Securing the Software-Defined Network Control Layer
|
|
- Imogen Joy Warner
- 5 years ago
- Views:
Transcription
1 Securing the Software-Defined Network Control Layer Speaker: Yuyan Lin 2017/5/9 P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, Securing the Software Defined Network Control Layer, In NDSS, pp.1-15, 2015.
2 Outline Introduction Challenge Design Conclusion
3 Introduction the SDN community lacks a secure control-layer to manage the interactions between the application layer and the switch infrastructure security extensions at the control layer to provide the security management and arbitration of conflicting flow rules that arise when multiple applications are deployed within the same network
4 Introduction We present a prototype of our design as a Security Enhanced version of the widely used OpenFlow Floodlight Controller, which we call SE-Floodlight SE-Floodlight extends Floodlight with a securityenforcement kernel (SEK) layer, whose functions are also directly applicable to other OpenFlow controllers
5 Introduction SEK : authentication service role-based authorization permission model for mediating all configuration change requests to the data-plane inline flow-rule conflict resolution security audit service
6 Outline Introuduction Challenge Design Conclusion
7 challenge Challenge 1: Application Co-existence
8 challenge Google s OpenFlow-based B4 private WAN network manager
9 challenge Challenge 2: Flow Constraints vs. Flow Circuits Set action empowers apps to instruct a switch to rewrite the header attributes of a matching flow Output to table indicates that once the set operation is performed, the result should continue evaluation among the remaining flow rules
10 challenge Challenge 3: An Application Permission Model In addition to creating flow rules, OpenFlow provides apps with a wide range of switch commands and probes. For example, applications may reconfigure a switch in a manner that changes how the switch processes flow rules. While network operators might choose to run a third party OF app, OpenFlow offers them no ability to constrain which commands and requests the apps will issue to the switch
11 challenge Challenge 4: Application Accountability The absence of design considerations for multi-app support in OpenFlow also results in a lack of ability for the control layer to verify which app has issued which flow rule
12 challenge Challenge 5: Privilege separation privilege separation dictates that the element responsible for security mediation should operate independently from those elements it mediates. Thus, for the OpenFlow control layer to operate as a truly independent mediator, applications should not be instantiated in the same process context as the controller.
13 Northbound API Northbound API : an API defined to transmit messages between the OpenFlow application and control layers, where each operates in a separate process context The most unique and important aspect of this Northbound API specification is its ability to assign an authenticated application credential to every OpenFlow message that passes through the API.
14 Outline Introduction Challenge Design Conclusion
15 Designing an openflow mediation policy
16 Designing an openflow mediation policy APP :intended primarily for (non-security-related) traffic engineering applications, and provides sufficient permissions for most such flow-control applications. SEC :intended for applications that implement security services ADMIN : intended for applications such as the operator console app.
17 Designing an openflow mediation policy Global read represents data-plane events that are streamed to all interested applications who care to receive them Selected read operations refer to individual events for which an application can register through the controller to receive switch state-change notifications Permission :perform direct alterations to the network flow policies implemented by the switch, or enable the operator to control switch configuration or to test switch accessibility
18 Design of a secure control mediation layer
19 Design of a secure control mediation layer
20 Conflict Detection and Resolution OpenFlow rule r
21
22 RCA Algorithm Step 1: Testing for direct conflict Step 2: Detect a tail(head)-chaining candidate rule Tail chaining occurs with a resident rule, r, when r.action ==O_t and r.set mods matches rc.criteria (the criteria of our candidate rule). Head Chaining is the complementary case, where rc.action == O_t and rc.set mods matches r.criteria. Step 3: Chained rule conflict analysis Matching Precedence Policy
23 Test case: Rule rejection due to insufficient priority
24 Security audit service Ndb : postcard-based strategy NetSight : tracking packet traversal history through the network SE-Floodlight :tracking all security-relevant events which are visible to the control plane
25 Performance evalution
26 Outline Introduction Challenge Design Conclusion
27 conclusion Introduce the notion of OF-app security roles Rule-chain Conflict Analysis algorithm Northbound API that provides authenticated per-message credentials application-layer audit subsystem
Securing the Software-Defined Network Control Layer
Securing the Software-Defined Network Control Layer Phillip Porras, Steven Cheung, Martin Fong, Keith Skinner, and Vinod Yegneswaran Computer Science Laboratory SRI International {porras,cheung,mwfong,skinner,vinod}@csl.sri.com
More informationSecuring Network Application Deployment in Software Defined Networking 11/23/17
Securing Network Application Deployment in Software Defined Networking Yuchia Tseng, Farid Naıı t-abdesselam, and Ashfaq Khokhar 11/23/17 1 Outline Introduction to OpenFlow-based SDN Security issues of
More informationLecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 14 SDN and NFV Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Traditional network vs SDN TRADITIONAL Closed equipment Software + hardware Cost Vendor-specific management.
