Going Cloud, Going Mobile: Will Your Network Drag You Down? Wes Morgan, IBM / 2 Feb 2016
|
|
- Merryl Marsh
- 8 years ago
- Views:
Transcription
1 Going Cloud, Going Mobile: Will Your Network Drag You Down? Wes Morgan, IBM / 2 Feb 2016
2 What We ll Cover Why Are We Here? Understanding Data Flow Fundamental Change Aggregate Effects Remote Sites Security Mobile/BYOD Location, Location, Location VPN Users In or Out? Content Delivery Networks Testing Network/Carrier Performance Setting Expectations Q&A 2
3 Why Are We Here? Applications folks aren't usually network folks Enterprise networks are increasingly complex Concerned about application performance Need to set expectations Everywhere Access can be a challenge Mobile/BYOD business pressure Ever-increasing security concerns 3
4 Understanding Data Flow Nothing more than the path of transactions to/from (OR FOR) the server(s) in question THIS IS NOT JUST A POINT-TO-POINT QUESTION! Multiple factors affect data flow WAN links Proxy/firewall use Concentration of users Network design Side band transactions (authentication, document archival/retrieval, directory, etc.) Each step can introduce its own latencies Each step has its own overhead 4
5 Typical Enterprise Data Flow VPN Users Variable DMZ (extranet) Variable Internet Regional Variable VPN Users Gigabit Data Center Main Office Gigabit Data Center WAN Regio n HQ WAN/DSL WAN/DSL Internal External Field Office s Home Region Field Office s Other Region(s)
6 What's Your Data Flow Today? Questions to ask Things you should know already How many remote offices? How many users? What bandwidth do they have? How many home/vpn users? Users by geography? Planning for mobile/cloud Current Internet access Where? How? (direct access, HTTP proxy?) Authentication required? Different in other regions? Current Internet capacity & utilization? PARTNER WITH YOUR NETWORK TEAM NOW! 6
7 Moving to the Cloud A Fundamental Change Depending on the application, you may be moving up to 100% of your application's data flow to the Internet Auxiliary tasks may set up multiple tasks/connections per client Significant increase in both number of connections and volume of data Throughput of boundary devices (e.g. firewalls) Licensing (many firewalls, & network devices are licensed by # of concurrent connections) It's the Internet, folks Added latency how much? Content Distribution Networks (e.g. Akamai) in use? Electrons only move so fast 7
8 Typical Cloud Data Flow VPN Variable Internet Variable Users VPN DMZ (extranet) Variable Regional Data Center Users Main Office Gigabit Data Center WAN Regio n HQ WAN/DSL WAN/DSL Internal External Field Office s Home Region Field Office s Other Region(s)
9 Worst-Case Scenario: Think About Remote Sites Leaf node a location with only one connection to the enterprise network Still seen in both small and large enterprises Largely rendered moot by ISP cloud model everyone has one connection Think about low-bandwidth (or high-latency) sites DSL T1 (1.5 Mbit/s) or lower Satellite links Geographically remote sites usually suffer higher latency
10 Worst-Case Scenario: Think About Remote Sites Old latency = site to network core and back ( ping the data center ) Aggregate effect of every link in network path Cloud latency = site to network core to INTERNET SITE and back Bandwidth-intensive apps (e.g. audio/video) will suffer even more Be sure to include such sites in your tests and/or pilot deployment 10
11 Security How Much Is Too Much? Security policies can have significant impact on cloud performance Mandatory use of proxies is a known flashpoint Moving to cloud-based service will potentially add THOUSANDS of connections/hour to the proxy load Stressed proxy servers can introduce very high latency If proxies are required, you may need to upgrade/add proxy servers to handle the load Some proxies are licensed by number of concurrent connections - may need upgrade 11
12 Security How Much Is Too Much? HOWEVER... Many (if not most) cloud apps use either HTTPS or native encryption May be sufficient to meet security policies/concerns If so, bypass the proxy for connections to cloud services (PAC file for browser-based apps, open outbound firewall) Some customers have established dedicated proxies Some firewalls are also licensed by number of concurrent connections HAVE THIS DISCUSSION NOW! Performance problems in these areas are intermittent and difficult to diagnose 12
13 Mobile/BYOD Location, Location, Location Placement of servers is key First question which services will be external? These servers should go in your DMZ May require receipt of push notifications, e.g. Apple APNS Don't want external connections coming all the way in to the data center 13
14 Mobile/BYOD Location, Location, Location Second question - what MDM will I use? MDM solution necessary to manage access, passwords, appstore access, etc. Third question - what has to be open in the firewall? Mix of inbound/outbound connectivity, depending on service May need to come in to internal servers (e.g. Traveler) Most purely internal BYOD clients can be treated as any other internal client May wind up using reverse proxies to reach internal servers e.g. Sametime Proxy Server in DMZ vs. reverse-proxy to internal Sametime Proxy Server 14
