Lab 6: Evaluating Firewall Policies to Manage Network Traffic
|
|
- Logan Oliver
- 5 years ago
- Views:
Transcription
1 Lab 6: Evaluating Firewall Policies to Manage Network Traffic Objective This lab teaches the fundamentals of implementing firewall policies and understanding its effect on application performance and link utilizations. Overview Standard Chartered Bank s headquarters network connects to the Internet through a CISCO PIX Firewall. Users use various online applications including , web browsing, and credit card authorization. In addition, some users are doing illegal file transfers for pirated music and videos. First we ll evaluate the application performance with no firewall policies. Thus, no illicit traffic is blocked. Standard Chartered Bank s most critical application is credit card authorization. It is required to have a response time of less than 2 seconds. Lab Instructions Step 1: Open Lab 1 1. Start IT Guru. 2. Select File Open 3. Scroll down to the project named Firewall_Implementation, select it and click OK. OPNET IT Guru Lab 6, Page 1
2 Simulate the network for a busy hour of the day to evaluate the performance of the critical application. Step 2: Configure and Run the Simulation Evaluate the network performance for a busy hour of the day. 1. Click on the configure/run simulation toolbar button. 2. Make sure the Simulation Duration is set to 1 hour. 3. Click Run. Monitor the progress bar as the simulation proceeds. OPNET IT Guru Lab 6, Page 2
3 4. When the simulation completes, Click Close. Step 3: View Results View the credit card authorization response time for all the users and also the WAN link utilization. As mentioned earlier, the critical credit card authorization application s response time is required to be less than 2 seconds. 1. Right-click in the workspace and select View Results. 2. Choose Global Statistics DB Query Response Time (sec). 3. Select Show. Now add the average curve to this window. 4. Change the filter from As Is to average and click Add. OPNET IT Guru Lab 6, Page 3
4 5. Click on the graph window having the discrete data points for this statistic to add this curve on that panel. 6. Click Close in the View Results window. 7. Right-click on the WAN link and select View Results to view its utilization. OPNET IT Guru Lab 6, Page 4
5 8. Choose point-to-point utilization and click Show. Note: To toggle the graphs on and off, use the hide or show all graphs button. 9. Close the View Results window. OPNET IT Guru Lab 6, Page 5
6 Your results should be similar to the graph above. The results show that the Credit Card Authorization Response Time is above the required limit of 2 seconds. Also the WAN link utilization is high which might contribute to unacceptable application response times. The company decided to configure the firewall to block peer-to-peer file transfers to see its effect on the application performance. Step 4: Duplicate Scenario 1. Select Scenarios Duplicate Scenario 2. Give the name as Firewall Implemented. Step 5: Configure the CISCO PIX Firewall Configure the firewall to block video traffic. 1. Right-click on the CISCO PIX Firewall and select Edit Attributes. 2. Click in the Value column for Proxy Server Information. OPNET IT Guru Lab 6, Page 6
7 3. Scroll down to Voice and change the value for Proxy Server Deployed from Yes to No and then click OK twice. Step 6: Configure and Run the Simulation Rerun the simulation for a busy hour of the day to see if implementing the firewall improves application performance. Refer to previous steps for setting the duration and running the simulation. OPNET IT Guru Lab 6, Page 7
8 Step 7: Compare Results Compare the Credit Card Authorization Application Response Time and also the WAN link utilization. 1. Right-click in the workspace and select Compare Results. 2. Choose Global Statistics DB Query Response Time (sec). 3. Click Show and then click Close in the View Results window. 4. Right-click on the WAN link and select Compare Results. 5. Choose point-to-point utilization. 6. Click Show and then close the View Results window. OPNET IT Guru Lab 6, Page 8
9 Conclusion As expected, the results show that implementing the firewall had a significant improvement in the credit card authorization application performance. The utilization graph shows significant reduction in the WAN link utilization due to the firewall policy, thereby improving the application performance. By mandating the firewall policy to stop illicit peer-to-peer file transfers, the company is able to achieve the required performance for the critical credit card authorization. Advanced Scenario Advanced Scenario 1. Duplicate the scenario Without_Firewall_Implementation and then, instead of implementing the firewall, upgrade the WAN link and see its effect on the critical application response time. OPNET IT Guru Lab 6, Page 9
