Security Correlation Server Redundancy And Failover Guide
|
|
- Muriel Atkins
- 6 years ago
- Views:
Transcription
1 CorreLog Security Correlation Server Redundancy And Failover Guide This document provides a discussion of techniques to implement CorreLog Server redundancy and failover, for high-availability usage of the system. The information presented here will be useful to administrators responsible for maintaining the CorreLog system, as well as backup operators, developers, and IT managers, with application in disaster recovery and other areas. CorrreLog Server provides various options to provide high availability of the system. These options range from implementation of CorreLog in a Microsoft Cluster, to simpler options where data and configuration is kept synchronized using several built-in techniques of the server architecture. These features and configuration activities are described here, to permit easy integration with existing backup software and enterprise operations, and to assist sites in the considerations and options necessary to support failover requirements.
2 Redundancy Using Microsoft Clustering CorreLog Server, as a windows application, is completely agreeable to implementation within a Microsoft Cluster Server. For those sites with clustering capability, two or more copies of CorreLog Server can be installed on clustered servers employing failover and load balancing to both extend the capacity, and increase the reliability of the CorreLog implementation. As a first step in evaluating failover and redundancy requirements, organizations should consider the cost and implementation trade-offs of simply deploying CorreLog in a clustered environment. Microsoft Clustering, in addition to increasing reliability and availability, has important implications in scalability issues. However, Microsoft Clustering can be a highly expensive proposition, with steep implementation and maintenance costs, which may make this approach undesirable for small or even medium sized organizations. Further information on Clustering, Windows Failover Clustering, and Component Load Balancing is available directly from Microsoft. Redundancy and Failover Guide, Page 2
3 Redundancy Using Multiple Syslog Destinations At Agent The most basic type of redundancy can achieved in the special case where syslog sources (such as CorreLog Windows Agents) can be configured to have multiple destination addresses. This type of redundancy simply has each syslog source forward the data to two different addresses. This requires that syslog sources can be configured to send data to more than one syslog receiver / client (which may not always be the case.) For those sites that are using the CorreLog Windows and UNIX agents, the user configures the agent "AuxAddress" value (in the agent configuration file) so that syslog data is sent to two different servers. As shown above, both servers receive the same data. Using this technique, the two different servers can be in different data centers, and one server can be optionally designated as the "Master" server. All data is reflected in both servers, so that no data is lost. This type of configuration is especially suitable for Disaster Recovery situations, where a disaster at one data center does not affect the security posture of another data center, and all log data is completely recoverable (since the data is reflected at a completely different site.) Redundancy and Failover Guide, Page 3
4 Redundancy Using Single Forwarding At CorreLog Server At many sites, it will be sufficient to provide elemental redundancy and failover to assist with high-availability execution of the program, without the expense of Microsoft Clustering, such as by simply forwarding information to a "hot backup" system as described here. 1. The user configures a "Relay" type forward on the "Messages > Config > Forwarding" screen. This is sufficient to forward all messages from one CorreLog Server to a backup server, preserving the device names that appear in the original CorreLog Server. 2. As an additional step, the user can implement a "Scheduler" program in the Backup Server, which periodically pulls all the configuration data from the main server, preserving any changes to the main server. (This is documented in the next section.) This technique is depicted below. As shown above, "CorreLog Server "A" receives all the messages on the network, and immediately forwards these messages to a second server. Additionally, a scheduled program on CorreLog Server "B" periodically pulls configuration data from the main server and installs this in the backup server. Redundancy and Failover Guide, Page 4
