WIDS 技术白皮书(20121010)
- 格式:doc
- 大小:285.00 KB
- 文档页数:9
wisun协议中文版摘要:一、Wisun 协议简介二、Wisun 协议的架构三、Wisun 协议的关键技术四、Wisun 协议的优势五、Wisun 协议在我国的应用正文:Wisun 协议中文版随着物联网技术的飞速发展,各种低功耗、高效、安全的无线通信协议应运而生。
Wisun 协议作为其中的佼佼者,受到了广泛关注。
本文将从协议简介、架构、关键技术、优势以及在中国的应用等方面进行详细阐述。
一、Wisun 协议简介Wisun 协议,全称为Wireless Sensor Networks User-centric Protocol(用户为中心的无线传感器网络协议),是一种为物联网应用场景设计的低功耗、高效、安全的无线通信协议。
它旨在满足大规模无线传感器网络在节能、传输速度、通信距离、系统稳定性以及扩展性等方面的需求。
二、Wisun 协议的架构Wisun 协议采用分层架构设计,包括传感器层、网络层和应用层。
各层之间相互配合,共同构建高效、稳定的无线传感器网络。
1.传感器层:负责数据采集和处理,支持多种传感器接口,具有低功耗、低成本的特点。
2.网络层:负责数据传输和路由选择,支持自组织和动态路由,适应复杂的网络环境。
3.应用层:负责数据处理和应用服务,支持多种应用场景,满足不同用户需求。
三、Wisun 协议的关键技术Wisun 协议在设计过程中采用了多项关键技术,以实现低功耗、高效、安全的通信。
1.低功耗技术:通过采用休眠模式、节能调度算法等手段降低能耗,延长网络节点寿命。
2.高效数据压缩:采用高效的数据压缩算法,减少传输数据量,降低网络负载。
3.可靠的数据传输:采用多种传输策略,保证数据在传输过程中的可靠性和实时性。
4.安全的通信机制:采用加密、认证等手段,确保通信过程中的数据安全和隐私保护。
四、Wisun 协议的优势Wisun 协议凭借其低功耗、高效、安全等特性,在物联网领域具有显著的优势。
1.节能:采用低功耗技术和节能调度算法,降低能耗,延长网络节点寿命。
移动终端白皮书(2012年)工业和信息化部电信研究院2012年4月版权声明本白皮书版权属于工业和信息化部电信研究院,并受法律保护。
转载、摘编或利用其它方式使用本白皮书文字或者观点的,应注明“来源:工业和信息化部电信研究院”。
违反上述声明者,本院将追究其相关法律责任。
前言移动终端作为简单通信设备伴随移动通信发展已有几十年的历史,自2007年开始,智能化引发了移动终端基因突变,根本改变了终端作为移动网络末梢的传统定位,移动智能终端几乎在一瞬之间转变为互联网业务的关键入口和主要创新平台,新型媒体、电子商务和信息服务平台,互联网资源、移动网络资源与环境交互资源的最重要枢纽,其操作系统和处理器芯片甚至成为当今整个ICT产业的战略制高点。
移动智能终端引发的颠覆性变革揭开了移动互联网产业发展的序幕,开启了一个新的技术产业周期。
随着移动智能终端的持续发展,其影响力将比肩收音机、电视和互联网(PC),成为人类历史上第四个渗透广泛、普及迅速、影响巨大、深入至人类社会生活方方面面的终端产品。
2011年全球移动智能终端的出货量超越PC,标志着一个新的时代来临。
2011年我国移动智能终端出货量超过1.1亿部,超过2011年之前我国历年移动智能终端出货量的总和,也超过全球2009年除Symbian操作系统(占总数的50%)以外智能终端出货量的总和,而2011年第四季度我国移动智能终端出货量占总出货量比重达36.17%,与欧美等发达国家站到了同一水平线上,移动智能终端引领的技术变革和产业模式创新已成为我国重要的历史性机遇。
本白皮书首次披露了部分关于移动终端的客观、公正、准确的数据,并展示了我院在移动终端领域的部分研究成果,旨在与业界分享观点、建立共识,谱写我国移动终端智能化发展的新篇章。
数据口径及词条说明【出货量】本白皮书中出货量是指在中国市场进行入网认证的移动终端总数,是所有(国内外)终端制造商在中国市场中经正规渠道,批量销售给经销商,进入销售市场的实际发生数量,不同于社会资讯企业通过企业经销渠道或网络调查所得到的概要统计。
信锐技术SUNDRAY 无线优化白皮书信锐网科技术有限公司版权声明本说明版权归深圳市信锐网科技术有限公司所有,并保留对本文档及本声明的最终解释权和修改权。
本文档中出现的任何文字叙述、文档格式、插图、照片、方法、过程等内容,除另有特别注明外,其著作权或其它相关权利均属于深圳市信锐网科技术有限公司。
未经深圳市信锐网科技术有限公司书面同意,任何人不得以任何方式或形式对本文档内的任何部分进行复制、摘录、备份、修改、传播、翻译成其他语言、将其全部或部分用于商业用途。
免责条款本文档仅用于为最终用户提供信息,其内容如有更改或撤回,恕不另行通知。
信锐网科技术有限公司已尽最大努力确保本文档内容准确可靠,但不提供任何形式的担保,任何情况下,信锐网科技术有限公司均不对(包括但不限于)最终用户或任何第三方因使用本文档而造成的直接或间接的损失或损害负责。
信息反馈如果您有任何宝贵意见,请反馈:地址:深圳市南山区学苑大道1001号南山智园A1栋6楼邮编:518055您也可以访问信锐技术网站:获得最新技术和产品信息。
随着无线通信技术的快速发展,无线通信能传输越来越大的带宽,上网体验变得越来越好,成为了大家生活中不可或缺的一部分。
怎样让无线网络速度变得更快?怎样让无线宽带的利用率更高?信锐科技对无线网络进行了优化,接下来将会从7个方面来介绍。
1⃣ARP转单播优化现在比较通用的网络协议是TCP/IP,为了能让数据在网络过程中实现更好的通信与交换,就制定了一系列的协议,ARP(地址解析协议)就是其中的一种。
ARP协议:主机发送包含目标IP地址的ARP请求广播信息发送到网络上的所有主机,并接收返回消息,以此确定目标的物理地址;收到返回消息后将该IP地址和物理地址存入本机ARP缓存中并保留一定时间,下次请求时直接查询ARP缓存以节约资源。
如下图,当主机B的ARP请求发往同一个二层相连的所有主机或终端,在无线网络环境中,这种“垃圾”报文会占用有限的无线空口资源,当广播包过多时,长时间占用无线空口,导致其他终端无法正常发送数据,从而影响整个网络性能。
Cloud optimize your business with Windows Server 2012 R2 PreviewPr oduct Overview White P aperTable of ContentsTrends (4)Converging needs and innovations (5)Windows Server: At the heart of the Cloud OS (6)Windows Server 2012 R2 capability overview (9)Server Virtualization (9)Networking (14)Storage (12)Server management and automation (18)Web and application platform (19)Access and information protection (21)Virtual Desktop Infrastructure (VDI) (23)Summary (26)Next Steps with Windows Server 2012 R2 (28)Copyright Information© 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other website references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. You may modify this document for your internal, reference purposes.TrendsThe world of IT is changing rapidly, and traditional approaches are often no longer adequate. Microsoft’s vision for this new era of IT is to provide you with one consistent platform for infrastructure, apps and data – called the Cloud OS – that spans customer datacenters, service provider datacenters and the Microsoft public cloud.Windows Server 2012 R2 is at the heart of the Microsoft Cloud OS and provides a unique server and datacenter platform that allows you to easily and cost-effectively cloud optimize your business.There are several key IT trends that are shaping the industry, are creating opportunities, and are being driven across enterprise and service provider organizations:New Applications: Business innovation and agility drive the need for more deployment, system and integration flexibility. Such flexibility demands new application and services architectures that promote component application architectures that have greater connectivity, are built upon new application frameworks with richer sets of common services, and can readily take advantage of familiar productivity, collaboration, and social networking tools.Device Proliferation: Innovations in consumer computing devices offer opportunities for enterprises to foster increased productivity by enabling users to work in new ways, such as working from home and on the go. Innovations in highly mobile device form factors—with instant on, connectivity via Wi-Fi and cellular networks and integration of powerful features such as touch screens, cameras, and GPS—have created rich user experience preferences that carry expectations and requirements into the enterprise. This “consumerization of IT” trend offers enterprises opportunities to support an d incorporate these experiences and devices to improve productivity and enable whole new work scenarios, such as convenient access to data and applications in the field, and new device applications that are contextually relevant.Data Explosion: The exponential growth of available data can