Tailf:Cli-Enforce-Table

Total Page:16

File Type:pdf, Size:1020Kb

Tailf:Cli-Enforce-Table Virtualize Your Enterprise Through Network Function Virtualization Cloud Technologies Jim French, Distinguished System Engineer, CCIE, CISSP [email protected] https://www.linkedin.com/in/frenchjp Enterprise NFV Agenda • NFV Requirements • Software Components • Hardware Components • Use Cases and Solutions • Putting IT Together 3 Network Function Virtualization Agenda • NFV Requirements • Use Cases • Fog / Edge / Branch • NFV Approach • Data Center • Software Components • Cloud / Shared Hosting • Linux KVM Hypervisor • Extranet • Service Function Chaining SFC • Solutions • Tail-f Confd • Cloud Services Platform CSP • Openstack* • vBranch • Elastic Services Controller ESC • Extranet • Network Services Orchestrator NSO • Virtual Managed Services VMS* • Hardware Components • Security Firepower 9300* • Fog/Edge/Branch NFV • Putting IT Together • Data Center NFV 4 Network Function Virtualization Abbreviations • BMA Bare Metal Agent • NFV Network Function Virtualization • CSP Cloud Services Platform • ODL Open Daylight Controller • CSR Cloud Services Router • PnP Plug and Play • OSC Open SDN Controller • SDN Software Defined Network • XRV IOS XR Virtual • SFC Service Function Chaining • VTS Virtual Topology System • VNF Virtual Network Function • VPP Vector Packet Processing • REST Representational State Transfer 5 Network Function Virtualization Requirements 6 Requirements Varied and Dynamic Enterprise Interactions Publishing Access Hosting User Device User Access Application Data Location Location Location Private Private Data Employee VDI Campus Leased Line NAS/SAN, Center DB SaaS Partner Data Partner PC Branch MPLS dedicated Center storage SaaS Increasing growth Decreasing Trust Decreasing Dedicated Vendor Mobile Home IPSec VPN integrated Hosting store Cloud Customer Thing Anywhere SSL/TLS Shared Client stored Hosting 7 Requirements Quickly & Securely Consume Resources and Capabilities Business Problems Architectures (Simplification Candidates) Create, Deploy, Operate, and Retire Workflows: Workflows • Places - Branch / Data Center / DMZ • People - Employee / Partner / Customer • Things - Device / Sensor / Camera / Etc Repeatable Workflows/Profiles • Applications – SAAS, IAAS / COTS, client/server • Collaboration – Meetings / Events Common Workflows Tasks Things to fix & Identify choke points achieve Simplification Operationally http://www.frenchjim.com/2015/10/the-b4b-red-pill-to-move-from-offering.html New Capabilities 8 Requirements Non-Default Policy Application Deployment Challenge Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party • Users, branches, extranetWOC partners,FW and applications change frequently QoS DNS Class Class ADC Monitor vSwitch • Many requirePolicy non-default experience, security, scale, or monitor • Complex Policy Policy services Class WCCP Route Span • Costly Client • NonDNS-default policy programmingVLAN is frequent, costly, and error pronevPath Server • InteractionsMap depend Redirecton many network servicesSNAT VACL • Error prone • Network services areTraditional from many different Network vendors • Never remove policies DCNM • Not secure 9 Requirements Non-Default Policy Application Deployment Challenge Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party WOC FW QoS DNS Class Class ADC Monitor vSwitch Policy • Complex Policy Policy Class WCCP Route Span • Client DNS Server Costly Map Redirect VLAN SNAT VACL vPath • Error prone Traditional Network • Never remove policies DCNM • Not secure 10 Requirements Non-Default Policy Application Deployment Challenge Application Owner Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party WOC FW QoS DNS Class Class ADC Monitor vSwitch Policy • Complex Policy Policy Class WCCP Route Span • Client DNS Server Costly Map Redirect VLAN