School of Electrical Engineering & Informatics Institut Teknologi Bandung, Indonesia
|
|
- Garey Julius Ward
- 8 years ago
- Views:
Transcription
1 School of Electrical Engineering & Informatics Institut Teknologi Bandung, Indonesia Saleh Havid, S.Kom Prasetiyo Hadi P, S.T Rifqy Hakimi, M.T Dr.ing. Eueung Mulyana
2 INHERENT : Indonesia Higher Education Research Network started on nodes (2007) to 312 nodes (2012) Deployed on back-up mode ( ) Using GRE Tunnel Planned to rebuild INHERENT through the IIX (Indonesia Internet exchange) by collaborating with Telco provider for using idle core in Telco
3 INHERENT with Indonesia IIX
4 INHERENT Traffic Monitoring Traffic between Border Gateway ITB and INHERENT Traffic between INHERENT and TEIN4
5 Official Course : EL5244 : Software Defined Networking Lectured by : Dr.ing. Eueung Mulyana Since July 2013 SDN Research Group (SDNRG-ITB) Built on Nov 2014 Mini workshop Introduction to SDN, Openflow, NFV (Nov 2014) Introduction to Openstack (Feb 2015) Website : Github :
6 Current SDN Graduate Thesis Research Design & Implementation Multi-Streaming on Unicast Openflow Network Design & Implementation of Openflow Testbed in ITB Implementation & Analysis of Elastic Load Balancing in DNS Service on Openstack Cloud Design & Implementation Site-to-Site IPsec VPN on Openstack
7 Design & Implementation Multi-Streaming on Unicast Openflow Network Dummy client Streaming server OpenFlow Controller Client 1 Client 2 Design multi-streaming video application on unicast network using floodlight openflow 1.0 Client 3
8 Implementation of Openflow Testbed in ITB Based on distributed Openflow Testbed (DOT) with Ofelia feature Next research goal : enabling the services of : On-Demand, Redundant & Load balancing, Scheduling Instant, Simplify, Secure, Machine to Machine
9 Implementation of Elastic Load Balancing in DNS Service on Openstack Cloud Background : The needs of Load Balance as a Service (LBaaS) on DNS traffic LBaaS Openstack is using Haproxy that only support for TCP, HTTP, and HTTPS traffic (not UDP) High DNS traffic must to be served by several DNS servers, and needs to be efficient for utilization load balance between busy and non-busy hour
10 Implementation of Elastic Load Balancing in DNS Service on Openstack Cloud (2) internet client (1) request (3) process request.3 (5) replies (2) rescheduling & rewriting packets Keepalived qrouter-xx (4) rewriting replies Virtual distribution switch Network DNS Server.5 Integrating LVS+Keepalived to load balance DNS request (UDP Traffic) Implement elastic resource allocation based using Openstack Heat
11 Implementation of Elastic Load Balancing in DNS Service on Openstack Cloud (2) DNS scale out : CPU usage > 80% high load (QPS > 30K) DNS scale in : CPU < 35-40% low load (QPS < 10K) Scale Out & Scale In Result
12 Design & Implementation Site-to-Site IPsec VPN on Openstack Background Infrastructure as a service (IaaS) is a type of cloud computing in which a third-party provider hosts virtualized computing resources over the Internet IPsec is a framework of open standards for ensuring private communications over public networks Problem statement What methods are available to secure communication from existing ip network to servers in the cloud? VM Instance as VPN gateway per tenant (ex: HP Public Cloud) VPN as a Service on Neutron + Service Provider (ex: Amazon AWS) Current Limitation VPN as a Service Only support PSK encryption Proposed Solution Extend Neutron VPN Plug-in to support RSA Signature
13 Design & Implementation Site-to-Site IPsec VPN on Openstack (2) Implement Site-to-Site IPsec VPN on Openstack Performance evaluation : s2s IPsec routers s2s IPSec using Openswan in Fedora Instance as VPN Gateway s2s IPSec using VPN as a Service (Neutron + Openswan)
14 conn %default ike=aes256-sha1-modp1536! ikelifetime=28800s keyexchange=ikev1 keyingtries=10 esp=aes256-sha1-modp1536! keylife=3600s rekeymargin=5m type=tunnel pfs=yes compress=no authby=secret conn vpn-test left=%defaultroute leftid= leftsubnet= /24 leftfirewall=yes right= rightid= rightsubnet= /24 dpdaction=hold dpddelay=60 dpdtimeout=500 auto=add Design & Implementation Site-to-Site IPsec VPN on Openstack (3) Openswan VM as VPN Gateway Configuration Neutron VPN as a Services
