Silverpeak Assessment of 4 Large Sites with Cisco + Palo Alto

Total Page:16

File Type:pdf, Size:1020Kb

Silverpeak Assessment of 4 Large Sites with Cisco + Palo Alto SilverPeak Assessment of 4 Large Sites with Cisco + Palo Alto Certification: Wingspan Assessments is a division of Fireowls Corp., an Authorized Deployment Partner of Silver Peak Systems. This was an actual assessment performed by a certified SPSX (Silver Peak Expert), Palo Alto expert, and CCIE. Objective This effort is intended to assess a current Silver Peak network for enabling the network at Exponix to allow different types of traffic over public Internet and private transport by using Silver Peak infrastructure, utilizing the Silver Peak appliances in active/standby, and leveraging OSPF routing. 1. General Considerations 1.1 Software Upgrade In order to leverage the latest features and provide fixes to the appliances, a software upgrade is recommended. This is suggested as first step of the deployment phase. In order to leverage the latest features and provide fixes to the appliances, a software upgrade is recommended. • GA-WAN-A • MI-WAN-A 1.2 Deployment Mode In order to take full advantage of the Silver Peak features, it is recommended to deploy all the appliances using inline router mode (ILRM). This will allow a tighter integration to the existing network. 1.3 WAN Interfaces and Labels The current setup includes two WAN links per active appliance. Dallas and Denver have two Internet circuits, whereas Seattle and San Diego have one Internet connection and a point-to-point link connecting them. Optionally, there is opportunity to augment the redundancy and capacity at those sites with one Internet connection each at Seattle and San Diego. Enabling the LAN1 interface as a WAN connection will provide the mentioned extra level of redundancy. For every WAN interface on the Silver Peak appliances, a label is required in order to establish a relationship with the Overlays. The labels currently configured are properly in place. If it is decided to add an extra interface, an extra label would be required. The label distribution is as follows: • San Diego. TU_GA_PTP, Internet_1, Internet_2 (optional). • Seattle. TO_GA_PTP, Internet_1, Internet_2 (optional). • Dallas. Internet_1, Internet_2. • Denver. Internet_1, Internet_2. Finally, it is recommended to create a cross-connect between the two Internet interfaces on each appliance. © 2020 www.WingspanAssessments.com by Fireowls Corp. [email protected] SilverPeak Assessment of 4 Large Sites with Cisco + Palo Alto 1.4 Business Intent Overlays Looking to classify and be able to establish different policies according to the type of traffic, new overlay templates are recommended. The order of the overlays in the Orchestrator (top-bottom) will determine the matching order of the traffic. The new overlays to be created and deployed to the appliances at all locations are: 1.4.1 Real-time Overlay This overlay will take care mainly of voice and video traffic flows. o Type of traffic. Applications/services to be matched are: ▪ DSCP EF – Expedite Forwarding. ▪ CISCO_SKINNY, GOOGLE-TALK, GOOGLE-TALK-VOICE-VIDEO, H_323, HP, IAX2, IVPIP, MGCP, MIRALIX, NETIQ, NVP-II, OCTOPUS, PARADIGM, PERSEUS, PHONE, RTCP, RTP, RTP_MUX, RTP_VIDEO, RTP_VOICE, RTSP, SIP, SIP_TLS, SKYPEFORBUSINESS, SPEECH- DISPATCHER, SPEECH-SYNTHESIS, TEAMSPEAK, TIDAL, TIVOCONNECT, VENTRILO, VERTEL, VIBER, VOICEIP-ACS, VONAGE, WINDOWS-LIVE-MESSENGER, WINMX, ZOOM. o Topology. For this scope, the network topology to be used is mesh. o Peer Unavailable Action: Pass Through. o WAN Links: ▪ Primary: Internet_1. ▪ Backup: Internet_2, SU_FL_PTP. ▪ Cross-connect: Internet_1, Internet_2. ▪ Backup ports to be used on blackout. o Bonding Policy: High Quality. o Internet Traffic Policy: ▪ Preferred Policy Order: • Break Out Locally. • Backhaul Via Overlay. • Drop. ▪ Break Out Locally Using: • Primary: Internet_1. • Backup: Internet_2, SU_FL_PTP. o Traffic Management: ▪ Traffic Class: RealTime (3). ▪ LAN-DSCP: trust-lan. ▪ WAN-DSCP: trust-lan. ▪ Boost: Not applied. 