CLOUD INFRASTRUCTURE DESIGN GUIDE
|
|
|
- Elisabeth Quinn
- 9 years ago
- Views:
Transcription
1 CLOUD INFRASTRUCTURE DESIGN GUIDE
2 WELCOME TO THE CLOUD INFRASTRUCTURE DESIGN GUIDE This guide illustrates various network configurations that can be designed using our cloud infrastructure. Typical scenarios are shown, although many more configurations are possible. This guide may be read in conjunction with other Cloud Services guides, for more details about specific features. AUSTRALIAN ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact your Telstra representative or visit the Cloud Services website ( where you ll find all our contact details plus a glossary, FAQs and Our Customer Terms. TELSTRA GLOBAL ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact your Telstra Global representative or visit the Telstra Global website ( for the customer service team in your region. Note: we don t provide assistance with issues specific to a customer s local network, servers, operating systems and software (post-installation). Specialist technical support may be charged as an additional service. CONVENTIONS USED IN THIS GUIDE The following typographical conventions are used in this guide for simplicity and readability: Web addresses, addresses and hyperlinks are shown in bold italics, for example Button names and titles/features on your computer screen are shown in italics. User input is shown in typewriter font. Cloud Infrastructure Design Guide, Version 2.0 Telstra Corporation Limited (ABN ) All rights reserved. This work is copyright. Apart from any use as permitted under the Copyright Act 1968, information contained within this manua l cannot be used for any other purpose other than the purpose for which it was released. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the written permission of Telstra Corporation Limited. Words mentioned in this book that are known to be trademarks, whether registered or unregistered, have been capitalised or use initial capitals. Terms identified as trademarks include Microsoft and Microsoft Windows. CHAPTER 1 CLOUD INFRASTRUCTURE OVERVIEW 2
3 WHAT S INSIDE CHAPTER 1 CLOUD INFRASTRUCTURE OVERVIEW 4 CHAPTER 2 INTRODUCTION TO MULTI-TIERED NETWORKS 7 CHAPTER 3 TWO-TIERED NETWORKS 8 CHAPTER 4 THREE-TIERED NETWORKS 12 CHAPTER 5 APPLICATIONS IN A PRIVATE NETWORK 16 CHAPTER 6 USING MULTIPLE VIRTUAL DATA CENTRES 18 CHAPTER 7 USING MULTIPLE APPLICATIONS 20 CHAPTER 8 USING MULTIPLE VIRTUAL SERVER TYPES 22 CHAPTER 1 CLOUD INFRASTRUCTURE OVERVIEW 3
4 CHAPTER 1 CLOUD INFRASTRUCTURE OVERVIEW This section contains short introductions to the network components used in cloud infrastructure. Most of these descriptions provide links to further information. VIRTUAL SERVER SERVICES In cloud infrastructure, there are three types of virtual server services that can be used in various combinations. When creating your cloud environment, you select a virtual server service as part of a compute service. Our virtual server services are: Virtual server (shared) Virtual server (dedicated) Managed virtual server (dedicated) Virtual server (shared) uses a flexible pool of shared resources based in our cloud. Resources including CPU, RAM and storage are virtualised for your use, and scaled up or down to meet your needs. Virtual server (dedicated) and managed virtual server (dedicated) both virtualise server CPU and RAM from a specific allocation of physical resources. Storage is drawn from a shared pool of resources. As part of our managed virtual server (dedicated) service, we perform and take responsibility for a number of operational requirements for your cloud solution. Managed virtual server (dedicated) is available from data centres in Australia, London, Hong Kong and Singapore, but is not available to Telstra Global customers. Each of the server types listed above have different ways of using and configuring resources such as storage, CPU, RAM, operating systems and software. For more information, see the user guide for each server type: Virtual Server (Shared) User Guide Virtual Server (Dedicated) User Guide Managed Virtual Server (Dedicated) User Guide Network configuration and features are common between all server types. Our backup service is available across all server types. OUR DATA CENTRES Our data centres securely house the physical resources and infrastructure used to provide our cloud solutions. We own, operate and maintain all our physical data centres. Data centres are currently located in: Australian locations Melbourne Perth Sydney CHAPTER 1 CLOUD INFRASTRUCTURE OVERVIEW 4
