The Security Onion Cloud Client
|
|
|
- Phyllis Wood
- 10 years ago
- Views:
Transcription
1 The Security Onion Cloud Client Network Security Monitoring for the Cloud GIAC (GCIA) Gold Certification Author: Advisor: Dennis Distler Abstract With cloud servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don t have the ability to tap the network traffic flowing to and from the servers To solve this problem, I propose designing a cross platform (Windows, Linux) NSM client that would integrate with Security Onion, a NSMcentric Linux distribution. Essentially, the NSM client would copy traffic (near real time) to the Security Onion Sensor, which would then process the data as it would any other network tap. This would allow NSM practitioners the visibility they need into their off-site servers that are not in a setting where a typical NSM setup would suffice.
2 The Security Onion Cloud Client 2 1. Introduction 1.1. The rise of Network Security Monitoring Network Security Monitoring (NSM) is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. (Bejtlich, 2004, p. 3-4) NSM has a long and storied history, which Richard Bejiltch and Todd Heberlein recount in detail in The Practice of Network Security Monitoring. (Bejtlich, 2013) The key point to consider is NSM principles have been in use since early 1988 But it hasn't been until the past couple years that mainstream security vendors have started integrating NSM principles into their products, as they have continued to see the uselessness of the security that is created by the lack of contextual data when trying to analyze IDS alerts. At its core, NSM is based on the fact that when the analyst is running down a potential incident, they need as much context as possible to be able to determine the severity, if anything, of the event. This means, using NSM principles, the analyst will capture various types of information: - Alert Data (NIDS, HIDS) - Full Content Data - Session Data - Statistical Data - Extracted Content - Metatdata In a typical NSM deployment, this data would be captured through a network tap or switch SPAN, which would allow a copy of all network traffic to be sent to the NSM platform, and analyzed The rise of Cloud Servers, and the problem With the rise of cheap Virtual Private Servers (VPS) and now Cloud Servers, the traditional capture method outlined previously does not work, as the analyst does not have any kind of access to the underlying network infrastructure. The VPS and cloud vendors up until this point have not made an effort to allow access to underlying logs, much less physical/virtual
3 The Security Onion Cloud Client 3 networking infrastructure that would allow a SPAN or a tap. There has been some attempts to deal with this issue from some high profile vendors, for instance, Snort on Amazon EC2, though from the look of it, it is not been in widespread use. ( Quick Start Guide for using Sourcefire Snort on Amazon EC2, 2010) (Jon486, 2011) To have a defensible network, administrators charged with security must have pervasive network awareness, which can be defined as the ability to collect the network-based information from the viewpoint of any node on the network required to make decisions. (Bejtlich, 2005, p. 27) Not having the ability to collect network-based data from a significant set of critical servers will certainly impinge on the administrator s ability to defend the assets within their purview. As a NSM practitioner, how does one deal with this thorny issue? This paper proposes a Security Onion-integrated, multi-platform solution that would allow the analyst to gain the visibility he needs into the VPS and cloud servers that he is monitoring. 2. Basic Design Considerations 2.1. Target Audience Because this type of NSM server-side client is a somewhat-new concept, the target scope for the first iteration, and this paper, was that of a proof of concept for small to medium size organizations that have a few cloud servers, which see light to medium usage primarily as web servers. A typical scenario would be a small or medium-sized business that hosts the majority of its services in-house, but does not have the facilities needed to host a 99.99% uptime public website. Consequently, they contract with Amazon AWS for a few cloud servers to take care of their public website needs Core Design Principles There were six core design principles that needed to be considered when designing this system. These design principles were the guiding light for the design of the Cloud Client, to make sure the proposed solution would be stable, secure, and maintainable.
