CS Efficient Network Management. Class 14 *
|
|
- Opal Allen
- 5 years ago
- Views:
Transcription
1 CS Efficient Network Management Class 14 * Danny Raz * Special thanks to Prof. Morris Sloman, Imperial College London, UK 1
2 Minhalot Ex2: will be returned today Projects : first report DONE Project submission date is: 10 March
3 Objectives Advanced network management Policy based management Event correlation WEB based management So what did we do in this course? 3
4 Policy Based Network Management Main idea: define offline policies,, and then in real time use the policies to decide what active measures to take Usage: fault/performance management configuration management security management 4
5 Policy fault management Correction action New functionality Programmable Networks Correction action Fault detection Monitoring Discovery Policies Monitoring policies Fault detection Discovery 5
6 Policy configuration management Configuration manager Policies Discovery Always use multicast OSPF: use only one area NO QoS ToS1 = minimal delay 6
7 Policy security management security manager Policies Allow TCP connection from this area only Allow workflow to marketing Allow access to personal data only to top management 7
8 Example Policies Who is permitted to access a service, what operations they can perform, and when. E.g. Research staff can set up video conferences between UK and USA only between 16:00 and 19:00, Monday to Wednesday. What resources a mobile user can access when visiting a remote location. What information transformations and UI adaptations should take place when a user is mobile. What actions should be performed when a login violation is detected. What diagnostic tests should be performed when an error count is exceeded in a network component. Allocate 10% of available bandwidth to voice over IP. 8
9 Policy Definition Rule governing choices in behaviour of the system Derived from enterprise goals and service level agreements Need to specify and modify policies without coding into automated agents Policies are persistent But can be dynamically modified Change system behaviour without modifying implementation not new functionality 9
10 Policy Main idea: Separating the (dynamically changing) set of rules and the flow of the decision process How to define rules (policies)? How to use them? Is SNMP good for that? Is it efficient? 10
11 IETF Framework 0..n Policy Group Contained policy groups 0..n Policy Rule Contained policy rules 0..n Contained policy conditions Ored set of ANDed conditions or ANDed set of ORed Contained policy actions 0..n Policy Condition 0..n Policy validity period condition Policy Action Range of time Time Masks Month of year Day of Month (1-31 & 31-1) 1) Day of week Time of day 11
12 IETF Concepts LDAP, Lightweight Directory Access Protocol, is an Internet protocol that programs use to look up information from a server Policy group is a set of related policy rules Each policy rule component (condition, action) is stored as an LDAP object Can reuse (share) policy component objects between multiple rules to avoid respecifying i.e. multiple rules can use the same period condition object. 12
13 Example IETF Policy Specification (From Strassner Policy 2001) If (SourcePort( == MyWebServerPort) ) then Color DSCP=5 Objectclass:qosPolicyRule Type: 1 Direction: out Priority: 1 Objectclass: qoscolorpolicyaction DSCPValue: : 5 Objectclass: qoscolorpolicycondition Type: Integer OID Operator: == == Objectclass: qospolicyvariable Name: SourcePort Type: IntegerOID Objectclass: qospolicyconstant Name: MyWebServerPort Type: IntegerOID Objectclass: qospolicynumbervalue Type: IntegerOID PortValue: : 80 13
14 IETF Policy Architecture Policy Management Application Status & Config. Info. Notification Repository Access Protocol (e.g. LDAP) User interface Conflict detection Notification generation Management information repository Policy Repository (e.g. Directory, DB) Policy rules Policy Consumer Policy decision point Policy translation PDP Policy Protocol (e.g.: COPS, SNMP...) Policy Target Policy execution point Network element interface PEP 14
15 Policy Consumer Receives policy and translates it into format applicable to target Knows about target capabilities Policy Decision Point (PDP) makes policy decisions based on policy conditions and configures target to enforce policy, e.g. access control list, priority Q relating to packet address Each target is controlled by one consumer Consumer may control multiple targets 15
