Protecting VMs in a Multi-Tenancy Environment
|
|
|
- Bernadette Gaines
- 10 years ago
- Views:
Transcription
1 Protecting VMs in a Multi-Tenancy Environment Prepared by: XenServer Engineering
2 Table of Contents 1. Executive Summary Introduction Preventing Vulnerabilities with XenServer Conclusion... 7 Page 2 of 8
3 1. Executive Summary Segregation of network data is a basic business requirement when deploying applications, desktops or virtual machines in an environment where you cannot trust all users of the network. This is an inherent issue in public and private clouds because of the lack of physical segregation of systems. XenServer, and cloud infrastructures built on XenServer, provide the high level of protection needed by organisations and regulatory authorities. The choice of technologies which are tried and trusted in global organizations, have been improved and extended in XenServer This White Paper highlights the VLAN improvements, VM aware multi-tenancy extensions, and the updated Open vswitch. XenServer is a key enabler for Software Defined Networks: the virtualised network infrastructure that many cloud service providers and large enterprises are now deploying Audience This white paper is aimed at those who are interested in using a public cloud to host their applications, desktops or multi-purpose virtual machines (VMs), and are looking for a greater understanding of the protections available to ensure their network traffic can't get intercepted or confused with that of other users of that cloud. Businesses using a private cloud to host VMs from distinct functional groups or sub-organizations are subject to the same concerns, and this white paper is equally applicable to them. The target reader will have an understanding of the technical issues around networking and VM segregation in a hosted environment. Page 3 of 8
4 2. Introduction Security is often the primary concern voiced by organisations and business units when considering a move to using a cloud hosted solution. All organisations need to be sure that their resources and data are secure, and that other organisations cannot access them without authorisation. Of particular concern is network data: it must be possible to secure data pathways when sharing any networking resource (e.g. physical switches or network interface cards) to prevent malicious or accidental unauthorized access or denials of service to ensure that whilst also you need to be certain that there is no chance that network data that was destined for your VMs does not end up being visible to them, and that there is no opportunity for them to snoop on data either entering or exiting your VMs. Segregation of data is paramount, and this white paper addresses a number of ways in which Citrix XenServer has provided even greater protection in the network sphere Specific concerns There are many examples of situations in which network data from one organisation or department needs to be segregated. These might include: Large enterprises needing to isolate HR records, finance, customer credit card details and Intellectual Property assets; Organisations ensuring separation of business unit applications and data; Outsourced development requiring separate areas for each development activity; Healthcare organisations with statutory responsibilities to ensure patient record confidentiality; Universities needing to partition examinations, enrolment details and commercial research from their other teaching and research activities; Telcos and network service providers having to separate billing, CRM, payment systems, resellers portals and application hosting environments; Financial organisations needing to isolate client details and partition trading, wholesale and retail banking for regulatory reasons; Governments having the requirement to partition records for taxation, welfare, healthcare, education and other departments. Production environments need to be logically separated from Development and Test infrastructures. Publically facing web services must be separated from systems containing confidential data. Page 4 of 8
5 In all of the cases noted above, the physical or virtual system performing the different activities must be isolated: XenServer uses hypervisor and memory separation techniques to ensure virtual machine isolation even when sharing the same physical host. However, as soon as these systems send data over a shared network the security of that data is vulnerable. Administrators and auditors need to be confident that network traffic can only be accessed by the intended recipient. There are two general approaches by which rogue, or malicious, actors can attempt to disrupt network traffic for which they are not authorised: interception and impersonation. Interception is when a third party reads data intended for some other recipient, whether it is incoming or outgoing: it is sometimes referred to as sniffing, and can take place either on a machine which is hosting a set of VMs, or any of the switches in the network between the parties communicating. Impersonation or spoofing is when a third party masquerades as another, with the intention of receiving data intended for another party, fraudulently accessing another system, or disrupting the transmission of data. Impersonation can occur at either the Ethernet layer (ARP spoofing) or at the IP layer (IP spoofing); both can cause network traffic to be misrouted or lost. ARP spoofing: the aim is to associate the attacker's MAC address with the IP address of another node (such as the default gateway). Any traffic meant for that IP address would be mistakenly sent to the attacker instead. IP spoofing: the attacker creates IP packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Both types of spoofing can occur due to incorrect configuration by system administrators, causing unintentional, but often equally disastrous, consequences. Page 5 of 8