4 The Security Onion Cloud Client Integration with Security Onion Security Onion is an open-source NSM platform that has been around since late 2008, when it was originally based on the Securix NSMNow scripts. (Securix NSMNow, 2010) It is now one of the industry s leading NSM platforms, (open source or commercial). With that in mind, the first core design principle was that the Cloud Client could not be a standalone, fully featured NSM platform. Instead, it needed to be an add-on to an existing platform. Security Onion was an easy choice, as it is open source, easy to work with, and the primary developers of Security Onion were very open to the idea of a Cloud Client No compromise of NSM Principles This core requirement goes hand in hand with the previous one: the Cloud Client must not compromise on NSM principles. In other words, instead of just generating IDS alerts, it must be able to capture all relevant types of NSM data and present it for analysis Multi-Platform Another core requirement was that the Cloud Client needed to be cross-platform specifically, Windows and Linux. Based on data from Netcraft, Windows and IIS host around 20% of the world s websites, while Linux and Apache/NGINX host around 65%. (Netcraft, 2013) It is clear the need for NSM across platform boundaries is great, and therefore this became a core requirement Open Source The fourth core requirement was that of the underlying components of the Cloud Client be open source. Because the Cloud Client would be a part of the open source Security Onion distribution, there was a need to make sure that it would fit well under the project. Also, the hope was that others will see the need for Cloud Client, and contribute to it something much more difficult to do if it was proprietary.
5 The Security Onion Cloud Client Security The fifth core requirement was that the design and implementation Do The Right Thing when it came to the securability of the actual design and implementation. For instance, using bcrypt for hashing passwords, and not using MD5 or SHA Long-Term Sustainability The final core requirement was that the design and implementation must be able to be somewhat easily sustainable long term. Said another way, the components used in the Cloud Client should have a track record of being maintained. This requirement was very key there was no sense in going through all the trouble of building something like this when one of its components hasn t had bug patches for three years, and may not ever again Design Alternatives A number of designs were considered and discarded based on their inability to satisfy the core requirements. First off, it became obvious that in order to not compromise on collecting all the needed NSM data, the best way to do this would be to perform full packet capture on the target machine, transfer that data to the Security Onion Sensor, and then pass/replay/copy that data to an interface that Security Onion was listening on. This would allow Security Onion to capture the traffic and run the analysis on it, without any extra tweaking; Security Onion wouldn t know this is actually a host-side network tap, and not a normal network tap. One of the biggest design concerns quickly became apparent How to efficiently move the captured traffic securely over to the Security Onion Sensor? A number of options were considered and then rejected. The first option was WinPcap s Remote Capture Protocol (RPCAP). (WinPcap, 2010) The latest documentation at the time of publishing this paper (4.1.2) describes it as follows: This is an[sic] highly experimental feature that allows to interact to a remote machine and capture packets that are being transmitted on the remote network. This requires a remote daemon (called
6 The Security Onion Cloud Client 6 rpcapd) which performs the capture and sends data back and a local client that sends the appropriate commands and receives the captured data. (The WinPcap Team, 2010) There were also a couple other remote capture projects that had some potential. (ellzey, 2009) (Krishnan, 2002) All of the remote capture options that were considered had three major issues that led to them being disqualified: Firstly, they were alpha/experimental or did not seem to be under current development. Secondly, either there was no built-in encryption to secure the remotely captured traffic as it was sent back to the server, or the built in encryption was weak, which would have meant wrapping it in stunnel or some other encryption, which was highly undesirable. The final issue was that either the solutions were not multi-platform, or it was supposed to be, but in actually testing it out, by mixing a Windows and Linux remote capture client and server, the setup resulted in hacking code together, and a large amount of instability, which is not sustainable long term. The next design option was to just have a scheduled job on the client copy over the captured data via SSH, and then replay or import the data into Security Onion. This method was rejected for two reasons: 1) Replaying the data using a tool such as Tcpreplay would overwrite the original timestamps on the network traffic, which is highly undesirable in any incident response situation, and 2) importing the pcaps into Security Onion would require a number of modifications to Security Onion itself, which was also highly undesirable. The final option considered (and accepted) was to copy data over in near-real time via an OpenVPN bridge, to a Security Onion-monitored interface. This has a number of benefits: 1) highly secure copy mechanism (OpenVPN tunnel secured with certificates) 2) No need to store large amounts of pcaps on the local Cloud Client 3) No need to make any major modifications to Security Onion. The main concern with this option was, and still is, performance. Not only would we be capturing all network traffic, we would then be mirroring that back across the wire. The other major concern was that there was not a Windows packet capture and mirroring application like Daemonlogger, which is what would be used on Linux. After spending significant time searching and finding no viable options, a contract was posted online for a proof of concept. With generous donations from New Tribes Mission (ntm.org) and Defensive Depth Consulting, (DefensiveDepth.com) more than a proof of concept was developed WinTAP has
7 The Security Onion Cloud Client 7 been released under GPL 2, and can be found on GitHub ( The Cloud Client Basic Design The following numbers correspond to the diagram above, showing how the basic design works: 1) eth0 is the primary network interface for this server 2) Daemonlogger copies all traffic on eth0 3) Daemonlogger mirrors all of this traffic to the tap0 interface 4) The tap0 interface is part of the OpenVPN bridge, which is connected to the Security Onion Sensor 5) The traffic continues over the bridge into the Security Onion Sensor 6) The Security Onion processes on the SO Sensor monitor and analyzes the traffic that is coming across the br0 interface 3. In-Depth Design As described previously, the chosen design consisted of using an OpenVPN bridge between the Security Onion Sensor and the Cloud Client.
