Cachebox is for saving bandwidth and to increase Speed. Caching optimizes the network by storing web content and serving it from LAN Network. Cachebox customers is from different fields, so ranges is flexible, with lots of options. There are so many models available in Cachebox that fits easily according to requirements like Cachebox050 & Cachebox100, Cachebox210, Cachebox230, and Cachebox310.
Practical Defensive Security
for Security Engineers.
This session will be an overview on the WAF book the practical defensive guide for security engineer and WAF owner.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
The current state of wireless security, covering wireless device access, preventing rogue threats and addressing wireless attacks. Special focus on device profiling and policy covering how to prevent unauthorized (such as smartphones and tablets) from accessing the network. Learn More: http://www.cisco.com/go/wireless
Practical Defensive Security
for Security Engineers.
This session will be an overview on the WAF book the practical defensive guide for security engineer and WAF owner.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
The current state of wireless security, covering wireless device access, preventing rogue threats and addressing wireless attacks. Special focus on device profiling and policy covering how to prevent unauthorized (such as smartphones and tablets) from accessing the network. Learn More: http://www.cisco.com/go/wireless
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...CODE BLUE
Microsoft Exchange Server is an email solution widely deployed within government and enterprises, and it is an integral part of both their daily operations and security. Needless to say, vulnerabilities in Exchange have long been the Holy Grail for attackers, hence our security research on Exchange. Surprisingly, we've found not only critical vulnerabilities such as ProxyLogon, but a whole new attack surface of Exchange.
This new attack surface is based on a significant change in Exchange Server 2013, where the fundamental protocol handler, Client Access Service (CAS), splits into frontend and backend. In this fundamental change of architecture, quite an amount of design debt was incurred, and, even worse, it introduced inconsistencies between contexts, leading us to discover this new attack surface.
To unveil the beauty of this attack surface and our novel exploitation, we'll start by analyzing this architecture, followed by 7 vulnerabilities that consist of server-side bugs, client-side bugs, and crypto bugs found via this attack surface. In the end, these vulnerabilities are chained into 3 attack vectors that shine in different attack scenarios: ProxyLogon, ProxyShell, and ProxyOracle. These attack vectors enable any unauthenticated attacker to uncover plaintext passwords and even execute arbitrary code on Microsoft Exchange Servers through port 443, which is exposed to the Internet by ~400K Exchange Servers.
This attack surface has its unparalleled impact for a reason: security researchers tend to find vulnerabilities from a certain perspective, such as digging for memory bugs, injections, or logic flaws, but we took a different approach by looking at Exchange from a high-level architectural view and captured this architecture-level attack surface, which yielded multiple vulnerabilities. We hope this brings a new paradigm to vulnerability research and inspires more security researchers to look into Exchange Server. Last but not least, we'll provide hardening actions to mitigate such types of 0days in Exchange.
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.
Onion routing was developed in the mid-1990s at the U.S. Naval Research to protect U.S. intelligence communications online. It was further developed by the Defence Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998. Onion Routing is implemented The Onion Routing project or TOR project.
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)GLC Networks
Webinar topic: Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/JC1v1Svdwzg
Fernando Nunez's ANDICOM 2016 presentation discusses NFV and SDN and outlines use cases of vE-CPE and SD-WAN. He focuses on how combining these two use cases creates a comprehensive and powerful solution and describes the concept of Ensemble SmartWAN (SD-WAN 2.0).
Nesta apresentação faremos um overview sobre a solução ClearPass da Aruba Networks que traz funções de BYOD, Network Access Control e Gerenciamento de visitantes.
NetScaler SD-WAN combina la selección de rutas de paquete en tiempo real, optimización WAN, firewall, enrutamiento y análisis de aplicaciones en una sola solución completa. Tanto si accede a aplicaciones SaaS como a escritorios virtualizados o centros de datos tradicionales.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Watch the replay: http://cs.co/9001DxsKP
Are you getting unrivaled simplicity, end-to-end visibility, hardware reliability, and consistent policies from your WAN? You can get all of these things when you combine SD-WAN software with Cisco IOS XE routing platforms.
