTD开箱即用,下载解压,双击jar文件即可启动。 这里有个注意事项,若KIFTD启动失败的话,有可能是默认端口8080被本机其他软件占用了,可以改一个试试,比如我这里就改成了8088。 1.3 测试访问以及上传文件 KIFTD运行后,浏览器输入 http://127.0.0.1:8088 ,右上角点击登陆。输入: 默认用户名:admin 密码:000000 即可开始体验自己的私有网盘。 网盘界面如下图所示,可以通过文件拖曳至浏览器,或点击右上角上传按钮上传文件。 2. 花生壳配置 2.1 配置花生壳映射 花生壳就不用多说了,最老牌好用的内网穿透神器,以前在学校那会跟老师做项目时,就拿它来远程SSH实验室的Linux服务器,目前我司的ERP也是通过它远程访问的。 没有账号的朋友可以去花生壳官网注册个账号体验下,他的客户端下载安装也是极其简单,3分钟轻松搞定。下好客户端后,添加内网映射如下: 序号 选项 描述 ① 应用名称 自定义填写 ② 应用图标 可以给对应的服务选择一个图标,方便区分 ③ 映射类型 选择HTTPS ④ 外网域名 选择含有HTTPS映射的域名 ⑤ 外网端口 443(默认) ⑥ 内网主机 填 127.0.0.1 ⑦ 内网端口 填 8088 (KIFTD端口) ⑧ 带宽 默认根据账号等级分配相应的带宽,也可根据实际需求额外付费购买 ⑨ 夜间带宽 18:00-次日8:00带宽速度提升100%,速度不低于5Mbps;带宽基数越大,夜间越快 确认映射内容填写无误,点击“保存”即可。 3. 外网通过映射域名访问KIFTD 浏览器输入刚才添加的内网映射 https://xxx.imwork.net ,即可在外网访问KIFTD。 亲测视频格式支持主流的mkv、mp4等,但rmvb是不支持的。 目前我用的花生壳账号是铂金版,6M带宽,还搭配了夜间带宽,晚上带宽飙到10M,用来看个自建网盘上的小电影啥的也是毫无压力,嘿嘿嘿。 预览PDF这点也做的不错。 至此,教程就结束了。整个搭建过程,快的话10分钟就能搞定,大家心动了的话,不妨去尝试一番。
认证源使用教程
集成多种企业协同办公平台的认证源,可根据实际情况自定义添加,以便于企业使用不同的认证方式。 添加认证源渠道有:钉钉、飞书。 注:认证源暂时只支持商业版及以上级别使用。 1. 添加认证源 登录蒲公英网络管理平台,选择左侧导航栏【软件成员】-【认证源】,点击“添加认证源”。 1.1 填写认证源内容 选项 描述 认证源名称 自定义认证源名称,支持最多输入20个字符 认证第三方平台 可选钉钉、飞书两个平台 企业ID和密钥 填写从钉钉或飞书的管理员后台获取的ID和密匙(必填)Corpld(选填) 授权回调域 请求域名 匹配失败时 成员匹配失败时的系统拒绝访问或创建新成员 1.1.1 钉钉平台 1.1.1.1 获取CorpId 前往钉钉开发者后台【首页】页面,在个人信息处即可查看并复制。 1.1.1.2 获取AppKey和AppSecret (1)前往钉钉开发者后台“应用开发-企业内部开发”页面,创建一个企业内部应用(应用名称、应用描述可任意填写)。创建成功后,可以看到该应用被添加到钉钉应用目录中。 (2)点击创建好的应用,在应用详情页点击左侧菜单栏“应用信息”,查看右侧应用凭证下的AppKey和AppSecret。 1.1.1.3 填写授权回调域名 (1)在管理平台获取授权回调域(点击右侧复制按钮即可一键复制); (2)前往钉钉开发者后台,点击左侧菜单栏【应用功能】-【登录与分享】,在“接入登录”填写获取的授权回调域并添加。 1.1.1.4 钉钉开启后台权限 点击权限管理-通讯录管理,开通个人权限和通讯录管理的所有权限。 