WW TSS 01 -Network Best Practices & Troubleshooting
|
|
|
- Lee Parsons
- 10 years ago
- Views:
Transcription
1 Slide 1
2 WW TSS 01 -Network Best Practices & Troubleshooting Pierluigi Iodice / #SoftwareRevolution Regional Solution Support Engineer, /InvensysVideos Global Customer Support /Wonderware Wonderware /company/wonderware [email protected] 2013 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys or its subsidiaries. All third party trademarks and service marks are the proprietary marks of their respective owners.
3 Networking How we proceed Understanding Understanding - This section contains information to figure how some tools I selected could be helping out to understand the network issues with Wonderware products. Troubleshooting Network Monitoring Slide 3 Troubleshooting - This section contains notes and information on how we solved some experienced issue about network, working with Wonderware products. Monitoring -This section includes a deep dive about some Advanced tools that could help us to understand the system behavior, working with Wonderware products.
4 Understanding Summary 1. Understand all the Network Types, especially for Wonderware Product destination. 2. Conduct an Inventory of all your network Locations and Bandwidth. 3. Test Name Resolution from all network location to Servers Node, ensuring that both Clients and Servers resolve Hostname. 4. Test ICMP Connectivity from all network to Servers Node, ensuring that Clients can reach Servers and Server to Server. 5. Test Routes in all Nodes, understanding only how the Metric is working. 6. Test TCP/IP Reliability from all locations to Servers, ensuring that connections made can reliably be established and maintained. Slide 4
5 Understanding : Domain vs Workgroup 1. Understand all the Network Types, especially for Wonderware Product destinations. Windows has two modes of operation: Workgroup and Domain. Depending on the environment that your computer is in, you will be running in one of these two modes. Most home and small business environments will be Workgroup, Most mid - to large businesses will run in Domain mode. There are different features and capabilities depending on each, and each serve a purpose Workgroups can be best understood as a loosely connected group of computers. There is no centralized management and so there is a low barrier to use. Domains, on the other hand, provide centralized management and security. User access is controlled from a separate server called a domain controller and there is a trust built between systems in a domain. There are much more robust differences as well. Slide 5
6 Understanding : Domain vs Workgroup 1. Understand all the Network Types, especially for Wonderware Product destinations. Workgroup : A workgroup is best understood as a peer-to-peer network. That is, each computer is sustainable on its own. It has its own user list, its own access control and its own resources. In order for a user to access resources on another workgroup computer, that exact user must be setup on the other computer Slide 6
7 Understanding : Domain vs Workgroup 1. Understand all the Network Types, especially for Wonderware Product destinations. Domain: A domain is a trusted group of computers that share security, access control. It has data passed down from a centralized domain controller server or servers. Domain Controllers handle all aspects of granting users permission to login. They are the gatekeeper. In addition, most modern domains use Active Directory which allows an even more centralized point for software distribution, user management and computer controls. Slide 7
8 Understanding Draw a Structure 2. Conduct an Inventory of all your network locations and bandwidth. The best would be to have a detailed map of all related infrastructures (Servers, Workstations, Ethernet Cables, Fiber Optics, Switches, Routers, Firewalls, etc.) as well as the hosting software (Operating systems, Virus protection, Intrusion protection, etc.). Preparing a slide documentation like the above. Slide 8
9 Understanding How to do it 2. Conduct an Inventory of all your network locations and bandwidth. Inventory of Network Locations When planning for a Wonderware implementation, it is important to create an inventory of all locations from which users will access Server and Client The goal of this inventory is to gather information about the Intranet connectivity and capacity from each network location: Corporate, Private, Supervisory, RMC,... When conducting an inventory, include the following information about each network location: The location s name and a description of its Internet access. Example: AOS, HISTORIAN, HMI, SCADA, DAS, TSE,... Intranet bandwidth average and peak usage. I.E: 50% average usage, 70% peak usage. Number of proxy servers, and current average and peak usage. Number of firewall appliances, and current average and peak usage. Number of DNS servers, and current average and peak usage. Once you have collected this information for every network location, use the data to assess current capacity, and whether any upgrades are needed Slide 9
