Navodila Za Pisanje Diplomskih Nalog UM FERI

Total Page:16

File Type:pdf, Size:1020Kb

Navodila Za Pisanje Diplomskih Nalog UM FERI UNIVERZA V MARIBORU FAKULTETA ZA ELEKTROTEHNIKO, RAČUNALNIŠTVO IN INFORMATIKO Jernej Gabrič UPORABA PROGRAMSKE POŽARNE PREGRADE V PODATKOVNEM CENTRU Diplomsko delo Maribor, avgust 2016 UNIVERZA V MARIBORU FAKULTETA ZA ELEKTROTEHNIKO, RAČUNALNIŠTVO IN INFORMATIKO Jernej Gabrič UPORABA PROGRAMSKE POŽARNE PREGRADE V PODATKOVNEM CENTRU Diplomsko delo Maribor, avgust 2016 UPORABA PROGRAMSKE POŽARNE PREGRADE V PODATKOVNEM CENTRU Diplomsko delo Študent: Jernej Gabrič Študijski program: univerzitetni študijski program Telekomunikacije Mentorica: red. prof. dr. Tatjana Kapus Lektorica: Bojana Lekše, prof. slovenščine i ii ZAHVALA Zahvaljujem se mentorici red. prof. dr. Tatjani Kapus za pomoč in vodenje pri izdelavi diplomske naloge. Posebej se zahvaljujem svojim staršem, ki so mi omogočili študij in mi vsa leta stali ob strani. Hvala. iii iv Uporaba programske požarne pregrade v podatkovnem centru Ključne besede: filtriranje prometa, prevajanje omrežnih naslovov, navidezna zasebna omrežja, propustnost UDK: 004.72.056.52(043.2). Povzetek V diplomski nalogi smo pregledali izbor brezplačnih izdaj programskih požarnih pregrad, primernih za namestitev v virtualizirano okolje podatkovnega centra. Izvedli smo preizkus zmogljivosti delovanja najprimernejše izdaje programske požarne pregrade in jo primerjali z zmogljivostjo strojne požarne pregrade. Pri preizkušanju smo uporabili omrežne naprave proizvajalca Cisco, strežnike IBM, programski produkt VMware vSphere in klasične namizne računalnike. Prišli smo do ugotovitve, da je uporaba programske požarne pregrade v takšnem okolju stroškovno upravičena in da je ob izbiri primerne strežniške opreme za virtualizacijo v podatkovnem centru programska požarna pregrada zmogljivejša od strojne. v Using a software firewall in a data centre Key words: traffic filtering, virtualization, network address translation, virtual private network, throughput UDK: 004.72.056.52(043.2). Abstract In this diploma thesis we reviewed the selection of free software-based firewall appliances which are capable of running in a virtualized environment of a data centre. We conducted various performance tests on the most suitable appliance and compared the results to those of a hardware firewall. The testing was done by using Cisco network devices, IBM servers, VMware vSphere software and desktop computers. The conclusion of our study was that using a software based firewall appliance in such an environment is economically feasible and provides better performance compared to a hardware firewall if the server equipment for virtualization in the data centre is correctly chosen. vi KAZALO VSEBINE 1 UVOD .............................................................................................................. 1 2 ZNAČILNOSTI POŽARNIH PREGRAD ........................................................... 3 2.1 Filtriranje prometa ......................................................................................... 4 2.2 Prevajanje omrežnih naslovov ...................................................................... 8 2.3 Navidezna lokalna omrežja......................................................................... 10 2.4 Navidezna zasebna omrežja ...................................................................... 11 3 VIRTUALIZACIJA V PODATKOVNEM CENTRU .......................................... 17 3.1 Načini virtualizacije ..................................................................................... 18 3.2 Glavni predstavniki hipervizorjev tipa 1 ...................................................... 19 3.3 Glavni predstavniki hipervizorjev tipa 2 ...................................................... 20 4 PREGLED PROGRAMSKIH POŽARNIH PREGRAD .................................... 22 4.1 ClearOS ...................................................................................................... 22 4.2 Endian ........................................................................................................ 23 4.3 IPCop ......................................................................................................... 23 4.4 IPFire .......................................................................................................... 23 4.5 pfSense ...................................................................................................... 24 4.6 Smoothwall ................................................................................................. 24 4.7 Sophos ....................................................................................................... 25 4.8 Untangle ..................................................................................................... 