Evolution of the ASSERT Computer Security Lab
|
|
- Aubrey McCarthy
- 8 years ago
- Views:
Transcription
1 Evolution of the ASSERT Computer Security Lab Brian Hay Kara Nance University of Alaska Fairbanks Agenda n Motivation n Initial Configuration n Virtualization Host Based Images n Virtualization Network Based Images n Network Isolation n Alternative Approaches 1
2 Motivation n Need for an environment which allows students, faculty, and staff to gain hands-on experience with IA concepts. n Need for a controlled research environment. n General purpose labs are typically illsuited for this use. Needs so you want to build a lab n Space n Equipment n Champion 2
3 Proof of Concept Lab n General purpose CS lab moved to Windows/Linux dual boot, freeing some space for a dedicated IA Lab. n However, there was little funding available for lab equipment. Proof of Concept Lab So, we looked for alternate sources of equipment! 3
4 Surplus Equipment n Many institutions maintain a surplus warehouse. n Good source of older, but still useful, equipment. n For example, 30 identical 1GB hard drives (computer forensics exercises). n Extra NICs and RAM. n Lab upgrades were also a good source of multiple identical computers. Surplus Equipment n Initial configuration n 10 homogenous systems (surplus) n 1 server with extra HDD (surplus) n 10 monitors (surplus) n Basic switch (~$50) n Ethernet Cable (~$50) 4
5 Initial Configuration n Workstations n 20 GB HDD split into four 5GB partitions. n Different OS loaded on each partition (2 Windows, 2 Linux). n Base images stored on server. n Script allows user to reload any partition with base image. n Server n DHCP, DNS, Web, Mail, and base images. Initial Configuration n Advantages n Gives user full control of system. n Ability to restore base configuration. n Lots of basic IA exercises possible. n Disadvantages n Not easy to save configurations. n Limited network configurations. n User tied to particular workstation. n Only one system per physical machine. 5
6 Initial Configuration n Major Advantage Proof-of-concept lab was used to generate momentum n Credibility n Fundability n Excitement Virtualization Host Based Images n NSF Capacity Building grant and UAF Technology Advisory Board provided some funds for new equipment. n Workstations with more RAM and larger HDD to support virtualization. n Network equipment router and managed switch. n VMware workstation software. 6
7 Virtualization Host Based Images n Malicious activity confined to VMs on VM network. Virtualization Host Based Images n Advantages n Gives user full control of VMs. n Ability to snapshot (save) and restore VM configuration. n Multiple VMs per physical machine (and use of virtual networks). n Disadvantages n Limited network configurations. n User tied to particular workstation. 7
8 Virtualization Host Based Images n Major Advantage Generated further momentum n More credibility n More fundability n More excitement Virtualization Network Based Images n UAF internal grant provided some funds for new equipment. n Server with additional storage (~1.5TB). n VM Images moved from individual workstations to server. 8
9 Virtualization Network Based Images n Malicious activity confined to VMs on VM network. n VM image traffic confined to User network. Virtualization Network Based Images n Network determined to be performance limiting factor. n Replaced 100Mb user switch with Gigabit switch. n Workstations had existing Gigabit NIC. n 3Gb/s bonded channel from server to switch. n 1 Gb/s link to each workstation. 9
10 Virtualization Network Based Images n Malicious activity confined to VMs on VM network. n VM image traffic confined to User network. Virtualization Network Based Images n Advantages n Gives user full control of VMs. n Ability snapshot (save) and restore VM configuration. n Multiple VMs per physical machine (and use of virtual networks). n User no longer tied to particular workstation. n Improved VM performance (no lag during normal use, and acceptable performance during start/stop/snapshot operations). n Disadvantages n User required to physically be in ASSERT Lab. 10
11 External Network Connectivity n ASSERT Lab is physically isolated from external networks. n Makes updating/patching and new software installation more challenging. n However, no opportunity for accidental impact on external networks. Alternate Configurations n Boot existing general purpose lab system with: n Live CD n Limited ability to save current state. n User can easily compromise physical system. n Alternate partition n User tied to physical machine. n User can easily compromise physical system. 11
12 Conclusions n Extended to Montana State University n Continually evolving n NSF Planning Grant n Research Partnerships 12
Applications of Virtualization to Digital Forensics Education
Applications of Virtualization to Digital Forensics Education Brian Hay Department of Computer Science University of Alaska Fairbanks brian.hay@alaska.edu Abstract Educators in digital forensics struggle
More informationIntro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
More informationPromoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center Kara Nance, Brian Hay, Christopher Hecker ASSERT Center, University of Alaska Fairbanks ffkln@uaf.edu, brian.hay@uaf.edu,
More informationMicrosoft Exchange Solutions on VMware
Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...