create significant challenges for IT. The data comes from a variety of internal and external sources, exacerbated by a proliferation of business and personal computing devices in use, and in many different structured and unstructured formats. Relevancy and useful insights into the data are often sparse and hidden in combinations of multiple data sources. In many cases, the sheer volume of data prevents organizations from capturing and analyzing it with traditional methods such as storage in a database for query and analysis. In some cases, the data streams at a rate and volume that prevents any capture or process of anything beyond a limited window of time. Cloud Computing: To address the challenges of new applications, device proliferation, and data explosion, organizations need to take new approaches for effectively and efficiently harnessing the latest IT innovations in a converged datacenter infrastructure. Abstracting resources from individual hardware components to a pooled set of resources, while maintaining workload isolation, allows organizations to achieve highly agile workload provisioning, continuous availability, and elastic scaling, while optimizing utilization of their resources. This “cloud computing” delivery model has evolved with new IT service delivery models to render and manage these capabilities to their full potential.Many enterprise IT departments have recast their datacenter services into “private cloud” computing models, have automated their delivery model with self service provisioning and administration portals, and instituted chargeback based on resource usage. Datacenter service providers have also transformedtheir service delivery to cloud computing models, offering even more attractive resource pooling economics at often higher levels of IT service maturity. It is through the consistency between private cloud, service provider cloud and public cloud environments that IT organizations, large and small, can take the most advantage of cloud computing and extend the boundaries of their datacenter to further improve service scale, elasticity, and availability. Converging needs and innovationsToday’s fast pace of business innovation, coupled with the globalization of the economy which has opened deeper and wider varieties of markets, potential business partners, and competitors, drives an urgent need for enhancing fundamental business capabilities.IT is under increasing pressure to deliver more capacity – on demand, both for short term projects and longer term initiatives – at a lower cost. In order to meet the SLAs that the business requires, IT must reduce or eliminate planned and unplanned downtime. Also, high barriers to hybrid cloud deployments make it difficult to extend a production environment into the cloud to leverage its resources. The complexity of a modern datacenter environment is already high, with expensive storage and networking solutions often being managed separately from core infrastructure. Finally, the demands of business users for services are increasing, and so are their options to circumvent IT. At the same time, end user requirements for anywhere anytime access to corporate resources increase along with challenges of compliance and governance as end-user requirements increaseFortunately, business needs and technology innovations are converging, offering IT professionals a unique opportunity to take advantage of new innovations to meet business requirements. To support these business needs, IT professionals are looking for an infrastructure that can take advantage of shared resources, is elastic so it can scale up and down quickly to meet changing business needs, and minimizes downtime and failures while maximizing cost efficiencies.As you will learn in this overview white paper, the latest release of Windows Server, Windows Server 2012 R2, is extremely well positioned to address these needs.Windows Server: At the heart of the Cloud OSMicrosoft has gained expertise from years of building and operating some of the largest cloud applications in the world. Microsoft has combined this expertise with its experiences in delivering market leading enterprise operating systems, platforms, and applications to develop a new approach for the modern era: the Cloud OS.The Microsoft Cloud OS delivers a modern platform of products and services that helps organizations transform their current server infrastructure into a highly elastic, scalable, and reliable cloud infrastructure; quickly and flexibly build and manage modern applications across platforms, locations, and devices; unlock insights from volumes of existing and new data; and support user productivity wherever and on whatever device users choose.The Microsoft Cloud OS provides enterprises with infrastructure and solutions for always-on, always-up services. Automated management, robust multitenant support, and self-service provisioning help enterprises transform their datacenters to support the coordination and management of pooled sets of shared resources at the datacenter level, replacing fragmented management of individual server nodes. The Microsoft Cloud OS enables enterprises to quickly and flexibly build and manage modern applications that interact and exchange data with other applications built on multiple platforms and languages, and that live on-premises and/or off-premises. These modern applications must be supported