25 4.9 VyOS .......................................................................................................... 26 4.10 Zeroshell ..................................................................................................... 26 4.11 Izbira najprimernejše izdaje programske požarne pregrade ....................... 27 5 POSTAVITEV RAZVOJNEGA OKOLJA ........................................................ 28 5.1 Opis in specifikacija strojne opreme ........................................................... 28 vii 5.2 Nastavitev lokalnega stikala........................................................................ 29 5.3 Namestitev in nastavitev okolja ESXi .......................................................... 30 6 NAMESTITEV IZBRANE POŽARNE PREGRADE ........................................ 36 6.1 Tvorjenje navideznega računalnika ............................................................ 36 6.2 Nastavitev dostopa do spletnega vmesnika in interneta ............................. 39 6.3 Tvorjenje vmesnikov VLAN ......................................................................... 42 6.4 Nastavitev filtriranja prometa ...................................................................... 44 6.5 Primer prevajanja omrežnih naslovov ......................................................... 47 6.6 Konfiguriranje strežnika VPN za daljinski dostop ........................................ 52 7 PREIZKUŠANJE ZMOGLJIVOSTI ................................................................. 58 7.1 Propustnost WAN–LAN .............................................................................. 60 7.2 Propustnost med omrežji VLAN .................................................................. 62 7.3 Propustnost VPN-jev .................................................................................. 65 8 SKLEP ........................................................................................................... 69 LITERATURA IN VIRI ........................................................................................... 70 viii KAZALO SLIK Slika 1.1: Klasična postavitev strojne požarne pregrade v podatkovnem centru. ... 1 Slika 1.2: Postavitev programske požarne pregrade v podatkovnem centru. ......... 2 Slika 2.1: Klasična razdelitev razpršitvene domene. ............................................ 10 Slika 2.2: Zgradba okvirja IEEE 802.1Q. .............................................................. 10 Slika 2.3 Tipa omrežnih vmesnikov VLAN. ........................................................... 11 Slika 2.4: Poenostavljen prikaz povezave pri šifriranju AES. ................................ 15 Slika 2.5: Poenostavljen prikaz povezave SSL/TLS. ............................................ 15 Slika 3.1: Predstavitev virtualizacije. .................................................................... 17 Slika 3.2: Hipervizor tipa 1 in tipa 2. ..................................................................... 19 Slika 5.1: Shema začetne postavitve omrežja. ..................................................... 28 Slika 5.2: Tvorjenje VLAN-ov na stikalu. .............................................................. 30 Slika 5.3: Glavni meni ESXi. ................................................................................. 31 Slika 5.4: Konfiguriranje nadzornega omrežja ESXi. ............................................ 31 Slika 5.5: Nastavitev naslova IP ESXi. ................................................................. 32 Slika 5.6: Glavno okno odjemalca vSphere ESXi. ................................................ 33 Slika 5.7: Začetno stanje omrežnih nastavitev ESXi. ........................................... 33 Slika 5.8: Končna postavitev omrežja strežnika ESXi. ......................................... 34 Slika 6.1: Datotečni sistem strežnika ESXi. .......................................................... 36 Slika 6.2: Tvorjenje novega navideznega računalnika. ......................................... 37 Slika 6.3: Nastavitev omrežja navideznega računalnika. ...................................... 37 Slika 6.4: Nastavitve strojne opreme navideznega računalnika............................ 38 Slika 6.5: Zagonski meni pfSense. ....................................................................... 39 Slika 6.6: Glavni konzolni meni pfSense. ............................................................. 40 Slika 6.7: Glavni spletni meni pfSense. ................................................................ 41 Slika 6.8: Tvorjenje VLAN-a na pfSense. ............................................................. 42 Slika 6.9: Nastavitev omrežnih vmesnikov pfSense. ............................................ 42 Slika 6.10: Nastavitev posameznega omrežnega vmesnika pfSense. ................. 43 Slika 6.11: Končna postavitev vmesnikov pfSense. ............................................