More informationOperationCheckpoint: SDN Application Control
OperationCheckpoint: SDN Application Control Scott-Hayward, S., Kane, C., & Sezer, S. (2014). OperationCheckpoint: SDN Application Control. In The 22nd IEEE International Conference on Network Protocols
More informationDraft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network
Draft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network Summary This recommendation is to analyze the security threats of the SDN-based Service Function
More informationProfessor Yashar Ganjali Department of Computer Science University of Toronto
Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Some slides courtesy of J. Rexford (Princeton), N. Foster (Cornell)
More informationEnabling a SuperFacility with Software Defined Networking
Enabling a SuperFacility with Software Defined Networking Shane Canon Tina Declerck, Brent Draney, Jason Lee, David Paul, David Skinner May 2017 CUG 2017-1 - SuperFacility - Defined Combining the capabilities
More informationSoftware-Defined Networking (Continued)
Software-Defined Networking (Continued) CS640, 2015-04-23 Announcements Assign #5 released due Thursday, May 7 at 11pm Outline Recap SDN Stack Layer 2 Learning Switch Control Application Design Considerations
More informationSDN/DANCES Project Update Developing Applications with Networking Capabilities via End-to-end SDN (DANCES)
SDN/DANCES Project Update Developing Applications with Networking Capabilities via End-to-end SDN (DANCES) Kathy L. Benninger Manager of Networking Research PSC Bettis Briefing 15 September 2015 Agenda
More informationOpenADN: A Case for Open Application Delivery Networking
OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer
More informationWHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationSoftware Defined Networking
Software Defined Networking Daniel Zappala CS 460 Computer Networking Brigham Young University Proliferation of Middleboxes 2/16 a router that manipulatees traffic rather than just forwarding it NAT rewrite
More informationCisco Extensible Network Controller
Data Sheet Cisco Extensible Network Controller Product Overview Today s resource intensive applications are making the network traffic grow exponentially putting high demands on the existing network. Companies
More informationPacket-Optical SDN Field Trial for Multi-Layer Network Optimization. Jim Theodoras May 2016
Packet-Optical SDN Field Trial for Multi-Layer Network Optimization Jim Theodoras May 2016 OSI Stack Top of Stack 7 6 5 Application Presentation Session Data 4 Transport Layer TCP, UDP Segments SDN 3 Network
More informationFirewall A New Approach to Solve Issues in Software Define Networking
RESEARCH ARTICLE OPEN ACCESS Firewall A New Approach to Solve Issues in Software Define Networking S.Vasudevan Assistant Professor CSE Department, Chendu College Of Engineering And Technology, Chennai.