SNAT VACL vPath • Error prone Traditional Network • Never remove policies DCNM • Not secure 11 Requirements Non-Default Policy Application Deployment Challenge Application Owner IPAM Network WANOpt Security ADC/App Monitor Virtual Admin Admin Admin Admin Admin Admin Admin Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party WOC FW QoS DNS Class Class ADC Monitor vSwitch Policy • Complex Policy Policy Class WCCP Route Span • Client DNS Server Costly Map Redirect VLAN SNAT VACL vPath • Error prone Traditional Network • Never remove policies DCNM • Not secure DC Network Admin 12 Requirements Non-Default Policy Application Deployment Challenge Application Owner IPAM Network WANOpt Security ADC/App Monitor Virtual Admin Admin Admin Admin Admin Admin Admin Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party WOC FW QoS DNS Class Class ADC Monitor vSwitch Policy • Complex Policy Policy Class WCCP Route Span • Client DNS Server Costly Map Redirect VLAN SNAT VACL vPath • Error prone Traditional Network • Never remove policies DCNM • Not secure DC Network Admin 13 Requirements Non-Default Policy Application Deployment Challenge Application Owner IPAM Network WANOpt Security ADC/App Monitor Virtual Admin Admin Admin Admin Admin Admin Admin Policy Configure Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party WOC FW QoS DNS Class Class ADC Monitor vSwitch Policy • Complex Policy Policy Class WCCP Route Span • Client DNS Server Costly Map Redirect VLAN SNAT VACL vPath • Error prone Traditional Network • Never remove policies DCNM • Not secure DC Network Admin 14 Requirements Non-Default Policy Application Deployment Challenge Application Owner IPAM Network WANOpt Security ADC/App Monitor Virtual Admin Admin Admin Admin Admin Admin Admin Policy Configure Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party WOC FW QoS DNS Class Class ADC Monitor vSwitch Policy • Complex Policy Policy Class WCCP Route Span • Client DNS Server Costly Map Redirect VLAN SNAT VACL vPath • Error prone Traditional Network • Never remove policies DCNM • Not secure Scale 15 DC Network Admin Insert, Chain, Requirements Non-Default Policy Application Deployment Challenge Application Owner IPAM Network WANOpt Security ADC/App Monitor Virtual Admin Admin Admin Admin Admin Admin Admin Policy Configure Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party WOC FW QoS DNS Class Class ADC Monitor vSwitch Policy • Complex Policy Policy Class WCCP Route Span • Client DNS Server Costly Map Redirect VLAN SNAT VACL vPath • Error prone Traditional Network • Never remove policies DCNM • Not secure Scale 16 DC Network Admin Insert, Chain, Requirements Non-Default Policy Application Deployment Challenge Application Owner IPAM Network WANOpt Security ADC/App Monitor Virtual Admin Admin Admin Admin Admin Admin Admin Policy Configure Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party Auto has ~10,000WOC applicationsFW with ~10 year lifespan QoS DNS 1000 applicationsClass deployedClass & ADCretired perMonitor year vSwitch • Complex Policy ~10 applications/weekPolicy programmedPolicy and unprogrammed (20% Class WCCP Route Span • Client DNS are non-default behavior) Server Costly Map Redirect VLAN SNAT VACL vPath CLI never intended to provide frequent policy change • Error prone Traditional Network Change control can’t keep up! • Never remove policies DCNM • Not secure Scale 17 DC Network Admin Insert, Chain, Requirements Non-Default Policy Application Deployment Challenge Application Owner IPAM Network WANOpt Security ADC/App Monitor Virtual Admin Admin Admin Admin Admin Admin Admin Policy Configure Prime Prime WOCM FWM ADCM vCenter 3rd Party 3rd Party • Users,Auto branches, has ~10,000 extranetWOC applications partners,FW and withapplications ~10 year change lifespan frequently QoS DNS Class Class ADC Monitor vSwitch • Many