Effective Security Architecture for Virtualized Data Center Networks
|
|
|
- Pierce Ramsey
- 10 years ago
- Views:
Transcription
1 Effective Security Architecture for Virtualized Data Center Networks 1 Udeze Chidiebele. C, 3 Okafor Kennedy.C 1,3 R & D Department, Electronics Development Institute (FMST-NASENI), Awka, Nigeria. Abstract This work presents a candidate scheme for effective security policy that defines the requirements that will facilitate protection of network resources from internal and external security threats. Also, it ensures data privacy and integrity in a virtualized data center network (VDCN). An integration of Open Flow Software Defined Networking (OFSDN) with VLAN Virtual Server Security (VVSS) architecture is presented to address distinct security issues in virtualized data centers. The OFSDN with VVSS is proposed to create a more secured protection and maintain compliance integrity of servers and applications in the DCN. This proposal though still on the prototype phase, calls for community driven responses. Keywords- Infrastructure; Virtualization; VDCN; OFSDN; VVSS; VLAN; Virtual Server. I. INTRODUCTION Recently, data center networks (DCNs) have attracted a lot of interest in the enterprise networking industry. DCNs are used to provide data storage and files transfer where end stations are interconnected as clusters and bladed systems [1]. A data center represents the heart of any organization s network [2]. Companies rely on the data stored in the data center to interact with its employees and customers. The proliferation of the Web-based technologies makes the data center more vulnerable to security attacks. Any security attack on the data center can destroy the whole organization s network and data [2]. Besides throughput and low latency required in DCNs, the security considerations of enterprise data centers is also very critical. Several researches were dedicated to the security issues and the design constraints of large scale data centers from different points of view [2]. The authors in [2], [3], [4], [5], [6] discussed on the data center security problems, technologies, security strategies such as consolidation, relocation, migration, expansion and review of asset management policies. The authors of [4] carried out an overview of the communication network design problems that arise with large numbers of nodes, links and switch costs. Some layered security models for addressing complex security issues are discussed in [5] and [6]. With fast changing technologies and service demands in DCNs, the need for an effective open platform secure model becomes very imperative. In this paper with detailed study on the security proposals existing in literature, and having considered all the requirements of network security management for a virtualized data center model, we propose an effective secured model: Open Flow Software Defined Networking (OFSDN) with VLAN Virtual Server Security (VVSS). The design is based on layered security architecture for virtual servers and open flow 2 Prof. H. C Inyiama, 4 Dr C. C. Okezie, 2,4 Electronics and Computer Engineering Department, Nnamdi Azikiwe University, Awka, Nigeria switch architecture. Operational mechanism is presented in section V with other details. By allowing the controllers in the virtual open flow switch in our DCN to house the flow tables for each virtual port, this work creates lines of defense against any security threat. Unicast, broadcast and multicast traffic are characterized and monitored by the modeled switch architecture which serves as an aggregation link buffer. The paper is organized as follows. In Section II, we discussed virtualization in data center network, data center security problems as presented in [2]. In section III, the proposed security model (OFSDN) is shown with the Virtual server security system. Section IV gives the experimental setup for VLAN open flow switch. The paper ends with conclusions and future directions II. VIRTUALIZATION IN DATA CENTER NETWORKS Server virtualization has become popular in data centers since it provides an easy mechanism to cleanly partition physical resources, allowing multiple applications to run in isolation on a single server [7]. Virtualization helps with server consolidation and provides flexible resource management mechanisms [7] in DCNs particularly. We quickly add that Virtualization is not a new technology, but it has regained popularity in recent years because of the promise of improved resource utilization through server consolidation. According to [8], a Data Center is the consolidation point for provisioning multiple services that drive an Enterprise business. In [2], the authors enlist the data center hardware and software components. The hardware components are: firewalls, Intrusion Detection Systems, contents switches, access switches and core switches. The software components are: IPSec and VPN, antivirus software, network management systems and access control server. However, for effective security implementation in a virtualized DCN, this work goes further to propose a more secured data center design that is programmable, secured with strong isolation, and flexible using the OFSDN approach in our context. III. DATA CENTER SECURITY PROBLEMS Data center networks usually have its security threats. The work carried out in [8], [9]and[10] discussed some of these problems, viz: Unauthorized Access, Flooding, ARP Spoofing, IP Spoofing, Denial of Service (DOS), Viruses, Worms, Trojans, and internal Security threats. However, sampled solutions to these problems were given in [2]. We still argue that these solutions do not completely eradicate security vulnerabilities in contemporary data center networks. 196 P a g e