More informationECIT Institute (Est.2003)
ECIT Institute (Est.2003) Research Excellence & Innovation 180 people 4 Queen s University Belfast Research Groups - Digital Communications - High Frequency Electronics - Speech, Imaging and Vision Systems
More informationTyphoon: An SDN Enhanced Real-Time Big Data Streaming Framework
Typhoon: An SDN Enhanced Real-Time Big Data Streaming Framework Junguk Cho, Hyunseok Chang, Sarit Mukherjee, T.V. Lakshman, and Jacobus Van der Merwe 1 Big Data Era Big data analysis is increasingly common
More informationONOS OVERVIEW. Architecture, Abstractions & Application
ONOS OVERVIEW Architecture, Abstractions & Application WHAT IS ONOS? Open Networking Operating System (ONOS) is an open source SDN network operating system (controller). Mission: to enable Service Providers
More informationOTSDN What is it? Does it help?
OTSDN What is it? Does it help? Dennis Gammel Schweitzer Engineering Laboratories, Inc. Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security cred-c.org Important Aspects
More informationDesign and deployment of secure, robust, and resilient SDN Controllers
Design and deployment of secure, robust, and resilient SDN Controllers Sandra Scott-Hayward Centre for Secure Information Technology (CSIT), Queen s University Belfast, Belfast, BT3 9DT, N. Ireland Email:
More informationGoogle Calendar Integration
Google Calendar Integration Version 1.2 gradleaders.com 614.791.9000 Table of Contents TABLE OF CONTENTS OVERVIEW... 1 Google Calendar Integration Configuration Steps... 1 Required Items for Integration...
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the
More informationOpenFlow: What s it Good for?
OpenFlow: What s it Good for? Apricot 2016 Pete Moyer pmoyer@brocade.com Principal Solutions Architect Agenda SDN & OpenFlow Refresher How we got here SDN/OF Deployment Examples Other practical use cases
More informationDeveloping Solutions for Google Cloud Platform (CPD200) Course Agenda
Developing Solutions for Google Cloud Platform (CPD200) Course Agenda Module 1: Developing Solutions for Google Cloud Platform Identify the advantages of Google Cloud Platform for solution development
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationSoftware Defined Networking
CSE343/443 Lehigh University Fall 2015 Software Defined Networking Presenter: Yinzhi Cao Lehigh University Acknowledgement Many materials are borrowed from the following links: https://www.cs.duke.edu/courses/spring13/compsc
More information1 Hitachi ID Mobile Access. 2 The BYOD challenge. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Mobile Access Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Secure Access to On-Premise IAM from Devices. 2 The BYOD challenge Users Want to access everything
More informationA use-case based analysis of network managment functions in the ONF SDN model
A use-case based analysis of network managment functions in the ONF SDN model Alisa Devlic (Ericsson Research) Wolfgang John (Ericsson Research) Pontus Sköldström (Acreo) Funded by the EU FP7 project SPARC
More informationGetting Started with OmniVista Security
Getting Started with OmniVista Security Getting Started with OmniVista Security The Users and User Groups application enables you to control user access to OmniVista and to network switches. Access to
More informationSDN-based Network Obfuscation. Roland Meier PhD Student ETH Zürich
SDN-based Network Obfuscation Roland Meier PhD Student ETH Zürich This Talk This thesis vs. existing solutions Alice Bob source: Alice destination: Bob Hi Bob, Hi Bob, Payload encryption ǾǼōĦ
More informationIEEE Sec Dev Conference
IEEE Sec Dev Conference #23, Improving Attention to Security in Software Design with Analytics and Cognitive Techniques Jim Whitmore (former) IBM Distinguished Engineer Carlisle, PA jjwhitmore@ieee.org
More informationONUG SDN Federation/Operability
ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software
More informationSoftware-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK)
Software-Defined Networking Daphné Tuncer Department of Computing Imperial College London (UK) dtuncer@ic.ac.uk 25/10/2018 Agenda Part I: Principles of Software-Defined Networking (SDN) 1. Why a lecture
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationSoftware-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017
Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Traditional Ethernet Challenges Plug-and-play Allow all ROOT D D D D Nondeterministic Reactive failover Difficult
More informationFirewall offloading based on SDN and NFV
Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Firewall offloading based on SDN and NFV ITG 5.2.2/5.2.4 05.12.2016 Raphael Durner r.durner@tum.de
More informationTowards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, Guofei Gu SUCCESS Lab Texas A&M University Outline Introduction & Motivation
More informationApplication Delivery Using Software Defined Networking
Application Delivery Using Software Defined Networking Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu GITPro World 2013, Palo Alto, CA, April
More informationVirtual Cloud Network Level 200. Jamal Arif November 2018
Virtual Cloud Network Level 200 Jamal Arif November 2018 Copyright Copyright 2018, Oracle 2018, and/or Oracle its and/or affiliates. its affiliates. All rights All reserved. rights reserved. 1 Safe Harbor
More informationRead the following information carefully, before you begin an upgrade.
Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing
More informationControl as LCD for future networking
IETF 96 IRTF SDNRG Berlin, Germany July 22, 2016 Control as LCD for future networking Artur Hecker and Zoran Despotovic European Research Center, Munich Huawei Technologies Programmable networks: change
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationPIRE ExoGENI ENVRI preparation for Big Data science
System and Network Engineering MSc Research project PIRE ExoGENI ENVRI preparation for Big Data science Stavros Konstantaras, Ioannis Grafis February 5, 2014 Background Big Data science Huge amount of
More informationInteractive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN
Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,
More informationNETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs
NETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs Abstract Networks are becoming virtualized. While there has been significant focus on virtualization in core and data center networks, network
More informationLab 2: P4 Runtime. Copyright 2018 P4.org
Lab 2: P4 Runtime 1 P4 Software Tools 2 Makefile: under the hood simple_switch_cli Program-independent CLI and Client test.p4 Program-independent Control Server Packet generator L o g Ingress TM Egress
More informationI Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks.
I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. Paper by: Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazières, and Nick McKeown, Stanford University
More informationIntroduction. Overview of HCM. HCM Dashboard CHAPTER
CHAPTER 1 This chapter describes the Hosted Collaboration Mediation (HCM) software. It includes: Overview of HCM, page 1-1 Terminology Used in HCM, page 1-2 HCM Dashboard Architecture, page 1-3 Starting
More informationSQL Server Course Administering a SQL 2016 Database Infrastructure. Length. Prerequisites. Audience. Course Outline.
SQL Server Course - 20764 Administering a SQL 2016 Database Infrastructure Length 5 days Prerequisites Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge
More informationIQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song. HUAWEI TECHNOLOGIES Co., Ltd.
IQ for DNA Interactive Query for Dynamic Network Analytics Haoyu Song www.huawei.com Motivation Service Provider s pain point Lack of real-time and full visibility of networks, so the network monitoring
More informationConfirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation
Confirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation November 21, 2018 Document Revision History Version Modification Date Author 1.0 Created Report Tue, Nov 20, 2018 Ryan
More informationOpenStack and OpenDaylight, the Evolving Relationship in Cloud Networking Charles Eckel, Open Source Developer Evangelist
OpenStack and OpenDaylight, the Evolving Relationship in Cloud Networking Charles Eckel, Open Source Developer Evangelist Agenda Introduction OpenStack OpenDaylight OPNFV Putting it all Together Conclusion
More informationCisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design
White Paper Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design Emerging IT technologies have brought about a shift from IT as a cost center to IT as a business driver.
