JUNIPER NETWORKS FIREFLY HOST FIREWALL PERFORMANCE

Size: px
Start display at page:

Download "JUNIPER NETWORKS FIREFLY HOST FIREWALL PERFORMANCE"

Transcription

1 White Paper JUNIPER NETWORKS FIREFLY HOST FIREWALL PERFORMANCE Copyright 2013, Juniper Networks, Inc. 1

2 Table of Contents Executive Summary...3 Performance Challenges in a Virtual Environment...3 Firefly Host Architecture (Fast, Distributed Connection Table, and Rule Base)... 4 High-Level Architecture... 4 Firefly Host Fast Implementation vs. Other Virtualization Options... 4 Firefly Host Connection Tables... 6 Firefly Host Rule Base Design...7 Basic Open Source Performance Validation...10 Testing Overview...10 Results...11 Conclusion...11 About Juniper Networks...12 List of Figures Figure 1: VMware hybrid model (i.e., firewall processing in Security VM)... 5 Figure 2: Firefly Host and Fast (i.e., firewall processing in hypervisor kernel)... 5 Figure 3: Shared connection table in traditional or products... 6 Figure 4: Firefly Host separate connection tables and firewall engines...7 Figure 5: Monolithic rule set... 8 Figure 6: Firefly Host separate rule bases for each protected VM... 9 Figure 7: Baseline, Firefly Host, and competition in TCP throughput test Copyright 2013, Juniper Networks, Inc.

3 Executive Summary Virtualization adoption is on the rise for a variety of compelling reasons, number one of which is cost. Virtualization optimizes physical server hardware use, reduces power consumption, and lowers hardware maintenance expenditures for tremendous cost savings. For any CIO, it s a no-brainer to want to avoid a situation where hundreds or even thousands of servers are operating at a mere fraction of their computational capabilities. The second compelling reason is management elasticity. IT administrators who work on a daily basis with data center technologies (servers, switches, and so on) see the more subtle advantages of virtualization adoption. Namely, they understand the benefits of being able to easily manage and expand their systems infrastructure. For example, with virtualization technology, they can use live migration to move virtual machines (VMs) from one physical server to another in order to perform hardware maintenance without system downtime. They can also quickly spin up new VMs for departments via templates and clones rather than waiting weeks for new hardware to arrive. In essence, this flexibility means business can move at a more rapid pace. So if the cost, flexibility, and business drivers are clear, what might threaten the adoption of virtualization? Two elements come to mind performance and security. Nobody wants to virtualize servers if it means application performance will be drastically (or perhaps even mildly) diminished. To be in a situation where many VMs are sharing hardware is OK, provided all of the important applications get their necessary share of that hardware. Next, just because companies make a decision to virtualize servers doesn t mean that they want to eliminate or complicate the security of those servers. The imperative is to ensure that performance and security are maintained during virtualization adoption, and the ideal is to improve both through that process. Enter Juniper Networks Firefly Host*, a comprehensive virtualization security solution for virtualized data centers and clouds. Firefly Host was designed and built specifically for the virtual environment, and it enables organizations to implement security on their systems in more flexible and automated ways all while avoiding any costly reduction in performance. This paper will explain those fundamental principles and outline tests that validate the claims. Performance Challenges in a Virtual Environment Many of the security industry s first firewalls began by running as an application on Unix, Linux, or even Windows servers. This, however, required steps to harden server operating systems and then deploy the firewall application. Eventually, the industry shifted to an appliance model in which the firewall and hardened operating system were combined and pre-installed onto specialized hardware. Not only did this shift make deployment easier, it also allowed for the inclusion of ASICs and other performance-enhancing elements. Along with the shift in platform, the firewall itself started to morph into a combination of inspection and protection technologies, including things like antivirus, intrusion detection service (IDS), application identification, URL filtering, data leak protection, to name a few. Performance testing of these dedicated security devices became more difficult given the different types of features, but companies could still fairly easily examine basic firewall performance statistics (throughput, connection setup rate, etc.) by transmitting load on one interface of the device and reading the receive rate on the other end. These tests are easily repeatable and will vary little in setup and outcome. Performance testing of security in the virtual environment becomes much more complicated. Now we are back to a model in which the security application is running on generic servers instead of dedicated hardware appliances. This means that vast differences in potential performance numbers (one customer runs high-end Dell systems and another runs entry-level IBM with a totally different class of capabilities) can exist/occur. We also introduce the hypervisor itself, which will dynamically allocate resources in somewhat unpredictable ways. Also, companies can load very different amounts and types of VMs on these platforms (some may run 10 VMs per host with lightly used virtual network interfaces while others may push 50 or more, all with network-intensive applications). Combine all of these factors with the fact that there are drastically different approaches to securing the environment (e.g., implement an agent in the guest VMs, implement the security in a VM, implement the security partially in the kernel or completely in the kernel) and you have a very confusing set of parameters to sort through in order to understand performance implications in each environment. To help understand the issues, we will next examine the performance architecture implemented in the Firefly Host. *Formerly vgw Virtual Gateway Copyright 2013, Juniper Networks, Inc. 3