1.4.2 Interactive Overlay © 2020 www.WingspanAssessments.com by Fireowls Corp. [email protected] SilverPeak Assessment of 4 Large Sites with Cisco + Palo Alto The interactive overlay includes mostly system/network management – well-known TCP applications and flows. o Type of traffic. Applications/services to be matched are: ▪ ADOBE, AIRS, AMMYY, AOL, APPLE-REMOTE-DESKTOP, ASF-RMCP, AVIRA, BLUEJEANS, BLUESTACKS, BROCADE, CDDBP, CISCO-AON-AMC, CITADEL, CITRIX-ICA, CODENGER, DART, DCN-MEAS, DEFAULT-PORT, DTSPCD, FARMING, FCP, FLEXNET, GDB, GE, GOBBY, GOOGLE, GOOGLEDRIVE, GOOGLEFORMS, GOOGLEUSERCONTENT, GOTOASSIST, GOTOMEETING, GOTOTRAINING, GOTOWEBINAR, HOTLINE, HTTP-RPC-EP-MAP, IBM, ICHAT, ICQ-AOL, INSTEON, INTUIT, IRC, IRC_SSL, IRCS, IRDMI, IVISIT, JOSM, KSHELL, LANTRONIX, LEECO-POS, LOTUS_NOTES, LYSKOM-PROTOCOL-A, MACOS-X, MDBS- DAEMON, MEMCACHED, MESSAGEASAP, MESSENGER, METASYS, MIRALIX, MK, MMCP, MMS, MOBRIEN-CHAT, MS_MESSENGER, MS_RPC, MS_TERMINAL_SERVICES, NCA, NETSUPPORT, NMEA, NOVELL, ONC, OPEN-OBJECT-REXX, OPENERP, OPENWINDOWS, OPSWARE, ORACLE, ORTHANC, OSISOFT, PBX, PCANYWHERE, PCANYWHEREDATA, PCANYWHERESTAT, PCOIP, POWERSCHOOL, POWERSHELL, PRM, PSYBNC, RADMIN, REMOTE-ADMINISTRATOR, REMOTE-SHELL, REXEC, RFB-VNC, RICCI, RLOGIN, RMI, RPC, RPC2PORTMAP, RTSP, SAGE, SCOL, SHELL, SPLASHTOP, SPLUNK, SSH, SSHELL, SUN_RPC, SYMANTEC-I3, SYNCTHING, TACACS, TEAMVIEWER, TEAMWARE, TELNET, TELNETS, TERADICI, TERMINAL-ACCESS, THEOSNET, THINLINC, TIMBUKTU, TIVOLI, TNTCHAT, TPM, TRACKIT, VENTRILO, VIBER, VMCONNECT, VNC, WBT, WEBEX, WINDOWS, WINRM, X-BEAT, X11, XMPP, XWINDOWS, YAHOO, ZEPHYR-CLT, ZEPHYR-HM, ZEPHYR-SRV, ZIMBRA. o Topology. For this scope, the network topology to be used is mesh. o Peer Unavailable Action: Pass Through. o WAN Links: ▪ Primary: Internet_1, Internet_2, SU_FL_PTP. ▪ Backup: N/A. ▪ Cross-connect: Internet_1, Internet_2. o Bonding Policy: High Quality. o Internet Traffic Policy: ▪ Preferred Policy Order: • Break Out Locally. • Backhaul Via Overlay. • Drop. ▪ Break Out Locally Using: • Primary: Internet_1. • Backup: Internet_2, SU_FL_PTP. o Traffic Management: ▪ Traffic Class: Interactive (2). ▪ LAN-DSCP: trust-lan. ▪ WAN-DSCP: trust-lan. ▪ Boost: Enabled. © 2020 www.WingspanAssessments.com by Fireowls Corp. [email protected] SilverPeak Assessment of 4 Large Sites with Cisco + Palo Alto 1.4.3 Data replication Overlay Data replication is a more customized overlay. In this case the requirements include: o Zerto Virtual Replication, SQL, as well as Exchange. o To be matched either by IP addresses, IP subnets, or TCP/UDP ports. o Type of traffic. Applications/services to be matched are: ▪ Zerto Virtual Replication, SQL, Exchange, as well as any replication-related application determined by Exponix. o Topology. For this scope, the network topology to be used is mesh. o Peer Unavailable Action: Pass Through. o WAN Links: ▪ Primary: SU_FL_PTP. ▪ Backup: Internet_1, Internet_2. ▪ Cross-connect: Internet_1, Internet_2. ▪ Backup ports to be used on blackout. o Bonding Policy: High Throughput. o Internet Traffic Policy: ▪ Preferred Policy Order: • Break Out Locally. • Backhaul Via Overlay. • Drop. ▪ Break Out Locally Using: • Primary: Internet_1. • Backup: Internet_2, SU_FL_PTP. o Traffic Management: ▪ Traffic Class: Replication (4). ▪ LAN-DSCP: trust-lan. ▪ WAN-DSCP: trust-lan. ▪ Boost: Enabled. Note: Enabling boost for replication depends on the volume of traffic to be replicated, and the priority for this traffic. 