More informationCS 4226: Internet Architecture
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
More informationand controller independence with NetIDE
Supporting composed SDN applications and controller independence with NetIDE Alec Leckey Intel Labs SDN Application Development Java Python C/C++ Javascript Beacon Iris Pox Nox NodeFlow Jaxon Floodlight
More informationEnabling the Next Generation of SDN
Enabling the Next Generation of SDN Brian O Connor (ONF) brian@opennetworking.org P4 Workshop on June 5, 2018 Link to slides: https://goo.gl/6hfg1h Presenting on behalf of Google and ONF Background Google
More informationNetwork Function Virtualization in Software Defined Optical Transport Networks
Network Function Virtualization in Software Defined Optical Transport Networks Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications
More informationSDN abstraction and security: a database perspective
June 17, 2016 SoSSDN SDN abstraction and security: a database perspective Anduo Wang * Jason Croft Xueyuan Mei Matthew Caesar Brighten Godfrey * Temple University University of Illinois Urbana-Champaign
More informationZentera Systems CoIP Platform
Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern
More informationIPtables and Netfilter
in tables rely on IPtables and Netfilter Comp Sci 3600 Security Outline in tables rely on 1 2 in tables rely on 3 Linux firewall: IPtables in tables rely on Iptables is the userspace module, the bit that
More information8.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5
for Google Docs Contents 2 Contents 8.0 Help for Community Managers... 3 About Jive for Google Docs...4 System Requirements & Best Practices... 5 Administering Jive for Google Docs... 6 Understanding Permissions...6
More informationSoftware Defined Networking
Software Defined Networking Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 http://www.cs.princeton.edu/courses/archive/spr12/cos461/ The Internet: A Remarkable
More informationLecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end
More informationPolicy-preserving Middlebox Placement in SDN-Enabled Data Centers
Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Bin Tang Computer Science Department California State University Dominguez Hills Some slides are from www.cs.berkeley.edu/~randy/courses/cs268.f08/lectures/22-
More informationCSC 4900 Computer Networks: Routing Protocols
CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do
More informationGuide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE
Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationTaxonomy of SDN. Vara Varavithya 17 January 2018
Taxonomy of SDN Vara Varavithya 17 January 2018 Modern Data Center Environmentally protected warehouses Large number of computers for compute and storage Blades Computer- Top-of-Rack (TOR) Switches Full
More information1V0-642.exam.30q.
1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized
More informationThese are suggestions not policy. It is one approach that may help us understand
Core Services List We propose to use NHIN terms to describe high-level services associated with data integration. The enclosed list is a sub-set of the longer and more extensive list of NHIN II objectives.
More informationNETWORK FUNCTIONS VIRTUALIZATION (NFV) FORCES-BASED ABSTRACTION LAYER
NETWORK FUNCTIONS VIRTUALIZATION (NFV) FORCES-BASED ABSTRACTION LAYER Evangelos Haleplidis (ehalep@ece.upatras.gr) Jamal Hadi Salim (hadi@mojatatu.com) Joel Halpern (joel.halpern@ericsson.com ) Odysseas
More informationAlfresco Guide. By IT Services
Alfresco Guide By IT Services Table of Contents LOGGING-IN... 3 THE DASHBOARD... 3 MY FILES... 4 SHARED FILES... 4 REPOSITORY... 5 ACCESS PERMISSIONS... 6 ADDING CONTENT... 7 SHARING CONTENT: USING PERMISSIONS...
More informationUsing Event-Driven SDN for Dynamic DDoS Mitigation
Using Event-Driven SDN for Dynamic DDoS Mitigation Craig Hill Distinguished SE, US Federal crhill@cisco.com CCIE #1628 1 Concept and Content Creators The Cisco Engineering Team: Jason King Steven Carter
More informationSEL-5056 Software-Defined Network (SDN) Flow Controller
SEL-5056 Software-Defined Network (SDN) Flow Controller SDN Configuration, Orchestration, and Monitoring Software Major Features and Benefits The SEL-5056 SDN Flow Controller is enterprise software based
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationCisco Wide Area Application Services: Secure, Scalable, and Simple Central Management
Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationSoftware Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks.
