THE ROAD TO IPV6: KU SERVICE EXPERIENCES ON DUAL-STACK

Size: px
Start display at page:

Download "THE ROAD TO IPV6: KU SERVICE EXPERIENCES ON DUAL-STACK"

Transcription

1 THE ROAD TO IPV6: KU SERVICE EXPERIENCES ON DUAL-STACK The Design and Implementation of a Scalable, Dual-Stack Oriented, Consolidated Authentication System Pirawat WATANAPONGSE * Surasak SANGUANPONG* Kasom KOTH-ARSA* Surachai CHITPINITYON* Office of Computer Services, Kasetsart University * Applied Network Research Laboratory, Department of Computer Engineering, Kasetsart University TIP2013, Honolulu, Hawaii January 15 th 2013

2 2 Agenda Introducing The Kasetsart University Network (NontriNet) Tug-of-War: Providers Want Control Users Want Result IPv6 Is Designed To Co-Habit, Not Compatible Dual-Stack: Hardware Is Easy, Service Is Hard IPv6 Case Study: 1 st Obstacle One Car, Two License- Plate Numbers!! IPv6 Case Study: 2 nd Obstacle Who Are You? IPv6 Case Study: 3 rd Obstacle You Are Driving Which Car? To Where? IPv6 Case Study: Solution Integrated Authentication IPv6 Statistics Report

3 3 Next Topic Introducing The Kasetsart University Network (NontriNet)

4 Kasetsart University (KU) Established in Campuses ~74,000 students ~10,500 professors and staffs University Network NontriNet Average traffic 1.2 Gbps inbound 480 Mbps outbound Peak traffic 2.2 Gbps inbound 1.1 Gbps outbound Daily Active User ~25,000 users Registered MAC addresses ~170,000 MACs

5 5 NontriNet: Network Infrastructure Internet APAN 30 G 622 M ThaiSARN Uninet 1 G NontriNet 3x1 G 10 G KPS 10 G 10 G SRC CSC SPN 1 G 1 G 1 G 2 M Firewall & Shaper 6 M 10 G 100 M OCS 128 K 512 K 512 K Rachaburi Nopparat Satit School 1 G 1 G 1 G 1 G 1 G 1 G President Office 1 G Library Engineering Science

6 6 Next Topic Tug-of-War: Providers Want Control Users Want Result

7 7 Requirements Thailand Computer Crime Act B.E Logging of users and their Internet usage IPv6 Phase 1: Native IPv4 only Phase 2: Native IPv4 and native IPv6 Phase 3: Native IPv6 and NAT64 IPv4 Phase 4: Native IPv6 only

8 8 KU IPvX Resources IPv4: /16 IPv6: 2001:3C8:1303::/48 AS Number: 9411 Gateway OCS LIB President Office ENG SCI

9 9 Next Topic IPv6 Is Designed To Co-Habit, Not Compatible

10 10 KU IPv6 Address Space Design The 1 st Nibble : Campus The 2 nd Nibble : Faculty 1: Bangkhen 1: Computer Center 2001:3c8:1303:1164 :----:/64 The Last Byte : VLAN VLAN 100

11 11 KU IPv6 Address Space Allocation NontriNet 2001:3C8:1303::/48 Campuses Bangkhen Bangkhen Kamphaeng Saen Si Racha Sakon Nakhon Reserved Reserved Reserved Reserved Sub-Network 2001:3C8:1303:0000::/ :3C8:1303:1000::/ :3C8:1303:2000::/ :3C8:1303:3000::/ :3C8:1303:4000::/ :3C8:1303:5000::/ :3C8:1303:6000::/ :3C8:1303:7000::/ :3C8:1303:8000::/49

12 12 Next Topic Dual-Stack: Hardware Is Easy, Service Is Hard

13 13 KU IPv6 Preparation Physical Infrastructure Native, Dual-Stack Wireline and Wireless Also allows Tunneling Infrastructure AKA Low-Level (Discrete) Services DNS, DHCP, LDAP, NTP, Syslog, Etc. In-House Integrated (Dual-Stack Aware) Services Stateful, Scalable, Load-Balancing, Parallel-Track Firewalls Dual-Stack Aware Authentication System Regulation-Compliance, Dual-Stack Aware Traffic Logger Basic Higher-Level Services Web Servers, Mail Servers, Database Servers, Etc.

14 14 Next Topic IPv6 Case Study: 1 st Obstacle One Car, Two License- Plate Numbers!!

