NO. 27 June 201 2 • Free • www.networkset.net NetWork Set First Arabic Magazine For Networks SAN Jl oLfiiji fTxJLn oJ! y&.l^U ^I^J Storage Area Network How Computer Virus Work GjIJLjjJI LM-oIj Jq I a O-oqjuqj-fuLo v>6 WCCP Jl J<^qJq>j NetworkSet j-di^-o 0 q I ll d i i oi JLao Jq-^ J-ld CJj^J j-oqU 0' 1 . ' ?.! ojjilc fcw S!i IBBI NetworkSet www.networkset.net 3uj 5> HJl aiauo NetworkSet SLL^o Q I o II 6 j ml O 15? j II (j-QjI.^Q ( _ - C ,j_lAjl jJLa, -Lq^J -|C - ■ : ^^lo II ^lj ^^fl ^ Lo»n Til (JjlcLqjjjI (jLoic : SLIaqU t _ T J^Lal j^iia d K q II j_LaJ ^49.5 (jx. j 1 9*i ^ l_ljL^JI jJaJ 3l£^3 (jx. j 1 9'i ojr) At j q 1 1 #lj^/l ^ ' p ^ (j-o (j jl J-aill 5I (^LlS'i/l j5^_i "il 5 S-j^SiJI SKIpll (jjti^ I ^L^ia-oJI £u»a vJJJ js^nU v_nJJ r»-vQll 2 cLuoAikll CiUjLOoJI jx lj (jjo J^ii ^ j i ->ijNI oj^JI (jL^jjj i oxa '■ (JL J s ill j ( _ t jJ I j^joVJ a^I _LosJLi Sua La II ^^-^^ ■***' II ."iM .1 n 0 II jaIslH 'il-vf /il J^jLj j_o j 1 1 ■ i -lsLlo! (j >« c i 1 1 II i as ( _ y jLl "■! 'il -^f /i*>fl (jjo £3-i-ll Ia^J (_>ajJLo SJuJa^ 5I ^LoX. (JLS^JI I aj2> ^jii J^L^I "^■■'^ (jjo (jl^j-JI L-iLLaJ lIiLLJI a^I (_J| l_jLj2> jJI (jjo ■ «j ■ ^ I LiU^lj SlsloL^JI ^ '■ (j-o L^jJI '*** 1 1^9 "'*^^l ^" II ^o-«kl <_ t j2>Lo9 l _Lj.ii (jjo L^_i lIijjjo 1 _ 7 j-ll l-jjIaUI (jla&jg "iN ■! K 0 II oi^ j'j-"- 1 ' u' - ^ 9 ,' ' "iM ■! n 0 II oAlli f JMA (jjjjj i -ua i o II (jL£ 5J ^ (j^-ojo jao jj-^I ^ ' ■^■^ II "iM ■! n 0 II ( j_ 0 jiSI ^jji kdJ LgjaAol 1 _ 7 i-N dLajuaJ II ,M Ij.^>-n ^^aj.i lIijIj^ l^LlLc jjoVJ J-g-uJ LplS lIi^LjLEjO (_JI cilia J Lpl^j JLoxVJ o Aj2i J'?q I l><&La. O-^ {°-l .9-1 L7-^ 5' ^ ^jia ^JJaJ ,ojIx ^>La-J l _ 7 J-N Siluj^fl d-LC^jg "iM ■! n 0 II 3jj_i lila-LaJ SlLjLcLqJLq (^j^I SLuaa lIi^LjLEjo liuLLog (.j-Lc- f hj'." k ~ S-Loji^ (jLaJ J-»S-j (oLlEJI ■'1*1 "■'■•-'I I ' ^ o^ll^JI JliL^jjiJI I i 1 i V7 , ,il ^J_q I q „in 'i SIjULoJI *l>^| SJLjjJoj ^31°"" " AjjLLII a ^ 1 ■ '< II LqI.asu Lqj..o LLa jg j j ; ^^LlIIj (JLuij I jLo ^qIsjV/ ,_|_t2i L=k. JgVJ (jLolua Lil^JbLoj (JjaJI (j^La ■'■■ > >fl (3' Lia^^J (J-o5zJI lIi^LjLEjo ijr L SLoia-i-oJIj ^J.'. ^ ,' '**'"" * oj^ii ,_ r lc- ^ ■ jl ^ '■ ^i*^ ^ (_>^J ,Lg^jJa 1 -laj ( _ 3 _jLl P 3 1 Ljj^fl ^i^Lo^ iUta ; j IjLo (jx. LoLoj p 1 0 ; j ajj.j (JjLEqJI :>^l ^o^L^j^ ■ ' I ■ ■ j ^ I (^1 o " 1 ■ (jLix-j-i Lqjo >i^l ^l"*"' 1 (jx. iliAaJu ■ c l <*-! o ■■' ' (3l->-C'>J (jl " ' H (3' ' ' ^ ^ a^J ^IJaJ sLlcpjLSI 3_j^kl 03AJ SllqIsJI jjjo^fl (JIaj " t£y}£ sU-ujjJ LoJ i^Lq^o (^ao ^ Jl S t * 2Lj^AoJI ( _ r lc jjo^fl Ia<& a -^jj a2^ oj^jLlo j 1 eg L*> ■ ■ ■ ■ ■ ^Lajjiaj (JjLEqJI (j' l";"" -1 tli^j I I ^ ■ ■ ' " *■ SJjLSqJI ■ l^JI u±o^fl '>£^ i^i.xai ^^Ig 2lULlII 2l^_li^1JI Lol ^^■^^ ■'**' II ^oJLc cCIoIslj^ cLlLsloLo (jx. ^1" j L^iAaJu . 'If-I ■ 3jIx (JjLoqJI a II ( _ r H-Lj iHiAa ■ jAl ^1 ,c^Ja^o (jjo (J KV!" n ■< ^lo*i^ jjo^/I ^^^-lx 'j (jl ^LlLc , ' 7 ^) 1 J o-^-l "'1^ ; II jJqajI ^ (j) (J_i , I j i££ "' ' ^ j (jLSLja Ij.j2ig , l(j 1 " ' j ' ^ II ajjJ < _ ? JlJ I Jal SiJIg j^jo^Lj "> ' ^ lIuI^ ^pjutifl (jx ojLx ■ c l I .c*J_LJg (jr^H Li"'^ " '' >°^l (J-^'S oj-i^LaJI (LILLujI Ialj (jl ^JjLSqJI (jjo LqaJx ^ SLLiLoa *^jjjL IajI !^.>>o 1 ^< I jl j^J a j n < -■..i J jjj^j 1 0 < n c^- 5 - 0 ^j>o < _ 7 -£J I l-ijIaUI Lol ( _ r Lc SLLLooJI (jl o^ll^JI Sua AiaJI j^J ^LUI jO^j-II ^r-o cr 5 - 0 ^ ^ .'^ " " *'>^! '**' j * l°3 j-l^-o Ia^ 3L^jji "■ I .^il (j| L^^iij ^jAi^ LiLi^l ^<5-Lq5 ^.iijg (_^aJ 05^1 (jl (Jj/ajl I '■! ' ^ I LiLa ."iN iia^ll ^ ^ I ■ ■ ■ I ^ I ( _ r Lc _)jl lA<&g i-ojLgJI dUaAtaJjj 2lLiLLoJI J-^l j-o ^aa ■'■*' ^LUI ^o^^lJI J ■ ^ '■ I Cj\ Sj II (JL^-o ^ii (jjjjAqSi ^ I q r j-o ^xildl (_>Ia5Lj jjLlo SllujjjJI (^j-lsJ lIiJIjLo^ Lua^ ^1 ' ■ I >s>$ aq LgAxa ■"■ Lilg Sujol^j^/I SlsULj SLL1L&0JL0 ojjIjLijo Liajl "■ SajLlII J^a^l (jiUaj^j J i ISqI I ^ !< I jOAuajl ^ ilsLa ^Ul j.£J ^oM^JLig sLsUL Ia^ LLuu ^ .•■ 1 ^jo f I SaoLlu jjo ^oxjJI ^^Jx eGjjl ^ jJI iiijA^ LLLlj Lgjjp jbj CCNA J q a j*y S^jjiJI ^ IT Manager Jl (jL^ aEIo ,-iKiAii ^oJLslI cn^i aHLjI (j^J 3JLjL£qJI ^ii ' ^ ^ 1 duoLsdl L^oAALoflg ■ 11^ dl±i 5X11 ^ i ; a °j ^oJ cLJajX i-iLa aoLq jJaLLJI ,_Jxg (JLJI |_5-I~c- v 1 1 I aj2i J.j2iLi.jl ( _ r LLaa jJI j.^J ( _^LljL^j3I >fl ^q^jJx ^ j ■ (jjo Lil LiLl^I .**!»<_) LiijAl i_ r ^j-jl (jl lIxjj^^J ^fl I q ! Sajc) I ^ qJ SLu jJg 5 j y< L^uJgjJg oj.iiit i^jLaJULa I j '"' ^ j .^»" ^ I Lil ajLuL^JI L^SLncpac) ^* QjJagJI Lo jx _JI^jjj ^oac 5-1215 crls^' ( _^XLjLHjq _j.ii _J ■'*'■ 6 1 ^ i Lsta ^l"' 5^Lo ^o^-l J^-o' "3 "' (_JLqjo aq l^jg^j (jl ^ ' t *■ 1 1 _ j " Lujjj n I "'j (JL^pJI Iaj2i 1 _ T ii I j 1 ; j^l ^oJ LgjAa UI5 S pjJagJI (jjisij Lo LqjIj 3 1 ■ ■■■*>fl 0 J5J ^ '■' n \j i p<"Aj r \ _j_o I 1 j . . 1 i iN (j|^ ^jLaUl O Aj2i (jjO Igjj AV..il Ujqju - y_>o j?ill 0-oJl QjNetworkSet Issue 27 - June/ 2012 NetWbricSet First Arabic Magazine For Networks SuJLpaJI L^^Ljilill ^oJLc ^ SuLe^JI - 9 ♦ ♦ ♦ '■■■l^ II L—iLuigjj.£i (J-o-c- ( _ r Lc lajslI - 16 access-list ^l.