PEQ-DNS A Platform for DNS Quality Monitoring

Size: px
Start display at page:

Download "PEQ-DNS A Platform for DNS Quality Monitoring"

Transcription

1 PEQ-DNS A Platform for DNS Quality Monitoring

2 DNS Monitoring Challenges [1/2] The DNS is a complex distributed system that requires a distributed (per DNS server) monitoring system Monitoring usually focuses on aggregated metrics (e.g. number of good/bad queries, zone transfers) that are the key indicators of service provisioning health 2

3 DNS Monitoring Challenges [2/2] For network operators, DNS monitoring is a way to control that the name resolution is working well (as a service) For domain registries, in addition to running the cctld servers, it is compulsory to make sure that overall DNS infrastructure is in good health 3

4 DNS Health For Operators Provide DNS name resolution with: Low response time Robustness (no downtime) Ability to resist to attacks Filter invalid DNS packets (e.g. buffer overflow, invalid requests) in order to identify source of potential issues that might be mitigated 4

5 DNS Health For Registries In addition to the previous goals they also need to: Avoid distributing inaccurate information that might lead to bad service quality Identify invalid or inaccurate DNS registration records and report them to registrars Deploy a DNS infrastructure matching the expected service levels and robustness 5

6 Monitoring Health [1/2] Health monitoring requires: Validation of the information distributed by DNS servers by means of periodic checks of records consistency and configuration Monitoring DNS server response time, geographical location and service availability over time 6

7 Monitoring Health [2/2] A healthy DNS infrastructure must also: Place DNS servers on networks where service availability is granted even in case of disaster/security breach Monitor suspicious/excessive requests for slowing down/blocking the requestors Identify DNS scanners that load the infrastructure and might use the collected information for other purposes (e.g. spam) 7

8 What is PEQ-DNS? Years ago the.it Registry decided to start a project whose goal is DNS health monitoring PEQ-DNS is a distributed monitoring platform developed by the.it Registry aimed at measuring DNS health combining static registrations analysis with live traffic monitoring 8

9 Static DNS Validation [1/2] Identification of misconfigured DNS servers (e.g. lame delegation, zone check) Route analysis for reaching DNS servers in order to evaluate their resiliency to disasters (overlapping server discovery) Risk analysis (if a DNS fails, how many domains are affected by the failure) 9

10 Static DNS Validation [2/2] Risk in Case of Network Failure Risk in Case of Server Failure 10

11 PEQ-DNS Traffic Console 11

12 PEQ-DNS DNS Console [1/2] 12

13 PEQ-DNS DNS Console [2/2] Web User Web Console Live DNS Traffic SQL and TSDB (TimeSeries Database) 13

14 NXDomain [1/3] 14

15 NXDOMAIN [2/3] Per-query Statistics Client IP Client ASN DNS Request Query Number 15

16 Queries: ASN Statistics Per-ASN DNS Statistics NXDomain Queries Good Queries 16

17 DNS Clients Geolocation Information used for statistical purposes and for placing DNS in the most appropriate places for serving requests 17

18 NXDOMAIN vs Bad Requests In order to trigger alarms, we need to figure out whether a certain request was misspelled or completely wrong Alarms can be triggered only if false-positives are very limited. This can be achieved by identifying and insulating ordinary errors Levenshtein distance is used to compare the request with the real registered domain 18

19 Ordinary Errors (NXDOMAIN) Mispelled: rossoalicwe.it Correct: rossoalice.it Inexistent: ilballodelpimpolho.it Inexistent domain but ilballodelpimpolho is a popular Google match Human requests: Electronic requests: _ldap._tcp $e52fced a0-9c86-69c5d32d8c92.domains._ msdcs.itcge.it addresses used in Web navigation zazzu89@hotmail.it 19

20 NXDOMAIN Analysis (Future) Domain Registration vs NXDOMAIN (%) July August September October November 20

21 DNS Server Statistics 2,1 DNS server per Internet Domain (average) 7% 2% 93% 98% Domains with MX record Domains w/o MX record Domains with Web site Domains w/o Web site 21

22 DNS Server Statistics (cont) 5% 2% 95% 98% Domains with IPv4 DNS only Domains with IPv4/v6 DNS DNS Queries IPv4 DNS Queries IPv6 22

23 DNS Server Statistics (cont) 5% 46% 54% 95% Overlapping Non Overlapping Critical Overlapping Non Critical Overlapping 23

24 Registrars Ranking 24

25 Conclusions We developed a near-realtime open-source DNS monitoring system that Contrary to similar tools it s able to handle hundred of million flows/day using low-end commodity hardware. Collected data are used to highlight trends DNS usage We provide a feedback to registrars as well highlight service anomalies Your feedback is warmly welcome! 25

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without

More information

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No. COURSE OVERVIEW This five-day instructor-led course provides students with the knowledge and skills to implement and manage a Microsoft Windows Server 2003 network The course is intended for systems administrator

More information

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual

More information

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

Addressing SMTP-based Mass-Mailing Activity Within Enterprise Networks.