8 The Security Onion Cloud Client Security Onion Sensor Design The latest version of the Security Onion Sensor is officially supported on Ubuntu LTS, and there are a number of quality guides on how to setup Security Onion, so this discussion will revolve around the Cloud Client-specific integration. (SO Documentation Team, 2013) (Bejtlich, 2013) At this time, the Cloud Client does not have an automated integration into Security Onion, but will in time. For now, a Debian package can be used to install and configure the sensor (it uses a set of shell scripts to automate the setup and configuration). The basic setup is as follows: 1) Prepare Ubuntu install like normal for a Security Onion install, but do not run SOSetup yet 2) Install OpenVPN Server and configure for use with certificates 3) Use bridge-utils and a pre-configured bridge-start script to create a persistent tap interface and add it to a bridge (eventually, this bridge will also include the tap from the other side of the VPN connection See Appendix A) 4) Confirm that a firewall is not blocking traffic between the tap and bridge interfaces 5) Run SOSetup and configure as normal, making sure to select the bridge interface as a monitored interface 6) Startup OpenVPN in bridging mode 3.2. Cloud Client - Linux Design The target OS for the Linux Cloud Client was Debian/Ubuntu, and there is a Debian package that automates the following: 1) Install Daemonlogger 2) Install and configure OpenVPN 3) User manually copies over previously generated OpenVPN certificates 4) Start OpenVPN in bridging mode to connect to Security Onion Sensor (this will create a tap interface) 5) Using ethtool, disable NIC offload features (These features will get in the way of full packet capture) 6) Start Daemonlogger with the options to mirror traffic from the desired interface to the newly created tap interface, along with a bpf setting that excludes all traffic from being captured unless
9 The Security Onion Cloud Client 9 it is addressed to/from the Cloud Client, and it is not the OpenVPN port. This significantly cuts down on the amount of unneeded traffic from being captured and re-transmitted Cloud Client - Windows Design The target version for the Windows Cloud Client was Server 2008 R2 & Server There is a batch script that automates the following: 1) Install WinTAP (requires the Visual C Redistributable x64) 2) Install and configure OpenVPN 3) User manually copies over previously generated OpenVPN certificates 4) Start OpenVPN in bridging mode to connect to Security Onion Sensor 5) Start WinTAP with the options to mirror traffic from the desired interface to the newly created tap interface. WinTAP does not have a bpf option yet, but it is currently under active development with an estimated release date of Q Bringing it all together At this point, a couple simple tests can be run to confirm that all is working as it should. Browsing to on either of the Windows or Linux Cloud Clients should result in SID (GPL ATTACK_RESPONSE Id check returned root) being generated from the installed NIDS. If this is not the case, on the Security Onion Sensor, use tcpdump to confirm that traffic generated on the Cloud Clients is being mirrored over to the Sensor. If it is, then the next steps would be to check the IDS and Security Onion configurations. If it is not, then go back and confirm that OpenVPN is configured correctly, Daemonlogger/WinTAP is running correctly, and that no firewalls are blocking any traffic Miscellaneous Design and Implementation Notes The following are some miscellaneous design and implementation notes to keep in mind.
