Brocade FCS Fabric - a new generation of Data Center solutions

Brocade Communications Systems as the undisputed leader in the Fiber Channel switch market has introduced solutions from the world of mass storage to a new generation of network switches designed to support Data Centers and private clouds by implementing the VCS Ethernet Fabric technology.   

When designing the VCS technology, the needs of customers were taken into account, such as:

  • elimination of network barriers in the context of application performance,
  • guarantee of service availability in the face of network disruptions and bottlenecks, the need for flexible network scaling with traffic growth and changes in architecture,
  • the need to quickly adapt network services to the needs of applications in a private cloud environment,
  • simplicity - "is supposed to work" with minimal interference from the administrator,
  • support for cloud environments, including renting infrastructure to multiple entities, adjusting policies and automating processes in the cloud.

Compared to the classic hierarchical Ethernet structure, VCS technology provides higher performance, better link utilization, higher reliability and simplicity of architecture.
VCS technology is nothing more than clustering many physical switches to one logical one with all the consequences related to data transmission in the L2 layer inside the cluster. Clustering of switches is possible at distances of up to 200m. However, the specification also provides for clustering over long distances, up to 30km, with some limitations related to the number and type of ports and the availability of technology, in particular FCoE and iSCSI. A VCS cluster is one logical switch from a management point of view.

Brocade 1

Multiple active data paths are allowed within a cluster. All paths transmit data, and traffic balancing is done for the entire structure at the level of individual packets. This guarantees optimal use of the infrastructure, fast switching in the event of failure of any element of the cluster, and easy scaling. Just add an extra connection and it works. The FCoE protocol is also available inside the entire cluster.

Standard switches and hosts can be connected to the cluster switches by means of multiple aggregated LAG connections without the risk of data loops, without the need to use the STP protocol, with all connections being transmissively active.

Brocade 2

VCS clusters can be combined with each other treating each cluster as a single switch, obtaining a fully reliable, easy to manage, efficient architecture.

Brocade 3

The VCS Fabric solution works with the VMWare environment to offer port profiling. The port profile includes FCoE, VLAN, QoS and security parameters. When migrating a virtual machine between physical hosts, the port profile migrates automatically between cluster switches along with the virtual machine.

Brocade 4

Finally, an important point. VCS Fabric technology is available in the entire family of Brocade VDX Data Center Switches at the price of the switch, without additional licenses, and the entire cluster configures itself automatically when data links are connected.

Emphasis on security - AirTight Networks

As we wrote on our blog (Chasing EPS. Is it profitable to be innovative?) wireless networks and mobile devices are very interesting solutions for enterprises and individual customers. It is estimated that by 2019, sales of wireless devices will increase by 40% compared to now.

What are the challenges of the universality of wireless solutions? In addition to the performance and stability of operation, this is for sure security. For this reason, our company has included AirTight Networks technologies and products in its offer. The question arises, of course, what distinguishes AirTight Networks from other manufacturers. There are two reasons for our choice: these are products designed with the highest level of security in mind and the uniqueness of AirTight, consisting in the possibility of cooperation with already existing networks of other manufacturers.

 The basic features of AirTight Networks solutions are:

  • security - unique patented WIPS protocol ensuring, among others, protection against Client Mis-association attacks, Ad hoc Networks, Rogue AP (WIPS will recognize the difference between "Rogue" AP and external, e.g. neighbor), Mis-configured AP, MAC-Spoofing, unauthorized access, Honeypot / Evil Twin Attack, Denial of Service (DoS) Attack, Man in the Middle Attack.
  • monitoring of wireless networks - additional protection of existing wireless networks thanks to WIPS functionalities (1 AP AirTight for 4 existing ones).
  • openness - the possibility of network cooperation with AirTight on-premise controllers (hardware and virtual) as well as with controllers of other companies such as Cisco, Aruba, Motorola.
  • work in the cloud - the possibility of using a wireless network controller available in the cloud - functionality especially useful for distributed retail networks (shops, restaurants, pharmacies and others).
  • work in various external conditions - AirTight offers inside and Outside access points at very attractive prices.
  • data analysis - AirTight management software provides the ability to analyze incidents related to security and customer traffic. Integration with social media allows for flexible customer service by analyzing their preferences and habits (Social Engagement).
  • compliance with standards - in addition to compliance with the required regulations wireless networks AirTight Networks systems enable periodic audits and reports of compliance with electronic payment regulations PCI DSS 3.1 (Payment Card Industry Data Security Standard).

UpGreat Systemy Komputerowe Sp. z o. o. has the status of an Authorized Partner of AirTight Networks in Poland and provides exclusive customer service in western Poland (Wielkopolskie, Zachodniopomorskie, Lubuskie, Pomorskie, Opolskie and Dolnośląskie provinces).

To learn more about the AirTight product portfolio, please see leaflet. Please also contact us to organize a presentation of solutions, demonstration implementation along with a demonstration of functionalities related to data security and analysis, and possibly to organize site-survey. We also invite you to visit the company's website AirTight Networks.

AirTight Networks is an American company headquartered in Mountain View, California, specializing exclusively in the production and implementation of solutions for building secure wireless networks. Thanks to the use of the proprietary WIPS protocol, networks based on this solution are characterized by the highest level of security available on the market, as evidenced by implementations in the military and banking sectors. Secure wireless networks based on the Airtight Networks architecture are used in the world by over a thousand large companies from every sector of the economy.

KRI audits

Security audits have been included in our offer for a long time. The service is addressed to both private enterprises and public institutions. In every organization, an increasingly extensive sphere of internal activities and those related to contacts with clients takes place with the use of IT systems.

For public institutions, many services are available to provide services to citizens through electronic media. Applications, certificates, extracts from registers, tax declarations can be submitted via internet applications without visiting offices. These possibilities are a great help, but at the same time they endanger the systems available on the Internet and the data stored in them.

We would like to draw your attention to the audits of compliance with the National Interoperability Framework (KRI) performed by our company, i.e. information security management audits in public entities.

KPRM

In May 2012, the Regulation of the Council of Ministers of April 12, 2012 on the National Interoperability Framework entered into force, concerning the minimum requirements for public registers and the exchange of information in electronic form, as well as minimum requirements for ICT systems.

The Regulation in question is an implementing act to The Act of February 17, 2005 on computerization of the activities of entities performing public tasks.

It imposes requirements on public administration units as to the annual IT infrastructure security audit. It concerns in particular:

Art. 2. 1. Subject to sec. 2-4, the provisions of the Act shall apply to those performing public tasks specified by the Acts: 1) government administration bodies, state control and law protection bodies, courts, organizational units of the prosecutor's office, as well as local government units and their bodies, 2) budgetary and local government units budgetary establishments, 3) earmarked funds, 4) independent public health care establishments and companies performing medical activities within the meaning of the provisions on medical activity, 5) the Social Insurance Institution, the Agricultural Social Insurance Fund, 6) the National Health Fund, 7) state or local government persons legal entities created on the basis of separate acts in order to perform public tasks - hereinafter referred to as "public entities". 2. The provision of Art. 13 sec. 2 point 1 shall also apply to the entity to which the public entity has entrusted or commissioned the performance of a public task, if due to the © Kancelaria Sejmu s. 3/28 2015-05-12 implementation of this task there is an obligation to provide information to or from non-administrative entities governmental.

Source: Journal of Laws 2005 No.64 item. 565 ACT of February 17, 2005 on computerization of activities of entities performing public tasks.

We will now focus on the provision concerning the minimum requirements for ICT systems. It includes 13 checkpoints:

  1. Provision of updating internal regulations with regard to the changing environment;
  2. Keeping the inventory of hardware and software used for information processing up-to-date, including their type and configuration;
  3. Conducting periodic analyzes of the risk of losing the integrity, availability or confidentiality of information and taking actions to minimize this risk, according to the results of the analysis;
  4. Taking actions to ensure that people involved in the information processing process have appropriate rights and participate in this process to an extent adequate to their tasks and obligations aimed at ensuring information security;
  5. Immediate change of powers in the event of a change in the tasks of the persons referred to in point 4;
  6. Providing training for people involved in the information processing process, with particular emphasis on such issues as:
    a) information security threats,
    b) consequences of breach of information security rules, including legal liability,
    c) application of measures ensuring information security, including devices and software minimizing the risk of human error;
  7. Ensuring protection of processed information against theft, unauthorized access, damage or
    disturbances, by:
    a) monitoring access to information,
    b) activities aimed at detecting unauthorized activities related to information processing,
    c) providing measures to prevent unauthorized access at the level of operating systems, network services and applications;
  8. Establishing basic rules to guarantee safe work in mobile computing and working remotely;
  9. Securing information in a way that prevents its disclosure, modification, deletion or by an unauthorized person
    destruction;
  10. Including in service contracts signed with third parties provisions that guarantee the appropriate level
    information security;
  11. Establishing information handling rules ensuring minimization of the risk of information theft
    and information processing means, including mobile devices;
  12. Ensuring an appropriate level of security in ICT systems, consisting in particular in:
    a) care for software updates,
    b) minimizing the risk of information loss as a result of a failure,
    c) protection against errors, loss, unauthorized modification,
    d) using cryptographic mechanisms in a manner adequate to the threats or requirements of a legal provision,
    e) ensuring the security of system files,
    f) reduction of risks resulting from the use of published technical vulnerabilities of ICT systems,
    g) immediately taking actions after noticing undisclosed vulnerabilities of ICT systems to
    the possibility of a security breach,
    h) control of compliance of ICT systems with the relevant ones
    security standards and policies;
  13. Immediate reporting of information security breach incidents in a predetermined and predetermined manner, enabling quick corrective action.

Meeting the above requirements does not guarantee full safety. Remember that security is not a state, it is a process. The level of threats is constantly growing and we are not able to fully take care of every detail of our infrastructure or the carelessness of our employees. The solution is periodic security audits, preferably external, carried out by high-class specialists who are certified by industry organizations in the field of security.

Our company is a member of ISSA Polska - Association for the Security of Information Systems. Our specialists have conducted several dozen security audits also in local government units. We have a certificate Certified Ethical Hacker (CEH) awarded by the International Council of Electronic Commerce Consultants (EC-Council).

Implementation of wireless networks

WLAN networks are an indispensable element of the IT infrastructure in enterprises for which mobility and high availability of services are the basis for achieving business goals. Many years of experience in designing and implementing wireless networks has allowed us to develop a comprehensive offer for the delivery of secure solutions based on proven standards and practices used in wifi networks. The practice is also supported by knowledge and certificates - specializations Cisco Premier Partner - Cisco Wireless LANHP Preferred Partner - HP Networking Professional and for auditing purposes EC-Council Certified Ethical Hacker. We guarantee reliability and high-quality services.

1. Implementation methodology.

We make sure that our solutions provide maximum satisfaction to our clients. Therefore, the methodology of our implementations includes the following services:

  • site survey - WLAN network measurements, allowing to determine the location and number of access points that will guarantee the required speed when accessing the WLAN. Performing measurements guarantees full WiFi coverage while maintaining the highest transmission speeds for a given technology, ensures signal continuity and optimization of the number of access points.
  • design and optimization of the concept - when implementing wireless networks, we use technologies that increase efficiency, stability and guarantee full monitoring of the network's operation. Networks based on redundant controllers, a management server, tools for advanced analysis of mobile services and reporting are the most common design scenarios in enterprise environments.
  • ensuring the safety of - WLANs can be vulnerable to attacks and unethical user behavior. To secure your network, complex passwords and WPA2 encryption are no longer sufficient. The security we use is the authentication of the user in the network using domain passwords, dedicated RADIUS servers or one-time password servers. Additionally, the authentication process can be strengthened by means of digital certificates issued individually for each device. A necessary element of a safe WLAN network is a correctly made contact with the corporate network. Traffic should be passed through the fire gate and filtered down to TCP ports only for those services that are to be accessed by mobile users. An additional security of the wireless network is WLAN IPS, which, while listening to the environment in the free time from data transmission, is able to detect and neutralize attacks on the wireless network.

2. Security audits.

The final stage of implementation is the performance of a security audit, which allows you to verify the network security methods used and their susceptibility to threats. We subject existing networks to ethical attacks and penetration tests - in this way we check the operation of security systems and attack detection. In the event of any irregularities - we develop a security policy implementation plan, taking into account the current state of knowledge on the security measures applied.

3. References.

We have carried out many implementations of wireless networks in production, warehouse and office environments. The projects covered networks prepared for operation from several to several hundred access points. The applied solutions allow for full reporting of the wireless network status, security level and are able to provide users with a full range of mobile services. At the request of our clients, we are ready to present examples of implementations with appropriate references.