on multiple types of devices, and may integrate social data or foster social connections among users. The Microsoft Cloud OS enables enterprises to help users make faster, better business decisions by capturing and analyzing growing volumes of data– including unstructured, streaming, and/or voluminous data – from existing and new sources, and delivering this data to more users with the right IT oversight.And finally, the Microsoft Cloud OS helps enterprises make their users productive wherever they choose, on whatever device they choose, with easier device management and secure delivery of applications and data in extended, mobile environments.Figure 1: The Microsoft Cloud OSMicrosoft uniquely delivers the Cloud OS as a consistent and comprehensive set of capabilities across the enterprise private cloud datacenter and public cloud datacenters, such as Windows Azure or public cloud offerings from service providers. The consistency of these capabilities enables the seamless and agile integration of private and public clouds needed for enterprises to further improve service scale, elasticity, and availability:∙ Agile Development Platform : The Microsoft Cloud OS allows enterprises to build applications they need using the tools they know, including Microsoft Visual Studio and .NET, or open-sourcetechnologies and languages, such as REST, JSON, PHP, and Java.∙ Unified DevOps and Management : The Microsoft Cloud OS supports unified DevOps and unified application life-cycle management with common application frameworks across development and operations. With Microsoft System Center integration with development environments such as Visual Studio, enterprises can achieve quick time-to-solution and easy application troubleshooting and management.∙ Common Identity : The Microsoft Cloud OS implements Active Directory as a powerful asset across environments to help enterprises extend to the cloud with Internet scale security using a single identity and to securely extend applications and data to devices.∙ Integrated Virtualization : To help enterprises achieve the modern datacenter, the Microsoft Cloud OS includes an infrastructure which provides a generational leap in agility, leveraging virtualization to deliver a highly scalable and elastic infrastructure with always-on, always-up services across shared resources and supporting cloud service delivery models with more automated management and self-service provisioning. With Windows Server 2012 R2, the Microsoft Cloud OS is engineered for the Identity VirtualizationDataDevelopmentDevOps andManagementcloud from the metal up with virtualization built as an integrated element of the operating system, not layered onto the operating system.∙Complete Data Platform: The Microsoft Cloud OS fully supports large volumes of diverse data, advanced analytics, and enterprise BI life-cycle management, with a comprehensive set oftechnologies to manage petabytes of data in the cloud, to millions of transactions for the mostmission-critical applications, to billions of rows of data in the hands of end users for predictive and ad-hoc analytics.At the heart of the Microsoft Cloud OS is Windows Server 2012 R2, which delivers with a great set of qualities upon the promises of a modern datacenter, modern applications and people-centric IT, setting Windows Server 2012 R2 apart from the competition. These qualities are:∙Enterprise-class: Windows Server 2012 R2 offers a proven, enterprise-class datacenter and cloud platform that can scale up to run the largest workloads while enabling robust recovery options to protect against service outages. It offers automated protection and recovery of assets and cost-effective business continuity on-premises and in the cloud, allowing you to improve yourworkload SLAs while reducing downtime risks. Because many customer environments are oftenheterogeneous, Windows Server 2012 R2 offers high levels of interoperability with cross-platform technologies.∙Simple and cost-effective: Windows Server 2012 R2 gives you resilient, multi-tenant-aware storage and networking capabilities for a wide range of workloads. It delivers these capabilities ata fraction of the cost of other solutions, through the use of cost-effective, industry-standardhardware. With automation of a broad set of management tasks built-in, Windows Server 2012 R2 simplifies the deployment of major workloads and increases operational efficiencies.∙Application focused: Windows Server 2012 R2 helps you build, deploy, and scale applications and web sites quickly, and with more flexibility than ever before. In concert with Windows Azure and System Center 2012 R2, it unlocks improved application portability between on-premisesenvironments and public and service provider clouds, increasing flexibility and elasticity of your IT services. Windows Server 2012 R2 enables mission-critical applications and provides enhancedsupport for open standards, open source applications and various development languages.