More informationBLACK BOX. Quick Start Guide. Virtual Central Management System (VCMS) Works with LES Series Console Servers. LES-VCMS. Customer Support Information
LES-VCMS Virtual Central Management System (VCMS) Quick Start Guide Works with LES Series Console Servers. BLACK BOX Customer Support Information Order toll-free in the U.S.: Call 877-877-BBOX (outside
More informationVirtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
More informationParallels Plesk Automation
Parallels Plesk Automation Contents Compact Configuration: Linux Shared Hosting 3 Compact Configuration: Mixed Linux and Windows Shared Hosting 4 Medium Size Configuration: Mixed Linux and Windows Shared
More informationReplicating and Sharing Computer Security Laboratory Environments
Replicating and Sharing Computer Security Laboratory Environments Kara Nance & Brian Hay Ronald Dodge James Wrubel Steve Burd & Alex Seazzu University of Alaska Fairbanks U.S. Military Academy Carnegie
More information- Brazoria County on coast the north west edge gulf, population of 330,242
TAGITM Presentation April 30 th 2:00 3:00 slot 50 minutes lecture 10 minutes Q&A responses History/Network core upgrade Session Outline of how Brazoria County implemented a virtualized platform with a
More informationVirtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
More informationBest Practices for VMware ESX Server 2
Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize
More informationSystem Requirements and Server Configuration
Hardware Requirements for C Series, page 1 Open Virtualization Files, page 2 VMware Hosting, page 2 Software, page 2 Side A Server Component Configurations, page 5 Side B Server Component Configurations,
More informationWindows Server 2008 R2 Hyper V. Public FAQ
Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6
More informationHow to Guide: StorageCraft Cloud Services VPN
How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12
More informationOverview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
More informationInformation Services hosted services and costs
Information Services hosted services and costs 1. Overview Information Services (I.S.) has provided a popular hosting service for specialized departmental servers for many years. Servers hosted by I.S.
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationCSG Windows Support Policy
CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics
More informationRED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
More informationBuilding a Virtual Desktop Infrastructure A recipe utilizing the Intel Modular Server and VMware View
Building a Virtual Desktop Infrastructure A recipe utilizing the Intel Modular Server and VMware View December 4, 2009 Prepared by: David L. Endicott NeoTech Solutions, Inc. 2816 South Main St. Joplin,
More informationInstall Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
More informationAKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16 AKIPS Pty Ltd July 5, 2016 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of this
More informationLaCie 5big Backup Server
LaCie 5big Backup Server DESIGN BY NEIL POULTON Centralized Backup Appliance for Small Businesses Back Up 10 PCs and 25 Macs 10TB * Gigabit Ethernet The Right Backup Solution for Small Business Delivering
More informationMedInformatix System Requirements
MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large
More informationCMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
More informationClearPass Policy Manager 6.3
ClearPass Policy Manager 6.3 Tech Note: Installing or Upgrading on a Virtual Machine This document describes the procedures for installing and upgrading ClearPass Policy Manager 6.3 on a Virtual Machine.
More informationTaking the Disaster out of Disaster Recovery
Taking the Disaster out of Disaster Recovery Agenda Challenges of Traditional DR Properties of Virtualization for DR Using VMware Virtualization in DR 10 Steps to better DR using VMware Virtualization
More informationBringing the Eko VM Home (302)
Liinux Howttos Brriingiing tthe Eko VM Home ((302)) CIIS 90 Sprriing 2011 Bringing the Eko VM Home (302) This Howto shows how to install VirtualBox and create the Linux Eko VM used in the CIS 90 course.
More informationOS Installation Guide Red Hat Linux 9.0
OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19
More informationPassTest. Bessere Qualität, bessere Dienstleistungen!
PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : VCP510 Title : VMware Certified Professional on VSphere 5 Version : Demo 1 / 7 1.Which VMware solution uses the security of a vsphere implementation
More informationThe VMware Administrator s Guide to Hyper-V in Windows Server 2012. Brien Posey Microsoft MVMP @Veeam
The VMware Administrator s Guide to Hyper-V in Windows Server 2012 Brien Posey Microsoft MVMP @Veeam About today s webinar Thought leadership content from an industry expert This webinar is recorded and
More informationA Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers
A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers Srinivas P Reddy - 16 th March 2006 srinivasp@vensoft.com
More informationParallels Server 4 Bare Metal
Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses
More informationIntro to Virtualization
Intro to Virtualization Preprepared by Phil Grimes Coach / Mentor - Security Consultant Small changes & Additions by Dr. Enis Karaarslan, 2014 What is a Virtual Machine? Computer within a computer It's
More informationProfessional and Enterprise Edition. Hardware Requirements
Professional and Enterprise Edition Hardware Requirements For Blackbaud FundWare 1 to 99 user environments Revised March 1, 2010 Table of Contents Supported Platforms... 3 Single-User Environment (Professional)...
More informationBalancing CPU, Storage
TechTarget Data Center Media E-Guide Server Virtualization: Balancing CPU, Storage and Networking Demands Virtualization initiatives often become a balancing act for data center administrators, who are
More informationAKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15 AKIPS Pty Ltd November 12, 2015 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of
More informationHypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
More information1.. Know the capabilities of the network system you are going to be adding cameras and/or DVR s to. Meaning, know if the present LAN has the
10 Things All Installers Should Know Before Installing a Network Security System 1.. Know the capabilities of the network system you are going to be adding cameras and/or DVR s to. Meaning, know if the
More informationOptimize VMware and Hyper-V Protection with HP and Veeam
Optimize VMware and Hyper-V Protection with HP and Veeam John DeFrees, Global Alliance Solution Architect, Veeam Markus Berber, HP LeftHand P4000 Product Marketing Manager, HP Key takeaways from today
More informationAddendum No. 1 to Packet No. 28-13 Enterprise Data Storage Solution and Strategy for the Ingham County MIS Department
Addendum No. 1 to Packet No. 28-13 Enterprise Data Storage Solution and Strategy for the Ingham County MIS Department The following clarifications, modifications and/or revisions to the above project shall
More informationMicrosoft Hyper-V chose a Primary Server Virtualization Platform
Roger Shupert, Integration Specialist } Lake Michigan College has been using Microsoft Hyper-V as it s primary server virtualization platform since 2008, in this presentation we will discuss the following;
More informationHow To Manage An Iscsi Vsa With An Hp Storevirtual Storage With An Iscsi Vsa
HP StoreVirtual Storage VSA Installation and Configuration Guide Abstract This guide provides information about installing and configuring the HP StoreVirtual VSA for VMware vsphere and the HP StoreVirtual
More informationCloud n Service Presentation. NTT Communications Corporation Cloud Services
Cloud n Service Presentation NTT Communications Corporation Cloud Services 1 Overview of Global Public Cloud Services Cloud n offeres datacenters in U.S. and Japan Global standard service architecture
More informationDatto Whitepaper: Business Continuity Built from the Ground Up. Business Continuity Built from the Ground Up THE ONLY CONTINUITY
Meet the Next Generation of Datto THE ONLY CONTINUITY SOLUTION DESIGNED FOR SMALL BUSINESS SMART SCALABLE STORAGE CONNECTED TO THE CLOUD ENTERPRISE BUSINESS CONTINUITY BUILT FROM THE GROUND UP Meet the
More informationDS NVR Prospective Network Configurations
DS NVR Prospective Network Configurations 1. Introduction 1.1 Purpose This document discusses options for using dual network cards in a DS NVR system. 1.2 Definitions, acronyms, and abbreviations 1.2.1
More informationVirtual Desktop Infrastructure (VDI) made Easy
Virtual Desktop Infrastructure (VDI) made Easy HOW-TO Preface: Desktop virtualization can increase the effectiveness of information technology (IT) teams by simplifying how they configure and deploy endpoint
More informationGeneral system requirements
2 General system requirements Minimal requirements Processor: Intel Core 2 Duo or equivalent Memory (RAM): HDD: NIC: 1 GB At least 100 MB available hard disk space. 1000 Mb/s, Jumbo frame 9kb. OS: Windows
More informationExpert Reference Series of White Papers. Visions of My Datacenter Virtualized
Expert Reference Series of White Papers Visions of My Datacenter Virtualized 1-800-COURSES www.globalknowledge.com Visions of My Datacenter Virtualized John A. Davis, VMware Certified Instructor (VCI),
More informationAIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE. Computer Basics and Virtual Machines. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE Computer Basics and Virtual Machines www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER
More informationAltor Virtual Network Security Analyzer v1.0 Installation Guide
Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor
More informationStratusphere Solutions
Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices
More informationIssues in Information Systems Volume 16, Issue I, pp. 219-225, 2015
MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu
More informationBefore we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
More informationCLAS Linux Team Linux Support Policy
CLAS Linux Team Linux Support Policy This document describes the policies for service and support of Linux computers used by faculty and staff in the departments of in the College of Liberal Arts and Sciences.
More informationVirtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
More informationSetting up Windows Phone 8 environment in VMWare
Setting up Windows Phone 8 environment in VMWare Pre Requisites Windows Phone 8 SDK is only supported with 64-bit Windows 8 Pro or higher. VMware player 5.0.1 or workstation 9. ( The Hypervisor is not
More informationData Center Op+miza+on
Data Center Op+miza+on Sept 2014 Jitender Sunke VP Applications, ITC Holdings Ajay Arora Sr. Director, Centroid Systems Justin Youngs Principal Architect, Oracle 1 Agenda! Introductions! Oracle VCA An
More informationXen Virtualization: Xen (source) and XenServer
Xen Virtualization: Xen (source) and XenServer An introduction to free and commercial methods of creating virtual servers by Mark Sallee, Sys Admin, NCAR " Why Virtualization? Scenario: imagine that you
More informationDownload Virtualization Software Download a Linux-based OS Creating a Virtual Machine using VirtualBox: VM name
Download Virtualization Software You will first need to download and install a virtualization product. This will allow you to create a virtual machine which you can install a Linux distribution on. I recommend
More informationRunning Windows on a Mac. Why?
Running Windows on a Mac Why? 1. We still live in a mostly Windows world at work (but that is changing) 2. Because of the abundance of Windows software there are sometimes no valid Mac Equivalents. (Many
More informationVMware Training for the Future
July 2001 White Paper VMware Training for the Future How VMware Workstation Delivers Tangible Value to the Training Business Table of Contents 1.0 Introduction 2.0 VMware's Solution Meets the Challenges
More informationAerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
More informationVIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
More informationCreating a Linux Virtual Machine using Virtual Box
A. Install Virtual Box: Creating a Linux Virtual Machine using Virtual Box 1. Download the Virtualbox installer http://www.virtualbox.org/wiki/downloads 2. Run the installer and have the installer complete.
More informationWorkstation Virtualization Software Review. Matthew Smith. Office of Science, Faculty and Student Team (FaST) Big Bend Community College
Workstation Virtualization Software Review Matthew Smith Office of Science, Faculty and Student Team (FaST) Big Bend Community College Ernest Orlando Lawrence Berkeley National Laboratory Berkeley, CA
More informationDESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION
DESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION Vikram Anantapadmanabhan, Nasir Memon, Phyllis Frankl and Gleb Naumovich Polytechnic University Brooklyn, NY 11201. vikram@isis.poly.edu, memon,frank,gleb@poly.edu
More informationBuilding a SQL Server Test Lab. Ted Krueger SQL Server MVP Data Architect
Building a SQL Server Test Lab Ted Krueger SQL Server MVP Data Architect What makes a full SQL Server Lab Useful An installation nightmare on one system Error prone shared features and files Multiple versions,
More informationFINANCIAL SERVICES BOARD
PROVISIONING OF AN ICT SERVICE MANAGEMENT SOLUTION The following questions were received by the Financial Services Board on bid FSB2013/011 and are answered accordingly: QUESTION 1 The bid response format
More informationEmulex OneConnect 10GbE NICs The Right Solution for NAS Deployments
Emulex OneConnect 10GbE NICs The Right Solution for NAS Deployments As the value and volume of business data continues to rise, small/medium/ enterprise (SME) businesses need high-performance Network Attached
More informationDesktop Virtualization @ U-M. September 28, 2011 Ryan Henyard ITS Desktop Infrastructure
Desktop Virtualization @ U-M September 28, 2011 Ryan Henyard ITS Desktop Infrastructure Overview Introduction to Desktop Virtualization MyDesktop Service How We Got There Use Cases Takeaways Future Plans
More informationAnalysis of VDI Storage Performance During Bootstorm
Analysis of VDI Storage Performance During Bootstorm Introduction Virtual desktops are gaining popularity as a more cost effective and more easily serviceable solution. The most resource-dependent process
More informationBosch Video Management System High Availability with Hyper-V
Bosch Video Management System High Availability with Hyper-V en Technical Service Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 General Requirements
More informationReal World Cloud Infrastructure with Red Hat Enterprise Virtualization and Red Hat Network Satellite
Real World Cloud Infrastructure with Red Hat Enterprise Virtualization and Red Hat Network Satellite Tim Scully Jackpine Technologies Corporation David Egts Principal Architect, Red Hat 23 June 2010 Agenda
More informationEnabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
More informationNetBoot Fundamentals and Customizations
NetBoot Fundamentals and Customizations May 3, 2012 Justin Elliott Penn State University MacAdmins Conference 2011 2012 Quick Audience Survey Who s new to Mac systems imaging and deployment? Who has used
More informationSETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 bardasag@ksu.edu, xou@ksu.edu
More informationTechnical Note. vsphere Deployment Worksheet on page 2. Express Configuration on page 3. Single VLAN Configuration on page 5
Technical Note The vfabric Data Director worksheets contained in this technical note are intended to help you plan your Data Director deployment. The worksheets include the following: vsphere Deployment
More informationVMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....