^TmL j^AJ) Lo^ eigrp network prefix-list ^nhi - 21 (_>iijJ>jl5 tiJjLg^ o-o JJsj ^ - 26 du^L^MII >uLsuJJ lUl^JI _j<... : ... ^Liaj - 28 SAN Jl ^jK^ii ^dbi SuIaj - 34 NetworkSet ^4^0 WCCP Jl J3%j 5> j - 41 ••■I rwj I o 0 II SllLEj (JL^jo (J^-^j (Jj-5 lILj jJ j Ag"" ■ -n ■ pLuiil 5 j • ' 1 & - 44 vju jif.nJI v_nJ| o^q^II 4 Q NetworkSet Issue 27 - June/ 2012 LiLuJI aAKUI I illg-LQ ^^-Q oLclj^JI : BitLocker _ll <3jjJo ^ SuLa^J 33x0 s (jl '-^ j TPM _ll ojl^lual^ Soj-I^JI o^^^l ^ Ijl3 . BitLocker _ll jjo J&u 6l t>o 1.2 j ■ ; o ^ 1 1 jLgja, t o Jj^I^JLo ^it 1.2 ojlj-ua^/l l2ijL£ Ijl BitLocker _ll 33^0 ij BIOS _ll (jLS . (Booting) ^yny\ J±z : BitLocker . ^ j^ji J&u BitLocker _ll W2K8 ■•>■"" ^Uiij lIiLLuJI (_j^aljJi^f Luajjg pi la i II <_>alj..Q^f jjlo j ^jlIojuiij BitLocker _ll Windows Vista (jr o) WindOWS j-<»-. pUaiJI oal>Si Jaii ^ FVEK (Full ^t--j (Cryptographic Key) j^-->-" ^liiLeJl 11^3 . ^ ^"■■■j (Volume Encryption Key ulj^Qg-ujgjAjLo Data Security Solutions From Microsoft aSylh J3 I -s l<"«..« d K Q II (jjo JA&JI lj.Hi < _ r Lc l2ijL£ *'3-"J lIiLLuJI (jjol lIlo^jjj^j^jLo <_yajjoJI (_ 7 -lx 0.13^3-0 lUiLclLo^ till J La a 3I (J-^ oojJLII (jl (J3-0I (jl j_jjl LL&3 jAl jLgja, ^1 L&jaI ^xj 3I i_lLoJI iajo (jjof J^la. Lt j1j (jl (J^l (jjo ^ ooi^fi (Ja (JS3 3 WindOWS 7 S^juo ^LLl JLuJI J^;--< L? Jx . (J^l (jjo ^ ooi^-ifi BitLocker _IL Lr oia j W2K8 ( _ jr lx 3I cLiiij^jj ^qJ . _i I (_yaj.ia (JAI^ JjLjLljJI 3-iLq^ (jj3 j3^Lo i_lLvQ (_yaj.& (jj3 cLC-Miil ^C)J j "3 1 1 t < jLj-^ jAf (Ja ilJLui 3) EFS u qiiij (Encrypting File 3A3 (System 3iijjJa p J-OJ ,Jja. j 1 1 fl nl'l'J SJqJaUJ L? Jx tliLLuJI 3 S A liaj ^yJx^/l " *s I* < 1 1 o II . j-jg m II g^JI Iaa -: PIN _ll ^.liiuo £jo TPM _ll • l_£ J-uJ (JLLjL (O^-OJ |Q jAJLLLLQg TPM II L-jJ loju (J Lg ^olj SjjO P/W Number 02601 oh ^ll+J' 3uu^ For Example jt ^ JI ^ ^ (J^jjjJI (jja ciLjl L^ajlg sLLjI USB II jLgj^ (jx Lua^x (^>>-u ^o-iij (JIAjI (_^jJI ^ua^JI (j i < 6 *■ d-i$±£.g . J 1 9 iVi7 II d 1 1 q a . (jijof (J..2I L^aj'j) ^^Jx^fl -Ll^^JI ^.ua^JI Iail^ : JaJii USB II jLgj^ • < _ 7 lJI Jlllj-JT) I I II £jO cLol JjLXujI j *S q q H (j-Q (^jJI j^a^JI Ijjfc TPM _ll Sisilaa ^^Jx (jTj"^"' ^ cLtlc i i •% i j-jg j 1 p's II J 1 9 i'I'i "i cLlLoX. #LLjI , \ Vi i . i q 1 1 <_ r lx ^aJI USB _ll > JL^jLj ^opn i (jl (jjs cLjl culj-Lcua^ . jig -\ II ^li (J^l (j-Q ^LlLqJI (jTjj"^ " L7^' ! °^ (J-^ ^ qIjAXujI j *s q q II cuqjx iiLiiij J^x- gjLlolmj BitLocker _ll Jani • LgJLpjia (jja^ (JjsL£JL (_>aj^JI (JAL (jlioL^ •**■! SLllI I Page File , Hibernation file , Registry , and _ll ^LoLqJIoIa (jl (jjo ^i"^" "■:< I jl . Temporary files ^l7n 0 II I Aii^ (_yaj^JLj cL^aLiJI fj t-'J j-^l ^LlLqj j i n "■ ^q-Lj (VMK (Volume Master Key Liajl ^cuj VMK _ll ^liiuo 5 . TPM _ll ^jji^ (j-C O J ^ l flnl I jJa (jx ^1 3 J3-^3jo lIuL^ I jl 2u1qx sLLjI cdlA^I ^oj USB JAIj (jj-^-o <^^-°! ^IIojo .,cMi)fl -: BitLocker _1L SlELsllJI J^Liuo l^^ij W2K8 i Vista t Win7 J; AA " (daj ■ -LuJja (_ r lx (_>aj^JI JlilxUanfl jjla L±Log J t ' " .' II (jl '"■■'*■ Ia^-j^ t oj^-^^jjJI lIiLjLllJI ■% -\ 5lJLo£. yc7 11 cr° BitLocker Luajl ljj&^ . ^JLslqJI (jja (j'-^° j Caching t Hard Disk _ll l^Lo J^l^t 3asj >jLLi _ll (jx ^l Li>stiJ . Speed t Processor Grade JajljJl I igJ aa^UI (j^^ oIiAIj SllLi^^ BitLocker http://technet.microsoft.com/en-us/library/ 97b4d762cf31-4957-b031-8ae6-c61f2a12 -: BitLocker _U aai.t.^^n ^ 5 jLii^l BitLocker _ll SuIEj (3jjJa £Jjl ^ox JJ Authentication ^ -: Ja£i TPM _ll ^jo BitLocker _ll • _U I ^oUk ^ BitLocker _ll ^^Jl I1a VMK _ll ^liiuo iili 3LJLa£. JaI (jjo laii TPM l_J Laj ^ cLjI ^Ja^JI ojib lIiI^lqjo . ^_y.l i p'sl I |Q^?I dL^^UL J)i^-i7l n vju jrt-.nJI v_nJ| o^q^II 6 QjNetworkSet Issue 27 - June/ 2012 (jl (jiewJI * 5^ (GPO (Group Policy Object _ll b OjiiJI j ^ 0 LJ LjOAIX. .U»nn lIiLjLjJI ( _ jr Q^_J (jl (jjLpjQ EFS . . NTFS c>a>5 c ^Jx. eGl t °3 ; II SLqJqj I • . EFS U (j-L^LLa n II (jjua jAXui^JI ( _ r Lc . 1^ 1"^ j (_ 7 -lII 3 jl II (jTj" ^iuj^Z-ii • «LoLla_j J-)0""'" (jl ^1" a j ^HS* (Jjfc (JLLa-ll (J^ ; ■■' . EFS _ll ^ Smart Card 3u£j ,'\"! I , 1 1 1 1 LLq < j EFS II n In 'i • . (GPO (Group Policy Object _ll ( ~i^...i. ^1 j "3 ■ ; o ^ 1 1 3.£jjjj ^o-J 3J3 (_j^ o^lj-HJI (j-o o-J X9 BitLocker _ll . .i-^ii cya^l EFS _ll (Jaa ij^i 5llL£j (_^l I <*- d *■ j a t 1 1 lUiLjLljJI ^ ■ I q ^ J_i jJi ■ " 1 ' < Ijl • ^ *' j a T 1 1 lIiLjLljJI ( _ 7 -Lc- .t^tnn . i I 1^ ^1 ..i n^l ■ -ia j i (C) (JLIqJI (J^lluj (_ 7 iC' loliaUl (_>aljJI (JAIj Windows ^ic BitLocker _ll ^' ^Llc ^ (^iJ^ Server 2008 , 2008 R2 , Windows 7 . Windows Vista "■•>■"< j (j\ BitLocker _ll ^ -■;< ijl • l-JLLljJ-J "■ ' ^ (_ 7 lJI (J^jO ioUo-LI) lIiLLxj (_ 7 lC- ulll^JLgl II JlAc oaj i Malware >fijua ^ob jl^aJI 5uLal ^3 . TPM _ll dJllai c£9ia_j jL^A jol^ajLujI . ,Unn USB _ll ^=>3 jLlLkl gJLlaj Jjjj (^jjJa (jx. BitLocker Jl 3jL^ iiiiS Ijl • ■oIjA-LuI "1^ I c. -ia j 3jlj|.Aj^oJ| (JjsI^x. jja (jilolx. (jieuo iiJJj a&j^ TPM _ll 5uila£ ^4^- iSD~^ J Ja.1 t>o (PIN) (^Jl ^ jJI 5 I USB Hp^" -." ^1 " . TPM _ll ^1 SldL^^Ij SllSLi^lJI : EFS _II JoJaiOJI -■ IoIqI I > ■ ""■"I SjlLoj (jx- S,Li£ EFS _ll jLoLJI LojJx. NTFS —II ^oLLa-Lj IjIQC) ^Onli (_ r lx- A^l^'l q II ( _ r lx (J^AjJI J^Lk_j ^loLjjj j)l |Q,^7iiiq I /3\ c EFS IL j a 6 ■"■ " ^oj i "I a J^Li_l l_LjLilLj J 19 nl ■ 'I Lu (jl lia *■ Ijl^ j i A 7 1 1 , g l A I ^ 1 " A r> J-Lfl mi'i II lilfl^ j I fl i'i'i *i (j^J-C- (J-0-S!-J . ^Q.^'lnlQ II (jjO (JAAJ (j^J (jjO c>-4-l (j^JOAaJLLLLeJI Lo-iic. ^li do^^La ^q^jaJ (j i i i I Ijl jiLni q II "I -^1 1 (J^AjJI Read jLl^^La ^o^g-ijJ (jL^ (jl^ (_t^ j " " 1 Q ■ "I " . JlLJI {J l£. Permissions Symmetric and _ll ^ljUlo ^Lc EFS Public Key _ll J^.1 (jjog . Public Keys EFS _ll Cryptography Certificates LijbL^iiJl ^ . ^jljLLqJI (jja I Jajig o 1a Workgroup _ll *•■!<; ■*>< ^ I^JjAj ^ i 'il A 0 II ■**■! 