10 The Security Onion Cloud Client WinTAP WinTAP is the only component of this design that doesn t fit well with the core requirement of long term sustainability, as it is brand new, and quite experimental Unfortunately, there was no way around this, as there was just no other applications for Microsoft Windows that emulated the soft tap features of Daemonlogger. The first iteration of WinTAP was a proof of concept that was essentially a.net wrapper around WinPcap. This worked well, but performance was not as well as could be hoped for. The next iteration took the proof of concept, and instead of using WinPcap, implemented WinTAP as a kernel mode driver, using NDIS 6.0. This allowed for much better performance and stability. WinTAP in Use OpenVPN Bridge Adapter Line Speed A close observer will notice the OpenVPN bridged adapter for Windows state that it is running at 10Mbps. This has been well documented that this is not the actual line speed, but a Windows
11 The Security Onion Cloud Client 11 artifact from the days when ethernet interfaces were always hardware and never virtual. (Yonan, 2004) Suricata Stream Alerts In some circumstances where Suricata and the Cloud Client are being used together, there could be a very high rate of Suricata Stream alerts generated, which will bog down the Security Onion Sensor. The alerts will need to be tuned before much else is done. Refer to Richard Bejitlich s procedure on cleaning up and tuning these types of Suricata alerts. (Bejtlich, 2013) Disabling NIC Offloading In some cases, NIC offloading features need to be disabled to allow full packet capture to happen See Doug Burk s write-up of this issue for more details. (Burks, 2011) Unfortunately, disabling NIC offload features may be more difficult than anticipated Disabling these features on a stock Ubuntu Server install was straightforward ( ethtool --offload ethx rx off tx off ), but disabling them on a stock Ubuntu Server Rackspace Cloud Server install was very different. Running the same command resulted in the following error: Cannot set device rx csum settings: Operation not supported. To get around this, there was a need to disable each offload feature individually ( ethtool --offload ethx tso off, etc. ), then running ethtool -- offload ethx rx off would work. It is not clear if this is a bug in the current Rackspace Ubuntu image, or expected behavior IDS Home_Net Configuration Whichever IDS is used, there is a need to edit the IDS Home_Net configuration, as the default variables are private networks, and unless the cloud servers are behind some sort of NAT that has been configured, no alerts will be generated, as the Cloud Client will be capturing traffic with public IPs. 4. Performance & Stability Testing
12 The Security Onion Cloud Client Performance Metrics To get a basic idea of what kind of performance hit this setup will make on a light to medium loaded webserver, nmon was used to generate performance snapshots over a five minute period on the Linux Cloud Client. At the time of this testing, WinTAP was not yet ready, so only Linux Cloud Client statistics were generated. Based off of Rackspace s Cloud Server template of 2GB RAM / 2 CPU, a local VM was created that mirrored that setup, and a vanilla LAMP stack with WordPress was setup. Constant loading of 10Mb/s was applied to the server. The graph on the left was a baseline five minute snapshot and the graph on the right is the baseline plus when Cloud Client is running (OpenVPN & Daemonlogger). Please note that memory is not graphed as there was not a measurable impact at this level. The raw nmon files are available for download and further analysis here: Cloud Client - CPU Usage Baseline Baseline + Cloud Client
13 The Security Onion Cloud Client 13 Client Client - Disk IO Usage Baseline Baseline + Cloud Client Cloud Client - Network Usage Baseline Baseline + Cloud Client As demonstrated, the Cloud Client is mirroring all traffic from eth0, (which is fulfilling http requests to the tune of 10Mb/s) and the difference between the baseline and the Cloud Client in network usage is to be as expected, nearly double 10Mb/s. By default, OpenVPN configures the
