Network Design & Install Best Practices Revision 1.1 June 13, 2005

Size: px
Start display at page:

Download "Network Design & Install Best Practices Revision 1.1 June 13, 2005"

Transcription

1 Network Design & Install Best Practices Revision 1.1 June 13, 2005 Aruba Networks 1322 Crossman Ave Sunnyvale, CA

2 Table of Contents Network Design...3 How to use this Guide... 3 Topology... 3 Getting Started... 4 Controller Placement... 4 AP Placement... 5 Topology Recommendations... 7 L3 Connectivity and IP Addressing Schemes... 7 Non-IP Protocols... 7 Wireless User Addressing... 7 Controller Addressing... 8 AP Addressing... 9 VLAN Design Getting Started VLAN Recommendations Building Large Networks with Multiple Controllers Master Mobility Controller Local Mobility Controller Redundancy Port channel VRRP redundancy

3 Network Design This chapter provides a number of guidelines for determining the Layer 1 through Layer 3 design of an Aruba wireless deployment. How to use this Guide This chapter provides an overview of planning and design guidelines for an Aruba wireless deployment. Discussions are divided into the following general topics: Topology L3 Connectivity and IP Addressing Schemes VLAN Design Building Large Networks with Multiple Controllers Redundancy Within each topic is a Getting Started section, a full discussion of the topic, and a set of recommendations. Read the Getting Started section if you are unfamiliar with the technology or problem to be solved and need guidance in what questions to ask. The bulk of each section is a full discussion of possible design choices, with the tradeoffs between each highlighted. Finally, read the Recommendation section for a quick cookie-cutter solution to each problem. The cookie-cutter approach is designed to get a network up and running quickly, and may prove useful for evaluations, trials, and pilots where a full design and analysis is not practical. Topology The Aruba Mobility Controller is designed with the flexibility required by enterprise networks in mind. A number of different network topologies are possible, and some consideration should go into the design and placement of components before installation. At a high level, an Aruba controller requires a way to get user data into the controller typically done through Access Points (APs) and a way to get user data out of the controller into the wired network. This process may require the interaction of both switching and routing processes, inside the controller or external, depending on the design

4 Getting Started Controller Placement In theory, controllers may be attached at any point in the network. In practice, controllers are normally placed either in the wiring closet or in the datacenter. There are advantages and disadvantages to each approach, and an appropriate design should be chosen based on the solution that provides the greatest number of advantages in a given network. A mixed deployment is also possible, with closet controllers handling only dense floors and a datacenter controller handling the rest of the network. Closet Placement When placing controllers in the wiring closet, a direct attachment between the controller and AP is normally possible. Benefits of closet placement include: Ability to direct-attach APs, providing a solution for power and serial connectivity to APs. Smaller outage area in the event of a non-redundant controller failure. Ability to better control broadcast and multicast traffic. A network heavily utilizing IP multicast, for example, may be better served by a closet deployment model from a network efficiency standpoint. The disadvantages to closet placement include: Closet placement normally means more controllers deployed in a network, since there must be at least one controller in each closet. This results in higher capital costs. Redundancy is more difficult to achieve with closet deployments, since a minimum of two controllers must be deployed for each closet to achieve redundancy. Device management requirements can be increased in a closet deployment as a result of there being more devices to manage. A closet deployment model almost always requires either a master Aruba controller or an Aruba NMS in the system. This can lead to increases in operational costs. Mobility can be slower, since a controller-to-controller tunnel must be established each time a client moves from one controller to another. Datacenter Placement As an alternative or supplement to closet placement of controllers, placement in the datacenter or network backbone is also possible. Advantages of datacenter placement include: Ability to terminate a large number of APs in a single location. When highdensity controllers such as the Aruba 5000 are deployed, this results in a capital cost savings by having to purchase fewer controllers

