Synology RT2600ac:支援 MU-MIMO 速度提升至 2530Mbps – VPN-HK.com

February 26th, 2017 info@vpn-hk.com Posted in Tech News, VPN, 中國 VPN, 互聯網 | No Comments »

Synology RT2600ac:支援 MU-MIMO 速度提升至 2530Mbps – VPN-HK.com

無線路由器已經相當重要,如果各位 wire 民經常透過流動裝置串流睇片、聽歌或打機,路由器的速度就更相當重要。一般高規格的路由器售價並不便宜,如果再配合其他像 VPN 或備份功能,動輒就是數千元,Synology 新推出的 RT2600ac 就算是一款高性價比產品,各位 wire 民又有沒有興趣趁新年為家中的無線網絡升級。

Synology 雖然一直以來都是以 NAS 為主要產品,但繼早前推出的無線路由器  RT1900ac 後,今年就推出全新升級版 RT2600ac,硬體規格則有相當明顯的提升。其中,配載 1.7GHz 雙核心處理器,同時支援採用 MU-MIMO 技術的 802.11ac Wave 2 認證標準,確保多個裝置可同時高速連線,無線頻寬合計可達 2.53Gbps,上下載速度都更快。除此之外,RT2600ac 的軟件功能亦十分強大,適合家庭及小型辦公室使用,讓工作及娛樂變得更智能。

雙 WAN + MU-MIMO
RT2600ac 支援 MU-MIMO 及最新 802.11ac wave 2 標準,當中的 2.4GHz 及5GHz 無線傳輸速度分別可達最高 800Mbps 及 1733Mbps。採用 MU-MIMO 技術的最大優點,是可同時讓四個設備傳輸,提供更快、更穩定的傳輸速度。根據官方資料顯示,RT2600ac 更支援同時連接至少 100 台正在傳輸資料的裝置,就算是企業級應用都絕無問題。再配合 Synology 的智慧連線功能,裝置將會自動連線到最適合的頻段,無須考慮範圍及速度問題。

全新 VPN PLUS 服務
VPN 除了可以讓大家「翻牆」之外,更可保障網絡內部服務及資源無法從外部直接使用,尤其適合需要在家工作或進行遠端連線的用家。RT2600ac 不但提供傳統的 OpenVPN、L2TP/IPSec 及 PPTP,更有全新的 Synology SSL VPN、WebVPN 及 SSTP,能夠依據需求輕鬆部署多種 VPN 解決方案,更可針對存取權限及頻寬分配進行管理和調整。

管理、同步、備份及多樣功能
RT2600ac 除了上網功能之外,只需要安裝如 SD 卡等外置儲存裝置後,再搭配 Synology Cloud Station2 組合,路由器都可以成為個人專屬的雲端空間,能從多台裝置輕鬆存取檔案、相片及備份檔案。

建議售價:$1,999

Tags:

AddThis Social Bookmark Button

兩種網管自動化協定 搞定大型Cisco網路管理 – VPN-HK.com

February 26th, 2017 info@vpn-hk.com Posted in China VPN, Cisco, VPN | No Comments »

兩種網管自動化協定 搞定大型Cisco網路管理 – VPN-HK.com

善用Cisco Discovery Protocol 學會VLAN Trunking Protocol
兩種網管自動化協定 搞定大型Cisco網路管理
許多公司都採用Cisco的網路設備,如何透過Cisco所提供的網路協定來有效管理大型Cisco網路就變得十分重要了,本文將詳細說明Cisco Discovery Protocol和VLAN Trunking Protocol兩種通訊協定的使用方式與時機。
某些網管人員所管理的可能是大型的公司網路,橫跨多個國家或是多個辦公室。以目前來說,擁有網路設備領導地位的Cisco廠商,仍然是各大公司的首要選擇。因此,了解Cisco網路設備所帶來獨特的網路管理技巧是一個必備的網路管理人員技能之一。

這篇文章會著重在如何透過Cisco所提供的網路協定來有效管理大型Cisco網路,其中最重要的莫過於Cisco Discovery Protocol和VLAN Trunking Protocol兩者。

Cisco Discovery Protocol用來自動搜尋網路上所有的Cisco網路設備,以方便網路管理人員收集並了解目前的網路拓撲,而且不必到各個網路設備前進行作業。而VLAN Trunking Protocol則是可以將VLAN的設定自動轉移給各個網路設備並套用最新的設定值。同樣地,網路管理人員也不必到各個網路設備逐一設定。

以下就來看看這兩個協定是如何減少網路管理人員的工作,讓許多事情自動化。

先來認識Cisco Discovery Protocol

Cisco Discovery Protocol的縮寫是CDP,此協定是用來收集Cisco網路設備的相關資訊,只有Cisco網路設備適用於CDP協定,其他廠牌都不支援。因此,CDP協定能夠提供Cisco交換機、路由器或是其他Cisco設備的摘要資訊,給直接連接於此設備的其他Cisco設備。

