BNL PDN Enhancements. Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Jump to first page Setup Ethernet & PPP client on Laptop computer Presented by: Xuewu Cai Jianfang Wang.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Virtual LANs.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
Linux network troubleshooting If your network connection is not working..
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Inter-VLAN Routing Routing And Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Module 8: Concepts of a Network Load Balancing Cluster
Network Management And Debugging
Lesson 1: Configuring Network Load Balancing
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
1 IPv6 Address Management Rajiv Kumar. 2 Lecture Overview Introduction to IP Address Management Rationale for IPv6 IPv6 Addressing IPv6 Policies & Procedures.
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Barracuda Load Balancer Server Availability and Scalability.
HALP! Something is in my tubes! Part I by Jason Testart, IST.
Chapter 6: Packet Filtering
© 2002, Cisco Systems, Inc. All rights reserved..
Routing and Routing Protocols Routing Protocols Overview.
Page 1 COMP210 Network layer. Page 2 The Network Layer  The network layer is responsible for establishing, maintaining and terminating connections 
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Virtualization Infrastructure Administration Network Jakub Yaghob.
Network Admin Course Plan Accede Institute Of Science & Technology.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
System Troubleshooting TCS Network, System, and Load Monitoring TCS for Developers.
1 Internet Tool Practice 한두균 송정환
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
IPv6 – The Future Of The Internet Redbrick Networking Conference 26 March 2003 Dave Wilson DW238-RIPE.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Security fundamentals Topic 10 Securing the network perimeter.
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
Switching Topic 2 VLANs.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
Fall 2011 Nassau Community College ITE153 – Operating Systems 1 Session 9 Networking & Operating Systems (part 2)
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
WTG – Wireless Traffic Generator Presented by: Lilach Givaty Supervised by: Dr. Yehuda Ben-Shimol, Shlomi Atias.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Secure High Performance Networking at BNL Winter 2013 ESCC Meeting John Bigrow Honolulu Hawaii.
Ifconfig Kevin O'Brien Washtenaw Linux Users Group
iperf a gnu tool for IP networks
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Security fundamentals
Linux network troubleshooting
NAT、DHCP、Firewall、FTP、Proxy
Lab A: Planning an Installation
Working at a Small-to-Medium Business or ISP – Chapter 8
Planning and Troubleshooting Routing and Switching
Chapter 5: Inter-VLAN Routing
IS3120 Network Communications Infrastructure
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Presentation transcript:

BNL PDN Enhancements

Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security

Cisco Content Sensitive Switches Dual Cisco units for fault tolerance Dual Cisco 4506 switches for proxies Rated at 40GB/Sec. Maximum throughput Virtualizes site perimeter services Extreme scaleable and flexibility High availability and redundancy

Content Switches cont. ACL based proxy service access (secure) Provides expandable pools of servers and services Transparent to end users A single IP address / DNS name for all servers in the service pool (Virtual IP) Load balanced user access to proxies based on Least Number of Connections algorithm

Content Switches cont. Proxies assigned RFC 1918 (Private IP) space (additional isolation) Linear scalability Individual servers can be added to or removed from the service pool at will. This facilitates software upgrades, maintenance, and patch support for the actual servers.

CSS VIP Security Behavior similar to Pix Firewall Outbound traffic permitted by default Inbound traffic subject to ACL optional Protects all pool services Internet scans show no or minimal services (Only the advertised services)

Performance Overview Services virtualized and “Pooled” together Approximately Linear Scalability / 28 for individual service pools 14 slaves max Separate management and load traffic paths

Proxy Services Virtual IP’s SMTP HTTP SSH TELNET HTTP/Reverse FTP Others as we grow

Example eth0.310 Link encap:Ethernet HWaddr 00:03:47:DB:6D:6B inet addr: Bcast: Mask: UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets: errors:0 dropped:0 overruns:0 frame:0 TX packets: errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes: (86.9 MiB) TX bytes: (14.1 MiB) Management Server Configuration IEEE 802.1q Trunk Format (LB Monitor Interface) Custom Linux Kernel Configuration Parameters Subset of NIC cards, Intel EEPro 100 with Intel Driver Vconfig utility to create vlan (IEEE 802.1q tag) interfaces

Performance Tests single test [SUM] sec 15.2 GBytes 516 Mbits/sec psudo double test smtpvip2:~#iperf -c n t 300 -P Client connecting to , TCP port 5001 TCP window size: 64.0 KByte (default) [ 5] local port connected with port 5001 [ 6] local port connected with port 5001 [ 7] local port connected with port 5001 [ 8] local port connected with port 5001 [ 9] local port connected with port 5001 [ ID] Interval Transfer Bandwidth [ 8] sec 1.89 GBytes 54.2 Mbits/sec [ 6] sec 1.85 GBytes 53.0 Mbits/sec [ 5] sec 1.87 GBytes 53.6 Mbits/sec [ 9] sec 1.76 GBytes 50.3 Mbits/sec [ 7] sec 1.84 GBytes 52.7 Mbits/sec [SUM] sec 9.22 GBytes 264 Mbits/sec [ ID] Interval Transfer Bandwidth [ 7] sec 1.78 GBytes 51.0 Mbits/sec [ 9] sec 1.86 GBytes 53.3 Mbits/sec [ 5] sec 2.00 GBytes 57.0 Mbits/sec [ 8] sec 1.68 GBytes 48.1 Mbits/sec [ 6] sec 1.82 GBytes 52.0 Mbits/sec [SUM] sec 9.14 GBytes 261 Mbits/sec

2 runs of a single machine in the VIP, 2 runs 2 machines in the VIP

Confirmation from different measuring tool

netmon:~# nmap -P Starting nmap 3.50 ( ) at :11 EDT All 1659 scanned ports on csssm1 ( ) are: filtered …... Interesting ports on smtpgateway ( ): (The 1656 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE 25/tcp open smtp 79/tcp open finger 113/tcp open auth All 1659 scanned ports on httpgateway ( ) are: filtered Interesting ports on cecache ( ): (The 1655 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE 80/tcp open http 443/tcp open https 563/tcp open snews 8080/tcp open http-proxy All 1659 scanned ports on are: filtered

Summary Cisco CSS provides a high throughput scalable solution for most BNL perimeter services Security enhancements are additional features

IP v6 Test Bed Deployment Campus Network and Host Security Low Cost

Built from “recycled” 7513 free Separate Infrastructure IPv q Trunk Encapsulation EUI-64 /64 subnets HTTP and FTP servers Next Step: Fix DNS NatPT or dual stack