5 Ability to provide cost-effective redundancy. If a single controller is required to support the entire network, then full redundancy can be provided by installing just one additional controller. Device management is simplified by having fewer devices to manage. If a single controller is sufficient for the entire network, that controller can serve as both the master controller and the NMS for the network. This becomes a single point of management for the entire wireless network. High-cost resources are centralized. The expensive portion of the wireless access equipment consists of the encryption hardware, network processor, and memory. If these components are reduced in number and centralized, cost efficiencies can be realized. Mobility is greatly simplified. Because all wireless access for an entire enterprise is centralized in a small number of devices, most roaming happens inside the same controller. Disadvantages to datacenter placement include: A method of powering the APs must somehow be provided. This could be an existing POE switch, a POE injector, the included AC adapter, or an Aruba closet controller performing only POE and L2 switching functions. If serial port access to the AP is also desired, an Aruba closet controller should be deployed. Note that an Aruba controller in the closet does not necessarily require enabling that controller s wireless functions it can operate as a pure L2 controller and be used simply to provide power and serial over Ethernet. Large portions of the wireless network are supported by a single device. If the device is not protected with a redundant controller, a failure could take out most, if not all, of the wireless network. Datacenter deployed controllers supporting large numbers of APs should always be protected by a redundant controller. Broadcast/multicast traffic inefficiencies. If large-scale IP multicast is used, packets will be copied onto closet subnets already, and will be sent a second time for the wireless network. If TKIP is used as an encryption protocol, additional inefficiencies result because the controller must send a separate copy of each multicast packet for each AP. This is less of an issue in highperformance switched networks, but may be more of a concern in lower bandwidth networks. AP Placement The AP is the point in the network where user data typically enters the system. An AP is either logically or physically attached to the controller; in both cases, the AP communicates with the controller using IP. Thus, an AP can function as long as an IP network exists between itself and the Aruba controller. Two options are available when deploying APs, the direct-attach model and the indirect-attach model

6 Direct-Attach AP In the direct-attach AP model, APs connect directly to an Aruba controller over Category 5 cabling. The controller provides power over Ethernet (POE) as well as access to the AP s serial port over the same Cat5 cable. One advantage to the direct-attach model is the ability to provide a slightly greater degree of security on the wired side of the network, since the AP is directly attached to an Aruba controller without passing through any intervening networks. Another, and possibly more important advantage, is the ability to shut down or reboot the AP by controlling its power from the controller. Indirect-Attach AP The indirect-attach AP model is popular because it allows the wireless network to be deployed as a complete overlay to the existing wired network. Most enterprise buildings are already outfitted with Cat5 cabling, and most already have an investment in wiring closet Ethernet controllers. As long as a solution for power exists, the existing network can be used to provide transport for the wireless network. Many enterprises have already deployed POE controllers in wiring closets in order to support voice over IP desk phones, and this POE support can also be used to power wireless access points. One feature that is lost with the indirect-attach AP model is the ability to provide centralized serial port access to the APs. However, the convenience associated with using the existing wired network typically outweighs this disadvantage, especially considering that serial port access to the APs is rarely, if ever, needed

7 Topology Recommendations The indirect-attach model (or overlay model) provides the simplest deployment and greatest redundancy. L3 Connectivity and IP Addressing Schemes To a large extent, the IP addressing scheme determines how the wireless network operates overall. The controller can be deployed in L2 mode, in L3 mode, in a combination of the two, with VLAN tagging or without, and with an external router or without. These factors all have a bearing on the IP addressing scheme and on what type of L3 network connectivity is provided. Non-IP Protocols The Aruba system requires an IP network for transport of data between APs and controllers. This network may consist of simply a number of APs directly-connected to a controller running IP between them. The Aruba system is transparent to non-ip protocols, and will operate just as any learning bridge or controller would operate. Non-IP traffic will not be processed by the Aruba stateful firewall, and will be forwarded according to VLAN boundaries and learned MAC address tables. Non-stateful ACLs may be applied to ports and user roles to permit or deny access to non-ip protocols. The Aruba system has been tested to support AppleTalk, IPX, and NetBEUI. Other protocols have not been specifically tested, but should have no problem functioning as long as they adhere to Ethernet standards. Wireless User Addressing Wireless clients typically associate to the network, are assigned an IP address from a subnet, and forward inter-subnet traffic through a default gateway. Where the user s IP subnet exists and how far it extends into the network is a design consideration. There are two common practices when addressing wireless users. One practice is to extend addressing of the wired network into the wireless domain for example, users associating with an AP on floor 3 will receive an IP address from the floor 3 subnet. This has the advantage of leveraging existing access control lists between different subnets, and works well with closet deployments. The second approach involves dedicating an IP subnet to wireless access that exists only on the wireless portion of the network. This practice greatly simplifies management, since a network manager may look at a client s IP address and immediately know whether or not the client is wireless. This practice also greatly reduces the need to extend VLANs throughout the network, and is the best practice for datacenter-located controllers. An additional consideration involves how inter-subnet traffic will exit the wireless user s subnet in other words, which device acts as the default gateway. One possibility is to use the Aruba controller itself as the default gateway. A second approach involves using an external router as the default gateway, thus putting the Aruba controller in L2 mode. Both approaches are illustrated in the figure below