5 Redundancy Using Cross Forwarding A site can easily achieve redundancy, where two CorreLog servers both reflect the same message information and configuration data, by having each of two CorreLog Servers forward messages between themselves. This type of operation is depicted below: As shown above, each CorreLog server receives data from its own message sources. The messages appear in both CorreLog servers. Each server contains specific elements to insure that messages forwarded to a CorreLog server are not immediately forwarded back (creating a loop.) The above diagram can be used to keep all the messages in both servers synchronized, so that any message arriving to either server is immediately reflected in the other server. This particular implementation has application in both load balancing and redundancy. Redundancy and Failover Guide, Page 5
6 Synchronizing Configuration Data via HTTP Using the above technique, messages are stored in a separate server, which can be quickly switched (through manual methods) for the main server in the case of disastrous hardware failure. In addition to backing up the main server message data, one CorreLog server can pull the configuration data from a backup server using HTTP and a simple utility such as the "wget.exe" program. This allows changes, made at a primary server, to be replicated in a backup server, further safeguarding the configuration of the server, preserving the current management strategy of the organization. The steps needed to accomplish this are as follows: 1. The user configures the HTTP server of the main CorreLog platform to allow access to the "C:\CorreLog\config" directory. The following is added to the standard HTTP configuration file residing in the "CorreLog\apache\srm.conf" file of the installation: Alias /config "C:/CorreLog/config/" The pathname C:/CorreLog/config" may be substituted with the actual location of the CorreLog configuration file. After making the above change at the main CorreLog platform, the CorreLog services must be stopped and restarted for the change to take affect. 2. The user obtains the "wget.exe" program (available in the public domain) and copies this program to the "system" directory of the backup CorreLog Server. (This freely distributed utility is available from a number of different sources on the web.) 3. The user creates the "HTTP_SYNC_CONFIG.bat" batch file program to pull configuration data from the primary machine. An example of this batch file (suitable for cut and paste to a file) is provided below. The batch file is placed in the "system" directory of the backup CorreLog Server. 4. The user accesses the CorreLog "System > Schedule" screen, and adds the HTTP_SYNC_CONFIG.bat file as a program that is executed each hour. The above steps are sufficient to periodically fetch (at the start of each hour) any configuration changes that have been made to the main CorreLog Server, and copy these changes to the backup server. Redundancy and Failover Guide, Page 6
7 An Example HTTP Sync Config File The actual batch file, which copies configuration data from the main CorreLog Server to the backup server (referenced in steps 3 & 4 above) can take many forms. The actual batch file depends upon which files are required for redundancy, and which utility the user has selected for web access. If the site is using "wget.exe" to get the configuration data, a batch file suitable for use is available below, which may be cut and pasted to the HTTP_SYNC_CONFIG.bat file for immediate OFF REM: # HTTP_SYNC_CONFIG.bat REM: # Copy configuration files from a remote CorreLog server to the REM: # local CorreLog server using the external "wget.exe" utility. REM: # This script uses the "wget.exe" utility, in the system directory REM: # of this CorreLog installation, to copy and install configuration REM: # data of a remote CorreLog server, thereby syncronizing this REM: # server's configuration with another server. REM: # At the remote server, the "apache\conf\srm.conf" file should REM: # be modified to contain the following directive, to permit HTTP REM: # access to the remote configuation data: (Substitute the value REM: # of "C:/CorreLog/config" with the actual pathname of the CorreLog REM: # config folder.) REM: # Alias /config "C:/CorreLog/config/" REM: # Set the value of the primary CorreLog Server below: set SVR=remote-server-name REM: # The remainder of the script file does not need to be modified. REM: # Create a temporary directory to hold the files, and make sure REM: # this temporary directory is empty. if not exist wgettmp mkdir wgettmp del /q /f /s wgettmp REM: # Execute the wget command for each remote config file. On a bad REM: # status indication, bypass further processing by jumping to the REM: # handle_error routine. wget -q wget -q -O wgettmp/actions.new -O wgettmp/alerts.new Redundancy and Failover Guide, Page 7
8 wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q -O wgettmp/alertd.new -O wgettmp/calerts.new -O wgettmp/color.cnf -O wgettmp/devgrp.new -O wgettmp/devinfo.cnf -O wgettmp/excel.cnf -O wgettmp/facdef.cnf -O wgettmp/filt.new -O wgettmp/file.cnf -O wgettmp/fmula.new -O wgettmp/ipadd.new -O wgettmp/latch.new -O wgettmp/learn.cnf -O wgettmp/macros.new -O wgettmp/muekey.new -O wgettmp/muexcl.new -O wgettmp/muser.new -O wgettmp/mumask.new Redundancy and Failover Guide, Page 8