Recommended publications
  • Zeroshell-Manual-Spanish.Pdf
    Zeroshell HOWTO The multifunctional OS created by [email protected] www.zeroshell.net How to secure my private network ( Author: [email protected] ) Cómo proteger mi red privada: Esta breve guía nos permitirá configurar un firewall de red para nuestra red en menos de una hora. Zeroshell garantizará ourprivate red de ataques externos. Nuestra red privada está conectada a Internet a través de un router.Here xDSL los pasos a seguir: Primera puesta en marcha e inicio de sesión preparar un disco partición donde almacenar nuestras configuraciones de almacenamiento de nuestra configuración de los adaptadores de red de configuración de navegación en Internet Portal Cautivo de activación de servicio DNS del servicio DHCP rutas estáticas a redes remotas a servidores virtuales de Seguridad: control de las políticas por defecto En Zeroshell podemos encontrar muchas otras características importantes para las redes más complejas, lo cual es una solución escalable para nuestra red. Primera puesta en marcha e inicio de sesión: Después de arrancar desde el CD, el sistema es accesible con un navegador en el http seguro: https: / / 192.168.0.75 La aceptación de la conexión segura se nos pide usuario y contraseña para Entrar: Utilice los siguientes: Usuario: admin Contraseña: zeroshell Ahora podemos usar la interfaz web para configurar nuestro servidor de seguridad. Preparación de una partición en el disco para almacenar nuestras configuraciones: Es tan importante para salvar a nuestros Zeroshell cambios que nos permite guardar en un archivo de configuración. Se puede almacenar en un partición de un disco duro. No es necesario farmat las particiones existentes, podemos guardar nuestros archivos de configuración en particiones existentes, tales como: ext3, ReiserFS, ext2 o FAT32.
    [Show full text]
  • Hotspot Feature for Wi-Fi Clients with RADIUS User Authentication on Digi Transport
    Application Note 56 Hotspot feature for Wi-Fi clients with RADIUS User Authentication on Digi TransPort. Digi Support November 2015 1 Contents 1 Introduction ......................................................................................................................................... 4 1.1 Outline ......................................................................................................................................... 4 1.2 Assumptions ................................................................................................................................ 4 1.3 Corrections .................................................................................................................................. 4 2 Version .................................................................................................................................................5 3 Configuration .......................................................................................................................................5 3.1 Mobile Interface Configuration .....................................................................................................5 3.2 Ethernet Interface Configuration ................................................................................................. 6 3.2.1 ETH 0 Configuration ................................................................................................................. 6 3.2.2 ETH 12 Logical Interface Configuration ....................................................................................
    [Show full text]
  • July Edition
    July Edition From the Technical Coordinator From the Section Emergency Coordinator From the Affiliated Club Coordinator From the Public Information Coordinator From the Section Traffic Manager Out and About From the Educational Outreach ARES Training Update From the Official Observer Coordinator Handbook Give Away DMR Fun Things To Do, Classes & Hamfests Too Weather Underground Stations Club Corner Final.. Final.. From the Technical Coordinator Jeff Kopcak – K8JTK TC [email protected] Hey Gang, Around the time of Dayton, the FBI asked everyone to reboot their routers. Why would they do that? Over the last two years more than 500,000 consumer and small business routers in 54 countries have become infected with a piece of malware called “VPNFilter.” This sophisticated malware is thought to be the work of a government and somewhat targeted with many of the infected routers located in Ukraine. Security researchers are still trying to determine what exactly VPNFilter was built to do. So far, it is known to eavesdrop on Internet traffic grabbing logon credentials and looking for specific types of traffic such as SCADA, a networking protocol controlling power plants, chemical plants, and industrial systems. Actively, it can “brick” the infected device. Src: Cisco’s Talos Intelligence Group Blog Bricking is a term to mean ‘render the device completely unusable’ and being as useful as a brick. In addition to these threats, this malware can survive a reboot. Wait, didn’t the FBI ask all of us to reboot our routers? Won’t that clear the infection? No. In order for this malware to figure out what it needs to do, it reaches out to a command-and-control server.