'I j II .i (j^-l3 • jU^. vju jrt-.nJI v_nJ| o^q^II 7 ® NetworkSet 5 1 iVi II JLio o-o >^ Magazine NetworkSet a r\ r\ \ \ Q qjjj_c d l 7>q Jql i"il i iVi II Jlrio o-D OoripJ ^j_c £qj-i±Lo Jql cUlQjJI q d i o I o II ^IqoJI Wiki.NetworkSet 6 j_d d_jjj_c o_cq_Luq_o Jql ■I 5 ; ill II Ji 70 v_>_d a^n^'o q QjqjpAJIq d II LOlJi ; ijaLb fooiLO YoufiTfffS Ljqjj qj o_Lc aJqiLoJI olio Q NetworkSet Issue 27 - June/ 2012 ■ Senior System Engineer lllllllllllllllllll djJLjpLiJI LagJgi^jJI jOlIL o VMware 5S yh jic Switch's ^I^Jl lio ^3 Lliljiij^iii II ( _ 7 _Lc J-oXj Switch's i"i ^^1 lIjLSjmi II <_kxS_i (^^lc- O-C- l-Q^jlLILj ^i^^qJI lia J_g^T nil ,jl (_£9-il g^LLLLui S^jji J'' O (LlLuLUI ^jliAiJI I j^g-lg La T II (JLajQ (jrii oj;^ 3^9 JLa oJI l.'\ff> ^^ii 1 _ y iijT^ o ^1 ^1 T"\"i Lgj^ d n ILsU j j;^ i nj'^nj 3 ■ I <* ^ ■ i ^ j ■ i »i<*-Vi (j^^ ■ (J_lsJLIij ^LLbu 5jl ■ <*- 05^-1 VMware ESXi jiijjiii I Lj i.nl^ II ^jnjn^. II Jjg^£JLi din ijj (jl ,t j In ? 1 1 1 '1 cLLkta ^j-OQ VM Jl JJlq J-qJU l^^g . Appliance Jgjjjn II liia ^jLiJI ^oJLsJL JL^l3^I 5 ^ogu.i JL=iJMJ Filters J_o*j vju jrt-.nJI v_nJJ o^q^II 9 Issue 27 - June/ 2012 VMware vShield App DMZ VM VM VM VM VM VM VMware vShieid App PCI DSS VM VM j VM VM |VM VM VM VM VMware vShield App HIPAA VM VM VM VM VM VM VM VM VM VMware vSphere Firewall with VMware Jl A Firewall ^llpj Cy^9 ^I'y »*■ II c5jLj j'- 1 ^ p '■ IjLoJ jA.^1 (jx. (Jjj-i Lojfcl.i^.1 oiixJg j^^qJI "2""^ II Firewall J-o^j Sllq^^JI ^Ij "j;" 1 ILj <_y3LLJI Firewall ■ . ■ 1 1 JMA (jjo jj^.1^ jiijjiii (_j-Lc J-o^J VM >iSI ^9-^5 - 1 VM Jl jAb cugj^oJI LjIaJI^ lIiIojiIoT ILi SuKIaJI j-j-i^^ll jjo ^ TuigJI Jli^-Til - 2 ^ I f- (j5^J n J-S (jjl Jjlnjil^Tll (_^-i^.l (jrJ-C- J u "J"^ >°jj"' (J-S (^njn^ II ^oJLsJI ^^ii ^LlLq bj^n - 1 1 1 n i ^ I C ."ingJI 1 1 n 'i (J-qJLj VM oj^a (_j.ii Jliljii^jjjj o±c J^-^J SjJLlAIJI h -^gJt) i ^7 II ^oJLc i^^i (J 1^-1 n i o jiijjui (^^oifcgJI (_jiij^jjjJI (jja (JAIj (J^mi i g i j i Lo-lo (Ji^i T"i JLi Ij-Qj j ii 1 1 1 l,'\ffi (_L^ ,jl (^^ii SKnia jglnl I i frig ^iun^i II jiijjui II ports Jl 'ig g i j i J i^ n 'i (jl jjjJ o^-jg jqLslJI sta^l ^^JLc i ilni IL ^jL ,jl <_>io^ liag ESX Jl jiijjui II ^jlc jg^goll . rUSti g i i i Jl ,n*iM I a ^ gT n 0 II JjLo g i j i Lo^ii (jg^j i-J9 j T i 1 1 1 LjIjJI (3_u Filter J^c 13^ Siuij ^1 cLjLq^JI ^jLlo rcu^l (3-° gj I L_ 1 I g I T ^ "1 Port Jl jjjxj (jl J-Jjj^ (^-jLLJI (j_o JIiLq-^ g 1 1 (jja jx^l djKI-iJI (jlji ^^1 ^— 1 1 jt 1 o-C LlqJx. ) jAlxll (j-o JjljliJ lIiLlLqX. J_£ ,jl 1 1 1 1 1 1 1 Traffic or broadcast ^ ^^U (jjLO jAIllLqJ [g j?i hi LjIaJI (ja_i cL^g i no ports Jl SaJ-pUl L^gJ^KT II ^ Firewall a Firewall s J-o^j ,^1 <»n ;h II ^ (^-L^^l 3LaiiaJI ^^lc J-oxj Firewall ll v_nJ| r»-vQj-lsj VMware vShield - 1 "'L>"j 1 "' ii (J^-'- 1 cJ-q- 5 -' cr-'-" 1 fi (^Lh-I 1 SuLl^XJI "'Ij"j ■ II 3 'I I I ■ a j (_>ij^jxo (J-qjlj "I ag " 1 j a 1 1 1 (3-c- cu_Lc qK..h..i a^yJh Cisco ASA - 2 Liajl Jgg^xii j^oLaj J>jsLi ^;hlL JuniberVGW -3 IPSandVPN JI^L^^L^jbjl^ J^slj^^i Stone Gate -4 Microsoft HyperV tj o^Li. (i jLj jLi^. J^xj ,09^1 ^,111 ooi^JI dS >JaJI 5nine - 5 VM JL i_y^LL (_$jLj jl-^- J-o^J JuoLa ^yUl lIiLSjmi II (j-o jj'i^ llj jj'i^ II ajJLpJLJI l-n/jI/jKtii ^ Antivirus DESKTOP/ LAPTOP (^J Deep Security Agent r^Tl Deep Security '- — -^ Virtual Appliance Deep Security Manager (w\ Security Center Reports Administrator Sllqj^^JI ljI ji» j^.-'i 1 Antivirus ^-iv^ ■ jl a K^'pH L y2i Lo j (jiaJljJI VM oy£z.\ ^yJl jj^jJI o^gji.1 J ig a I ■ ^Qf) o 'ig VDI (Jl ^-g ' Lai ■ |Og-Q-j Ljj-Lc I i (j ~n Ig-J jj9^9 (J-Q-X-J |Q r) CI '1 g ojg -\^/l o.ii£ (jl J_ljj Lijl I i .^ijci gjg ill I jil jj_uj OJX- (_j-Lc- (J-Q-XJ VM 100 Ljj-Lc (jjl .Antivirus a^...-. 100 jIjx.L S j i ■ ■■ L^jJI J o I i j "ii , , ig j i o (^| (jjo i^t ii ^ ^ 1 1 ^ 1 1 r Antivirus ^LoLi^jJI (jl j^uajg jj^juiiib (_>saLiJI <:IjMJ '■ J j IjLo >i^l gl J"j^"' (j * r Antivirus 100 (J-oX- j^-"" 1 " 1 Lqjo Loij-Lc «j*< 1 Antivirus s l^j "*ij "j^ -1 ^ l-i^ >jLlj jjLij^^iii (jx. Scan SjlJLqjlj iq^qj L^lLc J^SLi ^yJI VM Jl *bl ^ .I -" . Antivirus Scan Storm ^1 (jQnl I OA y >ll Antivirus b#J 09^9 y> j:-' 11 lA^ VM 5 ^ J^xj u ..m', j Antivirus J_ox b/& 5 VM JAL Client jaiLa ^slsuj (jy"^* Ja-ijj IjJh LqJ I Scan (^1 (_J-o5Lj p^"" 1 ^(9 ^jIj (^l tfLUjliiij ^9 l±ajjJI (jjj^iii ^j-ju^l fj] ^1 jjjo Virus (^1 lisiio a£ D5^-j LiLbja U>l Scan J-o3lj VMJI oia* (_>o <*^jLk 9I Antivirus .-.-vt-.i a^ij 5 l >iisLi Trend micro deep security - 1 L^^Jgillll oigJ (j^u^sAjo ^joLi^j .-■•xT'iij ^jLqjsJI ^oJLc Li> aia^sLoJI ljLSjjUI jjjo MacAfee move - 2 Li jjIjLlo VM Jl L7 lc J-o-s-j Lr U 5uLs±l noa.g Ia^. >iAua ^ob j_i 5lS jAJI oaj^ Panda cloud - 3 ^■lij^ j^'N iLiLoa. aSjjli (_J^3 SjlLaUI 1 i-v^i^i<"i 1 1 ..ii j n Antivirus (J-qx- ( _ T i> iiil-u (_$>aJ iiiL^j-iii .1^3-1 Lr glLi ^oJ » 1 La II j ^us^qJI • rfJ-Li-iJI Lu^^J^iSjiJI ^oJLc ^^ii 3aLpa II ^oJLsJ J^^/l lijl^iaja LuI-Lj jii 05^ 1 ^1 b ■ ^ Lgj j<^U>V~ioo 3_iIjjJI r)<7-\ Lo-j I LjjJj ^.jj-i-ijg j 1 1 ^ j j La 1 1 1 (j^/ jy ■■""» J *s 1" 1 1 L-l^ gJ r; i "\ T 1 1 |j^ £_iLLi^ LLsz-iIJu (jl ^oJIjlII lj^_> ^o-Ig o 13 Issue 27 - June/ 2012 14 15 Issue 27 - June/ 2012 JjOl£ ooj jJa (jilr \-hysu LjLujbJI iIjLujgjjLD jLLqJI ^IqjJI j^Lio Jlc.i llj J»JLS Lo >£^l ( _ 7 -° eLi-LLQ-j jlj^-J uflXo i Jli^-Q L±J_j I (__yajiuJ :JL1q5> £g-i-ll -olxiiin 1— i ■ ■ a (j • igj ■ n 1 (Jj o"^ Q (jT ' LO-ij lHjLq-LqJI ( _ r oL ^^-Lc (jjjgjjJJI J ■ o a " LljUlLj 3 ■ 1 ■ ■ ■ 3 j 1 1 J^igj ill II Lia 'I 3 1 ajlqJ-LII e>Q"'J Lo O^iLH- 0 -" J 5^3-l (JLLftS Ij jgJ a 'VI (jjjgjj^ _S i-iJag II gl jjjo JniTj o (jjjcj^iiJI q^^l5U (jli Lr J-oX- (j r\ \ 1" 1 3_iLual dJLa. ^^Jl jjal ^^Jl (j^ . (j^ n k> i o ^^jjli) (jjjg j-loJ I l-ig-J Lo (_>2x5Lj J) I o II 1 j ? 