ExtremeXOS Automation

Size: px
Start display at page:

Download "ExtremeXOS Automation"

Transcription

1 ExtremeXOS Automation Abstract: This paper will introduce the Extreme Networks automation framework. Extreme Networks has developed several product components to enable businesses to gain a competitive advantage by using automation tools to help run, administer, and maintain their critical network infrastructure while reducing staff and operational expense Extreme Networks, Inc. All rights reserved. Do not reproduce.

2 The Need for Automation Automation can enhance network deployments in critical ways that improve business capability and keep the network running smoothly while allowing management much more visibility into the health and wellness of the network a critical business asset today. Businesses, whether they are service providers, enterprises or any other type of organization, depend on their networks more every day. Automation can increase network uptime by automatically responding to and provisioning around events that occur in the network; this in turn can effectively create a more proactive network that can sense and respond to events in a completely dynamic manner. In addition, administrators can be much more heavily leveraged because they can enact many more significant changes quickly and with fewer errors. The Yankee Group has reported that human error caused 31 percent of North American enterprise network outages. Automation allows administrators to lower the humanmachine interaction levels to reduce mistakes often made during device configuration for deployment, or when making changes to the running network. This in turn can dramatically reduce the operational expense involved in running a network; administrators can do much more with less, and can do the work with fewer errors with the help of the automation framework. In addition, many capabilities that exist in networking equipment are not easily configured or used because they require administrators intervention to enable or disable advanced features. Automation can enable these advanced features in a simple and automated way, increasing the overall capabilities and sophistication of networks. Some of these methods are shown in this paper, such as iscsi auto provisioning based on traffic appearing on a port. Businesses benefit greatly from being able to understand what is happening in their network quickly and clearly by being able to see the network s status. Just like a weather report, CIOs and their network teams can use automation to gather key statistics about their network and the devices that run that network. This in turn can reduce remediation time for network outages and alert staff to issues before they become critical in nature. This keeps networks running and allows administrators to sleep at night. The benefits of automation from a business perspective are very clear and make a strong case for looking at automation as a competitive advantage. Technical Benefits of Automation Increased Network Awareness Through the use of automation it is possible for network engineering staff to increase network awareness. A primary area of deficiency in modern networks is direct knowledge of what exists on the wire. Through the use of Extreme Networks CLEAR-Flow, Command Line Interface (CLI) and dynamic scripting, ExtremeXOS API and dynamically loadable modules, network staff can increase the level of understanding about the network. This increased understanding can assist operators in issue resolution, risk mitigation and network control. With increased awareness also comes increased capability. Automated Responses to Common Issues Extreme Networks unique automation tools allow automated responses to common network issues. A primary example of this can be seen through the advanced use of CLEAR-Flow. Access control lists count, identify and classify traffic in real-time (e.g. utilizing hardware ASICs). CLEAR-Flow, through the use of regression analysis algorithms, can examine patterns and traffic behaviors. When a condition state becomes true, CLEAR-Flow can take automated action to mitigate, alert or react to the identified state. One example is the broadcast storm. On most networks this condition can bring services to a crawl or in some cases a complete halt. CLEAR-Flow allows for the dynamic classification of broadcast traffic and, through the use of regression analysis, measures the level of broadcast traffic within a broadcast domain. When the configured level reaches a threshold set within the rule, CLEAR-Flow takes the specified action. Such an action might be to send a syslog message to a receiver. This action could easily be modified to automatically apply Quality of Service, block and/or mirror, or any action allowed on the ExtremeXOS CLI. Rapid Remediation to Network Abuse In the case of a network that uses Server Message Block file sharing, a series of well-known User Datagram Protocol ports are used. Most commonly these are ports 135, 139 and 445. Through the previously discussed technologies you can identify and sample traffic state in near real time. At any given moment very high levels of SMB packets should not be observed on a user port, as this could easily be an infected endpoint device. Through increased automation awareness the network operator can differentiate between uplink and user ports. When an abnormal level of traffic is observed, this state can be automatically remediated. With Dynamic Scripting (e.g. Universal Port Profiles) Dynamic Access Control lists can be applied, Quality of Service profiles can be added and the port itself, in drastic cases, can be shut down. The traffic state can be remediated and services, other than the out-of-policy protocol, can continue to function Extreme Networks, Inc. All rights reserved. ExtremeXOS Automation 2