1.4.4 Default Overlay This is a general overlay for traffic not matching any of the above overlays. o Type of traffic. Applications/services to be matched are: ▪ Any Traffic. o Topology. For this scope, the network topology to be used is mesh. o Peer Unavailable Action: Pass Through. o WAN Links: ▪ Primary: Internet_1, Internet_2, SU_FL_PTP. ▪ Backup: N/A. ▪ Cross-connect: Internet_1, Internet_2. © 2020 www.WingspanAssessments.com by Fireowls Corp. [email protected] SilverPeak Assessment of 4 Large Sites with Cisco + Palo Alto o Bonding Policy: High Throughput. o Internet Traffic Policy: ▪ Preferred Policy Order: • Break Out Locally. • Backhaul Via Overlay. • Drop. ▪ Break Out Locally Using: • Primary: Internet_2. • Backup: Internet_1, SU_FL_PTP. o Traffic Management: ▪ Traffic Class: Default (1). ▪ LAN-DSCP: trust-lan. ▪ WAN-DSCP: trust-lan. ▪ Boost: Enabled. 2. Site-specific Actions There are actions required for every location, some are particular to the location/datacenter and others are equivalent to some of the sites. In addition, the appendix A illustrates the final diagrams for the locations. Note: The bandwidth and boost values proposed below are recommended on a first stage basis. It is very important to constantly monitor and optimize these parameters in order to obtain the most out of the Silver Peak solution. 2.1 San Diego • As previously mentioned, WAN-1 needs to be converted to inline router mode (ILRM). • WAN-1 software version needs to be upgraded to match the existing appliances in router mode (8.1.7.8_70865). • Optionally, but recommended, a third WAN interface can be configured with label Internet_2. If this interface is deployed, the next hop for each Internet interface will be the physical IP address of the corresponding Internet router. • Initial Recommended Bandwidth. These values are an estimate based on the current Committed Information Rate, media from traffic graphs, as well as Silver Peak Orchestrator statistics. o Point-to-point: 500Mbps. o Internet VERIZON: 150Mbps. o Internet Comcast: 150Mbps. • Recommended Boost. The suggested value is an approximate using as reference the bandwidth
Recommended publications
  • BDP-Case-Study-Architecture-Industry.Pdf
    Case Study Achieving Resilience During the COVID19 Crisis: BDP Shares their Splashtop Story About BDP Alistair Kell PRINCIPAL, IT AND PROCESS AT BDP Founded in 1961, BDP is the 2nd largest architect-led firm in the UK, with over 16 locations globally and 1,350 employees. BDP has a leading track record in all major sectors, including health, education, workplace, retail, urbanism, heritage, housing, transport, leisure, public safety, and energy utilities. This includes the restoration of the UK Houses of Parliament. Summary Alistair Kell, principal and head of information technology and processes at BDP, explains how during the COVID19 crisis, his company-- an international, interdisciplinary practice of architects, designers, engineers and urbanists -- got all employees working remotely in 48 hours with Splashtop Remote Access Solutions. When COVID19 hit, BDP looked at several options to enable employees to work from home. The number of software employees needed to access for working efficiently, the big size of the team, and a sense of urgency made this quite the challenge: • Hardware needs - Would employees have a personal computer they could connect from at home, or would they only have a BDP laptop? • Keeping the current infrastructure stable - How could BDP keep everything stable while ensuring there were no unnecessary changes to the company underlying infrastructure? • Urgency and cost - How could BDP deploy quickly without incurring an unreasonable cost? Due to all these concerns, BDP believed that the whole process to go remote would take at least two or three weeks of turmoil in getting ready. However, thanks to BDP’s IT team and Splashtop remote access solutions, it didn’t take so long.
