Inside Dropbox: Understanding Personal Cloud Storage Services

Size: px
Start display at page:

Download "Inside Dropbox: Understanding Personal Cloud Storage Services"

Transcription

1 Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, Bremen, Germany Monday 22 nd April, 2013

2 Presentation Outline Introduction Dropbox Architecture Measurements and Evaluations Conclusions

3 Cloud Storage Services Cloud services increasingly prevalent Microsoft, Amazon, Google Cloud storage in particular very popular Dropbox, UbuntuOne, Box.com Non-trivial amount of traffic

4 Measurement Setup Cloud Storage Services Traffic Measurement use tstat to monitor traffic from 2 university campuses 2 points of presence in a major ISP over 42 consecutive days client/server IP addresses, TCP metrics classify traffic by TLS sever name and DNS FQDN

5 Initial Measurement Figure: Storage Services Usage source: ID:UPCSS Dropbox leads constantly

6 Dropbox Desktop Client Main characteristics Python native client for Windows / MacOS / Linux Data transfers via librsync

7 Dropbox Desktop Client Dropbox Servers - DNS Analysis Figure: Domain names used by Dropbox services source: ID:UPCSS Two planes are distinguished: control plane (meta-data, notification, authentication) data plane (storage)

8 Dropbox Desktop Client Dropbox Servers - Protocol Analysis - Issue Dropbox protocol is not publicly documented Most communication is encrypted under TLS.

9 Dropbox Desktop Client Dropbox Servers - Protocol Analysis - Issue Dropbox protocol is not publicly documented Most communication is encrypted under TLS. Dropbox Servers - Protocol Analysis - Solution Route traffic through Squid proxy Use Squid SSL Bump module to decrypt TLS Change at run-time the client-trusted Dropbox Inc. certificate with the one provided to Squid SSL Bump. Memory Re-writing

10 Dropbox Desktop Client Dropbox Servers - Protocol Insight Figure: Dropbox Protocol Example - File upload source: ID:UPCSS Notification protocol via HTTP long polling notifyx.dropbox.com Meta-data and storage protocols via TCP/SSL client-lb, client.dropbox.com

11 Dropbox Desktop Client Dropbox Servers - Protocol Insight Data (new files or deltas) is chunked in 4MBytes pieces Namespaces are used for each shared folder each user has an initial namespace Each device provides a unique ID

12 Dropbox WebUI Use separate servers for user private and share-by-link files dl-web, dl.dropbox.com Significantly less traffic Not analyzed further plot coming soon

13 Overall Traffic Traffic Share Figure: Dropbox vs Youtube Traffic Share in Campus 2 source: ID:UPCSS Dropbox traffic as much as 1/3 of Youtube traffic

14 Overall Traffic Dropbox server breakdown Figure: Traffic Share of Dropbox Servers source: ID:UPCSS Dropbox application preferred more than 80% in all vantage points

15 Overall Traffic Flow Sizes Figure: Distribution of Flow Sizes source: ID:UPCSS bound in range 4Kb - 400Mb significant amount of flows less than 10Kb

16 Throughput Analysis Throughput Figure: Upload Throughput source: ID:UPCSS 1-chunk flows bound by TCP slow-start multi-chunk flows affected by sequential chunk ACKs bundled ACKs introduced in next version

17 User Patterns Device Distribution Figure: Devices per user source: ID:UPCSS Most users use Dropbox with a single device

18 User Patterns Namespace Distribution Figure: Namespaces per user source: ID:UPCSS Most users only have their own namespace Campus users tend to share more

19 User Patterns Device Daily Activation Figure: Fraction of Active Devices per day source: ID:UPCSS Weekends clearly visible in campus data-sets

20 User Patterns Download/Upload breakdown 30% occasional users 26% download-only 7% upload-only 37% actively upload and download

21 User Patterns Download/Upload breakdown Figure: User Downloads/Uploads in Home 1 source: ID:UPCSS

22 Conclusions Dropbox is the most popular cloud storage service

23 Conclusions Dropbox is the most popular cloud storage service Architecture Analysis

24 Conclusions Dropbox is the most popular cloud storage service Architecture Analysis Usage Patterns

25 Conclusions Dropbox is the most popular cloud storage service Architecture Analysis Usage Patterns Throughput analysis and recommendations

26 Thank you Questions?

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino

More information

Monitoring commercial cloud service providers

Monitoring commercial cloud service providers Monitoring commercial cloud service providers July Author: Lassi Kojo Supervisor: Stefan Lüders CERN openlab Summer Student Report Abstract There is a growing tendency by individuals to sign-up for public

More information

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Background. Personal cloud services are gaining popularity

Background. Personal cloud services are gaining popularity Background Personal cloud services are gaining popularity Many providers enter the market. (e.g. Dropbox, Google, Microso

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services

QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services Xin Wang Department of Electrical and Computer Engineering Stony Brook University Stony Brook, New York, USA xwang@ece.sunysb.edu

More information

Active Management Services

Active Management Services Active Management Services White Paper 2.0 for Ricoh Customers Prepared by Professional Services department of Ricoh International B.V. Monday, 14 January 2013 TABLE OF CONTENT 1. Introduction... 4 2.

