Hitachi Protection Platform S-Series

Size: px
Start display at page:

Download "Hitachi Protection Platform S-Series"

Transcription

1 Hitachi Protection Platform S-Series Network Performance Data Collection Rev 1.1 ZZ-99HPP999-99

2 2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. and Hitachi Data Systems Corporation (hereinafter referred to as Hitachi ). Hitachi, Ltd. and Hitachi Data Systems reserve the right to make changes to this document at any time without notice and assume no responsibility for its use. Hitachi, Ltd. and Hitachi Data Systems products and services can only be ordered under the terms and conditions of Hitachi Data Systems' applicable agreements. All of the features described in this document may not be currently available. Refer to the most recent product announcement or contact your local Hitachi Data Systems sales office for information on feature and product availability. Notice: Hitachi Data Systems products and services can be ordered only under the terms and conditions of Hitachi Data Systems applicable agreements. The use of Hitachi Data Systems products is governed by the terms of your agreements with Hitachi Data Systems. By using this software, you agree that you are responsible for: 1. Acquiring the relevant consents as may be required under local privacy laws or otherwise from employees and other individuals to access relevant data; and 2. Verifying that data continues to be held, retrieved, deleted, or otherwise processed in accordance with relevant laws. Hitachi is a registered trademark of Hitachi, Ltd. in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi in the United States and other countries. All other trademarks, service marks, and company names are properties of their respective owners. Export authorization is required for Data At Rest Encryption. Import/Use regulations may restrict export of the S-Series platform to certain countries: China S-Series is eligible for import but the License Key and encryption may not be sent to China France Import pending completion of registration formalities Hong Kong Import pending completion of registration formalities Israel Import pending completion of registration formalities ii

3 Table of Contents Introduction... 1 Testing/Evaluation prerequisite... 1 Capturing session output for later review... 1 Grading network performance... 2 Data Gathering... 3 Basic data gathering... 3 Using sar and scp... 4 Using iperf... 6 Using Graphical-based tools... 9 Network triage Bonding issues Firewalls Potential duplicate IP address End-to-end connectivity Appendix A: CLI command usage statements ping tracepath iftop iperf ethtool nethogs net_perf_mon Appendix B: Installing iperf Appendix C: Bonding modes Appendix D: Tools iii

4 iv

5 1 1 Introduction This documents provides a list of tests and procedures which should be run on each HPP system at the site to gather networking-related performance statistics. This document is intended for personnel who assist in installing, maintaining, and managing the HPP platform in the backup environment. Testing/Evaluation prerequisite As a pre-cursor to performing any of this testing, a network diagram at both the LAN and WAN level should be provided by the customer. The diagram should list all IP addresses of the HPP s and media servers as well as their DNS names. Capturing session output for later review Most (if not all) of the tests outlined in this document should be run from a Secure Shell (SSH) session, usually via the putty application. To allow a Global Support engineer to review the data for analysis at a later time, it is required that all session output be captured to a file on a local desktop. To effect the capture with the putty SSH application, use the following steps: 1) Bring up the main putty window (not a session window) 2) On the Category: tree, click on Session Logging. 3) Under Session logging:, click on the radio button All session output. 4) Select a log file name. The default is putty.log but it is advisable to use a unique name. Be aware, if an existing putty.log file exists on your desktop it will be overwritten, not appended. 1

6 5) On the Category: tree, click on Session, connect to your target system, and run the procedure. 6) When the session is complete get the putty.log file from your desktop and archive it for analysis. Grading network performance In general terms, network performance can be gauged based on the average percentage of line rate achieved in the tests: Ratings apply to one LAN and no more than two interconnecting switches. % Line Rate MB/sec Grade Min Max 1Gb network 10 Gb network A B C D F <75 <750 Any connections that would receive an F grade should be investigated by the customer s networking team and improved or at least satisfactorily explained. Any connections that would receive a D grade should be reviewed by the customer s networking team for any possible improvements. 2 2

7 2 3 Data Gathering This section specifies a number of methods that can be used to gather network performance data on HPP systems: Via a combination of the Linux sar and scp commands Via the public domain tool iperf Via a graphical-based tool In addition, a set of basic commands should be run to document the current configuration of the networking subsystem on the HPP system. Basic data gathering The following are a set of basic commands to document the current configuration of the networking subsystem on the HPP system. Steps: 1. Retrieve a full listing of the Ethernet devices: ifconfig a 2. Retrieve the kernel interface table for all bonds and interfaces: netstat i 3. Retrieve the state of all IP sockets netstat a more 4. Retrieve per-networking-protocol statistics netstat s more 5. Retrieve all active networking connections netstat o more 3

8 6. Retrieve the address resolution protocol (ARP) table arp a more 7. Retrieve the routing tables route 8. Check for TCP and UDP connection issues netstat tnp 9. Retrieve network interface statics ethtool s eth# Using sar and scp The system activity recorder ( sar ) and secure copy ( scp ) can be used together for simple tests over LAN (and WAN, where applicable) links to media servers. On the source HPP system, use SCP to transfer a file over the desired ethx port and measure performance from the app. For example, run the SCP test from node0 s replication IP on HPP system A to node0 s replication IP on HPP system B. Continue with all slave node s that are configured for I/O. Steps: NOTE: If running SCP to Windows Servers you must install an SCP compliant tool such as WindowSCP from a freeware site Generate a 500MB data file: dd if=/dev/zero of=/shm/dev/scptemp bs=1024 count=500k This will create the 500MB data file in a RAM disk. This will allow us to avoid the read latency of an on-disk data file during the transfer part of the test. 2. On the target, run the following to measure performance throughput on all eth# replication-duplication ports for each node. sar n DEV 1 This will display networking statistics ( -n ) once every second ( 1 ) for each networking DEV ice (i.e., each NIC). 3. Use SCP to copy and measure throughput: scp /dev/shm/scptemp root@remoteipaddress:/dev/null 4