Addressing SMTP-based Mass-Mailing Activity Within Enterprise Networks. Addressing SMTP-based Mass-Mailing Activity Within Enterprise Networks. David Whyte, Paul van Oorschot and Evangelos Kranakis. 22st Annual Computer Security Applications Conference (ACSAC), December 2006.

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

DDOS in academic Networks. Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014

DDOS in academic Networks. Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014 DDOS in academic Networks Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014 Academic networks? Real Target for DDOS? Lesson learned; DDOS @RedIRIS Mitigation Projects

More information

Designing a Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure

More information

Data Center Content Delivery Network

Data Center Content Delivery Network BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay

More information

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design. SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server

More information

Preliminary Course Syllabus

Preliminary Course Syllabus Preliminary Course Syllabus Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Elements of this syllabus are subject to change. Key Data Course

More information

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

RIPE Database Terms and Conditions

RIPE Database Terms and Conditions RIPE Database Terms and Conditions The RIPE NCC shall make the RIPE Database publicly accessible under these RIPE Database Terms and Conditions (hereinafter: the Terms and Conditions ). The Terms and Conditions

More information

Detecting and Refactoring Operational Smells within the Domain Name System

Detecting and Refactoring Operational Smells within the Domain Name System Detecting and Refactoring Operational Smells within the Domain Name System Graphs as Models (GaM) Workshop, European Joint Conferences on Theory and Practice of Software (ETAPS-15) 11,12 April 2015 Queen

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

The Canadian Internet Registration Authority (CIRA) manages a 100% up time service - the.ca domain name registry for over 2.

The Canadian Internet Registration Authority (CIRA) manages a 100% up time service - the.ca domain name registry for over 2. WHO IS.CA ( CIRA )? The organization responsible for a critical part of the Internet infrastructure; expanding its services to help organizations secure their DNS in Canada The Canadian Internet Registration

More information

PowerDNS Introduction

PowerDNS Introduction PowerDNS Introduction OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit PowerDNS History Founded in 1999 to provide database driven DNS + geographical load balancing between

More information

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure Course Outline: 6435- Designing a Network Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day course will provide students with an understanding

More information

ARIN Online Users Forum

ARIN Online Users Forum ARIN Online Users Forum Overview Purpose and Players Brief overview of how ARIN sets priorities Usage statistics Review of the ARIN Online user survey Discussion of: ACSP suggestions on changes to ARIN

More information

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

Internet Technical Governance: Orange s view

Internet Technical Governance: Orange s view Internet Technical Governance: Orange s view 1 Internet Technical Governance: Orange s view With the increasing use of IP technologies in the electronic communication networks and services, Internet Technical

More information

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,

More information

SMTP Email Settings. Magento Extension User Guide. Official extension page: SMTP Email Settings. User Guide: SMTP Email Settings

SMTP Email Settings. Magento Extension User Guide. Official extension page: SMTP Email Settings. User Guide: SMTP Email Settings SMTP Email Settings Magento Extension User Guide Official extension page: SMTP Email Settings Page 1 Table of contents: 1. General Settings. 3 2. SMTP Configuration.. 5 3. Log Clearing Settings. 6 4. Sent

More information

Response Policy Zones

Response Policy Zones Response Policy Zones Taking Back the DNS, V2.0 Paul Vixie Chairman and Chief Scientist Internet Systems Consortium Abstract DNS works as well for the bad guys (criminals, spammers, spies) as for respectable

More information

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway

More information

Barracuda Load Balancer Online Demo Guide

Barracuda Load Balancer Online Demo Guide Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,

More information

STATE OF DNS AVAILABILITY REPORT

STATE OF DNS AVAILABILITY REPORT STATE OF DNS AVAILABILITY REPORT VOLUME 1 ISSUE 1 APRIL 2011 WEB SITES AND OTHER ONLINE SERVICES ARE AMONG THE MOST IMPORTANT OPERATIONAL AND REVENUE GENERATING TOOLS FOR BUSINESSES OF ALL SIZES AND INDUSTRIES.