Experts from Cisco’s enterprise routing team will be on hand to show you what intent-based networking and software-defined simplicity in the WAN can bring. Powerful new capabilities are possible with a simple software image change.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DvZHt
TechWiseTV: http://cs.co/9009DzrjN
This presentation simplifies Cloud, Cloud Security and Cloud Security Certifications. This includes the following:
- Understanding Cloud
- Understanding Cloud Security using the Risk Management and Cloud Security Control Frameworks
- Cloud Security Certifications
- Key Definitions
Applications increasingly rely not only on internal enterprise networks, but also on the Internet, for high levels of end user performance. The ThousandEyes platform helps you to deploy monitoring points, analyze network data and collaborate with external vendors to achieve superior application delivery for your employees and customers. In this presentation, we demo how to collect performance data across enterprise, WAN and ISP networks, and analyze metrics and network topologies to find root causes. Watch the full presentation with interactive demo here: https://www.thousandeyes.com/lp/getting-started-webinar
o Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
The CACHEBOX200 series is designed for
your network core. It combines feature
rich caching software with the security,
reliability and ease-of-use of the appliance
format.
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...CODE BLUE
Microsoft Exchange Server is an email solution widely deployed within government and enterprises, and it is an integral part of both their daily operations and security. Needless to say, vulnerabilities in Exchange have long been the Holy Grail for attackers, hence our security research on Exchange. Surprisingly, we've found not only critical vulnerabilities such as ProxyLogon, but a whole new attack surface of Exchange.
This new attack surface is based on a significant change in Exchange Server 2013, where the fundamental protocol handler, Client Access Service (CAS), splits into frontend and backend. In this fundamental change of architecture, quite an amount of design debt was incurred, and, even worse, it introduced inconsistencies between contexts, leading us to discover this new attack surface.
To unveil the beauty of this attack surface and our novel exploitation, we'll start by analyzing this architecture, followed by 7 vulnerabilities that consist of server-side bugs, client-side bugs, and crypto bugs found via this attack surface. In the end, these vulnerabilities are chained into 3 attack vectors that shine in different attack scenarios: ProxyLogon, ProxyShell, and ProxyOracle. These attack vectors enable any unauthenticated attacker to uncover plaintext passwords and even execute arbitrary code on Microsoft Exchange Servers through port 443, which is exposed to the Internet by ~400K Exchange Servers.
This attack surface has its unparalleled impact for a reason: security researchers tend to find vulnerabilities from a certain perspective, such as digging for memory bugs, injections, or logic flaws, but we took a different approach by looking at Exchange from a high-level architectural view and captured this architecture-level attack surface, which yielded multiple vulnerabilities. We hope this brings a new paradigm to vulnerability research and inspires more security researchers to look into Exchange Server. Last but not least, we'll provide hardening actions to mitigate such types of 0days in Exchange.
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.
Onion routing was developed in the mid-1990s at the U.S. Naval Research to protect U.S. intelligence communications online. It was further developed by the Defence Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998. Onion Routing is implemented The Onion Routing project or TOR project.
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)GLC Networks
Webinar topic: Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/JC1v1Svdwzg
Fernando Nunez's ANDICOM 2016 presentation discusses NFV and SDN and outlines use cases of vE-CPE and SD-WAN. He focuses on how combining these two use cases creates a comprehensive and powerful solution and describes the concept of Ensemble SmartWAN (SD-WAN 2.0).
Nesta apresentação faremos um overview sobre a solução ClearPass da Aruba Networks que traz funções de BYOD, Network Access Control e Gerenciamento de visitantes.
