Securing the Software-Defined Network Control Layer

Size: px
Start display at page:

Download "Securing the Software-Defined Network Control Layer"

Transcription

1 Securing the Software-Defined Network Control Layer Speaker: Yuyan Lin 2017/5/9 P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, Securing the Software Defined Network Control Layer, In NDSS, pp.1-15, 2015.

2 Outline Introduction Challenge Design Conclusion

3 Introduction the SDN community lacks a secure control-layer to manage the interactions between the application layer and the switch infrastructure security extensions at the control layer to provide the security management and arbitration of conflicting flow rules that arise when multiple applications are deployed within the same network

4 Introduction We present a prototype of our design as a Security Enhanced version of the widely used OpenFlow Floodlight Controller, which we call SE-Floodlight SE-Floodlight extends Floodlight with a securityenforcement kernel (SEK) layer, whose functions are also directly applicable to other OpenFlow controllers

5 Introduction SEK : authentication service role-based authorization permission model for mediating all configuration change requests to the data-plane inline flow-rule conflict resolution security audit service

6 Outline Introuduction Challenge Design Conclusion

7 challenge Challenge 1: Application Co-existence

8 challenge Google s OpenFlow-based B4 private WAN network manager

9 challenge Challenge 2: Flow Constraints vs. Flow Circuits Set action empowers apps to instruct a switch to rewrite the header attributes of a matching flow Output to table indicates that once the set operation is performed, the result should continue evaluation among the remaining flow rules

10 challenge Challenge 3: An Application Permission Model In addition to creating flow rules, OpenFlow provides apps with a wide range of switch commands and probes. For example, applications may reconfigure a switch in a manner that changes how the switch processes flow rules. While network operators might choose to run a third party OF app, OpenFlow offers them no ability to constrain which commands and requests the apps will issue to the switch

11 challenge Challenge 4: Application Accountability The absence of design considerations for multi-app support in OpenFlow also results in a lack of ability for the control layer to verify which app has issued which flow rule

12 challenge Challenge 5: Privilege separation privilege separation dictates that the element responsible for security mediation should operate independently from those elements it mediates. Thus, for the OpenFlow control layer to operate as a truly independent mediator, applications should not be instantiated in the same process context as the controller.

13 Northbound API Northbound API : an API defined to transmit messages between the OpenFlow application and control layers, where each operates in a separate process context The most unique and important aspect of this Northbound API specification is its ability to assign an authenticated application credential to every OpenFlow message that passes through the API.

14 Outline Introduction Challenge Design Conclusion

15 Designing an openflow mediation policy

16 Designing an openflow mediation policy APP :intended primarily for (non-security-related) traffic engineering applications, and provides sufficient permissions for most such flow-control applications. SEC :intended for applications that implement security services ADMIN : intended for applications such as the operator console app.

17 Designing an openflow mediation policy Global read represents data-plane events that are streamed to all interested applications who care to receive them Selected read operations refer to individual events for which an application can register through the controller to receive switch state-change notifications Permission :perform direct alterations to the network flow policies implemented by the switch, or enable the operator to control switch configuration or to test switch accessibility

18 Design of a secure control mediation layer

19 Design of a secure control mediation layer

20 Conflict Detection and Resolution OpenFlow rule r

21

22 RCA Algorithm Step 1: Testing for direct conflict Step 2: Detect a tail(head)-chaining candidate rule Tail chaining occurs with a resident rule, r, when r.action ==O_t and r.set mods matches rc.criteria (the criteria of our candidate rule). Head Chaining is the complementary case, where rc.action == O_t and rc.set mods matches r.criteria. Step 3: Chained rule conflict analysis Matching Precedence Policy

23 Test case: Rule rejection due to insufficient priority

24 Security audit service Ndb : postcard-based strategy NetSight : tracking packet traversal history through the network SE-Floodlight :tracking all security-relevant events which are visible to the control plane

25 Performance evalution

26 Outline Introduction Challenge Design Conclusion

27 conclusion Introduce the notion of OF-app security roles Rule-chain Conflict Analysis algorithm Northbound API that provides authenticated per-message credentials application-layer audit subsystem

Securing the Software-Defined Network Control Layer

Securing the Software-Defined Network Control Layer Securing the Software-Defined Network Control Layer Phillip Porras, Steven Cheung, Martin Fong, Keith Skinner, and Vinod Yegneswaran Computer Science Laboratory SRI International {porras,cheung,mwfong,skinner,vinod}@csl.sri.com

More information

Securing Network Application Deployment in Software Defined Networking 11/23/17

Securing Network Application Deployment in Software Defined Networking 11/23/17 Securing Network Application Deployment in Software Defined Networking Yuchia Tseng, Farid Naıı t-abdesselam, and Ashfaq Khokhar 11/23/17 1 Outline Introduction to OpenFlow-based SDN Security issues of

More information

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 14 SDN and NFV Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Traditional network vs SDN TRADITIONAL Closed equipment Software + hardware Cost Vendor-specific management.