15 15 Address-Binding Scenario (from DHCP) 2001:3c8:1303:1266::7afb:dc4d (from DHCPv6) NontriNet Backbone Gateway Internet Client :3c8:1303:1266::7afb:dc4d 3 Auto-Binding and Authentication Authentication Server

16 16 Problem: Confusion with Dual-Stack Authentication Facts: Dual-Stack means one user gets 2 addresses: one IPv4 and one IPv6 Classical Authentication is done per unique IP Address Consequences: Users need to authenticate once for IPv4, then again for IPv6 The 2 nd authentication causes a lot of confusion (Is it the re-authentication of my IPv4, or is it the authentication for the IPv6 side?)

17 17 Solution: Automatic Address-Binding Binds IPv6 and IPv4 addresses of the same user together. Tracks the IPv4-IPv6 pair activities Authentication of IPv6 will automatically authenticate the corresponding IPv4 (and vice versa) Limitations Support on a per IPv6-IPv4 pair basis User logging-in to 2 machines simultaneously still has to do 2 separate authentications. Address-Binding must be done before authentication Cannot authenticate IPv6 alone and then bind-in IPv4 address later on

18 18 Next Topic IPv6 Case Study: 2 nd Obstacle Who Are You?

19 19 Login Servers Implementations 12 virtual servers from 2 physical machines 3 DNS RR entries for each server loginx.ku.ac.th A and AAAA record loginx-v4.ku.ac.th A record only loginx-v6.ku.ac.th AAAA record only login login12

20 20 Dual-Stack Aware Login Server The embedded pictures (showing both addresses) helps bind IPv4 and IPv6 addresses together

21 21 Login Servers Binding Tricks Function : Binding user s IPv4 and IPv6 addresses at login time Use two embedded pictures (CGI generated) to discover client s addresses From loginx-v4.ku.ac.th to discover the client s IPv4 From loginx-v6.ku.ac.th to discover the client s IPv6

22 22 Dual-Stack Aware Login Session Manager Developed in-house Tracks both IPv6 and IPv4 of the same session Tracks all sessions of the same user

23 Per-user Login and Quota Info 23

24 24 Miscellaneous Features No-Typing Login for mobile phones Currently support only Android-Based phones iphone version forthcoming

25 25 Next Topic IPv6 Case Study: 3 rd Obstacle You Are Driving Which Car? To Where?

26 26 Load-Balancing, Parallel-Track Firewall Architecture Login session manager Internal network Core Router IPv4 firewall cluster IPv6 firewall Gateway Router Internet Login servers Login servers Login servers Login servers

27 27 Load-Balancing, Parallel-Track Firewall Two Parallel-Running Firewall Sub-Systems 1 x Linux Firewall for IPv6 AMD Opteron 1220 (Dual-core, 2.8 GHz) 3 GB RAM Linux 2.6 with ip6tables + ipset (with IPv6 support) Bridge mode Will adopt load-balancing paradigm later on Load-Balancing, 4 x Linux Firewalls for IPv4 Intel Xeon X5720 (Dual-Core, 3.5 GHz) 4 GB RAM Linux 2.6 with iptables + ipset Bridge mode

28 28 IPv6 Traffic Logging KU In-House IPv6-Aware Log Server Developed in-house Capable of decoding IPv6 packets Also support tunneling decoding Timestamp Source Port Destination Port x x x x appdown.naver.com/naver/a x x photos-c.ak.fbcdn.net/hphot :3c8:1303:x - 2a03:2880:x Source IP Destination IP URL

29 29 Next Topic IPv6 Case Study: Solution Integrated Authentication

30 30 Integrated Authentication and Traffic Logger Authentication Server Firewall Farm Login Server Farm 30 TB Storage Regulation- Compliance Traffic Logger Syslog Server

31 31 Next Topic IPv6 Statistics Report

32 32 Data Collection Period First day of Data Collection Last day of Data Collection 209 Days June 6, 2012 World IPv6 Day Data Collection Period December 31, 2012

33 33 KU IPv6 Throughput Statistics 7.9/2.4 Mb/s Average (in/out) 157/148 Mb/s Peak (in/out)

34 34 KU Login Statistics Item Value Period: 209 days Jun 6, 2012 Dec 31, 2012 Number of login (times) 18,544,813 Number of IPv6 login 3,469,431 (~18.7%) Number of unique user 101,418 Number of unique IPv4 43,918 [1] Number of unique IPv6 2,547,645 [2] [1] Excluding the registered servers which are not required to login [2] Due to RFC 3041 Privacy Extensions for SLAAC in IPv6