NetScaler SD-WAN combina la selección de rutas de paquete en tiempo real, optimización WAN, firewall, enrutamiento y análisis de aplicaciones en una sola solución completa. Tanto si accede a aplicaciones SaaS como a escritorios virtualizados o centros de datos tradicionales.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Watch the replay: http://cs.co/9001DxsKP
Are you getting unrivaled simplicity, end-to-end visibility, hardware reliability, and consistent policies from your WAN? You can get all of these things when you combine SD-WAN software with Cisco IOS XE routing platforms.
Experts from Cisco’s enterprise routing team will be on hand to show you what intent-based networking and software-defined simplicity in the WAN can bring. Powerful new capabilities are possible with a simple software image change.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DvZHt
TechWiseTV: http://cs.co/9009DzrjN
This presentation simplifies Cloud, Cloud Security and Cloud Security Certifications. This includes the following:
- Understanding Cloud
- Understanding Cloud Security using the Risk Management and Cloud Security Control Frameworks
- Cloud Security Certifications
- Key Definitions
Applications increasingly rely not only on internal enterprise networks, but also on the Internet, for high levels of end user performance. The ThousandEyes platform helps you to deploy monitoring points, analyze network data and collaborate with external vendors to achieve superior application delivery for your employees and customers. In this presentation, we demo how to collect performance data across enterprise, WAN and ISP networks, and analyze metrics and network topologies to find root causes. Watch the full presentation with interactive demo here: https://www.thousandeyes.com/lp/getting-started-webinar
o Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
The CACHEBOX200 series is designed for
your network core. It combines feature
rich caching software with the security,
reliability and ease-of-use of the appliance
format.
With Sophos EndUser Protection you get endpoint security, mobile device management, web protection, protection for your data and email, and more—all in a single license.
For more on Sophos EndUser Protection, visit: http://www.sophos.com/en-us/why-sophos/endpoint.aspx
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
During the Sophos Security Day Belgium, Chris McCormack showed the audience what Sophos has been working on in the field of Network Security products. Amongst other things, Sophos XG v16 was elaborately discussed.
Next-Generation Enduser Protection and Project Galileo are the new technologies that Sophos is developing to face new generation endpoint and network threats
Formation complète ici:
http://www.alphorm.com/tutoriel/formation-en-ligne-sophos-xg-firewall-administration
Après les deux premières formations sur la solution Sophos UTM 9, cette formation vient pour compléter la série de formation Sophos permettant l’obtention de la certification Sophos Certified Engineer SCE et Sophos Certified Architect SCA.
Durant cette formation Sophos XG Firewall, qui est la version 15 en numéro de Firmware de l’éditeur, vous allez comprendre le fonctionnement de la solution de pare-feu de nouvelle génération de Sophos et le déploiement de ses fonctionnalités les plus importantes : Installation et configuration de initiale, découverte de la toute nouvelle interface l’AdminConsole, gestion des Licences, gestion de la sauvegarde et restauration, définition des différents types d’objets, le routage statique et dynamique, l’Authentification et le SSO, Intégration Active Directory, gestion des interfaces du boitier, service DNS, service DHCP, Pare-feu, NAT, les différentes Policy, le UserPortal, IPS, ATP et la protection contre le déni de service DoS.
Tout au long de cette formation, le formateur vous montrera comment monter un Lab Sophos XG Firewall très complet pour faire toutes vos manipulations, ainsi, il vous montrera comment tirer profit de ce magnifique produit en suivant les astuces et les best practicies.
A l’issue de cette formation Sophos XG Firewall, vous allez être capable d’implémenter les fonctionnalités du Firewall Sophos dans sa version 15, et de le configurer suivant votre besoin interne dans votre entreprise, ou pour vos intégrations chez vos clients.
JAGUAR7000, a mobile caching system.
