Lab 6: Evaluating Firewall Policies to Manage Network Traffic

Size: px
Start display at page:

Download "Lab 6: Evaluating Firewall Policies to Manage Network Traffic"

Transcription

1 Lab 6: Evaluating Firewall Policies to Manage Network Traffic Objective This lab teaches the fundamentals of implementing firewall policies and understanding its effect on application performance and link utilizations. Overview Standard Chartered Bank s headquarters network connects to the Internet through a CISCO PIX Firewall. Users use various online applications including , web browsing, and credit card authorization. In addition, some users are doing illegal file transfers for pirated music and videos. First we ll evaluate the application performance with no firewall policies. Thus, no illicit traffic is blocked. Standard Chartered Bank s most critical application is credit card authorization. It is required to have a response time of less than 2 seconds. Lab Instructions Step 1: Open Lab 1 1. Start IT Guru. 2. Select File Open 3. Scroll down to the project named Firewall_Implementation, select it and click OK. OPNET IT Guru Lab 6, Page 1

2 Simulate the network for a busy hour of the day to evaluate the performance of the critical application. Step 2: Configure and Run the Simulation Evaluate the network performance for a busy hour of the day. 1. Click on the configure/run simulation toolbar button. 2. Make sure the Simulation Duration is set to 1 hour. 3. Click Run. Monitor the progress bar as the simulation proceeds. OPNET IT Guru Lab 6, Page 2

3 4. When the simulation completes, Click Close. Step 3: View Results View the credit card authorization response time for all the users and also the WAN link utilization. As mentioned earlier, the critical credit card authorization application s response time is required to be less than 2 seconds. 1. Right-click in the workspace and select View Results. 2. Choose Global Statistics DB Query Response Time (sec). 3. Select Show. Now add the average curve to this window. 4. Change the filter from As Is to average and click Add. OPNET IT Guru Lab 6, Page 3

4 5. Click on the graph window having the discrete data points for this statistic to add this curve on that panel. 6. Click Close in the View Results window. 7. Right-click on the WAN link and select View Results to view its utilization. OPNET IT Guru Lab 6, Page 4

5 8. Choose point-to-point utilization and click Show. Note: To toggle the graphs on and off, use the hide or show all graphs button. 9. Close the View Results window. OPNET IT Guru Lab 6, Page 5

6 Your results should be similar to the graph above. The results show that the Credit Card Authorization Response Time is above the required limit of 2 seconds. Also the WAN link utilization is high which might contribute to unacceptable application response times. The company decided to configure the firewall to block peer-to-peer file transfers to see its effect on the application performance. Step 4: Duplicate Scenario 1. Select Scenarios Duplicate Scenario 2. Give the name as Firewall Implemented. Step 5: Configure the CISCO PIX Firewall Configure the firewall to block video traffic. 1. Right-click on the CISCO PIX Firewall and select Edit Attributes. 2. Click in the Value column for Proxy Server Information. OPNET IT Guru Lab 6, Page 6

7 3. Scroll down to Voice and change the value for Proxy Server Deployed from Yes to No and then click OK twice. Step 6: Configure and Run the Simulation Rerun the simulation for a busy hour of the day to see if implementing the firewall improves application performance. Refer to previous steps for setting the duration and running the simulation. OPNET IT Guru Lab 6, Page 7

8 Step 7: Compare Results Compare the Credit Card Authorization Application Response Time and also the WAN link utilization. 1. Right-click in the workspace and select Compare Results. 2. Choose Global Statistics DB Query Response Time (sec). 3. Click Show and then click Close in the View Results window. 4. Right-click on the WAN link and select Compare Results. 5. Choose point-to-point utilization. 6. Click Show and then close the View Results window. OPNET IT Guru Lab 6, Page 8