5 International locations Singapore Hong Kong London Data centres provide you with connectivity to: The internet Your private networks via a Telstra Next IP network, Global IP VPN connection or IPsec VPN tunnel Your data in the cloud Both dedicated and shared virtual servers and resources You can select which data centre location(s) you wish to contain specific cloud infrastructure services. We describe your chosen data centre location(s) as your virtual data centre(s). You can use virtual data centres in different countries, and have multiple virtual data centres in the same location. If you re drawing your cloud resources from Australia, your virtual server (shared) can only be provisioned from our Melbourne data centre. All other virtual server types and resources are available from any of our data centres in Australia and globally. VIRTUAL SERVER NETWORKS You can choose to contain a virtual server within a public or private network, or use dual homing to connect a virtual server to both networks. Each of your networks can contain virtual servers, firewalls, load balancers and up to 10 subnets per virtual server service. All virtual servers within a network can be allowed to communicate with each other, or separated using firewall rules. Your public network is accessible through an internet connection, via your public interconnect. Your private network is only accessible through a private network connection, via your private interconnect. Learn more about virtual server networks in our Network and Security User Guide. CONNECTING TO YOUR PRIVATE NETWORK There are a few different ways to connect to your private network through your private interconnect: A Telstra Next IP network (or Global IP VPN for virtual data centres outside Australia) An IPsec VPN tunnel Both a Telstra Next IP network and an IPsec VPN tunnel A Telstra Next IP network allows connection to all, or selected private subnets within your private network. A Telstra Next IP network can only access Australian data centres. International data centre users have an equivalent Global IP VPN network connection available. IPsec VPN provides a permanent, site-to-site network tunnel between an office LAN and a private network within a single virtual data centre via the internet. You can create up to ten IPsec VPN tunnels per virtual data centre. Each IPsec VPN allows connection to one virtual data centre. CHAPTER 1 CLOUD INFRASTRUCTURE OVERVIEW 5
6 For more details on how you can connect to your virtual server networks, see our Network and Security User Guide. IP ADDRESSING We allocate public IP addresses to virtual servers in your public network, from a shared subnet on a one-by-one basis. Public IP address allocation may happen automatically, or after you request it, depending on the type of virtual server. You can choose up to 10 private subnets per virtual server service (non-internet addressable) for virtual server groups in your private network. A separate private subnet is required for each server type contained within your private network. For more information about managing IP addresses and subnets, see the Network and Security User Guide. VIRTUAL SERVER CONNECTION TO A SECOND NETWORK DUAL HOMING A dual homed virtual server has both a public and private IP address, allowing it to be accessed through both your public and private network connections. Dual homing can also be used to allow communication between virtual servers contained in different networks (public and private). For more detailed information about public and private networks, refer to our Network and Security User Guide. SSL VPN MANAGEMENT CONNECTION TO VIRTUAL SERVERS Using secure remote access (SSL VPN), you can remotely and securely manage any virtual server. SSL VPN is made possible through a management connection point (vnic) available on all virtual servers. This management connection is separate to any public and private network connections, and can t be used as a secure access method for end users. Our Network and Security User Guide contains more information about SSL VPN. NETWORK FEATURES You can manage traffic flow, privacy and security of your data using firewalls and load balancers. Firewalls are used to create most of the network configurations shown in this guide. You can customise firewall rules to allow or deny traffic through groups or individual virtual servers. A separate firewall is required for each network, and each compute service within your cloud solution. Load balancers can be used to distribute traffic across multiple virtual servers within the same network, which could include different virtual server types. To learn more about firewalls and load balancers, see the Network and Security User Guide. CHAPTER 1 CLOUD INFRASTRUCTURE OVERVIEW 6
7 CHAPTER 2 INTRODUCTION TO MULTI-TIERED NETWORKS In network architecture, servers can be separated into tiers according to their functionality within the network and/or security requirements. Tiers allow the presentation, processing and storage of data to be separated within a network. TIERS AND ZONES IN CLOUD INFRASTRUCTURE Using our cloud resources, virtual servers can be grouped into tiers using several methods. Separate tiers can be formed by creating both a public and private network. Each of these network tiers can be split further into multiple tiers using firewall rules. Virtual servers can be allowed to communicate with each other if they are within the same tier, or located in adjacent tiers. Zoning is a way of separating groups of virtual servers within the same tier. Each zone can include one or more virtual servers that can communicate with each other. Zoning is achieved through firewall rules. BENEFITS OF MULTI-TIER CONFIGURATIONS Tiered network configurations can provide greater security, privacy and control of your data in the cloud. By separating your databases from the presentation tier where data is accessed and viewed, you can securely control access to the database itself. In its most basic form, this scenario creates a two-tier network configuration. To further increase the security and scalability of your cloud solution, you could separate your database virtual servers from your application tier - the virtual servers used to process your data. This will also reduce the workload on individual virtual servers. This scenario results in three-tier network configuration. In the following pages, this guide illustrates common network scenarios you can produce in our cloud environment. For each scenario, we ll describe the cloud resources, networks and connections you ll need to use. CHAPTER 2 INTRODUCTION TO MULTI-TIERED NETWORKS 7