More information

OperationCheckpoint: SDN Application Control

OperationCheckpoint: SDN Application Control OperationCheckpoint: SDN Application Control Scott-Hayward, S., Kane, C., & Sezer, S. (2014). OperationCheckpoint: SDN Application Control. In The 22nd IEEE International Conference on Network Protocols

More information

Draft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network

Draft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network Draft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network Summary This recommendation is to analyze the security threats of the SDN-based Service Function

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto

Professor Yashar Ganjali Department of Computer Science University of Toronto Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Some slides courtesy of J. Rexford (Princeton), N. Foster (Cornell)

More information

Enabling a SuperFacility with Software Defined Networking

Enabling a SuperFacility with Software Defined Networking Enabling a SuperFacility with Software Defined Networking Shane Canon Tina Declerck, Brent Draney, Jason Lee, David Paul, David Skinner May 2017 CUG 2017-1 - SuperFacility - Defined Combining the capabilities

More information

Software-Defined Networking (Continued)

Software-Defined Networking (Continued) Software-Defined Networking (Continued) CS640, 2015-04-23 Announcements Assign #5 released due Thursday, May 7 at 11pm Outline Recap SDN Stack Layer 2 Learning Switch Control Application Design Considerations

More information

SDN/DANCES Project Update Developing Applications with Networking Capabilities via End-to-end SDN (DANCES)

SDN/DANCES Project Update Developing Applications with Networking Capabilities via End-to-end SDN (DANCES) SDN/DANCES Project Update Developing Applications with Networking Capabilities via End-to-end SDN (DANCES) Kathy L. Benninger Manager of Networking Research PSC Bettis Briefing 15 September 2015 Agenda

More information

OpenADN: A Case for Open Application Delivery Networking

OpenADN: A Case for Open Application Delivery Networking OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Daniel Zappala CS 460 Computer Networking Brigham Young University Proliferation of Middleboxes 2/16 a router that manipulatees traffic rather than just forwarding it NAT rewrite

More information

Cisco Extensible Network Controller

Cisco Extensible Network Controller Data Sheet Cisco Extensible Network Controller Product Overview Today s resource intensive applications are making the network traffic grow exponentially putting high demands on the existing network. Companies

More information

Packet-Optical SDN Field Trial for Multi-Layer Network Optimization. Jim Theodoras May 2016

Packet-Optical SDN Field Trial for Multi-Layer Network Optimization. Jim Theodoras May 2016 Packet-Optical SDN Field Trial for Multi-Layer Network Optimization Jim Theodoras May 2016 OSI Stack Top of Stack 7 6 5 Application Presentation Session Data 4 Transport Layer TCP, UDP Segments SDN 3 Network

More information

Firewall A New Approach to Solve Issues in Software Define Networking

Firewall A New Approach to Solve Issues in Software Define Networking RESEARCH ARTICLE OPEN ACCESS Firewall A New Approach to Solve Issues in Software Define Networking S.Vasudevan Assistant Professor CSE Department, Chendu College Of Engineering And Technology, Chennai.

More information

ECIT Institute (Est.2003)

ECIT Institute (Est.2003) ECIT Institute (Est.2003) Research Excellence & Innovation 180 people 4 Queen s University Belfast Research Groups - Digital Communications - High Frequency Electronics - Speech, Imaging and Vision Systems

More information

Typhoon: An SDN Enhanced Real-Time Big Data Streaming Framework

Typhoon: An SDN Enhanced Real-Time Big Data Streaming Framework Typhoon: An SDN Enhanced Real-Time Big Data Streaming Framework Junguk Cho, Hyunseok Chang, Sarit Mukherjee, T.V. Lakshman, and Jacobus Van der Merwe 1 Big Data Era Big data analysis is increasingly common

More information

ONOS OVERVIEW. Architecture, Abstractions & Application

ONOS OVERVIEW. Architecture, Abstractions & Application ONOS OVERVIEW Architecture, Abstractions & Application WHAT IS ONOS? Open Networking Operating System (ONOS) is an open source SDN network operating system (controller). Mission: to enable Service Providers

More information

OTSDN What is it? Does it help?