More informationWindows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center
Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE Overview IT Network Global Solutions Division UNIVERGE Support Center ProgrammableFlow API architecture Microsoft VSEM Provider Third
More informationVirtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
More informationThe Octagon. Computer Support Group
The Octagon Computer Support Group Dare to Dream To be a Leader in the State of the art technology and provide World class IT Service To establish Advanced Computing Infrastructure To be a Technology Centre
More informationIn order to upload a VM you need to have a VM image in one of the following formats:
What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.
More informationCustom Integration Solutions
Welcome to this introduction into a true business class network solution for you and your clients This solution has been designed, by integrators, for integrators. We look forward to producing an ever
More informationRed Hat Enterprise Virtualization - KVM-based infrastructure services at BNL
Red Hat Enterprise Virtualization - KVM-based infrastructure services at Presented at NLIT, June 16, 2011 Vail, Colorado David Cortijo Brookhaven National Laboratory dcortijo@bnl.gov Notice: This presentation
More informationVirtualization Management the ovirt way
ovirt introduction FOSDEM 2013 Doron Fediuck Red Hat What is ovirt? Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure
More informationMicrosoft SMB File Sharing Best Practices Guide
Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents
More informationHP SN1000E 16 Gb Fibre Channel HBA Evaluation
HP SN1000E 16 Gb Fibre Channel HBA Evaluation Evaluation report prepared under contract with Emulex Executive Summary The computing industry is experiencing an increasing demand for storage performance
More informationCitrix XenServer 5.6 Feature Pack 1 Quick Start Guide. Published Monday, 17 January 2011 1.2 Edition
Citrix XenServer 5.6 Feature Pack 1 Quick Start Guide Published Monday, 17 January 2011 1.2 Edition Citrix XenServer 5.6 Feature Pack 1 Quick Start Guide Copyright 2011 Citrix Systems. Inc. All Rights
More informationWindows 2003 Server Installation Guide
Windows 2003 Server Installation Guide Revision 2.0 April 14, 2011 Licenses This manual is the exclusive property of Prometric, Inc. This manual is licensed for use with restrictions to authorized centers
More informationRemote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
More informationISERink Overview. Version 1.1. February 1, 2015
ISERink Overview Version 1.1 February 1, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to undertake
More informationHow To Build A Cloud Server For A Large Company
MASSIVELY SCALED INFRASTRUCTURE FOR VERIZON CLOUD COMPUTE AND STORAGE Challenge Create the world s highest performance enterprise class public cloud Provide granular, customized configurations defined
More informationBuilding a cost-effective and high-performing public cloud. Sander Cruiming, founder Cloud Provider
Building a cost-effective and high-performing public cloud Sander Cruiming, founder Cloud Provider 1 Agenda Introduction of Cloud Provider Overview of our previous cloud architecture Challenges of that
More informationNetwork Infrastructure
Høgskolen i Telemark Telemark University College Faculty of Technology, Department of Electrical Engineering, Information Technology and Cybernetics Network Infrastructure Keywords: Data Communication,
More informationConfiguration Maximums VMware Infrastructure 3
Technical Note Configuration s VMware Infrastructure 3 When you are selecting and configuring your virtual and physical equipment, you must stay at or below the maximums supported by VMware Infrastructure
More informationMigrating to ESXi: How To
ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,
More informationDELL. Dell Microsoft Windows Server 2008 Hyper-V TM Reference Architecture VIRTUALIZATION SOLUTIONS ENGINEERING
DELL Dell Microsoft Windows Server 2008 Hyper-V TM Reference Architecture VIRTUALIZATION SOLUTIONS ENGINEERING September 2008 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationVMware vsphere-6.0 Administration Training
VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast
More information