4 Firefly Host Architecture (Fast, Distributed Connection Table, and Rule Base) High-Level Architecture Early adopters of virtualization technology had two very basic choices to secure their new VMs: First, they could implement a guest agent firewall in each and every VM. Sometimes there will be an agent install available for the operating system, and sometimes reliance on iptables or similar technology is needed. The management and overhead of all these agents can be a real issue, even if an organization decides to live with present security concerns such as mixing the protection layer directly into the device that s in need of protection. From a security perspective, it is better to avoid full package agents to decrease the likelihood of compromise from the VM itself, as malware, rootkits, viruses, etc., often hide from or damage the security agent. Secondly, customers could use VLANs to funnel the traffic out of the virtual environment through traditional security devices and back into the virtual environment. However, this is inefficient and often lacks the granular control and dynamism needed to implement, for example, security on moving VMs, or VMs getting created on the fly via cloning. To improve upon these basic choices, security vendors have taken one of two approaches. In the first approach, they have opted to simply package their application as a virtual machine and do nothing custom. This model was easy for vendors and shifted the burden to the customer to figure out how to route guest VM traffic through this security application VM in order to protect the guests. This approach quickly fell by the wayside, as not only did it fail to reduce the management effort and security attachment to VMs, it actually created performance chokepoints in the architecture. The next approach was to build something specifically for this environment by utilizing hypervisor APIs to attach, retrieve, and analyze network packets. The Firefly Host is an example of this second approach. In fact, because it was built from scratch for the virtual environment, no trade-offs were necessary in its architecture (an existing product wasn t being force fit into the hypervisor). There are numerous benefits to be gained by creating a solution specifically for the virtual environment, but for the purposes of this paper, we will focus on the key Firefly Host design elements related to performance: VMware Fast APIs were used to create an entire enforcement and packet processing firewall in the kernel of the hypervisor. connection tables were allocated in isolation among virtual firewall instances. Patent-pending firewall rule base design allows distribution of workload to virtual firewall instances and reduces the number of rules processed for VMs. Firefly Host Fast Implementation vs. Other Virtualization Options Using hypervisor APIs to analyze packets is not as straightforward as it might appear. There are two fundamental methods use these APIs (known in VMware as VMsafe Networking APIs) to process all packets in the kernel, or use these APIs to shift packets to a VM in order to do all or even part of the processing. The initial VMware documentation of these approaches and APIs were literally called Fast and, and both of them are displayed in the following diagrams. 4 Copyright 2013, Juniper Networks, Inc.

5 Security VM Engine VM1 VM2 Rules vswitch Hypervisor Server 1 Figure 1: VMware hybrid model (i.e., firewall processing in Security VM) Security VM VM1 VM2 Policy Mgmt. and Logs Engine VM1 Rules VM2 Rules vswitch Hypervisor Server 1 Figure 2: Firefly Host and Fast (i.e., firewall processing in hypervisor kernel) Copyright 2013, Juniper Networks, Inc. 5