∙User centric: Windows Server 2012 R2 allows you to empower your end users by granting them access to corporate resources on the devices they choose while protecting your information. You can manage a user’s identity across the datacenter and federated into the cloud, provi de secure remote access, and define the resources and level of access users have to information based onwho they are, what they are accessing and from what device. You can manage both corporate-and personally-owned devices with a unified infrastructure, making it easier for administrators to identify and help achieve compliance.Windows Server 2012 R2 capability overviewWhen you optimize your business for the cloud with Windows Server 2012 R2, you take advantage of the skills and investments you’ve alre ady made in building a familiar and consistent platform. Windows Server 2012 R2 builds on that familiarity. With Windows Server 2012 R2, you gain all the Microsoft experience behind building and operating private and public clouds, delivered as an enterprise-class, simple and cost-effective server and cloud platform. Windows Server 2012 R2 delivers significant value around seven key capabilities:Figure 2: Windows Server 2012 R2 capabilitiesServer VirtualizationWindows Server Hyper-V is a sophisticated and feature-rich virtualization platform that has helped organizations of all sizes realize considerable cost savings and operational efficiencies. With Windows Server 2012 R2, server virtualization with Hyper-V is pulling ahead of the competition with industry leading size and scale, making Hyper-V the platform of choice for you to run your mission critical workloads. Using Windows Server 2012 R2, you can take advantage of new hardware technology, while still utilizing the servers you already have. This way you can virtualize today, and be ready for the future. Whether you are looking to expand VM mobility, increase VM availability, handle multi-tenant environments, gain bigger scale, or gain more flexibility, Windows Server 2012 R2 with Hyper-V gives you the platform and tools you need to increase business agility with confidence. And you can benefit fromcomplete workload portability as you extend your on-premises datacenter into the cloud to a service provider cloud or Windows Azure.Enterprise-class scale and performanceWindows Server 2012 R2 provides you with massive scale to transform your datacenter into an elastic, always-on cloud. For example, Hyper-V in Windows Server 2012 R2 provides industry-leading virtualization host support for 320 logical processors, 4TB of physical memory and 1,024 active virtual machines per host. Hyper-V supports 64-node clusters and 8,000 VMs per cluster. And it supports a 64 TB virtual disk format with the ability for online resize, i.e. the ability to grow or shrink a VHDX virtual disk dynamically while it is running, and with no downtime.Live migration is an important VM mobility feature that has kept getting better and better with Hyper-V since it was introduced with Windows Server 2008 R2. Improving the performance of live migrating a VM from the source host to the target host has been a constant focus for Windows Server, and in Windows Server 2012 R2 these performance improvements have been taken to the next level: Live migration compression is a new feature that accelerates live migration transfer speed by compressing theVHD/VHDX file, improving performance roughly by 2x for most workloads. And live migration with RDMA is another new feature in Windows Server 2012 R2; it delivers the highest performance for live migrations over >10 Gbit network connections, supporting transfer speeds of up to 56 GB/s, by offloading the transfer to hardware and harnessing the power of remote direct memory access (RDMA) technologies. Virtualized Microsoft workloads (such as Exchange, SQL, and SharePoint) run best on Hyper-V infrastructure. For example, independent third party testing by The Enterprise Strategy Group, Inc. (“ESG Lab”) showed that a Microsoft Exchange Server 2013 infrastructure deployed within twelve Hyper-V virtual machines, running on a single physical server, supported the I/O requirements of up to 48,000 simulated users, while average database read response times ranged between 5.02 and 15.31 milliseconds, well below the Microsoft recommended limit of 20 milliseconds. In another test case, ESG Lab took an existing Microsoft SQL Server 2012 OLTP workload that was vCPU limited by the maximum allowed configuration of four vCPUs imposed by Windows Server 2008 and increased the performance by six times taking advantage of 64 vCPUs in Windows Server 2012. The average transaction response times also improved by five times from four vCPUs to 64 vCPUs.These features help ensure that your virtualization infrastructure can support the configuration of large, high-performance virtual machines for sustaining Microsoft or other, mission-critical workloads that you might need to scale up significantly.Virtual machine mobilityWindows Server 2012 R2 allows you to manage virtual machines independently of their underlying physical infrastructure. It also enables you to handle changes in resource demand as they occur and gives you the ability to rebalance running virtual machines either through the servers which the VMs reside on, or the storage resources used by the virtual machines.Introduced with Windows Server 2012 as an industry-first capability, shared-nothing live migration allows you to move a virtual machine, live with no downtime, from one physical system to another even if they are not in the same cluster or connected to the same shared storage. This capability means you can live migrate a virtual machine from one cluster to a different cluster without setting up complex storage mappings. This is useful, for example, in a branch office