2 For a virtualized data center domain, a restructured architecture which will address the possible lapses in addition to the outlined remedies in [2], will serve in securing today s enterprise networks. IV. DATA CENTER SECURITY TECHNOLOGIES Information stored at the data center must be protected from any security threat that may destroy or modify it in any unwanted way [2]. These security threats can originate from hackers outside or from inside the data center network. Different solutions to the security threats can be used together to achieve the highest possible data protection. Some of these technologies are: Firewalls. Network intrusion detection and prevention systems. Virtual Local Area Networks (VLAN). Virtual Private Network (VPN) and IPSec. Leveraging on these four technologies, our contribution is shown in the Open Flow Software Defined Network model in Fig. 2. OFSDN is a layer 2 protocol in the virtual Software Defined Network (SDN) switch that allows for policy control via its open flow visor (virtualization layer). This model creates multiple layers of security for the virtualized DCN controlling unicast, broadcast and multicast traffics. Section IV and V discussed in details the security models for highly scalable and secure virtualized DCN. V. VLAN VIRTUAL SERVER SECURITY SYSTEM VLAN Virtual Server Security (VVSS) system proposed in this work for the server VM provides multi-layered workgroup segmentation while utilizing the underlying hardware technology to protect the virtual data center. The VVSS solution is a generic purpose-built framework proposed for large scale enterprises. The virtual environment at the core of the infrastructure is the Vm server running on ESX platform with its VMware. Fig. 1 shows the VVSS model while Fig. 5 and Fig. 6 show the packet tracer simulation. Again, in our architecture shown in Fig. 2, controllers were assigned to all the network entities to house their flow tables. For active participation in the network, the open flow visor must uniquely identify and authenticate the client node else, the terminal is dropped for access. As shown in Fig. 1, VLAN virtual security model was modeled to be deployed on a virtualized server for various applications (Vm1 Vm5). The kernel utilizes the hypervisor API to inspect and control the virtual switch network and VM behavior. Virtual Security Service (VSS) utilizes a subnetted IP mapping, which is provided as VMsafe for various user groups. For demonstration in this work, each VM server on virtualized server is managed and configured through packet tracer environment. Figure 1. VLAN Virtual Security System Model. A VLAN backbone which hosts the Vm server is the central manager for the applications. VVSS has the following functions: Inter-VM migration of Applications and services for compatibility issues VI. Vm 1 Vm 2 Vm 3 Vm 4 Vm 5 USER ACCESS INTERFACE NIC Applications Layer Virtual Machine generator and monitor Network Access Control (NAC) Discovery and Broadcast Isolation License and Update Management (LUM) OPEN FLOW SOFTWARE DEFINED NETWORK MODEL FOR DCN The Open flow software defined networking switch in figure 2 is a speed redundant device with isolated controllers housing the flow tables shown in Fig. 4. An open flow protocol (OFP) which can be enabled in the switch carries out control policy (CP), reaction execution (RE) and history tracking (HT). Once OFP is enabled on the switch, any device interfaced with the switch is actively monitored as a software robot, thereby securing the overall network against any form of threat. This is proposed for virtualized data center in context. The key security metric is the ID of the interfacing devices. The security policy of the flow table in Fig. 4 controls activities that is handled by conventional VLAN and Access control list (ACL) such as traffic denial or flow allowance, routing, broadcast isolation flow, flow detection and suppression in the OFSDN switch. All servers, etc shown in Fig. 2 are mapped in the controllers. Fig. 3 shows the open virtual isolation in the OFSDN switch. This model offers a highly secured security layer to existing security approaches in literature. OS Kernel Hypervisor RAM HDD CPU I/Os 197 P a g e