9 Run this test from node0 and all processing nodes configured for I/O. If you notice a stall status from SCP then that may indicate a problem with the customer s network. 4. Watch the sar output on the target system s processing nodes. Pay attention to the rxkb/s (Received KBs) field. For example, if using mahpp01 as the source HPP system and mahpp02 as the remote HPP system, communicating over a 10Gb NIC (eth4 on both systems): MAHPP01 [root@mahpp01 ~]# dd if=/dev/zero of=/dev/shm/scptemp bs=1024 count=500k records in records out bytes (524 MB) copied, seconds, 1.3 GB/s [root@mahpp01 ~]# df k [root@mahpp01 ~]# scp /dev/shm/scptemp root@ :/dev/null scptemp 100% 500MB 62.5MB/s 00:08 [root@mahpp01 ~]# MAHPP02 [root@mahpp02 ~]# sar -n DEV 1 grep eth4 IFACE rxpck/s txpck/s rxkb/s txkb/s rxcmp/s txcmp/s rxmcst/s 15:50:03 eth :50:04 eth :50:05 eth : 15:51:07 eth :51:08 eth :51:09 eth :51:10 eth :51:11 eth :51:12 eth :51:13 eth :51:14 eth :51:15 eth :51:16 eth :51:17 eth :51:18 eth This shows a network speed of 62.5MB/sec (or 500Mb/sec) [ignoring the first and last statistics since they are most likely partial] on a single connection. Multiple, simultaneous runs of scp can be used to achieve higher bandwidth. For example, twenty (20) simultaneous scp s were able to transfer data at an approximate combined transfer rate of 770MB/sec (6160Mb/sec). 5

10 Using iperf iperf always uses port You can use the IP address of the remote HPP system or the media servers you want to test to as a target. The minimum test should be from each HPP node to the corresponding HPP node across the WAN. So from site A node0 run iperf to site B node0 and again in the reverse order so performance can be compared bi-directionally. Continue the same methodology for site A node1 run iperf to site B node1 and so forth. iperf must be installed on each processing node of an HPP system. iperf requires that it be run with the -s option for the server side use and with the -c for the client side use. NOTES: 1) The iperf64 obtained from the FTP site is compiled for to be run on the HPP appliance (ie. a 64-bit RedHat-based Linux OS). Other OS s will have to be compiled separately. (Windows, SUSE, AIX, etc.) 2) An iperf server process can handle only one connection at a time. You can not run parallel iperf tests to the same server process. For reference on iperf see the following: Steps: 1. Install iperf on each node the HPP system. See Appendix B for instructions. 2. On all processing nodes of the HPP system, you must temporarily shut down the firewall: service iptables stop 3. Start the iperf server process on all nodes. First run the command on node0 (the master node). Then ssh into each of the other processing nodes from node0 and run the same command: nohup iperf64 s & 4. On all processing nodes, run iperf in client mode, specifying the IP address of each processing node of the remote HPP system: /root/iperf64 c destinationipaddress i 1 For example: /root/iperf64 c i 1 If you want to monitor for network errors, use: sar -n EDEV 1 6

11 5. Once testing is complete, on each node of both HPP systems: a. Find the iperf server process with the following: ps ef grep iperf b. Kill the process: kill -9 pid 6. On all processing nodes of the HPP system, restart the firewall: service iptables start Examples: -c~]#./iperf64 c Client connecting to , TCP port 5001 TCP window size: 8.34 MByte (default) [ 3] local port connected with port 5001 [ 3] sec 9.90 GBytes 8.50 Gbits/sec [root@dcd01-sept01 ~]# Print stats every seconds continuosly: [root@dcd01-sept02 ~]#./iperf64 -c i Client connecting to , TCP port 5001 TCP window size: 8.34 MByte (default) [ 3] local port connected with port 5001 [ 3] sec 635 MBytes 5.32 Gbits/sec [ 3] sec 663 MBytes 5.56 Gbits/sec [ 3] sec 767 MBytes 6.44 Gbits/sec [ 3] sec 841 MBytes 7.06 Gbits/sec [ 3] sec 867 MBytes 7.27 Gbits/sec [ 3] sec 895 MBytes 7.51 Gbits/sec [ 3] sec 868 MBytes 7.28 Gbits/sec [root@dcd01-sept02 ~]# 7

12 Change TCP window size from OS default to 512KB, print stats every 5 seconds for 60 seconds (1 minute). [root@node1 systest]#./iperf64 -c w i 5 -t Client connecting to , TCP port 5001 TCP window size: 1.00 MByte (WARNING: requested 512 KByte) [ 3] local port connected with port 5001 [ 3] sec 4.31 GBytes 7.40 Gbits/sec [ 3] sec 4.71 GBytes 8.08 Gbits/sec [ 3] sec 5.09 GBytes 8.74 Gbits/sec [ 3] sec 4.46 GBytes 7.66 Gbits/sec [ 3] sec 4.65 GBytes 7.99 Gbits/sec [ 3] sec 4.91 GBytes 8.44 Gbits/sec [ 3] sec 4.83 GBytes 8.29 Gbits/sec [ 3] sec 5.06 GBytes 8.69 Gbits/sec [ 3] sec 4.94 GBytes 8.49 Gbits/sec [ 3] sec 5.16 GBytes 8.87 Gbits/sec [ 3] sec 4.77 GBytes 8.20 Gbits/sec [ 3] sec 4.90 GBytes 8.42 Gbits/sec [ 3] sec 57.8 GBytes 8.27 Gbits/sec [root@node1 systest]# 8