where you may be storing the virtual machines on local disk, and you want to move a VM from one node to another. This is also especially useful when you have two independent clusters and you want to move a virtual machine, live, between them, withouthaving to expose their shared storage to one another. You can also use shared-nothing live migration to migrate a virtual machine from one datacenter to another provided your bandwidth is large enough to transfer all of the data between the two datacenters.In multi-tenant environments of service providers, tenants are more and more asking for application-level, high availability for their workloads. To address this need, Windows Server 2012 R2 provides complete flexibility with multiple options for guest clustering, without making you sacrifice agility and density in your environment. In addition to Fibre Channel, iSCSI and SMB, Windows Server 2012 R2 now also offers shared VHDX files. Supporting both storage options, shared VHDX files can be stored either on a scale-out file server cluster or on Cluster-shared Volumes (CSV) on block storage. Shared VHDX clustering also preserves dynamic memory, live migration and storage live migration for a virtual machine that is part of the guest cluster.Introduced in Windows Server 2012 R2, Hyper-V Replica provides a storage-agnostic and workload-agnostic solution that replicates efficiently, periodically, and asynchronously over IP-based networks, typically to a remote site. It also allows an administrator to easily test the replica virtual machine without disrupting the ongoing replication. If a disaster occurs at the primary site, administrators can quickly restore their business operations by bringing up the replicated virtual machine at the replica site. New in Windows Server 2012 R2, Hyper-V Replica now allows for variable (configurable) replication frequencies down to 30 seconds or up to 15 minutes. It also supports multiple nodes; this means that tertiary replica sites are supported, for example in the case of a service provider who wants to replicate a customer’s workload to another (tertiary) datacenter.First-class citizen guest support for LinuxMany enterprises and service providers are running a mix of hypervisors, operating systems and applications in their datacenter. Often times, migrating from one platform to another is not possible, not easily feasible from a technical standpoint, or a much bigger project than IT organizations are willing to take on. Designed to integrate well with heterogeneous IT environments, Windows Server 2012 R2 supports a cross-platform cloud infrastructure by adding comprehensive functional support for Linux guests running on top of Hyper-V.Dynamic Memory is a Hyper-V feature that was introduced with Windows Server 2008 R2 SP1 and is used to automatically reallocate memory between virtual machines that are running on a Hyper-V host. Dynamic Memory helps you to allocate virtual machine memory resources more efficiently while dramatically increasing virtual machine consolidation ratios. A number of improvements were made for Windows guests in Windows Server 2012, and - new in Windows Server 2012 R2 - Hyper-V now offers full dynamic memory support for Linux guests including:•Minimum memory setting – being able to set a minimum value for the memory assigned to a virtual machine that is lower than the startup memory setting•Hyper-V smart paging – which is paging that is used to enable a virtual machine to reboot while the Hyper-V host is under extreme memory pressure•Memory ballooning – the technique used to reclaim unused memory from a virtual machine to be given to another virtual machine that has memory needs•Runtime configuration – the ability to adjust the minimum memory setting and the maximum memory configuration setting on the fly while the virtual machine is running without requiring a reboot.Also, up until now, if you wanted to take advantage of Linux Integration Services (LIS) for your Hyper-V environment, you had to go to the Microsoft download center, download the correct LIS package for your Linux distribution, and then manually install it on your Hyper-V servers. New for Windows Server 2012 R2 Hyper-V hosts, key Linux vendors (such as RHEL, SUSE, CentOS and Ubuntu) are going to include LIS for Hyper-V in their standard distributions, so there is no manual step involved any longer in order for you to take advantage of the latest LIS capabilities.StorageWith the increase in new applications, the explosion of data and the user s’ expectations for continuous services, storage demands continue to grow. Hence, storage solutions play a critical role in the modern datacenter. Windows Server 2012 R2 offers a wide variety of storage features and capabilities to address the storage challenges faced by your organization. Whether you intend to use cost-effective industry standard hardware for the bulk of your workloads, or Storage Area Networks for the most demanding ones, Windows Server 2012 R2 provides you with a rich set of features that can help you maximize the returns from all of your storage investments.Windows Server 2012 R2 was designed with a strong focus on storage capabilities, from the foundation of the storage stack up, to improvements ranging from provisioning storage to how data is clustered, transferred across the network, and ultimately accessed and managed. With flexible capabilities