JAGUAR7000 does chunk caching to save the bandwidth of mobile backhaul and object caching to decrease latency.
from partner link: http://www.ngt-tech.com/jaguar-7000/
Enterprise Application and Data Protection on AWS with Amazon FSx for NetApp ...LilyJang3
These are slides presented as a collaborated event from NetApp and AWS. The topic is how customers can modernise their SAP and VMware workload on the AWS Cloud, while optimizing cost and performance. It also navigates the key data protection features and terminology of Amazon FSx for NetApp ONTAP.
A Cachebox which is a perfect solution to saves bandwidth of your network and increases your downloading speed.
Cachebox is a hardware tool which increases the web speed in a LAN Network. And it is used for the saving bandwidth.
Comprehensive and Simplified Management for VMware vSphere Environments - now...Hitachi Vantara
Learn how to build out a robust private cloud infrastructure with the assurance that all the underlying server, storage, and network resources are in place and aligned to the appropriate service levels.
See how to achieve predictable reliability based on business needs in a robust, enterprise-class cloud platform – Hitachi Unified Compute Platform Pro for VMware vSphere.
We’ll take you through the latest updates to this industry-leading solution that is deeply integrated with vSphere, including HDS servers and storage, Brocade Fibre Channel, your choice of Cisco or Brocade Ethernet networking. We’ll also talk about software updates that include bare-metal support, improved monitoring and performance tuning, federated management, and non-disruptive firmware upgrades.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
3. What you are about to hear
You need CACHEBOX if….
Your internet bandwidth is full, and/or expensive
Your users wait too long to download web pages
You want to monitor web usage
ISPs can benefit from CACHEBOX
In their own internal networks
In different POPs
Sold to their (business) customers
4. What you are about to hear
CACHEBOX is the best value solution
A dedicated web cache appliance
Higher performance / $ than alternatives
Easier for you to deploy and manage
ApplianSys is a vendor you can trust
Tuning cache appliances for over 10 years
A market leader in UK schools since 2002
Expanded to ISPs and enterprise in 90 countries
5. BENEFIT: Saving bandwidth, saving money
CACHEBOX saves you bandwidth
Simple cacheable HTTP traffic, save c.10-20%
With caching extensions (video, updates), save 15-30%
If extra bandwidth is expensive or not available…
CACHEBOX is the answer, with quick payback
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
0
2
4
6
8
10
12
0 3 6 9 12 15 18 21 24
$k
Month
CACHEBOX investment
Bandwidth cost saved
INDUSTRY ANALYST VIEW:
“Internet video traffic, including downloads and streaming media, is
expected to increase rapidly from 20% of total U.S. consumer Internet
traffic in 2008 to more than 50% in 2013.
In Asia/Pacific (excluding Japan), broadband subscriber will grow from
nearly 130 million in 2009 to more than 190 million in 2013....
..... One such solution is a tried-and-true Web 1.0
technique: Web caching.”
from IDC, March 2010.
6. BENEFIT: Web faster for users
CACHEBOX can transform your user experience
If your bandwidth is full, users have to wait a long time
Even if Web is a small part of your total network traffic,
delays could mean your users are very unhappy
Caching can dramatically improve page load time
Extra benefit where users particularly access
same material, such as….
Schools
Corporate intranets / web applications
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
7. CACHEBOX can record every web request
With this raw data and reporting tools, you have
a basis for monitoring and controlling web traffic
You also have a data record to comply with
legislation on data retention
BENEFIT: Monitoring web usage
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
1273491704.536 29 192.168.1.198 TCP_MISS/200 1659 GET http://www.google.co.uk/favicon.ico - NONE/- image/x-icon
1273491738.338 0 192.168.1.182 TCP_HIT/200 1659 GET http://www.google.co.uk/favicon.ico - NONE/- image/x-icon
IP address of requesting clientTime Full URLWhether the request was served from cache
