This document provides an overview of different network access control architectures including:
1) Systems using the Trusted Network Connect (TNC) protocol with Network Access Protection (NAP) and different integrity measurement verifiers (IMVs).
2) Standards-based 802.1X authentication without posture assessment.
3) Enforcement of access policies through network switches and access point access control lists (ACLs) and VLAN segmentation.
These slides cover the pros and cons of implementing Memcached in a cloud environment, the basics and best practices of implementation, and how to get the most out of your investment with Memcached. We also introduce Gear6 Web Cache Server for the Cloud, the first commercial Memcached service for cloud platforms. The on-demand webcast can be accessed here:
http://www.gear6.com/memcached-resources/webinar-archive
Memcached is a powerful open source distributed memory caching system and has become the de-facto standard for the web caching tier. 17 of the top 20 most trafficked sites - including Facebook, Twitter, Digg and Wikipedia - depend on Memcached to enhance their user experience by increasing website performance. In this presentation covers the basics of memcached, what it is and how it’s used. Includes some real world architectures of leading web sites and their implementation of memcached. The accompanying recorded webinar can be accessed here: http://www.gear6.com/why-memcached
These slides cover the pros and cons of implementing Memcached in a cloud environment, the basics and best practices of implementation, and how to get the most out of your investment with Memcached. We also introduce Gear6 Web Cache Server for the Cloud, the first commercial Memcached service for cloud platforms. The on-demand webcast can be accessed here:
http://www.gear6.com/memcached-resources/webinar-archive
Memcached is a powerful open source distributed memory caching system and has become the de-facto standard for the web caching tier. 17 of the top 20 most trafficked sites - including Facebook, Twitter, Digg and Wikipedia - depend on Memcached to enhance their user experience by increasing website performance. In this presentation covers the basics of memcached, what it is and how it’s used. Includes some real world architectures of leading web sites and their implementation of memcached. The accompanying recorded webinar can be accessed here: http://www.gear6.com/why-memcached
Evolution of a Memcached Deployment Webinar 2010 01 13Gear6
Memcached has become a critical tool in the web technology stack. High traffic web sites with dynamic content - like Facebook, Twitter, and Wikipedia - rely on Memcached to scale and ensure “snappy” site performance.
This presentation willl cover a brief overview of Memcached, then dive into the evolution of Memcached’s use in dynamic web sites and how you can scale your site and get better performance with Memcached. We’ll also review emerging architectures and tools of high performance, large scale dynamic websites.
In this webinar you will learn best practices used by some of the hottest sites and get tips on how to avoid potential pitfalls when scaling. Whether you're just building the infrastructure for a brand new site or have a large dynamic site with millions of users, this webinar is for you.
יוצרים, מפתחים ומטפחים מותגים אפקטיביים עבור חברות ומוצרים בשוק המקומי ובשווקים הגלובליים. אנו מאפשרים לך, ליהנות מפתרון מיתוג כולל בבית אחד, משלב בניית אסטרטגיית המותג דרך חדשנות קריאטיבית ועד להטמעת המיתוג בכל אמצעי התקשורת השיווקית והפנים ארגונית.
For more info : michal@titan.co.il
Evolution of a Memcached Deployment Webinar 2010 01 13Gear6
Memcached has become a critical tool in the web technology stack. High traffic web sites with dynamic content - like Facebook, Twitter, and Wikipedia - rely on Memcached to scale and ensure “snappy” site performance.
This presentation willl cover a brief overview of Memcached, then dive into the evolution of Memcached’s use in dynamic web sites and how you can scale your site and get better performance with Memcached. We’ll also review emerging architectures and tools of high performance, large scale dynamic websites.
In this webinar you will learn best practices used by some of the hottest sites and get tips on how to avoid potential pitfalls when scaling. Whether you're just building the infrastructure for a brand new site or have a large dynamic site with millions of users, this webinar is for you.
יוצרים, מפתחים ומטפחים מותגים אפקטיביים עבור חברות ומוצרים בשוק המקומי ובשווקים הגלובליים. אנו מאפשרים לך, ליהנות מפתרון מיתוג כולל בבית אחד, משלב בניית אסטרטגיית המותג דרך חדשנות קריאטיבית ועד להטמעת המיתוג בכל אמצעי התקשורת השיווקית והפנים ארגונית.
For more info : michal@titan.co.il
1. Gigamon
Net Monitor
Port
M
onito
Cisco ACS DHC r
EAP- P info
FAST
1 Windows
Network Access Control HCAP
Windows
Security Center SHA Built-in Device Great Bay
Microsoft XP SP3 Supplicant Las Vegas 2008 Microsoft NPS Authentication Beacon
EAP- Avenda Systems Universal SHV (LDAP)
2 Windows Windows PEAP Avenda Systems Linux NAP SHV Device
Security Center SHA Built-in Blue Ridge EdgeGuard SHV Database
Microsoft Vista Supplicant Windows Security Center SHV
3 Avenda Systems Windows Server Realm SHV - System Health Verifier SHV
US
Universal SHA optional
DI
Built-in
RA
Supplicant Avenda Systems eTIPS
P/
Microsoft XP SP3 EAP-
EA
PEAP
4 Blue Ridge Windows
EdgeGuard SHA Built-in
RADIUS Router
Microsoft Vista Supplicant
(proxy) EAP- Juniper Infranet Controller
80
PEAP Windows Security Center SHV
2.1
5 Avenda Systems Avenda
Xu
EAP- Juniper Host Checker IMV
Linux NAP SHA Systems
sin
TTLS
gI
CentOS Linux Supplicant IMV - Integrity Measurement Verifier
F-T
Au t EA
NC
P/R Active
SHA - System Health Agent hen AD
CS
t icat IUS OSC Radiator User Directory
-SO
ion EAP- Authentication
Pat libTNC Sample IMV
H
Cisco TTLS User
6 Juniper
Host Checker IMC
Juniper Enterasys h Database
Odyssey ProCurve
Microsoft XP SP2 Supplicant Force 10 Enforcement by:
Network Edge
Switches
7 Access Control List (ACL)
libTNC 802. Aruba
Open1X 1 X us VLAN
Sample IMC ing I Cisco
Supplicant F -TNC ProCurve
Microsoft XP SP2 CS 1
IMC - Integrity Measurement Collector
. 1 Trapeze
ACL
ACL
NAC Architectures Legend
APs Xirrus
TNC using IF-TNCCS-SOH (NAP)
8
th TNC using IF-TNCCS 1.1
Unhealthy Employees
Cisco SSC
sture a
Microsoft XP SP2 Supplicant witho
ut Po
ataP Enforcement Realm
802.1X Auth Only (no posture)
Employees
X
802.1 D
9 Built-in
Phones / Devices
Supplicant
Mac OS X UNIX
10
Axis Camera Built-in
802.1X/TLS
Supplicant 2 .1X VLAN 20
- 80
Guests
n
No
Network
11 VLAN 30 ACL
Backbone
Linksys Avaya
NAS phone Client Realm
Cisco
Non-802.1X clients VLAN 40 ACL
NAC Appliance