6 3. Preventing Vulnerabilities with XenServer XenServer contains enhanced controls which simplify and improve protection against both types of attacks interception and impersonation. These features are explained in more detail below. There are also further measures which can be applied using advanced techniques which are briefly described in the final part of this section VLAN Improvements Virtual Large Area Networks (VLANs) are the industry standard technique to segregate network traffic, thus preventing interception by unauthorised parties. Almost all physical switch vendors support the technology, with a maximum of 4,096 separate VLANs on a single Layer 2 (L2) network. All packets from each system on the VLAN are tagged so that all switches on the network know that they should be kept distinct. This tagging can also be performed by XenServer, allowing network segregation of VMs on the same host. The operation of the VLAN is therefore transparent to the bare metal machines and VMs on the VLAN. XenServer does not introduce VLANs; XenServer can be configured to tag traffic from any VM with any legal VLAN assignment, traffic from external sources tagged with the correct VMs VLAN will have the tag stripped transparently, before the traffic passes to the VM. Two major improvements in XenServer 6.1.0: 1. Scalability: In XenServer 6.1.0, significant improvement has been made in performance when using many VLANs in the same pool. Although previously supported, it is now practical to route thousands of VLANs. 2. Trunking: XenServer can be configured to pass tagged traffic to VMs. This allows advanced networking capabilities to be provided by virtual appliances, for example software VPNs and software routers Multi-Tenancy Extensions Security extensions in the XenServer networking stack enable administrators to protect against impersonation and interception as discussed above. In the XenServer release, these extensions are enabled and configured by additional persistent VM configuration options. This means that VMs remain protected during migration, power events and other pool administrative tasks. The new multi-tenancy extensions allow XenServer administrators to lock a virtual switch port to a MAC address and a list of IPv4 or IPv6 addresses. This means that when these extensions are deployed, VMs cannot: 1. Impersonate any other VM; Page 6 of 8
7 2. Intercept traffic intended for any other VM. XenServer will ensure that traffic from a VM on a locked port will be dropped if does not come from the MAC address and IPv4/IPv6 that are associated with that port, thereby protecting all other VMs on that host from malicious attacks from that VM Open vswitch XenServer also includes an improved version of the Open vswitch (OVS) 1 an OpenFlow 2 - compliant virtual switch. This component provides Switch functionality to XenServer, including: the ability to create and maintain fine-grained routing rules on a host-per-host level; manage access control lists on a MAC or IPv4/IPv6 basis; create GRE tunnels between XenServer hosts and other enabled switches; This functionality allows XenServer hosts to be used as part of a larger, software-defined network (SDN). Although administrators do not need to interact with the OVS directly in order to take advantage of the capabilities list above, an increasing number of cloud services providers and large enterprises are beginning to leverage the advantages offered by SDNs. 4. Conclusion XenServer provides additional protection for organisations who wish to ensure high levels of segregation for their network data, whether between departments in a private cloud, or between different customers in a public cloud. Use of VLANs now better supported in XenServer and multi-tenancy extensions allows organisations to enjoy the levels of protection that they require across multiple use cases. Further advanced techniques using the Open vswitch which is part of XenServer 6.1.0, allow even greater control and integration of XenServer into the virtualised network infrastructure that many cloud service providers and large enterprises are now deploying. 1 To learn more about the Open vswitch see, 2 To learn more about OpenFlow see, Page 7 of 8
8 About Citrix Citrix Systems, Inc. (NASDAQ:CTXS) transforms how businesses and IT work and people collaborate in the cloud era. With market-leading cloud, collaboration, networking and virtualization technologies, Citrix powers mobile workstyles and cloud services, making complex enterprise IT simpler and more accessible for 260,000 organizations. Citrix products touch 75 percent of Internet users each day and it partners with more than 10,000 companies in 100 countries. Annual revenue in 2011 was $2.21 billion. Learn more at The copyright in this report and all other works of authorship and all developments made, conceived, created, discovered, invented or reduced to practice in the performance of work during this engagement are and shall remain the sole and absolute property of Citrix, subject to a worldwide, non-exclusive license to you for your internal distribution and use as intended hereunder. No license to Citrix products is granted herein. Citrix products must be licensed separately. Citrix warrants that the services have been performed in a professional and workman-like manner using generally accepted