15 SDN Research Openflow Implement BGP over Openflow Network Cloud Implement Dynamic Routing on Openstack Neutron Implement VPN as a Service between Cloud & Existing IP Network Deploy File Sharing Service over Openstack Swift
16 Collaboration Plan Connecting Testbed to network Deploy hybrid cloud between Testbed and Deploy cloud application & service over the hybrid cloud
Software Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationIPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks Renato Figueiredo Advanced Computing and Information Systems Lab University of Florida ipop-project.org Unit 3: Intra-cloud Virtual Networks
More informationHow To Deploy Sangoma Sbc Vm At Amazon Cloud Service (Awes) On A Vpc (Virtual Private Cloud) On An Ec2 Instance (Virtual Cloud)
Sangoma VM SBC AMI at AWS (Amazon Web Services) SBC in a Cloud Based UC/VoIP Service. One of the interesting use cases for Sangoma SBC is to provide VoIP Edge connectivity between Soft switches or IPPBX's
More informationGuide to the LBaaS plugin ver. 1.0.2 for Fuel
Guide to the LBaaS plugin ver. 1.0.2 for Fuel Load Balancing plugin for Fuel LBaaS (Load Balancing as a Service) is currently an advanced service of Neutron that provides load balancing for Neutron multi
More informationCisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture
Reference Architecture Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture 2015 Cisco and/or its affiliates. All rights reserved.
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationCisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
More informationOutline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture
OpenStack Neutron Outline Why Neutron? What is Neutron? API Abstractions Plugin Architecture Why Neutron? Networks for Enterprise Applications are Complex. Image from windowssecurity.com Why Neutron? Reason
More informationRIDE THE SDN AND CLOUD WAVE WITH CONTRAIL
RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS pgeenens@juniper.net BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services
More informationHow To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
More informationCERN Cloud Infrastructure. Cloud Networking
CERN Cloud Infrastructure Cloud Networking Contents Physical datacenter topology Cloud Networking - Use cases - Current implementation (Nova network) - Migration to Neutron 7/16/2015 2 Physical network
More informationVPN with Windows 7 and Linux strongswan using IKEv2
Swiss Cyber Storm II Hack & Learn VPN with Windows 7 and Linux strongswan using IKEv2 Prof. Dr. Andreas Steffen andreas.steffen@hsr.ch Andreas Steffen, 19.04.2009, CyberStormII.pptx 1 The Road Warrior
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationNetwork performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
More informationDesigning Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
More informationRemoteApp Publishing on AWS
RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...
More informationHow To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
More informationManaging Enterprise Security with Cisco Security Manager
Managing Enterprise Security with Cisco Security Manager Course SSECMGT v4.0; 5 Days, Instructor-led Course Description: The Managing Enterprise Security with Cisco Security Manager (SSECMGT) v4.0 course
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationSSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x
SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x Introduction The Managing Enterprise Security with Cisco Security Manager (SSECMGT) v4.0 course is a five-day instructor-led course
More informationCisco Intercloud Fabric Security Features: Technical Overview
White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
More informationTutorial: OpenFlow in GENI
Tutorial: OpenFlow in GENI GENI Project Office The current Internet is at an impasse because new architecture cannot be deployed or even adequately evaluated [PST04] [PST04]: Overcoming the Internet Impasse
More informationBRINGING NETWORKS TO THE CLOUD ERA
BRINGING NETWORKS TO THE CLOUD ERA SDN enables new business models Aruna Ravichandran VICE PRESIDENT, MARKETING AND STRATEGY ARAVICHANDRAN@JUNIPER.NET SOFTWARE DEFINED NETWORKING (SDN), JUNIPER NETWORKS
More informationSupport of Windows Server 2012 The NCP Secure Enterprise VPN Server supports the Windows Server 2012 (64 bit) operating system.