9 Conclusion As expected, the results show that implementing the firewall had a significant improvement in the credit card authorization application performance. The utilization graph shows significant reduction in the WAN link utilization due to the firewall policy, thereby improving the application performance. By mandating the firewall policy to stop illicit peer-to-peer file transfers, the company is able to achieve the required performance for the critical credit card authorization. Advanced Scenario Advanced Scenario 1. Duplicate the scenario Without_Firewall_Implementation and then, instead of implementing the firewall, upgrade the WAN link and see its effect on the critical application response time. OPNET IT Guru Lab 6, Page 9

Lab 4: Changing Frame Relay PVC Speeds in a WAN Environment

Lab 4: Changing Frame Relay PVC Speeds in a WAN Environment Objective Lab 4: Changing Frame Relay PVC Speeds in a WAN Environment This lab investigates the performance of applications across a Wide Area Network. We examine how changing the speeds of Frame Relay

More information

Lab 2: Multistory Building LAN: Daisy Chain Versus Collapsed Backbone Architecture

Lab 2: Multistory Building LAN: Daisy Chain Versus Collapsed Backbone Architecture Objective Lab 2: Multistory Building LAN: Daisy Chain Versus Collapsed Backbone Architecture This lab teaches the application performance of two different network architectures: Daisy Chain and Collapsed

More information

Lab 1: Improving performance by LAN Hardware Upgrade

Lab 1: Improving performance by LAN Hardware Upgrade Lab 1: Improving performance by LAN Hardware Upgrade Objective In this lab, OPNET s IT Guru Academic Edition advanced modeling software will be used to study performance improvements in LAN obtained by

More information

Security Lab 1 Firewall Performance

Security Lab 1 Firewall Performance Security Lab 1 Firewall Performance This lab has been partially based on OPNET Lab Manual To Accompany Data and Computer Communications, by Kevin Brown and Leann Christianson, Prentice Hall, 2004. Objective

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Requirement Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network This set of labs works in conjunction with Professor Ray Panko s textbook, Business Data Networks and Telecommunications.

More information

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.

More information

Network Design. Planning a Network with Different Users, Hosts, and Services. Laboratory. Objective. Overview

Network Design. Planning a Network with Different Users, Hosts, and Services. Laboratory. Objective. Overview Laboratory 4 Network Design Planning a Network with Different Users, Hosts, and Services Objective The objective of this lab is to demonstrate the basics of designing a network, taking into consideration

More information

TCP versus UDP Response Time

TCP versus UDP Response Time Lab 9 TCP versus UDP Response Time Overview TCP provides connection-oriented service at the transport layer, and UDP provides connectionless service. As a result, a data exchange using TCP can take longer

More information

Objective To examine the throughput of a TCP connection as the flow control window size is varied.

Objective To examine the throughput of a TCP connection as the flow control window size is varied. Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions

More information

OVERVIEW WARNING! DATE: INFORMÁTICAS LAB ASSIGNMENT 3

OVERVIEW WARNING! DATE: INFORMÁTICAS LAB ASSIGNMENT 3 PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 3 DATE: 2010.11 OVERVIEW The Internet can be used to transmit data from a variety of applications across an infrastructure shared by millions

More information

Objective To examine the change in throughput in a local area network when upgrading from a hub to a switch.

Objective To examine the change in throughput in a local area network when upgrading from a hub to a switch. Lab 2 Switches versus Hubs Overview Ethernet hubs work at the physical layer, simply repeating any frames they receive on one port onto all other ports. For this reason, they are also called multiport

More information

Frame Relay Network Performance

Frame Relay Network Performance Lab 4 Frame Relay Network Performance Overview Frame Relay is a connection-oriented, unreliable technology based on virtual circuits. A virtual circuit must be set up between a source and destination before

More information

Shared Ethernet Networks

Shared Ethernet Networks Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a

More information

Switched LANs A Set of Local Area Networks Interconnected by Switches

Switched LANs A Set of Local Area Networks Interconnected by Switches Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help

More information

Analyze performance of the following voice codecs: G.711 Silence, G K, G K Silence, G K, G K, G.729A, G.