16 Policy Target Policy Execution Point (PEP) A specific functional feature (interface) of a device e.g. priority queuing, committed access rate for router a router with 2 interfaces and 4 manageable features will have 8 targets. A sophisticated device (programmable( node) may include both PDP and PEPs 16
17 PEP PDP Interaction 1) Event e.g. RSVP Request 5)RSVP Request PEP RSVP Router 2) REQ: Request (Source addr,, etc) 3) DEC: Decision (resources) 4) Reserve resources Can also pre-configure devices with policy data, so they do not have to query PDP on every event provisioning PDP Policy Server 17
18 Cisco Secure Policy Manager Components Policy Manager Functions IE 5.0 Policy Reporting NS 4.x Policy Administration Policy Config Policy Server Policy Monitoring Report Generation Central Policy Database Policy Server Functions Event Collection Policy Distribution PIX Control Agent Cisco IOS Control Agent IDS Control Agent Network Infrastructure Policy Enforcement Points (i.e network devices) PIX Firewall Router/VPN Gateway IDS Sensor Networks Policy Generation Certificate Authority Server 18
19 HP OpenView PolicyXpert Initially a policy-based network management tool QoS/Bandwidth management Access and security management Now evolved to automated provisioning with policy and configuration management features. Uses CIM + XML to unite application specific data sources into a configuration management database (CMDB) 19
20 OV PolicyXpert Architecture Console creates, assigns, and deploys policies Primary server stores and distributes policies; maintains status information secondary server provides intra-domain scalability Configuration proxy provisions network elements Configuration PEP provisions application/file servers Outsourcing PEP enforces PDP decisions (signaled QoS) COPS used to communicate policies, requests, decisions user interface server agent CLI, SNMP,... COPS - Common Open Policy Service. This is a protocol developed by IETF to provide policy console a common methodology for policy services COPS to communicate with devices that apply priority to traffic. PDP PolicyXpert database configuration proxy primary policy server secondary policy server COPS COPS COPS PDP PEP COPS PEP (outsourcing) (configuration) 20
21 Problems with the IETF Approach No distinction between authorisation and obligation policies Association of policy with consumer (subject) and target is not clearly specified No event triggering of policies No language for specifying policies Representing each policy component (action, condition etc) as an LDAP object is unwieldy and leads to consistency problems on update Instance-based reuse rather than specification based reuse Very QoS management oriented, although meant to be applicable to other applications. Conflicts detection and resolution identified but not defined. 21
22 The Ponder Policy Framework Domains Primitive policies Composite Policies Object orientation issues 22
23 Domains Grouping A domain is a collection of objects which have been explicitly grouped together for management purposes e.g. to apply a common policy (LDAP) directory Hub People Hardware Components Software Components 23
24 Domains Hierarchy Sub-domains & overlapping domains A D B C A B E C D E 24
25 Domains and Policies Policy Policy Managers Manager Agents Impractical to specify policy for individual objects in large systems with many objects specify policy for domains Can change domain membership without changing policy Managed Objects 25
26 Primitive Policies Authorisation Defines what a subject is permitted or not permitted (prohibited) to do to a target Permitted operations Protect target objects from unauthorised management actions Target based interpretation and enforcement Obligation Defines what actions a subject must do Subject based subject interprets policy and performs actions on targets Event triggered obligation Actions can be remote invocations or local scripts Can specify sequencing or concurrency of actions 26
27 Composite Policies Group Policies Defines a syntactic scope for specifying a set of related policies to be instantiated at the same time + constraints on the policies Role relationships Role groups the rights and duties related to a position in an organisation E.g., network operator, network manager, finance director, ward-nurse Specify policy in terms of roles rather than persons Object orientation Role Instances Role Specialisation Inheritance 27