NCP Secure Enterprise HA Server Service Release 3.03 Build 007 (Windows 32/64) Date: March 2013 1. New Features and Enhancements The following new feature has been introduced in this release: Support of
More informationThe VPNaaS Plugin for Fuel Documentation
The VPNaaS Plugin for Fuel Documentation Release 1.2-1.2.0-1 Mirantis Inc. January 14, 2016 CONTENTS 1 Document purpose 1 1.1 Key terms, acronyms and abbreviations................................. 1 1.2
More informationVirtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
More informationTechNote. Configuring SonicOS for Amazon VPC
Network Security SonicOS Contents Overview... 1 System or Network Requirements / Prerequisites... 3 Deployment Considerations... 3 Configuring Amazon VPC with a Policy-Based VPN... 4 Configuring Amazon
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationTesting ARES on the GTS framework: lesson learned and open issues. Mauro Femminella University of Perugia mauro.femminella@unipg.
Testing ARES on the GTS framework: lesson learned and open issues Mauro Femminella University of Perugia mauro.femminella@unipg.it Outline What is ARES What testing on GTS? Our solution Performance evaluation
More informationUtility Computing and Cloud Networking. Delivering Networking as a Service
Utility Computing and Cloud Networking Delivering Networking as a Service Overview Utility Computing OpenStack Virtual Networking Network Functions Virtualization Utility Computing Utility Computing: Everything
More informationLow cost secure VPN MikroTik SSTP over OpenIXP (Indonesian Internet) ASTA INFORMATICS Faisal Reza www.astainformatics.com
Low cost secure VPN MikroTik SSTP over OpenIXP (Indonesian Internet) About Me Faisal Reza, ST. (si_faisal) - Co-founder Asta Informatics - using MikroTik since early 2008 applied in Internet Café, ISP,
More informationThe Road to SDN: Software-Based Networking and Security from Brocade
WHITE PAPER www.brocade.com SOFTWARE NETWORKING The Road to SDN: Software-Based Networking and Security from Brocade Software-Defined Networking (SDN) presents a new approach to rapidly introducing network
More informationAppendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
More informationVNS3 Secure Network Appliance Service Defnition for G-Cloud 7
VNS3 Secure Network Appliance Service Defnition for G-Cloud 7 What does VNS3:net do? VNS3:net secures your applications in the cloud. VNS3:net is a cloud native network, routing and security solution which
More informationNephOS A Licensed End-to-end IaaS Cloud Software Stack for Enterprise or OEM On-premise Use.
NephOS A Licensed End-to-end IaaS Cloud Software Stack for Enterprise or OEM On-premise Use. Benefits High performance architecture Advanced security and reliability Increased operational efficiency More
More informationManaging Enterprise Security with Cisco Security Manager
Course: Managing Enterprise Security with Cisco Security Manager Duration: 5 Day Hands-on Lab & Lecture Course Price: $ 3,395.00 Learning Credits: 34 Description: The Managing Enterprise Security with
More informationSDN v praxi overlay sítí pro OpenStack. 5.10.2015 Daniel Prchal daniel.prchal@hpe.com
SDN v praxi overlay sítí pro OpenStack 5.10.2015 Daniel Prchal daniel.prchal@hpe.com Agenda OpenStack OpenStack Architecture SDN Software Defined Networking OpenStack Networking HP Helion OpenStack HP
More informationApplication Defined E2E Security for Network Slices. Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.