Backup and monitoring of virtual environments based on Veeam Software solutions

About Veeam Software
Veeam Software, Elite partner in the VMware Technology Alliance program, Microsoft partner and participant in the VMware Ready Management program, provides innovative software for VMware vSphere and VMware Infrastructure environments. For more information about Veeam Software, please visit www.veeam.com/pl.

Veeam Backup & Replication v7, v8 (New)

Number 1 for backing up virtual machines

Veeam® Backup & Replication ™ makes it possible efficient, easy-to-use and affordable recovery virtualized applications and data. This comprehensive solution combines the functions of data backup and replication, increases the usefulness of backups and offers an innovative method of data protection in VMware vSphere and Microsoft Hyper-V environments. With a single license, you can use the integrated console to operate the entire virtual infrastructure, using industry-leading features such as instant file recovery and improved virtual machine recovery, scalability, combined ("2-in-1") backup and replication mechanisms , built-in duplication, centralized management, and more. There are no fees for individual applications and VMs, or agents for licensing, deployment, and maintenance.

Veeam ONE

Efficient, easy-to-use and affordable monitoring and reporting

Veeam ONE ™ is a comprehensive solution that offers efficient and easy-to-use monitoring and reporting functions for VMware and Hyper-V environments. Veeam ONE provides full visibility into the entire virtual infrastructure, more efficient operation and better availability of the virtual environment, as well as more optimal configuration and use of virtual resources.

Veeam ONE combines the capabilities of Veeam Monitor ™, Reporter ™ and Business View ™ to provide the features that virtualization administrators need most:

  • Real-time monitoring: Detailed, maintenance-free, 24/7 monitoring of your entire virtual infrastructure provides quick access to information on performance and availability problems, and an extensive knowledge base helps you quickly identify and fix the causes.
  • Change Tracking: Log details of changes to your virtual infrastructure (who, what, where, when and how) to help you refine your change routines and analyze unexpected downtime due to certain changes.
  • Documentation and Reporting: Automated and on-demand documentation and reporting of virtual infrastructure provide stakeholders with accurate and timely information.
  • Capacity planning: Advanced analytical tools enable precise planning of computing capacity. Veeam ONE studies trends, identifies resource surpluses, and provides flexible what-if models. This creates reliable forecast forecasts and resource allocation recommendations to help you make informed decisions about your virtual infrastructure development.

Now an increasingly complex and business-critical VMware environment can be managed with Veeam, a recognized leader in virtualization management and data protection.

Veeam Management Pack ™ for VMware (SCOM)

Monitor VMware environments with Microsoft System Center Secure your investments with Microsoft System Center (SCOM) and manage your physical and virtual environments from a single console with Veeam MP. Nworks Management provides detailed, scalable, agentless monitoring and management of your VMware infrastructure directly from Microsoft System Center, eliminating the need for a separate monitoring platform.

Find out more about VMware management and monitoring with Microsoft SCOM / MOM tools

Veeam Smart Plug-in ™ (SPI) for VMware

Leverage your existing investments in HP Operations Manager and provide operational staff with the ability to monitor your VMware environment 24/7 without the need for specialized training or virtualization experience. Veeam SPI enables distributed, agentless monitoring and management of VMware infrastructure in full cooperation with HP Operations Manager. VMware performance, event, configuration, status, and topology data is fed directly to HP Operations Manager, providing a collective view of the physical and virtual infrastructure from a single console.

Find out more about monitor and manage your VMware environment with HP Operations Manager.

Safe storage of large amounts of data - one event in two scenes - training on the ONTAP system - November 14, 2019

Safe storage of large amounts of data - one event in two scenes - training on the ONTAP system - November 14, 2019

I submit my participation in the second meeting devoted to NetApp solutions.

 

We offer you a large dose of technical knowledge in the field of NetApp mass storage technologies.

 

The meeting is a training during which you will learn the basics of installation, administration and use of the ONTAP system that manages NetApp arrays. Details of the meeting and agenda can be found on our website.

The training will take place on November 14, 2019 in Concordia Design in Poznań at ul. Zwierzyniecka 3. Participation in breakfast is free and each participant who did not participate in the first meeting will receive a gift of a multifunctional Bosch IXO universal cordless screwdriver.

Application form