6 Using the Fast approach provides the best possible performance because packets don t have to be folded into a Security VM for processing. You don t incur a performance penalty in the transfer of the packets into the Security VM nor do you risk the VM becoming CPU bound and, thus, a bottleneck. However, this approach means that you must build a firewall engine completely in the hypervisor, which is a difficult engineering task. What s more, many companies have preexisting security solutions that they don t want (or can t) redesign to work in the hypervisor. Thus, most companies have avoided complete Fast integrations. The result, however, is a substantial performance penalty, as well as the introduction of failure points in your architecture for traffic processing, because all of the connections are funneling through a VM. It is easy to determine which implementation has been done with a deployed product by simply pausing the Security VM. If the Security VM is processing VM communication flows (VM-to-VM or VM-to-physical), then those flows will stop. If the Security VM is just a conduit between the management system and the firewall engine in the kernel (as is the case with Firefly Host) then the communication flows for VMs will not be impacted with the loss of the Security VM. Thus, there is a crucial distinction customers must make between Security VMs provided by various vendors is it processing firewall flows ( ) or just serving as a conduit to the kernel engine for policy deployment (Fast )? Firefly Host Connection Tables Not only was it important for Juniper to build the Firefly Host into the hypervisor using Fast mode to avoid forwarding packets up to a VM for processing, it was important so that the firewall connection table could be distributed. In a standard firewall product (either physical firewall appliance or traditional software firewall), there is a single connection table that holds information about all the communication between systems (sessions). This connection table is, in part, used as a mechanism to accelerate the processing of sessions. Instead of doing intensive analysis of every single packet, you can do it at the start of a session and then put an entry for that session into your table. Subsequent packets (belonging to that already validated session) are then bypassed by checking the connection table. The problem with this single table is it can get very large. In most cases, the larger it gets, the more expensive it becomes to access it for firewall processing. In addition, traditional products share the connection table, which means a handful of systems with high session rates can impact the firewall performance for all systems being protected. Security VM VM1 VM2 Connection Table vswitch Hypervisor Server 1 Server 2 Server 3 Figure 3: Shared connection table in traditional or products 6 Copyright 2013, Juniper Networks, Inc.

7 With Firefly Host, each time a VM is protected, there is a unique firewall engine and separate connection table instantiated in the hypervisor for that VM. Juniper loads different firewall engines on the VMs so that their processing is isolated from other VMs, and so that these packaged entities (security policy and connection table) can be tied to the VM and moved with VMware VMotion. In effect, although there is a single Firefly Host kernel module loaded on the host, it is logically used to load separate firewall instances for each protected VM. Each protected VM is currently allocated ~2 MB of memory via the Firefly Host kernel module protecting it. The allocated memory will grow if (or when) the protected VM session rate grows. The maximum memory allocation is currently 75 MB. With this model, each protected VM is getting a connection table big enough for 256,000 connections. This is an enormous amount of room for a single VM (many physical firewalls have smaller tables for all systems they are protecting). This large and separate connection table model means that instead of having one VM fill the connection table of a firewall and impact all the other VMs, it will impact only its own processing. Other protected VMs will be unaffected by that connection table growth. Security VM VM1 VM2 Policy Mgmt. and Logs Connection Table Connection Table vswitch Hypervisor Server 1 Server 2 Server 3 Figure 4: Firefly Host separate connection tables and firewall engines From a performance perspective, connection table size is clearly not a limiting factor for Firefly Host. The size is 256,000 multiplied by the number of protected VMs on a host and is isolated from misuse by rogue or session intensive VMs. The isolation of the connection table is key to high-performance firewall processing. Firefly Host Rule Base Design For performance reasons, Juniper built separate firewall engines and connection tables for each protected VM in the hypervisor. This was achieved via the Firefly Host kernel module. In addition, there was a goal to create an extremely flexible rule base structure (security rule bases are being layered onto complicated network communication flows in the middle of a data center) and a goal to separate the relevant rules for each VM. This was necessary because, similar to the connection table lookup process, there is a computational price to traverse the rule base to find rules that should be applied to a given VM. Rules are typically processed in a top down fashion so, if you have a large number of rules in a single firewall, it will take progressively longer for the firewall engine to find and apply the correct rule to a connection. However, if you create different firewall engines, you can apply unique rule bases to each engine and avoid having to expend energy trying to optimize a single monolithic rule base (e.g., pushing frequently used rules to the top and/or limiting the number of rules that are added). With separate firewall rule sets, one or more VMs with extensively long or complicated rules won t impact the processing of a different VM, which may have a very simple rule set. Copyright 2013, Juniper Networks, Inc. 7