10 Understanding Bandwidth 2. Conduct an Inventory of all your network locations and bandwidth. How retrieve bandwidth average usage peak: Iperf: Iperf is a neat little tool with the simple goal of helping administrators measure the performance of their network. Worthy of mention is the fact that it can measure both TCP and UDP performance on a network. Iperf is cross platform software and open source. Slide 10
11 Understanding Identifying a Machine 3. Test Name Resolution from all network locations. Name Resolution: is used on networks to resolve names to IP addresses. You and I use names and words to communicate, but computers use numbers. Name resolution methods are tied to 2 types of names: Hostname: A host name can t be up to 255 characters in length and is the only type of name used on the Internet. When a hostname is combined with a domain name, it becomes a fully qualified domain name (FQDN). For example, a Windows 7 PC named Client1 in the domain corp.com has an FQDN of Client1.corp.com. Hostnames are primarily resolved by DNS servers. NetBIOS: names A NetBIOS name has 15 readable characters, with the 16th byte identifying a service running on the system. The use of NetBIOS names has been significantly reduced in networks in favor of hostnames, but they are still being used by older applications. Since NetBIOS names are not supported in IPv6, this usage will eventually disappear. NetBIOS names are primarily resolved by WINS servers. Slide 11
12 Understanding Host Name 3. Test Name Resolution from all network locations. Host Name Resolution Methods: While DNS is the primary method used to resolve hostnames, it's not the only method... There are 3 primary methods used to resolve hostnames: 1) Domain Name System 2) Host file 3) Host cache Slide 12
13 Understanding DNS 3. Test Name Resolution from all network locations. DNS Resolution : DNS servers answer queries for name resolution of hostnames. When queried with a name, the DNS server returns the IP address. DNS servers are typically configured with addresses of other DNS servers. If the queried DNS server does not know the IP address, it will forward the name resolution request to other DNS servers to determine the IP address. This forwarding occurs on internal networks and on the Internet. You can easily check which DNS server is assigned to a client with the IPConfig /All command. Slide 13
14 Understanding Host check 3. Test Name Resolution from all network location. DNS Test: NSLookup Although the IPConfig and Ping commands can very often be useful when troubleshooting name resolution issues, there are times when you'll want to query the DNS server directly to get detailed information. The NSLookup tool is a command-prompt utility that you can use to get specific information from a DNS server. DNS Test Advanced: DiG - is a Domain Information Groper command-line tool for querying DNS name servers for information about host addresses, mail exchanges, name servers, and related information. Dig is useful for network troubleshooting and for educational purposes. Dig can operate in interactive command line mode or in batch mode by reading requests from an operating system file. When a specific name server is not specified in the command invocation, it will use the operating systems default resolver, usually configured via the resolv.conf file. Without any arguments it queries the DNS root zone. DIG could totally replace NSLookup nslookup and the host program. Slide 14
15 Understanding Host file 3. Test Name Resolution from all network locations. Host files: The Hosts file is located in the %windir%\system32\drivers\etc folder. Entries in the Hosts file are automatically placed into the host cache. Malware sometimes modifies the Hosts file to prevent a client from accessing specific websites. For example, a bogus entry could be placed in the file for Microsoft's update site, and the client would no longer be able to get updates. Slide 15