3 Automatic Provisioning and Protecting Critical Protocols Extreme Networks has developed a simple yet powerful approach to data center network convergence without compromising protection or performance guarantees. The iscsi feature consists of a dynamic policy that automatically identifies iscsi traffic on the network. Once identified, the switches prioritize the traffic and ensure that it is protected from other non-iscsi traffic on the network. The implementation of dynamic iscsi provisioning on the network switches is accomplished in two steps. The first step is to implement the policy at a network level by installing a global policy file on each switch in the network, which then uses CLEAR-Flow to identify iscsi traffic. The second step is to dynamically apply a group of parameters in an automated fashion at the port level once iscsi traffic is detected.. Many networks today rely on QoS alone to resolve congestion issues and prioritize different traffic types on a per port basis. Extreme Networks augments the benefits of QoS with its CLEAR-Flow engine to process iscsi traffic identified on the network. CLEAR-Flow is a feature which allows Extreme Networks switches to make forwarding decisions based on traffic type. Instead of simply looking at the source and destination of the traffic and forwarding it along the appropriate Layer 2 or Layer 3 path, CLEAR-Flow takes things a step further. It allows network administrators to specify certain types of traffic that require more attention. In this case the switch identifies traffic on source and destination TCP ports Once certain criteria for this traffic are met (100 iscsi frames per second), the switch immediately performs the following three actions: 1. Leverages QoS to assign the iscsi traffic to a high priority queue 2. Enables jumbo frames on the identified ports 3. Submits a log entry indicating that iscsi traffic has been identified and protected Once the iscsi traffic has been identified and prioritized it is protected against other types of traffic on the network, including broadcast storms and other traffic flow types that might compromise the performance of iscsi. This is made possible by placing all lower priority traffic into lower priority queues where they can be prioritized effectively under congested network conditions. In extreme situations, lower priority packets may be completely discarded in favor of iscsi traffic. This CLEAR-Flow enabled policy is configured as an access control list on the switch, which in this case permits all traffic and places iscsi traffic into a higher priority queue. control list, allowing hands-off administration. This allows for iscsi targets and initiators to be moved anywhere throughout the network infrastructure without the need for any further administration of the switch. This simple yet effective CLEAR-Flow policy provides powerful dynamic prioritization and protection for iscsi traffic on the network; further, the policy can be deployed across any number of connected devices where the traffic will be identified on all ports, including edge, uplink, and core. This ensures that the traffic is protected and prioritized along the entire path that the packets take through the network. Components of Extreme Networks Automation There are three main components of the Extreme Networks automation framework: CLI scripting, ExtremeXOS API, and ExtremeXOS Loadable Modules. Each of these components is powerful in its own right. We explain the different components and how they can be used. ExtremeXOS CLI Scripting CLI-based scripting allows you to create a list of commands that you can execute manually with a single command or automatically when a special event occurs. CLI-based scripting supports variables and functions, so you can write scripts that operate unmodified on multiple switches and in different environments. CLI-based scripting allows you to significantly automate switch management. Static Scripting Static scripting can be defined as user interaction required. For a static script to run, the operator will need to run at least one command (e.g. load script <script name>). Static scripting can have a series of inputs at launch or during run time. The $READ function, which allows for scripting questions, gives a script the ability to take input at the CLI during runtime. This allows in-depth scripting with interactive questions to enhance functionality. Dynamic Scripting Dynamic scripting enables automatic switch configuration in response to special events such as: User login and logoff Device connection to or disconnection from a port Time of day Event Management System event messages If the iscsi traffic were to stop at any time, the switch s CLEAR-Flow engine dynamically identifies that the traffic has completed, and removes the associated dynamic access 2010 Extreme Networks, Inc. All rights reserved. ExtremeXOS Automation 3

