Simplifying Deployment, Security and Management of DNS/DHCP Services
|
|
|
- Hugo Rice
- 10 years ago
- Views:
Transcription
1 Simplifying Deployment, Security and Management of DNS/DHCP Services IPControl Sapphire DNS/DHCP Appliances By Tim Rooney Director, Product Management BT Diamond IP IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 1 bt.diamondip.com
2 Simplifying Deployment, Security and Management of DNS/DHCP Services IPControl Sapphire DNS/DHCP Appliances By Tim Rooney, Director, Product Management Introduction Many organizations have completed at least initial deployments of voice over IP (VoIP) services within their enterprises, or as a service offering for subscribers. Many others are in the process of deployment or are in the planning stages for such a deployment. Pockets of further convergence of video, conferencing, unified messaging, and related IP-based communications applications are emerging within organizations as well. With much if not all of the organization s communications applications running over an IP network, the criticality not to mention visibility of maintaining uptime of the network increases dramatically. Murphy s Law fans, which include most IP network managers, will point out that whatever can go wrong managing a network will go wrong. IP network managers should display a healthy sense of paranoia, and proactively plan to eliminate threats to keeping the IP network up and running. This plan should include: Network redundancy Diverse network routing to key infrastructure elements and applications Minimizing security vulnerabilities Eliminating misconfigurations Structured processes for network and software upgrades Proactive monitoring Among the key elements underpinning the foundation of the IP network, Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) are critical to proper initialization and usability of IP applications. If a user s computer cannot obtain an IP address, or a VoIP phone cannot initialize via DHCP, users will call the help desk. From their perspective, the network is down. Likewise, if they are unable to connect to applications or other voice users due to DNS failures, they will also consider the network down. There are many services and protocols used by various IP applications, but DHCP and DNS are used by nearly all IP devices for every application for proper initialization on the IP network and for easier usability for network users. This white paper will offer approaches to streamlining efforts to keep IP networks up and running for critical DHCP and DNS services, then discuss the IPControl Sapphire appliances, which achieve the next level in protecting DHCP and DNS services. First, let s examine the key considerations for threat reduction best practices. IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 2
3 Key Considerations to Reduce Threats to DHCP/DNS Redundancy Redundancy has become a standard requirement in networks these days. The DNS architecture, designed over 20 years ago, is redundant by design via its ability to deploy a single master for zone data and multiple slaves, all authoritative for that zone s data. In other words, DNS clients, or resolvers, can query 1 the master or any slave to obtain an authoritative response to a query for a record in the zone in question. From a DHCP perspective, while the DHCP failover protocol has been slowly moving through the Internet Engineering Task Force (IETF) approval process, many products already support a form of failover, including the Internet Systems Consortium s (ISC s) freely redistributable DHCP server. DHCP failover enables a DHCP client s address request (or Discover packet) to reach two DHCP servers. In the simplest configuration, one DHCP server acts as the primary server for all address pools. The failover DHCP server acts as a backup server, and is configured with the same set of address pools as the primary. Figure 1 illustrates the concept for DHCP failover. Figure 1: DHCP Failover Configuration The router serving the network on which the DHCP client is located must be configured with DHCP relay addresses corresponding to the DHCP servers serving this subnet. The router intercepts the DHCP client s broadcast Discover packet, then unicasts it to each of the addresses in its DHCP relay address list. Hence, both DHCP servers normally receive each Discover message. The DHCP servers are configured as primary and failover, respectively, and normally the primary server responds and completes the transaction. As 1 The resolver need not query directly of course. The originally queried server would iterate until it found an authoritative server to query on behalf of the resolver. IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 3