15 Mobile/BYOD: Where Are My Back-End Servers? Mobile provisioning usually doesn't change where the user's data lives HOWEVER... Now you're establishing a mobile base in your DMZ that has to be able to reach ALL of the internal servers hosting the user's data Significant increase in firewall traffic, both external-to- DMZ and internal-to-dmz Can create additional latency (Traveler server in US DMZ, user's mail server in European data center) 15
16 VPN Users In or Out? Many VPNs push ALL traffic to enterprise network Resulting data flow for VPN user is: Remote site to enterprise network via Internet Enterprise network routes traffic to Internet for cloud services (perhaps via proxy) Response from cloud service returns to enterprise network via Internet (perhaps via proxy) Enterprise network returns response to VPN client via Internet DO YOU SEE THE PROBLEM? (Hint: think overhead!) 16
17 VPN Users In or Out? Most VPNs allow policy settings per IP address Some VPNs modify browser settings (like a PAC file) Allow VPN clients to reach cloud services directly Strips out the middleman of the enterprise network Reduces latency Improves performance Reduces load on enterprise network (VPN concentrators, proxy servers, etc.) 17
18 VPN Users In or Out? Review VPN configuration specifics Many optimizations for data-center target introduce problems with cloud targets, e.g.: Nagle algorithm Delayed ACKs TCP slow start Consider additional load on VPN server(s) 18
19 Understanding Content Delivery Networks Front-end servers at edges of Internet Often hosted at ISP level May perform caching (e.g. HTTP) or simply provide an accelerated tunnel to the cloud provider (e.g. IMAP) Clients directed via DNS Universal name (e.g. server.cloud.com ) DNS gives different answers in different locations (usually via BGP) Clients directed by whatever their DNS says, WHETHER OR NOT IT IS THE CLOSEST CDN POINT! Example: apps.na.collabserv.com Windstream DNS (KY) (11 hops, 38ms) Google DNS (CA) (10 hops, 58ms) VPN #1 (CO) (12 hops, 72ms) VPN #2 (NJ) (14 hops, 108ms) 19
20 Understanding Content Delivery Networks & VPN VPN using corporate DNS but local connectivity C = CDN devices Home client Cloud web access Cloud Provider DNS C C C C Corporate network 20
21 Understanding Content Delivery Networks & VPN VPN using corporate DNS and corporate Internet connectivity C = CDN devices Cloud Home client Cloud web access DNS C C Provider C C Corporate proxy Corporate network 21
22 Content Accelerators Potential Problem! Also known as Enterprise Distributed Content Network (EDCN) devices May be protocol-specific Usually serve as caching/compression engines Usually work in pairs (remote site to data center/core network) Fine if you control both endpoints Can create problems if you access both local and cloud resources with the same protocol Should be configured to only accelerate LOCAL conversations 22
23 SSL Terminators Another Point of Overload Also known as SSL accelerators Serve as a man in the middle to broker SSL connections Usually hardware-limited to a maximum number of concurrent SSL sessions (some as low as 10,000 concurrent connections per board ) Moving to the cloud (or putting mobile resources in your DMZ!) can easily push tens of thousands of connections through these devices Symptom intermittent Everyone who gets in is fine, but suddenly no new people can get in Discuss SSL capacity with your network team! 23
24 Quality of Service (QoS) is your friend! QoS is a network traffic priority scheme Many (if not most) enterprise networks implement some form of QoS today, especially if VoIP is deployed Talk with your network team about QoS consideration for cloud/mobile traffic From the network's perspective, your cloud/mobile traffic is just more Internet traffic You don't necessarily need to be #1 on the priority list, but you want to be higher than the person checking Facebook or Twitter I recommend an initial QoS treatment of one step above routine traffic Can be ABSOLUTELY critical if/when your Internet connectivity is highly utilized 24
25 Testing Network Performance with iperf 3.0 iperf 3.0 created by es.net and Lawrence National Laboratory Free, open-source software Can test TCP, UDP and SCTP throughput iperf packages available at Servers available for Windows and Linux Desktop clients available for Windows, Linux, MacOS Hurricane Electric's HE.NET Network Tools for ios and Android includes an iperf3 client (App Store and Google Play) Requires firewall open for tcp/5201 and udp/5201 Install an iperf server within your cloud/mobile deployments 25
26 Testing Network Performance with iperf 3.0 Linux server, ios client UDP test, transfer 2MB, report every 5s Note that server log includes jitter! Desktop clients can get a copy of the server report with --get-server-output 26
27 Testing Network Performance with iperf 3.0 You can also do basic flood testing -P to specify number of concurrent streams -t to specify test duration -b <number>{k/m/g} to specify bandwidth Example: 8 UDP streams of 384K for 120s (think A/V) 27