1 "1 j_q 3j3J-Q-qJI pj AJZ-l i_LujLaJI JjLujgjj^) (jl (jjo r II (J-LQ (jjo JjL-ijgj 1 iti II (jx. ^-piii 1 ^ LLo (jjo ^l^jjj L_og_i I ^ 1 1 . ■ 1 ~i (Jul jlj.ua VI (j£.g A U ,.i^V 0 II ,".l 0 o 1 qI ojjlq ^jgiLbj ^j^l a *iVI ^j>»o 1 .. (jj-S-o jjoL |Qg-Q-J |OoJJL laJLL LJLcq t _ 7 5LLiLa p 1 _ 7 j1i lj~^ (jl oJo^a.o^oJI lS-i1lLII jqU^u . ojljjial Jjjlj I pl< d nl *i"i Log jjMU'iNI jIlAVil l^JJ ^LoLj^jJI ( _ r Lc jL^-N II , oog-j 9 1 LfloLLbJ (jjQ daJLlLo I UA, 9I ,^I~iIUiC.>i I 1 1 1 ->.T,.i 1 ^9 ( J_ 0 jLll (_5_D oL-N O (jjQ d. jj I I 1 Q 'A\ \ ..I I 1 i..il-\ II (Jjjgjjjl yet-* Lr L^.Q jgjJI (_j.ll ojg^la ^ 3_iI-1j J^lj^l (JAAJ (_9_ljla (jX- 9I LuLo-Lj glgui opLgjul (_Li.ljJ3JI JjjjJ.J (jl (j^o ' . .qaAjLllLqJI : Unn Uln 1 6 Design - 1 iLi IT ^ 1 10 ^o'T i 1 _ 7 UI dl^j^JI (Q ' pi-nlJI SjuojjJI lIiLsJ (jjo ^sJ (_$L (jjjgjjJJI (jgljLj gl L6L^ gl ^yjjjJl) :(_Llo S^igj^LoJI gl o-Ljjp dJd) diigjJljo >i-sJI gl (^^-J^J 3I ^lsJI ljLsJJI iIijLS (jig (ojg^iluo ^JX- ^sJ JjLijgjj in II d_iLL^J 1 1 ..i'i VI (_jJ2> d-Og jJLo jALjg l^nl , , .iTil ^J-^ 2 ^j_jgjj_oJ| ^| (^gjjj S_iggjJI "iM r I o 0 II 17 Issue 27 - June/ 2012 jLujgjj-oJI jLkua -qjAJLuJ il g! (^j-iJgj i o H Q-Qg-j C7 1^ (J-o^l lj-L*" ** *g c " Q JUajb ^■jjlil ^i)g nig liJjL^a. 4 _ J J-C- jLuaJI ojjjLj ^loIjj (J-qX- A i o i < ^-gjiagjaJI d-jL^J ifJJ |j_a>g Ldl oJ-j f Ijl^-N (3-Lsj Jlgji.^1 Igjjjl ^jii J iSjjLj' -10 (JjjgjJ-Q-ll (jl jiUA, jjlig.Qj ^^gj |plJalJI lIiLq-LqJ (J-^ag ^O^? 1 'j- 1 -^ ! LgJ-da3li_i |oLag I ^ ■ ■ ■ " j Detection - 4 Elimination - 6 omotoc Alert ^oT i cil^j-oJI o\ g aia a II j-lojJLi cLaJLaJ ^yLa. J^qxI (J^nl I JnlT'll (Jjjg^LO-l I (jg^-J liJJjJ II n I t II i "iNI I ( J_Q_j j*il,.iA.< jj.>iT^ II : n I >j II i oA ^ojLl (jl (j^p ' .cL$j-£_q-L] d-U-jLa. r II lji£ ol I ~s ^-> L 1 n I /"> I ^ 1 n \ n i i Q^yQ Attack Phase - 2 ^j-ll - q-LqJI (jl 1 ■ ■ ■■■ ■ (j ■ 10 j '"ll Jjol^^l 1 LUJ "'J jj.>»T/"> ^ 1 .^l n.'ini"' >'>^^ ' Lo |j^^ dJAljJLO ,"l A I ciiAlj.J Urvfraemented Fil FN*: A Before Attack Mm B Page:l Page: 2 Page: 3 Pane: 3 Pap-: 1 A A File Fragmented Du to Virus Attack Page:l Pa 6 e:i ■ Page: 1 J Fife: A | File: B File: ft Page- 3 File: A Page: 2 Page; 2 1 Fll.-R | File: A A |Q j ^-gJ 1 ^Uj" (J-)-** " I o 1 1 jjoI^^I i ■ ■ "■ j 3 ^aju^ > 1 ^ - 1 1 ~i j V 1 1 < a "■ g ^jjj^jjAJI (3-Q !.'<o LcLlj jjoI^^I liaJ " I n II oj^uaJl) {LuLLM oj^uaJI ^^ii Lof SjlLqJ. -ls_i i nlLkl jjoI^^/I ujjJjjj 9^9 C7-I-C- (Jj-I j tdJ IU a. (JjLlij . jjqI^^/I 1 1 ijJ ^^ii 1 ci I o II (JjJ^-LQ-ll (J-Q-X-J 1 (jjjgj±£ll\ ol 1 A OJ9J (jjO JI ^^il liJjLgji. 1 _LL^a_i (j| Lo (jjjg^LflJI (jl Li-J lIiLq-LqJI JAIj j*I<" II cuJLqx- ^^q I j ■ J ^ i'i 1 1 - b-LpJI L-jLLuaj , ci 1 ^ ifU Jijl ^oJ ^ I3 Infection Phase - 1 ^ o *i i ri ^ . , i dLL^^-oJ I O tA^ ^'i^ l i Qi ^ c T i I ^_Lc ^Ajla LS , ci I a cuL^L |qLo (jjjg^^iflJI (j) • b-LpJI J *s i" i ^-i>ig-j d-JLLlI o ua Hj ^jLg -n ^.iLa^l j-slj^ ^jjj^^loJLi ijLa^fl (J-lo (JjJ^^LflJL ALgi) ^loLjjjJI QA^JLljJ-oJI _j qj ■ ■ j Lo . ci 1 -qJ I (JAIj ( _ 7 ii ' ^ ^ ; 'w ci i T 1 1 Instruction Pointer (IP) -"■I 'I u3 O ^lqIjJ (J-oXJ " 1 ^ L^ljJiJ (jl ( _ 7 J_o^-l JliLijgjj i Ci II i "I .•■iVj Jc7 II jjIi^jQ ^1 (_jA|j S-LajQ JJ II jq U> , , i 1 1 "nni ~i - _LLJ LJ (LO-lLljJI njr^.^k II Jit 0 < ... ^joLjjjJI ^jjj^^loJLi ^jLa^l (_Llq (^jJLoj^jJI (j^Ul) 1Q5AJ IxjilLI ^loLjjjJI ^ I c. .Uc.>> II _lLslq J9-S ^^Jl oj^IiLlo j ci ci IL "il ^ J II jJii^a duLgJ II ^^.09 !MjoL^ IjlqJ "13 ^LoLjjjJI ^-jI-ij ^jLa^l jjlj ^JLi. ^jii |ol ^LoLj^jJI (3 Lgj ■iim "i || 3j9_i^Jl) ^jjJ9^±iJI_i O-ij jrt-.nJI v_nJJ 6^Q 1 1 £la±uo dUaLujj-j dj^f Lflijg-xg dJL. ^^ii JjLujg^iiJI OJJX JgjX^jQ i 1 1 I L^Qjuj I gl L^-lLc o j V i ^qJ . d-Jx (_ya l a II L-iglka-oJ I d-ojLii ^^ii vju jb ^sJI oiiu •> 'I jl 1 Tr ^1 (3 ■ ■ L-> 3 rQ^-P -i-i-^ J^*'.' (j-^-o-i-o I i ^lAc/"! j^/ ACI II jx. *'■ lAa II (J-Jal jJ .prefix-list j_c aj^JI j> ^sU 1lJI ^^Jl jJALILj packetJJ ojlio (_J-o5l-i pj""' :olj^/l o.igJ jajLmiJ ajj^LLi Ij_jI ia a M '■ ^iirjui Lq^ Lxjo (jl ^^iijj-^l 9I o-i^lg , \ \ ini i jl ^1 InTnijg ij^jjJLj ^r 1 ' II 9' ^-LqJLj action Jl j±jp± oyfrz.] (_J-C L&jIjX-I i_jLj Jjjlal j()ni ( _ ? -i-jl '3*^"'^"' o^d^' CT^" yr.VI 1 j^iL) ^iig ni ^-jjUI lA^ M /"> ^ ■ " 1 1 i>i Vol IjJ cdlll r '■! iJ^ ^-lii lUikC- i iik^ i j J J l i Jj5 ^jji 192.168.1.0/24 192.168.1.0/24 ge 28 192. 168.1.0/24 le 28 — 192.168.1.0/24 ge28 le 32 Issue 27 - June/ 2012 5 oj 24 jjj^iUTii '(3"^ "j o-ll o-° £j-oJ prsfix-list Ij-lj iLILiJI o.ia> ^yii i^c^l dJLaJI A^^j ^oJ JLa. ^ <*J| J^oJ! ^1 Ljj^£j LLa> 5 . 255.255.255.0 Lilb. ^ ^ 5 subnet maskJI ^ j^UaiJI subnet maskJI J±oj* -JJiS 5 L^JI jJ^Ul t-iaJgJI ^HJI j-lc ( _J_c Jjj* LULLo ^ 24 jl ,JJ * Ge or Le .lj^LiJI ^ I ' !< olLLj cr Lsi Q Jl |jj£ t < 1 *i II gj-oJ prefix-list jO^-OJ LJa 'I :dJj_iljJI dJLaJI J;""< LllILi. ^ t32 (^ji ma 9I 28 ^gLxua 9I ^lSI (j^< ■ (jl ■ a ■ LLLlLi. ^ subnet maskJI ^ .(32-31-30-29-28) ^l Lu^ 32-28 tjj_, 5 j r).^i^ o il subnet masks Jl ,jj-o^. :(Jlo (5jA^I Jj^LaJI (jjo j-lc LiJLLai (jl Lo^ Permit/deny ANY R3 (coafig) # ip prefix -list Nerw orkset seq 1 permit 0.0.0.0/0 le 32 R3 (config) # access-list 1 permit any . jjj-lb all packets Ji ?