8 Separate Connection Tables and Engines + Rule Base Security VM VM1 VM2 Monolithic Rule Base Rule 1 VM1 Related Connection Table Rule 2 VM1 Related Rule 3 VM1 Related Rule 4 VM1 Related Rule... VMX Related Rule 120 VM2 Related Rule 123 VM1 Related Hypervisor vswitch Server 1 Server 2 Server 3 Figure 5: Monolithic rule set The monolithic rule base is in contrast to Firefly Host with which different rule bases (global, group, individual VM) can be created, combined, and applied to specific VMs from the management interface. 8 Copyright 2013, Juniper Networks, Inc.

9 Separate Connection Tables and Engines + Rule Base Security VM VM1 VM2 Rule Base for VM1 Rule 1 VM1 Related Policy Mgmt. and Logs Rule 2 VM1 Related Rule 3 VM1 Related Rule 4 VM1 Related Rule 5 VM1 Related Engine + Rule Base Engine + Rule Base Rule Base for VM2 Rule 1 VM2 Related vswitch Hypervisor Server 1 Server 2 Server 3 Figure 6: Firefly Host separate rule bases for each protected VM In the Firefly Host rule base design, the logical rule set for each VM (and the connection table) can easily be moved when a VM VMotions. There is no limitation imposed on VMotion because no synchronization issues exist. This is different than other solutions that rely on traditional firewall state synchronization mechanisms, where all new or changed states are synchronized to all firewall cluster members. These work fine when the cluster is relatively small (e.g., less than 10 members). However, this mechanism is far too slow when there are dozens or even hundreds of cluster members. This cluster size is exactly what starts to happen in large VMware deployments, where customers have extremely large ESX/ESXi host deployments and each will have firewalls that need to be synchronized. Firefly Host compartmentalizes the entire rule base and connection table for each VM, and can simply move that information with the VM when the VM moves. In addition, the Firefly Host per-vm rule base and connection table design provides much greater flexibility when a new policy is installed. Unlike a regular firewall and installation action, it only impacts the VM(s) you are changing. Aside from the performance and VMotion-related benefits, the separate rule base is also important from a security perspective. The separate rule base can be applied to specific VMs. The process for determining a specific VM is done by using the unique Virtual Machine Identifer (VMID). Once Firefly Host learns the VMID via an integration with VMware vcenter, it can apply the exact policy intended for that VM and only that VM. This helps avoid situations where a generic monolithic rule base has rules catching on VMs that it shouldn t (e.g., because of cloning or IP spoofing). Combining VMID with per-vm rule base allows Firefly Host to easily support environments with overlapping IPs. The next portion of this white paper describes performance tests and related results from the architecture described above. The intent of the testing was to stress the architecture in an easily repeatable manner. In addition, it was important to shape the tests to address concerns that companies typically have in production deployments. Copyright 2013, Juniper Networks, Inc. 9