    [Show full text]
  • PROPOSTA DE PROJETO INTEGRADOR Discente: Rodrigo
    PROPOSTA DE PROJETO INTEGRADOR Discente: Rodrigo Neitzke dos Santos Curso: Redes de Computadores E-mail: [email protected] Enderec¸o: Rua Sao˜ Paulo, 731 - Tresˆ vendas - Pelotas CEP: 96065-550 Fone(s): (53) 984047299 T´ITULO Soluc¸ao˜ de firewall com equipamento ARM. MOTIVAC¸ AO/JUSTIFICATIVA˜ Atualmente as redes de computadores ja´ estao˜ ligadas diretamente na criac¸ao˜ de uma empresa[Tanenbaum 1981], pois e´ nesta rede que trafegara´ os dados das aplicac¸oes˜ usadas no am- biente corporativo. Para a seguranc¸a da empresa e uma boa administrac¸ao˜ da seguranc¸a dos sistemas se faz necessario´ o uso de servidores firewall[Neto 2004], que tem a func¸ao˜ de proteger a rede de aces- sos nao˜ autorizados e agregado neste servidor podemos ter outros servic¸os como Roteamento, DHCP, Radius,failover, entre outros. As pequenas e ate´ medias empresas nao˜ costumam insvestir neste tipo de soluc¸ao,˜ em muitos dos casos este servic¸o nao˜ e´ aplicado e existem casos que o proprio´ modem ADSL realiza este servic¸o, no qual podera´ provocar vulnerabilidades e baixo desempenho nesta rede de computadores. Como soluc¸ao˜ de baixo custo para as empresas de pequeno porte, sera´ aplicado um conjunto de hardware embarcado com processador ARM[techtudo ], junto com uma distribuic¸ao˜ linux, no qual proporcionara´ desempenho e varias´ funcionalidades. OBJETIVO GERAL Instalar e configurar um servidor de firewall em equipamento ARM e analisar seu desempenho. OBJETIVOS ESPEC´IFICOS Os objetivos espec´ıficos sao:˜ • Definir modelo do hardware [Orangepi 2018] a ser usado no projeto. • Estudo do sistema linux[Ricciardi ] para criac¸ao˜ do firewall.
    [Show full text]
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • Github: a Case Study of Linux/BSD Perceptions from Microsoft's
    1 FLOSS != GitHub: A Case Study of Linux/BSD Perceptions from Microsoft’s Acquisition of GitHub Raula Gaikovina Kula∗, Hideki Hata∗, Kenichi Matsumoto∗ ∗Nara Institute of Science and Technology, Japan {raula-k, hata, matumoto}@is.naist.jp Abstract—In 2018, the software industry giants Microsoft made has had its share of disagreements with Microsoft [6], [7], a move into the Open Source world by completing the acquisition [8], [9], the only reported negative opinion of free software of mega Open Source platform, GitHub. This acquisition was not community has different attitudes towards GitHub is the idea without controversy, as it is well-known that the free software communities includes not only the ability to use software freely, of ‘forking’ so far, as it it is considered as a danger to FLOSS but also the libre nature in Open Source Software. In this study, development [10]. our aim is to explore these perceptions in FLOSS developers. We In this paper, we report on how external events such as conducted a survey that covered traditional FLOSS source Linux, acquisition of the open source platform by a closed source and BSD communities and received 246 developer responses. organization triggers a FLOSS developers such the Linux/ The results of the survey confirm that the free community did trigger some communities to move away from GitHub and raised BSD Free Software communities. discussions into free and open software on the GitHub platform. The study reminds us that although GitHub is influential and II. TARGET SUBJECTS AND SURVEY DESIGN trendy, it does not representative all FLOSS communities.