MOBILE COMMUNICATION AND INTERNET TECHNOLOGIES Software Defined Networks and Courtesy of: AT&T Tech Talks http://web.uettaxila.edu.pk/cms/2017/spr2017/temcitms/ MODULE OVERVIEW Motivation behind Software
More informationEnhanced Malware Monitor in SDN using Kinetic Controller
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 46-52 www.iosrjournals.org Enhanced Malware Monitor in SDN using Kinetic Controller Jiphi T S, Simi Krishna K R Department
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and
More informationFus Creating Administrators & Custom Administrator Roles
FuseMail Creating Administrators & Custom Administrator Roles FuseMail - Creating Administrators & Custom Administrator Roles By default administrators of FuseMail will have full administrative access
More informationApplication Delivery Using SDN
Application Delivery Using SDN Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings are available at: 1 Northbound
More informationBLOOMBERG VAULT FOR FILES. Administrator s Guide
BLOOMBERG VAULT FOR FILES Administrator s Guide INTRODUCTION 01 Introduction 02 Package Installation 02 Pre-Installation Requirement 02 Installation Steps 06 Initial (One-Time) Configuration 06 Bloomberg
More informationConfiguring Basic Performance Routing
Performance Routing (PfR) provides additional intelligence to classic routing technologies to track the performance of, or verify the quality of, a path between two devices over a Wide Area Networking
More informationONOS: TOWARDS AN OPEN, DISTRIBUTED SDN OS. Chun Yuan Cheng
ONOS: TOWARDS AN OPEN, DISTRIBUTED SDN OS Chun Yuan Cheng OUTLINE - Introduction - Two prototypes - Conclusion INTRODUCTION - An open, vendor neutral, control-data plane interface such as OpenFlow allows
More informationInt. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: (2014) ISSN :
2347 OpenFlow Security Threat Detection and Defense Services Wanqing You Department of Computer Science, Southern Polytechnic State University, Georgia Email: wyou@spsu.edu Kai Qian Department of Computer
More informationA Network-State Management Service. Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft
A Network-State Management Service Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft Complex Infrastructure 1 Complex Infrastructure Microsoft Azure Number
More informationKubernetes Integration Guide
Kubernetes Integration Guide Cloud-Native Security www.aporeto.com Aporeto Kubernetes Integration Guide The purpose of this document is to describe the features of Aporeto that secure application services
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationCybersecurity was nonexistent for most network data exchanges until around 1994.
1 The Advanced Research Projects Agency Network (ARPANET) started with the Stanford Research Institute (now SRI International) and the University of California, Los Angeles (UCLA) in 1960. In 1970, ARPANET
More informationCXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5
CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 The Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 course provides students with the skills required
More informationIntegration Guide PRTG
Integration Guide PRTG Revised: 24 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide Details WatchGuard
More informationA SCALABLE ARCHITECTURE FOR OPENFLOW CONTROLLERS
A SCALABLE ARCHITECTURE FOR OPENFLOW CONTROLLERS Filipe Azevedo Instituto Superior Técnico Universidade de Lisboa Email: filipe.azevedo@tecnico.ulisboa.pt Abstract The architectural principles of Software-Defined
More informationApplication of SDN: Load Balancing & Traffic Engineering
Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection
More informationAdministering a SQL Database Infrastructure (M20764)
Administering a SQL Database Infrastructure (M20764) COURSE OVERVIEW: In this Microsoft online training course, you will learn the skills required to maintain a Microsoft SQL Server 2012 or 2014 database
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationEnabling High Performance Data Centre Solutions and Cloud Services Through Novel Optical DC Architectures. Dimitra Simeonidou
Enabling High Performance Data Centre Solutions and Cloud Services Through Novel Optical DC Architectures Dimitra Simeonidou Challenges and Drivers for DC Evolution Data centres are growing in size and
More informationMichael Wells Microsoft Specialist, Dell EMC. SQL DBaaS on Microsoft Azure Stack
Michael Wells Microsoft Specialist, Dell EMC SQL DBaaS on Microsoft Azure Stack About Me Name: Michael Wells Email: Michael.WellsJr@dell.com Twitter: @SqlTechMike - SQL Server DBA 7+ Years - Reformed Developer
More information