1.1.2 飞书平台 1.1.2.1 获取AppID和AppSecret (1)请前往飞书开发者后台,创建一个企业自建应用(应用名称、应用描述可任意填写)。创建成功后,可以看到该应用被添加到企业自建应用目录中。 (2)点击创建好的应用,在应用详情页点击左侧菜单栏“凭证与基础信息”,查看右侧应用凭证下的AppID和AppSecret。 1.1.2.2 填写授权回调域名 (1)在管理平台获取“授权回调域”(点击右侧复制按钮即可一键复制); (2)请前往飞书开发者后台,在应用详情页点击左侧菜单栏【安全设置】,在重向URL处填写获取的授权回调域并添加。 1.1.2.3 飞书开启后台权限 点击【权限管理】-【通讯录】,开通“获取用户手机号”。 1.2 添加成功 认证源添加成功后。 前往企业定制页面使用最新版定制安装包,即可免输入认证源ID进行认证源登录。 2. 登录认证 (1)登录蒲公英企业版 for Windows,选择“认证源”登录; (2)输入企业认证源ID; (3)选择认证平台,并跳转至网页完成验证; (4)登录成功。 3. 管理认证源 3.1 删除认证源 在列表页选择认证源,并点击“删除”。 注意:删除认证源后无法恢复,已创建的成员不会删除。 3.2 停用认证源 在列表页选择认证源,并点击“停用”。 停用后,成员无法在客户端使用该认证平台进行登录。 到此,蒲公英管理平台智能组网认证源使用帮助介绍完毕。若在使用过程中遇到问题,可登录官网发起工单咨询,或成为VIP获得一对一的技术支持。
G300-多地办公指南
1 多地互访(对等网络) 1.1 部署环境 总部及分部分别部署1台蒲公英G300设备,两台蒲公英G300进行异地组网,即可实现总部与分部的资源互相访问。 1.2 异地组网 (1)绑定硬件 在蒲公英管理平台->【硬件成员】->【硬件列表】->【路由器列表】中,点击<添加硬件>,输入蒲公英硬件底部的SN码,完成总部蒲公英G300和分部蒲公英G300的添加操作。 (2)创建组网 ①在蒲公英管理平台->【异地组网】->【网络成员】,点击<创建组网>。 ②填写网络名称,选择对等网络类型。 ③创建组网后,点击右上方【添加成员】->【从已有成员添加】,选中之前绑定的总部蒲公英G300和分部蒲公英G300添加至组网中,点击<确定>。 ④总部蒲公英G300和分部蒲公英G300组网完成。 1.3 多地节点互访 总部G300和分部G300完成组网后,总部G300下的终端设备可与分部G300下的终端设备相互访问。 2 多地互访(对等网络+双旁路) 2.1 部署环境 不改变企业原有网络拓扑下,总部和分部旁路接入蒲公英G300,通过G300的旁路设置,即可实现总部与分部的成员互相访问。 2.2 异地组网 (1)绑定硬件 在蒲公英管理平台->【硬件成员】->【硬件列表】->【路由器列表】中,点击<添加硬件>,输入蒲公英硬件底部的SN码,完成总部蒲公英G300和分部蒲公英G300的添加操作。 (2)创建组网 ①在蒲公英管理平台->【异地组网】->【网络成员】,点击<创建组网>。 ②填写网络名称,选择对等网络类型。 ③创建组网后,点击右上方【添加成员】->【从已有成员添加】,选中之前绑定的总部蒲公英G300和分部蒲公英G300添加至组网中,点击<确定>。 ④总部蒲公英G300和分部蒲公英G300组网完成。 2.3 旁路设置 在蒲公英管理平台->【异地组网】->【网络设置】->【旁路设置】,点击<添加旁路>,完成总部G300和分部G300相关的旁路设置。 (1)总部G300旁路设置 内容 说明 选择旁路 选择设置旁路的设备(总部G300) 目标类型 可选择IP网络段或IP地址,即生效对象可访问的目标类型 目标地址(子网掩码) 目标地址是总部G300上网IP所属网段且总部G300可访问的IP段或IP地址,若选择目标类型为IP网段,则需填写子网掩码 生效对象 允许组网内的指定成员/成员组访问上述目标地址(选择组网成员组“贝锐”,则允许贝锐组网内的所有成员允许访问上述目标地址 (2)分部G300旁路设置 内容 说明 选择旁路 选择设置旁路的设备(分部G300) 目标类型 可选择IP网络段或IP地址,即生效对象可访问的目标类型 目标地址(子网掩码) 目标地址是分部G300上网IP所属网段且分部G300可访问的IP段或IP地址,若选择目标类型为IP网段,则需填写子网掩码 生效对象 允许组网内的指定成员/成员组访问上述目标地址(选择组网成员组“贝锐”,则允许贝锐组网内的所有成员允许访问上述目标地址 (3)旁路设置完成。 2.4 静态路由 除了总部和分部旁路接入的G300需要旁路设置外,还需要G300的上级核心路由器设置静态路由,才能实现总部与分部的成员互相访问。 总部静态路由设置 告知总部设备,若有IP包想达到网段10.168.2.0/24,那么请将此IP包发给10.168.1.2(总部蒲公英G300获取的上网地址) 分部部静态路由设置 告知总部设备,若有IP包想达到网段10.168.1.0/24,那么请将此IP包发给10.168.2.2(分部蒲公英G300获取的上网地址) 2.5 多地节点互访 总部G300和分部G300完成组网及旁路设置后,总部G300同网段的设备可与分部G300同网段的设备相互访问。 3 多地互访(对等网络+单旁路) 3.1 部署环境 总部旁路接入蒲公英G300,分部使用蒲公英G300作核心路由器。通过总部蒲公英G300的旁路设置以及总部核心路由器的静态路由设置,可实现总部与分部的成员互相访问。 3.2 异地组网 (1)绑定硬件 在蒲公英管理平台->【硬件成员】->【硬件列表】->【路由器列表】中,点击<添加硬件>,输入蒲公英硬件底部的SN码,完成总部蒲公英G300和分部蒲公英G300的添加操作。 (2)创建组网 ①在蒲公英管理平台->【异地组网】->【网络成员】,点击<创建组网>。 ②填写网络名称,选择对等网络类型。 ③创建组网后,点击右上方【添加成员】->【从已有成员添加】,选中之前绑定的总部蒲公英G300和分部蒲公英G300添加至组网中,点击<确定>。 ④总部蒲公英G300和分部蒲公英G300组网完成。 3.3 旁路设置 在蒲公英管理平台->【异地组网】->【网络设置】->【旁路设置】,点击<添加旁路>,完成总部G300的旁路设置。 (1)总部G300旁路设置 内容 说明 选择旁路 选择设置旁路的设备(总部G300) 目标类型 可选择IP网络段或IP地址,即生效对象可访问的目标类型 目标地址(子网掩码) 目标地址是总部G300上网IP所属网段且总部G300可访问的IP段或IP地址,若选择目标类型为IP网段,则需填写子网掩码 生效对象 允许组网内的指定成员/成员组访问上述目标地址(选择组网成员组“贝锐”,则允许贝锐组网内的所有成员允许访问上述目标地址 (2)旁路设置完成。 3.4 静态路由 除了总部旁路接入的G300需要旁路设置外,还需要G300的上级核心路由器设置静态路由,才能实现总部与分部的成员互相访问. 总部静态路由设置 告知总部设备,若有IP包想达到网段10.168.2.0/24,那么请将此IP包发给10.168.1.2(总部蒲公英G300获取的上网地址) 3.5 多地节点互访 总部G300和分部G300完成组网后,且总部完成旁路设置及静态路由,总部G300同网段的设备可与分部G300下联设备可相互访问。 4 仅访问总部(集散网络+单旁路) 4.1 部署环境 不改变总部现有拓扑下,总部旁路接入蒲公英G300,分部使用蒲公英G300作核心路由器,出差员工的使用贝锐蒲公英客户端,以实现分部的员工及出差员工可访问总部的资源服务器。 