8. CACHEBOX is a dedicated web cache appliance
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
9. Advanced caching features give you
performance caching at sensible prices
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
10. Appliance hardware and software give ease of use,
security and reliability - saving you time and money
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
11. Let’s look in more detail….
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
12. HARDWARE
Designed for reliability, security and performance
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
Software and settings on CompactFlash
More reliable than hard disk
Dedicated disks for cache data faster
Swap to other box in case of failure
Solid state disks on some models
Faster
More reliable
Models with separate disks to optimise
video caching
13. HARDWARE
APPLIANCE SOFTWARE
For secure, easy deployment and use of device
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
Secure Web GUI makes admin easy
Linux operating system optimised for appliance
Stripped down, small footprint
More secure, loads faster
Updates taken care of
Server management
Easy configuration, with less chance of error
Useable without specialist training
SNMP for network management tool integration
14. APPLICATION SOFTWARE
Engineered caching performance and manageability
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
15. APPLICATION SOFTWARE
Engineered caching performance and manageability
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Cache Extensions
Authentication
Application Layer
Pre-loader
Update Cache
Video Cache
Reporting
ARE
Web Cache
Engine
CONVENTIONAL WEB CACHING
Cache engine tuned for performance
Can be used in several modes
Transparent or explicit
IP spoofing keeps client IP addresses
WCCP support allows clustering and
high availability with Cisco switches
Advanced scripting for power users
16. APPLICATION SOFTWARE
Engineered caching performance and manageability
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Authentication
Application Layer Reporting
ARE
Cache Extensions
Pre-loader
Update Cache
Video Cache
CACHING EXTRA CONTENT
Extra features allow total bandwidth
saving of 20-35%
Video cache allows previously
uncacheable traffic to be cached
You can also cache software updates
Pre-caching allows you to fetch
content in advance: particularly useful
where a lot of known data is to be
accessed by multiple users
17. APPLICATION SOFTWARE
Engineered caching performance and manageability
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Appliance
Layers
HARDWARE
Operating System
Server Management
SOFTWARE
Web Cache
Engine
Authentication
Application Layer Reporting
ARE
Cache Extensions
Pre-loader
Update Cache
Video Cache
MANAGEABILITY AND CONTROL
Reporting for monitoring and control
Detailed activity logs
Comprehensive graphical reporting
and alerts
Central management console (CMC)
appliance for easy administration if
large number of caches deployed Authentication
Reporting
Cache Extensions
18. Models for different requirements
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
CACHEBOX050 Series CACHEBOX100 Series
050 100
Performance (HTTP RPS) 200 200
Mbps 30 30
Cache Storage HDD HDD
RAM 2 GB 2 GB
Ethernet (NICs) 1x1Gbps 2x1Gbps
Flash Storage 1 x OS & data 1 x OS, 1 x data
Typical max concurrent users 20-100 20-100
OS ApplianSys' own Linux distribution
CACHEBOX050/100 Series
19. Models for different requirements
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
CACHEBOX200 Series CACHEBOX300 Series
210 230 310
Performance (HTTP RPS) 700 1900 3600
Mbps 100 250 500
Cache Storage HDD
1x1TB HDD + 2x60GB
SSD
1x2TB HDD + 2x240GB SSD
RAM & Processor 4 GB, i5 8 GB, i5 16 GB, Xeon
Ethernet (NICs) 2x1Gbps 2x1Gbps 2x1Gbps
Flash Storage 1 x OS, 1 x data 1 x OS, 1 x data 1 x OS, 1 x data
Typical max concurrent users ~2,000 ~5,000 ~10,000
OS ApplianSys' own Linux distribution
CACHEBOX200/300 Series
20. ApplianSys: leading cache vendor over 10 years
2000-05 built large share in UK schools
Then expanded to 90 countries, all sectors
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
21. ApplianSys: appliance specialists
Other appliance families
VOIPBOX family for VOIP acceleration also addresses
bandwidth issues
DNSBOX Established worldwide in DNS/IPAM
Mission: make network managers’ lives easier
By delivering network solutions in appliance form
By constantly looking to build better appliances: easier to
use, more secure, more reliable
Company founded by network manager from major
enterprise
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
22. ApplianSys: customer base to give you confidence
Corporate / govt ISPs
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
Education
23. ApplianSys: customer testimonials
“Our customer is extremely satisfied with the performance enhancement.