28 Evaluating Mobile Users (and Carriers) with GeoIP GeoIP = cross reference IP addresses with city/country/as Also known as 'IP geolocation' AS = Autonomous System (network provider) GeoIP Legacy databases available free from MaxMind Not as precise as paid versions Wireshark supports GeoIP databases Allows you to find/profile: Individual users Performance by city/country Performance by mobile/network provider
29 Wireshark and GeoIP Example from a Traveler deployment
30 Summary - Setting Expectations May need to limit features in some locations Audio/video Database replication Your network team can do a bandwidth analysis Estimated per-user addition to Internet pipe consumption Your testing should accomplish several things Baseline performance for well-connected/central sites Performance rates for remote or poorly-connected sites (be sure to test them!) Identify potential chokepoints in your enterprise networks Compare against other sites (e.g. from home without VPN, public wifi sites, etc.) Estimated per-user addition to proxy load 30
31 Setting Expectations Network upgrades, if indicated, may delay performance improvements for some users REPEAT YOUR TESTING PERIODICALLY! Network may change around you New deployments may affect network performance 31
32 Your Feedback Is Important! Based upon your session attendance, a customized list of surveys will be built for you. Please complete your surveys via the conference kiosks or any web enabled device at or through IBM Event Connect.
33 QUESTIONS AND ANSWERS THANKS FOR BEING HERE! Blog:
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationWeb Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
More informationVPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationDeploying F5 Application Ready Solutions with VMware View 4.5
F5 White Paper Deploying F5 Application Ready Solutions with VMware View 4.5 VMware View is the leading desktop virtualization solution built for delivering desktops as a managed service. F5 BIG IP devices
More informationNetworking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
More informationTest Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com. Application Advisor
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites
More informationTroubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationIBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
More informationSymantec App Center 4.0 Admin Documentation
Symantec App Center 4.0 Admin Documentation Installation Planning Guide September 2012 Symantec Corporation, 2012 Page 1 Table of Contents Purpose of Document... 3 Deployment Options Overview... 3 Public
More informationComparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationThe Hybrid Enterprise. Enhance network performance and build your hybrid WAN
The Hybrid Enterprise Enhance network performance and build your hybrid WAN ABOUT ELFIQ NETWORKS With today s growing Internet demands, Elfiq Networks enhances network performance and business continuity
More informationSAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationWho s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
More informationMCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
More informationRadware s Multi-homing Solutions
Radware s Multi-homing Solutions White Paper May 5, 2003 North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg St Tel Aviv
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationMCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationData Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
More informationKEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure
KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationCisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage
Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationConnecting an Android to a FortiGate with SSL VPN
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
More informationCustomer Cloud Architecture for Mobile
Customer Cloud Architecture for Mobile Executive Overview This paper describes vendor neutral best practices for hosting the services and components required to support mobile apps using cloud computing.
More informationCustomer Cloud Architecture for Mobile
Customer Cloud Architecture for Mobile Executive Overview This paper describes vendor neutral best practices for hosting the services and components required to support mobile apps using cloud computing.
More informationNetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
More informationChapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
More informationSametime 9 Meetings deployment Open Mic July 23rd 2014
Sametime 9 Meetings deployment Open Mic July 23rd 2014 Tony Payne Senior Software Engineer - Sametime Ginni Saini Software Engineer Sametime Support Joshua Edwards Software Engineer Sametime Support IBM
More informationActive Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer
Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer March 2014 Last updated: September 2015 (revisions) Table of Contents Abstract... 3 What We ll Cover...