13 Using Graphical-based tools The following lists a number of more advanced routines, some productspecific which can be run to gather additional information to be used as part of the triage process. It should be noted, though, that these tools are realtime tools that will require a screen shot to record properly. Steps: 1. Monitor interface statistics in real time: nethogs m This tool is very useful with the m flag switch that will show you totals received and rate in KB/s. 2. Displays a real time graph showing network performance net_perf_mon 3. Displays display bandwidth usage on an interface by host iftop n N p -P i interface 9

14 10

15 3 Network triage This section details some data-gathering steps for issues involving: Network interface bonding Communications through firewalls Potential duplicate IP addresses Basis end-to-end connectivity Bonding issues The HPP system has 5 predefined potential NIC bonding scenarios: Name Devices Description Mode bond0 eth2/eth3 HPP s private backend network (not used on S1500 systems) 1/ active-backup bond1 eth4/eth5 (legacy) eth8/eth9 (HPP) 10Gb NIC ports 4/LACP bond2 eth4/eth5 ports 1 and 2 of quad-1gb NIC 4/LACP bond3 eth6/eth7 ports 3 and 4 of quad-1gb NIC 4/LACP bond4 eth4/eth5/eth6/eth7 all four ports of quad-1gb NIC 4/LACP If a bonding issue is suspected the following commands should help to determine the configuration. 11

16 Steps: 1. Check the current OS settings for the bond: cat /proc/net/bonding/bond# i. Verify the bonding mode matches what is in the table above. ii. iii. Verify the speed and duplex of the slave interfaces match Verify that the MII status is up. 2. Check the configured settings for the bond: cat /etc/sysconfig/network-scripts/ifcfg-bond# Verify the bonding mode matches what is in the table above. 3. Check the ARP table: arp e v 4. Check the individual link statuses of the bond and its slave NICs: ip link show bond# ; ip link show nic1 ; ip link show nic2 For example, assume we have an issue around the bonded 10Gb NIC ports of a G8 processing node (where the 10Gb ports are eth8 and eth9 ): [root@mahpp01 bonding]# cat /proc/net/bonding/bond1 Ethernet Channel Bonding Driver: v3.7.0 (June 2, 2010) Bonding Mode: fault-tolerance (active-backup) Primary Slave: eth2 (primary reselect always) Currently Active Slave: eth2 MII Status: up MII Polling Interval (ms): 100 Up Delay (ms): Down Delay (ms): 0 Slave Interface: eth8 MII Status: up Speed: 1000 Mbps Duplex: full Link Failure Count: 0 Permanent HW addr: ac:16:2d:78:af:da Slave queue ID: 0 Slave Interface: eth9 MII Status: up Speed: 1000 Mbps Duplex: full Link Failure Count: 0 Permanent HW addr: ac:16:2d:78:af:db Slave queue ID: 0 [root@mahpp01 bonding]# [root@mahpp01 ~]# cat /etc/sysconfig/network-scripts/ifcfg-bond1 DEVICE=bond1 12

17 BOOTPROTO=static IPADDR= NETMASK= ONBOOT=YES BONDING_OPTS="mode=4 ad_select=bandwidth lacp_rate=fast xmit_hash_policy=layer3+4 miimon=100 updelay=45000" ~]# ~]# arp -e -v Address HWtype HWaddress Flags Mask Iface dvmnode ether 00:23:7d:34:87:08 C bond ether 50:57:a8:5a:11:c5 C eth0 Entries: 2 Skipped: 0 Found: 2 [root@mahpp01 ~]# [root@mahpp01 ~]# ip link show bond1 ; ip link show eth8 ; ip link show eth9 15: bond1: <BROADCAST,MULTICAST,MASTER> mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 13: eth8: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000 link/ether 10:60:4b:94:c3:38 brd ff:ff:ff:ff:ff:ff 14: eth9: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000 link/ether 10:60:4b:94:c3:3c brd ff:ff:ff:ff:ff:ff [root@mahpp01 ~]# Firewalls The ability for communications between the HPP system and other HPP systems at the site as well as between the HPP and other customer systems (e.g., Netbackup media servers), must be tested for. The typical ports to test for are: 22 Secure-Shell (ssh) 80 HPP GUI (http) 443 HPP GUI (secure http) 5562 OST master service 5564 OST I/O service Version 8.1 and later Use the nc to test that all required TCP ports are open through any firewalls that may exist between the HPP system(s) and other network hosts: nc v z w 5 destinationipaddress port# For example, to test that the ssh port is open: [root@mahpp01 ~]# nc v z w Connection to port [tcp/ssh] succeeded! [root@mahpp01 ~]# 13