They pay us $3,075 monthly for bandwidth and will remain on this
bandwidth for a very long time to come because there will be no need to
upgrade, courtesy of CACHEBOX. They will be saving in the region of
$24,000 per annum. They are so happy they have now recommended us
to another two of their branches; that is why we just ordered five more
boxes.” Swifttalk, Nigeria
“Since installing CACHEBOX we’ve seen tremendous
benefits...We regularly get hit rates of 40% and with
large object caching picking up the web videos, we’ve
been adding a lot more subscribers to our network.”
Karib Cable Kelcom, St Vincent
“The CACHEBOX has been online for two weeks but, even in
that short space of time, the difference has been dramatic. It
was an ‘Oh my god’ moment from the first day. ApplianSys
was the best provider for a small ISP like ourselves – they
offered usability, a tailored solution and an open-source based
system. The extra bandwidth helps keep us connected with
the rest of the world.” Esplanade Wireless, USA
"With the ApplianSys solution we make significant savings
on our internet access, it's almost a third of what we were
paying previously. For a region our size that's a saving of
£35,000 per year...but the main benefit is the improvement
in delivery; workstation performance in the classroom is
now spectacular. It all leads to a much better perception of
the quality of service we're delivering to our customers."
Leeds Learning Network, UK
“There’s a significant improvement in the
reliability and quality of our service.
We’re also advertising our caching
capability to potential customers. It’s
helping us stand out in the market place
and win more business. I chose
CACHEBOX from ApplianSys because
the company has a strong focus on web
caching solutions...Quite simply, the
CACHEBOX is the ideal solution for
ISPs operating where internet bandwidth
is in short supply or very expensive.”
Teledata ICT, Ghana
YOUR ISSUES – CACHEBOX – APPLIANSYS – NEXT STEPS
24. Challenge
Very expensive wholesale broadband costs
Internet video taking up a lot of bandwidth
Not enough performance from Squid
Solution
2x CACHEBOX230, 1 x CACHEBOX210 in network core
New caching extension for large files (eg. web video)
Result
Significant bandwidth saving: 30%+
Added more subscribers to existing connection
ISP Case Study – Karib Cable
MORE DETAIL: INTERNET SERVICE PROVIDER DEPLOYMENT
25. What you have heard
Web caching can solve your web traffic and
bandwidth issues and save you money quickly
CACHEBOX is the best value solution
Higher performance / $
Rapid payback, compelling business case to your FD
Appliance makes it easy
ApplianSys has a track record you can trust
26. Different ways to deploy
Caching video
Caching software updates
Choosing the right model
Would you like more detail?