^J l j subnet masks J' j ips J^ 5^ j 1 Permit/deny default route ]R3 (config) # ip prefis-list Netnorkset seq 1 deny 0.0.0.0/0 .jjj-^l 0- default route J 1 ^ j 1 Permit/deny as per subnet mask R3 (config) # ip prefix-list Networkset seq 1 permit 0.0.0.0/0 ge 25 le 28 j# subnet mask ^ -ji^^i j i^luli ijlLs jc ^Jiili L >a»j jj^IUt^i jl Issue 27 - June/ 2012 t^JlUI j<.ui L7 Lc u.,.. , Lab JMk o^ 0 eigrp network prefix-list t 3-;Uv. eigrp 1 R4 LO: 172. 16.1.65/ 26 Ll:172.16.1.33/27 L2:172.16.1.17/2B 13:172.16.1.9/29 R2 Rl /Q fo/o 192.168.1.0/24 'fl/0 1 • fl/0 R3 9 192.168.3.0/24 192.168.2.0/24 R3 L0:172. 16.64. 1/18 Ll:172.16.16.1/20 L2:172.16.2.1/23 ( _ 3 JLiJ I (3 1 i La "■ -i-Jjj^ jj^IjJLj 3 I uaLo dl^j lOOpbackJI (jjo o-i^J^ (J^ *3'>" prefix- list J I ^mU^ 1 Rl#canf t Enter configuration commands , one per line. End with CNTL/Z . Rl (canfig) #ip prefix-list Netwarkset seq 1 deny 172.16.1.0/24 ge 26 le 27 Rl (canfig) #ip prefix-list Networkset seq 2 permit 0.0.0.0/0 le 32 Rl (canfig) #[~ eigrpJI ^ prefix-list Jl Rl#canf t Enter configuration commands, one per line. End with CNTL/Z. Rl (canfig) # router eigrp 1 Rl (canfig-rauter) #distribute-list prefix Networkset in Rl (canfig-rauter) #| R2 ^i^ljil routing table Jl Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 5 masks D 172.16.16.0/20 [90/158720] via 192.168.1.2, 00:33:38, Fas tE the met 0/0 D 172.16.1.16/28 [90/161280] via 192.168.1.2, 00:33:38, Fas tE the met 0/0 D 172.16.1.8/29 [90/161280] via 192.168.1.2, 00:33:38, FastEthernetO/0 D 172.16.2.0/23 [90/158720] via 192.168.1.2, 00:33:38, Fas tE the met 0/0 D 172.16.64.0/18 [90/158720] via 192.168.1.2, 00:33:38, FastEthernetO/0 C 192.168.1.0/24 is directly connected, FastEthernetO/0 D 192.168.2.0/24 [90/30720] via 192.168.1.2, 00:33:39, Fas tE the met 0/0 D 192.168.3.0/24 [90/33280] via 192.168.1.2, 00:33:39, Fas tE the met 0/0 R2*| Issue 27 - June/ 2012 23/172.16.2.0 - 20/172.16.16.0 - 18/172.16.64.0 ^K;,1.ll ^ ^ L^l 5 Rl#canf t Enter configuration commands, one per line. End with CHTL/Z. Rl [conf ig} #ip prefix-list Networkset seq 1 deny 172.16.1.0/24 ge 26 le 27 Rl (config} #ip prefix-list Networkset seq 2 deny 0.0.0.0/0 ge 18 le 23 Rl [conf ig} #ip prefix-list Networkset seq 3 permit 0.0.0.0/0 le 32 Rl (config} # R2 >^ljll routing table Jl Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks 172.16.1.16/28 [90/161280] via 192.168.1.2, 00:03:06, Fas tE theme 1 0/0 172.16.1.8/29 [90/161280] via 192.168.1.2, 00:03:06, Fas tE theme 1 0/0 192.168.1.0/24 is directly connected, Fas tE the met 0/0 192.168.2.0/24 [90/30720] via 192.168.1.2, 00:51:04, FastEthernetQ/Q 192.168.3.0/24 [90/33280] via 192.168.1.2, 00:03:06, Fas tE the met 0/0 23/172.16.2.0 5 R4 ^26/172.16.1. 64 JjK;^. II ^ajjI^I^c^I^I^^I^ISj^Lq^I 11 # conf t ilnter configuration commands, one per line. End with CNTL/Z. 11 (config} #ip prefix-list Networkset seq 1 deny 172.16.0.0/16 ge 23 le 26 11 (conf ig} #ip prefix-list Networkset seq 2 permit 0.0.0.0/0 le 32 11 ( config} #| R2 ^I^JJ routing table Jl Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 5 masks 172.16.1.32/27 [90/161280] via 192.168.1.2, 00:23:22, FastEthernetO/0 172.16.16.0/20 [90/158720] via 192.168.1.2, 00:23:22, FastEthemetO/0 172.16.1.16/28 [90/161280] via 192.168.1.2, 00:23:22, FastEthernetO/0 172.16.1.8/29 [90/161280] via 192.168.1.2, 00:23:22, FastEthernetO/0 172.16.64.0/18 [90/158720] via 192.168.1.2, 00:23:22, FastEthemetO/0 192.168.1.0/24 is directly connected, FastEthernetO/0 192.168.2.0/24 [90/30720] via 192.168.1.2, 01:28:31, FastEthernetO/0 192.168.3.0/24 [90/33280] via 192.168.1.2, 00:23:23, FastEthernetO/0 access-list pi .^t... . ^^1 SjLcI Uj jl Ijl i access-list 5 prefix-list ^ aj jLLqJI ^ s.y^. I ^1 cLdLLlI cls 1 1^1 ILj (J^^-i (jl ' La i 23/ 3 26/ J t''* ■ £. i-L=Jl pjLoJI j-lsJI ^ r t> J J WolworKf Tooi.g 11 _ Tung / PHI 1 Magazine Netw®rkSet First Arabic Magazine for Networks v>6 fpqftl »MQ LLsto LlUlLcl £uo CUqjq^lq Qjjjx cLL^o Jql Qjjlj-ai-LulQ J.;q cloli* jLszjjjI cLLoLw d i hci - £LluIq jLulUI t"ii ->i ri £j_o-3 ■ ■ u Q Q Li s> o QjJiLcl roLn vJJJ j^rsW v_rdj r»-vQll 25 WNetworkSt Issue 27 -June/ 2012 g ♦♦♦♦♦♦ ^ g ♦♦ | ♦ J 9^ AAJLfiJ (JjQ J-Ol j^O O^J^ -H9J (j 1 ! £x>\ yA) jjjo Virtual Router ^oLi yj 7 jg±Lig 3 o Lb '< I ^^-Lc- (J-o-£J 3-^3 dLuL^pJI (JaXjoj (jjo Lll^-o-i 9-^9 2008 jiijjjjj jgAljgg LLjjJ J9_^9_oJI 3 < 1 II lIij^J ^loLjjjJI (jjo l-lLc-I L^-lq "■ ' ^9 (_7-^-"d d-o-jLoJ I o'\ r>> J IMA (j_o lIlllIj (jj3 j^Lj d^t^jjLoJI 5lSj ■*■■ II Ci^^ JMA (jjo cU ^^ua^uaJI LiLj^sdJI 9I >iA^I Ljij^xiJI dLfl il ■■■ II djjjLoJI ^oLi jjJI Jjl^IiIj ^9 Next-Next-Finish 3-lILLII ^loLjjjJI oa^Lj L7 s-a sthLSil I •oLc jjo (jAJ /'1C19JI (jja 1^ i c ."iV-v j ^o-Lcl ^ J-J 9 A I I 3 Laj-UJ-JQ nj.s\~ k n JLojjla JJi. | ^ Ljl^ (j-o Kq"' <_>lijJjjI9 d ^s 1 1I1 ^jJ] J 9o^ o il ( _ 7 iJI ^ ^—11 i fr> 09^ 1 ^jJ] jL$^JI (JJ9 aJu LLl ^quiI L7 li\ (JjJi±hll\ dJLjjla (_t^9 ilujj-j^l lSJjLIlj ^jjj_JjjI9 "■ (_$jJI ^LoLjjjJI £jo (j-il ."iIjU'n II (j_o jy< II ^-IT^'i jjLq ^ 1 ■ /-> "1 A19 ni cLLjgjJLlI o,S r>> ^^i) d-^j-Lal 09 . . > 3-qjlqj (jjo (JjoI ^^ii 3lSj ■*■■ II (J 1 s a "'9 JxSjIlj i _ 7 -l-c- .Virtual Router ^ob j_i jMi. ^ vJJJ J^tNrtll v_nJJ o^Qnll 26 Q NetworkSet Issue 27 - June/ 2012 Virtual Router Manager v0.9 Beta Virtual Router Manager v0.9 Beta virtual Softer Sittings N eiNwort; Name (SS30)i Virtiwlfiowter Password: agdagdagc Shared Connection; Local Area Connection Start. Virtual Router Peers Connected {1): 1 e8:dJ:7G7e:80:te Virtual Router Manager v0.9 