18 Version 8.0 and earlier Use telnet to test that all required TCP ports are open through any firewalls that may exist between the HPP system(s) and other network hosts: telnet destinationipaddress port# When the command is successful, it will appear to hang; it s actually waiting for input. In some cases (e.g., port 80 [ssh]), simply hitting the Enter key should be enough to cause the command to exit (in ssh s case, with an expected protocol mismatch error message). For others, it may be necessary to type Ctrl-C or Ctrl-D to get telnet to terminate. When the command is NOT successful, it should return almost immediately with an error. For example, this shows a successful test that the ssh port is open: [root@mahpp01 ~]# telnet Trying Connected to Escape character is '^]'. SSH-2.0-OpenSSH_5.4 Protocol mismatch. Connection closed by foreign host. [root@mahpp01 ~]# The following shows two failed tests: [root@mahpp02 ~]# telnet Trying telnet: connect to address : No route to host [root@mahpp02 ~]# ping -c PING ( ) 56(84) bytes of data. From icmp_seq=1 Destination Host Unreachable From icmp_seq=2 Destination Host Unreachable From icmp_seq=3 Destination Host Unreachable ping statistics packets transmitted, 0 received, +3 errors, 100% packet loss, time 1999ms, pipe 3 [root@ mahpp02 ~]# telnet Trying telnet: connect to address : Connection refused [root@mahpp02 ~]# ping -c PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=64 time=0.134 ms 64 bytes from : icmp_seq=2 ttl=64 time=0.153 ms 64 bytes from : icmp_seq=3 ttl=64 time=0.154 ms ping statistics packets transmitted, 3 received, 0% packet loss, time 1999ms rtt min/avg/max/mdev = 0.134/0.147/0.154/0.009 ms [root@mahpp02 ~]# 14

19 Potential duplicate IP address If there are unexplained network issues using the regular methods listed above there may be a duplicate IP address in the network. To check for that condition do the following: Steps: 1. Run the arping command: arping -D -I eth# -c 2 ipaddress ; echo $? where ipaddress is the IP address you want to check for duplicate IP s on, -c # is the number of probes to be sent (in this case 2 ), and -Iand should be the one assigned to the port 2. Examine the return/exit value of arping (i.e., the shell variable '$?'): 0 = no duplication 1 = duplicated: For example, assume we suspect that the IP address assigned to eth0 of processing node #1 is duplicated someplace else on the customer s network. The following would be run on NODE1: [root@node1 ~]# ifconfig eth0 eth0 Link encap:ethernet HWaddr D4:85:64:78:2B:58 inet addr: Bcast: Mask: inet6 addr: fe80::d685:64ff:fe78:2b58/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets: errors:0 dropped:0 overruns:0 frame:0 TX packets:9076 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes: (30.3 MiB) TX bytes: (666.6 KiB) Interrupt:16 Memory:f f [root@node1 ~]# arping -D -I eth0 -c ; echo $? ARPING from eth0 Sent 2 probes (2 broadcast(s)) Received 0 response(s) 0 [root@node1 ~]# In this case, the address is NOT duplicated. 15

20 End-to-end connectivity Use ping to test basic end-to-end connectivity. Any excessively high values need to be investigated. But note that the definition of excessively high values will depend on the network topology and whether the test is running over LAN links and/or WAN links. If any of the pings fail: Verify with the customer the IP address and/or DNS-resolvable host name used Use the tracepath utility to see where things may be failing For example, ~]# ping -c PING ( ) 56(84) bytes of data. From icmp_seq=3 Destination Net Unreachable ping statistics packets transmitted, 0 received, +1 errors, 100% packet loss, time 2000ms [root@mahpp01 ~]# tracepath : ( ) 0.292ms pmtu : ( ) 0.715ms 2: ( ) 2.222ms 3: no reply 4: ( ) asymm ms!N Resume: pmtu 1500 [root@mahpp01 ~]# Steps: 1. Verify that a default gateway has been configured: route n 2. Ping the default gateway using the IP address. 3. Verify that DNS server(s) are defined: cat /etc/resolv.conf 4. Ping the DNS servers. 5. If the HPP system will be replicating to another HPP system, a. Obtain from the customer the IP address and host name (resolvable by DNS) of that other HPP system b. Ping the IP address of that other system c. Ping the DNS-resolvable host name of the other HPP system d. Repeat step 5 on the other HPP system using this HPP system s IP address and DNS-resolvable host name. 16

21 6. If the Symantec Netbackup (NBU) Open-Storage Technology (OST) protocol will be used to communicate with the HPP system: a. Obtain from the customer the IP address and host name (resolvable by DNS) of all NBU servers that will communicate with the HPP system via OST b. ping the IP address of each NBU server c. ping the DNS-resolvable host name of each NBU server For example: Verify gateway configured ~]# route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface UG eth U bond U eth U eth U eth U eth7 [root@karloff ~]# In this case, a default gateway is configured and its IP address is: Ping gateway [root@karloff ~]# ping -c PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=255 time=0.697 ms 64 bytes from : icmp_seq=2 ttl=255 time=0.687 ms 64 bytes from : icmp_seq=3 ttl=255 time=1.11 ms 64 bytes from : icmp_seq=4 ttl=255 time=0.655 ms 64 bytes from : icmp_seq=5 ttl=255 time=0.665 ms ping statistics packets transmitted, 5 received, 0% packet loss, time 4001ms rtt min/avg/max/mdev = 0.655/0.763/1.115/0.179 ms [root@karloff ~]# Verify DNS servers configured [root@karloff ~]# cat /etc/resolv.conf domain sepaton.com search sepaton.com sangate.com nameserver nameserver [root@karloff ~]# In this case, two DNS servers are configured and their IP addresses are: and Ping DNS server [root@karloff ~]# ping -c PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=63 time=0.172 ms 64 bytes from : icmp_seq=2 ttl=63 time=0.179 ms 64 bytes from : icmp_seq=3 ttl=63 time=0.184 ms 64 bytes from : icmp_seq=4 ttl=63 time=0.165 ms 64 bytes from : icmp_seq=5 ttl=63 time=0.152 ms ping statistics packets transmitted, 5 received, 0% packet loss, time 4000ms rtt min/avg/max/mdev = 0.152/0.170/0.184/0.016 ms [root@karloff ~]# Ping OST storage server 17