Lab 4: Changing Frame Relay PVC Speeds in a WAN Environment
Objective Lab 4: Changing Frame Relay PVC Speeds in a WAN Environment This lab investigates the performance of applications across a Wide Area Network. We examine how changing the speeds of Frame Relay
More informationLab 2: Multistory Building LAN: Daisy Chain Versus Collapsed Backbone Architecture
Objective Lab 2: Multistory Building LAN: Daisy Chain Versus Collapsed Backbone Architecture This lab teaches the application performance of two different network architectures: Daisy Chain and Collapsed
More informationLab 1: Improving performance by LAN Hardware Upgrade
Lab 1: Improving performance by LAN Hardware Upgrade Objective In this lab, OPNET s IT Guru Academic Edition advanced modeling software will be used to study performance improvements in LAN obtained by
More informationSecurity Lab 1 Firewall Performance
Security Lab 1 Firewall Performance This lab has been partially based on OPNET Lab Manual To Accompany Data and Computer Communications, by Kevin Brown and Leann Christianson, Prentice Hall, 2004. Objective
More informationLab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Requirement Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network This set of labs works in conjunction with Professor Ray Panko s textbook, Business Data Networks and Telecommunications.
More informationLAB 1: Evaluating Internet Connection Choices for a Small Home PC Network
LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.
More informationNetwork Design. Planning a Network with Different Users, Hosts, and Services. Laboratory. Objective. Overview
Laboratory 4 Network Design Planning a Network with Different Users, Hosts, and Services Objective The objective of this lab is to demonstrate the basics of designing a network, taking into consideration
More informationTCP versus UDP Response Time
Lab 9 TCP versus UDP Response Time Overview TCP provides connection-oriented service at the transport layer, and UDP provides connectionless service. As a result, a data exchange using TCP can take longer
More informationObjective To examine the throughput of a TCP connection as the flow control window size is varied.
Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions
More informationOVERVIEW WARNING! DATE: INFORMÁTICAS LAB ASSIGNMENT 3
PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 3 DATE: 2010.11 OVERVIEW The Internet can be used to transmit data from a variety of applications across an infrastructure shared by millions
More informationObjective To examine the change in throughput in a local area network when upgrading from a hub to a switch.
Lab 2 Switches versus Hubs Overview Ethernet hubs work at the physical layer, simply repeating any frames they receive on one port onto all other ports. For this reason, they are also called multiport
More informationFrame Relay Network Performance
Lab 4 Frame Relay Network Performance Overview Frame Relay is a connection-oriented, unreliable technology based on virtual circuits. A virtual circuit must be set up between a source and destination before
More informationShared Ethernet Networks
Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a
More informationSwitched LANs A Set of Local Area Networks Interconnected by Switches
Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help
More informationAnalyze performance of the following voice codecs: G.711 Silence, G K, G K Silence, G K, G K, G.729A, G.
Lab 3 TCOM631 Overview The goal of this lab is to teach you how simulation and modeling can be used in analyzing applications and networks. You will use Riverbed (OPNET) Modeler Academic Edition, simulation
More informationIntroduction to Modeler
Table of Contents Lab: Using The Project Editor...2 Lab: Building a First Network...11 Lab: Using Other Editors...28 Extra Credit Lab: Discrete Event Simulation Studies...32 Lab: Node Modeling...39 Lab:
More informationIT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS
Project Overview IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS This project along with the Phase II IT Infrastructure Project will help you understand how a network administrator improves network performance
More informationSwitched LANs. A Set of Local Area Networks Interconnected by Switches
Laboratory 3 Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this
More informationEng 3553 Lab #5 TCP Throughput
Eng 3553 Lab #5 TCP Throughput Overview TCP (Transmission Control Protocol) is a means for building a reliable communications stream, enabling two hosts to establish a connection and exchange streams of
More informationThis document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com].
Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Área: Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo
More informationAbstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a
Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most
More informationAdvanced Communication Lab OPNET Tutorial
Advanced Communication Lab OPNET Tutorial SS 2013 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the
More informationSecurity Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
More informationIT Guru Academic Edition does not work correctly with number representations different from English.
PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 1 DATE: 2009.10.19 OVERVIEW The purpose of this lab is to introduce the main concepts involved in modeling Local Area Networks (LAN) based
More informationAdvanced Communication Lab OPNET Tutorial
Advanced Communication Lab OPNET Tutorial SS 2014 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the
More informationCHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in
CHAPTER 4 4. Simulation procedure 4.1 Introduction The main aim of this chapter is to discuss the simulation procedure followed in evaluating the performance of AODV under black hole attacks. As discussed
More informationLAN Modeling. Overview
LAN Modeling Overview This lesson focuses on the use of LAN models and background link utilization. You will learn to Configure the object palette with the models you need Set up application and profile
More informationEthernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview
Laboratory 1 Ethernet A Direct Link Network with Media Access Control Objective This lab is designed to demonstrate the operation of the Ethernet network. The simulation in this lab will help you examine
More informationIntroduction to SITL. Objective
Introduction to SITL Objective This tutorial provides a quick introduction to System-in-the-Loop (SITL) functionality, which allows physical hardware and a simulation to interact as a unified system. It
More informationLab - Configure the Firewall in Windows 8
Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two computers directly connected or connected over the network Windows 8 installed
More informationSecurity Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
More informationOrder of Packet Transmission and Dropping
Laboratory 9 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for
More informationIX: Detailed Infomation
IX: Detailed Infomation 1 IX: Detailed Infomation Megaport owns and operates a series of Internet peering exchanges in the majority of our networks globally. IXs provide greater efficiency between networks
More informationFirmware Upgrade Troubleshooting on 300/500 Series Managed Switches
Article ID: 5007 Firmware Upgrade Troubleshooting on 300/500 Series Managed Switches Objective Firmware is a combination of software and hardware that has program code and data stored on it. Upgrading
More informationTo start using Opnet modeller, select the program icon from the programs menu.
Lab 1, Getting Started with Opnet Modeler Creating a new Project To start using Opnet modeller, select the program icon from the programs menu. - The Opnet modeller program icon. Once the program has initialised
More informationLab - Configure the Firewall in Windows 7 and Vista
Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two computers directly connected or connected on a network Windows installed
More informationCallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example
CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example Document ID: 63611 Contents Introduction Prerequisites Requirements Components Used Conventions Cisco CallManager
More informationIT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS
Prjoect Overview IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS Phase II of the project will pick up where the IT Infrastructure Project Phase I left off. In this project, you will see how a network administrator
More informationOperator Manual Maintenance Tool - Browse Tool
Maintenance Tool Browse Tool Operator Manual Maintenance Tool Browse Tool Product Version: 4.6 Version of this manual: 2.0.3 2016 Inepro B.V. All rights reserved Table of Contents What is the Browse Tool?
More informationInstall and Update Cisco Modeling Labs Release 1.2
Install and Update Cisco Modeling Labs Release 1.2 Install Cisco Modeling Labs Version 1.2, page 1 Update User Workspace Management Settings, page 1 Import Projects into Cisco Modeling Labs Version 1.2,
More informationLab DHCP Client Setup
Lab 9.3.5 DHCP Client Setup Objective The purpose of this lab is to introduce Dynamic Host Configuration Protocol (DHCP) and the process for setting up a network computer as a DHCP client to use DHCP services.