OTSDN What is it? Does it help? OTSDN What is it? Does it help? Dennis Gammel Schweitzer Engineering Laboratories, Inc. Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security cred-c.org Important Aspects

More information

Design and deployment of secure, robust, and resilient SDN Controllers

Design and deployment of secure, robust, and resilient SDN Controllers Design and deployment of secure, robust, and resilient SDN Controllers Sandra Scott-Hayward Centre for Secure Information Technology (CSIT), Queen s University Belfast, Belfast, BT3 9DT, N. Ireland Email:

More information

Google Calendar Integration

Google Calendar Integration Google Calendar Integration Version 1.2 gradleaders.com 614.791.9000 Table of Contents TABLE OF CONTENTS OVERVIEW... 1 Google Calendar Integration Configuration Steps... 1 Required Items for Integration...

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the

More information

OpenFlow: What s it Good for?

OpenFlow: What s it Good for? OpenFlow: What s it Good for? Apricot 2016 Pete Moyer pmoyer@brocade.com Principal Solutions Architect Agenda SDN & OpenFlow Refresher How we got here SDN/OF Deployment Examples Other practical use cases

More information

Developing Solutions for Google Cloud Platform (CPD200) Course Agenda

Developing Solutions for Google Cloud Platform (CPD200) Course Agenda Developing Solutions for Google Cloud Platform (CPD200) Course Agenda Module 1: Developing Solutions for Google Cloud Platform Identify the advantages of Google Cloud Platform for solution development

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

Software Defined Networking

Software Defined Networking CSE343/443 Lehigh University Fall 2015 Software Defined Networking Presenter: Yinzhi Cao Lehigh University Acknowledgement Many materials are borrowed from the following links: https://www.cs.duke.edu/courses/spring13/compsc

More information

1 Hitachi ID Mobile Access. 2 The BYOD challenge. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Mobile Access. 2 The BYOD challenge. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Mobile Access Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Secure Access to On-Premise IAM from Devices. 2 The BYOD challenge Users Want to access everything

More information

A use-case based analysis of network managment functions in the ONF SDN model

A use-case based analysis of network managment functions in the ONF SDN model A use-case based analysis of network managment functions in the ONF SDN model Alisa Devlic (Ericsson Research) Wolfgang John (Ericsson Research) Pontus Sköldström (Acreo) Funded by the EU FP7 project SPARC

More information

Getting Started with OmniVista Security

Getting Started with OmniVista Security Getting Started with OmniVista Security Getting Started with OmniVista Security The Users and User Groups application enables you to control user access to OmniVista and to network switches. Access to

More information

SDN-based Network Obfuscation. Roland Meier PhD Student ETH Zürich

SDN-based Network Obfuscation. Roland Meier PhD Student ETH Zürich SDN-based Network Obfuscation Roland Meier PhD Student ETH Zürich This Talk This thesis vs. existing solutions Alice Bob source: Alice destination: Bob Hi Bob, Hi Bob, Payload encryption ǾǼōĦ

More information

IEEE Sec Dev Conference

IEEE Sec Dev Conference IEEE Sec Dev Conference #23, Improving Attention to Security in Software Design with Analytics and Cognitive Techniques Jim Whitmore (former) IBM Distinguished Engineer Carlisle, PA jjwhitmore@ieee.org

More information

ONUG SDN Federation/Operability

ONUG SDN Federation/Operability ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software

More information

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK)

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK) Software-Defined Networking Daphné Tuncer Department of Computing Imperial College London (UK) dtuncer@ic.ac.uk 25/10/2018 Agenda Part I: Principles of Software-Defined Networking (SDN) 1. Why a lecture

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Traditional Ethernet Challenges Plug-and-play Allow all ROOT D D D D Nondeterministic Reactive failover Difficult

More information

Firewall offloading based on SDN and NFV

Firewall offloading based on SDN and NFV Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Firewall offloading based on SDN and NFV ITG 5.2.2/5.2.4 05.12.2016 Raphael Durner r.durner@tum.de

More information

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, Guofei Gu SUCCESS Lab Texas A&M University Outline Introduction & Motivation

More information

Application Delivery Using Software Defined Networking

Application Delivery Using Software Defined Networking Application Delivery Using Software Defined Networking Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu GITPro World 2013, Palo Alto, CA, April