4 User Login and Logoff Triggers User login and logoff is achieved through the ExtremeXOS Network Login feature. The two types of user authentication triggers are labeled user-authenticate and userunauthenticated in the software. Profiles that respond to these triggers are called user-authenticate profiles or user-unauthenticated profiles. Typically, a user-authenticate profile is used to configure a port for a user and device that has just connected. Likewise, a user-unauthenticated profile is used to return the port to a default configuration after a user or device disconnects. Successful Network Login triggers the user-authenticate profile, and either an explicit logout, a session time-out, or a disconnect triggers the user-unauthenticated profile x Network Login 802.1x Network Login requires 802.1x client software on the device to be authenticated. At login, the user supplies a user name and password, which the switch passes to the RADIUS server for authentication. When the user passes authentication, the RADIUS server notifies the switch, and the user-authenticate profile is triggered. One advantage of 802.1x Network Login is that it can uniquely identify a user. A disadvantage is that not all client devices support 802.1x authentication. MAC-Based Network Login MAC-based Network Login requires no additional software, and it does not require any interaction with the user. When Network Login detects a device with a MAC address that is configured on the switch, the switch passes the MAC address and an optional password to the RADIUS server for authentication. When the device passes authentication, the RADIUS server notifies the switch, and the userauthenticate profile is triggered. One advantage of MAC-based Network Login is that it requires no special software. A disadvantage is that security is based on the MAC address of the client, so the network is more vulnerable to spoofing attacks. Device Connect or Disconnect Triggers Device triggers launch a profile when a device connects to or disconnects from a port. The two types of device triggers are labeled device-detect and device-undetect in the Network Login software. Profiles that respond to these triggers are called device-detect profiles or device-undetect profiles. Typically, a device-detect profile is used to configure a port for the device that has just connected. Likewise, a deviceundetect profile is used to return the port to a default configuration after a device disconnects. A variety of different devices can be connected to a port. When devices connect to the network, Extreme Networks Universal Port helps provide the right configuration at the port. Device triggers respond to the discovery protocols IEEE 802.1ab LLDP and ANSI/TIA-1057 LLDP-MED for Voice-over-IP (VoIP) phone extensions. A device-detect trigger occurs when an LLDP packet reaches a port that is assigned to a device-detect profile. A device-undetect trigger occurs when periodically transmitted LLDP packets are not received anymore. LLDP age-out occurs when a device has disconnected or an age-out time has been reached. LLDP must be enabled on ports that are configured for device-detect or device-undetect profiles. The combination of device triggers and LLDP enables the custom configuration of devices that connect to switch ports. For example, VoIP phones can send and receive information in addition to normal device identification information. The information sent through LLDP can be used to identify the maximum power draw of the device. The switch can then set the maximum allocated power for that port. There can only be one device-detect profile and one device-undetect profile per port. To distinguish between different connecting devices, you can use if-then-else statements in a profile along with detailed information provided through LLDP. Time-of-Day Based Triggers Time triggers launch a profile at a specific time of day or after a specified period of time. For example, you can use time triggers to launch profiles at the following times: Every 30 seconds One time after 20 minutes Three-hour intervals Midnight You might use a time trigger to launch a profile to disable guest VLAN access, shut down a wireless service, or power down a port after business hours. Time triggers enable profiles to perform timed backups for configurations, policies, statistics, and so forth. Events that need to happen on a regular basis or at a specific time can be incorporated into a time-of-day profile. A profile that uses a time trigger is called a time-of-day profile. Time-of-day profiles are not limited to non-persistence-capable CLI commands and can use any command in the ExtremeXOS CLI. Unlike the device-detect and user-authenticate triggers, time triggers do not have an equivalent function to the deviceundetect or user-unauthenticated triggers. If you need the ability to unconfigure changes made in a time-of-day profile, just create another time-of-day profile to make those changes Extreme Networks, Inc. All rights reserved. ExtremeXOS Automation 4

5 Event Management System Event-Message-Based Triggers Event Management System (EMS)-event triggers launch a profile when EMS produces a message that conforms to a predefined definition that is configured on the switch. Profiles that respond to EMS-event triggers are called EMS-event profiles. Typically, an EMS-event profile is used to change the switch configuration in response to a switch or network event. The EMS events that trigger Universal Port profiles are defined in EMS filters and can be specified in more detail with additional CLI commands. You can create EMS filters that specify events as follows: Component.subcomponent Component.condition Component.subcomponent.condition You can use the show log components command to display all the components and subcomponents for which you can filter events. If you specify a filter to take action on a component or subcomponent, any event related to that component triggers the profile. You can use the show log events all command to display all the conditions or events for which you can filter events. If you decide that you want to configure a profile to take action on an ACL policy change, you can add a filter for the ACL.Policy.Change event. Unlike the device-detect and user-authenticate triggers, EMS event triggers do not have an equivalent function to the device-undetect or user-unauthenticated triggers. If you need the ability to unconfigure changes made in an EMSevent profile, just create another static or dynamic profile to make those changes. ExtremeXOS API Extreme Networks XML APIs enable reliable and secure external device-to-device management communication. The API interface provides a mechanism to communicate with Extreme Networks switches using XML messages. Its standards-based SOAP/XML architecture makes it easy to integrate the network infrastructure with higher-level application and business software. The configuration and monitoring capabilities provided by the APIs let you create Service Oriented Architecture (SOA) solutions that bridge the gap between application and business logic with network configuration and events. You can further define an event that triggers a Universal Port profile by specifying an event severity level and text that must be present in an event message. When a specified event occurs, event information is passed to the Universal Port profile in the form of variables, which can be used to modify the switch configuration. EMS-triggered profiles allow you to configure responses for any EMS event listed in the show log components and show log events all commands. However, you must be careful to select the correct event and corresponding response for each profile. For example, if you attempt to create a Universal Port log target for a specific event (component.subcomponent.condition) and you accidentally specify a component (component), the profile is applied to all events related to that component. Using EMS-triggered profiles is similar to switch programming. They provide more control and therefore more opportunity for misconfiguration Extreme Networks, Inc. All rights reserved. ExtremeXOS Automation 5