16 Understanding Host cache 3. Test Name Resolution from all network locations. Host cache: Once a name is resolved by DNS, the result is placed in the host cache (also called the DNS cache, which is a little misleading because this cache also holds entries from the Hosts file). You can view the host cache with the IPConfig /DisplayDNS command! You can remove host cache entries from cache using the IPConfig /FlushDNS command. This will remove all entries that were cached from a DNS query, but it will not remove entries placed in cache from the Hosts file. Slide 16
17 Understanding Host Name 3. Test Name Resolution from all network location. NetBIOS Name Resolution Methods: NetBIOS names can be resolved using three methods. These methods are different from the primary methods used to resolve hostnames. However, if a hostname can't be resolved using the primary hostname resolution methods, you can attempt the NetBIOS name resolution methods. There are 3 primary methods used to resolve NetBIOS names: 1) WINS OLD When queried with a name, the WINS server returns the IP address. Whereas DNS servers can be configured to query other DNS servers to resolve a name, WINS servers cannot query other WINS servers. 2) LMHost file is located in the %windir%\system32\drivers\etc folder. 3) NetBIOS cache Once a name is resolved by WINS, the result is placed in the NetBIOS cache. You can view the NetBIOS cache with the NBTStat /c command. Slide 17
18 Understanding ICMP 4. Test ICMP Connectivity from all network to Servers Node, and vice-versa. ICMP Connectivity: Internet Control Message Protocol which is the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host. Simply stated, if the requesting host receives a response from the destination host, this host is reachable. ICMP messages are typically used for diagnostic or control purposes or generated in response to errors in IP operations (as specified in RFC 1122). ICMP errors are directed to the source IP address of the originating packet.. There are 3 primary methods used to test ICPM: 1) Ping 2) Tracert 3) PathPing Slide 18
19 Understanding ICMP Ping 4. Test ICMP Connectivity from all network to Servers Node, and vice-versa. ICMP Test: Ping is the most commonly used network tool. This utility is used to provide a basic connectivity test between the requesting host and a destination host. You can use this PING command to provide a basic picture of where a specific networking problem may exist. For example, if an Internet connection is down at one Node. TTL Time-to-Live is really important to understand how many hops (router i.e.) the packet can cross Slide 19
20 Understanding ICMP Traceroute 4. Test ICMP Connectivity from all network to Servers Node, and vice-versa. ICMP Test: Tracert, once the ping utility has been used to determine basic connectivity, the tracert/traceroute utility can used to determine more specific information about the path to the destination host including the route the packet takes and the response time of these intermediate hosts. You can use this TRACERT command to provide a basic picture of how the datagrams are going to be sending over a specific networking, understanding if a problem may exist. For example, if a router is down hindering the connection at one Node. You can use also to figure the slowest network pipe. Slide 20
21 Understanding ICMP PathPing 4. Test ICMP Connectivity from all network to Servers Node, and vice-versa. ICMP Test: PathPing, In an effort to take advantage of the benefits of both the ping and tracert/traceroute commands. You can use this PATHPING command to take the advantages of PathPing over ping and traceroute are that each node is pinged as the result of a single command, and that the behavior of nodes is studied over an extended time period, rather than the default ping sample of four messages or default traceroute single route trace. Slide 21
22 Understanding Route and Metric 5. Test Route table in all Node, understanding only how the metric is working. Route Table: In computer networking a routing table is a data table stored in a router or a networked computer that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes. The routing table contains information about the topology of the network immediately around it. The construction of routing tables is the primary goal of routing protocols. This would be an example of Route Table: Net. Dest. Net. Mask Gateway Interface Metric Network Destination and Netmask together describe the Network id. For example, destination and netmask can be written as network id /24. Gateway column contains the same information as the Next hop, i. e. it points to the gateway through which the network can be reached. Interface indicates what locally available interface is responsible for reaching the gateway. i.e. gateway (the internet router) can be reached through the local network card with address Finally, the Metric indicates the associated cost of using the indicated route. This is useful for determining the efficiency of a certain route from two points in a network. i.e. it is more efficient to communicate with ( localhost ) than it would be through Slide 22