3 Controller#1 Server Virtualization 13s:36v:79d Firewall/Gate way/ Load balancer Controller#4 OFSDN Switch Controller#2 IDS System& Proxy Server Network Management Server, LOG, VMs Controller#3 Figure 2. OFSDN Security Model for DCN VLAN#1 VLAN#2 VLAN#3 VLAN#4 Controller#1 #1 Controller#2 #2 Controller#3 #3 Controller#4 #4 OPEN FLOW VISOR- Virtualization Layer Controller#5 #5 Controller#6 #6 Controller#7 #7 Controller#8 #8 VLAN#5 VLAN#6 VLAN#7 VLAN#8 Figure 3. A Virtualized Open Flow Switch POLICY REACTION HISTORY Frame packet Byte count CRC #1.Flood frame Packets to Physical Interfaces # 2. Encrypt, Encapsulate and forward to Controller # 3. Drop &Queue Frame Packet #4. Migrate to Process Pipeline Switch. Port ID DST ID Ethtype VLAN ID IP SRC IP DSTNIP PROTOCOLTCPSRC PORT TCP DST PORT. VII. EXPERIMENTAL SETUP The first phase experiment involves virtualizing the server test bed consisting of one standard HP machine with a dualcore Intel Xeon processor connected to a rack-mounted disk enclosure with a Small Computer Scale Interface (SCSI) backplane running on ESX linux sever. For the purposes of trace security, six VLANs were created for the server and simulated with packet trace tool. In the server, a Seagate model 15,000RPM disks: of size 1TB was Figure 4. Flow table Ingress in Open Flow Switch Model considered with a RAM of 6GB. The server was connected via a switched (OFSDN) 1Gbps Ethernet link. This work provides three fundamental security services: Data confidentiality: protecting against unauthorized access to data being transmitted. Data integrity: protecting against alteration or future replay of traffic. Source authentication: network addresses are authenticated as part of the protocol. 198 P a g e
4 We deployed Classless Inter-domain Routing (CIDR) approach to generate usable IP for the VM server and users on the network. For valid IP range for 200 users with 128Vm servers, we used a class valid host range: to with a subnet mask of For effective security and broadcast isolation, virtual IP mapping on the Vm server enables the hosts, guests and clients to communicate with each other. Fig. 5 and Fig. 6 show the packet flow in the packet tracer integrated development environment (IDE). (IJACSA) International Journal of Advanced Computer Science and Applications, TABLE 1: DATA CENTER VM SERVERS (13 SERVERS, 36 VOLUMES, 79 DISKS) VmServers VLAN Volumes IP Mapping UserV M ProjectV M PrtrV M HrdmV M RDVm PrxyV M ScrV M WebVm MdSVm ERPVm NACVm E-ComV M IntrantVm TABLE 2: AVERAGE UTILIZATION RATES. Resource CPU 6% MEMORY 40% NETWORK I/O <5% DISK I/O <5% Utilization Figure 5. DCN VLAN workgroup Model with ESx server Figure 6. Simulated Packet Flow for secured DCN VIII. CONCLUSION The effective security architecture discussed in this paper is conceived to achieve the best possible solution for virtualized data center networks. Owing to advancements in virtualization technology, the security methodologies for traditional data centers which includes: firewalls, intrusion detection system/intrusion protection system, virtual local area network (VLAN) and virtual private network (VPN) cannot effectively handle security implications of a virtualized data center networks. This work presents an effective open flow software defined network switch with VVSS model and with emphasis on VLAN virtualization on ESX server to ensure total security of the critical data in the virtualized data center network. 199 P a g e
5 The analytical model and validation of the proposed models in Fig. 2 and 3 will be clearly shown in the future work; however this work seeks to use the presented approaches to enhance the security design of a virtualized data center network. REFERENCES [1] Jinjing. jiang and R.Jain, Analysis of backward congestion notification (BCN) for ethernet in datacenter applications. IEEE communications Society INFOCOM 2007 proceedings. [2] Jalal Frihati, Florica Moldoveanu, Alin Moldoveanu, General guidelines for the security of a large scale data centre design, U.P.B. Sci. Bull., Series C, Vol. 71, Issue 3, [3] Data centre services, URL, [4] Practical Large-Scale Network Design With Variable Costs for Links and Switches, URL: [5] Mitchell Ashley LAYERED NETWORK SECURITY 2006: A bestpractices approach,url: curity.pdf. [6] Juniper networks layered security solution, URL: /white _papers/2005.pdf [7] Timothy Wood, Improving data center resource Management, deployment, and availability with virtualization, PHD thesis June,2009,(Unpublished). [8] migration_09186a d.pdf [9] Data center: infrastructure architecture SRND,URL: 304/c649/cdccont_0900aecd800e4d2e.pdf [10] Data Center: Securing Server Farms, URL: ns304/c649/ccmigration_09186a008014edf3.pdf [11] Data center security topologies: us/ guest/netsol/ns376/c649/cdccont_0900aecd800ebd1d.pdf 200 P a g e
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
5 Best Practices to Protect Your Virtual Environment
CONTENTS OF THIS WHITE PAPER Security Virtualization s Big Hurdle..1 Why Old-STyle Protections Fall short..2 Best Practices...3 Create A VM Service Good List... 3 Monitor and Protect the Hypervisor...