6 Client Machine ExtremeXOS Switch XML API Client SOAP Interface Telnet/SSH HTTP/HTTPS CLI Master Web Server SOAP Interface XML Server (XMLD) Switch Modules Figure 1 The XML server (XMLD) shown in Figure 1 above is responsible for providing a gateway between the external interface and the switch modules. It enforces security; wraps, unwraps and validates messages; and performs the mechanical translations of results from the modules to the client machine. The XML APIs use the SOAP protocol over telnet/ssh or HTTP/HTTPS to exchange XML configuration messages between the client machine and the ExtremeXOS switch modules. By describing the XML API in WSDL and the interface through SOAP, developers can leverage existing public WSDL tools. For example, Apache Axis, Perl SOAP::Lite modules or Microsoft C# can be used to generate code automatically to build management applications. WSDL documents describe the Web services used. A WSDL binding describes how the service is bound to a messaging protocol, particularly the SOAP messaging protocol. A WSDL SOAP binding can be either a Remote Procedure Call (RPC) style binding or a document-style binding. A SOAP binding can also have an encoded use or a literal use. These style/use models are RPC/encoded, RPC/literal, document/ encoded, and document/literal. There is one additional pattern called the document/literal wrapped pattern. WSDLs for ExtremeXOS XML APIs use the document/literal and the document/literal wrapped pattern models. ExtremeXOS Loadable Modules ExtremeXOS has been designed from the ground up as an extensible operating system. This architecture is arranged in a manner that allows for third-party modules (e.g. applications) to be securely run within a predefined user space. A loadable module consists of a series of functions or add-ons that extend the capability of ExtremeXOS. An example is the Extreme Networks loadable Secure Shell module. This function, as well as any other extensible Loadable Module (XLM or XMOD) can be added to ExtremeXOS without the need for a system reboot. The co-developed Avaya Converted Network Analyzer (CNA) module is another example of the power that lies within the XLM architecture. This module loads onto a switch no system reboot required and feeds jitter and latency information at the switch level to Avaya CNA collector systems. Extreme Networks is also currently in development, in conjunction with several universities and other educational institutions, on the Openflow XLM. This module will directly interface with ExtremeXOS to allow Openflow controllers access to management and routing decisions. Automation Use Case Examples In the following section we show some examples of automation s use in today s networks. The power of automation becomes much clearer as you see real-world examples of how to use this technology. Power Over Ethernet Administrative Control In this case we will examine changing the behavior of a switch to add administrative control and additional security layers. Through dynamic scripting, Extreme Networks, in partnership with the customer (deployed in production today) was able to automatically identify Power over Ethernet Servicing. This examination occurs dynamically when an Ethernet port becomes active or changes state to inactive Extreme Networks, Inc. All rights reserved. ExtremeXOS Automation 6