require1000Policy non applications-default experience, deployed security, & retired scale, per or yearmonitor • Complex Policy Policy ~10services applications/week programmed and unprogrammed (20% Class WCCP Route Span • Client • NonDNS-default policy programmingare non-default is frequent, behavior) costly, and error prone Server Costly Map Redirect VLAN SNAT VACL vPath • InteractionsCLI never depend intended on many to networkprovide services frequent policy change • Error prone Traditional Network • Network services Changeare from manycontrol different can’t vendorskeep up! • Never remove policies DCNM • Not secure Scale 18 DC Network Admin Insert, Chain, Requirements Where Are The Virtualizable Infrastructure Functions? Mirror App WAN Web DB Client Internet VM Servers Client / DMZ Data Center or Cloud Application Application Access Chain /Tenant Access Chain Access Chain Interaction Chain • Client Access Chains are on the perimeter of the access network • Data center or Tenant Chains reside on the WAN or Internet edge of the data center • Application Access Chains are in the server farm core with north/south traffic • Application Interaction Chain is in the server farm access with east/west traffic 19 Network Function Virtualization Approach 20 Network Function Virtualization Building Blocks . Hosting Nodes . Transport Nodes . Service Node (Aka VNF) – WAN Optimization – UCS B-series – NX-OS . Nexus 9/7/6/5/3/2/1K Controllers (WOC) - WAAS – UCS C-series – Security – IOS XE . Firewall - ASA – UCS M-series . ASR . NextGen Firewall - FirePower . CSR – UCS Express – Application Delivery . Catalyst 4500 Controller (ADC) – CSP-2100 . ISR 4400 – Application Performance – ISA 3000 – IOS XR Monitoring (APM) -NAM . ASR 9000 – Secure Web Gateways - . XRV WSA – IOS – Content Delivery Network – . Catalyst 2/3/6K VDS-IS . ISR – Application Components 21 Network Function Virtualization Service Nodes Contain One or More Service Functions • Transport • Security • Infrastructure
Recommended publications
  • Ekonomická Fakulta DIPLOMOVÁ PRÁCE
    TECHNICKÁ UNIVERZITA V LIBERCI Ekonomická fakulta DIPLOMOVÁ PRÁCE 2011 Martin Kolář Technická univerzita v Liberci Ekonomická fakulta Studijní program: M 6209 Systémové inţenýrství a informatika Studijní obor: Manaţerská informatika Možnosti nízkonákladových řešení IS malých a středních podniků s využitím on-line aplikací GOOGLE Low-costs IS solution possibilities for small and medium-sized enterprises using GOOGLE on-line applications DP – EF – KIN – 2011–9 MARTIN KOLÁŘ Vedoucí práce: doc. Ing. Jan Skrbek, Dr. - KIN Konzultant: Ing. Richard Lukeš Počet stran: 158 Počet příloh: 7 Datum odevzdání: 6. 5. 2011 Prohlášení Byl jsem seznámen s tím, ţe na mou diplomovou práci se plně vztahuje zákon č. 121/2000 Sb., o právu autorském, zejména § 60 – školní dílo. Beru na vědomí, ţe Technická univerzita v Liberci (TUL) nezasahuje do mých autorských práv uţitím mé diplomové práce pro vnitřní potřebu TUL. Uţiji-li diplomovou práci nebo poskytnu-li licenci k jejímu vyuţití, jsem si vědom povinnosti informovat o této skutečnosti TUL; v tomto případě má TUL právo ode mne poţadovat úhradu nákladů, které vynaloţila na vytvoření díla, aţ do jejich skutečné výše. Diplomovou práci jsem vypracoval samostatně s pouţitím uvedené literatury a na základě konzultací s vedoucím diplomové práce a konzultantem. V Liberci, 6. 5. 2011 5 Anotace Diplomová práce „Moţnosti nízkonákladových řešení IS malých a středních podniků s vyuţitím on-line aplikací GOOGLE“ pojednává o moderním pojetí tvorby informačních systémů pro firemní segment. Záměrem práce je vymezit moţnosti standardních a inovativních řešení podnikového IS a analyzovat nízkonákladové řešení, realizované formou cloud computingu od společnosti Google. V oblasti teorie se opírá o obecné zásady tvorby IS s ohledem na specifika malých a středních podniků.