9 wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q -O wgettmp/otext.new -O wgettmp/pass.cnf -O wgettmp/passx.cnf -O wgettmp/patts.new -O wgettmp/pivot.cnf -O wgettmp/pivparm.cnf -O wgettmp/rss.cnf -O wgettmp/sever.new -O wgettmp/slparms.cnf -O wgettmp/smtp.cnf -O wgettmp/sparms.cnf wget -q -O wgettmp/t-actions.new wget -q wget -q -O wgettmp/threads.new -O wgettmp/ticparm.cnf REM: # All the files were successfully fetched. Copy the files from REM: # The "wgettmp" folder to the actual configuration folder. This REM: # is sufficient to install the configuration data at this site. REM: # when finished, send a syslog message and exit. copy /y.\wgettmp\*..\config sendlog.exe %SVR% "HTTP_SYNC_CONFIGbat - Files synchronized." 6 5 goto exit Redundancy and Failover Guide, Page 9
10 :handle_error REM: # An error was encountered. The "wget.exe" program returned a REM: # bad status when getting files. The remote server may be down REM: # or otherwise misconfigured. The batch file can be manually REM: # executed at a command prompt with ECHO ON in order to determine REM: # the error. REM: # Send a syslog message to indicate the error condition and exit. sendlog.exe %SVR% "HTTP_SYNC_CONFIG.bat Errors Detected. Bypassed." 3 5 :exit REM: # Normal exit. The above batch file can be cut and paste into a file, and the "wget.exe" program installed in the system directory, to periodically pull configuration data from one CorreLog Server to another. Redundancy and Failover Guide, Page 10
11 Alternate HTTP Sync Capability Using Backup and Restore The above script is useful if a failover box is to be synced with configuration changes, but the above script does not necessarily copy over ALL configuration data that may exist on the remote system. For example, the above script does not replicate dashboards, user preferences, and reports. As an alternative, a system can be configured where the "Master" CorreLog server generates a backup (using the "Remote Backup" capability documented in the "CorreLog Backup and Recovery Guide".) REM: # SYNC_FULL_BACKUP.bat REM: # Fetch, and install remote data via HTTP and ZIP. REM: # See "CorreLog Backup and Recovery Manual" for a REM: # working example of the R-BACKUP.bat file below. REM: # Location of the main CorreLog Server set MAIN_SERVER=main-correlog-server REM: # Generate the BACKUP.zip via the R-BACKUP.bat file. REM: # This script must be configured on the remote system REM: # including adjustments to the "x-cgi\htaccess.txt" REM: # file to limit and permit access. del /f BACKUP.log wget -q -O BACKUP.log REM: # Now fetch the BACKUP.zip to the local directory. del /f BACKUP.zip wget -q REM: # Stop the local CorreLog Server, unzip files, and restart REM: # The correlog server. net stop correlog unzip -o BACKUP.zip -d../ net start correlog REM: # Finished: Data was synchronized. The above file can be cut and paste to the "system" directory, and executed at midnight each night to perform a full sync of data from a primary machine to a backup machine. The script can be used in conjunction with (or as a replacement for) the HTTP_SYNC_CONFIG.bat file discussed previously. Redundancy and Failover Guide, Page 11
12 Dedicated Service Link It is important to note that, for the schemes described above, it will be useful (but not always necessary) to employ a dedicated, and isolated network connection between the two CorreLog Servers. Although this may require extra NIC hardware and a cable, this keeps message traffic (which may be voluminous) off of the main service network, preventing any degradation of bandwidth due to the extra message traffic. During configuration of the failover system, communications between the two servers can exist through an isolated network, with different network interface numbers and IP addresses. No special consideration exists in the configuration; the administrator simply sends information to the appropriate interface card of the backup CorreLog Server, configuring the forwarding address to be the address associated with the secondary network interface card. The decision whether to implement a separate network for the backup traffic will be made based upon the capacity of the primary NIC, and other bandwidth considerations. Note that, if the organization elects NOT to use a separate service network, the nature of UDP may cause excessive collisions if messages are received and immediately forwarded from the same network card. Given the low cost of network interface hardware and cabling, this small investment can preclude large problems with network message congestion, and should be considered carefully. Redundancy and Failover Guide, Page 12