8 In general, the recommended practice is to use an external router as the default gateway in all but the simplest of networks. ArubaOS today does not support routing protocols, router discovery, WAN interfaces, and a number of other features that standard enterprise-class routers support. For this reason, it is best to allow the Aruba controller to handle wireless functions, and to allow a purpose-built router to handle inter-subnet routing. Controller Addressing An Aruba controller can act as either a L2 switch or as an IP router, or both. Therefore, the controller can be configured with multiple IP addresses. Four types of IP addresses are available on the controller: Loopback Address The loopback address is bound to an internal loopback interface and is not tied to any physical port or logical VLAN. The loopback address is always in an operationally up state, theoretically making it available at all times. Configuration of a loopback address is optional. VLAN Address Each VLAN configured in an Aruba controller be optionally configured with an IP address. This IP address is operationally up whenever at least one physical port in the VLAN is also operationally up. The VLAN IP address can be used as a gateway by external devices; packets directed to the VLAN IP address that - 8 -

9 are not destined for the controller will be forwarded according to the Aruba controller s IP routing table. Controller IP Address The controller IP address is not directly configured on an Aruba controller, but is derived from one of the two previous address types. If a controller is configured with a loopback address, the loopback address is always used as the controller IP address. If a loopback address is not configured, the IP address of the lowestnumbered VLAN is used. Each Aruba controller in the network must have a unique controller IP address. The controller IP address serves many purposes, including the following: o Address used for APs to request a TFTP download of their image o Termination of GRE tunnels originated at APs (in a non-redundant configuration) o Configuration of APs through the PAPI protocol o Termination of VPN tunnels from wireless clients, including PPTP and IPSEC o Controller management through HTTP, HTTPS, and CLI. Management communication is also possible through a VLAN IP address, but communication through the controller IP address is preferred. Note: If a certificate is loaded on the controller for HTTPS, the certificate name should match the controller IP address to avoid certificate warnings from the user s browser. o In a multi-controller network, the controller IP address is used for intercontroller communication o Origination of RADIUS messages, if so configured o Communication with the Aruba NMS VRRP Address In a redundant controller configuration, one or more IP addresses are created that are protected through VRRP. If an active controller fails or becomes isolated from the network because of another device failure, the backup controller will take over service for this IP address. In a redundant configuration, the VRRP address is normally the termination endpoint for GRE tunnels originating from APs, allowing APs to resume communication with a controller after a failure. VRRP is discussed in more detail in the redundancy section of this guide. AP Addressing Because access points communicate with controllers over IP, each AP in the network must have an IP address. This IP address can be either statically configured on each AP, dynamically assigned using DHCP, provided through DHCP options, or discovered through broadcast/multicast. The most common option is to use DHCP. The addressing of an AP has no bearing on the address of wireless users connecting through that AP; user traffic is tunneled from the AP to the controller and processed only at the controller. Therefore, the most common deployment scenario has the APs connected to the existing wired infrastructure. The AP will be assigned an address out of the same DHCP pool that workstations, printers, or other devices will use

10 Once the AP has an IP address, either through static configuration or DHCP, it must contact a controller. Specifically, it must contact the master controller in the network. If there is only one controller in the network, it will always be designated as the master controller. If there are multiple controllers in the network, one of them will be designated as master. The AP can be statically configured with the IP address of the master controller, or it can learn this address by performing a DNS query. The AP boot process is further described in the ArubaOS User s Guide. VLAN Design Typically, VLAN design follows naturally from IP addressing design. VLANs are portbased in an Aruba controller. In addition to physical ports on the controller, each wireless client association constitutes a virtual port with membership in a particular VLAN. VLANs can exist only inside the Aruba controller for separation of traffic, or can extend outside the controller using 802.1q VLAN tagging. Getting Started One of the goals of Aruba s user management process is to determine which VLAN a given client will join. There are a number of ways to achieve this. This process is further documented in the User Segmentation section of the Security Design Guide, but is summarized here: 802.1x Authentication When using 802.1x, authentication takes place before any access to the network is permitted. This means that an IP address is not assigned to the client until after authentication has taken place. When 802.1x is in use, VLAN assignment can be done based on the user s role (or group) assignment learned during the authentication process. This concept is known as Role-Based VLANs. AP Location When AP Location-based VLAN configuration is used, the AP with which the client originally associates determines the VLAN. The client will keep this VLAN as they move to other APs. This concept is known as Location-based VLANs. ESSID Rules may be configured to determine VLAN assignment based on the ESSID with which the client associated. This concept is known as SSID-based VLANs. Default If no other VLAN determination method has been configured, the client will be mapped to VLAN 1, the default VLAN