10 Basic Open Source Performance Validation The VMware vsphere 4.1 platform introduces many new performance advantages (asynchronous transmits, large receive offloads, etc.). VMware has conducted performance testing to demonstrate that its virtualization platform is capable of scaling to meet the needs of network intensive application VMs and highly compressed ratios of network active VMs. 1 To demonstrate the platform s capabilities, the VMware report used netperf, which is an open source client/server tool. 2 Similar to netperf, there is also an open source client/server tool called nuttcp. 3 Generally, nuttcp is more up-todate and active than netperf. Either one of these tools can be effective in baselining a setup for basic network operations. Juniper conducted three simple tests with nuttcp. These were in line with VMware s report with the exception of adding the security (VMware didn t test vshield in its report). Using an open source tool allows companies to reproduce the basic performance tests in their labs without requiring high-end testing tools. Testing Overview The following technologies were used to conduct the testing: ESXi Server Load Generation System VMs Under Load Make HP ProLiance DL180 G6 HP ProLiant DL180 G6 VMware vsphere 4.1 VM CPU 2x Intel Xeon E Ghz, 4 cores/socket (16 cores total with hyper threading) 2x Intel Xeon E Ghz, 4 cores/socket (16 cores total with hyperthreading) One vcpu RAM 48 GB 48 GB 3 GB NICs 2X Intel Port 10 Gbps 2x Intel Port 10 Gbps VMXNET3 OS vsphere ESXi Bit Ubuntu Bit Ubuntu Load Generation Not Applicable Nuttcp Server Nuttcp Server Firefly Host Series Used Firefly Host Series 4.5 FCS Important notes about the testing configuration: The ESXi host was configured with four virtual switches one was a management network, while the other three were mapped to three subnets ( , 11, 12/24) and cross-connected directly to three interfaces on the load generation system. A separate physical load generation system (or systems) is recommended to make sure that this component doesn t become a bottleneck, and also to ensure a proper time source for network transfer calculations (as opposed to VMbased calculations, which can drift and skew results). It is important that the VMs under load are using VMXNET3. Otherwise, performance numbers can suffer greatly. 4 No special performance modifications to vsphere or the Firefly Host were performed (the default installation was used in both cases). A set of scripts was developed to start nuttcp on varied numbers of VMs, then to parse and calculate the results. Those scripts are available upon request from your Juniper representative. The scripts simply start nuttcp on a TCP port and push standard 1,500 byte packets at maximum rate over this connection using basic nuttcp commands. 1 VMware vsphere4.1 Networking Performance VMware Inc Performance Evaluation of vmxnet3 Virtual Network Device VMware Inc Copyright 2013, Juniper Networks, Inc.

11 Results Three different types of tests were performed to show the impact of securing a host with Fast or architectures: 1. The baseline was without security. 2. The Firefly Host solution test was performed after loading the Firefly Host kernel module and protecting the relevant VMs with an open security policy. This means that the packet traversed the entire firewall engine and was then accepted. logging was turned on during the testing, and relevant log entries were analyzed as correct during each protected run. 3. The competitor 1 solution implemented a VMware architecture and the competitor 2 solution implemented a hybrid slow/fast path VMware architecture, and, as with Firefly Host testing, both an open policy and logging were enabled. Virtualization Performance Comparison Unsercured Firefly Host Competitor Competitor 2 Gbps VMs 12 VMs 16 VMs 20 VMs 24 VMs 28 VMs 32 VMs Number of VMs Figure 7: Baseline, Firefly Host, and competition in TCP throughput test Further analysis of this data shows that the Firefly Host, on average, had only a 6% impact on the baseline during extreme levels of system stress (lower percentages of approximately 2-3% are seen at more normal data rates). Though all security processing comes at some performance cost, these tests show that the Firefly Host has minimal negative impact. This is especially evident when compared to competitive solutions that haven t completely implemented their firewall enforcement engine inside the hypervisor kernel and, thus, severely impact the network traffic flow of VMs. Conclusion Virtualization is here to stay because it offers such compelling benefits in terms of cost savings, management flexibility, and business agility to name just a few. And today as organizations drive toward the adoption of further virtualization, there is no longer any need for them to let performance, or security concerns, hinder that advance. The Juniper Networks Firefly Host, which was purpose-built for the virtual environment, provides organizations with the necessary protections without performance trade-offs. This is thanks to its use of VMware Fast APIs that create an entire enforcement and packet processing firewall in the hypervisor kernel, separate connection tables for enhanced firewall processing, and patent-pending firewall rule base design that allows distribution of workload to virtual firewall instances and reduces the number of rules processed for VMs. With Firefly Host, organizations can augment their investment in virtualization and boost their potential for achieving maximum cost savings and optimizing management elasticity. Copyright 2013, Juniper Networks, Inc. 11

12 About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at Corporate and Sales Headquarters Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC and EMEA Headquarters Juniper Networks International B.V. Boeing Avenue PZ Schiphol-Rijk Amsterdam, The Netherlands Phone: Fax: To purchase Juniper Networks solutions, please contact your Juniper Networks representative at or authorized reseller. Copyright 2013 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN Nov 2013 Printed on recycled paper 12 Copyright 2013, Juniper Networks, Inc.