More information

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

Detecting Search Lists in Authoritative DNS

Detecting Search Lists in Authoritative DNS Detecting Search Lists in Authoritative DNS Andrew Simpson March 10 th, 2014 Summary Early research into name collisions has postulated that search list interaction drives some portion of the DNS requests

More information

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes) A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365

More information

WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies" (srublev@ptsecurity.ru)

WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, Positive Technologies (srublev@ptsecurity.ru) WPAD TECHNOLOGY WEAKNESSES Sergey Rublev Expert in information security, "Positive Technologies" (srublev@ptsecurity.ru) MOSCOW 2009 CONTENTS 1 INTRODUCTION... 3 2 WPAD REVIEW... 4 2.1 PROXY AUTO CONFIGURATION

More information

Web Hosting 101. with Patrick McNeil

Web Hosting 101. with Patrick McNeil Web Hosting 101 with Patrick McNeil Alphabet soup Why learn the technical side? To help your clients solve problems To help you work better with your tech team To better understand how the web works To

More information

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a

More information

WHITE PAPER. DNS: Key Considerations Before Deploying Your Solution

WHITE PAPER. DNS: Key Considerations Before Deploying Your Solution WHITE PAPER DNS: Key Considerations Before Deploying Your Solution TABLE OF CONTENTS What is DNS?... 2 Why Does DNS Matter?... 2 Options for building a DNS infrastructure... 3 How to Choose the Right DNS

More information

How to set up the Integrated DNS Server for Inbound Load Balancing

How to set up the Integrated DNS Server for Inbound Load Balancing How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,

More information

Optimize Application Delivery Across Your Globally Distributed Data Centers

Optimize Application Delivery Across Your Globally Distributed Data Centers BIG IP Global Traffic Manager DATASHEET What s Inside: 1 Key Benefits 2 Globally Available Applications 4 Simple Management 5 Secure Applications 6 Network Integration 6 Architecture 7 BIG-IP GTM Platforms

More information

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...

More information

1 Attack Top Attackers Report, Top Targets Report, Top Protocol Used by Attack Report, Top Attacks Report, Top Internal Attackers Report, Top External Attackers Report, Top Internal Targets Report, Top

More information

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Course 2277: Five days; Instructor-led Introduction This five-day, instructor-led

More information

2014 IANA FUNCTIONS CUSTOMER SERVICE SURVEY RESULTS. Survey by Ebiquity Report by Leo Vegoda & Marilia Hirano

2014 IANA FUNCTIONS CUSTOMER SERVICE SURVEY RESULTS. Survey by Ebiquity Report by Leo Vegoda & Marilia Hirano 2014 IANA FUNCTIONS CUSTOMER SERVICE SURVEY RESULTS Survey by Ebiquity Report by Leo Vegoda & Marilia Hirano November 2014 Table of Contents Survey objective 1 Executive summary 2 Methodology 4 General

More information

Important Information

Important Information June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE ANATOMY OF A DDOS ATTACK AGAINST THE DNS INFRASTRUCTURE The Domain Name System (DNS) is part of the functional infrastructure of the Internet and

More information

IPv6 for AT&T Broadband

IPv6 for AT&T Broadband IPv6 for AT&T Broadband Chris Chase, AT&T Labs Sept 15, 2011 AT&T Broadband ~15 million subscribers Legacy DSL, PPP subscribers, ATM aggregation Not many CPE IPv6 capable Customer owned, unmanaged CPE

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

BT Internet Connect Global - Annex to the General Service Schedule

BT Internet Connect Global - Annex to the General Service Schedule 1. Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General Services Schedule. ARP means Address Resolution Protocol. Border Gateway Protocol

More information

Global Server Load Balancing (GSLB) Concepts

Global Server Load Balancing (GSLB) Concepts Global Server Load Balancing (GSLB) Concepts Section Section Objectives GSLB Overview GSLB Configuration Options GSLB Components Server Mode Configuration 2 Global Server Load Balancing (GSLB) Key ACOS

More information

The secret life of a DNS query. Igor Sviridov <sia@nest.org> 20120522

The secret life of a DNS query. Igor Sviridov <sia@nest.org> 20120522 The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of

More information

Internet Resiliency and Recovery

Internet Resiliency and Recovery Internet Resiliency and Recovery Scott Hofer Executive Network Architect Scott Hofer, Executive Network Architect, IBM IBM Certified Executive Network IT Specialist M.S. Telecommunications 11 years with

More information

Application and service delivery with the Elfiq idns module

Application and service delivery with the Elfiq idns module Technical White Paper Application and service delivery with the Elfiq idns module For Elfiq Operating System (EOS) version 3.x Document Revision 1.63 June 2012 Table of Contents 1. The IDNS module... 3