Beta t Jf Virtual Router Manager v0.9 Beta Virtual Router Settings- Network Name (S5ED); | VirtuAlRouter Password: agdagd-acjd Shared Connection: Wireless Network Connection 3 www.NetworkSeL.net: 3 5) Stop Virtual Router Peers Connected (5): HH c3:df:7e:7e:S0:h9 | \ivtrn d ral a fa unci Virtual Router Started,.. www.Ne tworkSe L .n e t ^ojjjI culiSLi foJa J9VI (jl^o II i^jJi (^LLII (j^T 11 ^5 SSID /Ml L^jJ] (J^ua^JL 3 Lai H jjjjJI y\ L7 ^g Router L_La ' (J-q£_i |Q 9 o i 9 LLijJ oj9-^9-qJI oyQ a VI -La. I ^^J] cLaJu l£] ■ I c- i±J9jjj39 L^LjjjLkl < _ 3 JLl I jjjjJI 3 pis' - LiSjg A< ■ II ^jx- .lIujUVI (j>> 8 ■ I £-a.j-o ijg^ 1 1 L^jjjx-I -L09 ."i(jT 'il J-Q (J9-^l Li-Lb jj^jji. (jx. (j ■ I a I ■ 1 1 (j ■ Ljj-ilg-oJI (jiaJJj d-^. I9J j_q < _ 7 _jLl I -J jjQ (_yJ-J 802.1 1 liS^xi 5 ^iLHJ 5 disassociation JjLj j 3uLoa -. 1 <;■••. I I a.±9>i 5uLa^J c*_JI cLoLb^/l g\ J^^aj^jj £_l.qjj-j jO^^J (j' ^ , .1 , ,ij q II j 1 j U> " jlialjl (j^-ij "' 5' j| I n?ll oAi2l (_ r QJxLJ J JJLjLS-Q-ll (3 U° " <_r*-" CCX CISCO Compatible ai^Jl ^1*^1 Extensions Programs Iaj& (J°t- " j^"'^--' j] (J-j l^"" Ijjfc o-^J-l ^ ■ ;-^->l (_ 7 jl^ c»-5La ^il^iJJ WIFITags t .1.1.1 .".iT.!^ TDUOHBODK ^SSCOm^^ALOGic D-tinkrjSC Toshiba . t i f i i I unitech rj|itsu ^^ii : --e^8ef/y aoer if ni Q N TEKLOG IX mtiii 1 4 1 l i -a i V summit Gateway eway, A vju jrtinJI <_nJJ o^q^II 28 07 - Tune / ?01 ? oj^^qJI (jLi j<..w ..i I d i mi i I Li ^ ^>.IU,^/i I jji I r. I U j j<..w ,.i jxc, ( j J o "il< i "i II third party "i^l ■ >-« " V I II lIi^/Li a-o Jlo^^l Lgjl t _Lo-szJ I ^U?..i" oj^-^^/l oj^b (jLi ^1 h IL ^ ^< 1 rii 1 1 5 i'iS'i II an 1 IJ I J^Li. ,jjO ^/l LgJiil^j diQiiii) lIloLq a£J 5 a i^l niMJI CCX for RFIDs _i 3349.^/1 oaa ^ CISCO COMPATIBLE jK 1 1V1 II kZi^3^3J9^j 5 jjuLslo Ljj § j<..i^..i ( _ r UI lIiLlLEIJI jh? i *-(-£ oj OAT. *'*■ ' ^ " LLj2s ^ LgjIjLiil J ■ ■ ■ j *■' ■ ■ ■ ^.jis ^ Jaai A-^lg oL^Jl ^ jjjJa (j- 0 L - jLg_->JI <_j.ll "i i )3-j ^■■■■■< < yi (jja oja£ (j^J .Lai {LljjL-C lIiL^^jLLluJ t±ILu2i LqjO **' ' « (_)il nl^l jlj 3lojI.j roaming 3! ^ojL JLajl ^loinq II cLoLLaj ^yii (_>ij_lJ ■ **' ' jj « ^j.i..i* Extensions Programs CISCO Centralized Key Management Jjoj^iJ j.ijjLuJ ^oIjAXujI AlC (J Llq-I I (JjLLuJ ^ J^jtj *i ji< I . .iM II *•<..•?■ II ^J| 034^^/1 J^-* I < iii o •*'■ cuLi IEEE 802. 1X J^^j^jjj Lig j (jii ni*>j jjL^ ,jjo jl j-^ II (JLEjul aIc ^ 0 hi 1 Lq-j ** ^ ; ■'■*■ 1 1 j-'"' j^f "1 i 13-j (jii ui^i ,jjo (3^3^ 3 J ■--'*'" ji 11 " , Roaming a i i I o c ,jjo c*_^.gjii aIc 3 ^3^/1 i"i i J3-J ^jiini*N*^l (Jj.ii ^ii I ' ; ; 3 I q < ■* H.^i"! < S » ■ suLi LgjjLiil ^LLaj ,jJ 3 ,"1 i ;3-j _j.i..i<^I < (JLoj^/I ojLcI ^Jl^ cu (JLuaJ^/L ' « _j.i..i<^I c*J a^LUL pj " .' " 1 (_$aJI 3 j "j ■ ■■■ II tfLa^ljjjj ^03-aj 3 IP (jl^Lc. cuiasj ^oj duiia dLL^^La (j- 0 I 1*1*1 1 1— I J ■-" > "j ^OJ J3LC Aii jl j-^ II (jl ^ K i'^i o 1 1 j p'sl LLj2s 3 <«Jl£Ijl *LljI JL^ij)/I .US.I ^ cGj *_*! JL^j*j/| p3£j LgjLi j 1 ^"'^"' (jja CCX ojjua j o*s"i LL& 3 CISCO ^j^Q-ll p<^vll ^Hxlo pl.t *>?..i| 1 (^lll 3 Centralized Key Management eUiiiioJl oj^Su Roaming J^s-* ^t-'j 30 Issue 27 - June/ 2012 jLgaJI "ic! n j<..it^..\ 5 K ,vi 0 1 1 oaj& (_LaJ 5 ■> j f 0 .' "' 'ID .' U' 1 "'^ (_$Lj oj.jIiLlo (JLsaj^/J ,jjO i ni d_L_vl ^ ^> 5 3^ s ojLii^/l r> 7 1 1 1 jO I jUlnTl^f ^l..-»" ^j-UI ^ 3aj-ISLll * 1 ^j.i ■■i<^l ^ 0 hi 1 jl^ ( _ 3 _q jgAaJl ^jla. aiiaijl Outer Region Lai 3 ojLiiJ 2Lqjl2 (j^^j "' ■ ^ '**' * * (_>'i iiK^/Lj cL^aLiJI o j (j SlJ ^jqiiiqII a i t'i'sdl £ jLgaJI (_JJa_LuJ (jii ni^^/L MuaJLo (JJajLuj "' ■ ' ■ ^j.i..ii-J LLa j ^l ajLoiioJl 3 Specified Maximum Power CISCO Compatible Extensions Programs "■ > ,ll j_; Ping Pong 3 ^ g^ U7M Removing Ping Pong Effect (jja 3 hi oLiJI ^ 2LsljIjJI 3_xuilJI Lo^oi 3 1 q"s q II CISCO Compatible Extensions Programs " 5 j.^lJa (^y^ 3 Ping-Pong 3 jj^Ua (^jUjaJ (j i'm K dLila. ^^-Lc jUj^JI 09^i LqaIc (j Ti' i i KJI (j-jj JLaj^/l 31 Issue 27 - June/ 2012 Administration Packet loss fate = x Packet Jitter = y RSSI up - a RSSI down = b Aversae RSSI - c SNR.Ip = d SNRa aj^ ^jMoLslo ^IMot ^o ^ L$ii ^ aj^ ^1 f-Luii^l iiib ^ ^LJI 5JU <*J ^-yj ^JJI£ roaming -.lit- jALUl J ihn ) (_jUI "' 'JJ .' Q'i "'^^fl oj^j^l o ^LLa ojii ojb^l ^Uj>i 3 encrypted *j jia ^ 5 5 jiiAo jii. management frames j I '< j j-0 CISCO (jja d nioliJI d ^ hi i II £jo <_>£J ^ 5 Compatible Extensions Programs Management Frame 2lU£oJI L$IjlLHj 5 ^bLu >JLibiij ^ Protection MFP Iaa j L^-j JaLjj^/l ^1 2L^luJI J5-^J o-jo cLslLqJ LloLS rogue <_Li-^J 3^-^ d p K i La jig ^ "~>s cH - " 3 ' 5 CCX JLuJ (jLj CISCO Compatible Extensions Programs JLl^ oaiJja ^ 11^ SuLgUl ^ 5 J-L-i. (_L£ 1(3 qCAJ (_r^-" d-Lp^o II 1 1 I l 0 'l I I WEP IEEE6W.1X LEAP Cisco TKlP SSlDsA/LANs OTi AP PEAP-GTC eOCF WPA2 EAP-FAST Wi-Fi Multimedia (WMM} NAC i /.ire ess EAT.TLS PEAP-MSCHAP r.bnagemenE Fram* Protection lor clieno U-APSD TSPEC CAC Voice metrics Expedited tjandwuJtjn re quest AP-assitted rju-i- .j Cisco Centralized Kay Management *vilh LEAP Proxy ARP information etement AP-assisted roaming Qsco Central izad Key Management wHtt eap-Fast Single Sign on: LEAP, EAP-FAST AP-assistad roaming Qsco Centralized Key Management ■with other EAP types AP-directed rosming Location Keep ajivB Unktest AP-assisted roaming Cisco Centralized Key Management enhancement GfBtwtous. probe Response Diagnostic channel Assoc a! z r Locotion lervtce 33 Issue 27 - June/ 2012 ^ t ■ ■ " (j_)j^-J till A^g £X caIloqx #^U)JlJI o j^j^l (3j>la ** * ^iL^ Ajl5.i1 01c cd ."il< ■ II (jja £o-iJI I ' (jl A9-* — 3 a£ L7 UI jljJa^/l aj ^iLJj^ L^ibk'i nij lIlcqJI (jLa, . 