35 Unique Users Login with IPv6 35

36 Unique IPv4 Addresses with IPv6 Binding Statistics 36

37 37 IPv6 HTTP Request Statistics Item Value Period : 209 Days Jun 6, 2012 Dec 31, 2012 Number of URL request entries 293,491,784 Number of unique host names 1,516,862 Number of unique domain names 9,454 Number of unique Thai host names 720 (~0.05%) Number of unique Thai domain names 61 (~0.65%)

38 38 Top 10 Domains (by number of requests) Rank Domain # request % 1 facebook.com 168,375, % 2 fbcdn.net 65,683, % 3 ytimg.com 9,451, % 4 gstatic.com 6,176, % 5 google.com 5,412, % 6 google.co.th 5,403, % 7 s.youtube.com 3,836, % 8 upic.me 3,580, % 9 google-analytics.com 2,899, % 10 wikimedia.org 2,726, % ~93.20%

39 39 Top 10.th Domains (by number of requests) Rank Domain # request % 1 google.co.th 5,403, % 2 ku.ac.th* 471,929* 7.49%* 3 tmd.go.th 210, % 4 3bb.co.th 36, % 5 moph.go.th 31, % 6 kku.ac.th 26, % 7 lru.ac.th 14, % 8 faceblog.in.th 13, % 9 rmutto.ac.th 11, % 10 sipa.or.th 7, %

40 40 Thank You For Your Attention

IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network

IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network S. CHITPINITYON, S. SANGUANPONG, K. KOHT-ARSA, W. PITTAYAPITAK, S. ERJONGMANEE AND P. WATANAPONGSE Agenda Introduction Design And Implementation

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

Next Generation Network Firewall

Next Generation Network Firewall Next Generation Network Firewall Overview Next Generation Network Firewalls are an important part of protecting any organisation from Internet traffic. Next Generation Firewalls provide a central point

More information

Basic IPv6 WAN and LAN Configuration

Basic IPv6 WAN and LAN Configuration Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration

More information

IPv6.marceln.org. [email protected]

IPv6.marceln.org. marcel.nijenhof@proxy.nl IPv6.marceln.org [email protected] RFC 1606 RFC 1606 A Historical Perspective On The Usage Of IP Version 9 1 April 1994, J. Onions Introduction The take-up of the network protocol TCP/IPv9 has been

More information

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Hosting more than one FortiOS instance on. VLANs. 1. Network topology Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

Application-Centric WLAN. Rob Mellencamp

Application-Centric WLAN. Rob Mellencamp Application-Centric WLAN Rob Mellencamp Agenda NX Integrated Services Platform Integrated Services Architecture Application Installation Example Application Monitoring Enterprise Mobility Architecture

More information

KFUPM Enterprise Network. Sadiq M. Sait [email protected]

KFUPM Enterprise Network. Sadiq M. Sait sadiq@kfupm.edu.sa KFUPM Enterprise Network Sadiq M. Sait [email protected] 1 Outline KFUPM Enterprise Network Diagram KFUPM Network Model KFUPM Backbone Network Connectivity: Academic Buildings, SDN, RAS Major Acheivements

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

The Wingu guide to creating your first cloud server.

The Wingu guide to creating your first cloud server. The Wingu guide to creating your first cloud server. This guide explains how to create your very first server in the Wingu cloud by using our easy to use cloud dashboard. 1. Login to the dashboard by pointing

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

464XLAT in mobile networks

464XLAT in mobile networks STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address

More information

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the

More information

EXPEDITING ACCESS TO V6 SERVICES: GETTING WEB CONTENT AVAILABLE OVER IPV6 QUICKLY AND AT LOW COST

EXPEDITING ACCESS TO V6 SERVICES: GETTING WEB CONTENT AVAILABLE OVER IPV6 QUICKLY AND AT LOW COST EXPEDITING ACCESS TO V6 SERVICES: GETTING WEB CONTENT AVAILABLE OVER IPV6 QUICKLY AND AT LOW COST Tim LeMaster [email protected] IPV6 REALITY CHECK: THE IPV4 LONG TAIL Post IPv4 allocation completion:

More information

Securing Your Network with pfsense. ILTA-U Dale Qualls Pattishall, McAuliffe, Newbury, Hilliard & Geraldson LLP dqualls@pattishall.