Analyze performance of the following voice codecs: G.711 Silence, G K, G K Silence, G K, G K, G.729A, G. Lab 3 TCOM631 Overview The goal of this lab is to teach you how simulation and modeling can be used in analyzing applications and networks. You will use Riverbed (OPNET) Modeler Academic Edition, simulation

More information

Introduction to Modeler

Introduction to Modeler Table of Contents Lab: Using The Project Editor...2 Lab: Building a First Network...11 Lab: Using Other Editors...28 Extra Credit Lab: Discrete Event Simulation Studies...32 Lab: Node Modeling...39 Lab:

More information

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS Project Overview IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS This project along with the Phase II IT Infrastructure Project will help you understand how a network administrator improves network performance

More information

Switched LANs. A Set of Local Area Networks Interconnected by Switches

Switched LANs. A Set of Local Area Networks Interconnected by Switches Laboratory 3 Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this

More information

Eng 3553 Lab #5 TCP Throughput

Eng 3553 Lab #5 TCP Throughput Eng 3553 Lab #5 TCP Throughput Overview TCP (Transmission Control Protocol) is a means for building a reliable communications stream, enabling two hosts to establish a connection and exchange streams of

More information

This document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com].

This document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com]. Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Área: Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo

More information

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most

More information

Advanced Communication Lab OPNET Tutorial

Advanced Communication Lab OPNET Tutorial Advanced Communication Lab OPNET Tutorial SS 2013 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the

More information

Security Labs in OPNET IT Guru

Security Labs in OPNET IT Guru Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project

More information

IT Guru Academic Edition does not work correctly with number representations different from English.

IT Guru Academic Edition does not work correctly with number representations different from English. PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 1 DATE: 2009.10.19 OVERVIEW The purpose of this lab is to introduce the main concepts involved in modeling Local Area Networks (LAN) based

More information

Advanced Communication Lab OPNET Tutorial

Advanced Communication Lab OPNET Tutorial Advanced Communication Lab OPNET Tutorial SS 2014 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the

More information

CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in

CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in CHAPTER 4 4. Simulation procedure 4.1 Introduction The main aim of this chapter is to discuss the simulation procedure followed in evaluating the performance of AODV under black hole attacks. As discussed

More information

LAN Modeling. Overview

LAN Modeling. Overview LAN Modeling Overview This lesson focuses on the use of LAN models and background link utilization. You will learn to Configure the object palette with the models you need Set up application and profile

More information

Ethernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview

Ethernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview Laboratory 1 Ethernet A Direct Link Network with Media Access Control Objective This lab is designed to demonstrate the operation of the Ethernet network. The simulation in this lab will help you examine

More information

Introduction to SITL. Objective

Introduction to SITL. Objective Introduction to SITL Objective This tutorial provides a quick introduction to System-in-the-Loop (SITL) functionality, which allows physical hardware and a simulation to interact as a unified system. It

More information

Lab - Configure the Firewall in Windows 8

Lab - Configure the Firewall in Windows 8 Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two computers directly connected or connected over the network Windows 8 installed

More information

Security Labs in OPNET IT Guru

Security Labs in OPNET IT Guru Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project

More information

Order of Packet Transmission and Dropping

Order of Packet Transmission and Dropping Laboratory 9 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for

More information

IX: Detailed Infomation

IX: Detailed Infomation IX: Detailed Infomation 1 IX: Detailed Infomation Megaport owns and operates a series of Internet peering exchanges in the majority of our networks globally. IXs provide greater efficiency between networks

More information

Firmware Upgrade Troubleshooting on 300/500 Series Managed Switches

Firmware Upgrade Troubleshooting on 300/500 Series Managed Switches Article ID: 5007 Firmware Upgrade Troubleshooting on 300/500 Series Managed Switches Objective Firmware is a combination of software and hardware that has program code and data stored on it. Upgrading

More information

To start using Opnet modeller, select the program icon from the programs menu.