    [Show full text]
  • Embedded Linux for Thin Clients Next Generation (Elux® NG) Version 1.25
    Embedded Linux for Thin Clients Next Generation (eLux® NG) Version 1.25 Administrator’s Guide Build Nr.: 23 UniCon Software GmbH www.myelux.com eLux® NG Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express consent of UniCon Software GmbH. © by UniCon 2005 Software GmbH. All rights reserved eLux is a registered trademark of UniCon Software GmbH in Germany. Accelerated-X is a trademark of Xi Graphics, Inc. Adobe, Acrobat Reader and PostScript are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Broadcom is a registered trademark of Broadcom Corporation in the U.S. and/or other countries. CardOS is a registered trademark and CONNECT2AIR is a trademark of Siemens AG in Germany and/or other countries. Cisco and Aironet are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Citrix, Independent Computing Architecture (ICA), Program Neighborhood, MetaFrame, and MetaFrame XP are registered trademarks or trademarks of Citrix Systems, Inc. in the United States and other countries. CUPS and the Common UNIX Printing System are the trademark property of Easy Software Products. DivX is a trademark of Project Mayo. Ericom and PowerTerm are registered trademarks of Ericom Software in the United States and/or other countries. Gemplus is a registered trademark and GemSAFE a trademark of Gemplus.
    [Show full text]
  • Applications Log Viewer
    4/1/2017 Sophos Applications Log Viewer MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics Name * Mike App Filter PROTECT Description Based on Block filter avoidance apps Firewall Intrusion Prevention Web Enable Micro App Discovery Applications Wireless Email Web Server Advanced Threat CONFIGURE Application Application Filter Criteria Schedule Action VPN Network Category = Infrastructure, Netw... Routing Risk = 1-Very Low, 2- FTPS-Data, FTP-DataTransfer, FTP-Control, FTP Delete Request, FTP Upload Request, FTP Base, Low, 4... All the Allow Authentication FTPS, FTP Download Request Characteristics = Prone Time to misuse, Tra... System Services Technology = Client Server, Netwo... SYSTEM Profiles Category = File Transfer, Hosts and Services Confe... Risk = 3-Medium Administration All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Excessive Bandwidth,... Backup & Firmware Technology = Client Server Certificates Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#71826 1/4 4/1/2017 Sophos Application Application Filter Criteria Schedule Action Applications Log Viewer Facebook Applications, Docstoc Website, Facebook Plugin, MySpace Website, MySpace.cn Website, Twitter Website, Facebook Website, Bebo Website, Classmates Website, LinkedIN Compose Webmail, Digg Web Login, Flickr Website, Flickr Web Upload, Friendfeed Web Login, MONITOR & ANALYZE Hootsuite Web Login, Friendster Web Login, Hi5 Website, Facebook Video
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Institutionen För Datavetenskap Department of Computer and Information Science
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A—14/015--SE 6/28/14 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A--14/015--SE June 28, 2014 Supervisors: Peter Åstrand (Cendio AB), Maria Vasilevskaya (IDA) Examiner: Prof. Simin Nadjm-Tehrani På svenska Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ In English The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • Remote Process Control Over the Internet
    Session 1520 Remote Process Control over the Internet Mark Smith Purdue University North Central Abstract This paper presents remote process control over the Internet using remote-control computing software. Remote-control computing software allows you to connect to remote computers from your computer and control those systems. You can monitor and control attached system processes, provide problem solving assistance, upload and download files, and even change system parameters. This paper describes what remote-control computing is, who the major players in the industry are, and how it can be used to monitor and control remote processes. A case study of remote-control computing software in operation is also presented, describing how one off-the-shelf package was setup to monitor and control a plant floor production system. Introduction Networking technologies, and especially the Internet, have become a major component of application systems. As we teach the design and implementation of process control systems in the Engineering curriculum, we must recognize that these systems will require capabilities for control and support from remote locations. For example, the need for remote control may be driven by the high cost of a particular process. The Oak Ridge National Laboratory uses remote process control at its High Temperature Materials Laboratory to allow researches from across the country to use a million-dollar electron microscope1. Even when control of the process is not required across the country, there are times when it is helpful (or even critical) to monitor another node on a LAN. For example, Conquergood describes in his research the ability to monitor and control potentially high voltages from one location by gathering voltage information from PCs doing data acquisition from various plant processes2.