14 The Security Onion Cloud Client 14 tunnel to use LZO compression, which with some types of data (http/text/javascript) will offer some good compression, and on other workloads (images/binaries) could be a detriment. (janjust, 2013) Before running the Cloud Client on any kind of production load, there would need to be more testing on various configurations this section was just to give a general idea of the performance hit for using the Cloud Client on a typical small webserver Stability Because of the methodology used in the Cloud Client setup, there also existed a need to verify the overall architecture is stable, as well as validate the quality of NSM data collected was comparable to a traditional Security Onion setup. With this in mind, three setups were constructed: 1) Traditional Security Onion Setup This simulated a normal local Security Onion Setup whereby traffic was collected using a SPAN port on a switch. This was the control/baseline setup. 2) Local Cloud Client Setup This simulated a Cloud Client setup via local (non-cloud) hardware, which was a VMware ESXi server with corresponding virtual machines. 3) Rackspace Cloud Client Setup This simulated a true Cloud Client deployment, using Rackspace s Cloud Servers. Each of the above setups had the following Servers: 1x Security Onion Standalone Sensor + Server Ubuntu Server GB RAM, 4 CPU, 320GB Disk, 100Mbps Network 2x LAMP Servers Ubuntu Server GB RAM, 2 CPU, 80GB Disk, 100Mbps Network Running Wordpress OWASP Mutillidae II
15 The Security Onion Cloud Client 15 (WinTAP was not ready for use at the time of these tests.) To simulate real-world use, 4.8 Mb/s of load was generated against the two LAMP servers, which meant close to 10Mb/s was incoming to the Security Onion Sensor. Next, two types of tests were conducted: 1) Using OWASP Mutillidae II, SQLi and XSS vulnerabilities were exploited six times (three each against each LAMP server) over a five minute period. 2) Using NetSparker, a scan for Ruby on Rails and Remote/Local File Inclusion vulnerabilities was conducted six times (three each against each LAMP server) over a five minute period. The resulting IDS alerts & NSM data was then analyzed. The IDS alerts generated can be seen in Appendix B. Analyzing the test data, it became clear all three setups generated the same quality of NSM data; there were no major concerns uncovered in either of the Cloud Client setups.
16 The Security Onion Cloud Client Security Onion Cloud Client in the real world So how would Cloud Clients look in the Real World? What are some real world considerations to keep in mind? 5.1. Real World Scenario - PetSitter Let us consider the fictional non-profit organization PetSitter. PetSitter exists to connect local pet owners with each other to trade off pet sitting while they are out of town. PetSitter runs a small server room in their offices, but it hosts only their local services it was deemed unacceptable to host their mission-critical web application, which needs more stability than what their local server room can offer. PetSitter has contracted with Rackspace to provide cloud servers for their web application, which is hosted on two load balanced Linux webservers, (WEB01/WEB02) connected to a backend database server. (DB01) PetSitter - Current Setup
17 The Security Onion Cloud Client 17 Because of the sensitivity of the pet and owner data PetSitter handles, they wish to gain more visibility into their office environment as well as the environment that hosts their PetSitter web application. Therefore, they have opted to implement Security Onion both at their local server room, and on their cloud servers, using Cloud Client as needed. Because the backend database server is sufficiently segmented, they have decided to include only WEB01 and WEB02 in the Security Onion scope for their cloud servers. PetSitter has three basic architecture choices: Cloud Client/Local Server, Standalone Cloud, and Cloud Sensor/Local Server
18 The Security Onion Cloud Client Option one - Cloud Client, Local Server This option would require PetSitter to place a Cloud Client on WEB01 and WEB02 and have them connect to a Security Onion Sensor located at the PetSitter office server room. The primary reasoning for this is so that they don t have to run another Cloud server for the Security Onion Sensor. PetSitter - Cloud Client, Local Server
19 The Security Onion Cloud Client Option two - Standalone Cloud This option would require PetSitter to place a Cloud Client on WEB01 and WEB02 and have them connect via the private cloud network to a Security Onion Standalone Server (which includes the sensor) that is hosted within their Rackspace Cloud account. The NSM analyst would monitor and maintain two distinct instances of Security Onion The office instance, and the cloud instance. PetSitter - Standalone Cloud
20 The Security Onion Cloud Client Option three - Cloud Sensor, Local Server This option would require PetSitter to place a Cloud Client on WEB01 and WEB02 and have them connect to a Security Onion Sensor that is hosted within their Rackspace Cloud account. That sensor would then connect back to the Security Onion Server hosted at the PetSitter Offices. PetSitter - Cloud Sensor, Local Server