28 Ponder Summary Object Meta Model Class Hierarchy Object BasicPolicy MetaPol CompositePolicy auth oblig refrain deleg group role rel mstruct auth+ auth- deleg+ deleg- 28
29 Policy Conflicts Modality conflict detection and resolution Policy priority Semantic conflicts and meta-policies Policy analysis tools 29
30 Precedence Can resolve some conflicts automatically by specifying precedence. e.g.: Negative policies override Does not permit positive exceptions to negative policies. Specified Priorities Hard to define priority Several managers may specify inconsistent priority Evaluating a distance between a policy and the object to which it refers Refinement level more concrete overrides? Time of last update more recent overrides? 30
31 Constraints Only potential modality conflicts are detected as constraints may limit the applicability of a policy e.g., to a particular time interval Typed Constraints: Inst auth+lineop { subject s = operators ; actions enable, disable, reset, off ; target Sregion ; when time.between(0800,1800) and s.state = active } time inst auth- lineop {subject s= operators actions enable, disable, reset, off} target Sregion when time.between(1600,2400) and s.state = standby } subject state 31
32 Semantic Conflicts Types of conflict: separation of duty e.g., the same person is not allowed to authorise payments and initiate them self-management e.g., a manager cannot authorise it s s own expenses conflict for resources e.g., not more than 5 persons are authorised to change the DB Need to specify the conditions which result in conflict Constraints on a set of policies (Meta-Policies). Specified using Prolog,, OCL Included in composite policies such as roles or mstructs 32
33 Policy Implementation Edit, enable disable... Authorisation Policies Policy service Query subjects & targets Obligation & Refrain Policies Domain service Query targets Target Objects Actions Policy Management Agents (Subjects) Events Events Monitoring service 33
34 Policy ManagementAgent Generic Interface Distribute, Remove, Enable, Disable obligation & refrain policies Load, Unload code Policies Agent specific functions Programming Execution Environment Application Specific Interface Operations on target objects Events 34
35 Authorisation Agent Load, Remove, Enable, Disable, policies Authentication Policies Map onto operating system or object-support access control mechanisms 35
36 Future Work Inter-organisational policy negotiation Policy based response to network attacks Refinement and analysis tools Trust specification, analysis and refinement into security management policy Case studies and implementation Policy based programmable networks Policy aware applications Policy based network elements routers and firewalls Direct implementation of policy in hardware (FPGAs( FPGAs) 36
37 Policy and efficiency Computation efficiency in the manager in the agent Communication efficiency Creating policies Access to policies Encoding policy The old tradeoff abstraction Vs. efficiency A newer tradeoff Distributing policies or keep in a centralized repository 37
38 Event correlation What is an event? An example: Errors log file We want to reduce the number of events and to find the root event 38
39 Event correlation - issues False positive Vs. false negative Efficiency which resource is limited Communication computation Centralized Vs. distributed Where will the knowledge come from 39
40 WEB based NM Web based tool are out there HTML, XML, Easy to use tools and knowledge is available Should we use it for NM? Cons: portability easy to use reusable code 40
41 SNMP WEB-based Network Management WEB based manager push SERVER WEB/SNMP gateway Notification Service SNMP Get - Set SNMP Trap SNMP Agent 41
42 Web based NM Is it good? Is it efficient? Do we really need it? 42
43 Overall CONTEXT Architecture Consumer Scripts/Users Provider Scripts/ Users Service Layer Service Subscription/ Customization Server Policy -based Service lifetime Management High-Level Service APIs Service 1 Service N Context aware Service Creation Server Active Application Network Platform Active Application Layer Low-Level Medium-Specific APIs IP Layer Network Element Abstraction GPRS IP WLAN Layers considered in CONTEXT 43
44 WP5 Services Demo Technology / Infrastructure Demo WP2 Service Management Policy Server Context Services Repository Service Deployment Context Services Creation Server WP3 AS AS WP4 Active Management platform Active Application Layer AS AS AS AS Mobile Network Network Management platform mobile user Internet fixed user 44