More information6 MPLS Model User Guide
6 MPLS Model User Guide Multi-Protocol Label Switching (MPLS) is a multi-layer switching technology that uses labels to determine how packets are forwarded through a network. The first part of this document
More informationLab IP Addresses and Network Communication
Lab 3.5.2 IP Addresses and Network Communication Objectives Build a simple peer-to-peer network and verify physical connectivity. Assign various IP addresses to hosts and observe the effects on network
More informationOrder of Packet Transmission and Dropping
LAB 11 Queuing Disciplines Order of Packet Transmission and Dropping OBJECTIVES The objective of this lab is to examine the effect of various queuing disciplines on packet delivery and delay for different
More informationSOFTWARE-DEFINED WAN (SD-WAN)
SOFTWARE-DEFINED WAN (SD-WAN) Device Bootstrapping User Guide This SD-WAN Bootstrapping Guide will take you through the necessary steps to connect your device to the network. There are two important actions
More informationDomainTools for Splunk
DomainTools for Splunk Installation Guide version 2.0 January 2018 Solution Overview The DomainTools Technology Add-On (TA) for Splunk populates a whois index with DomainTools Whois and Risk Score data
More informationWireless Local Area Network (WLAN) - QoS 1.Introduction 2.Network scenario 3.Objectives
Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo Baltarejo
More informationVidBuilderFX Multi Videos
VidBuilderFX Multi Videos Multiple Videos: Open the VidBuilderFX app on your computer and login to your account of VidBuilderFX. After successful login, a dialogue box will appear which asks you to connect
More informationVidBuilderFX. Open the VidBuilderFX app on your computer and login to your account of VidBuilderFX.
VidBuilderFX General Walkthrough: Open the VidBuilderFX app on your computer and login to your account of VidBuilderFX. After successful login, a dialogue box will appear which asks you to connect with
More informationQuickBooks Windows Web Connect
QuickBooks for Windows Conversion Instructions QuickBooks Windows 2010-2013 Web Connect Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 DOCUMENTATION AND PROCEDURES... 3 Task 1: Conversion Preparation...
More informationTable of Contents. Cisco CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example
Table of Contents CallManager MoH uses G.711 Codec while Voice Calls use G.729 Codec Configuration Example...1 Document ID: 63611...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2
More informationInternet Explorer 9.x and Above for Windows
Internet Explorer 9.x and Above for Windows Page Setup From the File. dropdown menu, select 'Page Setup'. On the Page Setup screen: Set all margins to the minimum allowed. If you enter 0 for all margins,
More informationQuick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support
Quick Note 026 Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server Digi International Technical Support November 2015 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...
More informationUnity Desktop User Guide Hosted Voice Enterprise
Unity Desktop User Guide Hosted Voice Enterprise April Diehl 11/30/2016 Published Version 1.2 2016, Charter Communications: All rights reserved. Revision History Date Revision Author Comments 2/8/15 1.0
More informationProvisioning Databases
DAT219x Provisioning Databases Lab 00 Getting Started Estimated time to complete this lab is 60 minutes Overview In this lab, you will provision a Microsoft Azure Virtual Machine (VM) that will be used
More informationLoad Balancing For Clustered Barracuda CloudGen WAF Instances in the New Microsoft Azure Management Portal
Load Balancing For Clustered Barracuda CloudGen WAF Instances in the New Microsoft Azure Management This guide will walk you through the steps to load balance traffic across multiple instances of the Barracuda
More informationCitrix Education Learning Journey
Citrix Education Learning Journey The road to becoming Citrix Certified doesn t need to be long and winding. Use our simple-to-follow learning paths to guide your Learning Journey. Getting started is easy.