7 Through this series of functions the customer is able to deny access on specific ports to devices that do not ask for Power over Ethernet. As a device comes active on a link, the switch dynamically examines the Power over Ethernet state. If power is not being supplied, the port is administratively disabled and a message is sent to network operations staff. This configuration is primarily for administrative control but does add another layer of security to the network. Although no security solution is perfect, this is an example of how to build in security as well as increase network awareness. create upm profile port_disable set var cli.out show inline-power stat port $EVENT.LOG_PARAM_0 set var poe_state $TCL(split ${CLI.OUT}) This field is for your first uplink port set var uplink_1 1 This field is for your second uplink port set var uplink_2 3 set var poe_control $TCL(regexp -nocase {searching} $poe_state) if (($poe_control!= 0) && ($EVENT.LOG_PARAM_0!= $uplink_1) && ($EVENT.LOG_PARAM_0!= $uplink_2)) then create log entry non_poe_port_activity_detected_$event.log_param_0 disable port $EVENT.LOG_PARAM_0 endif. create upm profile port_recover set var cli.out show inline-power stat port $EVENT.LOG_PARAM_0 set var poe_state $TCL(split ${CLI.OUT}) This field is for your first uplink port set var uplink_1 1 This field is for your second uplink port set var uplink_2 3 set var poe_control $TCL(regexp -nocase {delivering} $poe_state) if (($poe_control!= 0) && ($EVENT.LOG_PARAM_0!= $uplink_1) && ($EVENT.LOG_PARAM_0!= $uplink_2) create log entry POE_PORT_Activity_DETECTED_Enabling_$EVENT.LOG_PARAM_0 enable port $EVENT.LOG_PARAM_0 endif. create log filter poe_control create log filter poe_recover configure log filter poe_control add event vlan.msgs.portlinkstateup configure log filter poe_recover add event POE.port_delivering create log target upm port_disable create log target upm port_recover enable log target upm port_disable enable log target upm port_recover configure log target upm port_disable filter poe_control configure log target upm port_recover filter poe_recover enable log target upm port_disable enable log target upm port_recover enable upm profile port_disable enable upm profile port_recover 2010 Extreme Networks, Inc. All rights reserved. ExtremeXOS Automation 7

8 Extreme Networks etoggle iphone Application Through the use of the Extreme Networks switch-based API, an iphone application was developed. This software serves as an example of how the API can be used to increase control and simplify actions taken for network configuration. etoggle, the Extreme Networks iphone application for conference rooms, allows you to easily enable and disable ports on your Extreme Networks Ethernet switches, making public conference rooms more secure. You can set a personal identification number (PIN) to prevent unauthorized access to the application. The etoggle (version 1.0) source code is freely available to use as a template for creating your own iphone apps to control and monitor Extreme Networks Ethernet switches. NOTE This application only works with Ethernet switches from Extreme Networks. ExtremeXOS CLEAR-Flow Based iscsi Provisioning In this example using CLEAR-Flow and ExtremeXOS dynamic scripting, an iscsi policy was created with powerful dynamic prioritization and protection for iscsi traffic. This policy can be deployed across any number of connected devices and iscsi traffic will be identified on all ports, including edge, uplink, and core. This ensures that iscsi traffic is protected and prioritized along the entire path the packets take through the network. The results of deploying this dynamic policy are dramatic. During testing in Extreme Networks labs, a 10 Gigabit Ethernet link was completely saturated with traffic from a traffic generator. This provided a 100% congested link. When iscsi traffic was started without the dynamic policy, throughput was severely impeded and performance was dramatically degraded on the iscsi target, achieving less than 1% of its potential IOPS. Once the dynamic policy was deployed on the devices connecting the congested link, the iscsi IOPS achieved performance levels as if there were no other traffic on the link. IXIA Traffic Generator iscsi Targets iscsi Initiator Figure 2 iscsi Targets Summit X650 10G Switch (A) Congested Link Summit X650 10G Switch (B) Extreme Networks, Inc. All rights reserved. ExtremeXOS Automation 8

9 ExtremeXOS Loadable Module (XLM or XMOD) You can add functionality to your switch by installing modular software packages. Modular software packages are contained in files named with the file extension.xmod, while the core images use the file extension.xos. Modular software packages are built at the same time as core images and are designed to work in concert with the core image, so the version number of a modular software package must match the version number of the core image that it will be running with. For example, the modular software package for Secure Shell: (SSH) named as follows: bd10k ssh.xmod Can run only with the core image named: bd10k xos You can install a modular software package on the active partition or on the inactive partition. You would install on the active partition if you want to add the package functionality to the currently running core image without having to reboot the switch. You would install on the inactive partition if you want to have the functionality available after a switch reboot. Conclusion In this paper we described the components of Extreme Networks automation framework, how those components can be used, and demonstrated some realworld examples of applying this framework to enable businesses to increase their competitive advantage with their network. Open Standards, References, and Resources Extreme Networks References and Links Self Paced Extreme Networks Scripting Basics Self Paced Extreme Networks Scripting Advanced Implementing InSite SDK in C# Extreme Networks Concepts Guide for ExtremeXOS version ExtremeXOSConceptsGuideSoftwareVersion12_4_rev1.zip External Links Note These links do not represent the opinions of Extreme Networks nor are they the property of Extreme Networks. Use at your own risk. W3C Schools online tutorials (e.g. XML, SOAP, CSS, SQL) The XML Standards body Microsoft Visual C# MSDN perl.org for PERL Sun Java Documents Corporate and North America Extreme Networks, Inc Monroe Street Santa Clara, CA USA Phone Europe, Middle East, Africa and South America Phone Asia Pacific Phone Japan Phone Extreme Networks, Inc. All rights reserved. Extreme Networks, the Extreme Networks Logo, etoggle, ExtremeXOS and Summit are either registered trademarks or trademarks of Extreme Networks, Inc. in the United States and/or other countries. Apple, the Apple logo and iphone are trademarks of Apple Inc. All other trademarks or service marks are the property of their respective owners. Specifications are subject to change without notice. 1696_01 07/10