    [Show full text]
  • September 2016 M&A and Investment Summary Table of Contents
    September 2016 M&A and Investment Summary Table of Contents 1 Overview of Monthly M&A and Investment Activity 3 2 Monthly M&A and Investment Activity by Industry Segment 8 3 Additional Monthly M&A and Investment Activity Data 40 4 About Petsky Prunier 52 Securities offered through Petsky Prunier Securities, LLC, member of FINRA. This M&A and Investment Summary has been prepared by and is being distributed in the United States by Petsky Prunier, a broker dealer registered with the U.S. SEC and a member of FINRA. 2| M&A and Investment Summary September 2016 M&A and Investment Summary for All Segments Transaction Distribution . A total of 463 deals were announced in September 2016, of which 296 were worth $20.7 billion in aggregate reported value . Software was the most active segment with 148 deals announced —98 of these transactions reported $8.9 billion in value . Marketing Technology was also active with 100 transactions announced, of which 67 were worth a reported $1.2 billion in value . Strategic buyers announced 171 deals (32 reported $7.2 billion in value) . VC/Growth Capital investors announced 267 transactions (244 reported $5.6 billion in value) . Private Equity investors announced 25 deals during the month (seven reported $7.8 billion in value) September 2016 BUYER/INVESTOR BREAKDOWN Transactions Reported Value Strategic Buyout Venture/Growth Capital # % $MM % # $MM # $MM # $MM Software 148 32% $8,878.6 43% 42 $2,369.3 10 $5,407.3 96 $1,102.0 Marketing Technology 100 22% 1,248.5 6% 23 5.6 6 ‐ 71 1,242.9 Digital Media/Commerce
    [Show full text]
  • D1.5 Final Business Models
    ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ...........................................................................................................................
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • CTERA Networks !July 2014 TABLE of CONTENTS !
    ! ! ! ! ! ! ! Leveraging Cloud Storage Technologies for Next Generation File Services ! ! Prepared for: CTERA Networks !July 2014 TABLE OF CONTENTS ! TABLE OF CONTENTS 1 EXECUTIVE SUMMARY 2 UNDERSTANDING THE CHALLENGES 3 The limits of traditional storage 3 The Value of User Experience 4 New Ways to Produce and Collaborate 4 Why The User Experience Is So Important 4 The Cloud Backend 5 Cloud, integration and security 6 THINKING ABOUT A SOLUTION 8 Components of The Solution 8 What Is Object Storage? 8 An Introduction to The CTERA Platform 9 Management and Control Layer 10 Security by Design 11 How it is implemented by CTERA 11 Why it is important for you 12 File Service Gateways (edge devices, endpoint and mobile apps) 12 How it is implemented by CTERA 13 Why it is important for you 14 BOTTOM LINE 15 JUKU 16 Why Juku 16 ! Author 16 Juku consulting srl - [email protected] - http://jukuconsulting.com. !1 EXECUTIVE SUMMARY ! The world is quickly changing and so is the way of doing business. Terms like “distributed enterprise” are no longer enough to describe the new enterprise after cloud and mobile revolutions have changed the rules. Now, the mobile work force counts for the majority of the users and this has direct consequences on how data are created, accessed and have to be managed. It’s probably better talking about the “dispersed enterprise”. Users work on many different devices at the same time, continuously switching from one device to another, and hence document workflows have dramatically changed. Data are accessed from everywhere at anytime by single users and teams: collaboration platforms, starting from file sharing solutions, are fundamental layers of any modern organization.