Application Defined E2E Security for Network Slices Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.com ) Into the Inter-connected World Internet Mobile Internet Internet of
More informationOverlay networking with OpenStack Neutron in Public Cloud environment. Trex Workshop 2015
Overlay networking with OpenStack Neutron in Public Cloud environment Trex Workshop 2015 About Presenter Anton Aksola (aakso@twitter,ircnet,github) Network Architect @Nebula Oy, started in 2005 Currently
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationSDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
More informationConfiguring IPsec VPN between a FortiGate and Microsoft Azure
Configuring IPsec VPN between a FortiGate and Microsoft Azure The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another
More informationPalo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
More informationConnecting Remote Offices by Setting Up VPN Tunnels
Connecting Remote Offices by Setting Up VPN Tunnels Cisco RV0xx Series Routers Overview As your business expands to additional sites, you need to ensure that all employees have access to the network resources
More informationNFV Network and Compute Intensive H/W Acceleration (using SDN/PI forwarding)
NFV Network and Compute Intensive H/W Acceleration (using SDN/PI forwarding) NFV PoC (Proof of Concept) #21 http://nfvwiki.etsi.org/index.php?title=network_intensive_and_compute_intensive_hardware_ Acceleration
More informationHAProxy. Ryan O'Hara Principal Software Engineer, Red Hat September 17, 2014. 1 HAProxy
HAProxy Ryan O'Hara Principal Software Engineer, Red Hat September 17, 2014 1 HAProxy HAProxy Overview Capabilities Configuration OpenStack HA Neutron LBaaS Resources Questions 2 HAProxy Overview Load
More informationMonitoring Remote Access VPN Services
CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,
More informationNetwork Virtualization
Network Virtualization The New Imperative in the Enterprise Data Center The Trusted News and Resource for SDx, SDN, NFV, Cloud & Virtualization Infrastructure Key Considerations for Network Virtualization
More informationNetwork Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
More informationConfiguring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationNetwork Functions Virtualization in Home Networks
Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention
More informationcloud functionality: advantages and Disadvantages
Whitepaper RED HAT JOINS THE OPENSTACK COMMUNITY IN DEVELOPING AN OPEN SOURCE, PRIVATE CLOUD PLATFORM Introduction: CLOUD COMPUTING AND The Private Cloud cloud functionality: advantages and Disadvantages
More informationMirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationRoman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG
Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG North Core Distribution Access South North Peering #1 Upstream #1 Series of Tubes Upstream #2 Core Distribution Access Cust South Internet West
More informationHow To Create A Virtual Private Cloud On Amazon.Com
Amazon Web Services Hands-On Virtual Private Computing 1 Overview Amazon s Virtual Private Cloud (VPC) allows you to launch AWS resources in a virtual network that you define. You can define an environment
More informationLeveraging ONOS SDN Controller for OF@TEIN SD-WAN Experiment
Leveraging ONOS SDN Controller for OF@TEIN SD-WAN Experiment Asia Pacific Advanced Network (APAN) Network Research Workshop 2015 Aris Cahyadi Risdianto JunSik Shin *) Teck Chaw Ling Dr. JongWon Kim Gwangju
More informationLicenses are not interchangeable between the ISRs and NGX Series ISRs.
Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled
More informationDigi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering
Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming
More informationWhat is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationThe networking declaration of independence
The networking declaration of independence How overlay networking gives you control of your networks Chris Swan, CTO @cpswan the original cloud networking company copyright 2014 1 Agenda What is NFV? Declaration
More informationPrivate Distributed Cloud Deployment in a Limited Networking Environment
Private Distributed Cloud Deployment in a Limited Networking Environment Jeffrey Galloway, Susan Vrbsky, and Karl Smith The University of Alabama jmgalloway@crimson.ua.edu, vrbsky@cs.ua.edu, smith102@crimson.ua.edu
More informationEEDC. Scalability Study of web apps in AWS. Execution Environments for Distributed Computing
EEDC Execution Environments for Distributed Computing 34330 Master in Computer Architecture, Networks and Systems - CANS Scalability Study of web apps in AWS Sergio Mendoza sergio.mendoza@est.fib.upc.edu
More informationData Center Content Delivery Network
BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay
More informationTechNote. Configuring SonicOS for MS Windows Azure
Network Security SonicOS Contents Overview...1 Deployment Considerations...2 Supported Platforms...2 Configuring a Policy-Based VPN...2 Configuring a Route-Based VPN...17 Overview This TechNote details
More informationPerformance of Network Virtualization in Cloud Computing Infrastructures: The OpenStack Case.
Performance of Network Virtualization in Cloud Computing Infrastructures: The OpenStack Case. Franco Callegati, Walter Cerroni, Chiara Contoli, Giuliano Santandrea Dept. of Electrical, Electronic and Information
More informationEthernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
More informationPostgres Plus Cloud Database!