21 The Security Onion Cloud Client Which Option? Each architecture option has its pros and cons: Option one would realize cost savings from not having to run a robust cloud server for a dedicated Security Onion Server/Sensor, but there would significant bandwidth costs, both outbound from the cloud servers from mirroring the traffic, and inbound into the PetSitter offices. Numbers would have to be crunched to see if it would be worthwhile to pay for this bandwidth, versus paying for a robust cloud server and keeping the bandwidth cost to a minimum. Another consideration is streaming that much data across the open Internet to the PetSitter offices will affect NSM data quality, as there will certainly be data loss in the transfer. Option two would require the purchase of a robust cloud server to run the standalone Security Onion server, but bandwidth savings would be large, especially since the bandwidth that is being used to mirror WEB01 and WEB02 would go across the private cloud network, which is free (as long as the two instances are in the same datacenter and/or region). The primary drawback to this option is that since PetSitter is also running a Security Onion instance at its local office, the NSM analyst will have to maintain and monitor two different instances of Security Onion, duplicating her effort, and creating inefficiencies. The third option is perhaps the best mix of both option one and option two It allows for a less robust cloud server to act as a Security Onion Sensor, while keeping the bandwidth costs to a minimum by receiving the mirrored traffic over the private cloud network, and only sending small amounts of data outbound to the PetSitter office Security Onion server. It also allows the NSM analyst to have to maintain and monitor only one instance of Security Onion for both the local offices and their cloud servers.
22 The Security Onion Cloud Client Conclusion The need for remote packet capture for security analysis has been foreseen by a number of people, particularly Richard Bejtlich, who wrote the following in The Tao of Network Security Monitoring, in 2004: In November 2001, and March 2001, Carter Bullard, (author of Argus) published Informational Internet Drafts on Remote Packet Capture. Bullard claimed, Packet capture is a fundamental mechanism in Internet network management and is used in support of a wide range of network operational functions, such as fault detection, protocol functional assurance, performance analysis, and security assessment. His proposal exceeded capabilities offered via RMON (RFC 2819, or Internet Standard 59) and SMON (RFC 2613), recognizing that switched networks are ubiquitous and sometimes full content data is the only evidence suitable for illuminating difficult network security and management problems In the future I expect to see increased support in the open source world for collecting traffic remotely and seamlessly presenting it to a local workstation. (p. 652) Cloud computing, in some form or fashion, is here to stay. Until the cloud computing vendors give organizations the needed visibility into the cloud environment that their services run in, there will be a need to get this data another way. This paper proposed a proof of concept solution to this issue the Security Onion Cloud Client. For use in SMB situations where an organization has a few cloud servers that are in need of visibility, the Cloud Client will suffice. Design decisions, performance metrics, stability tests, and real-world architecture have all been laid out in this paper to help prompt further discussions and development on this particular topic.
23 The Security Onion Cloud Client References Bejtlich, R. (2004). The tao of network security monitoring: Beyond intrusion detection. (1st ed. ed.). Boston: Addison-Wesley Professional. Bejtlich, R. (2005). Extrusion detection: Security monitoring for internal intrusions. Upper Saddle River, NJ: Pearson Education, Inc. Bejtlich, R. (2013). The practice of network security monitoring. (1st ed. ed.). San Francisco: No Starch Press, Inc. Bejtlich, R. (2013, February 24). Recovering from Suricata Gone Wild. Retrieved from Burks, D. (2011, October 19). When is full packet capture not full packet capture?. Retrieved from ellzey (2009, October). Rpcap - a remote pcap thingy [Software]. Available from janjust (2013, April 23). Re: OpenVPN compression for traffic reduction via satellite Message posted to Krishnan, S. (2002, October). The RPCAP Remote Packet Capture System (Version.23) [Software]. Available from Netcraft. (2013). July 2013 Web Server Survey. Retrieved from SO Documentation Team (Last updated, 2013). Installation. Retrieved from Winpcap team (2010) Remote Capture. Retrieved from remote.html Yonan, J (2004, February 4). Re: [Openvpn-users] Win32 Tun/Tap adapter limited to 10Mbps???. Message posted to (2010). Securix NSMNow (Version 1.6.2) [Software]. Available from (2010, February 16). Quick Start Guide for using Sourcefire Snort on Amazon EC2. Retrieved from Jon486 (2011, April 27). Snort, IDS installation on Amazon Instance. Message posted to (2013). WinPcap (Version 4.1.2) [Software]. Available from
24 The Security Onion Cloud Client 24 Appendix A. The customized bridge script, from OpenVPN s documentation website: #!/bin/bash ################################# # Set up Ethernet bridge on Linux # Requires: bridge-utils ################################# # Define Bridge Interface br="br0" # Define list of TAP interfaces to be bridged, # for example tap="tap0 tap1 tap2". tap="tap0" eth_ip=" " eth_netmask=" " eth_broadcast=" " for t in $tap; do done openvpn --mktun --dev $t brctl addbr $br for t in $tap; do
25 The Security Onion Cloud Client 25 done brctl addif $br $t for t in $tap; do done ifconfig $t promisc up ifconfig $br $eth_ip netmask $eth_netmask broadcast $eth_broadcast
26 The Security Onion Cloud Client 26 Appendix B. IDS Alerts generated for each test setup during the stability testing. Test Traditional Setup i1 i2 i3 i4 i5 i6 SQLi ; Rev: : Rev: : Rev: : Rev: XSS ; rev: RoR CVE Scan
27 The Security Onion Cloud Client : Rev: : Rev: : Rev: Remote/Local File Inclusion : Rev: : Rev: Test Local CC Setup i1 i2 i3 i4 i5 i6 SQLi ; Rev: : Rev: : Rev: : Rev: XSS ; rev:
28 The Security Onion Cloud Client 28 RoR CVE Scan : Rev: : Rev: : Rev: Remote/Local File Inclusion : Rev: : Rev: Test RS CC Setup i1 i2 i3 i4 i5 i6 SQLi ; Rev:
29 The Security Onion Cloud Client : Rev: : Rev: : Rev: XSS ; rev: RoR CVE Scan : Rev: : Rev: : Rev: Remote/Local File Inclusion : Rev: : Rev:
Network Security Monitoring
CEENET/GEANT Security Workshop Sofia, 2014 Network Security Monitoring An Introduction to the world of Intrusion Detection Systems Irvin Homem [email protected] Stockholm University Who am I? Of Indian and
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell Mandiant, a FireEye company [2014 SANS European ICS Summit] About me Currently: Principal Consultant on Mandiant s Industrial
Missing the Obvious: Network Security Monitoring for ICS
Missing the Obvious: Network Security Monitoring for ICS If ICS are so vulnerable, why haven t we seen more attacks? We aren t looking! Two Key Reasons Intent Visibility Intent Why are targeted attacks
Part 4: Virtual Private Networks
Universität Passau Security Insider Lab I: Infrastructure Security WS15 Part 4: Virtual Private Networks Ahmed Azri Emna Maâtoug February 11, 2016 Advisor: Oussama Mahjoub, Bouthayna Belgacem Contents
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Aerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
COUNTERSNIPE WWW.COUNTERSNIPE.COM
COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0 CounterSnipe s version 7.0 is their next major release and includes a completely new IDS/IPS leveraging high performance scalability
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
VM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro Instituto Superior Técnico, Universidade Técnica de Lisboa, Lisboa,
Deploy the ExtraHop Discover Appliance with Hyper-V
Deploy the ExtraHop Discover Appliance with Hyper-V 2016 ExtraHop Networks, Inc. All rights reserved. This manual, in whole or in part, may not be reproduced, translated, or reduced to any machine-readable
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Applications of Passive Message Logging and TCP Stream Reconstruction to Provide Application-Level Fault Tolerance. Sunny Gleason COM S 717
Applications of Passive Message Logging and TCP Stream Reconstruction to Provide Application-Level Fault Tolerance Sunny Gleason COM S 717 December 17, 2001 0.1 Introduction The proliferation of large-scale
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Cloud Computing Workload Benchmark Report
Cloud Computing Workload Benchmark Report Workload Benchmark Testing Results Between ProfitBricks and Amazon EC2 AWS: Apache Benchmark, nginx Benchmark, SysBench, pgbench, Postmark October 2014 TABLE OF
SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
RSA Security Analytics Virtual Appliance Setup Guide
RSA Security Analytics Virtual Appliance Setup Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or
December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
Stratusphere Solutions
Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices
Virtualized Open-Source Network Security Appliance
Virtualized Open-Source Network Security Appliance By Daniel Secrist Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor
Linux KVM Virtual Traffic Monitoring
Linux KVM Virtual Traffic Monitoring East-West traffic visibility Scott Harvey Director of Engineering October 7th, 2015 apcon.com Speaker Bio Scott Harvey Director of Engineering at APCON Responsible
Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview
Opsview in the Cloud Monitoring with Amazon Web Services Opsview Technical Overview Page 2 Opsview In The Cloud: Monitoring with Amazon Web Services Contents Opsview in The Cloud... 3 Considerations...