4 leases are distributed, the primary server communicates lease information to the failover server. If the failover server detects that the primary server may be down via the heartbeat mechanism in accordance with failover configuration parameters, it will assume the role of primary and begin processing lease transactions. From the DHCP client s perspective, it is served with an appropriate IP address and associated configuration options whether from the primary or failover server. Diverse Networking Many organizations have learned the hard way that providing diverse routing and deploying resources on multiple sites to provide high availability in the face of network outages is a must. The implementation of multiple DNS servers and DHCP failover are less effective if the multiple servers reside at the same location and/or if a single provider or set of facilities serves the location. Since DNS zone transfers and DHCP failover protocol operate over wide-area networks, deploying server across at least two locations is recommended. This enables a higher probability of reaching a DNS or DHCP server as needed, assuming the local network is not the culprit. Referring back to Figure 1, assuming the primary and secondary DHCP servers are located in different locations, this configuration supports server redundancy as well as the potential for route and site diversity. Note that the heartbeat mechanism used can indicate server failure, but it may not indicate network unreachability status from the client s perspective. An additional set of parameters can be configured on the ISC DHCP server to enable two servers to share the load of DHCP requests. This load balancing configuration appears the same as in Figure 1. However, when each DHCP server receives the Discover packet, it performs a hash of the client s client ID or client hardware address (chaddr) field. Based on the server s configuration, it will either process the lease transaction, or not, based on whether the hash result meets its configured criteria. This split is performed on a 50/50 basis, where both the primary and failover servers in Figure 1 essentially would be primary, but for only half of the clients (assuming the client IDs or hardware addresses roughly equate to an even split). The load-balance override parameter in the ISC DHCP server defines a threshold for the number of seconds the client has been attempting to obtain an address. This parameter is typically provided in the DHCP Discover packet header. If this threshold is exceeded for a client for whom the hash algorithm indicated should not be served by this server, it may process the transaction anyway. In this manner, even though the two servers can communicate heartbeats successfully, one server can process lease transactions for the other if clients are not be served in a timely manner, which could be indicative of a client-to-server network issue. Minimize Security Vulnerabilities Efforts to minimize security vulnerabilities reverberate throughout the entire IT infrastructure. No element is immune to attack, including DHCP and DNS services. In most cases today, DHCP and/or DNS application software are installed on a server running a particular operating system. Such installations on general-purpose computing platforms result in vulnerabilities not only in the DHCP and DNS services themselves, but also at the operating-system level. Common services available on some operating systems, such as rlogin or super user access, enable hackers to gain access to the server, which in turn exposes the DHCP and/or DNS information itself to attack. It also enables the server itself to be used as a stepping stone for further infiltration of other applications or servers in the organization. Many attack types have been well documented, though new forms arise periodically. In general, with the increasing criticality of DNS and DHCP services providing the foundational services of an IP network, IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 4
5 running these services on dedicated servers is recommended. In other words, few if any other services should be running, even at the operating-system level. While many operating-system parameters may be configurable, such as open ports, file and user permissions, and jailed environments, others, such as the boot interrupt process, root or superuser (su) access for certain processes, and daemon or process security, are generally not configurable. Likewise, at the server daemon or application level, many parameters are configurable, although vulnerabilities, such as buffer overflows, can exist. The BIND DNS service provides a number of configurable parameters to control DNS application access, file system access, as well as access controls on DNS level input/output. While there are a number of such features, including transaction signatures, views, ACLs, options for the server, view, and zone, and control channel access controls, configuring them accurately and consistently across your servers may be challenging. Using a centralized management tool can help with correlation of information across multiple servers, and provide some level of error checking on these parameters to the extent supported by the product deployed. Beyond supporting transaction signatures to sign DNS updates to a DNS server, most DHCP servers rely on server or operating-system access controls to protect DHCP server information integrity. The bottom line is that the ability to minimize security vulnerabilities is available to a partial degree on today s commercial DHCP/DNS software products. Eliminating