    [Show full text]
  • All-In-One Cloud Storage Gateways with Integrated Data Protection And
    CTERA C400 / C800 Cloud Attached Storage® Appliances All-in-One Cloud Storage Gateways with Integrated Data Protection and Network Attached Storage Integrated On-Site & Off-Site Data Backup and Disaster Recovery Robust Enterprise-Grade NAS Features Cloud File Sharing and Synchronization Hybrid Storage Appliances with Integrated Cloud Services for SMBs and Branch Offices The C400 and C800 appliances from CTERA Networks combine network attached storage (NAS) functionality with comprehensive data protection, providing fast local backup & recovery integrated with cloud storage for disaster recovery, remote access and file sharing. With the included CTERA backup software, managed agents, remote management capabilities and end-to-end data protection, the C400 and C800 provide a highly cost-effective, easy-to-manage alternative to more expensive, disparate solutions. Lightning-fast on-site backup and restore, with integrated, globally de-duplicated, Hybrid Cloud & On-Premises efficient cloud backup that provides an off-site copy for disaster recovery. Protect the business against data loss and minimize disaster recovery time using a Complete Data Protection single solution – including roaming laptops, remote users, servers and workstations. Full-fledged NAS appliances supporting RAID 5/6 for redundancy, inline volume Robust Network Storage encryption, thin-provisioned snapshots, iSCSI and Active Directory integration. Using the CTERA Portal, service providers and enterprise IT can manage and Central Management monitor any number of CTERA appliances from a unified Web console. Access local and cloud-stored files from anywhere, on locally or over the Web. File-Based Collaboration Share files with project groups and occasional users with email invitations. Synchronize files to and from the cloud between multiple users.
    [Show full text]
  • Everything You Need to Know About Object Storage
    STHome ORAGE MANAGING THE INFORMATION THAT DRIVES THE ENTERPRISE Castagna: Big storage cooking up in labs Toigo: Hyper- SNAPSHOT 1 EDITOR’S NOTE / CASTAGNA consolidation the future Need for more Data storage capacity driving growing faster than Object storage squeezing out NAS most NAS purchases capacity … for now Snapshot 1: Capacity driving most NAS CLOUD BACKUP STORAGE REVOLUTION / TOIGO purchases Tap the cloud to Hyper-consolidated Cloud alternatives ease backup burdens is the future to local backup Snapshot 2: NFS and 10 Gig pre- ferred for new NAS SNAPSHOT 2 HOT SPOTS / SINCLAIR Hadoop’s role in big data storage Users favor venerable When simple storage NFS and 10 Gig for isn’t so simple Sinclair: Simple storage not so new NAS systems simple Matchett: SayEverything hi you need to to the transforma- HADOOP READ-WRITE / MATCHETT tional cloud know about object storage Big data requires The sun rises on About us Object storage is moving out of the cloud to big storage transformational nudge NAS out of enterprise file storage cloud storage services MAY 2016, VOL. 15, NO. 3 STORAGE • MAY 2016 1 EDITOR’S LETTER RICH CASTAGNA Home Castagna: Big storage cooking up in labs Toigo: Hyper- Data storage Not to be confused with bitcoins, each of these coins consolidation (de.eloped at the Uni.ersity of Southampton in the UK) the future growing faster is said to be capable of holding 360 TB of data on a disk Object storage that appears to be only a bit larger than a quarter. That’s a squeezing out NAS than capacity lot of data in a small space, and it makes that 32 GB USB flash dri.e on your keychain seem pretty puny.