23 Understanding Route and Metric 5. Test Route table in all Node, understanding only how the metric is working. Route Table Test: ROUTE PRINT is a command to display the route table: Slide 23
24 Understanding Metric 5. Test Route table in all Node, understanding only how the metric is working. Metric: A metric is a value that is assigned to an IP route for a particular network interface that identifies the cost that is associated with using that route. Automatic Metric is a feature in Windows that automatically configures the metric for the local routes that are based on link speed. The Automatic Metric feature is enabled by default, and it can also be manually configured to assign a specific metric.: Slide 24
25 Understanding TCP/UDP on IP 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/IP Reliability: Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) were the first networking protocols defined in this standard of communication thru Internet Protocol (IP). Both TCP and UDP work on a specific Port Originally, these port numbers were used by the Network Control Protocol (NCP) and two ports were needed as transmission was done at half duplex. As TCP and UDP were adopted, only one port was needed. The even numbered ports were dropped. This is why the even numbers on well known port numbers are unassigned. We could simply consider the TCP/UDP as the Postal Message, IP as Addressee, TTL how many max hops the message can thru and PORT as the Receiver Mailboxes Slide 25
26 Understanding TCP/UDP pipeline 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/UDP Reliability: Ensure that clients in your network can reliably establish and maintain a connection to Wonderware App. Servers. Information Client InTouch Historian Client Historian Server RMC AOS AOS Data Server AOS Data Server RMC-Redundancy Management Channel Failover w/ Load Balancing Information Server Slide 26 GR / IDE Note: TCP/UDP reliability tests are intrusive and can affect network performance. Run these tests during off-hours to gather data while causing the minimum possible the impact to your network.
27 Understanding TCP/UDP Port 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/UDP Port: Every Node on the network must have a unique number assigned to it called the IP address, that is used to recognize your Node among the others. When information is sent over the Network to your computer how does your computer accept that information? It accepts that information by using TCP or UDP Ports. You can have a total of 65,535 TCP Ports and another 65,535 UDP ports. Another easy way to understand ports is to imagine your IP address is a cable TV box and the ports are the different channels on that cable box. The cable company knows how to send cable to your cable box based upon a unique serial number associated with that box (IP Address), and then you receive the individual shows on different channels (Ports). Each single Application can handle one or more ports to communicate with others Slide 27
28 Understanding TCP/UDP and Ports 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/UDP Port: NETSTAT is a Command Prompt command that you can use to show up TPC/UDP all the estabilished connection over some specific port, and all the Open Port that are waiting for a connection. Slide 28
29 Understanding TCP/UDP and Ports 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/UDP Port: NETSTAT with NETSTAT -o can show al which PID still handling the port: Slide 29
30 Understanding TCP/UDP and Port 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/UDP Port: NETSTAT with NETSTAT -b can show directly the Applications are still handling the port: Slide 30
31 Understanding TCP/UDP Protector 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/UDP Protector: Firewall Even if a Port is open, the connection can be denied! Firewall can either be software-based or hardware-based and is used to help keep a network secure. 1. Many computer operating systems include software-based firewalls to protect against threats from the public Internet, included Ms Window our base OS. 2. Could be there also other 3rd part software installation like Norton, McAfee and son on 3. In addition IT or Network Administrator could implement some router/firewall hardware All Wonderware Product needs to be excluded from Firewall protection. Slide 31