8 CHAPTER 3 TWO-TIERED NETWORKS TWO-TIERED SCENARIO You may want to run an application from the cloud using a typical two-tiered network configuration. In this example the presentation tier is accessible to users via the internet. An alternative two-tiered scenario would be to make your presentation tier accessible only from a private network connection (an intranet for example). Read about running applications in a private network later in this guide. The presentation tier will need to manage high volumes of traffic, so a load balancer is used to distribute traffic across the virtual servers in the presentation tier. To send and receive information to and from the database, the virtual servers in the presentation tier will need to communicate with the virtual server in the database tier. For data security you may want to restrict access to the database tier. For simplicity in this particular scenario, we re only using a total of three virtual servers. We ll assume you may want to add more virtual servers later on. CHAPTER 3 TWO-TIERED NETWORKS 8
9 HOW TO CONFIGURE TWO TIERS USING CLOUD INFRASTRUCTURE There are two alternative ways to create this configuration in cloud infrastructure: Separation of networks Virtual tiering TWO-TIERED CONFIGURATION 1: SEPARATION OF NETWORKS This is the first of two methods that can be used to achieve a two-tiered network scenario. In this method, tiering is achieved using two networks, with the database server accessible from a private network connection. VIRTUAL SERVERS AND CONNECTIONS To build the presentation tier, create two virtual servers each connected to both a public and private network (dual-homed). These virtual servers will be contained in your public network and always connected to the internet, with traffic potentially restricted by firewall rules. Create a virtual server for your database in your private network. Your database virtual server will be directly accessible through a private network connection (IPsec VPN, Telstra Next IP network or Global IP VPN). In addition to their network connection(s), all virtual servers in both tiers can be managed directly through an SSL VPN connection. CHAPTER 3 TWO-TIERED NETWORKS 9
10 There are no limits to the number of virtual servers you can add to any tier, at any time. FIREWALLS Configure a firewall in your public network to control traffic between: The internet and the virtual servers in your presentation tier Add and configure a firewall in your private network to control traffic between: Virtual servers in the presentation tier and the database server The database server and your private interconnect LOAD BALANCER Add and configure a load balancer in your public network to distribute traffic across virtual servers in your presentation tier. CHAPTER 3 TWO-TIERED NETWORKS 10
11 TWO-TIERED CONFIGURATION 2: VIRTUAL TIERING This is a second method for creating a two-tiered network scenario using cloud infrastructure. In this configuration using a single public network, virtual tiering is created using a firewall. None of the virtual servers are accessible from a private network connection. VIRTUAL SERVERS AND CONNECTIONS Create three virtual servers, all connected to the public network. One of these virtual servers will contain your database. All these virtual servers will be contained in your public network and connected to the internet, with traffic restricted by firewall rules. All virtual servers can be managed directly through an SSL VPN connection. There are no limits to the number of virtual servers you can add to any virtual tier, at any time. FIREWALLS To create separate virtual tiers for your presentation servers and database servers, you ll need to configure multiple rules on the firewall in the public network to control traffic between: The internet and all your virtual servers in the public network, including restricting access from the internet to the database server Virtual servers in the presentation tier and the database server LOAD BALANCER Add and configure a load balancer to distribute traffic across only your virtual servers in the presentation tier. CHAPTER 3 TWO-TIERED NETWORKS 11