45 Service Framework CAS Provider Register/ Manage Proxy Proxy SLA/Policy Mngt. Tool Policy Repository Component DB Proxy Subscription Portal CAS Reconfiguration Policy-based Policy-based CAS CAS Control Control Module Module CAS Composition Informs context change thus triggers the re-reasoning of policies Context Mngt. Module Context DB CAS PEP CAS PEP CAS PEP WLAN Broker QoS Broker Control Broker DINA Packet Formatter Context Info. Broker DINA API AAL Active Packets WLAN IP IP GPRS 45
46 Service Framework Definition Realization Service Creation Service Definition Modules Context Info Realization Action Functional Broker Service Publication Service Management Logic Configuration Subscription Invocation Assurance Deployment Customers AN EE CIAH AN EE Network CIAH AN EE CIAH 46
47 47
48 Where is the Management? What if it does not work? configuration management and provisioning What if it does not pay? accounting management What if it works slow? performance management What if it works bad? fault management What if it works against you? security management 48
49 What is NM? Normal operation conditions Network Management It is all a matter of design 49
50 The Challenges Guaranty the desired end to end QoS to the application Utilize much of the available resources with as little as possible overhead Automated discovery and configuration in the heterogeneous environment Distributed cost aware network management 50
51 Our Goal Introduce efficiency to network management using active networks technology Shorter control loops Fusion of control messages in the network Exposing the actual cost to the programmer 51
52 Are Active Networks Efficient? An AN node is always slower than a router Fast/slow track System view: fewer packets shorter control loops smarter algorithms 52
53 Course Objectives Advanced course in computer communication networks Provide a basis knowledge of the field of network management Understand the challenges of efficient network management, and the modern techniques that may help to generate tools that address these challenges (mobile code, active networks) 53
54 54
TEQUILA Engineering Approach
TEQUILA Approach David Griffin University College London, UK Premium IP Cluster Joint Review, 3-4 April 2001 Overview Service Subscription GUI Forecast Service Subscription LDAP Service Subscriptions Repository
More informationIMPLEMENTATION ISSUES OF POLICY BASED NETWORK MANAGEMENT SYSTEMS
IMPLEMENTATION ISSUES OF POLICY BASED NETWORK MANAGEMENT SYSTEMS E.Grampín 1, J.Rubio 1, N.Vardalachos 2, A.Galis 2, J.Serrat 1 1 Universitat Politècnica Catalunya, Dept Teoria Senyal i Comunicacions,
More informationDistribution of Client Security Policies
Distribution of Client Security Policies Made for Nokia Internet Communications Eero Kukko Supervisor: Professor Raimo Kantola Instructor: Dr. Heikki Riittinen 1 Networking Laboratory Helsinki University
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationPush Notifications (On-Premises Deployments)
Push Notifications Overview, page 1 Push Notifications Prerequisites, page 5 Push Notifications Configuration Task Flow, page 6 Push Notifications Troubleshooting, page 15 Push Notifications Interactions
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationDesign of Next Generation Internet Based on Application-Oriented Networking
Design of Next Generation Internet Based on Application-Oriented Networking Yu Cheng Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois, USA cheng@iit.edu
More informationManaging Site-to-Site VPNs
CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationSophos Mobile as a Service
startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6
More informationIPv6-based Beyond-3G Networking
IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless
More informationWhatsConfigured v3.1 User Guide
WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the
More informationPulse Policy Secure. Identity-Based Admission Control with Check Point Next-Generation Firewall Deployment Guide. Product Release 9.0R1 Document 1.
Pulse Policy Secure Identity-Based Admission Control with Check Point Next-Generation Firewall Deployment Guide Product Release 9.0R1 Document 1.0 Published 10 May 2018 Pulse Secure, LLC 2700 Zanker Road,
More informationContext-aware Services for UMTS-Networks*
Context-aware Services for UMTS-Networks* * This project is partly financed by the government of Bavaria. Thomas Buchholz LMU München 1 Outline I. Properties of current context-aware architectures II.