Postgres Plus Cloud Database! Presented by Dave Page! 22 nd March 2013! EnterpriseDB, Postgres Plus and Dynatune are trademarks of EnterpriseDB Corporation. Other names may be trademarks of their respective
More informationSDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
More informationVPN Only Connection Information and Sign up
VPN Only Connection Information and Sign up Revision 4/16/2013 CU*Answers supports a variety of VPN network configurations for credit unions that desire to use VPN for primary connectivity. These options
More informationVMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationSOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT
BROCADE SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT Rajesh Dhople Brocade Communications Systems, Inc. rdhople@brocade.com 2012 Brocade Communications Systems, Inc. 1 Why can t you do these things
More informationHP VSR1000 Virtual Services Router Series
Data sheet HP VSR1000 Virtual Services Router Series Key features Virtualized enterprise-class x86 routing software Firewall, IPSec, and MPLS VPN security Agile deployments across the branch office, data
More informationUse Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION Cloud Management Software can coordinate and automate server, network, and storage operations within the modern datacenter. This brief describes how
More informationSoftware Defined Networking (SDN) and OpenStack. Christian Koenning
Software Defined Networking (SDN) and OpenStack Christian Koenning Driving Towards an Application Centric World IT/Ops Struggle to Deliver SDDC/Cloud Mobility Internet of things Advanced threats Lines
More informationPLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
More informationAdvanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com
Advanced IPSec with GET VPN Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com 1 Agenda Motivations for GET-enabled IPVPN GET-enabled IPVPN Overview GET Deployment Properties
More informationConfiguring a VPN for Dynamic IP Address Connections
Configuring a VPN for Dynamic IP Address Connections Summary A Virtual Private Network (VPN) is a virtual private network that interconnects remote (and often geographically separate) networks through
More informationOSHI - Open Source Hybrid IP/SDN networking (and its emulation on Mininet and on distributed SDN testbeds)
OSHI - Open Source Hybrid IP/SDN networking (and its emulation on Mininet and on distributed SDN testbeds) Stefano Salsano (1), Pier Luigi Ventre (2), Luca Prete (2), Giuseppe Siracusano (1), Matteo Gerola
More informationINTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
More informationOrchestrating the next generation data center
Customer Driven Innovation A10 Networks Orchestrating the next generation data center WHD 2014 Do not distribute/edit/copy without the written consent of A10 Networks 2 About A10 3 Customer Driven Innovation
More informationTesting Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
More informationMicrosoft Azure Configuration
Microsoft Azure Configuration Azure Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Create Azure Private VLAN 10 Launch VNS3 Image from Azure Marketplace 15 VNS3 Configuration Document
More informationContrail Networking. Product Description. Your ideas. Connected. Data Sheet. Product Overview
Contrail Networking Product Overview Contrail Networking is a simple, open, and agile cloud network automation product that leverages SDN technology to orchestrate the creation of highly scalable virtual
More informationHow To Manage A Network From A Microsoft Lab
How to Manage Multiple Network Technologies by Single OpenDaylight Controller Ryo Kurahashi, NEC & Okinawa Open Laboratory Takashi Torii, NEC & Okinawa Open Laboratory Agenda About OOL Introduction of
More informationRyu SDN Framework What weʼ ve learned Where weʼ ll go
Ryu SDN Framework What weʼ ve learned Where weʼ ll go FUJITA Tomonori NTT Software Innovation Center Ryu Project lead 2014.11.14 NTT Ryu team goal Change the networking industry by Open Source Software
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign
More informationHOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES
HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES Brian Levy CTO SERVICE PROVIDER SECTOR EMEA JUNIPER NETWORKS CIO DILEMA IT viewed as cost center
More informationConfiguration Procedure
How to Establish Site-to-Site VPN between USG and MS Azure Background Microsoft (MS) Azure is an open and flexible cloud platform that enables users to quickly build, deploy, scale and manage applications
More informationNetwork Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationSecuring Networks with Cisco Routers and Switches 1.0 (SECURE)
Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Course Overview: The Securing Networks with Cisco Routers and Switches (SECURE) 1.0 course is a five-day course that aims at providing network
More informationNETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
More informationGroup-Based Policy for OpenStack
Group-Based Policy for OpenStack Introduction Over the past four years, OpenStack has grown from a simple open source project to a major community-based initiative including thousands of contributors in
More information