32 Understanding TCP/UDP Protector 6. Test TCP/IP Reliability from all locations to Servers, and vice-versa. TCP/UDP Protector: Firewall Some Port that need to be excluded from: Function 1st Connection 2nd Connection Remarks CIFs TCP 445 Out File serving, deploying. IDE WAS NETBIOS TCP 139 Out Server Message Block (SMB). WAS Domain Controller(s) NMXSVC TCP 5026 Out A2 Channel: Peer-to-Peer, bi-directional between all ArchestrA-enabled nodes. RPC DCE TCP 135 Out DCOM: Peer-to-Peer, bidirectional between all ArchestrA-enabled nodes. RPC Dyn Range TCP Out *Custom range. Peer-to-Peer, bi-directional between all ArchestrA-enabled nodes. SQL Server TCP 1433 In/Out Inbound: SQL Server Client, and outbound: Client SQL Server SUITELINK TCP 5413 Out LDAP TCP 389 Active Directory Domain, Cient Domain Controller(s) KERBEROS TCP 88 OS Authentication NETBIOS UDP 137 Tx/Rx SQL Browser UDP 1434 Tx/Rx Only if implementing SQL Server instances NTP UDP 123 Tx/Rx Time Synchronization Client Domain controller(s) or Time Master DNS UDP 53 Slide 32 TCP UDP 138 Tx TCP 53 SuiteLink: InTouch, IO Server communication. NetBios Name Service WAS WINS/Browser/Domain Master Domain Name Service, Client DNS Server
33 Understanding End! And now? Slide 33
34 Troubleshooting Summary 1. Possible issues about Network Types. 2. Possible issues about Location and Bandwidth. 3. Possible issues about Name Resolution. 4. Possible issues ICMP Connectivity. 5. Possible issue about Routing table 6. Possible issues about TCP/IP Reliability. How to solve the issue using the Understanding we got!... And now? Slide 34
35 Troubleshooting Network Type 1. Possible issues about Network Types. Network Type: DOMAIN Major issue we were experienced about the Domain Networks could be addressed to a Local IT that handle the Machine Local Security Policy ISSUE: Failed to deploy Platform SR / CR L Slide 35
36 Troubleshooting Network Type 1. Possible issues about Network Types. Network Type: DOMAIN Major issue we were experienced about the Domain Networks could be addressed to a Local IT that handle the Machine Local Security Policy App. Server as well as communicate with Client node, need to register the components using DCOM access, so it need to logon on the machine to do that, Local IT to prevent unauthorized access tend to restrict the following Local Policy: Allow/Deny access from network Allow/Deny log on locally Local It has changed User with Power User Slide 36
37 Troubleshooting Network Type 1. Possible issues about Network Types. Network Type: DOMAIN Often IT doesn t accept changes, so far we need to find out a workaround: In this case we put the Authenticated User into Power User group Slide 37
38 Troubleshooting Estimate Bandwidth 2. Possible issues about Location and Bandwidth. Bandwidth: Major issue we were experienced about the Orange Icon was addressed to a excessive band usage, ISSUE: Orange Icon SR xxx / CR xxx Slide 38
39 Troubleshooting Estimate Bandwidth 2. Possible issues about Location and Bandwidth. Bandwidth: NetLimiter - To replicate the issue, I was using this Software, and I have put the Bandwidth like a GSM, 32Kbit/s, further detail about this SW later in Monitoring section. Slide 39
40 Troubleshooting Estimate Bandwidth 2. Possible issues about Location and Bandwidth. Bandwidth: IPERF - Iperf command was being used to state the Bandwidth boundaries: Slide 40
41 Troubleshooting Estimate Bandwidth 2. Possible issues about Location and Bandwidth. Bandwidth: SMC - In addition, enabling DeployStatus flag we have recognized that system was busy yet, copying the InTouch file: Slide 41
42 Troubleshooting Estimate Bandwidth 2. Possible issues about Location and Bandwidth. Bandwidth: Unlock Bandwidth - In this case I can, often we cannot!: Slide 42
43 Troubleshooting Host resolving 3. Possible issues about Name Resolution. Name Resolution: HOST Name Major issue we were experienced about the Host resolution could be addressed to a Multiple Network interface present on the system, in this case The Supervisory Network is unable to work properly due a corporate Network DNS ISSUE: Unable to resolve Host SR common issue Slide 43 / CR no CR related
44 Troubleshooting Host resolving 3. Possible issues about Name Resolution. Name Resolution: So far Wonderware Information Server can not be reached by Client using the Hostname, work only with IP Address: Slide 44
45 Troubleshooting Host resolving 3. Possible issues about Name Resolution. Name Resolution: HOSTS The issue has been addressed to a missing NetBIOS option enabled Supervisory Network of WIS Node, so far one way to solve the issue has been edit Hosts file: Slide 45
46 Troubleshooting ICMP 4. Possible issues ICMP Connectivity. ICMP : Sometime we were experiencing some LMX warning message, but apparently no issue has occurred, but a continuously spam message would be better to analyze. ISSUE: Platform x exceed max heartbeat timeout Slide 46 SR
47 Troubleshooting ICMP 4. Possible issues ICMP Connectivity. ICMP : This would be the scenario I have found i.e. on Historian Node: Slide 47
48 Troubleshooting ICMP 4. Possible issues ICMP Connectivity. ICMP : Ping Running ping command we figured that in round an ICMP request will be sent on both Control and Supervisory, in round robin,: Slide 48
49 Troubleshooting ICMP 4. Possible issues ICMP Connectivity. ICMP : WireShark/NetMonitor These tools would be really helpful to understand the ICMP walkthrough, this topic will treated later in the monitor section: Slide 49
50 Troubleshooting ICMP 4. Possible issues ICMP Connectivity. ICMP : Double gateway issue So far in Windows having a double gateway means that you would have a Network Load Balance, in which and packet will be send round robin on both interface, crossing through the two different gateway: Gateway need to be set only when the Supervisory Network can have other clients in al different network, sometime would be best to enlarge the subnet mask to keep together instead to hop to another network! Slide 50
51 Troubleshooting Route and Metric 5. Possible issue about Routing table. Routing table: Metric Major issue we were experienced about the Multiple Network Adapter, so far there might be a wrong routing addressing for the Supervisory Network. ISSUE: While starting up, view.exe hangs 5-15 minutes while loading WWSQL SR When InTouch window is starting up, a custom script try to connect some tags on SQL Sever on Rachet node. In the Log we will see the connection fail. Slide 51
52 Troubleshooting Route and Metric 5. Possible issue about Routing table. Routing table: Metric Despite we have the Binding List in a proper manner, the request come thru a Corporate Network instead of Supervisory Corporate network can access on Internet, so can have a FIREWALL! Slide 52
53 Troubleshooting Route and Metric 5. Possible issue about Routing table. Routing table: Metric Getting a look on route table we ll see that Corporate Network have a low Metric: So we could increase the Corporate Metric, and decrease Supervisory to choose a fast track! Slide 53
54 Troubleshooting TCP/UDP 6. Possible issues about TCP/IP Reliability. TCP/UDP issue: Firewall Several issues related to TCP/UDP reliability could be addressed at closed firewall port. ISSUE: Unable to connect Logger SR Slide 54
55 Troubleshooting TCP/UDP 6. Possible issues about TCP/IP Reliability. TCP/UDP issue: NetStat -a aalogger Service To share the logger information it will be used the TCP 49156, So netstat was used to understand the port status on Historian Node. Slide 55
56 Troubleshooting TCP/UDP 6. Possible issues about TCP/IP Reliability. TCP/UDP issue: ProcessMonitor Assuming that the port is listening without any active connection estabilished, we have to test the all pipeline, understanding if the communication was blocked. We could use Process Monitor tool from Microsoft Sysinternals, to figure what SMC (mmc.exe) was trying to do with TCP protocol: Filter: Process Name = mmc.exe Operation >= TCP Slide 56
57 Troubleshooting TCP/UDP 6. Possible issues about TCP/IP Reliability. TCP/UDP issue: ProcessMonitor Below the results, trying to open historian node with SMC: This meant that Rachet (Historian Node) can be reachable at epmap port (135 DHCP server, or DNS server, or WINS server) but not at used by SMC Then the client (Ironide) was still trying to reconnect until a timeout will be expired. Slide 57
58 Troubleshooting TCP/UDP 6. Possible issues about TCP/IP Reliability. TCP/UDP issue: Firewall For sure a firewall in somewhere was denying the access at port, so far we have enabled to log some additional information about the firewall behavior: Slide 58
59 Troubleshooting TCP/UDP 6. Possible issues about TCP/IP Reliability. TCP/UDP issue: Firewall That is the root cause, the firewall was dropping all the connection for the logger! Slide 59
60 Troubleshooting End! And now? Slide 60
61 Monitoring Summary Advanced Monitoring, only overview: A. Using: Performance Monitor B. Using: TCPView C. Using: Process Monitor D. Using: NetMon/Wireshark Slide 61
62 Monitoring Performance Monitor A. Using Performance Monitor Object Counter Description Performance Monitor expose several pen to draw a network trend, here below the most helpful:connections Established TCPv4 The number of simultaneous connections supported by TCP. This counter displays the number of connections last observed to be in the ESTABLISHED or CLOSE-WAIT state. Network Interface Bytes Received/Sent The cumulative total number of bytes received/sent. Web Service Max. Connection Cur. Connection The maximum/current number of simultaneous connections to the Web service Active Server Pages Requests/sec The number of ASP page requests executed per second. Use this number to provide an indication of how heavy the stress on the Web server is. SQLServer User Connections Shows the number of active SQL users. Each connection uses 37 KB of memory. Compare this number to the Active Server Pages :Requests/sec counter to get an idea of how much the scripts are really working the SQL server. A large difference may indicate that the test script is not a valid stress of SQL server. SQLServer NetNetwork Reads/sec Shows the number of data packets read from the network. An extremely high value for an extended time indicates that either the network card has a problem, or more likely, the application is not using enough stored procedures and is written improperly. Slide 62
63 Monitoring Performance Monitor A. Using Performance Monitor Slide 63
64 Monitoring TCPView for TCP/UDP B. Using TCPView TcpView - TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections. Slide 64
65 Monitoring TCPView for TCP/UDP B. Using TCPView TcpView - TCPView report SQL Server was consuming lot of network send/receive How could be possible that we had two instance of SQL Server that were flooding the communication, looked like a nested loop, on port 49398??? Slide 65
66 Monitoring ProcessMonitor on TCP C. Using Process Monitor ProcessMonitor- Process Monitor is an advanced monitoring tool for Windows that shows realtime file system, Registry and process/thread activity. It capture several information including Network communication. So we started it with the following filter: Slide 66
67 Monitoring ProcessMonitor on TCP C. Using Process Monitor ProcessMonitor- Analyzing the results, we can figure out several request and response coming across Sql Server and on the same node: Slide MS-SQL MS-SQL 49398
68 Monitoring ProcessMonitor on TCP C. Using Process Monitor ProcessMonitor- We could get a look at properties of call, and having a deep about the all the processes involved on, we will see that also Historian was involved: Slide 68
69 Monitoring ProcessMonitor on TCP C. Using Process Monitor ProcessMonitor- We could get a look at Network Summary to discover all the client that was querying at this Server: Slide 69
70 Monitoring ProcessMonitor on TCP C. Using Process Monitor ProcessMonitor- With netstat we knew that Client node (ironide) was calling at MSSQLServer Port(1433) trhought his own port (52408 and 52409): Slide 70
71 Monitoring ProcessMonitor on TCP C. Using Process Monitor? ProcessMonitor- Using process monitor on ClientIronide node (ironide) we wil discover who was calling at MSSQLServer Port(1433) trhought his own port (52408 and 52409): Trend: 52408/9 Rachet: Rachet: MS-SQL Rachet:MSSQL Slide 71 Rachet: 49398
72 Monitoring ProcessMonitor on TCP C. Using Process Monitor ProcessMonitor- With netstat we knew that Server node (rachet) was responding at Ironide Client node (ironide) over 1433 Port (MSSQLServer): Rachet:1433 Trend: SqlServer 52408/9 Rachet: Rachet: MS-SQL Rachet: MS-SQL Slide 72 Rachet: 49398
73 Monitoring Wireshark D. Using NetMon/Wireshark Whireshark - Wireshark is a network protocol analyze, It allows the live capture of network traffic and includes many powerful tools to examine, analyze, filterwith and otherwise manipulate this blank we willthe let data. WS capture all the traffic, in order to refine it later. Slide 73
74 Monitoring Wireshark D. Using NetMon/Wireshark Wireshark We let WS running for several seconds in order to gather the following: Slide 74
75 Monitoring Wireshark D. Using NetMon/Wireshark Wireshark Now we have to figure something about the content of the call, filtering all the call to SQLServer coming through a port 52408/9: Slide 75
76 Monitoring Wireshark D. Using NetMonitoring/Wireshark Wireshark Then we followed all the stream to recap the information exchanged: Historian Query We could also filter out this Stream Slide 76
77 Monitoring Why? The Answer Thanks to Monitoring: Just FYI Historian AnalogHistory view use the OLEDB linked Server, and this meant a double call on Server Node to provide the answer at client: Slide 77
78 Monitoring End! And now? Slide 78
79 Question/ feedbacks/ request Thanks!!! Slide 79
80 Slide 80
WW HMI SCADA-08 Remote Desktop Services Best Practices
Slide 1 WW HMI SCADA-08 Remote Desktop Services Best Practices Steven L. Weygandt Portfolio Product Manager - Device Integration /Wonderware social.invensys.com @InvensysOpsMgmt / #SoftwareRevolution /InvensysVideos
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Hands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Lab PC Network TCP/IP Configuration
Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
1 PC to WX64 direction connection with crossover cable or hub/switch
1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
a) Network connection problems (check these for existing installations)
How do I resolve issues with a Client not connecting to the Best Practice server instance? This FAQ is intended to answer common questions about resolving issues with a Best Practice client not connecting
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Domain 5.0: Network Tools
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide
WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network
Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
What communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Part A:Background/Preparation
Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
1.0 Basic Principles of TCP/IP Network Communications
Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Effect of Windows XP Firewall on Network Simulation and Testing
Issues in Informing Science and Information Technology Volume 4, 2007 Effect of Windows XP Firewall on Network Simulation and Testing Akram Al-Rawi College of CS & IT, King Faisal University, Al-Hassa,
iboss Enterprise Deployment Guide iboss Web Filters
iboss Enterprise Deployment Guide iboss Web Filters Copyright Phantom Technologies, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Planning and Maintaining a Microsoft Windows Server Network Infrastructure
Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION Date: April 22,2013 Prepared by: Sainath K.E.V Microsoft Most Valuable Professional Introduction: SKV Consulting is a Premier Consulting
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
AutoDownload: SQL Server and Network Trouble Shooting
AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Extending Your Availability Group for Disaster Recovery
Extending Your Availability Group for Disaster Recovery Ed Leighton-Dick Kingfisher Technologies About Me Email: [email protected] Blog: edleightondick.com Twitter: @eleightondick 1 Agenda Availability
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
Crestron Electronics, Inc. AirMedia Deployment Guide
Crestron Electronics, Inc. AirMedia Deployment Guide Crestron product development software is licensed to Crestron dealers and Crestron Service Providers (CSPs) under a limited non-exclusive, non transferable
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site!
Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site! This is a set of questions to help you prepared for the CompTIA Network+ certification examination. You should not exceed twenty
UNCLASSIFIED. BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23)
BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23) March 2007 This page intentionally left blank. March 2007 Foreword The BlackBerry Enterprise Server Isolation in a Microsoft
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Key Features of Dynamic Address Objects
SonicOS Enhanced MAC and FQDN Dynamic Address Objects Dynamic Address Objects: FQDN and MAC Address Objects in SonicOS Enhanced Overview of Address Objects From its inception, SonicOS Enhanced has used
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lesson Plans Managing a Windows 2003 Network Infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside:
White Paper Next Generation s Author: Mike Brost, Consulting Systems Engineer, Invensys Operations Management What s Inside: 1. Introduction 2. Historical Data Types, Usage and Management Challenges 3.
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
The Barracuda Network Connector. System Requirements. Barracuda SSL VPN
Barracuda SSL VPN The Barracuda SSL VPN allows you to define and control the level of access that your external users have to specific resources inside your internal network. For users such as road warriors