13 Auto-Detection Of Failover As part of the CorreLog failover strategy, the user may wish to automatically detect the failover condition. This technique can be implemented using a simple "heartbeat" mechanism, installed as part of the CorreLog "Custom Alert" facility (or potentially other alternate locations.) For example, on the backup CorreLog server, a custom alert script (configured via the "Alerts > Custom" screen) can be configured as follows: 1. Every 30 seconds, the backup server pings the primary CorreLog server to determine its state (either online and responding to ping requests, or offline.) This is accomplished via the configuration of a simple "Custom Alert" script. (See notes below.) 2. If the ping returns an offline status, the backup server enables ticket actions to be performed on the backup server, such as notifications. 3. When the ping returns an online status, the backup server can indicate this shut off its notification interface, preventing further notifications from the backup server. An example of a custom alert script, capable of performing the actions described above, is included below. The user can cut and paste this to the "CorreLog\c-alert" directory, and then configure this script for execution via the "Alerts > Custom" tab of CorreLog. The script provided below provides an elemental example of how one copy of CorreLog can manage another copy, and assume the duties of the second copy of CorreLog. This technique can be further generalized to perform other actions (when the primary server fails) such as performing corrective action, or even assuming the IP address of the main CorreLog Server. Redundancy and Failover Guide, Page 13
14 @ECHO OFF REM: # Ping the primary IP address. If the ping fails, REM: # enable ticket notifications. REM: # This is the IP address of the main CorreLog Server SET IP_ADDRESS= REM: Ping the main address. SET COUNT=0 PING.exe %IP_ADDRESS% FIND /C "timed out" >..\temp\ping.tmp SET /P COUNT=<..\temp\ping.tmp DEL..\temp\ping.tmp IF NOT %COUNT% == 4 GOTO STATUS_OKAY REM: # Main CorreLog Server IP address is not responding. REM: # Enable ticket actions ECHO master_enable Enabled >..\config\ticparm.cnf ECHO _per_minute 20 >>..\config\ticparm.cnf ECHO hdesk_per_minute 20 >>..\config\ticparm.cnf ECHO epo_per_minute 10 >>..\config\ticparm.cnf ECHO throttle_sev warning >>..\config\ticparm.cnf ECHO auto_close_dupl Disabled >>..\config\ticparm.cnf ECHO Failover Exists. Switchover complete. GOTO EXIT :STATUS_OKAY REM: # The Main CorreLog Server IP Address is responding. REM: # Disable further ticket actions. ECHO master_enable Disabled >..\config\ticparm.cnf ECHO _per_minute 20 >>..\config\ticparm.cnf ECHO hdesk_per_minute 20 >>..\config\ticparm.cnf ECHO epo_per_minute 10 >>..\config\ticparm.cnf ECHO throttle_sev warning >>..\config\ticparm.cnf ECHO auto_close_dupl Disabled >>..\config\ticparm.cnf ECHO Ping Successful. :EXIT Redundancy and Failover Guide, Page 14
15 Professional Services CorreLog, Inc. provides professional services to assist in all phases of deployment activities, and assists with all deployment and operational issues through its support division. Prior to deploying CorreLog Server (whether a small single-tier deployment or a large multi-tier deployment) licensed users are encouraged to contact CorreLog for a detailed discussion of options and capabilities. Further information on installation is available from the "Home" page of each CorreLog installation, and is contained in the comprehensive documentation accompanying the product. Refer to the "Installation and Quick Start Guide" for additional information For Additional Help Detailed specifications regarding the CorreLog Server, add-on components, and resources are available from our corporate website. Test software may be downloaded for immediate evaluation. Additionally, CorreLog is pleased to support proof-ofconcepts, and provide technology proposals and demonstrations on request. CorreLog, Inc., a privately held corporation, has produced software and framework components used successfully by hundreds of government and private operations worldwide. We deliver security information and event management (SIEM) software, combined with deep correlation functions, and advanced security solutions. CorreLog markets its solutions directly and through partners. We are committed to advancing and redefining the state-of-art of system management, using open and standards-based protocols and methods. Visit our website today for more information. CorreLog, Inc. mailto:support@correlog.com Redundancy and Failover Guide, Page 15
Security Correlation Server Backup and Recovery Guide
CorreLog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog
More informationSecurity Correlation Server System Deployment and Planning Guide
CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices
More informationCorreLog. Ping Monitor Adapter Software Users Manual
CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part
More informationWhite Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo)
orrelogtm White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo) This white paper provides a detailed discussion of objectives and methodologies for integrating
More informationCorreLog. SNMP Trap Monitor Software Users Manual
CorreLog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No
More informationCorreLog. SQL Table Monitor Adapter Users Manual
CorreLog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved. No
More informationCorreLog. LDAP Interface Software Toolkit Users Manual
CorreLog LDAP Interface Software Toolkit Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, LDAP Interface Software Toolkit Manual Copyright 2008-2018, CorreLog, Inc. All rights
More informationCorreLog IP Block List and Reputation Database Application Notes
CorreLog IP Block List and Reputation Database Application Notes As a standard feature of the CorreLog Server software, CorreLog Inc. synthesizes and maintains a robust list of IP address subnets with
More informationTechnical Response Logging and Monitoring Requirements December 23, 2010
Technical Response Logging and Monitoring Requirements December 23, 2010 This technical response documents the capabilities of CorreLog, Inc., Logging and Monitoring Summary and Recommendations. A high-level
More informationHigh Availability for Oracle 8i Using Double-Take
High Availability for Oracle 8i Using Double-Take High Availability for Oracle 8i Using Double-Take Revision number 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,
More informationVERITAS Volume Replicator. Successful Replication and Disaster Recovery
VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1
More informationArcserve Replication and High Availability
Arcserve Replication and High Availability Microsoft SQL Server Operation Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred
More informationWANSyncHA Microsoft Exchange Server. Operations Guide
WANSyncHA Microsoft Exchange Server Operations Guide About This Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user
More informationCarbonite Availability. Technical overview
Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably
More informationVERITAS Volume Replicator Successful Replication and Disaster Recovery
VERITAS Replicator Successful Replication and Disaster Recovery Introduction Companies today rely to an unprecedented extent on online, frequently accessed, constantly changing data to run their businesses.
More informationGR Reference Models. GR Reference Models. Without Session Replication
, page 1 Advantages and Disadvantages of GR Models, page 6 SPR/Balance Considerations, page 7 Data Synchronization, page 8 CPS GR Dimensions, page 9 Network Diagrams, page 12 The CPS solution stores session
More informationCommon Management Database Database Definition & User Guide
orrelog Common Management Database Database Definition & User Guide This guide provides brief information on the tables accompanying the Common Management Database (CMDB) Adapter of the CorreLog Server.
More informationForeScout CounterACT Resiliency Solutions
ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency
More informationMaximum Availability Architecture: Overview. An Oracle White Paper July 2002
Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network
More informationHigh Availability for Oracle 9i Using Double-Take
High Availability for Oracle 9i Using Double-Take High Availability for Oracle 9i Using Double-Take Revision 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,
More informationSAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationMultinode Scalability and WAN Deployments
Multinode Scalability Feature, page 1 Cluster-Wide DNS SRV, page 3 Local Failover, page 3 Subcluster Failure Detection, page 3 Method Event Routing, page 4 External Database Recommendations, page 4 Clustering
More informationorrelog File Integrity Monitor (FIM) User Reference Manual
orrelog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com Section 1: Introduction This document contains installation and application notes regarding the
More informationOffice and Express Print Release High Availability Setup Guide
Office and Express Print Release High Availability Setup Guide Version 1.0 2017 EQ-HA-DCE-20170512 Print Release High Availability Setup Guide Document Revision History Revision Date May 12, 2017 September
More informationSTRM Log Manager Administration Guide
Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10
More informationHigh Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.
High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationVirtual protection gets real
Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce
More informationFailover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4
Configure Failover 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners. TC:1/4/2019
More informationHP StoreVirtual Storage Multi-Site Configuration Guide
HP StoreVirtual Storage Multi-Site Configuration Guide Abstract This guide contains detailed instructions for designing and implementing the Multi-Site SAN features of the LeftHand OS. The Multi-Site SAN
More informationConfiguring Failover
Configuring Failover 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationQuick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE
Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE
More informationCorreLog. File Integrity Monitor (FIM) User Reference Manual
CorreLog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog FIM, User Reference Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.
More informationReplication. Version
Replication Version 2018.3 Contents Before you start... 3 Principles... 4 Prerequisites... 5 Initial Steps... 6 Post Setup... 7 Supported Operating Systems... 7 Perform the Setup... 8 Read Committed Snapshot
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...
More informationConfiguring ApplicationHA in VMware SRM 5.1 environment
Configuring ApplicationHA in VMware SRM 5.1 environment Windows Server 2003 and 2003 R2, Windows Server 2008 and 2008 R2 6.0 September 2013 Contents Chapter 1 About the ApplicationHA support for VMware
More informationFailover Configuration Bomgar Privileged Access
Failover Configuration Bomgar Privileged Access 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
More informationIntellicus Cluster and Load Balancing- Linux. Version: 18.1
Intellicus Cluster and Load Balancing- Linux Version: 18.1 1 Copyright 2018 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not
More informationPrivileged Remote Access Failover Configuration
Privileged Remote Access Failover Configuration 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of
More informationTable of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3
Table of Contents 1 V & V4 Appliance Quick Start...1 1.1 Quick Start...1 1.2 Accessing Appliance Menus...1 1. Updating Appliance...1 1.4 Webmin...1 1.5 Setting Hostname IP Address...2 1.6 Starting and
More informationDesigning Data Protection Strategies for Lotus Domino
WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 9.0 for Windows Servers Agent for Lotus Domino VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3
More informationConfigure DHCP for Failover Step-by-Step.
Configure DHCP for Failover Step-by-Step https://technet.microsoft.com/en-us/library/hh831385.aspx Dynamic Host Configuration Protocol (DHCP) failover in Windows Server 2012 is a new method for ensuring
More informationConfiguring Network Load Balancing
Configuring Network Load Balancing LESSON 1 70-412 EXAM OBJECTIVE Objective 1.1 Configure Network Load Balancing (NLB). This objective may include but is not limited to: Install NLB nodes; configure NLB
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationSteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v Administration Guide
SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v8.0.1 Administration Guide March 2014 This document and the information herein is the property of SIOS Technology
More informationorrelog McAfee epolicy Orchestrator (epo) Adapter Software Installation And Users Manual
orrelog McAfee epolicy Orchestrator (epo) Adapter Software Installation And Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, epo Adapter Users Manual Copyright 2008-2015, CorreLog,
More informationversion 5.4 Installation Guide
version 5.4 Installation Guide Document Release Date: February 9, 2012 www.phdvirtual.com Legal Notices PHD Virtual Backup for Citrix XenServer Installation Guide Copyright 2010-2012 PHD Virtual Technologies
More informationReplication Solutions with Open-E Data Storage Server (DSS) April 2009
Replication Solutions with Open-E Data Storage Server (DSS) April 2009 Replication Solutions Supported by Open-E DSS Replication Mode s Synchronou Asynchronou us Source/Destination Data Transfer Volume
More informationAdmin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console
WHITE PAPER Managing Distributed Backup Servers VERITAS Backup Exec TM 9.0 for Windows Servers Admin Plus Pack Option ExecView Web Console Backup Exec Admin Console VERSION INCLUDES TABLE OF CONTENTS STYLES
More information8x8 Virtual Office Government
Brochure 8x8 Virtual Office Government Fully Integrated Hosted IP PBX for Government Hosted IP PBX solutions are quickly becoming the preferred choice for government agencies seeking cost-effective ways
More informationDELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS
WHITE PAPER DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS Maximize the efficiency of multiple network interfaces Abstract Dell EMC delivers dynamic interface groups to simplify the use of multiple
More informationSet Up Cisco ISE in a Distributed Environment
Cisco ISE Deployment Terminology, page 1 Personas in Distributed Cisco ISE Deployments, page 2 Cisco ISE Distributed Deployment, page 2 Configure a Cisco ISE Node, page 5 Administration Node, page 8 Policy
More informationBackup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution
DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering Easy-to-use Backup and Recovery solution Data protection and disaster recovery in a single solution Scalable
More informationForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0
ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution
More informationMigration and Building of Data Centers in IBM SoftLayer
Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into
More informationGuidelines for Using MySQL with Double-Take
Guidelines for Using MySQL with Double-Take Guidelines for Using MySQL with Double-Take Revision 1.0.0 published September 2007 Double-Take, GeoCluster, and NSI are registered trademarks of Double-Take
More informationSet Up Cisco ISE in a Distributed Environment
Cisco ISE Deployment Terminology, page 1 Personas in Distributed Cisco ISE Deployments, page 2 Cisco ISE Distributed Deployment, page 2 Configure a Cisco ISE Node, page 5 Administration Node, page 8 Policy
More informationUser Guide. Version 2.1
Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT
More informationFailover Solutions with Open-E Data Storage Server (DSS V6)
Failover Solutions with Open-E Data Storage Server (DSS V6) Software Version: DSS ver. 6.00 up85 Presentation updated: September 2011 Failover Solutions Supported by Open-E DSS Open-E DSS supports two
More informationLesson Objectives. Benefits of Using DPM. After completing this lesson, you will be able to:
Protecting Virtualization Infrastructure by Using DPM Building a robust protection solution for your virtualization infrastructure is as import ant as building the solution itself. This lesson provides
More informationSAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments. Last Updated: May 23, 2012
SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments Last Updated: May 23, 2012 Copyright Notice The correct bibliographic citation for this manual is as
More informationWhat's in this guide... 4 Documents related to NetBackup in highly available environments... 5
Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...
More informationSeagate Info Architecture Planning and Deployment for ASPs
Seagate Info Architecture Planning and Deployment for ASPs Overview Contents This document is a guide to help customers prepare for their implementation of Seagate Info. It helps you to successfully implement
More informationIdentity Firewall. About the Identity Firewall
This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History
More informationInstallation Guide Worksoft Certify Execution Suite
Installation Guide Worksoft Certify Execution Suite Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Execution Suite Installation Guide Version
More informationVirtualization And High Availability. Howard Chow Microsoft MVP
Virtualization And High Availability Howard Chow Microsoft MVP Session Objectives And Agenda Virtualization and High Availability Types of high availability enabled by virtualization Enabling a highly
More informationVeritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008
Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008 Windows Server 2003 Windows Server 2008 5.1 Application Pack 1 Veritas Storage Foundation
More informationConfiguring VIP and Virtual Interface Redundancy
CHAPTER 6 Configuring VIP and Virtual Interface Redundancy This chapter describes how to plan for and configure virtual IP (VIP) redundancy and virtual interface redundancy on the CSS. Information in this
More informationTable of Contents [ClusterReplica SQL v2.1 User Manual]
i Table of Contents [ClusterReplica SQL v2.1 User Manual] CHAPTER 1...1 Introduction... 1 1.1 What is ClusterReplica MSSQL Edition...1 1.2 Who is ClusterReplica MSSQL Edition Designed For...1 1.3 How Does
More informationHitless Failover and Hitless Upgrade User Guide
Hitless Failover and Hitless Upgrade User Guide This guide describes hitless failover and hitless upgrade, including: Causes and Behaviors of MSM Failover on page 1 Summary of Supported Features on page
More informationOL Connect Backup licenses
OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers
More informationHigh Availability for Lotus Domino Using Double-Take
High Availability for Lotus Domino Using Double-Take High Availability for Lotus Domino Using Double-Take Revision 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists
More informationCA ARCserve Replication and High Availability
CA ARCserve Replication and High Availability Virtualized Server Environments Operation Guide for Windows r16 This Documentation, which includes embedded help systems and electronically distributed materials,
More informationCreating a Multi-data Center (MDC) System
, page 1 About Multi-data Centers The Multi-data Center (MDC) licensed feature is available in version 2.5 and higher. It allows two CWMS systems to be joined into a single MDC system. One license must
More informationDesigning Data Protection Strategies for Lotus Domino
WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 10 for Windows Servers Agent for Lotus Domino 1/17/2005 1 TABLE OF CONTENTS Executive Summary...3 Introduction to Lotus
More informationM20742-Identity with Windows Server 2016
M20742-Identity with Windows Server 2016 Course Number: M20742 Category: Technical Microsoft Duration: 5 days Certification: 70-742 Overview This five-day instructor-led course teaches IT Pros how to deploy
More informationImplementing an Advanced Server Infrastructure
Implementing an Advanced Server Infrastructure Course 20414C 5 Days Instructor-led, Hands-on Introduction Get hands-on instruction and practice planning, designing and deploying a physical and logical
More informationHP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :
HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.
More informationCA ARCserve Replication and High Availability for Windows
CA ARCserve Replication and High Availability for Windows Virtualized Server Environments Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to
More informationMSMQ-MQSeries Bridge Configuration Guide White Paper
MSMQ-MQSeries Bridge Configuration Guide White Paper Published: November 2000 Table of Contents Table of Contents...1 Introduction...1 Definitions... 2 How the Bridge Works...5 MSMQ-MQSeries Bridge Installation...
More informationAlfresco 2.1. Backup and High Availability Guide
Copyright (c) 2007 by Alfresco and others. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic
More informationAdvanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER
Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as
More informationUsing Double-Take in a Network Address Translation (NAT) Environment
Using Double-Take in a Network Address Translation (NAT) Environment Using Double-Take in a Network Address Translation (NAT) Environment published October 2002 NSI and Double-Take are registered trademarks
More informationIvanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines
Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates
More informationUpgrading to Parallels Virtuozzo Containers 4.0 for Windows. Contents. About This Document
Upgrading to Parallels Virtuozzo Containers 4.0 for Windows About This Document This document familiarizes you with the way to upgrade the following versions of the Virtuozzo for Windows software to Parallels
More informationVeritas NetBackup Read This First Guide for Secure Communications
Veritas NetBackup Read This First Guide for Secure Communications Contents... 3 NetBackup Read This First for Secure Communications... 3 About secure communications in NetBackup... 3 How host ID-based
More informationCopyri g h t 2012 OSIso f t, LLC. 1
1 Architecture and Best Practices (Recommendation for PI Systems) Presented by John Daniels Customer Support Engineer Agenda PI System High Availability PI Server level (such as PI Server HA, AF HA, PI
More informationWhite Paper. How to select a cloud disaster recovery method that meets your requirements.
How to select a cloud disaster recovery method that meets your requirements. VS Table of contents Table of contents Page 2 Executive Summary Page 3 Introduction Page 3 Disaster Recovery Methodologies Page
More informationStarWind iscsi Target for Microsoft Windows: StarWind and Double-Take
Rocket Division Software Technical Reference Series StarWind iscsi Target for Microsoft Windows: StarWind and Double-Take May 1, 2007 Rocket Division Software www.rocketdivision.com Copyright Rocket Division
More informationFailover Clustering failover node cluster-aware virtual server one
Failover Clustering Microsoft Cluster Service (MSCS) is available for installation on Windows 2000 Advanced Server, Windows 2000 Datacenter Server, and Windows NT Enterprise Edition with Service Pack 5
More informationHigh Availability Deployment
April 18, 2005 Overview Introduction This addendum provides connectivity and configuration task overviews for connecting two M appliances as a high availability (HA) cluster pair. For detailed configuration
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More information20742: Identity with Windows Server 2016
Course Content Course Description: This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement
More informationSynology High Availability (SHA)
Synology High Availability (SHA) Based on DSM 5.1 Synology Inc. Synology_SHAWP_ 20141106 Table of Contents Chapter 1: Introduction... 3 Chapter 2: High-Availability Clustering... 4 2.1 Synology High-Availability
More informationApplication Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.
Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Abstract This Application Note describes the steps required for installing and configuring
More informationIdentity with Windows Server 2016
Identity with Windows Server 2016 Course 20742B - 5 Days - Instructor-led, Hands on Introduction This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More informationBrocade Virtual Traffic Manager and Parallels Remote Application Server
White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4
More informationMicrosoft Office SharePoint Server 2007
Microsoft Office SharePoint Server 2007 Enabled by EMC Celerra Unified Storage and Microsoft Hyper-V Reference Architecture Copyright 2010 EMC Corporation. All rights reserved. Published May, 2010 EMC
More informationCisco TelePresence VCS Cluster Creation and Maintenance
Cisco TelePresence VCS Cluster Creation and Maintenance Deployment Guide Cisco VCS X8.5 Cisco TMS 13.2 or later December 2014 Contents Introduction 4 Prerequisites 5 Upgrading an X7.1 or later cluster
More information