ISP deployment
End presentation
27. CACHEbox can be deployed in different ways
FORWARD
REVERSE
Transparent
Explicit
WCCP /
Routing
Gateway
mode
Accelerating general web traffic for users
accessing the Internet
Accelerating requests from Internet /
network to one or more web servers
or
or
or
Browsers are configured
to make requests via
CACHEBOX
Network or routing is
modified so that traffic
flows via CACHEBOX
Users unaware of cache
MORE DETAIL: DEPLOYMENT METHODS
28. Let’s look at these options in more detail….
FORWARD
REVERSE
Transparent
Explicit
WCCP /
Routing
Gateway
mode
or
or
or
MORE DETAIL: DEPLOYMENT METHODS
29. Forward Transparent - with WCCP / routing
MORE DETAIL: DEPLOYMENT METHODS
Existing router or switch redirects HTTP traffic to CACHEBOX
Client browsers do not need configuring
Best option for ISP use
CACHEBOX can make requests using the client’s IP
Multiple CACHEBOXes can be clustered together
30. Let’s look at these options in more detail….
FORWARD
REVERSE
Transparent
Explicit
WCCP /
Routing
Gateway
mode
or
or
or
MORE DETAIL: DEPLOYMENT METHODS
31. Forward Transparent - gateway mode
MORE DETAIL: DEPLOYMENT METHODS
Clients or network devices use CACHEBOX as their default
gateway
CACHEBOX caches HTTP traffic, passing rest through
Recommended only in small networks, as it introduces a single
point of failure
32. Let’s look at these options in more detail….
FORWARD
REVERSE
Transparent
Explicit
WCCP /
Routing
Gateway
mode
or
or
or
MORE DETAIL: DEPLOYMENT METHODS
33. Forward explicit deployment
MORE DETAIL: DEPLOYMENT METHODS
Browsers are configured to send HTTP traffic via
CACHEBOX, by
Changing settings in Internet Options on each PC
Using PAC files to let browsers detect settings
Using Active Directory to push settings to each Windows PC
Not suitable for ISP environments
34. Let’s look at these options in more detail….
FORWARD
REVERSE
Transparent
Explicit
WCCP /
Routing
Gateway
mode
or
or
or
MORE DETAIL: DEPLOYMENT METHODS
35. Reverse caches: deployed in front of web servers
MORE DETAIL: DEPLOYMENT METHODS
Commonly used to:
Offload static content from dynamic sites
Accelerate content from web servers on slow Internet links
(such as those hosted at company HQ), placing CACHEBOX
in a datacenter
Move content closer to users, creating a CDN
36. Most video-sharing sites use Flash or MPEG files
served over HTTP which normally can not be cached
PROBLEM
They serve the same files
from multiple servers with
different URLs
So files from each URL get
cached, filling up storage
and not saving bandwidth
The “rules” for determining
the URLs of different
servers are often changed
by content providers
SOLUTION
CACHEBOX identifies
video files and caches a
single copy from the first
URL it is requested from
It then serves the cached
file, whatever URL is next
requested
ApplianSys monitors
content provider URLs and
updates CACHEBOX
software automatically
when the rules change
MORE DETAIL: CACHING VIDEO
37. Operating Systems, Antivirus and software
packages use HTTP to download updates
MORE DETAIL: CACHING SOFTWARE UPDATES
PROBLEM
These update downloads
can not normally be cached
Traditional caches are only
effective if a whole file is
requested
If part of a file (a “range
request”) is requested it will
be served but not cached
SOLUTION
CACHEBOX is smarter.
When a range request is
served, the entire file is
downloaded in parallel
Future requests can be
served from cache
38. Choosing The Right Model
CACHEBOX has no licence limits based on number of users
The only limit on each model is the number of HTTP
requests per second (RPS) the hardware can support
Performance is not measured in throughput: 1 user on a
10MBit ADSL line will generate less traffic than 1000 users
on a 5MBit satellite connection
Published RPS figures are measured in a test environment
using benchmark software. Real life performance will vary
dependent on
Type of traffic & network setup
Other factors, such as Denial of Service attacks
MORE DETAIL: CHOOSING THE RIGHT MODEL OF CACHEBOX
39. Choosing The Right Model
CACHEBOX050/100 are entry-level devices for lower loads
CACHEBOX230 is ideal for top performance with large object storage
optimised for video content
CACHEBOX220 is ideal top performance where there is less video
content or software update downloading
CACHEBOX210 offers good value at mid-performance levels