    [Show full text]
  • CTERA Endpoint & Remote Server Backup
    BKloud CTERA Endpoint & Remote Server Backup Ecient and Secure Cloud-Enabled Backup for The Dispersed Enterprise Remote Server Backup Bare Metal Endpoint Backup File-Level Agent-based cloud backup for laptops Appliance-based hybrid local and cloud backup for servers and workstations File-level and ‘bare metal’ backup & recovery Source-based encryption, bandwidth optimization and data reduction features End-User Choice of private or public infrastructure, Self-Service vendor-neutral Centralized management, real-time Local/Cloud Mobile Hybrid monitoring and custom alerts Access Scalable, integrates with identity management systems CTERA Backup is a comprehensive data protection solution for laptops, workstations and remote servers. It provides both direct-to-cloud and appliance-based hybrid modes that optimize recovery times and performance, with fully centralized remote management. CTERA Backup can be deployed as a fully private, behind-the-rewall solution in your datacenter, or as a ‘virtual private’ solution leveraging scalable public cloud infrastructure – always allowing you to retain complete control and ownership of your data. www.ctera.com [email protected] 1300 72 74 74 ©2015 CTERA Networks Ltd., All Rights Reserved BKloud Data Protection Features Comprehensive Endpoint Backup for Laptops Automated, scheduled granular le backup Windows, Mac and Linux compatible Select folders to backup or exclude from backup End-user self-service for simple le recovery Hybrid Local & Cloud Backup Back up remote oce servers and workstations using
    [Show full text]
  • All-In-One Network Attached Storage, Backup Appliance and Gateway To
    CTERA C200 Cloud Attached Storage® Appliance All-in-One Network Attached Storage, Backup Appliance and Gateway to Cloud Services Integrated On-Site & Cloud Backup and Recovery Remote Access and Central Management File Sharing on The Local Network and in The Cloud Hybrid 2-Bay Storage Appliance with Integrated Cloud Services for Small Business and Offices Ideal for small businesses and branch offices, the CTERA C200 appliance combines network attached storage (NAS) functionality with comprehensive data protection, providing fast local backup & recovery integrated with cloud storage for backup, remote access and file sharing. With the included CTERA backup software, managed agents, remote management capabilities and end-to-end data protection, the C200 provides a cost-effective, easy-to-manage alternative to more expensive, disparate solutions. Lightning-fast on-site backup and restore, with integrated, globally de-duplicated, Hybrid Cloud & On-Premises efficient cloud backup that provides an off-site copy for disaster recovery. Protect the business against data loss and minimize disaster recovery time using a Complete Data Protection single solution – including roaming laptops, remote users, servers and workstations. Using the CTERA Portal, MSPs and enterprise IT administrators can manage and Central Management monitor any number of CTERA appliances from a unified Web console. Access local and cloud-stored files from anywhere, locally or over the Web. Share File-Based Collaboration files with project groups and occasional users with
    [Show full text]
  • CTERA Reseller Portal Administrator Guide
    Reseller Portal Administrator Guide CTERA Portal November 2015 Version 5.0 Copyright © 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission from CTERA Networks Ltd. Information in this document is subject to change without notice and does not represent a commitment on part of CTERA Networks Ltd. CTERA, C200, C400, C800, C800+, P1200, CloudPlug, NEXT3, Cloud Attached Storage, and Virtual Cloud Drive are trademarks, service marks, or registered trademarks of CTERA Networks Ltd. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. patents, foreign patents, or pending applications. Tip For legal information and for the end user license agreement, refer to Legal Information in this guide. Contents About the CTERA Portal ------------------------------------------------------------------------------- 7 Management Features ---------------------------------------------------------------------------------- 7 Storage Clients -------------------------------------------------------------------------------------------- 8 CTERA Provisioning------------------------------------------------------------------------------------- 10 Getting Started ---------------------------------------------------------------------------------------- 11 Browser Requirements -------------------------------------------------------------------------------- 11 Logging