11 VLAN Recommendations The following recommendations are listed in order of the amount of labor required. 1. A single VLAN provides the simplest operation. 2. Use multiple VLANs where dictated by the external network, or if L2 segmentation of multiple user classes is required. Building Large Networks with Multiple Controllers A multi-controller deployment may be done for many reasons, including large deployments where the number of APs exceeds the capacity of a single controller, networks where closet deployment of controllers was chosen, multi-building campus networks where localization of traffic is desirable, or any other number of reasons. Master Mobility Controller All Aruba deployments require at least one master controller. In smaller networks, the master controller may be the only controller in the network. In larger networks, traffic processing may be split between a master controller and one or more local controllers. To ensure consistent application of policies and seamless roaming, multi-controller networks should all share a common master controller. The master controller in a network is responsible for a number of functions, including: Booting and configuring all APs in the network Providing APs with the address of their local mobility controller WLAN configuration for the entire network Ensuring inter-controller mobility home agent tables are updated on each controller Ensuring consistent user access policies across all controllers RF management for all APs Central consolidation of all wireless intrusion detection events In addition to master controller functions, the master controller can also process user traffic originating with APs. Larger networks may have a standalone master controller that does nothing but master and network management functions. Other smaller networks may have master and traffic processing functionality both enabled on the master controller. A master controller can be replicated for redundancy purposes. See the section on redundancy for more information. Local Mobility Controller The local mobility controller is responsible for terminating and forwarding all traffic from locally-configured access points. To provide this functionality, APs terminate GRE tunnels at the local controller

12 A local controller can be replicated for redundancy purposes. See the section on redundancy for more information. Redundancy Port channel The most basic form of redundancy available on the Aruba controllers is Port Channel or Etherchannel. Not only does configuring a port channel offer higher bandwidth than a single link, but also provides the ability for the logical link to be up and running (albeit at a lower bandwidth) if one of the member links goes down. To configure a Port channel from the CLI, perform the following steps: (config) #interface port-channel 2 (config-channel)#add fastethernet 2/1 (config-channel)#add fastethernet 2/2 This configuration will add fast Ethernet ports 2/1 and 2/2 to the port channel interface 2. The port channel interface switchport (access/trunk mode, member VLANs et al) characteristics can then be configured as one would configure the same for any interface. VRRP redundancy This section provides an overview of different VRRP configurations. For a more complete discussion of redundancy configuration with VRRP, please see the Redundancy Best Practices Design Guide published by Aruba. VRRP configuration There are two parts to the VRRP related configuration. The first part is related to the VRRP protocol on the two redundant controllers themselves. The second part is related to the other Aruba elements of the network that need to communicate with this pair of controllers. The first part of the configuration is explained in detail in the User Guide. The second part of the configuration is different for different scenarios of redundancy. When configuring VRRP to act as a redundant pair of controllers for a set of APs to terminate their GRE tunnels on, the lms-ip of the set of APs needs to be configured as the virtual IP of the VRRP pair. This is illustrated in the examples of local redundancy below as a part of the example topologies section

13 When configuring VRRP for master redundancy, the following must be done: 1. Master redundancy configuration (peer-ip-address and VRRP-VLAN). 2. All the local controllers and APs now should be configured with the Master IP having the value of the Virtual IP of the VRRP ID used for Master redundancy. These are illustrated in the examples of Master redundancy as a part of the example topologies section. AP and Client failover process This section details the exact process by which the APs and the clients transition from the primary controller to the backup controller in the event of a failure. The timeline below shows the events occurring at various times in this process. The figure below shows the general topology for APs connected to a pair of Aruba Controllers. Controllers S1 and S2 are configured to run VRRP on VLAN x and the APs are configured for the lms-ip to be V ip that is the virtual IP configured on the two controllers. Aruba S1 VLAN x Aruba S2 Layer 2/3 network AP LMS IP = V i In the figure above controller S1 is the original Active controller where the APs are terminating their GRE tunnels. Controller S2 is in the Backup state and is receiving VRRP advertisements from S1. In the event of a failure (like the link from S1 to the rest of the network going down), S2 will stop receiving the VRRP advertisements from S1 and will assume the Active state. S2 is now ready to terminate GRE tunnels for this VLAN