More informationDeployment Models for Cisco UMG
Deployment Models for Cisco UMG First Published: February 28, 2008 If a business wants to deploy a Cisco UMG controlled messaging network with multiple sites, one of the key network design decisions that
More information6234A - Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services
6234A - Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course Number: 6234A Course Length: 3 Days Course Overview This instructor-led course teaches students how to implement
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationDigital Story Telling Microsoft Windows Movie Maker 2.0
The Windows Movie Maker Interface Movie Tasks: Takes you step by step through the movie making process Document Area TimeLine: This is called the storyboard Project preview Area: Preview your project Saving
More informationCustomizing the Cisco Unified MeetingPlace Express End-User Interfaces
CHAPTER 13 Customizing the Cisco Unified MeetingPlace Express End-User Interfaces Revised: October 18, 2006, The Cisco Unified MeetingPlace Express system allows you to customize end-user interfaces. Topics
More informationWireless Local Area Network (WLAN) Ad Hoc 1.Introduction 2.Network scenario 3.Objectives 4.Getting Started 1. Basics of OPNET Basics of OPNET
Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo Baltarejo
More informationLoad Balancing VMware Workspace Portal/Identity Manager
Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access
More informationAuto Register Cisco IP Communicator 8.6 with CUCM 8.x
Auto Register Cisco IP Communicator 8.6 with CUCM 8.x Document ID: 113589 Contents Introduction Prerequisites Requirements Components Used Conventions CIPC Features and Benefits Secure VLAN Traversal High
More informationHow to set up Restrictions on the ipad
1) Tap on the Settings icon. How to set up Restrictions on the ipad ***You must have an itunes account*** 2) Tap on icloud-you will sign into icloud with your itunes account information. 3) Once you are
More informationLab - Share Resources in Windows
Introduction In this lab, you will create and share a folder, set permissions for the shares, create a Homegroup and a Workgroup to share resources, and map a network drive. Due to Windows Vista lack of
More informationEvaluation Guide Host Access Management and Security Server 12.4 SP1 ( )
Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationMigration Technologies. Dual Stack and Tunneling Using GRE, 6to4, and 6in4.
Migration Technologies. Dual Stack and Tunneling Using GRE, 6to4, and 6in4. 1 By Gaza IPv6 Project Team Eng. Mohammed Abu-Jamous Why Not Dual Stack? Dual Stack is very important in our migration plane.
More informationSonicOS Enhanced Release Notes
SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 4 Related Technical Documentation...7 Platform Compatibility The
More informationInventory Reports. Detailed Device Report CHAPTER
CHAPTER 2 include the following device reports. Detailed Device Report Device Attributes Reports Generating a 24-Hour Inventory Change Report Hardware Reports Management Status Reports Software Reports
More informationUpgrade ASA and ASDM Cisco ASA Firewall
Upgrade ASA and ASDM Cisco ASA Firewall Complete these steps to upgrade a software image on the ASA 5500 using ASDM. 1. Select Tools > Upgrade Software... from the Home window of the ASDM. 2. Select the
More informationCDR Database Copy or Migration to Another Server
CDR Database Copy or Migration to Another Server Document ID: 66974 Contents Introduction Prerequisites Requirements Components Used Conventions Background Supported Data Sources Topology Copy the CDR
More informationHow to use Video Conferencing & Desktop Sharing on Magnet Voice
How to use Video Conferencing & Desktop Sharing on Magnet Voice Video Conferencing and Collaboration CONTENTS User Guide... 1 1. How to set up a video session... 2. Running a video conference... 4 3. Screen
More informationNetwork Planning & Engineering
Network Planning & Engineering OPNET IT GURU Opnet IT Guru Opnet IT Guru Network Planner enable planning and design of multitechnology, multi vendor networks. Network Planner s unique ability to model
More informationCitrix Education Learning Journey
Citrix Education Learning Journey The road to becoming Citrix Certified doesn t need to be long and winding. Use our simple-to-follow learning paths to guide your Learning Journey. Getting started is easy.