More informationThe Key to Cost-Effective WAN Optimization - White Paper
The Key to Cost-Effective WAN Optimization - White Paper Table of Contents General...3 The Challenges of WAN Link Management in the Datacenter...3 Link Up-time and Business Continuity...3 The Active-backup
More informationVPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationDistrict of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
More informationUIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
More informationVegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationTRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com
More informationCUSTOMER SAP Afaria Overview
SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7
More informationDirect or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
More informationCisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
More informationVirtual Leased Line (VLL) for Enterprise to Branch Office Communications
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationCisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600
MX Sizing Guide MARCH 2014 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationBuilding Your Complete Remote Access Infrastructure on Windows Server 2012
Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad
More informationwww.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationIntegrating F5 Application Delivery Solutions with VMware View 4.5
APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationFortiBalancer: Global Server Load Balancing WHITE PAPER
FortiBalancer: Global Server Load Balancing WHITE PAPER FORTINET FortiBalancer: Global Server Load Balancing PAGE 2 Introduction Scalability, high availability and performance are critical to the success
More informationNETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
More informationOptimal Network Connectivity Reliable Network Access Flexible Network Management
Aggregating Links For Maximum Performance Optimal Network Connectivity Reliable Network Access Flexible Network Management Enterprises are increasingly relying on the internet for delivery of critical
More informationDeploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
More informationIOCOM Whitepaper: Connecting to Third Party Organizations
IOCOM Whitepaper: Connecting to Third Party Organizations September 2008 IOCOM www.iocom.com 312-786-9169 Table of Contents 1. Executive Summary 2. Goals 3. Scenarios for Enterprise Connectivity over IOCOM
More informationSecure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security
Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the
More informationDeploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks
Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Document Overview This document provides an overview of how to effectively and securely provide IP-based videoconferencing
More informationSource-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationSSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
More informationSSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
More informationDeployment Best Practices for Citrix XenApp over Galaxy Managed Network Services
Enterprise Networks that Deliver Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Developed by Hughes Network Systems Enterprise Networks that Deliver Galaxy Broadband Communications
More informationWhy SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. aidan.gogarty@hob.de What are we all trying to achieve? Fully transparent network access
More informationBest Practices for Performance Testing Mobile Apps
Best Practices for Performance Testing Mobile Apps Lee Barnes, CTO Utopia Solutions Apology I don t believe in best practices I do believe in guidelines and better approaches for a given situation Key
More informationNetwork Configuration/Bandwidth Planning Scope
Network Configuration/Bandwidth Planning Scope Workshop Focus and Objective Workshop Focus Drive key planning considerations for Office 365 domain and domain name service (DNS) records configuration Network
More informationCom.X IP PBX The complete communications solution in a box
IP PBX Utilising VPN security when extending PBX services to remote users Virtual Private Network It is not uncommon for a single company to occupy more than one set of premises. Individual users on geographically
More informationDOMINO Broadband Bonding Network
2 DOMINO AGGREGATION DE VOIES ETHERNET N 1 Bridging to the Future par [Hypercable] DOMINO DOMINO Broadband BondingTM Network Appliance With cellular data card failover/aggregation capability DANS CE NUMERO
More informationGLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationWhite Paper: Virtual Leased Line
Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices
More informationSingle Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
More informationbbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS
TECHNICAL ARTICLE Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO Adobe LiveCycle Enterprise Suite CONTENTS Introduction................................. 1 Edge server architecture......................
More informationBroadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
More informationResults-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper
Results-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper Table of Contents Executive Summary...3 Why Website Performance Matters...3 What Affects Website Performance...5
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationCloud computing network services
Cloud computing network services Wiesław Stawiski wstawiski@lanservice.net 1 The world is changing 1 in 4 employees prefer to communicate rather via e-mail than face to face In 2020 that figure will be
More informationA host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
More informationApplication Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationProfessional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
More informationRemoteApp Publishing on AWS
RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...
More informationPreparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
More informationReliable high throughput data connections with low-cost & diverse transport technologies
Virtual Leased Line (VLL) for Communications between Offices Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband Bonding Network
More information