More informationManagement Intranet: Integrating Web-based Network Management Applications
Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125
More informationA Policy Deployment Model for the Ponder Language
A Policy Deployment Model for the Ponder Language N. Dulay, E. Lupu, M. Sloman, N. Damianou Department of Computing, Imperial College 180 Queen s Gate, London SW7 2BZ, UK {nd, e.c.lupu, mss, ncd}@doc.ic.ac.uk
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationF5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2
F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2 Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding
More informationCisco Wide Area Application Services: Secure, Scalable, and Simple Central Management
Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationLecture 14: Performance Architecture
Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationA Policy Based Context-aware Service for Next Generation Networks
A Based Context-aware Service for Next Generation Networks Kerry Jean, Kun Yang, Alex Galis Department of Electronic & Electrical Engineering, University College London, Torrington Place, London WC1E 7JE,
More informationSophos Mobile SaaS startup guide. Product version: 7.1
Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8
More informationQuestion: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?
Volume: 385 Questions Question: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node? A. tcp/8905 B. udp/8905 C. http/80 D. https/443 Answer: A Question:
More informationPolicy management on the Nortel Ethernet Switch 460, Ethernet Switch 470, and BPS
Enterprise Policy Manager - Device Management Guide Policy management on the Nortel Ethernet Switch 460, Ethernet Switch 470, and BPS This guide contains information relating to the configuration of the
More informationQuality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services
1 Computer network and QoS QoS ATM QoS implementations Integrated Services Differentiated Services Quality of Service (QoS) The data transfer requirements are defined with different QoS parameters + e.g.,
More informationServices. Service descriptions. Cisco HCS services
Service descriptions, page 1 Infrastructure Platform Automation Description, page 5 Infrastructure Manager Sync Introduction, page 5 Service descriptions After the installation of the Cisco HCM-F platform,
More informationSemantic SOA - Realization of the Adaptive Services Grid
Semantic SOA - Realization of the Adaptive Services Grid results of the final year bachelor project Outline review of midterm results engineering methodology service development build-up of ASG software
More informationIn the world of networks, control techniques
NEM470 12/23/02 7:09 PM Page 1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2003; 13: 000 000 (DOI: 10.1002/nem.470) Resource allocation in the new fixed and mobile Internet generation
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationThe Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne
The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based
More informationGrid Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms
Grid Computing 1 Resource sharing Elements of Grid Computing - Computers, data, storage, sensors, networks, - Sharing always conditional: issues of trust, policy, negotiation, payment, Coordinated problem
More informationWBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning
WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning Jong-Cheol Seo 1, Hyung-Soo Kim 2, Dong-Sik Yun 2, Young-Tak Kim 1, 1 Dept. of Information and
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend
More informationGrid Computing Fall 2005 Lecture 5: Grid Architecture and Globus. Gabrielle Allen
Grid Computing 7700 Fall 2005 Lecture 5: Grid Architecture and Globus Gabrielle Allen allen@bit.csc.lsu.edu http://www.cct.lsu.edu/~gallen Concrete Example I have a source file Main.F on machine A, an
More informationOpen Networking through Programmability Tal Lavian Nortel Network, Advanced Technology Lab
Openet: Open Networking through Programmability Tal Lavian tlavian@nortelnetworks.com Nortel Network, Advanced Technology Lab Agenda Two Evolutions: computer vs network Openet: open networking ORE and
More informationUser Identity Sources
The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationOnCommand Unified Manager
OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2.1 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationUser Directories and Campus Network Authentication - A Wireless Case Study