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc. White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS White Paper ALTERNATIVES FOR SECURING VIRTUAL NETWORKS A Different Network Requires a Different Approach Extending Security to the Virtual World Copyright 2013, Juniper Networks, Inc. 1 Table of Contents

More information

JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE

JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE White Paper JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Typical Antivirus Use Cases...3 Use Case

More information

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc. White Paper Five Best Practices to Protect Your Virtual Environment Realizing the Benefits of Virtualization Without Sacrificing Security Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive

More information

AN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD

AN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD White Paper AN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD Protecting Physical and Virtual Workloads Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

Product Description. Product Overview

Product Description. Product Overview DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their

More information

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance

More information

Junos Space Virtual Control

Junos Space Virtual Control Proiduct Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these virtual network elements in conjunction

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

Networks that know data center virtualization

Networks that know data center virtualization Networks that know data center virtualization EBOOK VITRUALIZATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface In both legacy IT data centers and emerging private and public

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100

TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100 White Paper TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100 Juniper Innovation Brings ISSU to Data Center Top-of-Rack Switches Copyright 2014, Juniper Networks, Inc. 1 Table of Contents

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

Networks that virtualization

Networks that virtualization Networks that know virtualization EBOOK VITRUALIZATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface In both legacy IT data centers and emerging private and public clouds,

More information

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS DATASHEET JUNIPER CARE PLUS ADVANCED SERVICES CREDITS Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments

More information

vsrx Services Gateway: Protecting the Hybrid Data Center

vsrx Services Gateway: Protecting the Hybrid Data Center Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud

More information

Where IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine

Where IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine Where IT perceptions are reality Test Report OCe14000 Performance Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine Document # TEST2014001 v9, October 2014 Copyright 2014 IT Brand

More information

5 Best Practices to Protect Your Virtual Environment

5 Best Practices to Protect Your Virtual Environment CONTENTS OF THIS WHITE PAPER Security Virtualization s Big Hurdle..1 Why Old-STyle Protections Fall short..2 Best Practices...3 Create A VM Service Good List... 3 Monitor and Protect the Hypervisor...

More information

VMware vsphere-6.0 Administration Training

VMware vsphere-6.0 Administration Training VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Performance Testing of a Cloud Service

Performance Testing of a Cloud Service Performance Testing of a Cloud Service Trilesh Bhurtun, Junior Consultant, Capacitas Ltd Capacitas 2012 1 Introduction Objectives Environment Tests and Results Issues Summary Agenda Capacitas 2012 2 1

More information

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...

More information

Adopting Software-Defined Networking in the Enterprise

Adopting Software-Defined Networking in the Enterprise IT@Intel White Paper Intel IT Data Center Efficiency Software-Defined Networking April 2014 Adopting Software-Defined Networking in the Enterprise Executive Overview By virtualizing the network through

More information

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based

More information

VXLAN Performance Evaluation on VMware vsphere 5.1

VXLAN Performance Evaluation on VMware vsphere 5.1 VXLAN Performance Evaluation on VMware vsphere 5.1 Performance Study TECHNICAL WHITEPAPER Table of Contents Introduction... 3 VXLAN Performance Considerations... 3 Test Configuration... 4 Results... 5

More information

JUNOS PULSE APPCONNECT

JUNOS PULSE APPCONNECT White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of

More information

Protecting Physical and Virtual Workloads

Protecting Physical and Virtual Workloads WHITE PAPER An Integrated Security Solution for the Virtual Data Center and Cloud Protecting Physical and Virtual Workloads Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,

More information

Leveraging NIC Technology to Improve Network Performance in VMware vsphere

Leveraging NIC Technology to Improve Network Performance in VMware vsphere Leveraging NIC Technology to Improve Network Performance in VMware vsphere Performance Study TECHNICAL WHITE PAPER Table of Contents Introduction... 3 Hardware Description... 3 List of Features... 4 NetQueue...

More information

JUNIPER NETWORKS CLOUD SECURITY

JUNIPER NETWORKS CLOUD SECURITY White Paper JUNIPER NETWORKS CLOUD SECURITY Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction Cloud Computing Overview...3 Private Cloud... 4 Public Cloud...