22 ~]# ping -c 5 ssdnaught10gn0 PING ssdnaught10gn0 ( ) 56(84) bytes of data. 64 bytes from ssdnaught10gn0 ( ): icmp_seq=1 ttl=64 time=0.221 ms 64 bytes from ssdnaught10gn0 ( ): icmp_seq=2 ttl=64 time=0.153 ms 64 bytes from ssdnaught10gn0 ( ): icmp_seq=3 ttl=64 time=0.170 ms 64 bytes from ssdnaught10gn0 ( ): icmp_seq=4 ttl=64 time=0.182 ms 64 bytes from ssdnaught10gn0 ( ): icmp_seq=5 ttl=64 time=0.163 ms --- ssdnaught10gn0 ping statistics packets transmitted, 5 received, 0% packet loss, time 4000ms rtt min/avg/max/mdev = 0.153/0.177/0.221/0.028 ms [root@karloff ~]# ping -c PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=1 ttl=64 time=0.213 ms 64 bytes from : icmp_seq=2 ttl=64 time=0.153 ms 64 bytes from : icmp_seq=3 ttl=64 time=0.149 ms 64 bytes from : icmp_seq=4 ttl=64 time=0.125 ms 64 bytes from : icmp_seq=5 ttl=64 time=0.156 ms ping statistics packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.125/0.159/0.213/0.030 ms [root@karloff ~]# Ping NBUE media server [root@karloff ~]# ping -c 5 sylvester PING sylvester ( ) 56(84) bytes of data. 64 bytes from sylvester ( ): icmp_seq=1 ttl=64 time=2.03 ms 64 bytes from sylvester ( ): icmp_seq=2 ttl=64 time=0.419 ms 64 bytes from sylvester ( ): icmp_seq=3 ttl=64 time=0.314 ms 64 bytes from sylvester ( ): icmp_seq=4 ttl=64 time=0.219 ms 64 bytes from sylvester ( ): icmp_seq=5 ttl=64 time=0.381 ms --- sylvester ping statistics packets transmitted, 5 received, 0% packet loss, time 4000ms rtt min/avg/max/mdev = 0.219/0.674/2.039/0.686 ms [root@karloff ~]# 18

23 A Appendix A: CLI command usage statements ping Usage: ping [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [-p pattern] [-s packetsize] [-t ttl] [-I interface or address] [-M mtu discovery hint] [-S sndbuf] [ -T timestamp option ] [ -Q tos ] [hop1...] destination tracepath Usage: tracepath [-nc] <destination>[/<port>] iftop iftop: display bandwidth usage on an interface by host Synopsis: iftop -h [-npbbp] [-i interface] [-f filter code] [-N net/mask] -h display this message -n don't do hostname lookups -N don't convert port numbers to services -p run in promiscuous mode (show traffic between other hosts on the same network segment) -b don't display a bar graph of traffic -B Display bandwidth in bytes -i interface listen on named interface -f filter code use filter code to select packets to count (default: none, but only IP packets are counted) -F net/mask show traffic flows in/out of network -P show ports as well as hosts -m limit sets the upper limit for the bandwidth scale -c config file specifies an alternative configuration file iftop, version 0.17 copyright (c) 2002 Paul Warren <pdw@ex-parrot.com> and contributors 19

24 iperf Usage: iperf [-s -c host] [options] iperf [-h --help] [-v --version] Client/Server: -f, --format [kmkm] format to report: Kbits, Mbits, KBytes, MBytes -i, --interval # seconds between periodic bandwidth reports -l, --len #[KM] length of buffer to read or write (default 8 KB) -m, --print_mss print TCP maximum segment size (MTU - TCP/IP header) -o, --output <filename> output the report or error message to this specified file -p, --port # server port to listen on/connect to -u, --udp use UDP rather than TCP -w, --window #[KM] TCP window size (socket buffer size) -B, --bind <host> bind to <host>, an interface or multicast address -C, --compatibility for use with older versions does not sent extra msgs -M, --mss # set TCP maximum segment size (MTU - 40 bytes) -N, --nodelay set TCP no delay, disabling Nagle's Algorithm -V, --IPv6Version Set the domain to IPv6 Server specific: -s, --server -U, --single_udp -D, --daemon run in server mode run in single threaded UDP mode run the server as a daemon Client specific: -b, --bandwidth #[KM] for UDP, bandwidth to send at in bits/sec (default 1 Mbit/sec, implies -u) -c, --client <host> run in client mode, connecting to <host> -d, --dualtest Do a bidirectional test simultaneously -n, --num #[KM] number of bytes to transmit (instead of -t) -r, --tradeoff Do a bidirectional test individually -t, --time # time in seconds to transmit for (default 10 secs) -F, --fileinput <name> input the data to be transmitted from a file -I, --stdin input the data to be transmitted from stdin -L, --listenport # port to recieve bidirectional tests back on -P, --parallel # number of parallel client threads to run -T, --ttl # time-to-live, for multicast (default 1) -Z, --linux-congestion <algo> set TCP congestion control algorithm (Linux only) Miscellaneous: -x, --reportexclude [CDMSV] exclude C(connection) D(data) M(multicast) S(settings) V(server) reports -y, --reportstyle C report as a Comma-Separated Values -h, --help print this message and quit -v, --version print version information and quit [KM] Indicates options that support a K or M suffix for kilo- or mega- The TCP window size option can be set by the environment variable TCP_WINDOW_SIZE. Most other options can be set by an environment variable IPERF_longOptionName, such as IPERF_BANDWIDTH. 20

