Data Center Architecture



Similar documents
Configuration of Cisco Routers. Mario Baldi

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino.

Flow control on IEEE 802.3x switch

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Fulvio Risso Politecnico di Torino

Architectural Overview

Figure 41-1 IP Filter Rules

Network Security Topologies. Chapter 11

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Owner of the content within this article is Written by Marc Grote

Chapter 15. Firewalls, IDS and IPS

DMZ Network Visibility with Wireshark June 15, 2010

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Secure web transactions system

DMZ Gateways: Secret Weapons for Data Security

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Enhancing Web Publishing with Digital Asset Management - Using Open Text Artesia DAM to enhance your Open Text WCMS (Red Dot) web sites

Configuration Example

Cisco AVVID Network Enterprise Data Center Solution Overview

Firewall Architecture

Installing Behind a Firewall or Proxy

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure

Client/server is a network architecture that divides functions into client and server

Firewalls, IDS and IPS

Firewall Security. Presented by: Daminda Perera

CIS 433/533 - Computer and Network Security Firewalls

Service Oriented Architectures

This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component.

Lesson 5: Network perimeter security

Internet and Intranet Calling with Polycom PVX 8.0.1

Web Application Development

Centrata IT Management Suite 3.0

12. Firewalls Content

Network Configuration Settings

SUSE LINUX School Server

Secure Web Appliance. Reverse Proxy

Internet Security Firewalls

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Outline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011

Load Balancing for Microsoft Office Communication Server 2007 Release 2

IONA Security Platform

Building a Systems Infrastructure to Support e- Business

netkit lab load balancer web switch 1.1 Giuseppe Di Battista, Massimo Rimondini Version Author(s)

CS Computer and Network Security: Firewalls

ArcGIS for Server Reference Implementations. An ArcGIS Server s architecture tour

Network System Management. Creating an Active Directory Domain

CSE543 - Computer and Network Security Module: Firewalls

What Is the Java TM 2 Platform, Enterprise Edition?

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Web Foundations Series Internet Business Associate

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

SANGFOR SSL VPN. Quick Start Guide

CS Computer and Network Security: Firewalls

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH. Public Health Information Network Messaging System (PHINMS)

Reverse Proxy Guide. Version 2.0 April 2016

Availability Digest. Redundant Load Balancing for High Availability July 2013

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution

Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Deployment Topologies

Internet infrastructure. Prof. dr. ir. André Mariën

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

Massimiliano Sbaraglia Network Engineer. Server Farm with Firewall SSG 520 Juniper

Integrating Web Messaging into the Enterprise Middleware Layer

zen Platform technical white paper

Proxy Server, Network Address Translator, Firewall. Proxy Server

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

Cornerstones of Security

Detailed Table of Contents

Securely Managing and Exposing Web Services & Applications

Redundancy and load balancing at L3 in Local. Fulvio Risso Politecnico di Torino

Video Conferencing and Security

Enterprise Integration Architectures for the Financial Services and Insurance Industries

Firewall Environments. Name

Cisco Secure PIX Firewall with Two Routers Configuration Example

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Lab Configuring Access Policies and DMZ Settings

LinkProof DNS Quick Start Guide

Transcription:

Data Center Architecture Mario Baldi Politecnico di Torino (Technical University of Turin) Computer Engineering Department http://www.mario-baldi.net

reti_aziendali_ced - 2 Copyright notice This set of transparencies, hereinafter referred to as slides, is protected by copyright laws and provisions of International Treaties. The title and copyright regarding the slides (including, but not limited to, each and every image, photography, animation, video, audio, music and text) are property of the authors specified on page 1. The slides may be reproduced and used freely by research institutes, schools and Universities for non-profit, institutional purposes. In such cases, no authorization is requested. Any total or partial use or reproduction (including, but not limited to, reproduction on magnetic media, computer networks, and printed reproduction) is forbidden, unless explicitly authorized by the authors by means of written license. Information included in these slides is deemed as accurate at the date of publication. Such information is supplied for merely educational purposes and may not be used in designing systems, products, networks, etc. In any case, these slides are subject to changes without any previous notice. The authors do not assume any responsibility for the contents of these slides (including, but not limited to, accuracy, completeness, enforceability, updated-ness of information hereinafter provided). In any case, accordance with information hereinafter included must not be declared. In any case, this copyright notice must never be removed and must be reported even in partial uses.

Multi-tier applications Web Server Application server Data base server Web Server Java servlet Enterprise Java Bean Data base server Web Server Application server Mainframe reti_aziendali_ced - 3

Load Balancing Web Server Application server Server load balancer reti_aziendali_ced - 4

Load Balancing and Multi-Tier applications Tier-2 server sharing Web Server Application server Server load balancer reti_aziendali_ced - 5

Load Balancing and Multi-Tier applications Load balancing on Tier-2 servers (not recommended) Web Server Application server Server load balancer reti_aziendali_ced - 6

Load Balancing and Multi-Tier applications Application server Server load balancer Capable of assembling web pages reti_aziendali_ced - 7

Storage Area Network (SAN) iscsi SAN Fiber Channel FCIP SCSI reti_aziendali_ced - 8

Public network access Internet External Firewall DNS Public servers WWW Mail HTTP proxy FTP proxy De-Militarized Zone (DMZ) Public Intranet Public Front-end Internal Firewall Private Intranet reti_aziendali_ced - 9

Public network access Internet External Firewall DNS Public Servers WWW Mail HTTP proxy FTP proxy De-Militarized Zone (DMZ) Public Intranet Public front-end Private Server accessed only from the inside Internal Firewall Private Intranet Back end Private Servers accessed from public servers reti_aziendali_ced - 10

Security and load balance Internet or other public network External Firewall Unbalanced pubblic Front-end Rete aziendale (privata) Physical servers Back-end Application Server Load balancer SAN Physical servers Internal Firewall Private Front-end Balanced pubblic Front-end Database Server Layer 2 or layer 3 network reti_aziendali_ced - 11

Addressing Private addressing can be used A proxy is used to make hosts access external netwroks Static NAT to access servers Services publication Implemented by an external firewall reti_aziendali_ced - 12