12 CHAPTER 4 THREE-TIERED NETWORKS THREE-TIERED SCENARIO You may want to run an application from the cloud using a typical three-tiered network configuration. In this scenario, the presentation tier is accessible to users via the internet. An alternative three-tiered scenario (not illustrated on this page) would be to make your presentation tier accessible only from a private network connection. Read about applications in a private network later in this guide. In the configuration shown, the presentation tier will need to support high volumes of traffic - so a load balancer is used to distribute traffic across both virtual servers in the presentation tier. The application tier contains the virtual servers that will process data, and communicate with both the presentation tier and the database tier. If connecting to your application tier through a private network connection, an optional firewall can restrict traffic from directly accessing virtual servers in the application tier. A third tier is needed to contain the database, and separate it from the data processing that happens in the application tier. If you want to connect to your database tier through a private network connection, an optional firewall can restrict access to the database server. In this specific scenario, we re using a basic configuration of just five virtual servers. We ll make allowance for you to add more virtual servers in the future. CHAPTER 4 THREE-TIERED NETWORKS 12
13 HOW TO CONFIGURE THREE TIERS USING CLOUD INFRASTRUCTURE There are two different ways to create this three-tiered configuration in cloud infrastructure: Separation of networks Virtual tiering THREE-TIERED CONFIGURATION 1: SEPARATION OF NETWORKS This is one of two methods you could use to achieve a three-tiered network scenario. Using this method, tiering is achieved using two networks, with both the application servers and database server accessed from a private network connection. VIRTUAL SERVERS AND CONNECTIONS To construct the presentation tier as shown in the scenario, create two virtual servers each connected to both the public and private network (dual-homed). These virtual servers will be contained in your public network and always connected to the internet, but potentially restricted by firewall rules. Create three more virtual servers in your private network. These servers will all exist in your private network, but will be separated into application and database tiers using firewall rules. Both your application and database virtual servers will only be directly accessible through a private network connection (IPsec VPN, Telstra Next IP network or Global IP VPN). CHAPTER 4 THREE-TIERED NETWORKS 13
14 In addition to their network connection(s), all virtual servers in all tiers can be managed directly through an SSL VPN connection. There are no limits to the number of virtual servers you can add to any tier, at any time. FIREWALLS Configure a firewall in your public network to control traffic between: The internet and the virtual servers in your public network (presentation tier) Add and configure a firewall in your private network to control traffic between: Virtual servers in the presentation tier and the application tier Virtual servers in the application tier and the database server All virtual servers in your private network (application and database), and the private interconnect LOAD BALANCER Add and configure a load balancer in your public network to distribute traffic across virtual servers in your presentation tier. CHAPTER 4 THREE-TIERED NETWORKS 14
15 THREE-TIERED CONFIGURATION 2: VIRTUAL TIERING This is an alternative method for creating a three-tiered network configuration using cloud infrastructure. This configuration uses a single public network, and creates virtual tiering within the network using a firewall. None of the virtual servers are accessible from a private network connection. VIRTUAL SERVERS AND CONNECTIONS To achieve the configuration shown in the scenario, create five virtual servers, all connected to the public network. One of these virtual servers will contain your database, two of the servers will be used for the application tier and two virtual servers will form the presentation tier. Firewall rules will be used to create the separation. All these virtual servers will be contained in your public network and connected to the internet, with option of restricting internet traffic using firewall rules. All virtual servers can be managed directly through an SSL VPN connection. There are no limits to the number of virtual servers you can add to any virtual tier, at any time. FIREWALLS To create three separate virtual tiers, you ll need to configure multiple rules on the firewall in your public network to control traffic between: The internet and all your virtual servers in the public network, including restricting access from the internet to the application tier and database server Virtual servers in the presentation tier and the application tier Virtual servers in the application tier and the database server LOAD BALANCER Add and configure a load balancer to distribute traffic across virtual servers in your presentation tier. CHAPTER 4 THREE-TIERED NETWORKS 15