2Loj^jJI (jx. jLs-Lj^U JIlq^JI ^jLi » I J I A^ I f> * ^ L-l ^ I I j. n o I I I J I I * * .*** |OJ-H-Ll ■ " i 1 1 (jL^Q cLujjjJl I HaLuj ill la I ■■■ jJLI . j^yjjidl (jjjjIaJLj Routing & Switching (jx ^AaJJ *^LaJl ajj Lliii^jjj^j^jLa SLpiojl £/a (JjoLslLII^ a : .K.*.ii *LLi_j jg *Luii'^l JqjauI j ^vj 1 la LqjIa LLjI SL^jLllUO (_JjJ3 SJaixdJ II I LjLoJAliiij (_ 7 J-Lj 3 £ ; "■ . (jjLQ A^-LllLQ-II Ojljl^ "'I " I q II I j-L^LuJ I n'i'n" 'A j 1 i< ^ 1 . >» I j o liJJLiXi (jl ^/l (JjaL^j (J-o-s-l l^IijJLoJ iIijIq (Lu^sJI illjLjjLil .-iNI-n 0 II . nlVA. I I " n j I O n ^jjj Lj I r> 7 a (^jiiJ Lilj-aJu (jl (^j^j^iaJI (jja cul ^oJLx <>o*la (j-J^ Jj^ $>i-»-l ltJ^J' ^;l" q -n .>> ,"il< 1 "1 ^LLi ( _ r lx jjLia^ 1 .•.•ill . ,~ilrtl.\^?..iNI , fll'l'^jQ I in" 1 ^o5>J ^qa£^I ^^jJI ^o^lLa a£J LL& 0-°^ dijLoj ^oJ c*-jl ^fj «^Jx ^o-uj (jj)i\-i jx «q5LlLc.I SAN Jl lIiK 1 i'i'i (jx ■**■ |0^jlII Ux^iisgxg Ij.j2i #LLj lIiLlujLujI (jx AJX ^KV!..i (^jJI^ (jX OJJL^ OJ^D ■ * I ■ ' I (j^ ' I "iKi.^ill (jj3 ^3-i-ll lIiK 1 mi II (jja Iail ^axpxQjg (J-ox dxjji^ j ^ \ 1 ^ A7^l ..1 A \ nC (_J^ J " ^ 3 o II fl . idJ ^)(jollj ,^ii fiqll n SAN Jl ■-.!<..*.. Lo Storage Area Network J jLaiil SAN (jx Sxg^aja (jx ojbx jjK i u'i II (jx ^o-j 34 QjNetworkSet Tssue 71 - Tune / ?01 ? SAN Jl ^Kj^ ^Llaj LLil V\ SAN Jl jjKuij SCSi Small Computer J jLolil ^ SCSi ^bLu J£j SLlISj ^3 System Interface . Parallel (y> L&Laiil OS.j^±u JLiLjLljJI (JJLj g-t lojLxLLjg 25 LaLa£l SLiLm^jj 160Mbps Fiber Channel £iisg (jja ^j-iii lHjIj o^-lujJI j-ir. (jja (J-LEj — 4 a< ; .v. j£j File Server " 1 1 n i i U»" I \ ^ " 1 1 *i I i 1 1 I | ^ — 5 g-doliAij (Ju-o II (J 1 1 1 1 1 (_J-C- • lIlq^JI LU jjQgJg ^_9j.i i pi-La a j Ig-Lp II ^ 1 1 nPi^pJI J£ -Lcl^ia £/a (JjoLslUI^ lIjI n i ii W\ II Suj^aJ SL^jjIlII (j-jjAJLlI Jjlj^g <_j.II (Jgj^gJL alj-oSU Lgauuijg j_)j_i_Lll 0.1^ jja jja lIjULllII ^j-Lc JaLcLaJI _i jjj_j (JjoL£ J < iii j i _ r a IajlE&j ji^l (_>>^l (_>a-jl _ilJLL<&g OAC ^jOJ LLL^Q-j ,"l 1 I ^jii^l lIiL^AllLqJI (jja JliLLuJI l _ r Lc. JaLoa I 1 i £ja ",\%^~..,n .Lia_il (J " ■ II v' j' £_jjjjj2Jg J >>> "I (J ^ ' ^LuiaJI Disk Array 3j2s l!iM_iL_> |0ljAJLiiiLj lHjIj O^-LujJI £J3 LU ^"'* 2Lu^uaJI "iM il< II alj^^fl aaI 1I1ILI0I Ijl -LUj^ lIiIaaCJJ I " j i n j J\.^~y\ ^ylc jjLfl (j^£j gjLuaJ ( _ r I^. ><" ^ja j_jj_xj ililj^g 01c j^J^ lIiMjLSJI ( 3 T ;>i^> j-C- 3I (^Lj-Li J 's i'i'i 1 "il ij*i,,i^ oJic ^jJI d o hi tin ^ 1 0 ki j o 2Lojj^j JU 5 RAID 5 5 RAID 1 5 RAID 0 Ji* ojLjj RAID 0 M « o » dUajLa-a L^Jja 3lo j^. -iLlj^ sb^l^ J 0 i II Slcjjjj (_L£ jl ifna jjjiij lIiIa^ 01c jju lIiULjJI IajIs^ I jUn-^vl JiiLjLuJI jja i.'y± oa^.^ a AC ^5-^.3 03-^ ^""^ II lIlo^ jja (_yai£j . a^.\q jja ^aj JaAa II 3 a I o c ( _ T ii (J°" "'" 36 ^Networks, Issue Tune / 2012 : SAN Jl .-.K. *. JjU^J^Ia : nUj ^lis^j cLJLUI ^ jj llg l(g i o La IjjJoJI (jja oajlLo ^l^-il ^JJLiiL . oAjl^ii^ L,g-Lo .lal^ (J£J ■■■ . (iUajLni Point-to-Point Topology • 2-0 j.j1iLjO J £ ill j jii^jLuiJI (Jjua^j . jLoIaLj Fiber Layer JJ : Lgix. lipKl L7 UI Server HI Disk storage Disks Fiber Cable cLqjjJoJI oi^j "j 1 ■ ■' oax J ' j " i^ij Fiber o-l^qJI liLL&JI .jx ^^Ic . Storage Unit _j SLualiJi Channel MjLq < _ 7 ULllj (jl -ijjJg (jliLEJJI . i ^ i (jl «q I clg OAj2i (jj3 *il aj File Server ^jAIlJ "2 I iLJ » J^SI (^ jHujI L (jiJq » SLAISjlJI (Jiil^ t ^>(joll (jja t>ijJI » J-oaJI 5-a^a-JaJI "iKi"ill ^.i 1 ni II jx J i,n 0 i o jx 1 , 1 1 1 9 1 lIiLjLjjJI cLiLoa, ^-JqjLlLj L^ij-a j Lg-j^S - "*lj 6^j-lli1J l^j , 1 -s *i La Ldlx (_ 7 UI jjoL^qJI . Ljai^j (j^j jLgj JjJ J^sj Disk ssitwtem liULi^ dLajLujJI ^ -1 II ^ii jj Loa'jj (J^aXj ^alaJLlI dLIflJog (^.illq Controller lo£ ^Ulq Cache ( __ y jLl I i— il lHoJI 3 a I a c ^jjjjjJ ala-Jag (jjnl^l . jj£la J ^ i'i'i 1 LgjJJaj AAA HJ (J^-LoI lIlOQ <_rl9^' °>Q-" i_r^ : SAN Jl vLLJ ^L^j (ji lH-U c. -La-i 2 J . . < IV<;.Vi Jill ti l II h"l I J-^l"^" ^lil dLCjulil - 1 (j! 3t^>£-ll jja SujjjLLqJI JjMjKJI jLlal - 2 . dx-jjjjJI (j 1 ■ n ** Jt^" HjM-jL^JI 0^59 II SLlILslII^ SLuiiLLoJI 3^a.^ll jLilal - 3 Core ^Ha liljLii L_jLiujjjjjl i j JLio^ 3uJLc SLcj^Li ^LnaU Switches .Cisco Catalyst 4500E ^ vju j■■ ^Jx Hubs Jl Jajj ^ . SAN Jl JajjJI (j|g .(3-Isjo J £ ill j i^yasull I g-uaiLj £-0 jx ^ £ i ■"■ 1 1 (J-ox. Su^jja jja Ajjj cLojjIaJI oig.j o±i^ ^1 (J^ua^JJ Jjaj^ cLol i Vi'nil j^oj jiJ ^^J^j^jJI (jja ^9-Lll I ' j ■ o j La I Ai&g . j jj-kUl : tlU j ^Lib^j cLJLiJI 3j3^aJI^ . clojLli jx Loop of hubs Topology Storage 2 Server! Server 2 Cascading hubs Topology Arbitrated Loop Topology <*-Q JjoLgV i mi ^axQxoUl jja (^5-LII I jx> ( _jx. ^^LsJLj Fabric Layer jjl^i^jLLaJl (jju JcujJ Fiber Channel Hub JL$^ Hub jl 1 9 "i Lo^g . j-jj^JLlI lIiIj^.^ . Switch JL Jam nil .Lai ^9-^.3 oJ asj ^qJ ^^jx Cascading hubs Topology • jx Ll3>3 IgjJoJI I ' ^ "iK 1 "1 II L-> ij 1 (j'-" >Q ; II I fl'^ c ' Hubs ojx Jajj (3-ijia JjjjJa (jx. j_k^l jja Jagjjja Hub ,J-£ j^iLic) j^oj Hubs Jl jja jjx ( _ < ,--- > "l (jl^ . >ia[q (_Lti^ jAidl _ojj>q Hub jLgj^ 127 lj^«; £ja L(j h ij .Fiber Channel ju J^oo^JI Jnj l l!f!Wffl!i*1 l 40 Issue 27 - June / 2012 WCCP Jl JoigjQH i i lllllll ■» SYRIA Ill 1111 II llll 111 III NetworkSet jqtq i_UJ HTTP Response WanScaler HTTP Response 4A HTTP Get (Forwarded) Web Server 4B 3) J Do I have me requested ofc.ect'' Default Jl ^1 HTTP Get request .jjj^jJl 3jLc Gateway ojLcL jO^Jljq l-lLIqJI jjgjjl ^qJjLlU iS-uLlJI SgJaaJ I (jiKJI ji jjuj ^Jl HTTP Get request Jl 'gg^j" J5£.l J,^) Cache engine Jl 5! I-i-ljo (jlnLSJI j.ijjxu l_lLIqJI aJ-llllj :c^iJLiJI SgJaaJ i—tiloJI (jx. cGbLu oAjcLq<} AjLoLo ifia ; 1 1 Jj.