    [Show full text]
  • IGEL Universal Desktop Linux User Guide
    IGEL Thin Clients Universal Desktop User Guide For IGEL Thin Clients with IGEL Flash Linux Copyright © 2009 IGEL Technology Ver. UD-LX 4.02.100 12/2009 Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including the products and software described in it, may be reproduced, manipulated, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup purposes, without the express written permission of IGEL Technology GmbH. Disclaimer The information in this document is subject to change without notice. IGEL Technology GmbH makes no representations or warranties with respect to the contents hereof and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. Further, IGEL Technology GmbH reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of IGEL Technology GmbH to notify any person of such revision or changes. Trademark Recognition IGEL is a registered trademark of IGEL Technology GmbH. MicrosoftTM WindowsTM is a registered trademark of Microsoft Corporation. JavaTM is a registered trademark of Sun Microsystems, Inc. VMwareTM is a registered trademark of VMware, Inc. PowerTermTM WebConnectTM and PowerTermTM InterConnectTM are registered trademarks of Ericom Software. CUPSTM and the CUPS logo are trademarks of Apple Inc. All other products and corporate names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies, and are used only for identification or explanation and to the owner’s benefit.
    [Show full text]
  • Test Result Report for Anydesk
    Performance Test Results Report Prepared for AnyDesk For period 08/31/2020 – 09/09/2020 Reporter: Aliaksandr Hryshutsin Page: 1 of 13 Creation Date: 9/21/2020 Contents 1 Testing Approach ........................................................................................................................................... 3 1.1 Types of Tests ......................................................................................................................................... 3 1.2 Test set-up ............................................................................................................................................... 3 2 Summary on Test Results .............................................................................................................................. 4 2.1 Summary ................................................................................................................................................. 4 3 Test results ..................................................................................................................................................... 4 3.1 Framerate ................................................................................................................................................ 4 3.2 Latency .................................................................................................................................................... 5 3.3 Bandwidth ...............................................................................................................................................
    [Show full text]
  • Splashtop for Remote Labs Onboarding Guide for Member Roles, Including Students and Teachers
    Splashtop for Remote Labs Onboarding Guide for Member Roles, including Students and Teachers 2/11/2021 This guide goes over account setup for members (after receiving invite), installation, and general connection instructions. Table of Contents Account Setup & Installation ........................................................................................................................ 2 Remote Access & Usage ................................................................................................................................ 5 Settings for Best Performance ...................................................................................................................... 7 What should I do if the screen looks blurry, or the session is too small/big for my screen? ................... 8 What should I do if I have a slow remote connection? ............................................................................. 8 1 Account Setup & Installation 1. Your IT team will invite you to set up your Splashtop account. You will receive an email: Subject: “You've been invited to join a Splashtop team” 2. Click “Accept the invitation from your administrator”. 3. Create your Splashtop account and password and accept the invitation. (Single Sign-On users skip this step) 2 4. Go back to the invitation email, and click the link to install the free “Splashtop Business app”. You can also select the download from (https://www.splashtop.com/downloads#ba). 5. Choose which platform you would like to install on. Download and install the Business app. 3 6. Once installed, log into the Splashtop Business app. When trying to login, you should see a message to authenticate your login, “AUTHENTICATION REQUIRED”. This is to ensure the security of your account. You'll receive an email with an authentication link. Opening this link authenticates your computer and lets you login to the Splashtop Business application. 7. After the authentication, log in to the Business app with your credentials and you will be able to launch a remote session from that device.