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor
Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Virtual Private Servers
Virtual Private Servers Application Form Guide Internode Pty Ltd ACN: 052 008 581 150 Grenfell St Adelaide SA 5000 PH: (08) 8228 2999 FAX: (08) 8235 6999 www.internode.on.net Internode VPS Application
RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
Next Generation Network Firewall
Next Generation Network Firewall Overview Next Generation Network Firewalls are an important part of protecting any organisation from Internet traffic. Next Generation Firewalls provide a central point
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Network Security Monitoring Theory and Practice
Network Security Monitoring Theory and Practice Michael Boman IT Security Researcher and Developer [email protected] http://proxy.11a.nu About Me Born in Sweden, been working in Singapore for the last 6 years
Network Security Monitoring
Network Security Monitoring Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009
Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized
VMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS
Performance, Verio FreeBSD Virtual Control, Private Server and (VPS) Security: v3 CONTENTS Why outsource hosting?... 1 Some alternative approaches... 2 Linux VPS and FreeBSD VPS overview... 3 Verio VPS
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Special Edition for Loadbalancer.org GmbH
IT-ADMINISTRATOR.COM 09/2013 The magazine for professional system and network administration Special Edition for Loadbalancer.org GmbH Under Test Loadbalancer.org Enterprise VA 7.5 Load Balancing Under
Cloud computing is a marketing term that means different things to different people. In this presentation, we look at the pros and cons of using
Cloud computing is a marketing term that means different things to different people. In this presentation, we look at the pros and cons of using Amazon Web Services rather than setting up a physical server
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Security Advice for Instances in the HP Cloud
Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - [email protected] Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
A SURVEY ON AUTOMATED SERVER MONITORING
A SURVEY ON AUTOMATED SERVER MONITORING S.Priscilla Florence Persis B.Tech IT III year SNS College of Engineering,Coimbatore. [email protected] Abstract This paper covers the automatic way of server
DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager
DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database
Hosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
Pricing Guide. Service Overview
Service Overview tolomy s G Cloud services are designed to give you the best possible degree of control and transparency over your costs. To maximise cost efficiency on offer to our customers a wide range
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06
virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification
Directions for VMware Ready Testing for Application Software
Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites
mbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT
NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT COVERS INTRODUCTION A NEW APPROACH CUSTOMER USE CASES FEATURES ARCHITECTURE V 1.0 INTRODUCTION & OVERVIEW Businesses use computers
Mark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
Kaltura On-Prem Evaluation Package - Getting Started
Kaltura On-Prem Evaluation Package - Getting Started Thank you for your interest in the Kaltura On-Prem Online Video Platform (OVP). Before you get started with your Kaltura On-Prem evaluation, a Kaltura
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
How To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On
ElasticHosts Configuration ElasticHosts Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 ElasticHosts Deployment Setup 9 VNS3 Configuration Document Links 20 copyright 2015 2 Requirements
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Silver Peak Virtual Appliances
Silver Peak Virtual Appliances Frequently Asked Questions (FAQ) VX Installation This section addresses questions or problems you may encounter during Silver Peak VX installation. 1. I need to increase
VX 9000E WiNG Express Manager INSTALLATION GUIDE
VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