misconfigurations of these server products, though, is a challenge. Eliminate Misconfigurations Let s face it, configuring DNS and DHCP services properly is complex. And deployment of even mildly complex technologies like transaction signature keys, let alone views, requires a high degree of interserver configuration coordination and correlation to ensure that complementary configurations meet their intended goals. Despite this complexity, many of these configurations should be implemented to protect DNS and DHCP services. Even a basic server configuration can be rather complicated; consider the fact that BIND supports over 90 options and/or configuration directive statements, each with its own set of parameters. An error in configuration can lead to security holes or even the inability to resolve particular host names. Given the criticality of DNS and DHCP to an IP network, misconfigurations are unacceptable, and with the variety of configuration software products on the market, largely avoidable. A centralized configuration tool can vastly reduce misconfigurations, and help reduce the time it takes to configure a number of DNS and DHCP servers accurately and consistently. Centralizing upgrade and patch management functions can also help simplify that process. Software and Network Upgrade Process As bugs are identified and fixed, and new technologies are implemented within DHCP and DNS servers, upgrades must be performed to incorporate these fixes and new features. Oftentimes, compatibility issues arise with respect to supported operating-system versions and patch levels per DHCP and DNS version. Resolving these issues relies on availability of compatible operating system, DHCP/DNS software, and even any hardware upgrades from respective vendors, as well as coordinating the upgrade process for each affected server. This may also require coincident upgrade of more than one server at a time if new interserver features or updates are included in the upgrade. This overall upgrade process can be excruciatingly difficult in terms of vendor coordination, internal interorganizational coordination, testing, deployment, and contingency planning. And if anything goes awry during the upgrade, the backout plan IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 5
6 must be rolled into effect, and the upgrade reattempted later. Ironically, many upgrades result in downtime for particular servers. A mechanism for managing and better planning of upgrades, which will be discussed subsequently, can reduce the headaches involved in this DHCP/DNS upgrade process. Proactive Monitoring Keeping an inventory of DHCP and DNS servers operating on the network is certainly a good idea. Beyond a listing of server names, IP addresses, and perhaps login credentials, it is also helpful to understand the current release versions of each server s operating system, DHCP/DNS server software release, and hardware configuration. In addition to these inventory-focused attributes, it is also beneficial to monitor the services themselves to proactively identify servers that may be down or experiencing performance bottlenecks. There have been various tools available to view process states or scan logs or inventory DHCP and DNS servers, but until recently, none of these tools integrated these functions to enable holistic management of key attributes of your DHCP and DNS servers. This shortcoming has been resolved by IPControl Sapphire appliances. Centralized IP Management with IPControl Sapphire Appliances In today s environment, where DHCP and DNS software is commonly installed on general-purpose hardware with commercial operating systems, there are still many shortcomings and manual processes involved in effectively managing a number of distributed DHCP and DNS servers. Software-based approaches generally lend themselves well to redundancy and site diversity, but are less comprehensive in terms of security configuration, cross-server configuration, upgrade management, and monitoring capabilities. BT Diamond IP offers a new approach to solve these DHCP/DNS and IP management issues: IPControl IP address management software and IPControl Sapphire appliances. IPControl software enables centralized configuration, deployment, management, and monitoring for multivendor DHCP and DNS servers, including support of Sapphire appliances. Sapphire appliances provide extensive security features to minimize vulnerabilities, an additional high-availability option, services monitoring, and more. IPControl Sapphire appliances provide DNS and/or DHCP services with a prebundled, hardened Linux operating system on a 1U rack-mountable hardware platform. The operating system and associated file system and services are purpose-built, and restricted to those services and functions required to support the appliance s DHCP and DNS operation in a secure environment. The Sapphire appliance s rack-mountable hardware configuration enables deployment as a standalone unit or in a TwinMirror configuration with dual back-to-back servers for hardware redundancy. Sapphire appliances provide a common look and feel with sibling IPControl products, and are centrally managed with IPControl. IPControl Sapphire appliances provide the added benefit of simple deployment just plug them in and configure them from IPControl. Upgrades are also a snap with the EasyUpdate feature, which enables staging and selective deploying of the operating IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 6