^iiii II L-iHaJI 3J :A SjljIjJI o^h^ll ,051^ >J5>ll ^Jl HTTP response ^^IWII JLj j! •L>-'"' •' J C "'J L)' OS-H (J .'. o 9 1 ^ tr'! °J , ^>°-^ La-asj L7 ic l _lUqJ| jU_jI /vj ^qJ 3J :B slsijIjJI oghMI HTTP Get ^dJ^JI J9>ll t^Jl request ,jjo (JjosJI L-Jia <_Jx- JjJI :3ullqLsJI II -•»■-•» a o II ^y^jLLJI j.ijjLuJI Clients WCCP Router LS ^1 ^%j 5> JI a^I WCCPJI >iIsj jl.-tV-^ I ^jig 1997 joLc Ltfej-igJaju ^Smijuu 3^*9 Web Cache Communication Protocol ^J| HTTP Jl iliI ; I la cLjla^Jlj fQ^-OJ ^J^glgj-t ^ Ul ^ii ^ui ju Cache 'a"": 1 ^ < WCCP ^Lo ^c^jJLo ^jliIi (_>liL£JJ lIi I j.i jjjjj -15-^9 oj^i i£ (_>£J ISA Jl 1 ul 3.1^ JLia J i^-iilg gjuj^JI aIc y<-->y-< IjLoJ j 1 9i^i (JIJjjj ^Jajg MJ-ii jSjqj I lIiULcjI S jja^l Ia^J (J3^3j^j.j jjjl^" ^Jjj-o jLj^I ,_Jj f^lla (J^^^j^jjJI I (jl (J^-Hj 3 ^ 1 1 1 1 1 1 1 1 3 S ; 1I1 1 1 (_J-C (3^^5-^3-0-11 (j-LOjATiiipJIj #M-oS-ll (_>iiLS jiiljjjjjjj ^ h 1 j3 ^"--^"t II Jjljljx.1 jiiii I (^1 J-8-ulJ (jJ |OJajLm1qJI (^JLUL^ 3 --^--->^ q ^QJ.£I til^jil^ ^ <».•?! II ( _Jx. lLLloIj-LLI (jlll£ 3 JL I Q <* ^^is^oJI j^| ^.i jJ^^^j^jjJI Iail (J^i. ^jlIAIjjq Jlllj.ilJJLuJ ^1 HTTP Jl lH|I 1 1 La c*_L^5J 3jljjlLjlSj II •duin'i (_>iiLSJI (j-j-J^ Cache J-ox. 1 o (j i5?'iiiil ^ii^jjj (J^^^j^j.jJI (Jjjx. oj^ii ^LxJa^JLl CCIE R&S ul^ 41 Issue 27 - June/ 2012 ,jjo ^j^.-t^ ^ j.j3jq (J^Li. (jjo till 1 1 ni II (_ 7 ic- oajjjLo l_lLIqJI .i^-j .qJ JLi 3J ,"1 1 ^LJI LUiLg-La p j ^^vJl liA J^su GRE Generic Routing Encapsulation «uk. Jj'^j LiaJ j<-.w... >j$iaj 3-Li transparent a " ***** 11 * J^5-*5>f" "' "■^j LoaIc j<..w... s^li La L>£ ."1 i" OrH t^J-"- 1 ' J ^ "' ' ^— 1 1— j L_l_i_J 1 l^Jjaij ^iLI aj^ ^qJ .2048 IxlLJI La. UDP Jl (J^^jgjj (J*^ (j-o j-ij 1 " 1 II 2-° J^-^^^x-" •<* 1^ ^ M-q ^juib^lJJ JaxiLi j (J^-J-^. I jj&g *4..il..i-v j^jo) oA&j (^l-iJI (j-C (J^^/l 1 alia JjljlAual (J^S^jgjjJI I AgJ WCCPvl WCCP v2 Jl ^ox-J-i TCP lajii JI^ajTCP UDP Jl (JgZgjgjj (_jl ilonn 80 .'1 flip II gjj cJ- 0 ^ HTTP ^1 jjo Josj IP Protocol Joiu HTTP FTP (JM-i. (jJS J"'l| 3 «jK J ' « jQJ" • MD5 ■IijjjLS ( _ 7 IloJI ^ox-aj^ n ,~i \\ \r. s tf\ ,U>i..ii~l "1..1K "1 /j II jj^)' < f . pr. i i J.ijXuJ (JilLS (jJ5 l-LJ-J (jLS a^Ij il^inn (jji _)iSI jj3 jj^j (>o >i£l ^>i^>"l cLfljlo i <1 J-oX ^O-COJ jxj-uj 32 ^yii. ><5>JI J^jj (jLoc-x; (jV^^J^jjJI MS Clients feO/2 feO v"^| Content Engine j Cisco >s i Router ( config) # ip weep version 2 | Router ( config) # ip weep web-cache password NetworkSet i 0/Router ( config) # interface FaO I Router (config-if) # ip weep web-cache redirect in j Router (config-if) #exit : 1/Router (config) # interface FaO ; Router (config-if ) # ip weep web-cache redirect out i seconds Jajj (j^ o i )c7 -ljI "'■■'l < ' ^Tlo (J^lA (j_o ^agJa J j ^j-j^ j-Ojjll±j (jja ji^l HjaJ (jL^ 3J (Jjjo c^>*^^ lIi jIacI^ zij S^Uo I^JLjjI^ iei i a ol^j l^'ij^-N I ( _ r Lc dLuaLa II ^ocaj "iKj *i II iV< .^ljoI^jJI (>a3U ^Jl ^.iLus^L Jg^gjgj-dl Ij-ifc j-o J-o-£-LI ^ /,,/ '' o Aladdin/SafeNet eSafe Web ApplianSys CACHEbox Barracuda Networks Barracuda Web Filter Blue Coat ProxySG Citrix Systems, Inc. WANScaler CensorNet Ltd CensorNet Professional web filter CYAN Network Security CYAN Secure Web Cymphonix Corp. Network Composer/Conductor F5 Networks Wan Optimization Module Fortinet FortiOS4.0 M86 Security Secure Web Gateway McAfee McAfee Web Gateway Formerly Webwasher Microdasys SCIP SSL Content Proxy PerfTech, Inc. Bulletin System Replify Accelerator Riverbed Technology Steelhead Smooth Wall Ltd Guardian Web Content Filters Sophos Web Appliance Squid Stampede Technologies Stampede Application Acceleration Series Trend Micro IWSVA 3.x and 5.x Websense Web Security Gateway Wedge Networks BeSecure XipLink XA Optimizers tliLSjjIi * o JAXuAjg i-ogjJLo ^loLjjj j \ 0 II 3 -^"A^ II S^'iK ^ II ^yjljjjl i-v I Squid ^jaLij-j "' ' (LaJLoJI o'\ c Lgj^jlol jgl ^jJLlI tLuLill dJa-oiJ jg I (jjQ 5 'I qjuLi^f) (j-io-i LgJuua l$ S ■*■'■ ■ lIujaj^H ^Jl ^LlaJig & i 6 lag p 1 1 (jjQ I j^, j*;^ J jx. L^j jJg Ia^ ^j,'. Sl^jaJI oai* ^Jl jolifc jjo^I ,ji jloIc.) LjLi o^i&i^JIg SL^mglpJI _jL_S_>jidl axSLua ,_Jx. Lol Jg.£gJgjjJI OJJ j^nJI v-rdj o^q^II 43 Q NetworkSet Issue 27 - June/ 2012 ya£- jj--**^ a it O^-i J , '" > "l ^ (jjual^oJI (j n ! (j o 1 1 Jjia.ii ^/l (jjjjJI o-^9 i_jLliaiJI (j^f (Jj-^-II 3-i2i L-jLojlsLpJI U-vg Igjjjj Llaq Iji-Cj JK o ^fal.ljgJ o j_j jx. l_iLluj1 <_JLL& lIiLcLuj (_yJI (jL^^I (jja j i'K ^LLjJ L-jLoglsLpJI (j^_\J ■ ■ < IjJ At nl .Xj JjLoijl (jl cLLj^Ja jJjjX. f Mo-SzJI o-o " O^i? j-i-^>*-" ^- LC 'S J-*5-^' <_r" (_yj.ll (J^l"'n II (jiajLj (jja Lb_J (j-Vo-fi LD j (_yUI 5-1J-L0JI jJaLLo (jja j ■ ;< j jx. IjJ ^q^j^^-J ^cnlr^ m (jjogtij c^jJI u (j-J jJI (j I I j fl II OJJLlS' 3 ; 1 1 ■ *■ 2L0JLQJjJI (jSl Oj.XL_? J a ilijL^ (jl (J_V^LqJ I ojji JAqA fj l<">^ J j (j o II ^rLc- 1 J JL^oJI Ijji jjLoUl^ i II «^U>?..ij ^^SJ .^1 ^.jjs j,i 1 i9'i Lgxa A^^-j (_yj.ll 0 II ji^l o-° 5 1 $ 1I1 a __ILin» |03-i (J^-Q L-jLojlsLp II LiA^Jgi-Ci (j 1 1 1 oLszJ 1 g-Lpja (_yic i_ta j IjJ ojja l^ijLoj ojj2» jjo (JjoLsiUI (_ylc ojjJill Jl ^ pJI lji& (_yi vju jif.nJI v_nJ| o^q^II 44 Issue 27 - June/ 2012 ^■■j/^r> II ■ nil o-NQ