    [Show full text]
  • Debian \ Amber \ Arco-Debian \ Arc-Live \ Aslinux \ Beatrix
    Debian \ Amber \ Arco-Debian \ Arc-Live \ ASLinux \ BeatriX \ BlackRhino \ BlankON \ Bluewall \ BOSS \ Canaima \ Clonezilla Live \ Conducit \ Corel \ Xandros \ DeadCD \ Olive \ DeMuDi \ \ 64Studio (64 Studio) \ DoudouLinux \ DRBL \ Elive \ Epidemic \ Estrella Roja \ Euronode \ GALPon MiniNo \ Gibraltar \ GNUGuitarINUX \ gnuLiNex \ \ Lihuen \ grml \ Guadalinex \ Impi \ Inquisitor \ Linux Mint Debian \ LliureX \ K-DEMar \ kademar \ Knoppix \ \ B2D \ \ Bioknoppix \ \ Damn Small Linux \ \ \ Hikarunix \ \ \ DSL-N \ \ \ Damn Vulnerable Linux \ \ Danix \ \ Feather \ \ INSERT \ \ Joatha \ \ Kaella \ \ Kanotix \ \ \ Auditor Security Linux \ \ \ Backtrack \ \ \ Parsix \ \ Kurumin \ \ \ Dizinha \ \ \ \ NeoDizinha \ \ \ \ Patinho Faminto \ \ \ Kalango \ \ \ Poseidon \ \ MAX \ \ Medialinux \ \ Mediainlinux \ \ ArtistX \ \ Morphix \ \ \ Aquamorph \ \ \ Dreamlinux \ \ \ Hiwix \ \ \ Hiweed \ \ \ \ Deepin \ \ \ ZoneCD \ \ Musix \ \ ParallelKnoppix \ \ Quantian \ \ Shabdix \ \ Symphony OS \ \ Whoppix \ \ WHAX \ LEAF \ Libranet \ Librassoc \ Lindows \ Linspire \ \ Freespire \ Liquid Lemur \ Matriux \ MEPIS \ SimplyMEPIS \ \ antiX \ \ \ Swift \ Metamorphose \ miniwoody \ Bonzai \ MoLinux \ \ Tirwal \ NepaLinux \ Nova \ Omoikane (Arma) \ OpenMediaVault \ OS2005 \ Maemo \ Meego Harmattan \ PelicanHPC \ Progeny \ Progress \ Proxmox \ PureOS \ Red Ribbon \ Resulinux \ Rxart \ SalineOS \ Semplice \ sidux \ aptosid \ \ siduction \ Skolelinux \ Snowlinux \ srvRX live \ Storm \ Tails \ ThinClientOS \ Trisquel \ Tuquito \ Ubuntu \ \ A/V \ \ AV \ \ Airinux \ \ Arabian
    [Show full text]
  • Zeroshell HOWTO
    Zeroshell HOWTO The multifunctional OS created by [email protected] www.zeroshell.net How to secure my private network ( Author: [email protected] ) How to secure my private Network : This short guide will let us configure a network firewall for our network in less than one hour. Zeroshell will secure our private network from external attacks. Our private network is connected to internet through a xDSL router. Here the steps to follow : First start and login Preparing a partition disk where to store our configurations Storing our configuration Network adapters configuration Internet surfing Captive Portal activation DNS Service DHCP Service Static routes to remote networks Virtual Servers Security: check default policies In Zeroshell we can find many other important features for more complex networks; this is a great scalable solution for our network. First start and login: After booting from CD, the system is reachable with a browser at the http secure: https://192.168.0.75 Accepting the secure connection we are asked user and password to login: Use these: User: admin Password: zeroshell Now we can use web interface to setup our firewall. Preparing a partition disk where to store our configurations: It’s so important to save our changes that Zeroshell lets us save them in a configuration file. It can be stored in a partition on a hard disk. It’s not necessary to farmat any existing partitions, we can save our configuration files in existing partition such as: ext3, reiserfs, ext2 o fat32. For my own preference I prefer to create a new partition ext3.