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite from Extreme Networks is a scalable full-featured network management tool that simplifies configuration, troubleshooting and status monitoring

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.

More information

MS Series: VolP Deployment Guide

MS Series: VolP Deployment Guide Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using

More information

Extreme Physical Security

Extreme Physical Security Extreme Networks White Paper Extreme Physical Security Abstract Extreme Networks takes a holistic view of the Physical Security market, leveraging Ethernet technology and features with go-to-market sellers

More information

Ridgeline Network and Service Management Software

Ridgeline Network and Service Management Software Extreme Networks Data Sheet Ridgeline Network and Service Management Software Security Feature Pack 1 The IT and network organizations within enterprises are challenged more than ever to serve users with

More information

Simplifying Data Center Network Architecture: Collapsing the Tiers

Simplifying Data Center Network Architecture: Collapsing the Tiers Simplifying Data Center Network Architecture: Collapsing the Tiers Abstract: This paper outlines some of the impacts of the adoption of virtualization and blade switches and how Extreme Networks can address

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

SummitStack in the Data Center

SummitStack in the Data Center SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution that Extreme Networks offers a highly virtualized, centrally manageable

More information

Ridgeline Network and Service Management Software

Ridgeline Network and Service Management Software Extreme Networks Data Sheet Ridgeline Network and Service Management Software IT and network management are challenged more than ever to serve end users with a diverse set of applications and service requirements.

More information

Ridgeline Network and Service Management Software

Ridgeline Network and Service Management Software Extreme Networks Data Sheet Ridgeline Network and Service Management Software IT and network management are challenged more than ever to serve end users with a diverse set of applications and service requirements.

More information

SummitStack in the Data Center

SummitStack in the Data Center SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution Extreme Networks offers a highly virtualized, centrally manageable

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Ridgeline Network and Service Management Software

Ridgeline Network and Service Management Software DATA SHEET Ridgeline Network and Service Management Software Ridgeline is a scalable full-featured network and service management tool that simplifies provisioning, configuration, troubleshooting and status

More information

Using IEEE 802.1x to Enhance Network Security

Using IEEE 802.1x to Enhance Network Security Using IEEE 802.1x to Enhance Network Security Table of Contents Introduction...2 Terms and Technology...2 Understanding 802.1x...3 Introduction...3 802.1x Authentication Process...3 Before Authentication...3

More information

EX 3500 ETHERNET SWITCH

EX 3500 ETHERNET SWITCH PRODUCT SPEC SHEET EX 3500 ETHERNET SWITCH EX 3500 ETHERNET SWITCH EQUIPPED THE WIRED ETHERNET SWITCH FOR UNIFIED WIRED-WIRELESS NETWORKS GET ALL THE WIRED NETWORKING FEATURES YOU NEED, PLUS THE SIMPLICITY

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion... IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V

More information

AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes

AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes Please read this document before you begin to use the management software. Supported Platforms The following

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

The Purview Solution Integration With Splunk

The Purview Solution Integration With Splunk The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Introducing Cisco Voice and Unified Communications Administration Volume 1

Introducing Cisco Voice and Unified Communications Administration Volume 1 Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Datasheet. Managed PoE+ Gigabit Switches with SFP. Models: ES-24-250W, ES-24-500W, ES-48-500W, ES-48-750W

Datasheet. Managed PoE+ Gigabit Switches with SFP. Models: ES-24-250W, ES-24-500W, ES-48-500W, ES-48-750W Managed PoE+ Gigabit Switches with SFP Models: ES-24-250W, ES-24-500W, ES-48-500W, ES-48-750W Non-Blocking Throughput Switching Performance Gigabit Ethernet RJ45 and SFP+/SFP Ports Auto-Sensing IEEE 802.3af/at

More information

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: info@avendasys.com email: sales@avendasys.com Avenda