16 CHAPTER 5 APPLICATIONS IN A PRIVATE NETWORK PRIVATE APPLICATION SCENARIO In the previous pages of this guide we ve described typical two-tier and three-tier network scenarios, where the presentation tier virtual servers are accessed via the internet. Alternatively, you could choose to make your application accessible only via a private network connection. Creating an intranet is a typical example. HOW TO CONFIGURE A PRIVATE APPLICATION USING CLOUD INFRASTRUCTURE To replicate a typical intranet network scenario, follow any of the previous virtual tiering examples in this guide, with these exceptions: Instead of creating virtual servers with public network connections, create all virtual servers with only a private network connection (do not dual home) Create your firewall(s) in your private network, not a public network Create your load balancer(s) in your private network, not a public network Following these instructions will mean none of your virtual servers will be publically accessible via the internet. You ll need an IPsec VPN, Telstra Next IP network or Global IP VPN to access your virtual servers. CHAPTER 5 APPLICATIONS IN A PRIVATE NETWORK 16
17 USING MULTIPLE INTRANETS IN A SINGLE PRIVATE NETWORK You can choose to create multiple intranets within the same private network, separated by firewalls. Firewall rules can be configured to separate zones of virtual servers within a private network. CHAPTER 5 APPLICATIONS IN A PRIVATE NETWORK 17
18 CHAPTER 6 USING MULTIPLE VIRTUAL DATA CENTRES MULTIPLE VIRTUAL DATA CENTRES SCENARIO You may want to run an application in the cloud, and draw your virtualised resources from separate locations. In this case, access to two separate virtual data centres is required. In this scenario, the virtual servers will need to support high volumes of traffic, so a load balancer is used to distribute traffic within each virtual data centre. Communication between the two virtual data centres is allowed in this scenario. An alternative scenario (not shown) may be that communication between different virtual data centres is intentionally blocked. Multiple virtual data centres might be used to locate specific cloud resources closer to where the end users are based. In this scenario we don t specify the tiering configuration of the network in each virtual data centre. The network configuration at each virtual data centre needn t be identical, unless redundancy is your purpose. CHAPTER 6 USING MULTIPLE VIRTUAL DATA CENTRES 18
19 HOW TO CONFIGURE MULTIPLE VIRTUAL DATA CENTRES USING CLOUD INFRASTRUCTURE The following configuration shows how you can connect to, and allow communication between two virtual data centres in different locations. You could connect any number of virtual data centres using these methods. Connection is via a private network connection in this scenario, although this isn t a requirement in cloud infrastructure. You can create public networks in addition to, or instead of private networks in two virtual data centres. To allow two public networks in different virtual data centres to communicate with each other, you ll need to either: Establish connectivity between the virtual data centres via the internet Dual home all the individual virtual servers in both virtual data centres, you want to be in communication. Then ensure you have a separate private network connection to each virtual data centre. You can choose a virtual data centre service in any of our Australian and global locations, in any combination. VIRTUAL SERVERS AND CONNECTIONS Any of the two or three-tier network configurations shown in this guide could be created in each virtual data centre. If you require private networks in separate data centres to communicate with each other, then you ll need a Telstra Next IP network connection (or Global IP VPN) to each private network. You ll need to make sure the private IP addresses in the two data centres you are connecting, don t overlap. This will mean your virtual servers will only be accessible through a private network connection. FIREWALLS Configure a firewall in each of your data centre networks to control traffic between: Your public and private interconnects and individual virtual servers You may require additional firewalls to control traffic flow between your virtual tiers (not illustrated). LOAD BALANCERS You can configure a load balancer in each data centre to distribute traffic across virtual servers in your presentation tiers. CHAPTER 6 USING MULTIPLE VIRTUAL DATA CENTRES 19
20 CHAPTER 7 USING MULTIPLE APPLICATIONS MULTIPLE APPLICATIONS SCENARIO You may want to run more than one application within a network, but restrict communication between different applications. HOW TO CONFIGURE MULTIPLE APPLICATIONS USING CLOUD INFRASTRUCTURE The scenario objectives can be achieved within a single virtual data centre using: Zoning with firewall rules Public and private network separation It s also possible to use a combination of these methods to separate multiple applications within a single data centre. You could also place applications in different virtual data centres. ZONING WITH FIREWALL RULES The virtual server(s) handling a single application can be separated (zoned) from all other applications using firewall rules. Zoning allows you to separate any number of applications. Different firewall security policies can be applied to virtual servers on each tier. So for instance, for a particular application you could choose to create a zone for virtual servers in your application tier, but allow virtual servers in your database tier to communicate with other virtual servers. CHAPTER 7 USING MULTIPLE APPLICATIONS 20