More information

How To Make A Virtual Machine Aware Of A Network On A Physical Server

How To Make A Virtual Machine Aware Of A Network On A Physical Server VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization

More information

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario... APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Microsegmentation Using NSX Distributed Firewall: Getting Started

Microsegmentation Using NSX Distributed Firewall: Getting Started Microsegmentation Using NSX Distributed Firewall: VMware NSX for vsphere, release 6.0x REFERENCE PAPER Table of Contents Microsegmentation using NSX Distributed Firewall:...1 Introduction... 3 Use Case

More information

vsphere 6.0 Advantages Over Hyper-V

vsphere 6.0 Advantages Over Hyper-V v3c Advantages Over Hyper-V The most trusted and complete virtualization platform 2015 Q1 2015 VMware Inc. All rights reserved. The Most Trusted Virtualization Platform Hypervisor Architecture Broad Support

More information

Red Hat enterprise virtualization 3.0 feature comparison

Red Hat enterprise virtualization 3.0 feature comparison Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009

Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized

More information

Juniper Solutions for Turnkey, Managed Cloud Services

Juniper Solutions for Turnkey, Managed Cloud Services Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge

More information

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5 Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware Published: April 2012 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Monitoring Databases on VMware

Monitoring Databases on VMware Monitoring Databases on VMware Ensure Optimum Performance with the Correct Metrics By Dean Richards, Manager, Sales Engineering Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 www.confio.com

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Juniper Networks Automated Support and Prevention Solution (ASAP)

Juniper Networks Automated Support and Prevention Solution (ASAP) Juniper Networks Automated Support and Prevention Solution (ASAP) An ecosystem of tools, applications, and systems to streamline operations, bring operational efficiency, reduce downtime, and increase

More information

Getting More Performance and Efficiency in the Application Delivery Network

Getting More Performance and Efficiency in the Application Delivery Network SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency

More information

Transforming Service Life Cycle Through Automation with SDN and NFV

Transforming Service Life Cycle Through Automation with SDN and NFV Transforming Service Life Cycle Through Automation with SDN and NFV Automated workflows improve TCO for service delivery 1 Table of Contents Executive Summary... 3 Introduction... 3 Today s Challenges...

More information

ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist

ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge

More information

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU Data sheet Product overview The HP TippingPoint Virtual Controller + Virtual Firewall (vcontroller+vfw) extends our leading intrusion

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

Optimize Server Virtualization with QLogic s 10GbE Secure SR-IOV

Optimize Server Virtualization with QLogic s 10GbE Secure SR-IOV Technology Brief Optimize Server ization with QLogic s 10GbE Secure SR-IOV Flexible, Secure, and High-erformance Network ization with QLogic 10GbE SR-IOV Solutions Technology Summary Consolidation driven

More information

Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro

Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro Whitepaper What s wrong with today s clouds? Compute and storage virtualization has enabled

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

Uila SaaS Installation Guide

Uila SaaS Installation Guide USER GUIDE Uila SaaS Installation Guide January 2016 Version 1.8.1 Company Information Uila, Inc. 2905 Stender Way, Suite 76E Santa Clara, CA 95054 USER GUIDE Copyright Uila, Inc., 2014, 15. All rights

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

Key Strategies for Long-Term Success

Key Strategies for Long-Term Success WHITE PAPER Security in the Next- Generation Data Center Key Strategies for Long-Term Success Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

VMware vsphere 4.1 Networking Performance

VMware vsphere 4.1 Networking Performance VMware vsphere 4.1 Networking Performance April 2011 PERFORMANCE STUDY Table of Contents Introduction... 3 Executive Summary... 3 Performance Enhancements in vsphere 4.1... 3 Asynchronous Transmits...

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual

More information

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due

More information

Customer Benefits Through Automation with SDN and NFV

Customer Benefits Through Automation with SDN and NFV Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents

More information

Windows Server 2012 R2 Hyper-V: Designing for the Real World

Windows Server 2012 R2 Hyper-V: Designing for the Real World Windows Server 2012 R2 Hyper-V: Designing for the Real World Steve Evans @scevans www.loudsteve.com Nick Hawkins @nhawkins www.nickahawkins.com Is Hyper-V for real? Microsoft Fan Boys Reality VMware Hyper-V

More information

White Paper. Recording Server Virtualization

White Paper. Recording Server Virtualization White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...