Securing Your Network with pfsense. ILTA-U Dale Qualls Pattishall, McAuliffe, Newbury, Hilliard & Geraldson LLP dqualls@pattishall. Securing Your Network with pfsense ILTA-U Dale Qualls Pattishall, McAuliffe, Newbury, Hilliard & Geraldson LLP [email protected] Housekeeping Please turn off cell phones or put them on silent We re

More information

Internet Services. Amcom. Support & Troubleshooting Guide

Internet Services. Amcom. Support & Troubleshooting Guide Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further

More information

Server Installation Procedure - Load Balanced Environment

Server Installation Procedure - Load Balanced Environment Server Installation Procedure - Load Balanced Environment 1. Introduction This document explains a step-by-step procedure in case BackupAgent BV performs an installation of the BackupAgent Server Software

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

SIIT-DC: Stateless IP/ICMP Translation for IPv6 Data Centre Environments & SIIT-DC: Dual Translation Mode

SIIT-DC: Stateless IP/ICMP Translation for IPv6 Data Centre Environments & SIIT-DC: Dual Translation Mode SIIT-DC: Stateless IP/ICMP Translation for IPv6 Data Centre Environments & SIIT-DC: Dual Translation Mode Tore Anderson Redpill Linpro AS RIPE 91, Honolulu, November 2014 An IPv6 data centre The IPv6 Internet

More information

msuite5 & mdesign Installation Prerequisites

msuite5 & mdesign Installation Prerequisites CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...

More information

Use Domain Name System and IP Version 6

Use Domain Name System and IP Version 6 Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Customer Service Description Next Generation Network Firewall

Customer Service Description Next Generation Network Firewall Customer Service Description Next Generation Network Firewall Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Interoute Communications Limited

More information

IPv6 in Axis Video Products

IPv6 in Axis Video Products TECHNICAL NOTE REFERENCE DOCUMENT IPv6 in Axis Video Products Created: 2006-01-31 Last updated: 2006-05-29 TABLE OF CONTENTS DOCUMENT HISTORY... 2 1 IPV6 IN GENERAL... 3 1.1 The IPv6 address... 3 1.1.1

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Private Distributed Cloud Deployment in a Limited Networking Environment

Private Distributed Cloud Deployment in a Limited Networking Environment Private Distributed Cloud Deployment in a Limited Networking Environment Jeffrey Galloway, Susan Vrbsky, and Karl Smith The University of Alabama [email protected], [email protected], [email protected]

More information

SIIT-DC: IPv4 Service Continuity for IPv6 Data Centres. Tore Anderson Redpill Linpro AS RIPE69, London, November 2014

SIIT-DC: IPv4 Service Continuity for IPv6 Data Centres. Tore Anderson Redpill Linpro AS RIPE69, London, November 2014 SIIT-DC: IPv4 Service Continuity for IPv6 Data Centres Tore Anderson Redpill Linpro AS RIPE69, London, November 2014 Stop Thinking IPv4; IPv6 is Here IPv4 is a dying and cramped protocol IPv6 is the exact

More information

Setting up pfsense as a Stateful Bridging Firewall.

Setting up pfsense as a Stateful Bridging Firewall. Setting up pfsense as a Stateful Bridging Firewall. Contents Contents Setting up pfsense as a Stateful Bridging Firewall.... 1 What king of system these directions will try and help you create.... 1 Selecting

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

McAfee Network Security Platform 8.2

McAfee Network Security Platform 8.2 8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known

More information

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Astaro Deployment Guide High Availability Options Clustering and Hot Standby Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...

More information

Issues for the performance monitoring of an open source H.323 implementation ported to IPv6-enabled networks with QoS characteristics

Issues for the performance monitoring of an open source H.323 implementation ported to IPv6-enabled networks with QoS characteristics Issues for the performance monitoring of an open source H.323 implementation ported to IPv6-enabled networks with QoS characteristics Authors: Ch. Bouras, A. Gkamas, A. Karaliotas, D.Primpas, K. Stamos

More information

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing. IP(v6) security Matěj Grégr Brno University of Technology, Faculty of Information Technology Slides adapted from Ing. Tomáš Podermański What is IP security? Encryption? Authentication? Authorization? Surveillance?

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

BroadCloud PBX Customer Minimum Requirements

BroadCloud PBX Customer Minimum Requirements BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service

More information

Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution

Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution DG_ACC_062011.1 TABLE OF CONTENTS 1 Introduction... 3 2 Deployment Guide Overview... 3 3 Lab Setup Requirements... 3 4 Architecture

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Security of IPv6 and DNSSEC for penetration testers

Security of IPv6 and DNSSEC for penetration testers Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

Document ID: 45741. Introduction

Document ID: 45741. Introduction Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

Savvius Insight Initial Configuration

Savvius Insight Initial Configuration The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Firewalls und IPv6 worauf Sie achten müssen!