4.2 异地组网 (1)绑定硬件 在蒲公英管理平台->【硬件成员】->【硬件列表】->【路由器列表】中,点击<添加硬件>,输入蒲公英硬件底部的SN码,完成总部蒲公英G300和分部蒲公英G300的添加操作。 (2)为出差员工创建客户端成员 在蒲公英管理平台->【软件成员】->【成员列表】中,点击<添加成员>,选择成员类型及密码后,点击<确定>完成客户端成员的添加操作。 (3)创建组网 ①在蒲公英管理平台->【异地组网】->【网络成员】,点击<创建组网>。 ②填写网络名称,选择集散网络类型。 ③组网角色 集散网络的特点是普通成员只能与中心成员建立连接,普通成员间无法建立连接进行互访。根据上述拓扑,总部蒲公英G300为中心成员角色,分部蒲公英G300及蒲公英客户端成员为普通成员角色。 中心成员创建组网后,点击右上方【添加成员】->【从已有成员添加】,点击“中心成员”,选中之前绑定的总部蒲公英G300授权加入组网中。 普通成员创建组网后,点击右上方【添加成员】->【从已有成员添加】,点击“普通成员”,选中之前绑定的分部蒲公英G300及客户端成员授权加入组网中。 ④组网完成。 4.3 旁路设置 总部G300进行旁路设置,允许分部G300所属网段及蒲公英客户端成员访问总部G300所属网段内的资源。 在蒲公英管理平台->【异地组网】->【网络设置】->【旁路设置】,点击<添加旁路>,完成总部G300的旁路设置。 (1)总部G300旁路设置 内容 说明 选择旁路 选择设置旁路的设备(总部G300) 目标类型 可选择IP网络段或IP地址,即生效对象可访问的目标类型 目标地址(子网掩码) 目标地址是总部G300上网IP所属网段且总部G300可访问的IP段或IP地址,若选择目标类型为IP网段,则需填写子网掩码 生效对象 允许组网内的指定成员/成员组访问上述目标地址(选择组网成员组“贝锐”,则允许贝锐组网内的所有成员允许访问上述目标地址 (2)旁路设置完成。 4.4 分部访问总部资源 完成上述组网设置及旁路设置后,分部的员工可访问到总部的资源服务器。 4.5 出差员工访问总部资源 完成上述组网设置及旁路设置后,出差员工可通过贝锐蒲公英客户端访问到总部的资源服务器。 (1)下载安装贝锐蒲公英客户端,并使用管理员创建的客户端成员UID及密码进行登录。 (2)登录蒲公英客户端后,蒲公英蒲公英客户端默认开启组网连接状况。登录蒲公英客户端的设备可访问到总部的资源服务器。 5.私有云搭建(硬盘/U盘) 5.1 设备接线 蒲公英G300连接电源并联网后,待指示灯为白色常亮状态时,将U盘/硬盘接入G300的USB接口中。 5.2 开启文件共享 在完成G300设备初始化后,在贝锐蒲公英客户端APP的设备列表中点击【G300硬件】->【共享设置】,G300检测到已接入U盘/硬盘,则显示存储设备信息。开启共享开关,可根据实际情况进行共享设置。 5.3 远程访问 5.3.1 手机远程访问 手机下载安装贝锐蒲公英客户端并使用与APP初始化相同的贝锐账号进行登录后,在设备列表点击【G300设备】->【文件共享】,在添加Samba界面中,主机填写G300的组网虚拟IP及其共享设置后,点击“完成”即可访问G300私有云文件。 ![]( https://storage-cdn.oray.com/help/70e954fb13a4a5422b78517d21c33476)**说明:G300的组网虚拟IP可在贝锐蒲公英客户端APP的设备列表中,点击硬件进入设备详情中查看组网虚拟IP。** 5.3.2 电脑远程访问电脑设备下载安装贝锐蒲公英客户端并使用与APP初始化相同的贝锐账号进行登录后,在本机设备的文档路径中,输入“\G300组网IP地址”,即可查看G300共享的文件。 ![]( https://storage-cdn.oray.com/help/70e954fb13a4a5422b78517d21c33476)**说明:G300的组网虚拟IP可在贝锐蒲公英客户端APP的设备列表中,点击硬件进入设备详情中查看组网虚拟IP。**