14 In the meanwhile, the APs will also be missing heartbeats that they were receiving from S1. After 3 seconds, the AP will turn off their radios (at this point, clients lose their associations). After 6 seconds, the APs will re-bootstrap and will therefore contact the Master to receive their configuration once again. As a part of this configuration, the Master will also provide the LMS-IP to the AP. This LMS-IP would have been configured as the Virtual IP between the redundant pair of controllers S1 and S2. So now when the AP attempts to establish a GRE tunnel with this IP address, it will be communicating with S2 that has assumed this IP address. Once the registration with S2 is complete, the APs will be up and ready to accept clients again. The clients can then reassociate to the AP and will regain connectivity. Normal connectivity Station regains connectivity T 0 T0 + 3 T T 0 +6+x Failure event occurs. Station loses connec tivity 3 missed VRRP advts on Backup, transitions to VRRP master. And 3 missed heartbeats to AP, turns off radio, station loses association AP reboots and contacts Master for config. AP associates with LMS again and ready to accept associations Master redundancy The aim of having a redundant pair of Master controllers is to ensure that any event that causes a loss of connectivity to the Active Master controller does not cause loss of the following functionality of the Master Aruba controller in an Aruba network: 1. Provide configuration to the Local controllers. 2. Provide configuration (if required the image) to the Aruba access points. 3. Serve as a central point of collecting VLAN information to form the Home Agent Table and update it if any changes occur. Configuration This redundancy is provided by using VRRP as the base mechanism. The administrator can configure VRRP on a VLAN on both controllers and deploy the controllers such that

15 they have Layer 2 connectivity on that VLAN. In addition to this, the administrator needs to configure master redundancy for the following two parameters: 1. VRRP-Id that will be used for Master redundancy 2. Peer-IP-address. The one additional configuration item as a part of the VRRP configuration recommended for Master redundancy is the tracking configuration. By use of this configuration, the administrator can configure the controller to raise the VRRP priority on the basis of the duration that the controller has been in the Active state for that VRRP instance. This is advisable to avoid loss of data in the database when there is a transient failure of a Master controller. The other important difference in configuration when Master redundancy is used is that all local controllers and the Access Points are now configured with their Master IP being the Virtual IP of the VRRP instance that will be used for Master redundancy. All databases that are maintained on the Master controller can be synchronized by using the command database synchronize on the Active Master controller. Operation When both the active and backup Master controllers are up and running, the active Master performs all the responsibilities of the Master controller in an Aruba network. The Backup Master receives the global configuration from the Active Master in the same manner as a local controller would. The VRRP instance on the Backup Master detects a failure event when there are three consecutive missed heartbeats on the VRRP instance being used for master redundancy (standard VRRP operation). This causes the backup controller to transition from the Backup State to the Active state and take over all responsibilities of a Master controller. When the original Master controller regains connectivity, it may or may not take back the role of the Active Master depending on how long it was inactive and the configuration for tracking, as explained above

Redundancy Design Best Practices

Redundancy Design Best Practices Redundancy Design Best Practices Revision 1.1 June 13, 2005 Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089 +1 408 227 4500 http://www.arubanetworks.com - 1 - Table of Contents Introduction... 3 Relevant

More information

Aruba Aruba Certification ACMP-6.4 test questions and answers :http://www.it-tests.com/ACMP-6.4.html

Aruba Aruba Certification ACMP-6.4 test questions and answers :http://www.it-tests.com/ACMP-6.4.html IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : ACMP-6.4 Title : Aruba Certified Mobility Professional 6.4 Vendor : Aruba

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Topic 7 DHCP and NAT. Networking BAsics.

Topic 7 DHCP and NAT. Networking BAsics. Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

To configure firewall policies, you must install the Policy Enforcement Firewall license.

To configure firewall policies, you must install the Policy Enforcement Firewall license. 2. Select either the AP Group or AP Specific tab. Click Edit for the AP group or AP name. 3. Under Profiles, select AP to display the AP profiles. 4. Select the AP system profile you want to modify. 5.