CDP協定運作於網路七層協定的第二層,也就是Data Link Layer(資料連結層),也因此,多種不同的Cisco網路設備,例如支援不同網路層協定的Cisco路由器(支援IP及Novell IPX),也可以經由CDP協定互相學習。

不過,對於這些使用CDP協定的設備,都必須支援Sub-network Access Protocol(SNAP)協定的封裝行為,例如LAN、Frame Relay以及ATM等等。

當Cisco網路設備啟動時,預設上會啟動CDP協定。比較特別的是,CDP支援各種不同的網路環境,也支援各種不同的網路媒介。

但是,限制就是CDP協定只能用於Cisco的網路設備,而且CDP協定不支援Frame Relay的Multiport子介面網路環境。

另外,CDP在IPv4和IPv6的使用上並沒有差別,能提供的資訊也相同,所以好處都是一樣的,因此不用擔心CDP是否支援IPv6這個問題。

支援CDP的條件

並非所有的Cisco網路設備都支援CDP協定。事實上,CDP協定只有在Cisco IOS版本為10.3版本以後才有支援。

Cisco IOS指的是Cisco設備上的軟體,透過這軟體可以下達指令給大部分的Cisco設備,Cisco IOS就像使用者與Cisco設備的中介層,因此Cisco IOS可以看成Cisco設備上的作業系統一樣。

而在Cisco IOS指令介面中,可以透過show這個指令來輸出各種詳細資訊。不過由於show指令只是純粹用來顯示設定值,因此這個指令是在User Mode或Privileged Mode底下執行的,而不是Global Configuration Mode及其他模式。

Tags: ,

AddThis Social Bookmark Button

Report: Ransomware Attacks Are Growing, Shifting Rapidly – VPN-HK.com

February 26th, 2017 info@vpn-hk.com Posted in Network Security | No Comments »

Report: Ransomware Attacks Are Growing, Shifting Rapidly – VPN-HK.com

cks doubled during the second half of 2016. This is according to Israeli-based security solutions vendor Check Point Software Technologies in its H2 2016 Global Threat Intelligence Trends report.
The report highlights the key tactics cyber criminals are using to attack businesses, and gives an overview of the cyber threat landscape in the top malware categories: ransomware, banking and mobile. It is based on threat intelligence data drawn from Check Point’s ThreatCloud World Cyber Threat Map between July and December 2016.

The ThreatCloud database identifies millions of malware types daily, and contains more than 250 million addresses analyzed for bot discovery, as well as over 11 million malware signatures and 5.5 million infected Web sites.

Out of all recognized malware incidents globally, the percentage of ransomware attacks increased from 5.5% to 10.5% between July and December 2016, says Check Point.

It notes thousands of new ransomware variants were observed in 2016, and in recent months the company witnessed a change in the ransomware landscape, as it became more and more centralized, with a few significant malware families dominating the market and hitting organizations of all sizes.

“The report demonstrates the nature of today’s cyber environment, with ransomware attacks growing rapidly,” says Doros Hadjizenonos, Check Point SA’s country manager.

“This is simply because they work, and generate significant revenues for attackers. Organizations are struggling to effectively counteract the threat — many don’t have the right defenses in place and may not have educated their staff on how to recognize the signs of a potential ransomware attack in incoming e-mails.” Additionally, Hadjizenonos notes the data demonstrates that a small number of families are responsible for the majority of attacks, while thousands of other malware families are rarely seen.

“Most cyber threats are global and cross-regional, yet the APAC region stands out as its top malware families chart includes five families which do not appear in the other regional charts.” In August 2016, Check Point also discovered the infamous Mirai Botnet — a first of its kind, the Internet of things (IOT) botnet, which attacks vulnerable Internet-enabled digital such as video recorders and surveillance cameras.

The vendor explains the Mirai Botnet turns the devices into bots, using the compromised devices to launch multiple high-volume distributed denial-of-service (DDOS) attacks. It is now clear vulnerable IOT devices are in use in almost every home, and massive DDOS attacks that are based on such will persist, Check Point says.

It adds the most prevalent infection vector used in malicious spam campaigns throughout the second half 2016 was downloaders based on Windows Script engine (WScript). Downloaders written in Javascript and VBScript dominated the mal-spam distribution field, together with similar yet less familiar formats such as JSE, WSF, and VBE.

Security solutions provider Kaspersky Lab notes that in 2016, a huge amount of malicious spam was recorded. The absolute leaders in spam were the Trojan downloaders that download ransomware to a victim’s computer, it says.

The most popular were mass spam mailings sent out to infect user computers with the Locky encryptor. However, other ransomware such as Petya, Cryakl and Shade were also widespread.

“2016 saw a variety of changes in spam flows, with an increase in the number of malicious mass mailings containing ransomware being the most significant. Such an extensive use of ransomware may be due to the availability of this sort of malware on the black market,” says Darya Gudkova, spam analyst expert at Kaspersky Lab.

“Currently, cyber criminals can not only rent a botnet to send out spam, they can also use so-called ransomware-as-a-service. This means the attacker may not be a hacker in the traditional sense, and may not even know how to code.”