PHTunnel嵌入流程
贝锐开放平台针对个人与企业开发者提供了物联网接入解决方案,现已开放花生壳内网穿透PHTunnel,支持多平台软硬件嵌入(可替代花生壳客户端),并保障数据传输安全,经贝锐授权后的开发者可在条款协议下任意开发或传播。 PHTunnel是新一代花生壳内网穿透的核心组件,采用纯C语言实现(最小约80KB),能够轻松实现高性能反向代理应用,支持TCP、HTTPS协议,端到端的TLS加密通信,黑白名单防黑验证等,通过PHTunnel可以轻松让外网设备穿透各种复杂的路由和防火墙访问到内网的设备。 以下为花生壳PHTunnel嵌入流程: 1.成为开发者 1.1注册贝锐账号 进入贝锐注册页面,填写账号相关信息完成注册,详见《贝锐用户许可协议》、《贝锐隐私政策》。 提示:若您已有贝锐账号,可跳过此步骤。 1.2完成开发者认证 注册开发者需填写并提供相关资料,进行个人/企业开发者认证,完成认证后即可创建应用,详见《贝锐开放平台协议》。 提示:若贝锐账号已完成企业实名认证,开发者认证只能申请企业开发者。 2.下载SDK 2.1检查SDK是否可用 前往贝锐开放平台下载对应SDK,若现有SDK可用,在创建应用后直接进行开发调试工作。 提示:若因特殊平台无法使用现有SDK,可联系贝锐重新编译获取适配版本的SDK。 2.2重新编译SDK 提供需要内嵌PHTunnel的设备相关信息给贝锐,协助编译生成新SDK,拿到之后即可创建应用进行开发调试工作。 提示:使用官网SDK的可跳过此步骤,进入下一步。 3.创建应用 创建应用时选择花生壳产品,应用类型软/硬件仅用于区分管理,其余根据要求填写应用相关信息,提交完成新应用创建,之后会生成3个不同服务级别的调试账号,付费服务有效期3个月(体验版*1、商业版*1、旗舰版*1),可使用调试账号来进行开发调试工作。 提示:调试账号最多可增加到10个,调试期间不可用非调试账号登录PHTunnel。 4.接口类型 应用创建完成后,您的账号默认为标准接口,个人/企业开发者接口配置相同。 4.1标准接口 接口开放条件:成为开发者即可; 应用数量*100个,设备不限数量; 提示:不支持应用认证、信息采集、自动化映射、注册API、专属客服。 4.2定制接口 接口开放条件:请联系020-29195691; 应用设备数量不限,支持应用认证、信息采集、自动化映射、设备管理、数据统计、注册API、专属客服。 提示:该接口需人工开通,需签订线下合同。 标准接口 定制接口 企业认证 × √ 升级方式 成为开发者 联系020-29195691 应用数量 100个 不限 设备数量 不限 不限 官方检测 × √ 映射配置 官方标准级别 自定义配置 端口映射 TCP、HTTPS TCP、HTTPS 自动化映射 × √ 设备管理 统计 统计、查询、修改、禁用 数据统计 在线量 在线量 注册API × √ 专属客服 × √ 5.调试应用 5.1标准接口 开发者自行开发调试:开发过程中遇到问题可在贝锐开放平台微信群内反馈; 贝锐协助编译SDK:由贝锐协助编译提供SDK,主要开发工作由开发者完成。 5.2定制接口 由贝锐开发人员与开发者共同完成PHTunnel开发调试工作。 6.上线应用 应用调试完成、经过测试验证无bug后,根据不同接口类型,按照要求来上线应用,当您的应用上线后,即可对外发布新软件/固件/硬件。 6.1标准接口 开发者自行开发调试:调试完成后可直接上线应用,无需经过贝锐认证; 贝锐协助编译SDK:由贝锐进行审核测试,经过双方测试验证后,若是企业开发者,会将开发者的企业信息列入企业合作目录,以获得贝锐官方认证,之后即可上线应用。 提示:个人开发者不会列入企业合作目录,由贝锐人工登记并认证。 6.2定制接口 由贝锐进行审核测试,经过双方测试验证后,若是企业开发者,会将开发者企业信息列入企业合作目录,以获得贝锐官方认证,之后即可上线应用。 提示:上线应用后,所有贝锐账号均可登录PHTunnel。 界面示例 (软件嵌入PHTunnel) (硬件嵌入PHTunnel) 嵌入咨询 【点击联系客服】进行咨询。
开机插座C1Pro(蓝牙版)使用手册
1. 产品简介 1.1 功能简介 开机插座C1Pro(蓝牙版)是一款远程开机设备,能轻松实现远程开关机功能,随时远程设备解决问题。通过向日葵智能开机插座实现远程开关机,具备以下的优点: ①蓝牙配网高效稳定,快人一步 ②对设备的适配兼容性更强 ③先关设备再关电源 下面一起来看看如何使用开机插座C1Pro(蓝牙版)实现远程开机功能。 1.2 指示灯说明 2. 添加插座 2.1 安装向日葵控制端App 接下来以安卓手机为例演示如何使用C1Pro(蓝牙版)实现远程开关电脑,下载并安装“向日葵远程控制”App。可以通过以下2种方式下载安装: ①访问向日葵下载站点(访问戳我),选择向日葵控制端 for Android,扫码下载安装包进行安装 ②在应用商店搜索并安装 “向日葵远程控制” 应用程序 2.2 添加插座 (1)手机准备工作 添加插座之前,确保手机已完成以下准备工作: ①向日葵远程控制App打开:蓝牙、定位权限 ②手机连接2.4G WiFi(插座仅支持连接2.4G WiFi) (2)插座通电 ①将开机插座C1Pro(蓝牙版)接入电源 ②长按插座开关5秒,确认指示灯为蓝灯闪烁状态 (3)添加插座 ①在向日葵远程控制App的【设备】界面,点击右上角添加按钮【+】->选择“添加智能硬件” ②App通过蓝牙搜索周围的C1Pro(蓝牙版),扫描到设备后,选择C1Pro(蓝牙版)添加;若搜索不到,可手动选择C1Pro(蓝牙版)进行添加 ③页面会自动识别手机已连接的WiFi名称,输入WiFi密码并点击“确定”,等待插座配网成功 ④当页面提示“添加成功”,代表插座C1Pro(蓝牙版)配网成功 注意: 配网过程中,APP提示“连接失败”解决方法。 3. 绑定设备 (1)进入插座详情页 开机插座添加成功后,进入控制端App,在【设备】-【开机设备】,可以看到已添加好的插座。 (2)选择绑定的设备 ①将设备的电源接入插座C1Pro(蓝牙版) ②进入插座详情页,点击“绑定设备”,然后选择指定的设备绑定 注意:若未找到需要绑定的设备,在需开机的电脑上安装向日葵客户端且登录与控制端相同的账号。 4. 远程开机 4.1 电脑开启AC recovery 接下来需在设备的BIOS里开启来电恢复(AC Recovery)功能,不同型号主板进去BIOS的方式有区别,具体请见电脑提示或咨询主板厂商。(主机如何开启AC Recovery) 下面以华硕主板为例: (1)进入BIOS 按下设备电源,未进入系统前,不停按住F2或Delete键即可进入BIOS界面 (2)开启来电恢复功能 进入【Advanced】->选择“APM configuration”,将“Restore AC Power Loss”选项设置为“Power On”,并保存退出 (3)插座和主板的设置完成。 4.2 远程开机 ①设备在关机状态下,进入控制端App->【设备】列表,找到开机插座绑定的设备 ②点击开机按钮,等待电脑启动即可 5. 温柔关机 直接通过插座断电强制关机可能导致系统文件损坏、注册表错误等问题,进而引发系统崩溃、蓝屏等故障。向日葵的 温柔关机 则通过正常的关机流程,减少了这些系统错误的发生。 操作步骤: (1)在手机控制端App【设备】列表页面,选择已绑定C1Pro的设备 ; (2)在设备功能选择 <关机/重启> ; (3)电脑开始关机,在2分钟后后无声息关闭电源,关机后熄灭电源的时间可自行更改,具体操作步骤请查看。(插座设置) 6. 其他功能设置 6.1 倒计时开关,断电的时间刚刚好 【倒计时】可设置插座在设定的倒计时后开启或关闭。 注意: 使用【倒计时】功能会直接关闭插座电源,可能会对运行中的设备造成伤害,如果需要远程关闭设备,建议请前往【设备】列表,在对应设备的功能列表中进行远程关机。 6.2 管理绑定设备 点击“绑定设备”图标,可以解绑/绑定设备。 ① 解除绑定:解除开机插座和当前设备的绑定,解除绑定后可重新绑定其他设备 ② 绑定设备:选择账号下已有的设备进行绑定 ③ 关闭远程设备后关闭插座电源:设置关闭远程设备后的插座电源关闭的时间(默认2分钟),即关闭远程设备后2分钟再熄灭插座电源,切断电能消耗,可实现不损伤设备且省电的目的。 6.3 定时智能开关,科学管理设备 6.3.1 插座定时 设置开机插座在指定的时间开启或关闭电源,如设置开机插座在下班后指定时间关闭电源,节约能耗。 步骤: ①在插座控制面板点击“定时”图标按钮,进入定时开关插座设置界面 ②在弹窗提示中选择“插座定时”,自行设置开/关操作、时间和重复次数 注意: 使用 【定时】 功能关闭插座电源为直接断电,强制断电可能会对运行中的 【电脑】 造成伤害,如果需要远程关闭设备,建议请前往【设备】列表,在对应设备的功能列表中进行远程关机。 6.3.2 设备定时 设置设备在指定的时间开启,如设置电脑定时开启,到公司就能马上进入工作,让职场更顺畅。 步骤: ①在插座控制面板点击“定时”图标按钮,进入定时开关插座设置界面 ②在界面上方点击“前往设备定时设置”,并根据实际使用需求设置主机设备开启时间和重复次数 6.4 用电日志 查看开机插座启动和关闭的用电日志。 7. 常见问题 问题1:绑定插座时App提示网络超时 如果连接的不是2.4G网络 ,控制端App添加开机插座,设置网络环节中看到如下提示,请更换网络后重试。 问题2:控制端App连接开机插座时,发现开机插座指示灯不是蓝灯闪烁。 长按开机插座顶部的开关约5秒进行重置,再用控制端App重新添加。若指示灯未亮起,可尝试更换其他可通电的电源测试,若问题依旧则代表设备故障,请联系售后专员处理。 问题3:WiFi自检排查 ①仅支持2.4频段的WiFi ②无线模式不支持11n only ③不可隐藏WiFi,需开启SSID广播 ④WiFi加密类型为WPA2-PSK、认证类型为AES或两者都设为自动 ⑤若修改WiFi名称或密码,会导致开机插座无法连接网络,需要重置开机插座。 (重置步骤:将开机插座通电后,长按电源键5秒以上,松开按键,之后待指示灯变成蓝灯闪烁状态,即为重置成功,之后再重新添加开机插座使用) ⑥若首次绑定配置网络无法正常获取到WiFi名称,请先打开手机定位再进行操作 ⑦WiFi需要能够连接到互联网正常上网 向日葵智能插座C1Pro(蓝牙版)的使用步骤、功能和相关注意事项已介绍完毕。若您在使用过程中遇到问题,可前往官网发起工单咨询咨询技术工程师。
抱歉,没有找到与“搜索网盘文件咨询WeChat:4826193 双搜索引擎,蓬莱市搜索定位手机”相关的内容。请尝试其他搜索词
抱歉,没有找到与“搜索网盘文件咨询WeChat:4826193 双搜索引擎,蓬莱市搜索定位手机”相关的内容。
请尝试其他搜索词
抱歉,您输入的内容为空,请尝试其他搜索词
抱歉,您输入的内容为空。