21 PUBLIC AND PRIVATE NETWORK SEPARATION Using this method, a maximum of two applications can be separated within the same virtual data centre, if one operates in your public network and the other one in the private network. In this case, all virtual servers (in the presentation tier, application tier and database tier) handling one application must be contained in a single network (public or private). CHAPTER 7 USING MULTIPLE APPLICATIONS 21
22 CHAPTER 8 USING MULTIPLE VIRTUAL SERVER TYPES There are three different types of virtual server we offer in cloud infrastructure, with varying levels of configuration control. You can use one type of virtual server alongside virtual servers of another type. Different virtual server types can be used within a single network (public or private), or in separate networks in the same virtual data centre. Each compute service can have its own firewall. To allow communication between two virtual servers of different types, within a single network (public or private), separate firewall rules need to be configured for each compute service within the network. If load balancers are required, a single load balancer can service all virtual servers within a network, regardless of their type. WHY USE MULTIPLE VIRTUAL SERVER TYPES? There are several situations where you may want to use a combination of virtual server types. For example: Testing environments Virtual server (shared) could be used to create a testing environment with lower, more variable traffic volume in and out of testing phases. Simultaneously, it may be more efficient to run a production application on virtual server (dedicated), assuming your resource demand is relatively constant. CHAPTER 8 USING MULTIPLE VIRTUAL SERVER TYPES 22
23 Additional short term capacity You may want to use virtual server (dedicated) to handle your core traffic volumes, and use virtual server (shared) to meet spikes in traffic. Virtual server (shared) can be quickly provisioned, and allow you to efficiently use shared resources for short periods of time. CHAPTER 8 USING MULTIPLE VIRTUAL SERVER TYPES 23
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
INTERNET VPN SETUP GUIDE
INTERNET VPN SETUP GUIDE PRINTED 00/00/00 1 OF 21 DRAFT [SECURITY CLASSIFICATION] [TELSTRA ID] INTERNET VPN SETUP GUIDE - FINAL INTERNET VPN WHAT S INSIDE OVERVIEW... 4 BUYING INTERNET VPN... 5 SETTING
CLOUD INFRASTRUCTURE NETWORK AND SECURITY USER GUIDE
CLOUD INFRASTRUCTURE NETWORK AND SECURITY USER GUIDE WELCOME TO THE NETWORK AND SECURITY USER GUIDE This guide focuses on the network and security features of cloud infrastructure, common to all virtual
CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE
CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE WELCOME TO THE VIRTUAL SERVER (SHARED) USER GUIDE AUSTRALIAN ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact your
CISCO CLOUD SERVICES PRICING GUIDE AUSTRALIA
CISCO CLOUD SERVICES PRICING GUIDE AUSTRALIA WELCOME TO CISCO CLOUD SERVICES Cisco Cloud Services is a public cloud infrastructure offering from Telstra which includes a range of compute, storage and network
TELSTRA CLOUD SERVICES RESPONSIBILITIES GUIDE V10.0
TELSTRA CLOUD SERVICES RESPONSIBILITIES GUIDE V10.0 WELCOME TO TELSTRA CLOUD SERVICES Cloud Services offers a growing range of infrastructure, backup and software cloud products and services. NEED GENERAL
CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) USER GUIDE
CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) USER GUIDE WELCOME TO THE VIRTUAL SERVER (DEDICATED) USER GUIDE AUSTRALIAN ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact
PREMIUM BUSINESS GATEWAY - DEVG2020 DIGITAL BUSINESS USER GUIDE
PREMIUM BUSINESS GATEWAY - DEVG2020 DIGITAL BUSINESS USER GUIDE NEED MORE SUPPORT? If you have questions beyond this guide, we want to help. To learn more about your Business Broadband or Digital Business
CLOUD INFRASTRUCTURE MANAGED VIRTUAL SERVER (DEDICATED) USER GUIDE
CLOUD INFRASTRUCTURE MANAGED VIRTUAL SERVER (DEDICATED) USER GUIDE WELCOME TO MANAGED VIRTUAL SERVER ON DEDICATED COMPUTE For sales, account set-up enquiries and technical support, contact your Telstra
Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks
Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks How-to guides for configuring VPNs with GateDefender Integra Panda Security wants
ZyWALL USG-Series. How to setup a Site-to-site VPN connection between two ZyWALL USG series.
ZyWALL USG-Series How to setup a Site-to-site VPN connection between two ZyWALL USG series. Table of content Introduction... 3 ZyWALL USG 100... 4 Creating the address objects... 4 Creating VPN Gateway...
Managed Services Online
Managed Services Online Enrolment Guide Application Enrolment and Managing Users October 2013 Managed Services Online, User Guide, Version 1.0 Telstra Corporation Limited (ABN 33 051 775 556) 2012. All
Connecting an Android to a FortiGate with SSL VPN
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE
CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE ABOUT THIS GUIDE This guide provides you with the required steps and instructions to transfer your data to your desired virtual server(s).