More information

Accelerating Micro-segmentation

Accelerating Micro-segmentation WHITE PAPER Accelerating Micro-segmentation THE INITIAL CHALLENGE WAS THAT TRADITIONAL SECURITY INFRASTRUCTURES WERE CONCERNED WITH SECURING THE NETWORK BORDER, OR EDGE, WITHOUT BUILDING IN EFFECTIVE SECURITY

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

VMware vshield App Design Guide TECHNICAL WHITE PAPER

VMware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications

More information

Install Guide for JunosV Wireless LAN Controller

Install Guide for JunosV Wireless LAN Controller The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

NETWORK AUTOMATION AND ORCHESTRATION

NETWORK AUTOMATION AND ORCHESTRATION White Paper NETWORK AUTOMATION AND ORCHESTRATION Building an Agile Data Center Infrastructure with Juniper Networks Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

Microsoft Exchange Solutions on VMware

Microsoft Exchange Solutions on VMware Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...

More information

Stratusphere Solutions

Stratusphere Solutions Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices

More information

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested

More information

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies

More information

Optimize VDI with Server-Side Storage Acceleration

Optimize VDI with Server-Side Storage Acceleration WHITE PAPER Optimize VDI with Server-Side Storage Acceleration Eliminate Storage Bottlenecks for Fast, Reliable Virtual Desktop Performance 1 Virtual Desktop Infrastructures (VDI) give users easy access

More information

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels. Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating

More information

Reasons to Choose the Juniper ON Enterprise Network

Reasons to Choose the Juniper ON Enterprise Network Reasons to Choose the Juniper ON Enterprise Network Juniper s enterprise access products meet the always-on needs of today s enterprises by delivering solutions that are reliable, simple, and smart. The

More information

Migrating to ESXi: How To

Migrating to ESXi: How To ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,

More information

VMware vcloud Director for Service Providers

VMware vcloud Director for Service Providers Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud

More information

VirtualclientTechnology 2011 July

VirtualclientTechnology 2011 July WHAT S NEW IN VSPHERE VirtualclientTechnology 2011 July Agenda vsphere Platform Recap vsphere 5 Overview Infrastructure Services Compute, Storage, Network Applications Services Availability, Security,

More information

Intel DPDK Boosts Server Appliance Performance White Paper

Intel DPDK Boosts Server Appliance Performance White Paper Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks

More information

VMware vshield Zones R E V I E W E R S G U I D E

VMware vshield Zones R E V I E W E R S G U I D E VMware vshield Zones R E V I E W E R S G U I D E Table of Contents Getting Started..................................................... 3 About This Guide...................................................

More information

Oracle SDN Performance Acceleration with Software-Defined Networking

Oracle SDN Performance Acceleration with Software-Defined Networking Oracle SDN Performance Acceleration with Software-Defined Networking Oracle SDN, which delivers software-defined networking, boosts application performance and management flexibility by dynamically connecting

More information

Managing Application Performance and Availability in a Virtual Environment

Managing Application Performance and Availability in a Virtual Environment The recognized leader in proven and affordable load balancing and application delivery solutions White Paper Managing Application Performance and Availability in a Virtual Environment by James Puchbauer

More information

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization Gateway Use Cases for Virtual Networks with MX Series Routers 1 Table of Contents Executive Summary... 3 Introduction...4

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Zeus Traffic Manager VA Performance on vsphere 4

Zeus Traffic Manager VA Performance on vsphere 4 White Paper Zeus Traffic Manager VA Performance on vsphere 4 Zeus. Why wait Contents Introduction... 2 Test Setup... 2 System Under Test... 3 Hardware... 3 Native Software... 3 Virtual Appliance... 3 Benchmarks...

More information

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

VDI Security for Better Protection and Performance

VDI Security for Better Protection and Performance VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments

More information

WHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment

WHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment WHITE PAPER Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment www.ixiacom.com 915-6892-01 Rev. A, July 2014 2 Table of Contents The Challenge of the Virtual Environment...

More information

Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment

Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment Technical Paper Moving SAS Applications from a Physical to a Virtual VMware Environment Release Information Content Version: April 2015. Trademarks and Patents SAS Institute Inc., SAS Campus Drive, Cary,

More information

Building a Penetration Testing Virtual Computer Laboratory

Building a Penetration Testing Virtual Computer Laboratory Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network

More information