that can be combined to meet your business needs, Windows Server 2012 R2 storage solutions deliver the efficiency, performance, resiliency, availability, and versatility you need at every level.High-performance storage on industry-standard hardwareWindows Server 2012 R2 provides a rich set of storage features allowing you to take advantage of lower-cost industry-standard hardware rather than purpose-built storage devices, without you having to compromise on performance or availability.For example, Storage Spaces provides sophisticated virtualization enhancements to the storage stack that you can use to pool multiple physical hard disk units together and provide feature-rich, highly resilient, and reliable storage arrays to your workloads. You can use Storage Spaces to create storage pools, which are virtualized administration units that are aggregates of physical disk units. With these storage pools, you can enable storage aggregation, elastic capacity expansion, and delegated administration. You can also create virtual disks with associated attributes that include a desired level of resiliency, thin or fixed provisioning, and automatic or controlled allocation on diverse storage media. Storage tiering, a new feature in Windows Server 2012 R2, is a great example of how storage performance can be dramatically enhanced while using lower-cost industry standard hardware. With storage tiering, low cost, high capacity spinning disks are used to store less frequently used data, while high-speed solid state disks are reserved to store frequently used data. Storage tiering builds on storage virtualization with Storage Spaces by assigning solid state drives (SSD) and hard disk drives (HDD) to the same storage pool and using them as different tiers in the same tiered space. Windows Server 2012 R2 recognizes the tiers and optimizes them by moving often us ed “hot” data to the SSD tier. Windows Server2012 R2 tracks data temperature and moves data at the sub-file level; only “hot” regions of a file (such as VHD or database) need to move to SSDs, the “cold” regions can reside on HDDs.Since Windows Server 2012, with a feature referred to as SMB Direct, the SMB protocol has provided support for Remote Direct Memory Access (RDMA) network adapters, which allows storage performance capabilities that rival Fiber Channel. RDMA network adapters enable this performance capability by operating at full speed with very low latency due to the ability to bypass the kernel and perform write and read operations directly to and from memory. This capability is possible since reliable transport protocols are implemented on the adapter hardware and allow for zero-copy networking with kernel bypass. With this capability, applications, including SMB, can perform data transfers directly from memory, through the adapter, to the network, and then to the memory of the application requesting data from the file share. Continuous application availability and robust recoveryHardware fails, hardware needs to be replaced as it approaches its end of life, and software requires patches and updates - most organizations are used to this cycle. What doesn’t change is the SLA they have with their internal and external customers, as application owners still require uninterrupted access to their resources or services. Windows Server 2012 R2 reduces server downtime and application disruption by letting you store server application data on file shares and obtain a similar level of reliability, availability, manageability, and high performance that would typically be expected from a high-end Storage Area Network (SAN).Introduced in Windows Server 2012, SMB Transparent Failover allows you to transparently move SMB file shares between the file server cluster nodes, without noticeable interruption of service for the SMB client. This is useful for planned events (for example, when you need to perform maintenance on a node) or surprise events (for example, when a hardware failure causes a node to fail). This is achieved regardless of the kind of operation that was underway when the failure occurred.One the main advantages of file storage over block storage is the ease of configuration, paired with the ability to configure folders that can be shared by multiple clients. Windows Server 2012 has taken file-based storage one step further by introducing the SMB Scale-Out feature, which provides the ability to share the same folders from multiple nodes of the same cluster. This is made possible by the use of Cluster Shared Volumes (CSV), which since Windows Server 2012 support file sharing. New in Windows Server 2012 R2, SMB sessions can now also be managed per share (not just per file server), increasing flexibility. And SMB Scale-out now also offers finer-grained load distribution by distributing workloads from a single client across many nodes of a scale-out file server.Another innovation around Windows Server 2012 R2 is the Windows Azure Hyper-V Recovery Manager offering, a related service which offers a robust recovery solution that takes advantage of Hyper-V Replica. For organizations with two or more datacenters looking to protect vital workloads running in their datacenter, Windows Azure Hyper-V Recovery Manager enables them to combine Windows Azure, System Center Virtual Machine Manager, and Hyper-V Replica to deliver planned and cost-effective business continuity of workloads. With Windows Azure Hyper-V Recovery Manager, datacenters can be protected by automating the replication of the virtual machines that compose them at a secondary location. Windows Azure Hyper-V Recovery Manager also provides continuous health monitoring of the primary datacenter, and it helps automate the orderly recovery of services in the event of a site outage at the primary datacenter. Virtual machines are started in an orchestrated fashion to help restore service quickly. This process can also be used for testing recovery without disruption to services, or temporarily transferring services to the secondary location.。
技术白皮书V 6.1所有权声明威速公司拥有此手册内容的全部解释权,本手册中的信息如有变动,恕不另行通知。
未经威速公司的明确书面许可,本手册的任何部分不得以任何形式进行增删、改编、节选、翻译、翻印或仿制。
威速公司假定对本手册中可能存在的任何错误不负责任。
威速公司可能拥有本手册内容的专利、专利申请、商标、版权或其它知识产权。
除了威速公司授权许可协议所提供的明确书面许可,拥有本文档并不赋予您任何有关这些权利、商标、版权或其它知识产权的许可。
所有标记和商标都是其各自持有人的财产。
本软件中使用的GIPS技术和相关商标为Global IP Sound AB公司版权所有,以下为相关版权声明。
Portions Copyright © 1999-2010 Global IP Sound Inc.All rights reserved.Global IP Sound,GIPS,SoundWare,NetEQ,iPCM,iLBC,GIPS V oiceEngine,and associated design marks and logos are trademarks owned or used under license by Global IP Sound AB,and may be registered in the United States and other countries.Patents and Patents Pending,Global IP Sound Inc.Copyright © 1999-2010 V2 Technology, Inc. 保留所有权利。
前 言内容介绍本书介绍了V2 Conference系统的功能特性、实现方案以及所采用的关键技术等。
本书分为5部分:第一部分:产品概述第二部分:功能特性第三部分:服务器架构第四部分:通信协议第五部分:关键技术读者对象本书适合以下人员阅读:可以是刚接触V2 Conference 会议系统及其操作的人,但应对服务器、通信协议和音视频编码等概念有一定了解。
Windows Server 2012 产品概述目录使用Windows Server 2012 对您的IT 进行云优化 (6)汇聚需求与创新 (6)云计算的机遇 (7)迁往针对云优化过的IT (7)通过Windows Server 2012,充分利用原有技能与投资 (8)如果还没准备好迁往云,我该怎么办? (9)准备开始了解Windows Server 2012 (10)超越虚拟化 (11)Windows Server 2012 的优势 (11)完善的虚拟化平台 (12)Hyper-V 可扩展交换机的新功能 (12)使用Hyper-V 虚拟交换机实现多租户安全与隔离 (14)动态灵活的虚拟机安置 (14)改进了虚拟机的实时迁移 (16)改善的服务质量 (18)Hyper-V 的资源计量 (19)改进的扩展性与性能 (20)导入多个虚拟机 (20)Hyper-V 复制 (21)Hyper-V 宿主机扩展与负载扩展支持 (22)Hyper-V 的虚拟光纤通道 (23)Hyper-V 复制卸载 (24)Hyper-V 对动态内存的改进 (25)Hyper-V 支持4-KB 磁盘扇区 (26)Hyper-V over SMB (27)Hyper-V 支持新的虚拟磁盘格式 (28)连接到云服务 (28)与Active Directory Federation Services 实现联合身份验证 (29)跨边界连接 (30)总结 (31)功能强大管理简单 (32)Windows Server 2012 的优势 (32)在每台服务器上 (32)在多服务器环境中 (33)跨越多个站点 (34)在每台服务器上 (34)通过联机错误修复机制改善文件系统可用性 (35)Windows 网卡捆绑 (36)Server Core 与完整安装集成 (37)按需功能 (38)使用智能存储阵列实现快速高效的数据移动 (39)在多服务器环境中 (40)无需停机移动虚拟机存储 (40)可用于服务器应用程序的高性能持续可用文件共享存储 (42)使用Windows Server 2012 for NFS 数据存储部署并运行VMware ESX 虚拟机 (42)通过iSCSI Target 实现无盘网络启动 (43)通过iSCSI Target 获得持续可用的块存储 (44)故障转移群集 (44)群集感知更新 (45)DHCP 服务器故障转移 (46)通过服务器管理器实现多服务器管理与功能部署 (47)Windows Server 2012 中的Windows PowerShell 3.0 (49)跨越多个站点 (51)存储空间 (51)数据副本消除 (52)优化存储空间的使用:支持自动精简配置与Trim (53)Active Directory 域服务 (54)全面的Windows 存储管理 (56)文件服务的统一远程管理 (57)总结 (58)跨越云端的应用体验 (59)Windows Server 2012 的优势 (59)提供在内部与云端进行构建所需的灵活性 (60)提供可扩展且灵活的应用程序平台 (60)提供可扩展有弹性的Web 平台 (60)服务器名标识符 (61)NUMA 感知扩展 (61)IIS CPU 调节 (63)集中化的SSL 证书支持 (63)应用程序初始化 (64)动态IP 限制 (65)FTP 登录尝试限制 (66)开放的Web 平台 (67)WebSocket 协议 (67)IIS 8.0 上的 3.5 与4.5 (68) 4.5 与3.5 应用程序管理 (68)总结 (69)现代化的工作风格 (70)Windows Server 2012 的优势 (70)用任何设备在任何地点访问 (71)随处获得完整的Windows 体验 (71)改进的数据安全性与合规性 (71)Windows Server 2012 优势总结 (72)支持集中化桌面的部署 (72)集中化的管理控制台 (72)简化虚拟机池和个人虚拟机的VDI 部署和补丁安装 (73)Hyper-V over SMB (75)IP 地址管理 (75)RemoteFX for WAN 优化 (76)VDI 环境中支持用户配置文件磁盘 (77)会话桌面的USB 支持 (78)DirectAccess 的改进 (79)DirectAccess 的改进:统一远程访问 (79)分支办公室的支持 (80)BranchCache 的改进 (81)分支办公室直接打印 (83)轻松实现安全与合规性 (83)安全,审计以及合规性 (83)用户设备相关性 (85)DNSSEC (87)加密硬盘卷的BitLocker (88)总结 (89)结论 (90)2012 Microsoft Corporation. 保留所有权利。
(5) (5) (28)与此同时,计算机网络也正面临着日益剧增的安全威胁。
广为网络用户所倍的速度增长,网页被修改、非法进入主针对上表所示的各种网络安全问题,全世界的网络安全厂商都试图发展了各种安全技术来防范这些问题,这些技术包括访问控制技术、识别和鉴别技术、入侵检测技术也存在着局限性。
其最大的局限性就是漏报和误报严重,它的,此人在可信网络上的计算机上手工方式将该磁盘或磁带的文件拷贝TCP连接,连接、不可信端到可信端的专有封值得提出的是,ViGap不但在逻辑上终止了TCP对话,还从物理上断开了内外网络之间的连接,使得内外网络之间在任何时候都不存在直接的物理层和链路层连接通路。
GAP技术的关键技术要点是:要点描述Inject攻脚本等各类应内网管理配置,策略存储均在内网进行,避免外部任何威胁对设备自身的-1000三、ViGap 功能3.1、ViGap 产品定位现有的各项网络安全技术可以在一定程度上解决已知的部分网络安全问题,但是,对于网络应用中每时每刻都在发生和产生的每一种新的网络蠕虫、DoS 攻击、分布式DoS 、缓冲区溢出攻击等各类网络安全问题,已有的各类网络安全技术中,仍然没有一种能彻底预防的安全技术来确保一个企业的信息系统的安全。
即使是使用一些高级的安全技术,例如网络防火墙,加密技术和代理,但是对任何一个单一的安全技术,网络安全问题都得不到很好的解决。
下图示意描述了现今可用的各种网络安全解决方案,在这个示意图中,按照应用的不同,网络本身被分为两个部分,即网络层和应用层。
而在各种网络安全方法中,包括了防范已知网络安全问题和未知网络安全问题的方法,各种网络安全技术都分别解决了相应部分的网络安全问题。
GAP 安全解决方法优势在于它既能阻塞又能预防。
阻塞发生在已经知道的攻击而预防则是对于未知的攻击。
已知防护措施(阻塞)未知防护措施(防护)网络层保护应用层保护FireWallApplicationProxyApplication ScannerViGap在上图的左上部分,是防火墙产品主要防范的网络安全问题,它能够对已知的攻击提供适当的保护,这也就意味着防火墙必须进行调整来鉴别威胁。
Wi-Fi 7 技术白皮书目录1 概述 (1)1.1 简介 (1)1.2 产生背景 (1)1.3 技术优点 (1)2 关键技术介绍 (3)2.1 物理层提升 (3)2.1.1 320MHz带宽 (3)2.1.2 4096-QAM调制 (4)2.1.3 MIMO 16X16 (5)2.2 多链路设备(MLD) (6)2.3 OFDMA增强 (8)2.3.1 Multi-RU (8)2.3.2 Preamble Puncturing (9)2.4 多AP协同 (10)2.4.1 协同空间重用(CSR) (10)2.4.2 联合传输(JXT) (10)2.4.3 协同正交频分多址(C-OFDMA) (11)2.4.4 协同波束赋形(CBF) (11)3 总结 (13)3.1 更高吞吐速率 (13)3.2 更低时延保障 (13)3.3 更强高密能力 (13)4 缩略语 (14)i1 概述1.1 简介当前全球有近200 亿的Wi-Fi 设备正在使用,Wi-Fi 已成为生活、工作中不可或缺的一部分。
在实际应用中,Wi-Fi 协议所传输无线流量,已占到无线总流量的90%。
海量数据快速、安全传输受益于巨量Wi-Fi 设备高效、安全、可靠地工作,而Wi-Fi 设备高效安全工作的灵魂在于802.11 协议的全面支撑。
1.2 产生背景回顾802.11 协议发展历程,初版802.11 协议速率仅为2Mbps。
802.11b 使用新的编码形式,将速率提升到11Mbps。
802.11a 利用新的5GHz 频段,引入OFDM 技术并采用64-QAM 调制将无线速率提升到54Mbps。
802.11g 将802.11a 的技术同步推广到2.4GHz 频段,2.4GHz 频段也能到达54Mbps 的速率。
802.11n 时代,MIMO 作为一项重大技术被引入WLAN 协议,同时采用更宽的40MHz 带宽,将WLAN 速率提升到了600Mbps。
作者:中国移动研究院姚惠娟、耿亮、陆璐、段晓东华为技术有限公司杨小敏、庄冠华、顾叔衡ONTENTS目录1.背景与需求 (01)1.1数字化转型需要泛在的连接和算力 (01)1.2 边缘计算助力算力从中心走向边缘 (01)1.3 功能原子化需要网络更加灵活的调度 (02)1.4 网络需要感知、互联和协同泛在的算力和服务 (03)2. 算力感知网络的体系概念与架构 (04)2.1 算力感知网络的概念 (04)2.2 算力感知网络的体系架构 (04)2.3 算力感知网络的意义与影响 (06)3. 算力感知网络的关键技术 (07)3.1 CFN基本架构 (07)3.2 CFN路由协议 (08)4. 算力感知网络的部署与应用场景 (11)4.1 算力感知网络的部署场景 (11)4.2 算力感知网络的典型应用场景 (11)5. 算力感知网络的关键技术验证 (14)5.1 集成测试 (14)5.2 功能测试 (14)5.3 性能测试 (15)6. 缩略语 (16)7.参考文献 (19)01背景与需求算力感知网络技术白皮书背景与需求1.1 数字化转型需要泛在的连接和算力全球已经掀起行业数字化转型的浪潮,数字化是基础、网络化是支撑、智能化是目标。
智能化社会的一个典型特征即物理世界和数字世界的深度融合,未来数字世界通过IoT 、AR 等技术提供的传感器、执行器,与真实世界产生互动。
网络作为物理世界和数字世界连接的桥梁实现数据流动。
网络连接的一侧是IoT 的传感器和执行器的IO ,作为物理世界和数字世界的接口产生海量数据,对网络提出更高带宽、更低时延、更强安全的需求;另一侧是人工智能运算所需要的数据、算力、算法,实现数据价值化。
根据思科云指数[1]预测, 截至2021年,接入网络的终端设备将大于500亿,每年产生数据达847ZB ,其中超过50%的数据需要在网络边缘侧分析、处理与存储。
海量数据的传输、分析和存储对传统网络和云计算提出了巨大挑战,使云计算和网络面临“传不畅、算不动、存不下”的局面,驱动计算从云端下移到接近数据源的边缘侧,形成网络中分散的算力资源。
WIDS 技术白皮书目录1.主要技术介绍 (2)2.关键功能特性介绍 (2)2.1802.11报文泛洪攻击检测 (2)2.2D O S攻击防御机制 (2)2.3帧过滤(F RAME F ILTERING) (3)2.4用户隔离 (3)2.5ARP抑制 (3)2.6对非法AP进行反制 (3)3.AP入网安全检测及CLIENT安全策略 (3)4.典型应用 (6)4.1WIDS应用 (6)4.2用户安全隔离部署 (7)【摘要】WLAN网络部署在采用相应智能部署技术后,网络整体安装便捷、使用灵活、经济节约和易于扩展等有线网络无法比拟的优点,因此得到越来越广泛的使用;但由于WLAN信道开放的特点,使得无线网络很容易受到各种网络威胁的影响,如未经授权的AP 用户、Ad-hoc 网络、泛洪攻击等等。
WIDS(Wireless Intrusion Detection System)用于对有恶意的用户攻击和入侵无线网络的行为进行早期检测,在不损害无线网络性能的前提下,帮助网络运维人员主动发现网络中存在的安全隐患,在第一时间对无线攻击者进行主动防御和预警,从而更好的保证无线网络环境的安全。
【关键词】无线交换机、无线接入点、防攻击检测、安全隔离、安全策略、非法接入【缩略语】1. 主要技术介绍WIDS用于对有恶意的用户攻击和入侵无线网络的行为进行早期检测,首先由AP实时监测周边的射频环境,包括邻居Client和AP的信息,并将监测到的信息周期性上报给WNC,WNC分析射频扫描报告中的邻居信息,根据网络管理员制定的非法设备检测规则,对整个WLAN 网络中的异常设备进行监视。
在无线网络中,AP的RF Scan模式可以配置两种模式:Active和Sentry模式:1、处于Active模式的Radio正常处理用户流量,只是在设定的间隔时间内周期性的扫描监测信息,但它只能检测自己的工作频段,例如2.4G或5G。
2、处于Sentry模式的Radio不处理用户流量,专职于射频扫描工作,且同时监测2.4G和5G频段内的所有信道,因此它能够更加全面、准确、迅速的得到射频信息。
所以有些威胁只能是由Sentry Mode上报的射频扫描报告才能检测出来。
WNC根据AP上报的射频扫描信息与网络管理员事先配置好的网络非法设备检测规则的比对结果来判断射频扫描到的网络设备是否为Rogue,若设备被判定为Rogue,则将该设备添加到对应的Rogue列表并采取一定的防护和报警措施。
2. 关键功能特性介绍为了维护无线网络环境的安全性,设备主要支持以下几种大类的检测和防护措施。
2.1 802.11报文泛洪攻击检测泛洪攻击(Flooding 攻击)是指WLAN 设备会在短时间内接收到大量的同种类型的报文。
此时WLAN设备会被泛洪的攻击报文淹没而无法处理真正的无线终端的报文。
WIDS 攻击检测通过持续监听每台设备的流量大小来预防这种泛洪攻击。
当流量超出可容忍的上限时,该设备将被认定要在网络内泛洪从而被锁定,此时如果使能了动态黑名单,检查到的攻击设备将被加入动态黑名单。
WIDS 支持下列报文的泛洪攻击检测:认证请求/解除认证请求(Authentication / De-authentication);探查请求(Probe request)。
2.2 DoS攻击防御机制DoS(Denial of Service),拒绝服务。
DoS攻击是网络上一种简单但很有效的破坏性攻击手段,服务器会由于不停地处理攻击者的数据包,从而正常用户发送的数据包会被丢弃,得不到处理,从而造成了服务器的拒绝服务,更严重的会导致服务器敏感数据泄漏。
主要攻击手段有Ping of Death、SYN Flood等。
DoS攻击防御机制是指利用协议检查来防范DoS攻击的安全应用,协议检查允许用户基于给定条件丢弃满足条件的报文。
2.3 帧过滤(Frame Filtering)帧过滤用于在AP上过滤帧,这些被过滤掉的帧是不需要处理的,帧过滤维护三种类型的列表。
Whitelist(白名单列表):该列表包含终端设备的MAC 地址。
处于该列表中的帧可以做进一步的处理,该列表由用户配置。
Static Blacklist(静态黑名单列表):该列表包含将被丢弃的帧的终端设备的MAC 的地址,该列表由用户配置。
Dynamic Blacklist(动态黑名单列表):该列表包含将被丢弃的帧的终端设备的MAC 的地址。
当检测到某个终端设备发送泛洪报文从而引起网络拥塞时,通过WIDS 动态添加黑名单列表。
2.4 用户隔离可运营的WLAN网络中,用户之间是互不信任的,所以必须采用用户隔离技术防止用户之间的互相攻击或窃听。
同时,如果用户利用局域网互相访问和传递数据,也会占用网络资源,致使网络拥塞,因此在某些场合也必须采用用户隔离禁止用户间互相访问。
具体策略如下:(1)AP内部采用MAC互访控制原理隔离用户。
确保同一AP下的用户不能二层相通,只能与上行口相通。
(2)AP之间采用MAC地址访问控制或组网汇聚设备二层隔离技术如VLAN/PVLAN/PVC进行隔离,保证不同AP下的用户不能直接相通。
(3)AC通过ACL控制用户的三层互控访问。
2.5 ARP抑制AP中的ARP抑制功能是利用ARP Snooping和DHCP/BOOTP Snooping功能,记录本地所有Authenticated Clients的IP和Mac映射表,通过ARP广播变单播或ARP代理的方式,减少空口的ARP 广播报文,以节省Client的电力。
2.6 对非法AP进行反制在检测到Rogue AP后,如果开启了Rogue AP反制功能,WNC 将攻击列表发送给Managed AP,由Managed AP对Rogue 设备采取措施。
启动反制措施后,Sentry Mode的Radio假冒Client发送解认证消息给Rogue AP,而Active Mode的Radio会发送解认证消息给关联到Rogue AP的Client,以解除Rogue AP和Client的连接。
3. AP入网安全检测及Client安全策略WIDS为用户的无线网络提供安全保障的同时也具有检测规则配置灵活、方便的特点。
我们为网络中的AP设备提供了11种安全检测策略,为接入网络的client提供了7种安全检测策略,用户可以根据自己的需要和网络的实际情况方便、快捷地为无线网络配置安全检测策略。
提供的安全检测策略如下:AP的安全检测策略:1、网管设置的非法AP(Administrator configured rogue AP):根据Neighor AP的Mac地址查询RF 查询本地或Radius服务器的Valid-AP数据库,如果数据库中设置为Rogue,则AP为Rogue AP。
2、非法AP假冒合法的SSID (Managed SSID from an unknown AP):根据SSID查询系统中的网络配置得到SSID的合法性,如果AP是非Managed,而SSID是Managed,则认定为威胁。
3、Beacon帧中没有Vendor字段(Managed SSID received from a fake managed AP):如果射频扫描报告中Neighbor AP信息字段的AP MAC为00:00:00,则认定为威胁4、Beacon帧中没有SSID字段(Beacon Received from a Fake AP without an SSID):解析射频扫描报告中的邻居AP信息字段,如果SSID字段为空,则检测为威胁。
5、在错误信道接收到managed AP的Beacon帧(Beacon Received From a Fake managed AP on an invalid channel):如果在错误信道接收到managed AP的Beacon帧,检测为威胁。
6、AP使用了错误的安全认证方式(Managed SSID detected with incorrect security configuration):如果AP的beacon帧中携带的安全认证方式和WNC Controller中记录的AP配置不一致,检测为威胁。
7、Managed AP发送无效的SSID (Invalid SSID Received from a managed AP):根据Neighor AP 的Mac地址查询AP状态表得到AP状态,根据SSID查询系统中的网络配置得到SSID的合法性,如果AP是Managed,而SSID非是Managed,则认定为威胁。
8、AP工作在非法信道(AP is operating on an illegal channel):据国家码的设置,AP有其合法的工作信道范围,如果扫描到的工作信道不在这个范围内,则检测为威胁。
9、合法的胖AP配置错误(Known Standalone AP with unexpected configuration):如果邻居AP扫描的配置和WNC Controller上保存的配置不一致,检测为威胁。
10、AP工作在WDS模式(AP is Operating as a WDS Device):如果状态处于Managed或Unkown 的AP工作在WDS模式,检测为威胁。
11、Unmanaged AP接入有线网络(Unmanaged AP detected on wired network):如果AP的状态是Unkonwn且被检测到连接在有线网络上,则检测为威胁。
上面给出了用户可以在WNC 上配置的11种AP安全检测策略,如果用户在控制器上开启了这些安全检测策略的开关,若网络中存在Rouge AP,则WNC 根据射频扫描报告和AP的安全检测策略将AP判定为Rouge,并记录到WIDS安全日志中,同时发送Trap消息通知网络管理员,网络中存在Rouge AP;如果在WNC上开启了AP的反制功能,则会对网络中Rouge AP进行反制,但以下三种情况的Rouge AP除外:AP的Mac地址为Managed AP Mac(不管是假冒的还是实际的)、AP工作在ad-hoc模式和AP工作在非法信道上。
Client的安全检测策略:1、OUI不合法(Not Present in OUI Database Test):如果Client的Mac地址OUI字段在OUI表中没有符合项的话,检测为威胁。
2、Known Client Database判定非法Client(Not Present in Known Client Database Test):Known Client Database中有对应客户端条目,且设置为通过(grant),则客户合法;Known Client Database中有对应客户端条目,且设置为拒绝(denied),则客户不合法;Known Client Database中有对应客户端条目,且设置为通用(global action),则需要看系统配置:如果配置成执行白名单,则合法;如果配置成执行黑名单,则不合法;Known Client Database中没有对应客户端条目,则需要看系统配置:如果配置成执行白名单,则不合法;如果配置成执行黑名单,则合法;若Client不合法,检测为威胁。