MANAGE YOUR MAIN BUSINESS NUMBER WITH CALL CONDUCTOR
MANAGE YOUR MAIN BUSINESS NUMBER WITH CALL CONDUCTOR WELCOME TO CALLCONDUCTOR! DOT (Digital office Technology) introduces a number of innovative features and products to assist you with managing calls
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using RSA Keys For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 10 Establish Site-to-Site VPN Connection using
Microsoft Azure ExpressRoute
Microsoft Azure ExpressRoute Michael Washam Summary: Microsoft Azure ExpressRoute makes it easy to establish dedicated and private circuits between your data center and Microsoft Azure. ExpressRoute connections
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using Digital Certificates For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 14 Establish Site-to-Site VPN Connection
Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview
Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be
ISG50 Application Note Version 1.0 June, 2011
ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
HOWTO: How to configure IPSEC gateway (office) to gateway
HOWTO: How to configure IPSEC gateway (office) to gateway How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender Integra. For this
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY VMWARE
SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY VMWARE Looking for a way to benefit from IT adoption without managing your own IT systems? SingTel Managed Cloud, powered by VMware, is an
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments
White Paper SSL vs. IPSec Streamlining Site-to-Site VPN Deployments May 2011 SiteDirect Access. Security. Delivery. Introduction Traditionally, corporate users rely on IPSec for site-to-site access. However,
How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: 10.00 onwards. Overview. Scenario. Site A Configuration
How To Establish Site-to-Site VPN Connection How To Establish Site-to-Site IPSec VPN Connection using Preshared key using Preshared Key Applicable Version: 10.00 onwards Overview IPSec is an end-to-end
Implementing Business Portal in an Extranet Environment
Implementing Business Portal in an Extranet Environment Published: December 2005 Table of contents Introduction...1 What is extranet access?...1 Why deploy Business Portal in an extranet?...1 Order Management...1
Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.
Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc. Introduction In this whitepaper, we will configure a VPN tunnel between two SonicWALLs running SonicOS 2.0 Enhanced that
Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.
30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V
Overview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY MICROSOFT
SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY MICROSOFT SingTel Managed Cloud, powered by Microsoft, is a secure and agile cloud computing solution (Infrastructure-as-a-Service or IaaS)
Configuring IPsec VPN between a FortiGate and Microsoft Azure
Configuring IPsec VPN between a FortiGate and Microsoft Azure The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another
Dimension Data Public Compute-as-a-Service Regional Rate Plan Pricing Options
ratecard Dimension Data Public Compute-as-a-Service al Rate Pricing Options Dimension Data Public Compute-as-a-Service (CaaS) al Rate (RRP) pricing offers unrivaled value and flexibility with no vendor
Interoute Virtual Data Centre. Hands on cloud control.
Interoute Virtual Data Centre. Hands on cloud control. Scale your computing resource on demand Choose where in Europe you want your data Europe s most trusted and secure network www.interoute.com/vdc Interoute
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Configuring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003
Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...
Release Version 3 The 2X Software Server Based Computing Guide
Release Version 3 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
How to Guide: StorageCraft Cloud Services VPN
How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
G-Cloud V Services Pricing Document Accenture IaaS Services
G-Cloud V Services Pricing Document Accenture IaaS Services 1 Table of contents 1. Pricing... 3 2. Contacts... 4 2 1. Pricing Accenture IaaS services are charged on a pay per use model. Consumption of
Connecting Remote Offices by Setting Up VPN Tunnels
Connecting Remote Offices by Setting Up VPN Tunnels Cisco RV0xx Series Routers Overview As your business expands to additional sites, you need to ensure that all employees have access to the network resources
How to configure DNAT in order to publish internal services via Internet
How to configure DNAT in order to publish internal services via Internet How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender
Become more agile with Cloud services
Become more agile with Cloud services and create cost-saving and security benefits for your busines Choose from a Private, Public, Hybrid or On-Premise Cloud service from NTT Communications ICT Solutions
NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD. Debbie Montano, Chief Architect [email protected]
NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD Debbie Montano, Chief Architect [email protected] DISCLAIMER This statement of direction sets forth Juniper Networks current intention
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you
Fujitsu Cloud IaaS Trusted Public S5 shaping tomorrow with you Realizing the cloud opportunity: Fujitsu Cloud iaas trusted Public s5 All the benefits of the public cloud, with enterprise-grade performance
Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.
Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio
Support of Windows Server 2012 The NCP Secure Enterprise VPN Server supports the Windows Server 2012 (64 bit) operating system.