User Directories and Campus Network Authentication - A Wireless Case Study Sean Convery Identity Engines Kevin Jones Metropolitan Community College Agenda Role-based Access Control About MCC Wireless project
More informationBIG-IQ Centralized Management: ADC. Version 5.0
BIG-IQ Centralized Management: ADC Version 5.0 Table of Contents Table of Contents BIG-IQ Application Delivery Controller: Overview...5 What is Application Delivery Controller?...5 Managing Device Resources...7
More informationConfigure Push Notifications for Cisco Jabber on iphone and ipad
Configure Push Notifications for Cisco Jabber on iphone and ipad Push Notifications Overview, page 1 Push Notifications Prerequisites, page 5 Push Notifications Configuration Task Flow, page 6 Push Notifications
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationConfiguring the Cisco APIC-EM Settings
Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern
More informationAnalysis of Protocol Operations and Scalability of COPS-SLS Negotiation System
Analysis of Protocol Operations and Scalability of COPS-SLS Negotiation System Thi Mai Trang Nguyen 1,2, Nadia Boukhatem 2, Guy Pujolle 1 1 Laboratoire d Informatique de Paris 6, 8 rue du Capitaine Scott,
More informationFoundations and Concepts. 04 December 2017 vrealize Automation 7.3
Foundations and Concepts 04 December 2017 vrealize Automation 7.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about
More informationFortiNAC. Aerohive Wireless Access Point Integration. Version 8.x 8/28/2018. Rev: E
FortiNAC Aerohive Wireless Access Point Integration Version 8.x 8/28/2018 Rev: E FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE BASE
More informationForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0
ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution
More informationMonitoring. Ping CHAPTER
CHAPTER 10 This chapter explains the monitoring activity. It contains the following sections: Ping, page 10-1 SLA, page 10-3 Task Manager, page 10-23 Reports, page 10-27 Ping Ping is the way Prime Provisioning
More information10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan
10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING By: Vinod Mohan 10 Best Practices to Streamline Network Monitoring Introduction As a network admin, you are tasked with keeping your organization s network
More informationBIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0
BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web
More informationForeScout CounterACT Resiliency Solutions
ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency
More informationCisco Networking Services Flow-Through Provisioning
Cisco Networking Services Flow-Through Provisioning The feature provides the infrastructure for automated configuration of large numbers of network devices. Based on Cisco Networking Services event and
More informationSecuring Containers Using a PNSC and a Cisco VSG
Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 4 About
More informationFinding Support Information for Platforms and Cisco IOS Software Images
First Published: June 19, 2006 Last Updated: June 19, 2006 The Cisco Networking Services () feature is a collection of services that can provide remote event-driven configuring of Cisco IOS networking
More informationForeword xxiii Preface xxvii IPv6 Rationale and Features
Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP
More informationSecuring Containers Using a PNSC and a Cisco VSG
Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 3 About
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters
More informationTest - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version
Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your
More informationIdentität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist
Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration
More informationSophos Mobile Control SaaS startup guide. Product version: 6.1
Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your
More informationCisco Next Generation Firewall Services
Toronto,. CA May 30 th, 2013 Cisco Next Generation Firewall Services Eric Kostlan Cisco Technical Marketing 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Objectives At the
More informationCentrix WorkSpace IQ Installation Guide. Version 4.5
Centrix WorkSpace IQ Installation Guide Version 4.5 If you have any feedback about the product or documentation, please submit to: enquiries@centrixsoftware.com 2010 Centrix Software Ltd. All rights reserved.