    [Show full text]
  • City of Irwindale Irwindale 5050 N
    CITY OF IRWINDALE IRWINDALE 5050 N. IRWINDALE AVE., IRWINDALE CA 91706 •PHONE: (626) 430-2200 •FACSIMILE: 962-4209 MARK A. BRECEDA AGENDA FOR THE REGULAR MEETING OF THE MAYOR CITY COUNCIL ALBERT F. AMBRIZ MAYOR PRO TEM SUCCESSOR AGENCY TO THE IRWINDALE COMMUNITY REDEVELOPMENT AGENCY LARRY G. BURROLA HOUSING AUTHORITY COUNCILMEMBER MANUEL R. GARCIA COUNCILMEMBER SEPTEMBER 27, 2017 5:30 P.M. CLOSED SESSION H. MANUEL ORTIZ 6:30 P.M. OPEN SESSION COUNCILMEMBER IRWINDALE CITY HALL/ COUNCIL CHAMBER CLOSED SESSION - CITY HALL CONFERENCE ROOM REGULAR MEETING - CITY HALL COUNCIL CHAMBER Spontaneous Communications: The public is encouraged to address the City Council on any matter listed on the agenda or on any other matter within its jurisdiction. The City Council will hear public comments on items listed on the agenda during discussion of the matter and prior to a vote. The City Council will hear public comments on matters not listed on the agenda during the Spontaneous Communications period. Pursuant to provisions of the Brown Act1 no action may be taken on a matter unless it is listed on the agenda, or unless certain emergency or special circumstances exist. The City Council may direct staff to investigate and/or schedule certain matters for consideration at a future City Council meeting. Americans with Disabilities Act: In compliance with the ADA, if you need special assistance to participate in a City Council meeting or other services offered by this City, please contact City Hall at (626) 430-2200. Assisted listening devices are available at this meeting. Ask the Deputy City Clerk if you desire to use this device.
    [Show full text]
  • Vendor Contract
    Meredith Barton Chief Operating Officer 5/6/2020 NOTICE TO MEMBERS REGARDING ATTRIBUTE RESPONSES TIPS VENDORS RESPOND TO ATTRIBUTE QUESTIONS AS PART OF TIPS COMPETITIVE SOLICITATION PROCESS. THE VENDOR’S RESPONSES TO ATTRIBUTE QUESTIONS ARE INCLUDED HEREIN AS “SUPPLIER RESPONSE.” PLEASE BE ADVISED THAT DEVIATIONS, IF ANY, IN VENDOR’S RESPONSE TO ATTRIBUTE QUESTIONS MAY NOT REFLECT VENDOR’S FINAL ATTRIBUTE RESPONSE, WHICH IS SUBJECT TO NEGOTIATIONS PRIOR TO AWARD. PLEASE CONTACT THE TIPS OFFICE AT 866-839- 8477 WITH QUESTIONS OR CONCERNS REGARDING VENDOR ATTRIBUTE RESPONSE DEVIATIONS. PLEASE KEEP IN MIND THAT TIPS DOES NOT PROVIDE LEGAL COUNSEL TO MEMBERS. TIPS RECOMMENDS THAT YOU CONSULT YOUR LEGAL COUNSEL WHEN EXECUTING CONTRACTS WITH OR MAKING PURCHASES FROM TIPS VENDORS. 200105 Addendum 2 Educate-me.net Supplier Response Event Information Number: 200105 Addendum 2 Title: Technology Solutions, Products and Services Type: Request for Proposal Issue Date: 1/9/2020 Deadline: 2/21/2020 03:00 PM (CT) Contact Information Contact: Kristie Collins Address: Region 8 Education Service Center 4845 US Highway 271 North Pittsburg, TX 75686 Phone: +1 (866) 839-8477 Fax: +1 (866) 839-8472 Email: [email protected] 3DJHRISDJHV 9HQGRU(GXFDWHPHQHW $GGHQGXP Educate-me.net Information Address: 116 Fairfield Road Fairfield, NJ 07004 Phone: (973) 303-4343 Toll Free: (877) 791-4550 By submitting your response, you certify that you are authorized to represent and bind your company. Mark A. Menzella [email protected] Signature Email Submitted at 2/21/2020 2:13:59 PM Requested Attachments Vendor Agreement vendor_agreement.pdf The vendor must download the Vendor Agreement from the attachment tab, fill in the requested information and uploa d the completed agreement.
    [Show full text]