Option 1 – IP specified with ports

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Advertisements

Source Address Selection in Multi-Prefix Multi-Service Network Arifumi Matsumoto NTT PF Lab.
Programming Protocol-Independent Packet Processors
DOT – Distributed OpenFlow Testbed
Seamless migration from Nova-network to Neutron in eBay production Chengyuan Li, Han Zhou.
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Ken Calvert* University of Kentucky *Speaking for myself only.
1 Behcet Sarikaya Frank Xia July 2010 Flexible DHCPv6 Prefix Delegation in Mobile Networks IETF 78
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
LAN Protocols and TCP/IP © N. Ganesan, Ph.D.. Module A Preview of Major LAN Protocols.
Hardware Firewall Feature © N. Ganesan, Ph.D.. Chapter Objectives Show the configuration of a hardware firewall such as Dlink DI 604 Illustrate the sharing.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Printer Installation Ben Wu A&S IT 09/18/2007. Outline  Preparation  Local Printer Installation  Network Printer Installation  Printer Sharing  Other.
1 Enabling Secure Internet Access with ISA Server.
MAC Address The Media Access Control (MAC) address is just as important as the IP address. The MAC address is a unique value associated with the network.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
RADIUS Server (Brocade Controller)
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using a Cisco Router as a DHCP Server.
TOSIBOX LOCK security options 1 1.
DHCP Dynamic Host Configuration Protocol. What is DHCP?  It does name resolution (one more?!) DNS resolves IP numbers and FQDN WINS resolves NetBIOS.
DHCP Server © N. Ganesan, Ph.D.. Reference DHCP Server Issues or leases dynamic IP addresses to clients in a network The lease can be subject to various.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 Module Summary  Cisco routers operate at Layer 3, and their function is path determination.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Module 5: Isolating Common Connectivity Issues. Overview Determining the Causes of Connectivity Issues Network Utilities That You Can Use to Isolate Connectivity.
Session 9 Windows Platform Dina Alkhoudari. Learning Objectives Understanding DHCP Address Assignment Understanding Address Leases Understanding DHCP.
Altai Certification Training Backend Network Planning
Security Groups Aswin Suryanarayanan and Ravindra Kencheppa.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
@cloudops_www.cloudops.com Palo Alto Networks firewall orchestration using CloudStack June 25 th, 2013.
Functional Area 3: ProPortable Module 3.4 ProPortable Router GUI.
InfiniBand Routing Solution Approach Yaron Haviv, CTO, Voltaire
Draft-ietf-mmusic-sdp-tcpmedia-00.txt Dialout.Net, Inc. David Yon TCP-Based Media Transport in SDP.
Verified Network Configuration. Verinec Goals Device independent network configuration Automated testing of configuration Automated distribution of configuration.
Module 5: Implementing Printing. Overview Introduction to Printing in the Windows Server 2003 Family Installing and Sharing Printers Managing Access to.
TCP/IP Protocol Suite 1 Chapter 16 Upon completion you will be able to: Host Configuration: BOOTP and DHCP Know the types of information required by a.
SERVER I SLIDE: 5. Objectie 4.2 The DHCP IP address assignment process.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
CIS 192B – Lesson 3 Network Information Services.
Chapter 6: Securing the Local Area Network
Installing a Network Printer. Network printers work much like any other printer except the data flow is through a network. This means the printer must.
Administering Microsoft Windows Server 2003 Chapter 2.
Course 2277: Implementing, Managing, and Maintaining a Microsoft ® Windows ® Server 2003 Network Infrastructure: Network Services.
Computer Communication: An example What happens when I click on
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
DHCP options for PAA Status report of draft-ietf-dhc-paa-option-01.txt Lionel Morand IETF-65, Dallas.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Quick Start Up Tool. Why the StartUp Tool? Plug-and-play installation of Ingate and SIP trunking, as simple as possible. Necessary steps:  Unpack your.
Virtual Private Network Access for Remote Networks
Obtain Your Dream Certification
Programmable Overlays with VPP
Gateway-Initiated 4over6 Deployment
Network Programming in Java CS 1111 Ryan Layer May 3, 2010
CompTIA Network+ N Authorized Cert Guide
Wlbs.exe Commands The Wlbs.exe program operates on Network Load Balanced hosts or on any remote computer running Windows 2000 that accesses the cluster.
Implementing Network Access Protection
Host Configuration: BOOTP and DHCP
Troubleshooting Network Communications
Network Load Balancing
BOOTP and DHCP Objectives
Implementing TMG Server Publishing
Virtual Network Management Center 2
Network Architecture Introductory material
Review of Important Networking Concepts
Host Configuration: BOOTP and DHCP
By - Ricardo Sanchez, Ken Wolters and William Hibbard
eeweb server PC (web client) Http/tcp/ip/ethernet (src. IP address:
Steven Feltner reveller – IRC
Lecture 4a Mobile IP 1.
Presentation transcript:

Option 1 – IP specified with ports NN No data for Metadata service ENDPOINT GROUP NM Network-Services group - add rule with metadata port 120.2 169.2 120.2 169.2 GBP Node Endpoint DHCP endpoint metadata IP, dst 80 VPP-Renderer endpoint IP, src 80

Option 1 – IP specified with ports NN Implementation for such as endpoint may be missing in GBP modules Components to check - location resolver - policy resolver - renderer manager - vpp renderer Neutron port - fixed ips NM GBP Base endpoint (L2 - mac) VPP-Renderer Base endpoint (L3 – 120.2) Base endpoint (L3 – 169.2)

Option 2 – Remote Ip Prefix for Metadata service NN Endpoint DHCP endpoint Add rules to support metadata service: - network-service group - ingress, dst port 80 - egress, src port 80 - network-client group - egress, dst port 80, remote IP prefix 169.254.169.254/32 - ingress, src port 80, remote IP prefix 169.254.169.254/32 NM GBP Subtasks for Metadata service FDS-246 - add rules in neutron mapper - investigate remote-ip-prefix in ResolvedPolicy, RendererManager, VppRenderer - implement support for remote-ip-prefix if missing - in VPP-renderer omit IP address and keep only L4 for Metadata IF NEEDED - very last task: startup configuration for metadata -> blueprint XML with IP and PORT - meanwhile hardcode the value VPP-Renderer