More information

Virtual Cloud Network Level 200. Jamal Arif November 2018

Virtual Cloud Network Level 200. Jamal Arif November 2018 Virtual Cloud Network Level 200 Jamal Arif November 2018 Copyright Copyright 2018, Oracle 2018, and/or Oracle its and/or affiliates. its affiliates. All rights All reserved. rights reserved. 1 Safe Harbor

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

Control as LCD for future networking

Control as LCD for future networking IETF 96 IRTF SDNRG Berlin, Germany July 22, 2016 Control as LCD for future networking Artur Hecker and Zoran Despotovic European Research Center, Munich Huawei Technologies Programmable networks: change

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

PIRE ExoGENI ENVRI preparation for Big Data science

PIRE ExoGENI ENVRI preparation for Big Data science System and Network Engineering MSc Research project PIRE ExoGENI ENVRI preparation for Big Data science Stavros Konstantaras, Ioannis Grafis February 5, 2014 Background Big Data science Huge amount of

More information

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,

More information

NETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs

NETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs NETWORK VIRTUALIZATION IN THE HOME Chris Donley CableLabs Abstract Networks are becoming virtualized. While there has been significant focus on virtualization in core and data center networks, network

More information

Lab 2: P4 Runtime. Copyright 2018 P4.org

Lab 2: P4 Runtime. Copyright 2018 P4.org Lab 2: P4 Runtime 1 P4 Software Tools 2 Makefile: under the hood simple_switch_cli Program-independent CLI and Client test.p4 Program-independent Control Server Packet generator L o g Ingress TM Egress

More information

I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks.

I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. Paper by: Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazières, and Nick McKeown, Stanford University

More information

Introduction. Overview of HCM. HCM Dashboard CHAPTER

Introduction. Overview of HCM. HCM Dashboard CHAPTER CHAPTER 1 This chapter describes the Hosted Collaboration Mediation (HCM) software. It includes: Overview of HCM, page 1-1 Terminology Used in HCM, page 1-2 HCM Dashboard Architecture, page 1-3 Starting

More information

SQL Server Course Administering a SQL 2016 Database Infrastructure. Length. Prerequisites. Audience. Course Outline.

SQL Server Course Administering a SQL 2016 Database Infrastructure. Length. Prerequisites. Audience. Course Outline. SQL Server Course - 20764 Administering a SQL 2016 Database Infrastructure Length 5 days Prerequisites Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge

More information

IQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song. HUAWEI TECHNOLOGIES Co., Ltd.

IQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song.   HUAWEI TECHNOLOGIES Co., Ltd. IQ for DNA Interactive Query for Dynamic Network Analytics Haoyu Song www.huawei.com Motivation Service Provider s pain point Lack of real-time and full visibility of networks, so the network monitoring

More information

Confirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation

Confirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation Confirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation November 21, 2018 Document Revision History Version Modification Date Author 1.0 Created Report Tue, Nov 20, 2018 Ryan

More information

OpenStack and OpenDaylight, the Evolving Relationship in Cloud Networking Charles Eckel, Open Source Developer Evangelist

OpenStack and OpenDaylight, the Evolving Relationship in Cloud Networking Charles Eckel, Open Source Developer Evangelist OpenStack and OpenDaylight, the Evolving Relationship in Cloud Networking Charles Eckel, Open Source Developer Evangelist Agenda Introduction OpenStack OpenDaylight OPNFV Putting it all Together Conclusion

More information

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design White Paper Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design Emerging IT technologies have brought about a shift from IT as a cost center to IT as a business driver.

More information

CS 4226: Internet Architecture

CS 4226: Internet Architecture Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:

More information

and controller independence with NetIDE

and controller independence with NetIDE Supporting composed SDN applications and controller independence with NetIDE Alec Leckey Intel Labs SDN Application Development Java Python C/C++ Javascript Beacon Iris Pox Nox NodeFlow Jaxon Floodlight

More information

Enabling the Next Generation of SDN

Enabling the Next Generation of SDN Enabling the Next Generation of SDN Brian O Connor (ONF) brian@opennetworking.org P4 Workshop on June 5, 2018 Link to slides: https://goo.gl/6hfg1h Presenting on behalf of Google and ONF Background Google

More information

Network Function Virtualization in Software Defined Optical Transport Networks

Network Function Virtualization in Software Defined Optical Transport Networks Network Function Virtualization in Software Defined Optical Transport Networks Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications

More information

SDN abstraction and security: a database perspective

SDN abstraction and security: a database perspective June 17, 2016 SoSSDN SDN abstraction and security: a database perspective Anduo Wang * Jason Croft Xueyuan Mei Matthew Caesar Brighten Godfrey * Temple University University of Illinois Urbana-Champaign

More information

Zentera Systems CoIP Platform

Zentera Systems CoIP Platform Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern

More information

IPtables and Netfilter

IPtables and Netfilter in tables rely on IPtables and Netfilter Comp Sci 3600 Security Outline in tables rely on 1 2 in tables rely on 3 Linux firewall: IPtables in tables rely on Iptables is the userspace module, the bit that

More information

8.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5

8.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5 for Google Docs Contents 2 Contents 8.0 Help for Community Managers... 3 About Jive for Google Docs...4 System Requirements & Best Practices... 5 Administering Jive for Google Docs... 6 Understanding Permissions...6

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 http://www.cs.princeton.edu/courses/archive/spr12/cos461/ The Internet: A Remarkable

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers

Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Bin Tang Computer Science Department California State University Dominguez Hills Some slides are from www.cs.berkeley.edu/~randy/courses/cs268.f08/lectures/22-

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Taxonomy of SDN. Vara Varavithya 17 January 2018

Taxonomy of SDN. Vara Varavithya 17 January 2018 Taxonomy of SDN Vara Varavithya 17 January 2018 Modern Data Center Environmentally protected warehouses Large number of computers for compute and storage Blades Computer- Top-of-Rack (TOR) Switches Full

More information

1V0-642.exam.30q.

1V0-642.exam.30q. 1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized

More information

These are suggestions not policy. It is one approach that may help us understand

These are suggestions not policy. It is one approach that may help us understand Core Services List We propose to use NHIN terms to describe high-level services associated with data integration. The enclosed list is a sub-set of the longer and more extensive list of NHIN II objectives.

More information

NETWORK FUNCTIONS VIRTUALIZATION (NFV) FORCES-BASED ABSTRACTION LAYER

NETWORK FUNCTIONS VIRTUALIZATION (NFV) FORCES-BASED ABSTRACTION LAYER NETWORK FUNCTIONS VIRTUALIZATION (NFV) FORCES-BASED ABSTRACTION LAYER Evangelos Haleplidis (ehalep@ece.upatras.gr) Jamal Hadi Salim (hadi@mojatatu.com) Joel Halpern (joel.halpern@ericsson.com ) Odysseas

More information

Alfresco Guide. By IT Services

Alfresco Guide. By IT Services Alfresco Guide By IT Services Table of Contents LOGGING-IN... 3 THE DASHBOARD... 3 MY FILES... 4 SHARED FILES... 4 REPOSITORY... 5 ACCESS PERMISSIONS... 6 ADDING CONTENT... 7 SHARING CONTENT: USING PERMISSIONS...

More information

Using Event-Driven SDN for Dynamic DDoS Mitigation

Using Event-Driven SDN for Dynamic DDoS Mitigation Using Event-Driven SDN for Dynamic DDoS Mitigation Craig Hill Distinguished SE, US Federal crhill@cisco.com CCIE #1628 1 Concept and Content Creators The Cisco Engineering Team: Jason King Steven Carter

More information

SEL-5056 Software-Defined Network (SDN) Flow Controller

SEL-5056 Software-Defined Network (SDN) Flow Controller SEL-5056 Software-Defined Network (SDN) Flow Controller SDN Configuration, Orchestration, and Monitoring Software Major Features and Benefits The SEL-5056 SDN Flow Controller is enterprise software based

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Software Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks.

Software Defined Networks and OpenFlow. Courtesy of: AT&T Tech Talks. MOBILE COMMUNICATION AND INTERNET TECHNOLOGIES Software Defined Networks and Courtesy of: AT&T Tech Talks http://web.uettaxila.edu.pk/cms/2017/spr2017/temcitms/ MODULE OVERVIEW Motivation behind Software

More information

Enhanced Malware Monitor in SDN using Kinetic Controller

Enhanced Malware Monitor in SDN using Kinetic Controller IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 46-52 www.iosrjournals.org Enhanced Malware Monitor in SDN using Kinetic Controller Jiphi T S, Simi Krishna K R Department

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and

More information

Fus Creating Administrators & Custom Administrator Roles

Fus Creating Administrators & Custom Administrator Roles FuseMail Creating Administrators & Custom Administrator Roles FuseMail - Creating Administrators & Custom Administrator Roles By default administrators of FuseMail will have full administrative access

More information

Application Delivery Using SDN

Application Delivery Using SDN Application Delivery Using SDN Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings are available at: 1 Northbound

More information

BLOOMBERG VAULT FOR FILES. Administrator s Guide

BLOOMBERG VAULT FOR FILES. Administrator s Guide BLOOMBERG VAULT FOR FILES Administrator s Guide INTRODUCTION 01 Introduction 02 Package Installation 02 Pre-Installation Requirement 02 Installation Steps 06 Initial (One-Time) Configuration 06 Bloomberg

More information

Configuring Basic Performance Routing

Configuring Basic Performance Routing Performance Routing (PfR) provides additional intelligence to classic routing technologies to track the performance of, or verify the quality of, a path between two devices over a Wide Area Networking

More information

ONOS: TOWARDS AN OPEN, DISTRIBUTED SDN OS. Chun Yuan Cheng

ONOS: TOWARDS AN OPEN, DISTRIBUTED SDN OS. Chun Yuan Cheng ONOS: TOWARDS AN OPEN, DISTRIBUTED SDN OS Chun Yuan Cheng OUTLINE - Introduction - Two prototypes - Conclusion INTRODUCTION - An open, vendor neutral, control-data plane interface such as OpenFlow allows

More information

Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: (2014) ISSN :

Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: (2014) ISSN : 2347 OpenFlow Security Threat Detection and Defense Services Wanqing You Department of Computer Science, Southern Polytechnic State University, Georgia Email: wyou@spsu.edu Kai Qian Department of Computer

More information

A Network-State Management Service. Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft

A Network-State Management Service. Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft A Network-State Management Service Peng Sun Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin Princeton & Microsoft Complex Infrastructure 1 Complex Infrastructure Microsoft Azure Number

More information

Kubernetes Integration Guide

Kubernetes Integration Guide Kubernetes Integration Guide Cloud-Native Security www.aporeto.com Aporeto Kubernetes Integration Guide The purpose of this document is to describe the features of Aporeto that secure application services

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Cybersecurity was nonexistent for most network data exchanges until around 1994.

Cybersecurity was nonexistent for most network data exchanges until around 1994. 1 The Advanced Research Projects Agency Network (ARPANET) started with the Stanford Research Institute (now SRI International) and the University of California, Los Angeles (UCLA) in 1960. In 1970, ARPANET

More information

CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5

CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 The Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 course provides students with the skills required

More information

Integration Guide PRTG

Integration Guide PRTG Integration Guide PRTG Revised: 24 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide Details WatchGuard

More information

A SCALABLE ARCHITECTURE FOR OPENFLOW CONTROLLERS

A SCALABLE ARCHITECTURE FOR OPENFLOW CONTROLLERS A SCALABLE ARCHITECTURE FOR OPENFLOW CONTROLLERS Filipe Azevedo Instituto Superior Técnico Universidade de Lisboa Email: filipe.azevedo@tecnico.ulisboa.pt Abstract The architectural principles of Software-Defined

More information

Application of SDN: Load Balancing & Traffic Engineering

Application of SDN: Load Balancing & Traffic Engineering Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection

More information

Administering a SQL Database Infrastructure (M20764)

Administering a SQL Database Infrastructure (M20764) Administering a SQL Database Infrastructure (M20764) COURSE OVERVIEW: In this Microsoft online training course, you will learn the skills required to maintain a Microsoft SQL Server 2012 or 2014 database

More information

The Next Opportunity in the Data Centre

The Next Opportunity in the Data Centre The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing

More information

Enabling High Performance Data Centre Solutions and Cloud Services Through Novel Optical DC Architectures. Dimitra Simeonidou

Enabling High Performance Data Centre Solutions and Cloud Services Through Novel Optical DC Architectures. Dimitra Simeonidou Enabling High Performance Data Centre Solutions and Cloud Services Through Novel Optical DC Architectures Dimitra Simeonidou Challenges and Drivers for DC Evolution Data centres are growing in size and

More information

Michael Wells Microsoft Specialist, Dell EMC. SQL DBaaS on Microsoft Azure Stack

Michael Wells Microsoft Specialist, Dell EMC. SQL DBaaS on Microsoft Azure Stack Michael Wells Microsoft Specialist, Dell EMC SQL DBaaS on Microsoft Azure Stack About Me Name: Michael Wells Email: Michael.WellsJr@dell.com Twitter: @SqlTechMike - SQL Server DBA 7+ Years - Reformed Developer

More information