industry standards and practices. Your exclusive remedy for breach of this warranty shall be timely re-performance of the work by Citrix such that the warranty is met. THE WARRANTY ABOVE IS EXCLUSIVE AND IS IN LIEU OF ALL OTHER WARRANTIES, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE WITH RESPECT TO THE SERVICES OR PRODUCTS PROVIDED UNDER THIS AGREEMENT, THE PERFORMANCE OF MATERIALS OR PROCESSES DEVELOPED OR PROVIDED UNDER THIS AGREEMENT, OR AS TO THE RESULTS WHICH MAY BE OBTAINED THEREFROM, AND ALL IMPLIED WARRANTIES OF MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, OR AGAINST INFRINGEMENT. Citrix liability to you with respect to any services rendered shall be limited to the amount actually paid by you. IN NO EVENT SHALL EITHER PARTY BY LIABLE TO THE OTHER PARTY HEREUNDER FOR ANY INCIDENTAL, CONSEQUENTIAL, INDIRECT OR PUNITIVE DAMAGES (INCLUDING BUT NOT LIMITED TO LOST PROFITS) REGARDLESS OF WHETHER SUCH LIABILITY IS BASED ON BREACH OF CONTRACT, TORT, OR STRICT LIABILITY. Disputes regarding this engagement shall be governed by the internal laws of the State of Florida. 851 West Cypress Creek Road Fort Lauderdale, FL Copyright 2012 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, Citrix ICA, Citrix XenDesktop, and other Citrix product names are trademarks of Citrix Systems, Inc. All other product names, company names, marks, logos, and symbols are trademarks of their respective owners. Page 8 of 8
Configuring XenServer v6.5.0 Service Pack 1 for Graphics
Contents Introduction... 2 GPU Pass-Through... 2 Guest Support and Constraints... 2 Windows Guests... 2 HVM Linux Guests... 3 NVIDIA GRID vgpu... 3 Available NVIDIA GRID vgpu Types... 4 NVIDIA GRID System
White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Storage XenMotion: Live Storage Migration with Citrix XenServer
Storage XenMotion: Live Storage Migration with Citrix XenServer Enabling cost effective storage migration and management strategies for enterprise and cloud datacenters www.citrix.com Table of Contents
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture 2 This reference architecture is a guideline for deploying Citrix CloudPlatform, powered by Apache CloudStack,
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design: Designing XenServer Network Configurations www.citrix.com Contents About... 5 Audience... 5 Purpose of the Guide... 6 Finding Configuration Instructions... 6 Visual Legend... 7
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Citrix Lab Manager 3.6 SP 2 Quick Start Guide
WHITE PAPER Citrix Essentials for Microsoft Hyper-V Citrix Lab Manager 3.6 SP 2 Quick Start Guide www.citrix.com Contents Document Summary... 3 Preparation... 3 Architectural Review of Lab Manager... 3
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM
Presenter: Vinit Jain, STSM, System Networking Development, IBM System & Technology Group A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio
Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com
Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing
DEPLOYMENT GUIDE XenApp, Avaya 1X Agent. Deployment Guide. Avaya 1X Agent. XenApp. www.citrix.com
Deployment Guide Avaya 1X Agent XenApp www.citrix.com Table of Contents Introduction...3 Solution Requirements...4 Prerequisites...4 Usage Modes...4 Network Diagram...5 Compatibility Matrix...6 XenApp
Server Virtualization with QNAP Turbo NAS and Citrix XenServer How to Set up QNAP Turbo NAS as Storage Repositories on Citrix XenServer via iscsi
Server Virtualization with QNAP Turbo NAS and Citrix XenServer How to Set up QNAP Turbo NAS as Storage Repositories on Citrix XenServer via iscsi Copyright 2010. QNAP Systems, Inc. All Rights Reserved.
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Deployment Guide ICA Proxy for XenApp
Deployment Guide ICA Proxy for XenApp Access Gateway Enterprise Edition (NetScaler AGEE) www.citrix.com Table of Contents Introduction...3 Solution Requirements...4 Prerequisites...4 Network Diagram...5
Citrix XenServer 7 Feature Matrix
Citrix XenServer 7 Matrix Citrix XenServer 7 Matrix A list of Citrix XenServer 7 features by product edition, including entitlements XenApp and XenDesktop license holders. The most comprehensive application
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Visibility into the Cloud and Virtualized Data Center // White Paper
Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.
IBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz [email protected] IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Citrix NetScaler for Cisco Nexus 1000v White Paper Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Application Template Deployment Guide
DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Application Template Deployment Guide Oracle E-Business Suite 12.1 www.citrix.com DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Table of Contents Introduction...3
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
Virtual LAN Configuration Guide Version 9
Virtual LAN Configuration Guide Version 9 Document version 96-1.0-12/05/2009 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
Pluribus Netvisor Solution Brief
Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and
Network Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts
Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Citrix XenServer 6.0.2 Emergency Network Reset. Published Wednesday, 29 February 2012 1.0 Edition
Citrix XenServer 6.0.2 Emergency Network Reset Published Wednesday, 29 February 2012 1.0 Edition Citrix XenServer 6.0.2 Emergency Network Reset Copyright 2012 Citrix Systems. Inc. All Rights Reserved.