25 ethtool Usage: ethtool DEVNAME Display standard information about device ethtool -s --change DEVNAME Change generic options [ speed ] [ duplex half full ] [ port tp aui bnc mii fibre ] [ autoneg on off ] [ advertise %%x ] [ phyad %%d ] [ xcvr internal external ] [ wol p u m b a g s d... ] [ sopass %%x:%%x:%%x:%%x:%%x:%%x ] [ msglvl %%d ] ethtool -a --show-pause DEVNAME Show pause options ethtool -A --pause DEVNAME Set pause options [ autoneg on off ] [ rx on off ] [ tx on off ] ethtool -c --show-coalesce DEVNAME Show coalesce options ethtool -C --coalesce DEVNAME Set coalesce options [adaptive-rx on off] [adaptive-tx on off] [rx-usecs N] [rx-frames N] [rx-usecs-irq N] [rx-frames-irq N] [tx-usecs N] [tx-frames N] [tx-usecs-irq N] [tx-frames-irq N] [stats-block-usecs N] [pkt-rate-low N] [rx-usecs-low N] [rx-frames-low N] [tx-usecs-low N] [tx-frames-low N] [pkt-rate-high N] [rx-usecs-high N] [rx-frames-high N] [tx-usecs-high N] [tx-frames-high N] [sample-interval N] ethtool -g --show-ring DEVNAME Query RX/TX ring parameters ethtool -G --set-ring DEVNAME Set RX/TX ring parameters [ rx N ] [ rx-mini N ] [ rx-jumbo N ] [ tx N ] ethtool -k --show-offload DEVNAME Get protocol offload information ethtool -K --offload DEVNAME Set protocol offload [ rx on off ] [ tx on off ] [ sg on off ] [ tso on off ] [ ufo on off ] [ gso on off ] [ gro on off ] ethtool -i --driver DEVNAME Show driver information ethtool -d --register-dump DEVNAME Do a register dump [ raw on off ] [ file FILENAME ] ethtool -e --eeprom-dump DEVNAME Do a EEPROM dump [ raw on off ] 21

26 [ offset N ] [ length N ] ethtool -E --change-eeprom DEVNAME Change bytes in device EEPROM [ magic N ] [ offset N ] [ value N ] ethtool -r --negotiate DEVNAME Restart N-WAY negotation ethtool -p --identify DEVNAME Show visible port identification (e.g. blinking) [ TIME-IN-SECONDS ] ethtool -t --test DEVNAME Execute adapter self test [ online offline ] ethtool -S --statistics DEVNAME Show adapter statistics ethtool -h --help DEVNAME Show this help nethogs usage: nethogs [-V] [-b] [-d seconds] [-t] [-p] [device [device [device...]]] -V : prints version. -d : delay for update refresh rate in seconds. default is 1. -t : tracemode. -b : bughunt mode - implies tracemode. -p : sniff in promiscuous mode (not recommended). device : device(s) to monitor. default is eth0 When nethogs is running, press: q: quit m: switch between total and kb/s mode net_perf_mon Usage: net_perf_mon [options] Options: -?, -h : this help message -W <num> : set history Window to <num> seconds (default 10) -R <num> : set Refresh frequency to <num> seconds (default 3) -N : No Graph. CSV output on each refresh interval. -S <num> : For use with -N. Just take <num> samples, then exit. -X : For use with -N, -S. Use XML output instead of CSV output -M <num> : Mode -o <file> : Output file 22

27 B Appendix B: Installing iperf For a more in depth network performance test use iperf. The file can be obtained from our FTP * server at the following location: ftp.sepaton.com Login: upgrade Password: Upgrade!S3paton Steps: 1. cd /users/upgrade/vtl-tools 2. get iperf.tgz The executable must be loaded on all nodes involved in the testing in /root folder (scp iperf64 root@nodex:/root to all slave nodes. Follow procedure below: 1) SCP copy the iperf.tgz file into the /root directory on each node of the HPP system to be tested. 2) Un-TAR the pst.tgz file: tar zxf pst.tgz 3) Add execute permission to the extracted file chmod a+x /root/iperf64 4) Copy the executable to each processing node in the HPP system: scp iperf64 root@node#:/root For example: scp iperf64 root@node3:/root * At least for as long as the Sepaton FTP is available. Future plans call for all FTP-server-available files to be moved to the HDS TUF server at by the beginning of September

28 24

29 C Appendix C: Bonding modes Modes for the Linux bonding driver (network interface aggregation modes) are supplied as parameters to the kernel bonding module at load time. The behavior of the single logical bonded interface depends upon its specified bonding driver mode. NOTE: HPP systems have been qualified with modes 0, 1, and 4 only. Round-robin (balance-rr) [Linux driver mode 0 ] Transmit network packets in sequential order from the first available network interface (NIC) slave through the last. This mode provides load balancing and fault tolerance. Active-backup (active-backup) [Linux driver mode 1 ] Only one NIC slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. The single logical bonded interface's MAC address is externally visible on only one NIC (port) to avoid distortion in the network switch. This mode provides fault tolerance. XOR (balance-xor) [Linux driver mode 2 ] Transmit network packets based on [(source MAC address XOR'd with destination MAC address) modulo NIC slave count]. This selects the same NIC slave for each destination MAC address. This mode provides load balancing and fault tolerance. Broadcast (broadcast) [Linux driver mode 3 ] Transmit network packets on all slave network interfaces. This mode provides fault tolerance. Taken from Wikapedia page ( 25