More information

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

Expert Reference Series of White Papers. VMware vsphere Distributed Switches Expert Reference Series of White Papers VMware vsphere Distributed Switches info@globalknowledge.net www.globalknowledge.net VMware vsphere Distributed Switches Rebecca Fitzhugh, VCAP-DCA, VCAP-DCD, VCAP-CIA,

More information

SDN CENTRALIZED NETWORK COMMAND AND CONTROL

SDN CENTRALIZED NETWORK COMMAND AND CONTROL SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016

More information

VCS Monitoring and Troubleshooting Using Brocade Network Advisor

VCS Monitoring and Troubleshooting Using Brocade Network Advisor VCS Monitoring and Troubleshooting Using Brocade Network Advisor Brocade Network Advisor is a unified network management platform to manage the entire Brocade network, including both SAN and IP products.

More information

WIND RIVER OPEN NETWORK SOFTWARE

WIND RIVER OPEN NETWORK SOFTWARE A Fundamental Building Block of Software Defined Networking The network infrastructure is the backbone of the emerging intelligent connected world. Over the next several years, the number of connected

More information

Network Access Control ProCurve and Microsoft NAP Integration

Network Access Control ProCurve and Microsoft NAP Integration HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft

More information

24 Port Gigabit Ethernet Web Smart Switch. Users Manual

24 Port Gigabit Ethernet Web Smart Switch. Users Manual 24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

TP-LINK. 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG3424P. www.tp-link.com

TP-LINK. 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG3424P. www.tp-link.com TP-LINK TM 24-Port Gigabit L2 Managed PoE Switch with 4 Combo SFP Slots Overview The provides 24 10/100/1000Mbps ports that supports 802.3at/af-compliant PoE, with a total PoE power supply up to 320W,

More information

TP-LINK. 24-Port Gigabit L2 Managed Switch with 4 SFP Slots. Overview. Datasheet TL-SG5428. www.tp-link.com

TP-LINK. 24-Port Gigabit L2 Managed Switch with 4 SFP Slots. Overview. Datasheet TL-SG5428. www.tp-link.com TP-LINK TM 24-Port Gigabit L2 Managed Switch with 4 SFP Slots Overview Designed for workgroups and departments, from TP-LINK provides full set of layer 2 management features. It delivers maximum throughput

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

SNMP Monitoring: One Critical Component to Network Management

SNMP Monitoring: One Critical Component to Network Management Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

Avaya Virtualization Provisioning Service

Avaya Virtualization Provisioning Service Avaya Virtualization Provisioning Service Delivering visibility, validation, automation and reporting across applications, servers and network devices for the next-generation Virtualized Data Center The

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

TP-LINK 24-Port Gigabit L2 Managed Switch with 4 SFP Slots

TP-LINK 24-Port Gigabit L2 Managed Switch with 4 SFP Slots NEW TP-LINK 24-Port Gigabit L2 Managed Switch with 4 SFP Slots TM NEW Overview Designed for workgroups and departments, from TP-LINK provides full set of layer 2 management features. It delivers maximum

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL3428. www.tp-link.com

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL3428. www.tp-link.com TP-LINK TM 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch Overview TP-LINK JetStream TM gigabit L2 managed switch provides 24 10/100Mbps ports. The switch provides high performance, enterprise-level

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

Troubleshooting an Enterprise Network

Troubleshooting an Enterprise Network Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco

More information

16-PORT POWER OVER ETHERNET WEB SMART SWITCH

16-PORT POWER OVER ETHERNET WEB SMART SWITCH 16-PORT POWER OVER ETHERNET WEB SMART SWITCH User s Manual (DN-95312) - 0 - Content Web Smart Switch Configure login ---------------------------------- 2 Administrator Authentication Configuration ---------------------------------------------

More information

Evolving Network Security with the Alcatel-Lucent Access Guardian

Evolving Network Security with the Alcatel-Lucent Access Guardian T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

The Basics. Configuring Campus Switches to Support Voice

The Basics. Configuring Campus Switches to Support Voice Configuring Campus Switches to Support Voice BCMSN Module 7 1 The Basics VoIP is a technology that digitizes sound, divides that sound into packets, and transmits those packets over an IP network. VoIP

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Fiber Channel Over Ethernet (FCoE)

Fiber Channel Over Ethernet (FCoE) Fiber Channel Over Ethernet (FCoE) Using Intel Ethernet Switch Family White Paper November, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Extreme Networks Summit X450e-24p Switch with Avaya Communication Manager and Avaya IP Telephones in a Converged VoIP and Data Network -

More information

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Technical Note. ForeScout CounterACT: Virtual Firewall

Technical Note. ForeScout CounterACT: Virtual Firewall ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...