More information

Personal Cloud Storage: Usage, Performance and Impact of Terminals

Personal Cloud Storage: Usage, Performance and Impact of Terminals Personal Cloud Storage: Usage, Performance and Impact of Terminals Enrico Bocchi, Idilio Drago, Marco Mellia Politecnico di Torino name.surname@polito.it Abstract Personal cloud storage services such as

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

SharePoint Performance Optimization

SharePoint Performance Optimization White Paper AX Series SharePoint Performance Optimization September 2011 WP_SharePoint_091511.1 TABLE OF CONTENTS 1 Introduction... 2 2 Executive Overview... 2 3 SSL Offload... 4 4 Connection Reuse...

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Cloud Sync White Paper. Based on DSM 6.0

Cloud Sync White Paper. Based on DSM 6.0 Cloud Sync White Paper Based on DSM 6.0 1 Table of Contents Introduction 3 Product Features 4 Synchronization 5 Architecture File System Monitor (Local change notification) Event/List Monitor (Remote change

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

Module 6. Designing and Deploying External Access. MVA Jump Start

Module 6. Designing and Deploying External Access. MVA Jump Start Module 6 Designing and Deploying External Access MVA Jump Start Module Overview Conferencing and External Capabilities of Lync Server 2013 Planning for IM and Presence Federation Designing Edge Services

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4

Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4 Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4 Table of Contents Introduction... 3 What is a HotSpot Printer?... 3 Understanding the HotSpot System Architecture... 4 Reliability of HotSpot Service...

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

The memoq server in a Corporate Network

The memoq server in a Corporate Network The memoq server in a Corporate Network Version 3.5 LSP Guide memoq copyright 2004-2009 Kilgray Translation Technologies. All rights reserved. Contents The memoq server in a Corporate Network...1 Version

More information

VPN Lesson 2: VPN Implementation. Summary

VPN Lesson 2: VPN Implementation. Summary VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users

More information

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can

More information

LDAP over SSL Page 1 of 6.

LDAP over SSL Page 1 of 6. How to enable LDAP over SSL using the Virginia Tech s Open-SSL Certificate Authority By: Scott Cassell, Systems Architect, VTMig, Virginia Tech FEBRUARY 2002 V1.01 The network traffic generated by the

More information

CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions

CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions Overview The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure,

More information

Forward proxy server vs reverse proxy server

Forward proxy server vs reverse proxy server Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

The memoq server in a Corporate Network

The memoq server in a Corporate Network The memoq server in a Corporate Network Version 3.5 LSP Guide memoq copyright 2004-2009 Kilgray Translation Technologies. All rights reserved. Contents 1 Overview...2 2 Possible Network Setups...3 3 IP

More information

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

SOOKASA WHITEPAPER SECURITY SOOKASA.COM SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

BlackBerry Enterprise Server Express System Requirements

BlackBerry Enterprise Server Express System Requirements BlackBerry Enterprise Server Express System s For information about calculating hardware requirements, visit www.blackberry.com/go/serverdocs to see the BlackBerry Enterprise Server Capacity Calculator

More information

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

Internet Storage Sync Problem Statement

Internet Storage Sync Problem Statement Internet Storage Sync Problem Statement draft-cui-iss-problem Zeqi Lai Tsinghua University 1 Outline Background Problem Statement Service Usability Protocol Capabili?es Our Explora?on on Protocol Capabili?es

More information

Secure your Docker images

Secure your Docker images Secure your Docker images With Notary and Yubikey Dr. Udo Seidel Agenda Introduction The Update Framework Notary Yubikey Getting started Summary Me :-) Teacher of mathematics and physics PhD in experimental

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise WHITE PAPER 12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise Cloud storage companies invented a better way to manage information that allows files to be automatically synced

More information

Sophos Mobile Control Installation prerequisites form

Sophos Mobile Control Installation prerequisites form Sophos Mobile Control Installation prerequisites form Product version: 3 Document date: January 2013 Contents 1 About this document... 3 2 System environment... 4 3 Communication between devices and push

More information

Private Cloud. Technical Overview. Revision Date: 10 August 2015

Private Cloud. Technical Overview. Revision Date: 10 August 2015 Private Cloud Technical Overview Revision Date: 10 August 2015 ISL Online, ISL Light, ISL AlwaysOn, ISL Pronto, and ISL Groop are registered trademarks of XLAB d.o.o. Copyright 2003-2015 XLAB d.o.o. Ljubljana.