30 IEEE 802.3ad Dynamic Link Aggregation (802.3ad) [a.k.a. LACP] (Default mode for HPP system bonds) [Linux driver mode 4 ] Creates aggregation groups that share the same speed and duplex settings. Utilizes all slave network interfaces in the active aggregator group according to the 802.3ad specification. Adaptive transmit load balancing (balance-tlb) [Linux driver mode 5 ] Linux bonding driver mode that does not require any special network-switch support. The outgoing network packet traffic is distributed according to the current load (computed relative to the speed) on each network interface slave. Incoming traffic is received by one currently designated slave network interface. If this receiving slave fails, another slave takes over the MAC address of the failed receiving slave. Adaptive load balancing (balance-alb) [Linux driver mode 6 ] Includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic, and does not require any special network switch support. The receive load balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP Replies sent by the local system on their way out and overwrites the source hardware address with the unique hardware address of one of the NIC slaves in the single logical bonded interface such that different network-peers use different MAC addresses for their network packet traffic. 26

31 D Appendix D: Tools NOTE: The following tools are not preloaded on HPP systems nor available via HDS sites. The links below are provided for references purposes only. Useful freeware can be obtained at the following sources: This tool is great for testing Windows networking performance: This tool will benchmark TCP and UDP performance between 2 hosts. Very useful when trying to determine network performance/latency issues. 27

32 Hitachi Data Systems Corporate Headquarters 2845 Lafayette Street Santa Clara, California U.S.A Regional Contact Information Americas Europe, Middle East, and Africa +44 (0) Asia Pacific A m hds.marketing.apac@hds.com ZZ-99HPP999-99

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

BASIC TCP/IP NETWORKING

BASIC TCP/IP NETWORKING ch01 11/19/99 4:20 PM Page 1 CHAPTER 1 BASIC TCP/IP NETWORKING When you communicate to someone or something else, you need to be able to speak a language that the listener understands. Networking requires

More information

Network Diagnostic Tools. Jijesh Kalliyat Sr.Technical Account Manager, Red Hat 15th Nov 2014

Network Diagnostic Tools. Jijesh Kalliyat Sr.Technical Account Manager, Red Hat 15th Nov 2014 Network Diagnostic Tools Jijesh Kalliyat Sr.Technical Account Manager, Red Hat 15th Nov 2014 Agenda Network Diagnostic Tools Linux Tcpdump Wireshark Tcpdump Analysis Sources of Network Issues If a system

More information

WiFiPerf User Guide 1.5

WiFiPerf User Guide 1.5 WiFiPerf User Guide 1.5 AccessAgility LLC 2012 AccessAgility LLC. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any

More information

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - alvaro@nsrc.org Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands

More information

Introduction to NetGUI

Introduction to NetGUI Computer Network Architectures gsyc-profes@gsyc.escet.urjc.es December 5, 2007 (cc) 2007. Algunos derechos reservados. Este trabajo se entrega bajo la licencia Creative Commons Attribution-ShareAlike.

More information

CELLTRACKS ANALYZER II. Networking Guide J40169EN

CELLTRACKS ANALYZER II. Networking Guide J40169EN CELLTRACKS ANALYZER II Networking Guide J40169EN CELLTRACKS ANALYZER II Networking Guide LBL50902 2014-01-01 J40169EN Proprietary Notice This document discloses subject matter in which Janssen Diagnostics,

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Red Hat Linux Networking

Red Hat Linux Networking The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,

More information

Host Configuration (Linux)

Host Configuration (Linux) : Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support

More information

Hands On Activities: TCP/IP Network Monitoring and Management

Hands On Activities: TCP/IP Network Monitoring and Management Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring

More information

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8. TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure

More information

Linux TCP/IP Network Management

Linux TCP/IP Network Management Linux TCP/IP Network Management Arnon Rungsawang fenganr@ku.ac.th Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok, Thailand.

More information

Get quick control over your Linux server with server commands

Get quick control over your Linux server with server commands Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with

More information

NAS 307 Link Aggregation

NAS 307 Link Aggregation NAS 307 Link Aggregation Set up link aggregation on your ASUSTOR NAS A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding of

More information

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3

More information

1.0 Basic Principles of TCP/IP Network Communications

1.0 Basic Principles of TCP/IP Network Communications Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database

More information

Bridgewalling - Using Netfilter in Bridge Mode

Bridgewalling - Using Netfilter in Bridge Mode Bridgewalling - Using Netfilter in Bridge Mode Ralf Spenneberg, ralf@spenneberg.net Revision : 1.5 Abstract Firewalling using packet filters is usually performed by a router. The packet filtering software

More information

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

Change Log. 2 per vices corporation

Change Log. 2 per vices corporation P E R V I C E S C O R P O R AT I O N C R I M S O N Q U I C K S TA R T G U I D E 2 per vices corporation Change Log 2015-01-06: Rev A: Initial Release 2015-01-12: Rev B: Added SFP+ configuration information.

More information

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab single-host Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works.

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Assalam-u-alaikum, This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Created : Mid 2007 Last updated: Mid 2007 The following link is very nice tutorial

More information

Load Balancing Trend Micro InterScan Web Gateway

Load Balancing Trend Micro InterScan Web Gateway Load Balancing Trend Micro InterScan Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...

More information

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01 vsphere 6.0 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more

More information

Load Balancing McAfee Web Gateway. Deployment Guide

Load Balancing McAfee Web Gateway. Deployment Guide Load Balancing McAfee Web Gateway Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

LotWan Appliance User Guide USER GUIDE

LotWan Appliance User Guide USER GUIDE LotWan Appliance User Guide USER GUIDE Copyright Information Copyright 2014, Beijing AppEx Networks Corporation The description, illustrations, pictures, methods and other information contain in this document

More information

OneCommand NIC Teaming and VLAN Manager

OneCommand NIC Teaming and VLAN Manager OneCommand NIC Teaming and VLAN Manager Version 2.0.3 for Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 User Manual P005238-01A Rev. A One Network. One Company. Connect with Emulex. Copyright

More information

Load Balancing Sophos Web Gateway. Deployment Guide

Load Balancing Sophos Web Gateway. Deployment Guide Load Balancing Sophos Web Gateway Deployment Guide rev. 1.0.9 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

Virtual Systems with qemu

Virtual Systems with qemu Virtual Systems with qemu Version 0.1-2011-02-08 Christian Külker Inhaltsverzeichnis 1 Image Creation 2 1.1 Preparations.................................. 2 1.2 Creating a Disk Image.............................