To start using Opnet modeller, select the program icon from the programs menu. Lab 1, Getting Started with Opnet Modeler Creating a new Project To start using Opnet modeller, select the program icon from the programs menu. - The Opnet modeller program icon. Once the program has initialised

More information

Lab - Configure the Firewall in Windows 7 and Vista

Lab - Configure the Firewall in Windows 7 and Vista Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two computers directly connected or connected on a network Windows installed

More information

CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example

CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example Document ID: 63611 Contents Introduction Prerequisites Requirements Components Used Conventions Cisco CallManager

More information

IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS

IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS Prjoect Overview IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS Phase II of the project will pick up where the IT Infrastructure Project Phase I left off. In this project, you will see how a network administrator

More information

Operator Manual Maintenance Tool - Browse Tool

Operator Manual Maintenance Tool - Browse Tool Maintenance Tool Browse Tool Operator Manual Maintenance Tool Browse Tool Product Version: 4.6 Version of this manual: 2.0.3 2016 Inepro B.V. All rights reserved Table of Contents What is the Browse Tool?

More information

Install and Update Cisco Modeling Labs Release 1.2

Install and Update Cisco Modeling Labs Release 1.2 Install and Update Cisco Modeling Labs Release 1.2 Install Cisco Modeling Labs Version 1.2, page 1 Update User Workspace Management Settings, page 1 Import Projects into Cisco Modeling Labs Version 1.2,

More information

Lab DHCP Client Setup

Lab DHCP Client Setup Lab 9.3.5 DHCP Client Setup Objective The purpose of this lab is to introduce Dynamic Host Configuration Protocol (DHCP) and the process for setting up a network computer as a DHCP client to use DHCP services.

More information

6 MPLS Model User Guide

6 MPLS Model User Guide 6 MPLS Model User Guide Multi-Protocol Label Switching (MPLS) is a multi-layer switching technology that uses labels to determine how packets are forwarded through a network. The first part of this document

More information

Lab IP Addresses and Network Communication

Lab IP Addresses and Network Communication Lab 3.5.2 IP Addresses and Network Communication Objectives Build a simple peer-to-peer network and verify physical connectivity. Assign various IP addresses to hosts and observe the effects on network

More information

Order of Packet Transmission and Dropping

Order of Packet Transmission and Dropping LAB 11 Queuing Disciplines Order of Packet Transmission and Dropping OBJECTIVES The objective of this lab is to examine the effect of various queuing disciplines on packet delivery and delay for different

More information

SOFTWARE-DEFINED WAN (SD-WAN)

SOFTWARE-DEFINED WAN (SD-WAN) SOFTWARE-DEFINED WAN (SD-WAN) Device Bootstrapping User Guide This SD-WAN Bootstrapping Guide will take you through the necessary steps to connect your device to the network. There are two important actions

More information

DomainTools for Splunk

DomainTools for Splunk DomainTools for Splunk Installation Guide version 2.0 January 2018 Solution Overview The DomainTools Technology Add-On (TA) for Splunk populates a whois index with DomainTools Whois and Risk Score data

More information

Wireless Local Area Network (WLAN) - QoS 1.Introduction 2.Network scenario 3.Objectives

Wireless Local Area Network (WLAN) - QoS 1.Introduction 2.Network scenario 3.Objectives Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo Baltarejo

More information

VidBuilderFX Multi Videos

VidBuilderFX Multi Videos VidBuilderFX Multi Videos Multiple Videos: Open the VidBuilderFX app on your computer and login to your account of VidBuilderFX. After successful login, a dialogue box will appear which asks you to connect

More information

VidBuilderFX. Open the VidBuilderFX app on your computer and login to your account of VidBuilderFX.

VidBuilderFX. Open the VidBuilderFX app on your computer and login to your account of VidBuilderFX. VidBuilderFX General Walkthrough: Open the VidBuilderFX app on your computer and login to your account of VidBuilderFX. After successful login, a dialogue box will appear which asks you to connect with

More information

QuickBooks Windows Web Connect

QuickBooks Windows Web Connect QuickBooks for Windows Conversion Instructions QuickBooks Windows 2010-2013 Web Connect Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 DOCUMENTATION AND PROCEDURES... 3 Task 1: Conversion Preparation...