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

WAN Failover Scenarios Using Digi Wireless WAN Routers

WAN Failover Scenarios Using Digi Wireless WAN Routers WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another

More information

FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall

FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

CAPsMAN Case Study. Uldis Cernevskis MikroTik, Latvia. MUM Pittsburgh September 2014

CAPsMAN Case Study. Uldis Cernevskis MikroTik, Latvia. MUM Pittsburgh September 2014 CAPsMAN Case Study Uldis Cernevskis MikroTik, Latvia MUM Pittsburgh September 2014 CAPsMAN Features Centralized management of RouterOS APs Dual Band AP support Provisioning of APs MAC and IP Layer communication

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

MS Windows DHCP Server Configuration

MS Windows DHCP Server Configuration MS Windows DHCP Server Configuration Abstract This document describes how to configure option 43 on a Microsoft Windows 2000/2003 DHCP server. This information may be used in an Aruba Networks solution

More information

ArubaOS v2.4. User Guide

ArubaOS v2.4. User Guide ArubaOS v2.4 User Guide TM ArubsOS v2.4: User Guide Copyright Copyright 2005 Aruba Wireless Networks, Inc. All rights reserved. Specifications in this manual are subject to change without notice. Originated

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Wireless Edge Services xl Module 2.0 Update NPI Technical Training June 2007

Wireless Edge Services xl Module 2.0 Update NPI Technical Training June 2007 ProCurve Wireless Edge Services xl Module v.2 Software NPI Technical Training NPI Technical Training Version: 1.5 12 June 2007 2007 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with

More information

Configuring Redundancy

Configuring Redundancy 7 CHAPTER This chapter describes how to configure redundancy and contains these sections: Configuring Fault Tolerance, page 7-1 Configuring HSRP, page 7-5 Configuring Interface and Device Tracking, page

More information

Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER

Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER CHAPTER 5 The following two case studies are provided as reference material for implementing p2p GRE over IPsec designs. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study This

More information

Aruba Remote Access Point (RAP) Networks. Version 8

Aruba Remote Access Point (RAP) Networks. Version 8 Aruba Remote Access Point (RAP) Networks Version 8 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture,

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Configuring the Transparent or Routed Firewall

Configuring the Transparent or Routed Firewall 5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

AP6511 First Time Configuration Procedure

AP6511 First Time Configuration Procedure AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the

More information

TotalCloud Phone System

TotalCloud Phone System TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

The Benefits of Layer 3 Routing at the Network Edge. Peter McNeil Product Marketing Manager L-com Global Connectivity

The Benefits of Layer 3 Routing at the Network Edge. Peter McNeil Product Marketing Manager L-com Global Connectivity The Benefits of Layer 3 Routing at the Network Edge Peter McNeil Product Marketing Manager L-com Global Connectivity Abstract This white paper covers where and when to employ Layer 3 routing at the edge

More information

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 Revision C 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Passive Link State Auto Configuration (A/P)...

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Chapter 4 Management. Viewing the Activity Log

Chapter 4 Management. Viewing the Activity Log Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

Application Note Startup Tool - Getting Started Guide

Application Note Startup Tool - Getting Started Guide Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...

More information

Installation of the On Site Server (OSS)

Installation of the On Site Server (OSS) Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection: Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4

More information

Read all the information in this chapter before upgrading your controllers.

Read all the information in this chapter before upgrading your controllers. Chapter 4 Upgrade Procedures This chapter details software and hardware upgrade procedures. Aruba best practices recommend that you schedule a maintenance window when upgrading your controllers.! CAUTION

More information

Mobility System Software Quick Start Guide

Mobility System Software Quick Start Guide Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring

More information

Network Detector Setup and Configuration

Network Detector Setup and Configuration 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net MODE SYST RPS MASTR STAT SPEDUPLX STACK 1 2 3 4 5 6 7 8 91 0 11 12 1X 2X 11X 12X 13 14 15 16 1718 19 20 2122 23 24 13X

More information

VXLAN Bridging & Routing

VXLAN Bridging & Routing VXLAN Bridging & Routing Darrin Machay darrin@arista.com CHI-NOG 05 May 2015 1 VXLAN VM-1 10.10.10.1/24 Subnet A ESX host Subnet B ESX host VM-2 VM-3 VM-4 20.20.20.1/24 10.10.10.2/24 20.20.20.2/24 Load