More information

Hitachi Data Migrator to Cloud Best Practices Guide

Hitachi Data Migrator to Cloud Best Practices Guide Hitachi Data Migrator to Cloud Best Practices Guide Global Solution Services Engineering April 2015 MK-92HNAS045-02 Notices and Disclaimer Copyright 2015 Corporation. All rights reserved. The performance

More information

Load Balancing Bloxx Web Filter. Deployment Guide

Load Balancing Bloxx Web Filter. Deployment Guide Load Balancing Bloxx Web Filter Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org

More information

HOWTO: Set up a Vyatta device with ThreatSTOP in router mode

HOWTO: Set up a Vyatta device with ThreatSTOP in router mode HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Legal Disclaimers. For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical Code.

Legal Disclaimers. For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical Code. ACS5000 Networking Admin Interface Guide 1/21/2015 Legal Disclaimers Federal Communications Commission (FCC) Compliancy This equipment has been tested and found to comply with the limits for a Class B

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking

More information

Multi-site Best Practices

Multi-site Best Practices DS SOLIDWORKS CORPORATION Multi-site Best Practices SolidWorks Enterprise PDM multi-site implementation [SolidWorks Enterprise PDM 2010] [] [Revision 2] Page 1 Index Contents Multi-site pre-requisites...

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015 Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis katsarakis@csd.uoc.gr Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01 CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective

More information

The Barracuda Network Connector. System Requirements. Barracuda SSL VPN

The Barracuda Network Connector. System Requirements. Barracuda SSL VPN Barracuda SSL VPN The Barracuda SSL VPN allows you to define and control the level of access that your external users have to specific resources inside your internal network. For users such as road warriors

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

How To Install Openstack On Ubuntu 14.04 (Amd64)

How To Install Openstack On Ubuntu 14.04 (Amd64) Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

Load Balancing Clearswift Secure Web Gateway

Load Balancing Clearswift Secure Web Gateway Load Balancing Clearswift Secure Web Gateway Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

Load Balancing Barracuda Web Filter. Deployment Guide

Load Balancing Barracuda Web Filter. Deployment Guide Load Balancing Barracuda Web Filter Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

HIGH AVAILABILITY (HA) WITH OPENSIPS

HIGH AVAILABILITY (HA) WITH OPENSIPS HIGH AVAILABILITY (HA) WITH OPENSIPS Setting up the HA Environment Norm Brandinger SIP Transport SIP is able to be transmitted using Multiple Protocols such as: UDP, TCP, or TCP with TLS (SSL) encryption

More information

Load Balancing Microsoft Terminal Services. Deployment Guide

Load Balancing Microsoft Terminal Services. Deployment Guide Load Balancing Microsoft Terminal Services Deployment Guide rev. 1.5.7 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Loadbalancer.org Appliances Supported... 4 Loadbalancer.org

More information

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch By Falko Timme Published: 2009-01-11 19:32 Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch Version 1.0 Author: Falko Timme

More information

Advanced SSH Tunneling by Bill Brassfield, Dev Ops Technical Consultant, Taos

Advanced SSH Tunneling by Bill Brassfield, Dev Ops Technical Consultant, Taos White Paper Advanced SSH Tunneling by Bill Brassfield, Dev Ops Technical Consultant, Taos First, a review of simple TCP SSH tunnels: Forwarding a local TCP port to a remote TCP port: (using the -L option)

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface. Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...

More information

Chapter 2 Connecting the FVX538 to the Internet

Chapter 2 Connecting the FVX538 to the Internet Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Operating System for Ubiquiti EdgeRouters Release Version: 1.4

Operating System for Ubiquiti EdgeRouters Release Version: 1.4 Operating System for Ubiquiti EdgeRouters Release Version: 1.4 Table of Contents Table of Contents Chapter 1: Overview...1 Introduction......................................................................

More information

Firewall Load Balancing

Firewall Load Balancing Firewall Load Balancing 2015-04-28 17:50:12 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Firewall Load Balancing... 3 Firewall Load Balancing...

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

McAfee Asset Manager Sensor

McAfee Asset Manager Sensor Installation Guide McAfee Asset Manager Sensor Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

.Trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Setup Guide

.Trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Setup Guide .Trustwave.com Updated October 9, 2007 Secure Web Gateway Version 11.0 Setup Guide Legal Notice Copyright 2012 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

vsphere Networking vsphere 5.5 ESXi 5.5 vcenter Server 5.5 EN-001074-02

vsphere Networking vsphere 5.5 ESXi 5.5 vcenter Server 5.5 EN-001074-02 vsphere 5.5 ESXi 5.5 vcenter Server 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more

More information

Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide

Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways Deployment Guide rev. 1.4.9 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2 BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts

More information

Load Balancing Smoothwall Secure Web Gateway

Load Balancing Smoothwall Secure Web Gateway Load Balancing Smoothwall Secure Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

ClusterLoad ESX Virtual Appliance quick start guide v6.3

ClusterLoad ESX Virtual Appliance quick start guide v6.3 ClusterLoad ESX Virtual Appliance quick start guide v6.3 ClusterLoad terminology...2 What are your objectives?...3 What is the difference between a one-arm and a two-arm configuration?...3 What are the

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information