CACHEBOX050 CACHEBOX100 CACHEBOX200 Series
210 220 230
Requests / sec 400 400 1300 2500 2500
Usage Education/SME/Branch Education/SME/Branch Office Network Core/ISP
Disk Type HDD HDD HDD SSD HDD &
SSD
Form Factor Compact Shallow 1U rack mount 1U rack mount
Ethernet 1 x10/100 Mb/s LAN port
(4x 10/100/1000 optional)
2 x10/100 Mb/s LAN port
(4x 10/100/1000 optional)
2 x10/100/1000 Mb/s LAN port
MORE DETAIL: CHOOSING THE RIGHT MODEL OF CACHEBOX
40. CACHEBOX is popular with ISPs: the benefits of
performance caching at sensible prices are obvious
Save money
More customers on a fixed bandwidth, or
Save metered bandwidth
Easy to deploy appliance
MORE DETAIL: INTERNET SERVICE PROVIDER DEPLOYMENT
41. The right models deliver performance caching at
sensible prices for ISPs of different sizes
CACHEBOX230 and CACHEBOX220 - first cache appliances to
use Solid State Drives (SSD), for speed and reliability
Can be clustered to handle a very heavy caching workload
Depending on type of traffic, supports >10,000 users per appliance
Other vendors only offer this performance with bigger, expensive
devices
CACHEBOX230 also stores up to 1 Terabyte (TB) of larger files
- like internet video - from Google, YouTube and similar sites
CACHEBOX210 is perfect for small ISPs, with excellent
performance at a low price point
MORE DETAIL: INTERNET SERVICE PROVIDER DEPLOYMENT
42. The right models deliver performance caching at
sensible prices for ISPs of different sizes
CACHEBOX100 is a 1U rack-mount appliance suited to very
small ISPs
CACHEBOX050 has the same features and performance as the
‘100’ but in a mini-appliance device
You can use it alone or with ‘200’ series models deployed further
upstream.
Some ISPs sell low-end models to business customers so that they
can get more from their bandwidth
MORE DETAIL: INTERNET SERVICE PROVIDER DEPLOYMENT
43. Challenge
Very expensive wholesale broadband costs
Internet video taking up a lot of bandwidth
Not enough performance from Squid
Solution
2x CACHEBOX230, 1 x CACHEBOX210 in network core
New caching extension for large files (eg. web video)
Result
Significant bandwidth saving: 30%+
Added more subscribers to existing connection
ISP Case Study – Karib Cable
MORE DETAIL: INTERNET SERVICE PROVIDER DEPLOYMENT
44. NEXT STEPS
Confirm your need / benefits ?
Confirm CACHEBOX is a good fit ?
Choose right solution ?
??
??
Editor's Notes
Plug-and-play, ultra-secure DNS/DHCP master (primary) and slave (secondary) appliances
Powered by industry-leading NameSurfer SE software.
packed with automation and validation features such as automatic updating of zone serial numbers and reverse mappings
Sophisticated twin CompactFlash architecture enhances security and redundancy
one card holds Linux OS application mounted read only, one card holds system config and DNS data
Plug-and-play, ultra-secure DNS/DHCP master (primary) and slave (secondary) appliances
Powered by industry-leading NameSurfer SE software.
packed with automation and validation features such as automatic updating of zone serial numbers and reverse mappings
Sophisticated twin CompactFlash architecture enhances security and redundancy
one card holds Linux OS application mounted read only, one card holds system config and DNS data
Reduced risk of DNS errors
Probability of making error with BIND x cost of error (system downtime, admin to find and rectify error). The cost of the consequences of a DNS failure could be dramatic, as entire corporate networks may be at risk.
Based on cost savings, the typical payback is 3-6 months. Overall time savings are normally 50%+. These figures have been borne out by experience with NameSurfer across its large installed base. The addition of our appliance format introduces further time savings on installation and software maintenance. We have calibrated specific key DNS operations and at this micro level, dramatic savings are evident:
ROI in specific cases will depend on the context - the initial situation prior to installation of DNSBOX300 and the volume and nature of DNS changes made on an ongoing basis.
Those familiar with DNS will readily appreciate the potential for savings, but many IT managers (not to mention general business managers) have no direct experience of DNS management and are therefore unaware of the intricacies and pitfalls: