TWS Account Window for Retail Clients of IBKR Ireland, Luxemburg and Central Europe

Overview: 

This article describes the information provided in the TWS account window for IBKRs EU based entities.

CFDs are complex instruments and come with a high risk of losing money rapidly due to leverage.

59.5% of retail investor accounts lose money when trading CFDs with IBKR.

You should consider whether you understand how CFDs work and whether you can afford to take the high risk of losing your money.

 

Background: 

Retail clients who are residents of the EEA and therefore maintain an account with one of IBKR’s European brokers, IBLUX, IBIE or IBCE, are subject to EU regulations which introduce leverage and other restrictions applicable to CFD transactions.

Notably the regulations require the use of free cash to satisfy CFD margin requirements and prohibit retail clients from using securities in the account as collateral to borrow funds to initiate or maintain a CFD position. Please see Overview of ESMA CFD Rules Implementation for Retail Clients at IBIE, IBCE and IBLUX for full details.

The accounts of IBKRs EU entities are universal accounts in which clients can trade all asset classes available on IBKRs platform, but unlike IBKRs US and UK entities, there are no separately funded segments.

Working examples of how this restriction is applied along with details as to how clients can monitor free cash available for CFD transactions is outlined below.

Account Window

IBKR enforces the restriction relating to free cash by calculating the funds available for CFD trading on a real-time basis, rejecting new orders and liquidating existing positions when the available free cash is insufficient to cover CFD initial and maintenace margin requierements.

IBKR offers clients the ability to monitor free cash available for CFD transactions via an enhancement to the TWS Account Window which displays the level of free cash in the account. Importantly, the funds shown as available for CFD trading do not imply that cash is held in a separate segment. It simply indicates what proportion of total account balances is available for CFD trading.

For example, assume that an account has EUR 9,705 in cash and no positions. All the cash is available to open CFD positions, or positions in any other asset class:

If the account now purchases 10 shares of AAPL stock for an aggregate value of USD 1,383 the cash in the account is
reduced by a corresponding amount in EUR, and the funds available for CFD trading are reduced by the
same amount:

 

Note that Total available funds are reduced by a smaller amount, corresponding to the stock margin requirement.

If, instead of buying AAPL stock, the account buys 10 AAPL CFDs the impact will be different; As the transaction involves a derivative contract rather than the purchase of the underlying asset itself, there’s no reduction in cash but the funds available for CFDs are reduced by the CFD margin requirement to secure performance on the contract:

In this case Total available funds and CFD available funds are reduced by an equal amount; the CFD margin requirement.

Funding

As noted above, EU-based accounts do not have segments and therefore there is no need for internal transfers. Funds are available for trades in all asset classes in the amounts indicated in the account window, without the need for sweeps or transfers.

Note also that should an account have a margin loan, i.e. negative cash, it will not be possible to open CFD positions since the CFD margin requirement must be satisfied by free, positive cash. Should you have a margin loan and wish to trade CFDs you must first either close margin positions to eliminate the loan, or add cash to the account in an amount that covers the margin loan and creates a cash buffer sufficient for the necessary CFD margin.

Restrictions de portefeuille

Résidents du Luxembourg (LU) : IB Luxembourg (IB-LUX) ne prend pas en charge les matières premières/métaux (Certificats London Gold).

Résidents de l'Europe centrale et de l'Est (HU, CZ, PO, BG, RO, HR, SK, EE, LV, LT, CY, MT) : IB Central Europe (IB-CE) ne prend pas en charge les matières premières/métaux. De plus, IBCE ne prend actuellement en charge que les devises suivantes : EUR, USD, CZK, HUF, PLN. Les devises GBP et CHF seront bientôt ajoutées.

Si vous détenez une de ces devises dans votre portefeuille, veuillez clôturer ces positions au plus vite pour faciliter le transfert de votre compte. Les positions à découvert (emprunt) n'ont pas besoin d'être clôturées immédiatement, uniquement les positions longues.

Portfolio Restrictions

Residents of Luxembourg (LU): IB Luxembourg (“IB-LUX”) cannot support Commodity-Metals (London Gold Certificates).

Residents of Central-Eastern Europe (HU, CZ, PO, BG, RO, HR, SK, EE, LV, LT, CY, MT): IB Central Europe (“IB-CE”) cannot support commodity metals. Furthermore, IBCE currently only supports for the following currencies: EUR, USD, CZK, HUF, PLN. GBP and CHF are expected in the near future. 

If you hold any of these currencies in your portfolio, you must close the positions as soon as possible in order to facilitate transfer of your account. Short cash positions (borrowing) do not have to be close immediately, just long positions.

Risk Navigator : Calcul de marge alternative

Overview: 

IB vérifie systématiquement les niveaux de marge et mettra en place les changements qui serviront à augmenter les exigences au-dessus des minimums réglementaires, comme le justifient les conditions de marché. Pour aider les clients à comprendre les effets de tels changements sur leur portefeuille, une fonctionnalité appelée Calcul de marge alternative est fournie dans l'application Risk Navigator. Retrouvez ci-dessous les étapes pour créer un portefuille what-if pour déterminer l'impact de ces changements de marge.

Étape 1 : Ouvrir un nouveau portefeuille What-if

Depuis la plateforme de trading Classic TWS, sélectionnez Outils d'analyse, Risk Navigator puis Ouvrir un nouveau portefeuille What-if (Image 1).

Image 1
 

Depuis la pateforme de trading Mosaic TWS, sélectionnez Nouvelle fenêtre, Risk Navigator, puis Ouvrir un nouveau portefuille What-if.

Étape 2 : Définir le portefeuille de départ

Une fenêtre apparaîtra (Image 2). Il vous y sera demandé de définir si vous souhaitez créer un portefeuille hypothétique depuis votre portefeuille actuel ou depuis un nouveau portefeuille. En cliquant sur Oui, les positions existantes seront téléchargées dans le nouveau portefeuille What-if.

Image 2
 

En cliquant sur Non, le portefeuille What-is s'ouvrira sans position.


Tableau de bord de risque

Le tableau de bord de risque est épinglé en haut de l'onglet Produit et est disponible aussi bien pour les portefeuilles actifs que pour les portefeuilles what-if. Les valeurs sont calculées sur demande pour les portefeuilles what-if. Le tableau de bord fournit des informations de comptes, notamment :

1) Valeur nette liquidative : la valeur nette liquidative totale du compte
2) P&L : le P&L total journalier pour le portefeuille entier
3) Marge de maintien : marge de maintien totale actuelle
4) Marge initiale : exigences de marge initiale totale
5) VAR : la Value at risk du portefeuille entier
6) Déficit prévu (ES) : le déficit prévu (value at risk moyenne) correspond au rendement du portefeuille dans le pire des cas
 

 

Calcul de marge alternative

Le Calcul de marge alternative, accessible depuis le menu Paramètres > Mode marge (Image 3), montre comment le changement de marge touchera les exigences de marge générales, une fois mis en place.

Image 3
 

 

Étape 3 : Sélectionner les paramètres de mode marge

Une fenêtre intitulée Paramètres mode marge apparaîtra (Image 4). Vous pouvez utiliser le menu déroulant de cette fenêtre pour changer le calcul de marge de Défaut (mode actuel) au nouveau titre du nouveau paramètre de marge (nouveau mode). Une fois votre sélection faite, cliquez sur OK.

Image 4
 

Une fois le nouveau mode de marge choisi, le tableau de bord du Risk Navigator sera mis à jour automatiquement pour refléter votre choix. Vous pouvez aller et venir entre les paramètres mode de marge. Veuillez noter que le mode marge actuel sera affiché dans le coin inférieur gauche de la fenêtre Risk Navigator (Image 5).

Image 5
 

 

Étape 4 : Ajouter des positions

Pour ajouter une position au portefeuille What-if, cliquez sur la ligne verte « Nouveau » puis saisissez le symbole sous-jacent (Image 6), définissez le type de produit (Image 7) et saisissez la taille de la position (Image 8).

Image 6
 

 

Image 7

 

Image 8

 

Vous pouvez modifier les positions pour voir comment elles impactent la marge. Après avoir modifier vos positions, il vous faudra cliquer sur l'icône Recalculer () à droite des chiffres de marge pour les mettre à jour. Quand cette icône est visible, les chiffres de marge ne sont pas à jour avec le contenu du portefeuille What-if.

 

Disclosure Regarding Interactive Brokers Price Cap Notices

Regulators expect brokerage firms to maintain controls designed to prevent the firm from submitting orders to market centers that create a risk of disruptive trading (e.g., the risk of sudden, transient price moves).

To comply with these expectations, Interactive Brokers implements various price filters on customer orders. Those price filters may, in certain circumstances, price cap customer orders in order to avoid market disruption, and those Price Caps will generally be in a % range from a reference price range calculated by IB. (The range of the Price Cap varies depending on the type of instrument and the current price.)

Although the price caps are intended to balance the objectives of trade certainty and minimized price risk, a trade may be delayed or may not take place as a result of price capping. More information is available in Interactive Broker’s Order Routing and Payment for Order Flow Disclosure.

If a customer’s order(s) are price capped by IB’s systems, that customer will either receive (i) real-time notification of those price cap(s) in Trader Workstation or via the API or FIX tag 58 (for FIX users); and/or (ii) a daily FYI message containing a digest of the first 10 order(s) that were price capped the prior day, the initial price cap(s) for those order(s) (if applicable), and the Price Cap Range(s) for further Price Cap(s) of those order(s). 

Customers may opt out from receiving future FYI Messages by clicking the relevant opt-out link within an FYI Message. By opting out from receiving these future FYI Messages, a customer: 

  • Agrees to waive any further notifications from Interactive Brokers about the application of the firm’s Price Caps to that customer’s order(s); and
  • Acknowledges that he or she understands that his or her orders may be price-capped in the future, but that the customer does not wish to be notified again about the application of any Price Caps to any of his or her orders.

     

Possible Alerts during the TWS installation or update

Overview: 

IBKR's Trader Workstation (TWS) is a global trading system enabling clients to use a suite of online trading tools. The TWS can be installed on Windows, Mac OS X and Linux, and it requires the presence of a Java Runtime Environment (JRE). Therefore, when you install the TWS, it also downloads the necessary Java files in order to run using a Java Virtual Machine (JVM).

Sometimes, during the installation or update process of the TWS, software such as Antivirus applications will show an alert and prevent the process to complete. The warning and other messages in this case can safely be ignored, and you can complete the installation of the trading platform. 

 

Table of content

 

Downloading the TWS installer and update patches

The TWS installers available in the download areas of ibkr.com or IBKR regional web sites are sealed and digitally signed using all the safety procedures required by the industry standards and do not contain any malicious code or process. The same industry standard practices have been used for the TWS update patches, which are automatically downloaded and installed when launching the TWS (if and only if there is an update available). Nevertheless, if you have received an alert, we recommend you to be cautious. Should you intend to keep the TWS installation file on your machine for future use, you should make sure that the same precautions for the protection of data from viruses and malware are applied to it.

 

Why do I receive a warning when I install the TWS or when the TWS automatic update runs?

You might see an alert (similar to Figure 1 but not limited to) and your security system would wait for your input on how to process the suspicious file. You usually have the option to quarantine the file, delete it, ignore it once or create a permanent exception for it.

Please note that your antivirus might autonomously quarantine or delete the TWS installer file or some of his components without asking for your confirmation and without showing you any warning. Nevertheless, this should only happen if you have preset your antivirus to specifically react in this way.

Figure 1.

 

What should I do when I receive a warning?

In case you receive a warning during the TWS installation or update, we recommend the following steps:

1. Delete the TWS installer and download it again from the IBKR main or regional web site

a) Delete the TWS installer file already present on your computer and then delete it as well from your Trash (empty your Trash)

b) From the table below, click on the TWS download area correspondent to your location

Location TWS download area
US
https://www.ibkr.com
Asia / Oceania
https://www.interactivebrokers.com.hk
India
https://www.interactivebrokers.co.in
Europe
https://www.interactivebrokers.co.uk
https://www.interactivebrokers.eu

c) Check the website certificate. Most Internet browsers will immediately alert you in case the site certificate is invalid, compromised or expired. Nevertheless, if you want to check manually the validity of the site certificate, click on the padlock close to the address (URL) and make sure the Connection is reported as secure and no security warning are present (see Figure 2 below).

Figure 2.

d) Click on the button labeled with the TWS version you wish to use and download again the TWS installer

 

2. Check the digital signature of the TWS installer file you have downloaded

Normally you will immediately receive a security warning in case the digital signature of a file is compromised. Nevertheless, if you wish to perform a manual check, proceed as follows, according to your Operating System:

For Windows

a) From the Windows file explorer, access your Downloads folder or the folder where you placed the TWS installer

b) Right click on the TWS installer file, select Properties and then click on the tab "Digital Signatures"

c) Click on "Details" and on "View Certificate" to check the certificate status and signer. The legitimate signer is "IB Exchange Corp." (See Figure 3 below)

Figure 3.

For Mac OS X

a) Click on the magnifier glass (Spotlight Search) on the top right of your screen and type Terminal. From the search results, launch the Terminal app

b) Type cd Downloads and press Enter

c) Type codesign -dv --verbose=4 tws-latest-macosx-x64.dmg and press Enter. Please notice that the name of the file (tws-latest-macosx-x64.dmg) may differ according to the TWS version you decided to download. If needed, replace the file name in the command with the appropriate one

d) Check the command output and make sure the "Developer ID Application" is "IB Exchange Corp." (see Figure 4 below)

Figure 4.

 

 

3. Run the TWS installer file you have downloaded

Once you have downloaded again the TWS installer and after you made sure the file is original (points 1. and 2. above), you can proceed with the installation. Should you still receive a warning from your antivirus, you can reasonably consider it as a false positive and ignore it.  Should you need guidance on this step, please proceed directly to the next section.

 

How can I signal an Alert as false positive?

All modern security systems allow the creation of exceptions, precisely in order to address false positive cases.  An exception is a rule forcing the antivirus engine not to scan a specific file or process. That specific file or process will hence be deemed safe and no further alerts will be raised for it.

The procedure for creating an exception may vary, according to the security software you are using. You may be able to create a temporary or permanent exception directly from the alert pop-up or you may have to create one manually from a specific section in the main configuration panel.

If you are unsure of the procedure, we recommend you to consult your antivirus documentation.

Once you have set an exception for the TWS installer file or for the TWS updater process, those will be no longer blocked and will be able to complete their respective tasks successfully.

 

What else can I do if I have doubts or if my system behaves abnormally?

If you have reasons to believe your machine may be compromised or infected, we recommend performing a full system scan. Usually you can right click on the antivirus icon present on the bottom taskbar (for Windows) or on the upper menu bar (for MacOS) and you will find the option to launch a full system scan. Alternatively, you may start that task from the main antivirus window. If you are unsure of the procedure, we recommend you to consult your antivirus documentation.

 

 

Technical Background

 

How does my security system scan the files I download from the Internet?

Modern antivirus and anti-malware engines base their threats recognition on:

Signature-based scanning: the antivirus scanner searches for a specific pattern of bytes that was previously catalogued as malicious or at least suspicious. The antivirus may check as well file signatures (called hash) against a database of known threats (called virus definitions).

Analysis of behavior: the antivirus engine detects specific actions which individually may not represent a threat but, when correlated together, resemble the usual activity of a malicious software (e.g. the ability of a code to replicate or hide itself, download additional files from the Internet, contact external hosts over the Internet, modify the Operating System registry) This type of scan is designed to detect previously unknown computer threats.

Heuristic detection: the scanner de-compiles the code or runs it within a virtual, restricted environment. It then classifies and weights the actions performed by the code against a predefined, behavior based, rule set.

Cloud-based protection and machine learning: those are relatively new techniques. The file that needs to be analyzed is sent to the antivirus / security system vendor cloud where sophisticated algorithms perform a deep analysis of the code authenticity and behavior.

Are those scan methods infallible?

Modern threats are very sophisticated and, like biological viruses, can mutate their code and their signatures. Moreover, new malwares and exploits are created every day and spread rapidly over the Internet. The threat recognition methods mentioned above are therefore not infallible but can guarantee a high percentage of malware recognition when combined together.

While signature based techniques are very successful in recognizing known threats and less prone to false positives, they are not so efficient in recognizing unknown malware or mutations of existing ones. In this area, the behavioral and heuristic methods perform much better although they are more prone to false positives since their detection is not based on bare code matching but on a certain degree of interpretation and hence uncertainty.

The term "false positive" is used when a security system classifies an innocuous file or process as malware.

 

 

Reference:

Alternative Streaming Quotes for US Equities

Overview: 

The SEC Vendor Display Rule requires that brokers give clients access to the NBBO at the point of order entry. In order to provide users with free live streaming market data, we cannot display this free stream when entering an order without the client subscribing to the paid NBBO.

Background: 

Under the Rule 603(c) of Regulation NMS (Vendor Display Rule), when a broker is providing quotation information to clients that can be used to assess the current market or the quality of trade execution, reliance on non-consolidated market information as the source of that quotation would not be consistent with the Vendor Display Rule.

Therefore and according to FINRA's enforcement of the SEC rule, any client of a broker that is purchasing real-time quotes must buy the NBBO real-time services when making trading decisions.

All clients have access to streaming US equity quotes from the four CBOE exchanges and IEX at no charge. Since this data does not include all markets, we cannot show this quote when entering parameters for a US stock quote. Order routing will not change based on what is shown on the screen. If one is subscribed to NBBO quotes or not, by default the trade will still take place with the assistance of the SMART order router designed to provide the best price for the order.

Please see the sample screenshots below from TWS Classic and TWS Mosaic for what occurs when placing an order without the NBBO streaming subscription for US equities. 

TWS Classic:

1. Screenshot of quotes showing without order entry line item

2. Screenshot of quote going blank when putting in the order entry line item

TWS Mosaic:

1. Screenshot of quotes showing without order entry line item

2. Screenshot of quote going blank when putting in the order entry line item

TWS / IB Gateway and their interaction with Proxy servers

Table of contents

 

Configuration instructions
  1. Can the TWS / IB Gateway operate through a Proxy server and how?
  2. If I use a SOCKS Proxy server, do I need to configure the TWS / IB Gateway?
  3. If I use a SOCKS Proxy server, do I need to configure the client machines where TWS / IB Gateway runs?
  4. If I use a Web (HTTP) Proxy server, do I need to configure the TWS / IB Gateway?
  5. What alternatives do I have in case I cannot implement a proxy solution on my network?
Common issues
  1. Your computer is set up to use a Proxy but there is no actual Proxy running on the network
Technical Background
  1. What is a Proxy server?
  2. Which types of Proxy servers are commonly used and where?

 

Configuration instructions

1. Can the TWS / IB Gateway operate through a Proxy?

Upon start-up and as well during the run-time The TWS / IB Gateway needs to establish and maintain direct network connections to our gateways and market data servers1. Such connections are created from random local TCP ports (above 1024) and are directed to TCP ports 4000 (or TCP 4001 if you tick the "Use SSL checkbox" within the TWS login screen).  Since those are not HTTP connections, they cannot be serviced by a Web (HTTP) Proxy. They can only be serviced by a SOCKS Proxy.

From within the TWS interface, you can access several external services, such as IBKR Client Portal, Statements, Contract details, Bond Search... Those services, being Web based, can be accessed through a Web (HTTP) Proxy (see section 6 for details and configuration) or through a SOCKS Proxy (see sections 4. and 5. for details and configuration). 

 

2. If I use a SOCKS Proxy server, do I need to configure the TWS / IB Gateway?

The TWS / IB Gateway does not contemplate an option for SOCKS proxy forwarding and hence does not have a place where an explicit SOCKS Proxy host/port can be configured. This does not mean that the TWS / IB Gateway cannot work with a Proxy. It simply means that the TWS / IB Gateway is unaware of the underlying SOCKS proxy set up (proxy-agnostic).

Important Note: While it is impossible for us to determine whether a Proxy is enabled on your network, we assure you that all IBKR platforms, including the TWS, do not impact nor influence your network configuration.

 

3. If I use a SOCKS Proxy server, do I need to configure the client machines where TWS / IB Gateway runs?

The connections started by the TWS / IB Gateway can be redirected to a SOCKS (Application) Proxy through a specific client machine setup. We mention some of them below. Please note, that the final decision is yours and none of the below suggestions can be recommended by us as best adapted to your setup and requirements.

3a. Using a Proxy Client software installed on the client machine where TWS / IB Gateway is running

With this setup the Proxy client will intercept the connections (not only HTTP but for other ports as well) initiated by the TWS / IB Gateway and redirect them to a SOCKS proxy server. . The typical benefits of a transparent proxy include a standard enterprise
configuration where all clients routed to the internet will always be filtered and protected no matter what the end users do, or change, on their machines and the added benefit of reduction in typical user’s client-proxy configuration troubleshooting.

3b. Using a so-called Proxifier

This configuration is very similar to the one at point 5a with the only difference that the Proxifier software can be set to redirect to a Proxy all the request started by a specific process (e.g. C:\Jts\tws.exe ; C:\JTS\ibgateway\XYZ\ibgateway.exe), hence instating a process level packet
forwarding instead of a port level forwarding. This set up allows handling environments where different proxy servers are used for different applications or where you would like to address a specific application requirement without modifying/disrupting the connectivity schema for other software installed. The advantage of this solution is a minimal maintenance since the connectivity schema is bound to the process and not to the hosts/ports.

3c. Using specific network routing on client machine

With this setup you can modify the client machine standard network routes, adding new ones in order to forward packets with specific destinations (e.g. Order routing and Market Data servers1) to a different gateway.
This gateway will then be in charge of routing those request to the destination hosts. This solution has as well the benefit of not modifying/disrupting the connectivity schema for other software installed but usually require more maintenance on the gateway and on the client machined in case the IP of the destination servers are changed or in case new servers are added.

 

4. If I use a Web (HTTP) Proxy server, do I need to configure the TWS / IB Gateway?

If the Workstations on your local network access the Web content through a Web (HTTP) Proxy, you need to specify the Web Proxy IP Address and port. To do this, click on More Options at the bottom of the TWS Login Screen, and enter your Proxy server details in the fields Host and Port (see Figure 1 below). The same fields are present in the IB Gateway Login Screen.

Figure 1.

The Web Proxy you set there will ONLY be used to fetch the web content accessible from within the TWS (e.g. Client Portal, Statements, Product Details, etc.)

 

5. What alternatives do I have in case I cannot implement a proxy solution on my network?
In this case you might orient yourself towards a different type of access to the IBKR infrastructure, which includes a special connection type and a FIX/CTCI engine setup. This setup would, on the other hand, have different requirements as well in terms of commissions2.  

 

Common Issues

6. What happens if the proxy configuration on your computer is wrong or outdated?

Occasionally, a third-party software, even if already uninstalled, may left behind a SOCKS proxy configuration on your computer. This may also happen if your computer has been infected with malware. In such cases, the proxy server, although configured, is actually non-existent or not accessible on the network. In such scenarios, the TWS will show an error message (e.g. No Internet Connectivity) and/or start the "Connection attempt #" loop upon login. The same will happen if the Proxy server exists but it has not been correctly configured on the client machines.

6a. How can I correct the proxy configuration if wrong?

When applicable, we recommend you to always consult the IT / Networking team of your company first and ask for guidance.

If you are autonomously managing your network, please follow the instructions below according to the Operating System of your machine/s:

Windows

W.1 Press CTRL+S to open the Windows search

W.2 Type Proxy Settings and press Enter

W.3 If no Proxy is present on your network, make sure the switch "Use a proxy server" is deactivated (see Figure 2 below). If a Proxy server is active on your network, make sure the Address (or hostname) and Port are correctly defined.

Figure 2.

 

Mac

M.1 Click on the Apple icon at the top left corner of the screen and select System Preferences

M.2 Click on Network

M.3 Select the Network connection you are using to access the Internet (e.g. Wi-Fi) and click on it

M.4 Click on the Advanced button and then on the Proxies tab

5. If no Proxy is present on your network, make sure all the checkboxes (SOCKS Proxy, Web Proxy, Secure Web Proxy) are deactivated (see Figure 3 below). If a Proxy is present on your network, make sure the Protocol, Address (or hostname) and Port are correct.

Figure 3.

 

7. You are using Public proxies and proxy chains to hide your presence or identity

There are public proxy and proxy chains services purposed to disguise or hide the identity and the activity of the subscriber or to bypass regional restrictions. One of the most famous of such services is the "Tor" network.

While those services may not necessarily be used for criminal purposes, they render the subscriber traceability very difficult when not impossible. Since IBKR is obliged by the financial industry regulators to maintain records of trading activities and trade initiators, we do not allow our clients to reach our systems while using an anonymizing service. If you are using such service, your TWS connection attempts will be automatically rejected by our gateways.

 

Technical Background

8. What is a Proxy Server?

A Proxy Server usually acts as a gateway and as a barrier between your local network and the Internet. The Proxy listens for outgoing connection requests from the internal workstation/s and forwards them to the desired target host or service on the Internet. When the target replies to such requests, the Proxy takes care of routing the incoming responses back to the internal workstation/s that initiated the process.

Being the Proxy the only machine of your network actually accessing the Internet, it prevents the other machines and the internal segment of your network (LAN) from being accessible by external actors and hence from being exposed to threats and intrusion attempts.

Additionally, a Proxy server can offer a variety of other services such as web content caching and filtering.

 

9. Which types of Proxy servers are commonly used and where?

Proxy server are commonly found within enterprise-grade networks. In the vast majority of cases proxies are not used by individuals since private broadband connections are established through consumer-grade routers that already offer built-in proxy/firewall solutions. An exception is represented by public proxy or proxy chains discussed in details in the section You are using Public proxies and proxy chains to hide your presence or identity

There are two main types of Proxy servers:

9a. Web (HTTP) Proxies

The HTTP (Hypertext Transfer Protocol) defines the rules and the standards for fetching Web content from a Web server and rendering such content on your Web Browser.

A Web Proxy handles only the routing of HTTP requests and HTTP responses. Those requests are transparently generated and sent by your browser whenever you access a Web page.  Such requests are normally sent using specific ports (TCP 80 and TCP 443), hence a Web Proxy usually listens for outgoing HTTP requests coming from your internal network (LAN) only on the TCP ports mentioned above.

9b. SOCKS Proxies

SOCKS (Socket Secure) Proxies are designed to handle any type of traffic (not only HTTP/S traffic), generated by any protocol or program (including Trader Workstation).

 

Notes

1. More information about the servers accessed by the TWS are available in IBKB2816.

2. For an overview of the different special connection options and related requirements, please click here.
For an overview of the FIX infrastructure, please click here

 

Données de marché en Aperçu

CONTEXTE

IBKR offre aux clients éligibles la possibilité de recevoir des cotations en temps réel sur demande pour un instrument. Ce service, appelé "Cotations en Aperçu", diffère des services traditionnels de cotation qui offrent un streaming en continu et des mises à jour en temps réel des prix. Les cotations en aperçu sont offertes comme une alternative à bas coût aux clients qui ne tradent pas régulièrement et ne veulent pas dépendre de cotations en différé lorsqu'ils soumettent un ordre. Des informations supplémentaires concernant ce service de cotation sont fournies ci-dessous.

 

Éléments de la cotation

Une cotation en Aperçu comporte les données suivantes:        

  • Dernier prix
  • Dernier volume
  • Dernière Bourse
  • Cours acheteur-vendeur actuel
  • Volume pour chacun des cours acheteur-vendeur actuels
  • Bourse pour chacun des cours vendeur-acheteur actuel

 

SERVICES DISPONIBLES

clientèle Restrictions Prix par demande de cotation (USD)1
AMEX (Network B/CTA)   $0.01
ASX Total Pas d'accès à ASX24.
Limité aux souscripteurs non-professionnels
$0.03
Bolsa de Madrid   $0.03
Canadian Exchange Group (TSX/TSXV) Limité aux souscripteurs non-professionnels qui ne sont pas des clients d'IB Canada $0.03
CBOT Real-Time   $0.03
CME Real-Time   $0.03
COMEX Real-Time   $0.03
Eurex Core Limité aux souscripteurs non-professionnels $0.03
Euronext Basic Limité aux souscripteurs non-professionnels

Inclut les titres, indices, dérivés de titres et dérivés d'indices Euronext.
$0.03
Indices et ETF allemands Limité aux souscripteurs non-professionnels $0.03
Dérivés de Hong Kong (HKFE)   $0.03
Hong Kong Securities Exchange (Actions, Warrants, Obligations)   $0.03
Johannesburg Stock Exchange   $0.03
Dérives de Montreal Limité aux souscripteurs non-professionnels $0.03
NASDAQ (Network C/UTP)   $0.01
Nordic Derivatives   $0.03
Nordic Equity   $0.03
NYMEX Real-Time   $0.03
NYSE (Network A/CTA)   $0.01
OPRA (US Options Exchanges)   $0.03
Shanghai Stock Exchange 5 Second Snapshot (via HKEx)   $0.03
Shenzhen Stock Exchange 3 Second Snapshot (via HKEx)   $0.03
SIX Swiss Exchange Limité aux souscripteurs non-professionnels $0.03
Allemagne Spot Market (Francfort/Xetra) Limité aux souscripteurs non-professionnels $0.03
Indices en temps réel STOXX Limité aux souscripteurs non-professionnels $0.03
Toronto Stk Exchange Limité aux souscripteurs non professionnels clients d'IB Canada $0.03
TSX Venture Exchange Limité aux souscripteurs non professionnels clients d'IB Canada $0.03
UK LSE (IOB) Equities   $0.03
UK LSE Equities   $0.03

 1Le coût est indiqué par demande de cotation en Aperçu et sera facturé dans l'équivalent de la devise de base si celle-ci n'est pas l'USD.

 

ÉLIGIBILITÉ

  • Les comptes doivent détenir des titres d'un montant au moins égal à 10.00 USD, ou équivalent dans une autre devise, afin d'être éligibles aux cotations en Aperçu.
  • Les utilisateurs doivent avoir la version TWS 976.0 ou une version plus récente pour accéder aux fonctionnalités de cotations en Aperçu.

 

TARIFICATION

  • Les frais sont facturés en différé, généralement la première semaine après le mois pour lequel les services en Aperçu ont été fournis. Les comptes dont la trésorerie ou les titres avec valeur d'emprunt sont insuffisants pour couvrir les frais mensuels feront l'objet de liquidations de positions.
  • Les frais mensuels pour l'AMEX (Network B/CTA), le NASDAQ (Network C/UTP) et le NYSE (Network A/CTA) seront plafonnés et les cotations en streaming seront fournies sans frais supplémentaires pour le reste du mois si l'utilisateur a souscrit à la liasse en Aperçu et le nombre de demandes de cotation pour le mois atteint le coût du service de streaming. Le passage aux cotations en streaming se fera à 18h30 EST (heure des États de la côte Est des États-Unis) environ, le jour ouvrable après que le plafond a été atteint pour l'Aperçu. À la fin du mois, le service de streaming prendra automatiquement fin et le compteur pour les données en Aperçu sera stoppé. Chaque service est plafonné indépendamment l'un de l'autre et les demandes de cotation pour un service ne peuvent être prises en compte pour déterminer le plafond d'un autre. Consultez le tableau ci-dessous pour plus d'informations.
clientèle Prix par demande de cotation (USD) Plafond pour souscripteurs non-pro (Demandes/Coût total)2 Plafond pour souscripteurs pro (Requests/Total Cost)3
AMEX (Network B/CTA) $0.01 150/$1.50 2,300/$23.00
NASDAQ (Network C/UTP) $0.01 150/$1.50 2,500/$25.00
NYSE (Network A/CTA) $0.01 150/$1.50 4,500/$4,500

 2La souscription aux liasses Aperçu de titres U.S et Contrats à terme Value est requise.
 3La souscription à la liasse Aperçu des titres U.S est requise.

 

DEMANDER DES COTATIONS EN APERÇU

Trading sur bureau - TWS (Classic):

Si vous avez des données en différé affichées et que vous avez souscrit aux autorisations d'Aperçu, sous la colonne Action sur symbole vous verrez un bouton pour l'Aperçu:

 

Lorsque vous cliquez sur le bouton Aperçu, une fenêtre se remplira de détails de cotations. Cette fenêtre de détail des cotations générera un horodatage dès réception de la cotation NBBO pour le symbole, ainsi que des informations sur le NBBO:


 

Dans la fenêtre du Détail de cotation, cliquez sur le lien Rafraîchir pour mettre à jour la cotation NBBO. 

Exemple:

Dans le cas ci-dessus, GOOG est une action cotée sur NASDAQ (Network C/UTP). Des frais de 0.01 USD par demande (un aperçu) seront facturés.

  • Les clients non-professionnels peuvent demander jusqu'à 149 aperçus pour GOOG ou toutes autres actions cotées sur NASDAQ (Network C/UTP).
  • Les professionnels peuvent demander 2,499 aperçus supplémentaires pour GOOG ou toutes autres actions cotées sur NASDAQ (Network C/UTP), avant qu'elles ne deviennent des cotations en streaming.

Vous ne serez facturés pour les aperçus qu'à hauteur du montant du plafond. Une fois ce plafond atteint, aucun autre frais ne sera appliqué pour le reste du mois et vous commencerez à recevoir des cotations en streaming pour ce service.

 

Trading sur bureau - TWS (Mosaic):

Si vous avez des données en différé et que vous avez souscrit à des autorisations pour les aperçus, lorsque vous sélectionnez une ligne dans l'onglet de suivi, la fenêtre de saisie des ordres affichera l'option de demander un Aperçu.

 


 

Lorsque vous cliquez sur le lien SNAPSHOT, une fenêtre se remplira de détails de cotations. Cette fenêtre de détail des cotations générera un horodatage dès réception de la cotation NBBO pour le symbole, ainsi que des informations sur le NBBO:

 


 

Dans la fenêtre du Détail de cotation, cliquez sur le lien Rafraîchir pour mettre à jour la cotation NBBO.

Portail Client:

Lorsque vous cliquez sur le lien Aperçu, une fenêtre se remplira des détails des cotations. Cette fenêtre de détail des cotations générera un horodatage dès réception de la cotation NBBO pour le symbole:

 

 

Lorsque vous cliquez sur le lien APERÇU, une fenêtre se remplira de détails des cotations. Cette fenêtre de détail des cotations générera un horodatage dès réception de la cotation NBBO pour le symbole:

 

 

Dans la fenêtre de l'Aperçu, cliquez sur le lien Rafraîchir pour mettre à jour la cotation NBBO.

 

Trading sur le web - WebTrader:

Si vous avez des données en différé et que vous avez souscrit aux autorisations en Aperçu, sur l'onglet se trouvant sous la colonne Données supplémentaires vous verrez un bouton pour l'aperçu:

 


 

Lorsque vous cliquez sur le bouton Aperçu, une fenêtre se remplira des détails des cotations. Cette fenêtre de détail des cotations générera un horodatage dès réception de la cotation NBBO pour le symbole:

 

Trading mobile - Application IBKR:

Sur l'écran de cotation, toucher le symbole agrandira la fenêtre de cotation. Si des données en différé s'affichent et que vous avez des autorisations pour les aperçus, vous verrez un lien pour Apperçu:


Lorsque vous cliquez sur le lien APERÇU, une fenêtre se remplira des détails des cotations. Cette fenêtre de détail des cotations générera un horodatage dès réception de la cotation NBBO pour le symbole, ainsi que des informations sur le NBBO:

 

 

Syndicate content