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

FortiGate Multi-Threat Security Systems I

FortiGate Multi-Threat Security Systems I FortiGate Multi-Threat Security Systems I Module 9: Web Filtering 2013 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication

More information

Configuring Microsoft Dynamics AX 2012 Alerts and Email Notifications Using an SMTP Email Relay Server with Office 365

Configuring Microsoft Dynamics AX 2012 Alerts and Email Notifications Using an SMTP Email Relay Server with Office 365 Configuring Microsoft Dynamics AX 2012 Alerts and Email Notifications Using an SMTP Email Relay Server with Office 365 With more AX Server machines being run in the cloud on Microsoft Azure we need a simple

More information

MOBILE APPLICATIONS AND CLOUD COMPUTING. Roberto Beraldi

MOBILE APPLICATIONS AND CLOUD COMPUTING. Roberto Beraldi MOBILE APPLICATIONS AND CLOUD COMPUTING Roberto Beraldi Course Outline 6 CFUs Topics: Mobile application programming (Android) Cloud computing To pass the exam: Individual working and documented application

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Zimbra Open Source Email and Collaboration Suite

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Zimbra Open Source Email and Collaboration Suite DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Zimbra Open Source Email and Collaboration Suite Table of Contents Table of Contents Deploying the BIG-IP LTM with the Zimbra Open Source

More information

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3 WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Implementing PCoIP Proxy as a Security Server/Access Point Alternative Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet

More information

Introduction to FileWave

Introduction to FileWave Introduction to FileWave Modern Systems Management LeRoy Dennison Training & Certification Manager LeRoy@filewave.com Ben Byers Systems Engineer Ben.Byers@filewave.com What is FileWave? Since 1992, FileWave

More information

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents

More information

GFI CreditMatch Technical Installation Instructions

GFI CreditMatch Technical Installation Instructions GFI CreditMatch Technical Installation Instructions Created by GFI Product Support Covers GFI CreditMatch Version 7.2.5 and subsequent versions Email: CreditMatch@GFIgroup.com Web: www.gfigroup.com Copyright

More information

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015 CS 188/219 Scalable Internet Services Andrew Mutz October 8, 2015 For Today About PTEs Empty spots were given out If more spots open up, I will issue more PTEs You must have a group by today. More detail

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

How to configure SSL proxying in Zorp 6

How to configure SSL proxying in Zorp 6 How to configure SSL proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05

Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05 Remote Access and Control of the Programmer/Controller Version 1.0 9/07/05 Remote Access and Control... 3 Introduction... 3 Installing Remote Access Viewer... 4 System Requirements... 4 Activate Java console...

More information

How to configure SSL proxying in Zorp 3 F5

How to configure SSL proxying in Zorp 3 F5 How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

Flight Workflow User's Guide. Release 12.0.0

Flight Workflow User's Guide. Release 12.0.0 Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2

IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2 Whitepaper IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2 Version 1.00 Blog: blog.cloud-client.info Website: www.cloud-client.info This document can be distributed / used free of charge

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter. Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Secure Cloud Computing with FlexCloud

Secure Cloud Computing with FlexCloud Department of Computer Science Institute of Systems Architecture Chair of Computer Networks Secure Cloud Computing with FlexCloud Dr.-Ing. Anja Strunk DAAD Summer School CTDS 2012 Sousse, Tunisia 07.09.2012

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Set up Outlook for your new student e mail with IMAP/POP3 settings

Set up Outlook for your new student e mail with IMAP/POP3 settings Set up Outlook for your new student e mail with IMAP/POP3 settings 1. Open Outlook. The Account Settings dialog box will open the first time you open Outlook. If the Account Settings dialog box doesn't

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

Healthstone Monitoring System

Healthstone Monitoring System Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Signiant Agent installation

Signiant Agent installation Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation

More information

3/21/2011. Topics. What is load balancing? Load Balancing

3/21/2011. Topics. What is load balancing? Load Balancing Load Balancing Topics 1. What is load balancing? 2. Load balancing techniques 3. Load balancing strategies 4. Sessions 5. Elastic load balancing What is load balancing? load balancing is a technique to

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

DOVECOT Overview. Timo Sirainen Chief Architect Co-Founder

DOVECOT Overview. Timo Sirainen Chief Architect Co-Founder DOVECOT Overview Timo Sirainen, the Author of DOVECOT, started development in 2002 DOVECOT OY, the company behind Dovecot was established by Timo and his founder team with offices in Helsinki and Stuttgart.

More information

Paxera Uploader Basic Troubleshooting

Paxera Uploader Basic Troubleshooting Before going further, please check the logs and auto-route queue in the Uploader Control, these logs will say a lot about your problem. You should take care of the following before contacting our Support

More information

Throughput logging tool written in C. Can t simply do full packet captures for everything because of size and ethics

Throughput logging tool written in C. Can t simply do full packet captures for everything because of size and ethics Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply

More information

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Topics. 1. What is load balancing? 2. Load balancing techniques 3. Load balancing strategies 4. Sessions 5. Elastic load balancing

Topics. 1. What is load balancing? 2. Load balancing techniques 3. Load balancing strategies 4. Sessions 5. Elastic load balancing Load Balancing Topics 1. What is load balancing? 2. Load balancing techniques 3. Load balancing strategies 4. Sessions 5. Elastic load balancing What is load balancing? load balancing is a technique to

More information

BELNET: Service Level Description Version (29/7/2009)

BELNET: Service Level Description Version (29/7/2009) BELNET: Service Level Description Version (29/7/2009) Table of Contents I Introduction...3 A Goal of this document... 3 B Publishing... 3 C Definitions... 3 II Network Services...5 A Connectivity (BELNET

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information