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationProblems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)
Problems with IntServ EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationMigrating traditional Java EE applications to mobile
Migrating traditional Java EE applications to mobile Serge Pagop Sr. Channel MW Solution Architect, Red Hat spagop@redhat.com Burr Sutter Product Management Director, Red Hat bsutter@redhat.com 2014-04-16
More informationGetting Started with the VG248
CHAPTER 2 Before you can configure the telephony features on the VG248 to interact with the analog phones, you must first configure the basic network, SNMP, and password settings. These settings enable
More informationDirectory-Enabled Networking
52 CHAPTER Chapter Goals Provide a brief introduction to object-oriented information modeling. Provide a brief introduction to directories. Provide a brief overview of DEN. Show how DEN will be used in
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationLDAP Directory Integration
LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,
More informationNortel Networks Optivity Policy Services
Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access
More informationCisco Configuration Engine 2.0
Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes
More informationMPLS VPN MIB Support. Cisco IOS Release 12.0(24)S1 1
MPLS VPN MIB Support This document describes the Simple Network Management Protocol (SNMP) agent support in Cisco IOS for Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) management,
More informationDifferentiated Services
Diff-Serv 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors Diff-Serv 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service
More informationTest Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version
Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version ACE Exam Question 1 of 50. Which of the following statements is NOT True regarding a Decryption Mirror interface? Supports SSL outbound
More informationWorkflow, Planning and Performance Information, information, information Dr Andrew Stephen M c Gough
Workflow, Planning and Performance Information, information, information Dr Andrew Stephen M c Gough Technical Coordinator London e-science Centre Imperial College London 17 th March 2006 Outline Where
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationConfiguring QoS on the GGSN
CHAPTER 9 This chapter describes how to configure Quality of Service (QoS) functions to differentiate traffic flow through the GGSN. For a complete description of the GGSN commands in this chapter, refer
More informationNetwork Management. Network Management: Goals, Organization and Functions
Network Management Network Management: Goals, Organization and Functions Telecomm/Data Network A telecommunication/data network is composed from many network elements (switching systems, terminals, circuits
More informationMOC 6232A: Implementing a Microsoft SQL Server 2008 Database
MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationConfiguring Dynamic VPN v2.0 Junos 10.4 and above
Configuring Dynamic VPN v2.0 Junos 10.4 and above Configuring and deploying Dynamic VPNs (remote access VPNs) using SRX service gateways Juniper Networks, Inc. 1 Introduction Remote access VPNs, sometimes
More informationTCG Compliance TNC IF-MAP Metadata for Network Security Compliance Test Plan
TCG Compliance TNC IF-MAP Metadata for Network Security Compliance Test Plan 0 Revision 11 10 March 2011 Published Contact: admin@trustedcomputinggroup.org Copyright TCG 2006-2011 Copyright 2006-2011 Trusted
More informationOracle Streams. An Oracle White Paper October 2002
Oracle Streams An Oracle White Paper October 2002 Oracle Streams Executive Overview... 3 Introduction... 3 Oracle Streams Overview... 4... 5 Staging... 5 Propagation... 6 Transformations... 6 Consumption...
More informationDifferentiated Services
1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service Definition of
More informationWhat s New in Release 9.2 Martin Adamčík
CA SPECTRUM Infrastructure Manager What s New in Release 9.2 Martin Adamčík Agenda New IP Routing Management New Report Management Capabilities Network Configuration Management Enhancements in r9.2 Other
More informationFoundations and Concepts. 12 April 2018 vrealize Automation 7.4
Foundations and Concepts 12 April 2018 vrealize Automation 7.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationHow to Route Internet Traffic between A Mobile Application and IoT Device?
Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup
More informationReal4Test. Real IT Certification Exam Study materials/braindumps
Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-351 Title : CCIE Wireless Vendor : Cisco Version : DEMO Get Latest & Valid 400-351 Exam's Question and
More informationCisco IWAN Application on DNA Center Quick Start Guide, Release 1.1 Patch 1, Limited Availability
Cisco IWAN Application on DNA Center Quick Start Guide, Release 1.1 Patch 1, Limited Availability First Published: 2017-12-22 Last Modified: 2017-12-22 Americas Headquarters Cisco Systems, Inc. 170 West
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationChapter 6 Global CONFIG Commands
Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationMcAfee Product Entitlement Definitions
McAfee Product Entitlement Definitions Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA Application Server CPU CPU Core Database Database Instance Entity File Submission Daily
More informationIBM Proventia Management SiteProtector Policies and Responses Configuration Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,
More information