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
A Dell Technical White Paper Dell Storage Engineering
Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
Network Virtualization
Network Virtualization Petr Grygárek 1 Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on shared physical infrastructure Total
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Network Technologies for Next-generation Data Centers
Network Technologies for Next-generation Data Centers SDN-VE: Software Defined Networking for Virtual Environment Rami Cohen, IBM Haifa Research Lab September 2013 Data Center Network Defining and deploying
White Paper. Recording Server Virtualization
White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study
White Paper Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study 2012 Cisco and/or its affiliates. All rights reserved. This
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
Where IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine
Where IT perceptions are reality Test Report OCe14000 Performance Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine Document # TEST2014001 v9, October 2014 Copyright 2014 IT Brand
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Securing Virtualization with Check Point and Consolidation with Virtualized Security
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure
W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure
New Security Perspective for Virtualized Platforms
, July 3-5, 2013, London, U.K. New Security Perspective for Virtualized Platforms Abdelmajid Lakbabi, Said El hajji, Ghizlane Orhanou, Kaouthar Chetioui Abstract Recently, an important transition in IT
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Philips IntelliSpace Critical Care and Anesthesia on VMware vsphere 5.1
Philips IntelliSpace Critical Care and Anesthesia on VMware vsphere 5.1 Jul 2013 D E P L O Y M E N T A N D T E C H N I C A L C O N S I D E R A T I O N S G U I D E Table of Contents Introduction... 3 VMware
Broadcom Ethernet Network Controller Enhanced Virtualization Functionality
White Paper Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Advancements in VMware virtualization technology coupled with the increasing processing capability of hardware platforms
OPTIMIZING SERVER VIRTUALIZATION
OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)
Part 1 - What s New in Hyper-V 2012 R2. [email protected] Datacenter Specialist
Part 1 - What s New in Hyper-V 2012 R2 [email protected] Datacenter Specialist Microsoft Cloud OS Vision Public Cloud Azure Virtual Machines Windows Azure Pack 1 Consistent Platform Windows Azure
NetScaler VPX FAQ. Table of Contents
NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Install Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Nutanix Tech Note. VMware vsphere Networking on Nutanix
Nutanix Tech Note VMware vsphere Networking on Nutanix Nutanix Virtual Computing Platform is engineered from the ground up for virtualization and cloud environments. This Tech Note describes vsphere networking
Software Defined Networking A quantum leap for Devops?
Software Defined Networking A quantum leap for Devops? TNG Technology Consulting GmbH, http://www.tngtech.com/ Networking is bottleneck in today s devops Agile software development and devops is increasing
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
VMware vsphere-6.0 Administration Training
VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast
Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009
Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro
Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro Whitepaper What s wrong with today s clouds? Compute and storage virtualization has enabled
- Introduction to PIX/ASA Firewalls -
1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Date: June 2016 Author: Jack Poller, Senior
IP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Microsoft Exchange Solutions on VMware
Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...
Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
Virtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
OpenFlow: History and Overview. Demo of OpenFlow@home routers
Affan A. Syed [email protected] Syed Ali Khayam [email protected] OpenFlow: History and Overview Dr. Affan A. Syed OpenFlow and Software Defined Networking Dr. Syed Ali Khayam Demo of OpenFlow@home
JUNIPER NETWORKS FIREFLY HOST FIREWALL PERFORMANCE
White Paper JUNIPER NETWORKS FIREFLY HOST FIREWALL PERFORMANCE Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Performance Challenges in a Virtual Environment...3 Firefly
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing
TGL VMware Presentation Guangzhou Macau Hong Kong Shanghai Beijing The Path To IT As A Service Existing Apps Future Apps Private Cloud Lots of Hardware and Plumbing Today IT TODAY Internal Cloud Federation
Ethernet-based Software Defined Network (SDN)
Ethernet-based Software Defined Network (SDN) Tzi-cker Chiueh Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 Cloud Data Center Architecture Physical Server
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
Software Defined Networking
Software Defined Networking Stefano Giordano Dipartimento di Ingegneria dell Informazione Università di Pisa 3D Reference model of ISDN Hourglass reference model of a TCP/IP network Network Ossification
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
The best platform for building cloud infrastructures. Ralf von Gunten Sr. Systems Engineer VMware
The best platform for building cloud infrastructures Ralf von Gunten Sr. Systems Engineer VMware The Problem Overwhelming complexity >70% of IT budgets just to keep the lights on
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
VM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj [email protected] 2. Anargha Biswas [email protected] 3. Ambarish Kumar [email protected] 4.
Cloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
Fibre Channel over Ethernet in the Data Center: An Introduction
Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
VMware Virtual SAN 6.2 Network Design Guide
VMware Virtual SAN 6.2 Network Design Guide TECHNICAL WHITE PAPER APRIL 2016 Contents Intended Audience... 2 Overview... 2 Virtual SAN Network... 2 Physical network infrastructure... 3 Data center network...
Preparation Guide. How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment.
Preparation Guide v3.0 BETA How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment. Document version 1.0 Document release date 25 th September 2012 document revisions 1 Contents 1. Overview...
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Virtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