More information

Table of Contents. Cisco CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example

Table of Contents. Cisco CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example Table of Contents CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example...1 Document ID: 63611...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2

More information

Internet Explorer 9.x and Above for Windows

Internet Explorer 9.x and Above for Windows Internet Explorer 9.x and Above for Windows Page Setup From the File. dropdown menu, select 'Page Setup'. On the Page Setup screen: Set all margins to the minimum allowed. If you enter 0 for all margins,

More information

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support Quick Note 026 Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server Digi International Technical Support November 2015 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...

More information

Unity Desktop User Guide Hosted Voice Enterprise

Unity Desktop User Guide Hosted Voice Enterprise Unity Desktop User Guide Hosted Voice Enterprise April Diehl 11/30/2016 Published Version 1.2 2016, Charter Communications: All rights reserved. Revision History Date Revision Author Comments 2/8/15 1.0

More information

Provisioning Databases

Provisioning Databases DAT219x Provisioning Databases Lab 00 Getting Started Estimated time to complete this lab is 60 minutes Overview In this lab, you will provision a Microsoft Azure Virtual Machine (VM) that will be used

More information

Load Balancing For Clustered Barracuda CloudGen WAF Instances in the New Microsoft Azure Management Portal

Load Balancing For Clustered Barracuda CloudGen WAF Instances in the New Microsoft Azure Management Portal Load Balancing For Clustered Barracuda CloudGen WAF Instances in the New Microsoft Azure Management This guide will walk you through the steps to load balance traffic across multiple instances of the Barracuda

More information

Citrix Education Learning Journey

Citrix Education Learning Journey Citrix Education Learning Journey The road to becoming Citrix Certified doesn t need to be long and winding. Use our simple-to-follow learning paths to guide your Learning Journey. Getting started is easy.

More information

Deployment Models for Cisco UMG

Deployment Models for Cisco UMG Deployment Models for Cisco UMG First Published: February 28, 2008 If a business wants to deploy a Cisco UMG controlled messaging network with multiple sites, one of the key network design decisions that

More information

6234A - Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services

6234A - Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services 6234A - Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course Number: 6234A Course Length: 3 Days Course Overview This instructor-led course teaches students how to implement

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Digital Story Telling Microsoft Windows Movie Maker 2.0

Digital Story Telling Microsoft Windows Movie Maker 2.0 The Windows Movie Maker Interface Movie Tasks: Takes you step by step through the movie making process Document Area TimeLine: This is called the storyboard Project preview Area: Preview your project Saving

More information

Customizing the Cisco Unified MeetingPlace Express End-User Interfaces

Customizing the Cisco Unified MeetingPlace Express End-User Interfaces CHAPTER 13 Customizing the Cisco Unified MeetingPlace Express End-User Interfaces Revised: October 18, 2006, The Cisco Unified MeetingPlace Express system allows you to customize end-user interfaces. Topics

More information

Wireless Local Area Network (WLAN) Ad Hoc 1.Introduction 2.Network scenario 3.Objectives 4.Getting Started 1. Basics of OPNET Basics of OPNET

Wireless Local Area Network (WLAN) Ad Hoc 1.Introduction 2.Network scenario 3.Objectives 4.Getting Started 1. Basics of OPNET Basics of OPNET Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo Baltarejo

More information

Load Balancing VMware Workspace Portal/Identity Manager

Load Balancing VMware Workspace Portal/Identity Manager Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access

More information

Auto Register Cisco IP Communicator 8.6 with CUCM 8.x

Auto Register Cisco IP Communicator 8.6 with CUCM 8.x Auto Register Cisco IP Communicator 8.6 with CUCM 8.x Document ID: 113589 Contents Introduction Prerequisites Requirements Components Used Conventions CIPC Features and Benefits Secure VLAN Traversal High

More information

How to set up Restrictions on the ipad

How to set up Restrictions on the ipad 1) Tap on the Settings icon. How to set up Restrictions on the ipad ***You must have an itunes account*** 2) Tap on icloud-you will sign into icloud with your itunes account information. 3) Once you are

More information

Lab - Share Resources in Windows

Lab - Share Resources in Windows Introduction In this lab, you will create and share a folder, set permissions for the shares, create a Homegroup and a Workgroup to share resources, and map a network drive. Due to Windows Vista lack of

More information

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( ) Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Migration Technologies. Dual Stack and Tunneling Using GRE, 6to4, and 6in4.