More information

VoIP Reliability in Managed Service Deployments

VoIP Reliability in Managed Service Deployments 1 VoIP Reliability in Managed Service Deployments Technical White Paper Introduction This White Paper introduces the Aspen 365 family of network appliances and explains how service providers offering a

More information

Turn Your Cloud Exchange Network Into a Network-as-a-Service

Turn Your Cloud Exchange Network Into a Network-as-a-Service Turn Your Cloud Exchange Network Into a Network-as-a-Service Use software-defined networking to make your Wide Area Network into a Revenue Generating Asset Table of Contents Introduction.....................................

More information

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection White Paper Deploying EUM SurfControl Web Filter for MS Windows rev. 1.1, January 2005 Enterprise Threat Protection ..... ACKNOWLEDGEMENTS SurfControl wishes to acknowledge the following people for their

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

ALLNET ALL-SG8926PM Layer 2 FULL Management 24 Port Giga PoE Current Sharing Switch IEEE802.3at/af

ALLNET ALL-SG8926PM Layer 2 FULL Management 24 Port Giga PoE Current Sharing Switch IEEE802.3at/af ALLNET ALL-SG8926PM Layer 2 FULL Management 24 Port Giga PoE Current Sharing Switch IEEE802.3at/af 24-Port Giga PoE Current Sharing 500W PoE Budget IPv6 and IPv4 Dual Protocol SNMP v1/v2c/v3 SSH version

More information

TP-LINK L2 Managed Switch

TP-LINK L2 Managed Switch NEW TP-LINK L2 Managed Switch TM NEW TL-SL3428/TL-SL3452 Overview TP-LINK JetStream TM L2 managed switch TL-SL3428/TL-SL3452 provides 24/48 10/100Mbps ports, the switch provide high performance, enterprise-level

More information

Avaya G700 Media Gateway Security - Issue 1.0

Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise

More information

Guidelines Introduction

Guidelines Introduction Network Design Guidelines Introduction Extreme Networks Ethernet Layer 3 switches give you the flexibility to solve many problems that plague a wide range of network environments. From enterprise desktops,

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction

640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction 640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction Course Introduction Module 01 - Overview of Cisco Unified Communications Solutions Understanding

More information

20 GE PoE-Plus + 4 GE PoE-Plus Combo SFP + 2 GE SFP L2 Managed Switch, 370W

20 GE PoE-Plus + 4 GE PoE-Plus Combo SFP + 2 GE SFP L2 Managed Switch, 370W GEP-2672 Version: 1 20 GE PoE-Plus + 4 GE PoE-Plus Combo SFP + 2 GE SFP L2 Managed Switch, 370W The LevelOne GEP-2672 is a Layer 2 Managed switch with 24 x 1000Base-T PoE-Plus ports associated with 4 x

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security

More information

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch GTL-2691 Version: 1 Modules are to be ordered separately. 20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch The LevelOne GEL-2691 is a Layer 3 Managed switch with 24 x 1000Base-T ports associated

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL5428E. www.tp-link.com

TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL5428E. www.tp-link.com TP-LINK 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch Overview TP-LINK JetStream L2 managed switch provides high performance, enterprise-level QoS, advanced security strategies and rich layer 2

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,

More information

User-ID Best Practices

User-ID Best Practices User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers

More information

High Availability Solutions & Technology for NetScreen s Security Systems

High Availability Solutions & Technology for NetScreen s Security Systems High Availability Solutions & Technology for NetScreen s Security Systems Features and Benefits A White Paper By NetScreen Technologies Inc. http://www.netscreen.com INTRODUCTION...3 RESILIENCE...3 SCALABLE

More information

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

Whitepaper. Securing Visitor Access through Network Access Control Technology

Whitepaper. Securing Visitor Access through Network Access Control Technology Securing Visitor Access through Contents Introduction 3 The ForeScout Solution for Securing Visitor Access 4 Implementing Security Policies for Visitor Access 4 Providing Secure Visitor Access How it works.

More information

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK INTRODUCTION Managing and designing an enterprise network is becoming more complex. Delivering real-time applications is a top priority

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

ProCurve Manager Plus 2.2

ProCurve Manager Plus 2.2 NEW ProCurve Manager Plus 2.2 ProCurve Manager Plus 2.2 is a secure, advanced Windows -based network management platform that allows administrators to configure, update, monitor, and troubleshoot ProCurve

More information