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage

More information

Chapter 3 Management. Remote Management

Chapter 3 Management. Remote Management Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

Useful CLI Commands. Contents. Enable Logging

Useful CLI Commands. Contents. Enable Logging Useful CLI Commands Contents Enable Logging... 1 Interface... 3 AP... 4 ARM... 9 User... 11 Client Troubleshooting Typical... 16 Radio Tests (rft)... 16 Windows Client data... 18 Enable Logging (Aruba3200)

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

WiFi Anywhere. Multi Carrier 3G/4G WiFi Router. IntraTec Solutions Ltd www.intratec-uk.com

WiFi Anywhere. Multi Carrier 3G/4G WiFi Router. IntraTec Solutions Ltd www.intratec-uk.com WiFi Anywhere Multi Carrier 3G/4G WiFi Router Contents Packing List... 3 Introduction... 3 Supported USB Modems... 3 Connecting USB Devices... 3 Accessing the Web Interface... 4 Interfaces... 4 Configuring

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

Lab 7-1 Configuring Switches for IP Telephony Support

Lab 7-1 Configuring Switches for IP Telephony Support Lab 7-1 Configuring Switches for IP Telephony Support Learning Objectives Configure auto QoS to support IP phones Configure CoS override for data frames Configure the distribution layer to trust access

More information

OmniAccess Wireless LAN Switching Systems. The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise

OmniAccess Wireless LAN Switching Systems. The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise OmniAccess Wireless LAN Switching Systems The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise Alcatel OmniAccess WLAN switching system changes how 802.11 networks are deployed,

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

How To Configure InterVLAN Routing on Layer 3 Switches

How To Configure InterVLAN Routing on Layer 3 Switches How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions

More information

iseries TCP/IP routing and workload balancing

iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted

More information

M2M Series Routers. Virtual Router Redundancy Protocol (VRRP) Configuration Whitepaper

M2M Series Routers. Virtual Router Redundancy Protocol (VRRP) Configuration Whitepaper Virtual Router Redundancy Protocol (VRRP) Configuration Whitepaper Table of Contents What is VRRP?... 3 VRRP Terminology... 3 Virtual Router... 3 VRRP Instance... 3 Virtual Router ID... 3 Virtual Router

More information

Networking and High Availability

Networking and High Availability yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched

More information

Read Me First for the HP ProCurve Routing Switch 9304M and Routing Switch 9308M

Read Me First for the HP ProCurve Routing Switch 9304M and Routing Switch 9308M Read Me First for the HP ProCurve Routing Switch 9304M and Routing Switch 9308M Contents: Software Updates Are Free! New Software Release 05.0.84 Module Installation Getting Started Your Free Ticket to

More information

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3

More information

Legacy 802.11 Security

Legacy 802.11 Security Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol

More information

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5) FortiGate High Availability Guide FortiGate High Availability Guide Document Version: 5 Publication Date: March 10, 2005 Description: This document describes FortiGate FortiOS v2.80 High Availability.

More information

Networking and High Availability

Networking and High Availability TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured

More information

Avaya WLAN Orchestration System

Avaya WLAN Orchestration System Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos 0215 IS SERIES IP Network Direct System QuikStart Programming Guide 1 4 GHI 2 ABC 5 JKL 3 DEF 6 MNO PRIVACY TRANSFER LIST SETTING 7 PQRS 8 TUV 9 WXYZ ZOOM 0 # WIDE Programming Videos ATTENTION: This is

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

GVRP Overview. Overview

GVRP Overview. Overview 3 GVRP Contents Overview...................................................... 3-2................................................... 3-3 General Operation........................................... 3-4

More information

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has

More information

Introduction to Networking

Introduction to Networking 1 CHAPTER ONE Introduction to Networking Objectives 2.3 Identify common physical network topologies. Star. Mesh. Bus. Ring. Point to point. Point to multipoint. Hybrid 2.7 Explain common logical network

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure

More information

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Topology Objectives Background Configure auto QoS to support IP phones. Configure CoS override for data frames. Configure the distribution

More information

Meraki Stacking. White Paper

Meraki Stacking. White Paper White Paper Meraki Stacking OCTOBER 2015 This document describes the benefits of Meraki Stacking technology and how it can be used to manage a distributed network. In addition, this document will cover

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port 1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

More information

RAP Installation - Updated

RAP Installation - Updated RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab

More information

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto

More information