Optimizing service assurance for XenServer virtual infrastructures with Xangati
Solutions Brief Optimizing service assurance for XenServer virtual infrastructures with Xangati As IT organizations adopt application, desktop and server virtualization solutions as the primary method
Virtualisation. A newsletter for IT Professionals. Issue 2. I. Background of Virtualisation. Hardware
Virtualisation A newsletter for IT Professionals Issue 2 UEducation Sector Updates I. Background of Virtualisation Virtualisation is the separation of resource or request for a service from the underlying
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Deployment Guide for Citrix XenDesktop
Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015
Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 THIS IS A LEGAL AGREEMENT between "you", the individual, company, or organisation utilising Procon Frostbite
Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013
Network Virtualization and Software-defined Networking Chris Wright and Thomas Graf Red Hat June 14, 2013 Agenda Problem Statement Definitions Solutions She can't take much more of this, captain! Challenges
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualised data centres Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
How To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
Securely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For
Deployment Guide Deployment Guide VeriSign Certificate Authority Citrix NetScaler SSL Deployment Guide Notice: The information in this publication is subject to change without notice. THIS PUBLICATION
Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews
Exploring Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Jeanna N. Matthews Introduction Cloud Services Offer customers virtual server hosting in multi-tenant environments Virtual
The software is sold on an AS IS basis. ALVARION, its affiliates or its licensors MAKE NO
NG_VG Integrated Wireless Home Gateway TECHNICAL SPECIFICATION * Temporary product name Legal Rights The material contained herein is proprietary, and owned by ALVARION Co., Ltd or its third party licensors.
Introduction... 2. GPU Pass-Through... 2. Shared GPU... 2. Guest Support and Constraints... 4. Available NVIDIA GRID vgpu Types...
Contents Introduction... 2 GPU Pass-Through... 2 Shared GPU... 2 Guest Support and Constraints... 4 NVIDIA GRID vgpu... 5 Available NVIDIA GRID vgpu Types... 5 NVIDIA GRID System Requirements... 5 Preparation
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
Potecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.
Potecting your business assets in The Cloud, with Secure Multitency Environment from CloudHPT. Whitepaper 1 Introduction Goal of This Document To provide a guide to the security features of CloudHPT. CloudHPT
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
Network Virtualization: Delivering on the Promises of SDN. Bruce Davie, Principal Engineer
Network Virtualization: Delivering on the Promises of SDN Bruce Davie, Principal Engineer What does SDN promise? The original* SDN promise was: Enable rapid innovation in networking Enable new forms of
CoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
Secure Cloud Computing with a Virtualized Network Infrastructure
Secure Cloud Computing with a Virtualized Network Infrastructure Fang Hao, T.V. Lakshman, Sarit Mukherjee, Haoyu Song Bell Labs Cloud Security: All or Nothing? Amazon EC2 Government Cloud Shared computing,
Secure Network Access Solutions for Banks and Financial Institutions. Secure. Easy. Protected. Access.
Secure Network Access Solutions for Banks and Financial Institutions Secure. Easy. Protected. Access. Cybersecurity A Growing Concern for Banks The banking sector is shifting from using closed, proprietary
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview 2 The BlueCat Networks and Citrix partnership is based upon integration between BlueCat Networks DNS, DHCP and IP Address Management
High Availability for Citrix XenServer
WHITE PAPER Citrix XenServer High Availability for Citrix XenServer Enhancing XenServer Fault Tolerance with High Availability www.citrix.com Contents Contents... 2 Heartbeating for availability... 4 Planning
How Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA [email protected] 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair
Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture
Citrix XenServer: VM Protection and Recovery Quick Start Guide
Citrix XenServer: VM Protection and Recovery Quick Start Guide www.citrix.com Contents What is XenServer VM Protection and Recovery?... 3 Creating a VM Protection Policy... 3 Page 2 What is XenServer VM
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable
Building Docker Cloud Services with Virtuozzo
Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
Virtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Citrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users. www.citrix.com
Citrix XenClient White Paper Citrix XenClient Extending the benefits of desktop virtualization to mobile laptop users www.citrix.com Executive summary Desktop virtualization is attractive to organizations
Architektur XenServer
1 Architektur XenServer 2 XenServer Architectural Components 3 Architectural Changes The Open vswitch is now the default network stack for the product. Improvements to Distributed Virtual Switching include
Citrix desktop virtualization and Microsoft System Center 2012: better together
Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without
Aerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
Deployment Guide for Microsoft Lync 2010
Deployment Guide for Microsoft Lync 2010 Securing and Accelerating Microsoft Lync with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...3
An Oracle White Paper April 2012. Network Isolation in Private Database Clouds
An Oracle White Paper April 2012 Network Isolation in Private Database Clouds Executive Overview... 1 Different types of network isolation... 2 Network Traffic Isolation... 3 Network Security Isolation...
Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix
Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix August 2009 Table of Contents Introducing Citrix Essentials for Hyper-V 3 Challenges of Server Virtualization 3 Components
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews
Exploring Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Jeanna N. Matthews Road Map Context for the Problem of Layer 2 Network Security in Virrtualized Environments Virtualization,
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