    [Show full text]
  • Unpermitted Resources
    Process Check and Unpermitted Resources Common and Important Virtual Machines Parallels VMware VirtualBox CVMCompiler Windows Virtual PC Other Python Citrix Screen/File Sharing/Saving .exe File Name VNC, VPN, RFS, P2P and SSH Virtual Drives ● Dropbox.exe ● Dropbox ● OneDrive.exe ● OneDrive ● <name>.exe ● Google Drive ● etc. ● iCloud ● etc. Evernote / One Note ● Evernote_---.exe ● onenote.exe Go To Meeting ● gotomeeting launcher.exe / gotomeeting.exe TeamViewer ● TeamViewer.exe Chrome Remote ● remoting_host.exe www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ Messaging / Video (IM, IRC) / .exe File Name Audio Bonjour Google Hangouts (chrome.exe - shown as a tab) (Screen Sharing) Skype SkypeC2CPNRSvc.exe Music Streaming ● Spotify.exe (Spotify, Pandora, etc.) ● PandoraService.exe Steam Steam.exe ALL Processes Screen / File Sharing / Messaging / Video (IM, Virtual Machines (VM) Other Saving IRC) / Audio Virtual Box Splashtop Bonjour ● iChat ● iTunes ● iPhoto ● TiVo ● SubEthaEdit ● Contactizer, ● Things ● OmniFocuse phpVirtualBox TeamViewer MobileMe Parallels Sticky Notes Team Speak VMware One Note Ventrilo Windows Virtual PC Dropbox Sandboxd QEM (Linux only) Chrome Remote iStumbler HYPERBOX SkyDrive MSN Chat Boot Camp (dual boot) OneDrive Blackboard Chat CVMCompiler Google Drive Yahoo Messenger Office (Word, Excel, Skype etc.) www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ 2X Software Notepad Steam AerooAdmin Paint Origin AetherPal Go To Meeting Spotify Ammyy Admin Jing Facebook Messenger AnyDesk
    [Show full text]
  • Distance Learningʼs Impact on Education IT
    Key Insights Distance Learningʼs Impact on Education IT The changes taking place in the education COVID-19 caused an acceleration of K-12 education’s technology landscape as a result of the digital roadmap in three key areas: coronavirus school closures are extensive — and many will be permanent or evolving. Closing the “homework gap” to enable digital However, the rapid speed of change is creating learning. Mobile hotspots are increasingly going home, with students, new challenges for IT teams. creating an "always-connected" online learning dynamic1 New research by Absolute examines the Enabling remote and hybrid learning models. effects of distance learning on endpoint 75% of schools intend to operate remote or hybrid models2 health, device usage, safety, and security as schools adapt to remote and hybrid learning Protecting students, staff, and schools from cyberattacks. 60% of all malware attacks (particularly ransomware) occur in models in the 2020/21 school year. education3 To better understand what is happening on the ground, Millions of Absolute- 10,000 Schools and 12 analyst reports and Absolute studied: enabled devices districts peer research This is what we discovered… Reliance on devices to drive IT teams are doing School devices are mainly learning outcomes has more with less. being used for learning. While federal stimulus packages may help increased. 40% in the short term, long-term budgets are 16% YouTube, Edgenuity®, uncertain: Google Docs™, and 5% Google Classrooms 61% 28% are where most 11% students are increase in
    [Show full text]
  • Igel Os: Questions & Answers
    Q & A IGEL OS: QUESTIONS & ANSWERS What is IGEL OS? What is the IGEL UD Pocket? IGEL OS is a Linux-based operating system optimized The IGEL UD Pocket is a portable and powerful end- for secure, scalable delivery of virtual desktops and point solution. No larger than a paper clip, it allows you cloud workspaces. Referred to as “firmware”, IGEL to boot from the local operating system on a PC, laptop OS replaces (permanent or temporary) an existing or other compatible endpoint device. operating system, which means the legacy operating system will be permanently removed from the device’s hard disk. How is the UD Pocket started? Simply insert the UD Pocket into the USB port of the How can I get IGEL OS? host device. The device boots from the UD Pocket to access the IGEL OS and user interface. IGEL OS is part of the IGEL Workspace Edition, a bundled license offer, together with IGEL’s manage- ment software IGEL Universal Management Suite How is IGEL OS installed and deployed? (UMS), a multimedia Codec pack, high availability The most common way to install IGEL OS in a single functionality and a REST API. device is to start the target PC, laptop, or thin client using a bootable USB stick that runs the IGEL OS How can I get IGEL OS on my endponts? Creator tool. If you want to install IGEL OS on several devices, please use the OS Deployment Appliance. First identify the devices if you want to convert, either Comprehensive support is provided by the IGEL permanently or temporarily, into IGEL-managed end- Knowledge Base.
    [Show full text]