Tags:

AddThis Social Bookmark Button

Cisco Unveils New Firewall Lineup for the Internet Edge – VPN-HK.com

February 26th, 2017 info@vpn-hk.com Posted in Cisco, Cloud Hosting Service, ip vpn, Tech News, VPN | No Comments »

Cisco Unveils New Firewall Lineup for the Internet Edge – VPN-HK.com

Networking giant Cisco has introduced a new line of firewalls designed for businesses that perform high volumes of sensitive transactions, such as those in banking and retail. The Firepower 2100 Series Next-Generation Firewall also promises up to 200 percent improvement in throughput to eliminate bottlenecks from the Internet edge to the data center, thanks to a new architecture and other improvements.
“The new Cisco Firepower 2100 Series provides businesses with the confidence to pursue new digitization opportunities, knowing they have a security architecture designed to protect against the greatest threats, without affecting the performance of critical business functions,” the company said in a statement.

Protection and Performance

That security architecture includes a dual multicore CPU that accelerates key cryptographic, firewall and threat defense functions, according to Cisco. The goal of the 2100 lines is to provide enterprises with ongoing protection and threat inspection without having to sacrifice performance.

The series consists of four models: the 2110, 2120, 2130 and 2140. Each delivers throughput ranges from 1.9-8.5 Gbps, for enterprise use cases from the Internet edge to the data center, the company said.

The new firewall series also comes with threat defense and productivity enhancements, including the Firepower Device Manager, Firepower Management Center for centralized security management and Defense Orchestrator for cloud-based management.

“As businesses increasingly move to digital business models, cybersecurity solutions must scale to add new functions and address the latest vulnerabilities and threats without impacting application or network performance,” Cisco said. “Traditionally, this has not been the case.”

Instead, Cisco said that enabling intrusion inspection on a firewall can reduce throughput performance by as much as 50 percent, which can have a significant impact on customer-facing Web applications, such as e-commerce and online banking, that require top performance but are often targeted by attackers. This can lead some enterprises to turn off critical security capabilities to improve performance, putting themselves and customers at risk.

No Need To Overprovision

“The Cisco Next-Generation Firewalls have been proven to be the most effective on the market, but we also know that businesses everywhere are struggling with a number of factors, including lack of talent and expanding attack surfaces, which can impact the effectiveness of even the best solutions,” said David Ulevitch, vice president and general manager at Cisco’s Security Business Group, in the statement. “The New Cisco Firepower 2100 Series addresses these challenges, making it easier for enterprises to manage their architecture and ensure that they have the best performance at all times.”

The purpose-built processing also helps enterprises by making it unnecessary for them to redesign their architectures to circumvent security bottlenecks, reducing the need to overprovision resources, while at the same time fostering deeper inspection levels, the company said.

“From preliminary testing, we’re seeing minimal impact on large packet firewall throughput when enabling intrusion inspection, SSL decryption, and other functions,” the company said. In fact, with IPS fully enabled, we see with large packets less than 1 percent throughput degradation to network traffic. Contrast that with the typical 50 percent or greater impact in competing designs.”

Tags: , ,

AddThis Social Bookmark Button

APAC digital transformation market to hit $16.5b by 2020: IDC – Data Center

February 26th, 2017 info@vpn-hk.com Posted in cloud computing, cloud hosting, Cloud Hosting Service, Data Center HK, Data Center Hosting, Digital Markering | No Comments »

APAC digital transformation market to hit $16.5b by 2020: IDC  – Data Center

technology earth globe ( America Map ) , Globe and internet cable against printed circuit board background

The digital transformation professional services market in Asia-Pacific excluding Japan is on track to grow at a CAGR of 21.9% between 2016 and 2020, reaching $16.5 billion, IDC predicts.

The growth is mainly driven by cloud-related digital transformation professional services, which are growing at a CAGR of 25.7%.

But the other segments of the market are also growing, with business analytics based services on track for a four-year CAGR of 20.3%, compared to 19.5% for mobility and 11.2% for social business.

IDC noted that while the digital transformation market can be divided into these two categories, the boundaries aren’t clear and there can be huge overlap of the four technologies within the services provided.

In APAC, 62% of organizations report adopting some form of digital transformation technologies. But while some major organizations have made good progress with deployment, others are only just starting the transformation journey.

“In spite of the spending in digital transformation professional services market levelling off, this market is continuing to grow in the region,” IDC APAC business and IT services director Sherrel Roche said.

“While the challenges around changing business processes, organizational structure, and people’s behavior still exist, end users are increasingly adopting DX services to provide better customer experience by leveraging the abundance of available data and digital commerce solutions, combining physical and digital channels, and investing in the automation and transformation of processes, to mention a few.”

She said for service providers to be successful in the region, they must intensify their focus on digital transformation, establishing a “digital” business unit focused on a customer’s end-to-end digital journey across the whole organization.

Another necessity is to create “innovation labs” combining the internal resources of an organization with technology vendors, start-ups, specialist consultancies and IT service providers.

Tags: ,

AddThis Social Bookmark Button