Migration Technologies. Dual Stack and Tunneling Using GRE, 6to4, and 6in4. Migration Technologies. Dual Stack and Tunneling Using GRE, 6to4, and 6in4. 1 By Gaza IPv6 Project Team Eng. Mohammed Abu-Jamous Why Not Dual Stack? Dual Stack is very important in our migration plane.

More information

SonicOS Enhanced Release Notes

SonicOS Enhanced Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 4 Related Technical Documentation...7 Platform Compatibility The

More information

Inventory Reports. Detailed Device Report CHAPTER

Inventory Reports. Detailed Device Report CHAPTER CHAPTER 2 include the following device reports. Detailed Device Report Device Attributes Reports Generating a 24-Hour Inventory Change Report Hardware Reports Management Status Reports Software Reports

More information

Upgrade ASA and ASDM Cisco ASA Firewall

Upgrade ASA and ASDM Cisco ASA Firewall Upgrade ASA and ASDM Cisco ASA Firewall Complete these steps to upgrade a software image on the ASA 5500 using ASDM. 1. Select Tools > Upgrade Software... from the Home window of the ASDM. 2. Select the

More information

CDR Database Copy or Migration to Another Server

CDR Database Copy or Migration to Another Server CDR Database Copy or Migration to Another Server Document ID: 66974 Contents Introduction Prerequisites Requirements Components Used Conventions Background Supported Data Sources Topology Copy the CDR

More information

How to use Video Conferencing & Desktop Sharing on Magnet Voice

How to use Video Conferencing & Desktop Sharing on Magnet Voice How to use Video Conferencing & Desktop Sharing on Magnet Voice Video Conferencing and Collaboration CONTENTS User Guide... 1 1. How to set up a video session... 2. Running a video conference... 4 3. Screen

More information

Network Planning & Engineering

Network Planning & Engineering Network Planning & Engineering OPNET IT GURU Opnet IT Guru Opnet IT Guru Network Planner enable planning and design of multitechnology, multi vendor networks. Network Planner s unique ability to model

More information

Citrix Education Learning Journey

Citrix Education Learning Journey Citrix Education Learning Journey The road to becoming Citrix Certified doesn t need to be long and winding. Use our simple-to-follow learning paths to guide your Learning Journey. Getting started is easy.

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information

Working with Attributes

Working with Attributes Working with Attributes QGIS Tutorials and Tips Author Ujaval Gandhi http://www.spatialthoughts.com This work is licensed under a Creative Commons Attribution 4.0 International License. Working with Attributes

More information

Unified CVP Migration

Unified CVP Migration If there is a change in platform of a later release of Unified CVP, migration from the existing release to the later release is required. For example, moving from Unified CVP 8.5(1) to Unified CVP 10.0(1)

More information

Script Editor Feature Control

Script Editor Feature Control Script Feature Control Methods, page 1 Edit Options, page 2 Script Node Control, page 3 Create a Feature Control Set, page 4 Assign Users to a Feature Control Set, page 4 Select Script Nodes and Edit Options

More information

CDR Database Copy or Migration to Another Server

CDR Database Copy or Migration to Another Server CDR Database Copy or Migration to Another Server Document ID: 66974 Introduction Prerequisites Requirements Components Used Conventions Background Supported Data Sources Topology Copy the CDR Database

More information

VPN Auto Provisioning

VPN Auto Provisioning VPN Auto Provisioning You can configure various types of IPsec VPN policies, such as site-to-site policies, including GroupVPN, and route-based policies. For specific details on the setting for these kinds

More information

Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab

Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab 1 Overview QMF for Workstation is an Eclipse-based, rich client desktop Java application, that uses JDBC to connect to data

More information

Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced)

Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Administering a SQL Database Infrastructure Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Overview: This five-day instructor-led course provides students who administer

More information

MCR Connections to Oracle Cloud Infrastructure using FastConnect

MCR Connections to Oracle Cloud Infrastructure using FastConnect MCR Oracle via FastConnect (OCI) 1 MCR Oracle via FastConnect (OCI) MCR Connections to Oracle Cloud Infrastructure using FastConnect To connect to FastConnect using MCR, you will need an Oracle Cloud ID

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Dentrix Learning Edition. Installation Instructions

Dentrix Learning Edition. Installation Instructions Dentrix Learning Edition Installation Instructions 2 TIPS FOR A SUCCESSFUL INSTALLATION These steps have been prepared to help minimize or eliminate any issues when installing the Dentrix Learning Edition.

More information

Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services

Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course Details Course Outline Module 1: Introduction to Microsoft SQL Server Analysis Services This module introduces

More information

Configure Basic Firewall Settings on the RV34x Series Router

Configure Basic Firewall Settings on the RV34x Series Router Configure Basic Firewall Settings on the RV34x Series Router Objective The primary objective of a firewall is to control the incoming and outgoing network traffic by analyzing the data packets and determining

More information

RSVP: Resource Reservation Protocol

RSVP: Resource Reservation Protocol LAB 12 RSVP: Resource Reservation Protocol Providing QoS by Reserving Resources in the Network OBJECTIVES The objective of this lab is to study the Resource Reservation Protocol (RSVP) as part of the integrated

More information

InControl 2 Software Appliance Setup Guide

InControl 2 Software Appliance Setup Guide InControl 2 Software Appliance Setup Guide (Last updated: 2017-11) Contents 1. Introduction Minimum Hardware Requirements 2. For VMware ESXi 6.0 and ESXi 5.5 (SCSI) Networking Creating InControl and DB

More information

QuickBooks for Windows Conversion Instructions

QuickBooks for Windows Conversion Instructions QuickBooks for Windows Conversion Instructions Web Connect Introduction As Yolo Federal Credit Union completes its system conversion, you will need to modify your QuickBooks settings to ensure the smooth

More information

XenMobile 10 Cluster installation. Here is the task that would be completed in order to implement a XenMobile 10 Cluster.

XenMobile 10 Cluster installation. Here is the task that would be completed in order to implement a XenMobile 10 Cluster. XenMobile 10 Cluster installation Here is the task that would be completed in order to implement a XenMobile 10 Cluster. For this example, running on my lab, I am using XenServer 6.5 SP1 as hypervisor

More information

bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies

bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies Contents Custom Access Policies and Access Rules... 4 Introduction... 4 Custom Access Polices vs. Access Rules... 4 When an Access

More information

Implementing SBC Firewall Traversal and NAT

Implementing SBC Firewall Traversal and NAT CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the

More information

IS-381 / IS-382 IP Audio gateway. User Manual

IS-381 / IS-382 IP Audio gateway. User Manual IS-381 / IS-382 IP Audio gateway User Manual IS-381 IS-382 PORTech Communications Inc. Content 1. Introduction... 1 2. Functions... 1 3. Parts list... 2 4.Main body size... 2 5.Panel description... 3 6.Link

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

IQSweb Reference B. SQL Server 2008 R2 and Express Installation Instructions

IQSweb Reference B. SQL Server 2008 R2 and Express Installation Instructions SQL Server 2008 R2 and Express Installation Instructions Step 1: SQL Server 2008 R2 Installation files 1. If installing the full version of SQL Server, make sure that the Microsoft SQL Server 2008 R2 installation

More information

CIS 76 VLab Pod Setup

CIS 76 VLab Pod Setup CIS 76 VLab Pod Setup Last updated 9/4/2017 Status on setup instructions: 1. pfsense (2.3.1, 64 bit) pfsense-ce-2.3.4-release-amd64 - DONE for Fa17 2. Kali (2017.1, 64 bit) kali-linux-2017.1-amd64.iso

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management

More information