More informationIntegrate Sophos Enterprise Console. EventTracker v8.x and above
Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events
More informationWorking with Attributes
Working with Attributes QGIS Tutorials and Tips Author Ujaval Gandhi http://www.spatialthoughts.com This work is licensed under a Creative Commons Attribution 4.0 International License. Working with Attributes
More informationUnified CVP Migration
If there is a change in platform of a later release of Unified CVP, migration from the existing release to the later release is required. For example, moving from Unified CVP 8.5(1) to Unified CVP 10.0(1)
More informationScript Editor Feature Control
Script Feature Control Methods, page 1 Edit Options, page 2 Script Node Control, page 3 Create a Feature Control Set, page 4 Assign Users to a Feature Control Set, page 4 Select Script Nodes and Edit Options
More informationCDR Database Copy or Migration to Another Server
CDR Database Copy or Migration to Another Server Document ID: 66974 Introduction Prerequisites Requirements Components Used Conventions Background Supported Data Sources Topology Copy the CDR Database
More informationVPN Auto Provisioning
VPN Auto Provisioning You can configure various types of IPsec VPN policies, such as site-to-site policies, including GroupVPN, and route-based policies. For specific details on the setting for these kinds
More informationUsing the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab
Using the IMS Universal Drivers and QMF to Access Your IMS Data Hands-on Lab 1 Overview QMF for Workstation is an Eclipse-based, rich client desktop Java application, that uses JDBC to connect to data
More informationDuration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced)
Administering a SQL Database Infrastructure Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Overview: This five-day instructor-led course provides students who administer
More informationMCR Connections to Oracle Cloud Infrastructure using FastConnect
MCR Oracle via FastConnect (OCI) 1 MCR Oracle via FastConnect (OCI) MCR Connections to Oracle Cloud Infrastructure using FastConnect To connect to FastConnect using MCR, you will need an Oracle Cloud ID
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationDentrix Learning Edition. Installation Instructions
Dentrix Learning Edition Installation Instructions 2 TIPS FOR A SUCCESSFUL INSTALLATION These steps have been prepared to help minimize or eliminate any issues when installing the Dentrix Learning Edition.
More informationImplementing and Maintaining Microsoft SQL Server 2008 Analysis Services
Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course Details Course Outline Module 1: Introduction to Microsoft SQL Server Analysis Services This module introduces
More informationConfigure Basic Firewall Settings on the RV34x Series Router
Configure Basic Firewall Settings on the RV34x Series Router Objective The primary objective of a firewall is to control the incoming and outgoing network traffic by analyzing the data packets and determining
More informationRSVP: Resource Reservation Protocol
LAB 12 RSVP: Resource Reservation Protocol Providing QoS by Reserving Resources in the Network OBJECTIVES The objective of this lab is to study the Resource Reservation Protocol (RSVP) as part of the integrated
More informationInControl 2 Software Appliance Setup Guide
InControl 2 Software Appliance Setup Guide (Last updated: 2017-11) Contents 1. Introduction Minimum Hardware Requirements 2. For VMware ESXi 6.0 and ESXi 5.5 (SCSI) Networking Creating InControl and DB
More informationQuickBooks for Windows Conversion Instructions
QuickBooks for Windows Conversion Instructions Web Connect Introduction As Yolo Federal Credit Union completes its system conversion, you will need to modify your QuickBooks settings to ensure the smooth
More informationXenMobile 10 Cluster installation. Here is the task that would be completed in order to implement a XenMobile 10 Cluster.
XenMobile 10 Cluster installation Here is the task that would be completed in order to implement a XenMobile 10 Cluster. For this example, running on my lab, I am using XenServer 6.5 SP1 as hypervisor
More informationbt-webfilter Administrator s Guide: Access Rules & Custom Access Policies
bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies Contents Custom Access Policies and Access Rules... 4 Introduction... 4 Custom Access Polices vs. Access Rules... 4 When an Access
More informationImplementing SBC Firewall Traversal and NAT
CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the
More informationIS-381 / IS-382 IP Audio gateway. User Manual
IS-381 / IS-382 IP Audio gateway User Manual IS-381 IS-382 PORTech Communications Inc. Content 1. Introduction... 1 2. Functions... 1 3. Parts list... 2 4.Main body size... 2 5.Panel description... 3 6.Link
More informationConfiguration Manager
CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings
More informationIQSweb Reference B. SQL Server 2008 R2 and Express Installation Instructions
SQL Server 2008 R2 and Express Installation Instructions Step 1: SQL Server 2008 R2 Installation files 1. If installing the full version of SQL Server, make sure that the Microsoft SQL Server 2008 R2 installation
More informationCIS 76 VLab Pod Setup
CIS 76 VLab Pod Setup Last updated 9/4/2017 Status on setup instructions: 1. pfsense (2.3.1, 64 bit) pfsense-ce-2.3.4-release-amd64 - DONE for Fa17 2. Kali (2017.1, 64 bit) kali-linux-2017.1-amd64.iso
More informationIM and Presence Service Network Setup
Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management
More information