Firewalls und IPv6 worauf Sie achten müssen! Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)

More information

IPv6-only hosts in a dual stack environnment

IPv6-only hosts in a dual stack environnment IPv6-only hosts in a dual stack environnment using Free Software Frédéric Gargula, Grégoire Huet Background on IPv4 and IPv6 usage IPv4 addresses depletion doesn't need to be reminded No straight way exists

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues

IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues Enis Hodzic BH Telecom.d.o.o Sarajevo, Bosnia & Herzegovina [email protected] Sasa Mrdovic Faculty of Electrical Engineering University

More information

How To Fix A Fault Notification On A Network Security Platform 8.0.0 (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent

How To Fix A Fault Notification On A Network Security Platform 8.0.0 (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent XC-Cluster Release Notes Network Security Platform 8.0 Revision A Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information

The All-in-One, Intelligent NXC Controller

The All-in-One, Intelligent NXC Controller The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized

More information

Citrix NetScaler 10 Essentials and Networking

Citrix NetScaler 10 Essentials and Networking Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced

More information

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world

More information

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall Government of Canada Managed Security Service (GCMSS) Date: July 12, 2012 TABLE OF CONTENTS 1 FIREWALL... 1 1.1 SECURITY...1 1.2 STANDARDS...1 1.3 FAILOVER...2 1.4 PERFORMANCE...3 1.5 REPORTING...3 1.6

More information

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management EdgeRouter Lite 3-Port Router Model: ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced 3-Port Router Introducing the EdgeRouter

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Optimization of Cluster Web Server Scheduling from Site Access Statistics

Optimization of Cluster Web Server Scheduling from Site Access Statistics Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand

More information

User Guide LRT214 / LRT224

User Guide LRT214 / LRT224 User Guide LRT214 / LRT224 Table of Contents Table of Contents Introduction................................. I Hardware Installation........................... 1 Ports 1 LED Indicators 2 Reset 2 Placement

More information

Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions

Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions Lecture Objectives Wireless Networks and Mobile Systems Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs Describe the role of nomadic services in mobile networking Describe the objectives

More information

Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009

Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized

More information

1 Attack Top Attackers Report, Top Targets Report, Top Protocol Used by Attack Report, Top Attacks Report, Top Internal Attackers Report, Top External Attackers Report, Top Internal Targets Report, Top

More information

Chapter 4 Security and Firewall Protection

Chapter 4 Security and Firewall Protection Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

A10 Networks IPv6 Overview. November 2011

A10 Networks IPv6 Overview. November 2011 A10 Networks IPv6 Overview November 2011 2007 2007 2006 2007 2008 2009 2010 2010-2011 1 A10 Networks Company Overview Mission: The Technology Leader in Application Networking Flagship Product AX Series

More information

vrealize Air Compliance OVA Installation and Deployment Guide

vrealize Air Compliance OVA Installation and Deployment Guide vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using

More information

GB-OS Version 6.2. Configuring IPv6. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com

GB-OS Version 6.2. Configuring IPv6. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com GB-OS Version 6.2 Configuring IPv6 IPv6201411-01 Global Technology Associates 3505 Lake Lynda Drive Suite 115 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com

More information

Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks

Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks Real World IPv6 Migration Solutions Asoka De Saram Sr. Director of Systems Engineering, A10 Networks 1 Agenda Choosing the right solutions Design considerations IPv4 to IPv6 migration road map Consumer

More information

Bandwidth Management and Optimization System Design (draft)

Bandwidth Management and Optimization System Design (draft) Royal Institute of Technology Cost Effective Bandwidth Management and Optimization System: A Case of Hawassa University Bandwidth Management and Optimization System Design (draft) Date: 20 March 2009.

More information

Routing Security Server failure detection and recovery Protocol support Redundancy

Routing Security Server failure detection and recovery Protocol support Redundancy Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting

More information

BASIC FIREWALL SERVICES

BASIC FIREWALL SERVICES BASIC FIREWALL SERVICES Course # 1202 1 Services! NTP Network Time! DHCP Relay Server! DNS Proxy Server! Dynamic DNS! High Availability! Remote Logging! SNMP 2 NTP Network Time Service! NTP server will

More information

Chapter 4 Firewall Protection and Content Filtering

Chapter 4 Firewall Protection and Content Filtering Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.

More information

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router ALLNET ALL-VPN10 VPN/Firewall WLAN-N WAN Router 1~2x100Mbps WAN + 3~4x100Mbps Switch LAN + 2xUSB port+2xwireless Antenna Dual WAN Ports for load balancing Up to 10 IPSec VPN tunnels, VPN Throughput 100Mbps

More information

Chapter 1 Configuring Basic Connectivity

Chapter 1 Configuring Basic Connectivity Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information