NCP Secure Enterprise HA Server Service Release 3.03 Build 007 (Windows 32/64) Date: March 2013 1. New Features and Enhancements The following new feature has been introduced in this release: Support of
Reaping the Full Benefits of a Hybrid Network
Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall Overview This document describes how to implement IPSec with pre-shared secrets
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
TIPT UC-ONE IOS/ANDROID PC & MAC DESKTOP CLIENT GUIDE
TIPT UC-ONE IOS/ANDROID PC & MAC DESKTOP CLIENT GUIDE WELCOME TO TIPT UC-ONE CLIENT! CONVENTIONS USED IN THIS GUIDE The following typographical conventions are used in this guide for simplicity and readability:
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Cisco VPN Concentrator Implementation Guide
Cisco VPN Concentrator Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
VERIFONE ENHANCED ZONE ROUTER
VERIFONE ENHANCED ZONE ROUTER Security, remote management, and network connectivity offering more solutions for your c-store. SUMMARY The Verifone Enhanced Router is designed for customers to implement
How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
VPN Configuration Guide. Cisco Small Business (Linksys) WRVS4400N / RVS4000
VPN Configuration Guide Cisco Small Business (Linksys) WRVS4400N / RVS4000 2010 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this configuration guide may not be copied, in
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
VPN Configuration Guide. Dealing with Identical Local and Remote Network Addresses
VPN Configuration Guide Dealing with Identical Local and Remote Network Addresses equinux AG and equinux USA, Inc. 2009 equinux USA, Inc. All rights reserved. Under the copyright laws, this manual may
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
ReadyNAS Remote. Add-on Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. May 2012 202-10958-01
Add-on Manual 350 East Plumeria Drive San Jose, CA 95134 USA May 2012 202-10958-01 2012 All rights reserved No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
The Incremental Advantage:
The Incremental Advantage: MIGRATE TRADITIONAL APPLICATIONS FROM YOUR ON-PREMISES VMWARE ENVIRONMENT TO THE HYBRID CLOUD IN FIVE STEPS CONTENTS Introduction..................... 2 Five Steps to the Hybrid
I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:
Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4
Integration with IP Phones
Copyright 2010 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,
icrosoft TMG Replacement with NetScaler
icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled
Meeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702
Meeting Management Solution Technology and Security Overview 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Technology SaaS Software as a Service is offered as well. Client may
Zadara Storage Cloud A whitepaper. @ZadaraStorage
Zadara Storage Cloud A whitepaper @ZadaraStorage Zadara delivers two solutions to its customers: On- premises storage arrays Storage as a service from 31 locations globally (and counting) Some Zadara customers
Telstra Wholesale Digital Certificates
Telstra Wholesale Digital Certificates LinxOnline User Guide Issue Number 2, 31 July 2007 Version 2, 31 July 2007 TW Digital Certificate Management User Guide Copyright 2007, Telstra Corporation Limited.
VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide. http://www.peplink.com - 1 - Copyright 2015 Peplink
Peplink Balance http://www.peplink.com - 1 - Copyright 2015 Peplink Introduction Introduction Understanding Peplink VPN solutions Peplink's VPN is a complete, seamless system that tightly integrates your
Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.
Creating a Client-To-Site VPN BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Issue 2 Introduction This guide is intended to demonstrate how easy it is
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Scenario: Remote-Access VPN Configuration
CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security
How to Create a Basic VPN Connection in Panda GateDefender eseries
How to Create a Basic VPN Connection in Panda GateDefender eseries Support Documentation How-to guides for configuring VPNs with Panda GateDefender eseries Panda Security wants to ensure you get the most
Technical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key
How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key Objective This article will detail how to setup Cyberoam VPN Client to securely connect to a Cyberoam for the
How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network
Authenticating SSL VPN users using LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user
Scenario 1: One-pair VPN Trunk
VPN Trunk Load-Balance between Vigor3200 and Other Vigor Router This section will discuss how to build VPN Trunk with load-balance between Vigor3200 and other router (e.g., Vigor3300). Scenario 1: One-pair
Our Cloud Offers You a Brighter Future
Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,
HP Service Manager Architecture and Security HP Software-as-a-Service
HP Service Manager Architecture and Security HP Software-as-a-Service Introduction...2 Architecture...2 Infrastructure Setup...4 Security Setup...4 Customer Infrastructure Requirements...5 Introduction
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Studio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
SharePoint 2013 on Windows Azure Infrastructure David Aiken & Dan Wesley Version 1.0
SharePoint 2013 on Windows Azure Infrastructure David Aiken & Dan Wesley Version 1.0 Overview With the Virtual Machine and Virtual Networking services of Windows Azure, it is now possible to deploy and
Application Notes. How to Configure Application Control for the UTM
How to Configure Application Control for the UTM T a b l e o f C o n t e n t s Contents...2 Concepts...3 Components...3 Configuration Steps...4 Configuring Global Mode...4 Configuring Profile Mode...10