More information

CIRA s experience in deploying IPv6

CIRA s experience in deploying IPv6 CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country

More information

Products, Features & Services

Products, Features & Services Products, Features & Services PowerDNS PowerDNS, founded in the late 1990s, is a premier supplier of DNS software, services and support. Deployed throughout the world with some of the most demanding users

More information

Security of IPv6 and DNSSEC for penetration testers

Security of IPv6 and DNSSEC for penetration testers Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions

More information

Configuring an External Domain

Configuring an External Domain Configuring an External Domain SUPPORT GUIDE DOMAINS ABOUT THIS GUIDE This guide will instruct you on how to: Use an existing domain name Set Up Your Domain to Use Tagadab Name Servers Use Your VPS/Dedicated

More information

ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS

ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS Version: 2016 edition 2016 Attercopia 1 Hosting We provide a fully managed hosting solution. Our hosting partners provide servers which are

More information

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller NETGEAR ProSAFE WC9500 High Capacity Wireless Controller Confi guring Microsoft DHCP for the Wireless LAN APPLICATION NOTES INTRODUCTION NETGEAR ProSAFE WC9500 High Capacity Wireless Controllers support

More information

Juniper Secure Analytics Release Notes

Juniper Secure Analytics Release Notes Juniper Secure Analytics Release Notes 2014.5 February 2016 Juniper Networks is pleased to introduce JSA 2014.5. Juniper Secure Analytics (JSA) 2014.5 Release Notes provides new features, known issues

More information

WebAddress Domain Registrar

WebAddress Domain Registrar WebAddress Domain Registrar Introduction WebAddress (http://www.webaddress.co.nz) is a New Zealand domain name registrar. We provide our Members with the tools to effectively manage your own domain names

More information

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you

More information

Combining Global Load Balancing and Geo-location with Emissary TM

Combining Global Load Balancing and Geo-location with Emissary TM Combining Global Load Balancing and Geo-location with Emissary TM A New Kind of Global Internet Traffic Management Appliance from Coyote Point Systems and Digital Envoy Establishing a Geo-Sensitive, Highly

More information

IPv6 Troubleshooting for Helpdesks

IPv6 Troubleshooting for Helpdesks IPv6 Troubleshooting for Helpdesks Using test-ipv6.com Draft v.00 Contributors and authors: Lee Howard, John Jason Brzozowski, David Freedman, Jason Fesler, Tim Chown, Sander Steffann, Chris Grundemann,

More information

DNSwitness: A Generic Platform For DNS-based Measurements

DNSwitness: A Generic Platform For DNS-based Measurements DNSwitness: A Generic Platform For DNS-based Measurements Journée «Mesures Internet», Paris, 24 April 2012 {Samia.Mtimet, Stephane.Bortzmeyer, Mohsen.Souissi} (at) afnic.fr Overview Motivation Principles

More information

Apache Traffic Server Extensible Host Resolution

Apache Traffic Server Extensible Host Resolution Apache Traffic Server Extensible Host Resolution at ApacheCon NA 2014 Speaker Alan M. Carroll, Apache Member, PMC Started working on Traffic Server in summer 2010. Implemented Transparency, IPv6, range

More information

REPUTATION-BASED MAIL FLOW CONTROL

REPUTATION-BASED MAIL FLOW CONTROL WHITE PAPER REPUTATION-BASED MAIL FLOW CONTROL Blocking Extreme Spam and Reducing False Positives Blocking unsolicited commercial email or spam is an increasingly important but difficult task for IT staff.

More information

Copyright 2013 http://itfreetraining.com

Copyright 2013 http://itfreetraining.com Globalnames allow a domain name as short as.apple,.xbox and.intranet to be used. This video looks at how to configure Windows DNS to use names like these on your internal network and also how global names

More information

DNS Root NameServers

DNS Root NameServers DNS Root NameServers An Overview Dr. Farid Farahmand Updated: 9/24/12 Who- is- Who! Over half million networks are connected to the Internet 5 billion users by 2015! Network numbers are managed by ICANN

More information

BB2798 How Playtech uses predictive analytics to prevent business outages

BB2798 How Playtech uses predictive analytics to prevent business outages BB2798 How Playtech uses predictive analytics to prevent business outages Eli Eyal, Playtech Udi Shagal, HP June 13, 2013 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained

More information

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011 The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

Glossary of Technical Terms Related to IPv6

Glossary of Technical Terms Related to IPv6 AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid

More information

Enterprise Buyer Guide

Enterprise Buyer Guide Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight

More information

OpenSRS Email Service DNS Configuration Guide

OpenSRS Email Service DNS Configuration Guide OpenSRS Email Service DNS Configuration Guide September 18, 2008 Table of Contents DNS Configuration...3 Types of DNS records...3 Email Exchange (MX) records...3 Canonical Name (CNAME) records...4 Example

More information

Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)

Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2

More information

Transforming the Internet: from IPv4 to IPv6

Transforming the Internet: from IPv4 to IPv6 2009/TEL40/DSG/WKSP/016 Agenda Item: Transforming the Internet: from IPv4 to IPv6 Purpose: Information Submitted by: APNIC Workshop on IPv6: Facing the Future of Internet Cancun, Mexico 24 September 2009

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

DNS Rex Do you need an aggressive benchmark?

DNS Rex Do you need an aggressive benchmark? DNS Rex Do you need an aggressive benchmark? Alex Rousskov The Measurement Factory DNS Rex At a Glance A performance test tool for DNS resolvers. Born 2009 A.D. (Cenozoic Era). Designed to intimidate powerful

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

Firewall Configuration. Firewall Configuration. Solution 9-314 1. Firewall Principles

Firewall Configuration. Firewall Configuration. Solution 9-314 1. Firewall Principles Configuration Configuration Principles Characteristics Types of s Deployments Principles connectivity is a common component of today s s networks Benefits: Access to wide variety of resources Exposure

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3

More information

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

A versatile platform for DNS metrics with its application to IPv6

A versatile platform for DNS metrics with its application to IPv6 A versatile platform for DNS metrics with its application to IPv6 Stéphane Bortzmeyer AFNIC bortzmeyer@nic.fr RIPE 57 - Dubai - October 2008 1 A versatile platform for DNS metrics with its application

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

Monitoring Windows Event Logs

Monitoring Windows Event Logs Monitoring Windows Event Logs Monitoring Windows Event Logs Using OpManager The Windows event logs are files serving as a placeholder of all occurrences on a Windows machine. This includes logs on specific

More information

WHAT SERVICES ARE ACCESSIBLE VIA IPV6? Mark Prior Liaison Asia Pacific Research & Education Community Juniper Networks

WHAT SERVICES ARE ACCESSIBLE VIA IPV6? Mark Prior Liaison Asia Pacific Research & Education Community Juniper Networks WHAT SERVICES ARE ACCESSIBLE VIA IPV6? Mark Prior Liaison Asia Pacific Research & Education Community Juniper Networks WHO CARES? Majority of users think the Web is the Internet Will care if Google doesn

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

OVERVIEW OF THE DNS AND GLOSSARY OF TERMS

OVERVIEW OF THE DNS AND GLOSSARY OF TERMS OVERVIEW OF THE DNS AND GLOSSARY OF TERMS OVERVIEW OF THE DNS AND GLOSSARY OF TERMS The DNS is a technology that most IT managers don t think much about; it works well and usually does not require much

More information

DNS Record Injection Vulnerabilities in Home Routers

DNS Record Injection Vulnerabilities in Home Routers DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp, Tom Callahan, Michael Rabinovich, Mark Allman Case Western Reserve University International Computer Science Institute 1 Attacks targeting

More information

OVERVIEW OF THE DNS AND GLOSSARY OF TERMS

OVERVIEW OF THE DNS AND GLOSSARY OF TERMS PROTECT YOUR BUSINESS D-Zone Anycast DNS Service OVERVIEW OF THE DNS AND GLOSSARY OF TERMS 1 PROTECT YOUR BUSINESS OVERVIEW OF THE DNS AND GLOSSARY OF TERMS The DNS is a technology that most IT managers

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

Network Layers. CSC358 - Introduction to Computer Networks

Network Layers. CSC358 - Introduction to Computer Networks Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

Copyright 2012 http://itfreetraining.com

Copyright 2012 http://itfreetraining.com In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the

More information

GURL. Reverse. Geolocation. Using. Lookup

GURL. Reverse. Geolocation. Using. Lookup GURL Geolocation Using Reverse Lookup GURL: status Current Status: This is the first presentation of GURL. YOU are the guinea pig audience. IETF status: none. IDs: none Why am I here? Because I want your

More information

TEAL: Transparent Email Archiving Library

TEAL: Transparent Email Archiving Library TEAL: Transparent Email Archiving Library 1. Users send & receive email as per normal 2. Existing customer filters remove spam & viruses Filters (Spam, Anti-Virus) 3. Interceptor agent takes a copy of

More information