    [Show full text]
  • Sintesi Catalogo Competenze 2
    Internet of Things Competenze Campi di applicazione • Progettazione e sviluppo di firmware su micro • Monitoraggio ambientale meteorologico di para- controllori a basso e bassissimo consumo quali ad metri climatici e parametri della qualità dell’aria, esempio Arduino, Microchip, NXP, Texas Instru- anche in mobilità ments e Freescale • Monitoraggio ambientale distribuito per l’agricol- • Sviluppo su PC embedded basati su processori tura di precisione ARM e sistema operativo Linux quali ad esempio • Monitoraggio della qualità dell’acqua e dei parame- Portux, Odroid, RaspberryPI ed Nvidia Jetson tri di rischio ambientale (alluvioni, frane, ecc.) • Progettazione e sviluppo di Wired e Wireless Sen- • Monitoraggio di ambienti indoor (scuole, bibliote- sor Networks basate su standard quali ZigBee, che, uffici pubblici, ecc) SimpliciTI, 6LoWPAN, 802.15.4 e Modbus • Smart building: efficienza energetica, comfort am- • Progettazione e sviluppo di sistemi ad alimentazio- bientale e sicurezza ne autonoma e soluzioni di Energy harvesting • Utilizzo di piattaforme microUAV per misure distri- • Ottimizzazione di software e protocolli wireless buite, per applicazioni di fotogrammetria, teleme- per l’uso efficiente dell’energia all’interno di nodi tria e cartografia, per sistemi di navigazione auto- ad alimentazione autonoma matica basata su sensoristica e image processing, • Design e prototipazione (con strumenti CAD, pianificazione e gestione delle missioni stampante 3D, ecc) di circuiti elettronici per l’inte- • Smart Grid locale per l’ottimizzazione
    [Show full text]
  • Vyos Documentation Release Current
    VyOS Documentation Release current VyOS maintainers and contributors Jun 04, 2019 Contents: 1 Installation 3 1.1 Verify digital signatures.........................................5 2 Command-Line Interface 7 3 Quick Start Guide 9 3.1 Basic QoS................................................ 11 4 Configuration Overview 13 5 Network Interfaces 17 5.1 Interface Addresses........................................... 18 5.2 Dummy Interfaces............................................ 20 5.3 Ethernet Interfaces............................................ 20 5.4 L2TPv3 Interfaces............................................ 21 5.5 PPPoE.................................................. 23 5.6 Wireless Interfaces............................................ 25 5.7 Bridging................................................. 26 5.8 Bonding................................................. 27 5.9 Tunnel Interfaces............................................. 28 5.10 VLAN Sub-Interfaces (802.1Q)..................................... 31 5.11 QinQ................................................... 32 5.12 VXLAN................................................. 33 5.13 WireGuard VPN Interface........................................ 37 6 Routing 41 6.1 Static................................................... 41 6.2 RIP.................................................... 41 6.3 OSPF................................................... 42 6.4 BGP................................................... 43 6.5 ARP................................................... 45 7
    [Show full text]
  • Deploying IBM Spectrum Accelerate on Cloud
    Front cover Deploying IBM Spectrum Accelerate on Cloud Bert Dufrasne Nancy Kinney Donald Mathisen Christopher Moore Markus Oscheka Ralf Wohlfarth Eric Zhang Redpaper International Technical Support Organization Deploying IBM Spectrum Accelerate on Cloud December 2015 REDP-5261-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (December 2015) This edition applies to IBM Spectrum Accelerate Version 11.5 © Copyright International Business Machines Corporation 2015. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi IBM Redbooks promotions . vii Preface . ix Authors. ix Now you can become a published author, too . xi Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Introducing IBM SoftLayer and IBM Spectrum Accelerate . 1 1.1 IBM Cloud computing overview. 2 1.2 IBM SoftLayer Cloud overview . 3 1.3 IBM Spectrum Accelerate . 6 1.3.1 IBM Spectrum Accelerate on Cloud . 7 Chapter 2. IBM Spectrum Accelerate on Cloud . 9 2.1 Description of service . 10 2.2 Customer responsibilities . 11 2.3 Configuration types . 11 2.4 Hardware in SoftLayer data centers . 12 2.5 Ordering process. 12 2.5.1 Order process flow . 12 2.6 Changes to the existing configuration . 13 2.6.1 Increasing capacity and performance . 13 2.6.2 Capacity and performance reduction . 13 2.6.3 Termination of service. 13 2.7 Restrictions . 14 2.7.1 Ordering for use in customer SoftLayer account. 14 2.8 Connectivity.
    [Show full text]
  • Virtual Router Performance
    SOFTWARE DEFINED NETWORKING: VIRTUAL ROUTER PERFORMANCE Bachelor Degree Project in Network and System Administration Level ECTS Spring term 2016 Björn Svantesson Supervisor: Jianguo Ding Examiner: Manfred Jeusfeld Table of Contents 1Introduction..........................................................................................................................................1 2Background...........................................................................................................................................2 2.1Virtualization................................................................................................................................2 2.2Hypervisors...................................................................................................................................2 2.3VMware ESXi................................................................................................................................2 2.4Software defined networking.......................................................................................................3 2.5The split of the data and control plane........................................................................................3 2.6Centralization of network control................................................................................................4 2.7Network virtualization..................................................................................................................4 2.8Software routers..........................................................................................................................6
    [Show full text]