7 system, IPControl, and DHCP and DNS software updates as they become available. This feature enables lights-out configuration, management, and upgrades to streamline your processes and operations costs. IPControl Centralized Management IPControl products provide a comprehensive feature set to streamline overall IP address management tasks. IPControl centralizes IP address block and individual IP address inventory (Figure 3) for rigorous and consistent inventory tracking. Unlike other IP management tools, IPControl includes the ability to discover at the network and individual IP address level with exception reporting to quickly identify discrepancies between the inventory and network actuals. IPControl also supports the deployment of DHCP and DNS configurations to multivendor, multiplatform servers, including native Microsoft and ISC services, as well as the Sapphire appliances from BT Diamond IP. IPControl can scale to manage IP networks from as few as 1000 nodes up to tens of millions of nodes. Figure 3: IPControl Basic Architecture The user interface is purely web-browser based with no client software required. Administrator privileges are settable to restrict access to particular resources, addresses, and/or functions within the system. Command line and web services API interfaces are provided with IPControl along with the innovative Callout Manager service to promote integration with external applications. IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 7
8 Redundancy In addition to supporting multiple authoritative DNS servers and multiple DHCP servers in a failover configuration, IPControl Sapphire appliances can be deployed in a TwinMirror configuration, as shown in Figure 4 for a pair of 10 series appliances. TwinMirror capability features two co-located appliances interconnected via a high-speed interface. In this configuration, the appliances mirrors OS and server-level updates to maintain synchronization. The TwinMirror servers appear to DNS and DHCP clients as one server, with one IP address. However, both appliances are independently addressable from IPControl for monitoring purposes. In this active-standby configuration, when a failure is detected, the standby unit assumes the active role, providing seamless DHCP and DNS services to clients. Figure 4: Sapphire TwinMirror Diverse Networking The TwinMirror configuration provides additional redundancy beyond DHCP failover and multiple DNS servers as illustrated in Figure 5. TwinMirror deployments provide hardware-level redundancy on top of the respective DNS server-level redundancy and DHCP failover feature. IPControl supports centralized configuration of site-diverse DHCP and DNS servers as single unit deployments per site and/or in TwinMirror configurations. In addition, IPControl eases the configuration of the load-balancing algorithm with automated full load assumption mechanism discussed previously. This enables sharing the DHCP load across servers or server pairs and the ability to assume the full load for the other server or pair based on configurable parameters. This feature streamlines the process and provides an additional redundancy check against network reachability outages. Figure 5: Site Diverse TwinMirror Failover IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 8
9 Minimize Security Vulnerabilities IPControl Sapphire x-series appliances are designed as dedicated DHCP and/or DNS servers, while the EX series appliances are designed for centralized management functionality. Both models enable strict control and elimination of extraneous operating system services and structure, as well as extraneous services, users, and ports. Sapphire appliances provide four levels of security: Kernel security Sapphire s Linux-based kernel is purpose-built for the appliance hardware. It provides complex packet filtering and manipulation and does not support file systems not used directly by the appliance. In addition, the kernel implements a controlled and uninterruptible boot process. File system security Sapphire includes only the necessary DHCP, DNS, and IPControl binaries, and these binaries and associated data files have no privileged attributes. These services run in a sterile jailed environment, which provides no access to other components on the appliance or via network connections from the appliance in the unlikely event an attacker gains access. Process security DNS and DHCP services startups are controlled by a managed launch binary, which performs over eight different security checks during the startup process. DNS and DHCP libraries are separate from system libraries and DHCP, DNS, and IPControl services run in a sterile environment. In addition, DNS and IPControl services run as unprivileged processes. Network security Sapphire opens only network ports required for use by SSH, DHCP, DNS, and IPControl; all other ports operate in stealth mode, not responding to packets. The management interface is secured via an SSH connection. TwinMirror high availability and data mirroring traffic is run over a private high-speed network between the nodes. Sapphire s multiple levels of security minimize the risk of intrusion into critical DHCP and DNS services. And should an attacker gain access to the appliance, there is little to nothing that can be leveraged within the sterile environment. Eliminate Misconfigurations While employing an appliance solution provides many security and ease-of-deployment benefits, each appliance must still be configured accurately. This is where many appliance-based solutions fall short. While some require per-server configuration, which is minimally better than editing BIND or DHCP configuration text files, others do provide the ability to configure like configurations across more than one server. However, this approach is still services-focused and not IP address-focused, in that it enables configuration of DNS independent of DHCP and independent of the IP address plan. Only IPControl enables centralized modeling of your entire IP address space, with hierarchical and topological allocations and derivation of associated DHCP and DNS configurations from the same consistent inventory. This functional integration saves time and improves accuracy as it leverages a common inventory database to create consistent configurations and updates for DHCP and DNS, while facilitating IP address and capacity management. IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 9
10 Software and Network Upgrade Processes Depending on your hardware, operating system, and DHCP/DNS vendors of choice, upgrades may be required at different times with varying levels of compatibility. A wider breadth of compatibility would enable use of the same DHCP/DNS software on multiple (broader) numbers of operating systems versions and patch levels. While this may ease the burden during intermediate upgrades, ultimately it s difficult if not impossible to escape the tedium of multiplatform upgrades planning and execution. However, this tedium can be greatly reduced with the use of IPControl and Sapphire appliances. If this sounds too good to be true, it isn t! IPControl provides visibility into each appliance deployed on your network in terms of the current operating system, DHCP version, DNS version, and IPControl services version. BT Diamond IP provides proactive updates at each of these levels to enable downloading and staging of updates, and then deploying them to either all appliances, or a subset of appliances as deemed necessary all from the IPControl interface. This functionality, along with a selectable backout option, vastly simplifies the overall upgrade process while providing complete control. Updates, patches and changes are logged by the system for reporting and auditing. And all software updates at these levels are tested on Sapphire hardware to assure compatibility with the appliance hardware configuration. Figure 6: IPControl IP Address Management Breadth Proactive Monitoring In addition to managing version levels of each Sapphire appliance, IPControl provides monitoring of the status of each appliance to assure services operation. IPControl provides a dashboard summary of the status of all appliances, broken down by service status for DHCP, DNS, IPControl and system. The IPControl dashboard enables drill-down into detailed state and event information and execution of services start, stop, reload, and more. This proactive approach provides a single window into all of your DHCP/DNS appliances to simplify configuration, management, and monitoring of these critical services. Why Not a Server-Level Approach? A number of vendors in the IP management marketplace feature DHCP/DNS server level approaches that provide many of the security, deployment, and upgradeability benefits discussed in this paper. However, these products provide limited to no centralized management, with a few providing only cross-server services-based configuration and management. BT Diamond IP offers the best of both worlds with all the security, deployment, and upgradeability benefits of an all-appliance-based approach with IPControl s holistic, centralized management solution. IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 10
11 Centralized management of IP address space and DHCP and DNS servers simplifies and integrates the IP management functions within an organization, saving time, automating tasks, and reducing configuration errors in the process. In addition, many customers operate a number of DHCP and DNS products from different vendors. IPControl provides overall IP block allocation and management, individual IP address inventory and management, along with multivendor DHCP and DNS configuration and management, including Microsoft, BT Diamond IP, ISC, and Sapphire appliances. IPControl is the only comprehensive solution! Conclusion Table 1 compares the basic approaches to best practices outlined in this paper with respect to keeping DHCP and DNS services up and running. As the table shows, the IPControl Sapphire solution provides many advantages over a software-only and appliance-only approach. Table 1: Comparison of IP Management Solutions Best Practice Redundancy Diverse Networking Security Eliminate Misconfigurations Upgrades Software-Only Approach Multiple DNS servers and DHCP failover Deployment of multiple servers across multiple sites Limited load balancing Limited DNS options support for ACLs No tools for OS config. 1-2 centralized solutions available to improve consistent and accurate configurations Challenging coordination of hardware, OS, and server level software versions with no central, perserver version tracking Server-Only Approach Multiple DNS servers, DHCP failover, and hardware redundancy Deployment of multiple servers across multiple sites Load balancing varies by vendor Improved OS- and DHCP/DNS-level security General configuration integrity checks for DNS and DHCP independently Little cross-server or IP address integrity checking Most appliance vendors provide automated OS and server upgrades, though limited central per-server version tracking IPControl Sapphire Approach Centralized configuration of multiple DNS servers, DHCP failover, and hardware redundancy Deployment of multiple servers across multiple sites with centralized configuration of multiple servers, failover, and load balancing Four levels of advanced security for kernel, file system, process, and network security with centralized configuration of complex DNS security features and directives Centralized cross-server configuration consistent with the IP address plan simplifies policy and configuration deployment and improves accuracy Automated upgrades of OS and server versions with ability to track and selectively deploy specific versions per server IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 11
12 Monitoring No integrated OS, services and server monitoring Limited to no availability Centralized view of all appliances with state information, drill-down, and action points The IPControl suite of software and Sapphire appliances provide an advanced, next-generation IP management solution that enables automation of many tedious, error-prone, yet crucial IP management functions across the entire lifecycle of an IP address. This lifecycle spans from obtaining address blocks from Internet Registries or ISPs, to automated address block allocations across the network topology, to IP subnet and individual address inventory management, to DHCP and DNS server configuration and deployment, to DHCP/DNS server software and/or Sapphire appliances. IPControl provides unsurpassed extensibility and user-definability to enable management of IP address space and is available as a total appliance, total software, or mixed and multi-vendor deployment configuration. To learn more about how IPControl products can automate more of the IP management functions you need at an exceptional ROI, [email protected]. About BT Diamond IP BT Diamond IP is a leading provider of software and appliance products that help customers effectively manage complex IP networks. Our next-generation IP management solutions help businesses more efficiently manage IP address space across mid-to-very large sized enterprise and service provider networks. These products include IPControl for comprehensive IP address management, Sapphire Appliances for DNS/DHCP services deployment and NetControl for full-cycle IP address block management and utilization. Our cable firmware management product, ImageControl, helps broadband cable operators automate and simplify the process of upgrading and maintaining firmware on DOCSIS devices in the field. Our customers include regional, national and global service providers and enterprises in all major industries. For additional information, please visit bt.diamondip.com or contact BT Diamond IP at in the U.S. or worldwide. Diamond IP, IPControl, TwinMirror, and EasyUpdate are trademarks of BT INS, Inc. IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 12
13 Copyright 2007, BT INS, Inc. This is an unpublished work protected under the copyright laws. All trademarks and registered trademarks are properties of their respective holders. All rights reserved. IPControl Sapphire DNS/DHCP Appliances BT Diamond IP Whitepaper 13
The Importance of a Resilient DNS and DHCP Infrastructure
White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems The Importance of DNS and
IP ADDRESS MANAGER 4.3 (IPAM)
REVIEWER S GUIDE IP ADDRESS MANAGER 4.3 (IPAM) REVIEWER S GUIDE CONTENTS Centralized IP address management 2 Automatic IPv4 subnet discovery 3 Active network scanning 4 IP address detail & history tracking
Virtualized Domain Name System and IP Addressing Environments. White Paper September 2010
Virtualized Domain Name System and IP Addressing Environments White Paper September 2010 Virtualized DNS and IP Addressing Environments As organizations initiate virtualization projects in their operating
IP Address Management (IPAM) Best Practices
White Paper IP Address Management (IPAM) Best Practices By Timothy Rooney Product Management Director BT Diamond IP Introduction... 3 IPAM Defined... 3 IP Address Inventory Management... 4 Address Planning...
VitalQIP Appliance Manager (AM)
VitalQIP Appliance Manager (AM) Ralph Senseny Product Management VitalQIP Strategy Provide a Complete IP Mgmt Software Solution to Enterprises, Gov t and Carriers IP Address, DNS and DHCP Management Data
Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs
Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs Beyond Quality of Service (QoS) Cost Savings Unrealized THE
Reliable DNS and DHCP for Microsoft Active Directory
WHITEPAPER Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Microsoft Active Directory (AD) is the distributed directory
alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management
alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management streamline management and cut administrative costs with the alcatel-lucent VitalQIP
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
DNS Appliance Architecture: Domain Name System Best Practices
WHITEPAPER DNS Appliance Architecture: Domain Name System Best Practices A Practical Look at Deploying DNS Appliances in the Network to Increase Simplicity, Security & Scalability Cricket Liu, Chief Infrastructure
DNS Architecture Case Study: Resiliency and Disaster Recovery
DNS Architecture Case Study: Resiliency and Disaster Recovery Cricket Liu VP, Architecture Infoblox Company Background Large U.S.-based company, Company Co. (company.com) Three categories of sites Headquarters
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
Automated Network Control for
Key Differentiators Application Layer Availability: Minimizes downtime and improves the user experience by determining health at the application layer for every user. Management Automation: Provides automated
Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft
White Paper Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft What You Will Learn Cisco is continuously innovating to help businesses reinvent the enterprise data
Load Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
Infoblox Grid TM. Automated Network Control for. Unifying DNS Management and Extending the Infoblox Grid TM to the F5 Global Traffic Manager
Key Differentiators Application Layer Availability Minimizes downtime and improves the user experience by determining health at the application layer for every user. Management Automation: Provides automated
Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances
Reliable DNS and DHCP for Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Reliable DNS and DHCP for (AD) is the distributed directory service and the information hub of
TECHNICAL WHITE PAPER. Infoblox and the Relationship between DNS and Active Directory
TECHNICAL WHITE PAPER Infoblox and the Relationship between DNS and Active Directory Infoblox DNS in a Microsoft Environment Infoblox is the first, and currently only, DNS/DHCP/IP address management (DDI)
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Managing SIP-based Applications With WAN Optimization
Managing SIP-based Applications With WAN Optimization Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Managing SIP-based Applications With
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
Secure and Hardened DNS Appliances for the Internet
Page 1 Datasheet Secure and Hardened Appliances for the Internet SECURE APPLIANCE IN THE INTERNET ENVIRONMENT External servers deliver critical services to your company, such as Internet visibility for
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Overview of WebMux Load Balancer and Live Communications Server 2005
AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
DNS Security: New Threats, Immediate Responses, Long Term Outlook. 2007 2008 Infoblox Inc. All Rights Reserved.
DNS Security: New Threats, Immediate Responses, Long Term Outlook 2007 2008 Infoblox Inc. All Rights Reserved. A Brief History of the Recent DNS Vulnerability Kaminsky briefs key stakeholders (CERT, ISC,
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution May 2011 7.3 Version 1 Copyright 2011 Alcatel-Lucent 1 Table of Contents 1. Document Purpose... 3 2. What s New in VitalQIP 7.3?...
Grid and Multi-Grid Management
Key Benefits High Availability, Massive Scalability Infoblox Provides always on network services through scalable, redundant, reliable and faulttolerant architecture Guarantees data integrity and availability
Internet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
HA OVERVIEW. FortiGate FortiOS v3.0 MR5. www.fortinet.com
HA OVERVIEW FortiGate FortiOS v3.0 MR5 www.fortinet.com FortiGate HA Overview FortiOS v3.0 MR5 1 October 2007 01-30005-0351-20071001 Copyright 2007 Fortinet, Inc. All rights reserved. No part of this publication
Whitepaper Continuous Availability Suite: Neverfail Solution Architecture
Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Blended Security Assessments
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents
ALTIRIS Deployment Solution 6.8 PXE Overview
ALTIRIS Deployment Solution 6.8 PXE Overview Notice Altiris AAA Document 2006 Altiris, Inc. All rights reserved. Document Date: October 3, 2006 Altiris, Inc. is a pioneer of IT lifecycle management software
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
IP Address Management: Smoothing the Way to Cloud-Based Services
White Paper IP Address Management: Smoothing the Way to Cloud-Based Services What You Will Learn Cloud computing offers many operational advantages to service providers. An important element of successful
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Networking and High Availability
yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.
Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers
Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers A white paper by Incognito Software March, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 8 Cost Savings
DHCP Failover: Requirements of a High-Performance System
DHCP Failover: Requirements of a High-Performance System A white paper by Incognito Software April, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 6 DHCP Failover: Requirements of a High-Performance
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Comparing SolarWinds IP Address Manager to Windows Server 2012 IP Address Management. By: Brien M. Posey. whitepaper
Comparing SolarWinds IP Address Manager to Windows Server 2012 IP Address Management By: Brien M. Posey When Microsoft released Windows Server 2012, one new feature introduced was IP Address Management
Load Balancing McAfee Web Gateway. Deployment Guide
Load Balancing McAfee Web Gateway Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
Cisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
Achieve Automated, End-to-End Firmware Management with Cisco UCS Manager
Achieve Automated, End-to-End Firmware Management with Cisco UCS Manager What You Will Learn This document describes the operational benefits and advantages of firmware provisioning with Cisco UCS Manager
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Best Practices For Architecting DNS and DHCP Networks. No IP. No Network. No Business.
Best Practices For Architecting DNS and DHCP Networks No IP. No Network. No Business. Use of this document Copyright This document and all information (in text, Graphical User Interface ( GUI ), video
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services
WHITE PAPER Infoblox IPAM Integration with Microsoft AD Sites and Local Services Infoblox IPAM Integration with Microsoft AD Sites and Local Services Today s enterprise infrastructure is dynamic, with
Proactively Managing Servers with Dell KACE and Open Manage Essentials
Proactively Managing Servers with Dell KACE and Open Manage Essentials A Dell Technical White Paper Dell KACE Dell Open Manage Essentials THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Optimize Application Delivery Across Your Globally Distributed Data Centers
BIG IP Global Traffic Manager DATASHEET What s Inside: 1 Key Benefits 2 Globally Available Applications 4 Simple Management 5 Secure Applications 6 Network Integration 6 Architecture 7 BIG-IP GTM Platforms
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Challenges in Deploying Public Clouds
WHITE PAPER Ensuring Enterprise-grade Network Services for AWS Infoblox DDI for AWS increases cloud agility, supports consistent network policies across hybrid deployments, and improves visibility of public
Avaya Virtualization Provisioning Service
Avaya Virtualization Provisioning Service Delivering visibility, validation, automation and reporting across applications, servers and network devices for the next-generation Virtualized Data Center The
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
OS Deployment and Migration
LANDesk Solution Brief: OS Deployment and Migration Solving real IT challenges. Solving real IT challenges. Simplify OS upgrades and user migrations The Challenge: Migrating users to new Windows operating
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Barracuda Load Balancer Online Demo Guide
Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,
Managing DNS Services for Greater Network Security and Availability
I D C V E N D O R S P O T L I G H T Managing DNS Services for Greater Network Security and Availability July 2008 Adapted from The Business Case for IP Address Management by Elisabeth Rainge, IDC #34276
Astaro Deployment Guide High Availability Options Clustering and Hot Standby
Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...
Configuring Oracle SDN Virtual Network Services on Netra Modular System ORACLE WHITE PAPER SEPTEMBER 2015
Configuring Oracle SDN Virtual Network Services on Netra Modular System ORACLE WHITE PAPER SEPTEMBER 2015 Introduction 1 Netra Modular System 2 Oracle SDN Virtual Network Services 3 Configuration Details
A dual redundant SIP service. White paper
A dual redundant SIP service White paper Ian Colville, Product Manager, Aculab Introduction The Session Initiation Protocol (SIP) eco-system: a unit of interdependent protocols functioning together within
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
Load Balancing Trend Micro InterScan Web Gateway
Load Balancing Trend Micro InterScan Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
Conquering the Challenges of IP Network Management with DHCP and DNS
Conquering the Challenges of IP Network Management with DHCP and DNS A white paper by Incognito Software 2006 Incognito Software Inc. All rights reserved. Page 1 of 9 Conquering the Challenges of IP Network
How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
DHCP Failover. Necessary for a secure and stable network. DHCP Failover White Paper Page 1
DHCP Failover Necessary for a secure and stable network DHCP Failover White Paper Page 1 Table of Contents 1. Introduction... 3 2. Basic DHCP Redundancy... 3 3. VitalQIP Failover Solution... 5 4. VitalQIP
Smoothwall Web Filter Deployment Guide
Smoothwall Web Filter Deployment Guide v1.0.7 Copyright 2013 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org Software Versions
Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide
Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways Deployment Guide rev. 1.4.9 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances
Panorama High Availability
Panorama High Availability Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054
A Dell Technical White Paper Dell Storage Engineering
Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
Load Balancing Bloxx Web Filter. Deployment Guide
Load Balancing Bloxx Web Filter Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Load Balancing Barracuda Web Filter. Deployment Guide
Load Balancing Barracuda Web Filter Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
