Name: BALASUBRAMANIYAN.R           e-mail id:  srkmilky@gmail.com

                                                                      Mobile no: 8124711406

Address:

                498,EAST STREET,

                SREEPURANTHAN,

                UDAYARPALAYM(T.K),

                ARIYALUR(D.T)-621701

 

Objective:

 

 

 

 

 

 

 

 

Educational Qualification:

 

 

S.no   Degree              Name of the                       year of                percentage

                                      Institution                          passing       

 

1.        B.E           JEPPIAAR ENG COLLEGE    2007-2011              75 %

                                    Chennai-119   

2.        H.Sc         P.R.G.Hr.Sec.school                 2005-2007               87.6%

                                   Kattumannar koil               

3.        SSLC        P.R.G.Hr.Sec.school                2004-2005                85%

                                   Kattumannar koil                

 

 

 

INPLANT Training:

                               1.Material Management,

                                  Neyveli  Lignite  Corporation,

                                   Neyveli

                             

                               2.SUN wind mill private company,

                                  Kaval kinaru,kanyakumari

 

EXTRA-CURRICULAR:  Reading books,

                                            paintings,

                                            poster design

CO-CURRICULR :           1. Ball badminton (divitional)

                                           2.NCC – “B”and “C” certificate

                                           3.Naval Annual Training Camp

                                            (INS SIVAJI mumbai and

                                              INS VALSURA-gujrath)

                                           4.Cycle Rally (Chennai to kanyakumari,1200 km)

                                           5.Cycle Rally (Chennai to velankanni,950km)

Personal profile :               

 

 Name:                                BALASUBRAMANIYAN.R

 Father’s  name :                  RADHAKRISHNAN.S

Date Of Birth :                     15-JUN-1988

Nationality     :                    INDIAN

Gender                  :         Male

Marital Status                 :         Single

Permanent Address       :         498,east street, 

                                                    Sreepuranthan(post),  

                                                     Udayarpalayam(talk)

                                                    Ariyalur(dt)-621701

Languages Known         :         English and Tamil

Hobbies                            :         playing chess, Traveling and Listening music

“I hereby declare that the above information's are true to best of my knowledge.”

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Asana (yoga)

Asana is a Body posture, it is a Sanskrit word used to describe a position of the body. Patanjali, the founder of Ashtanga Yoga defines asana as "Steady and comfortable posture". Traditionally many asanas are practiced in Hatha Yoga tradition, primirarily to achieve better physical and mental health. Asanas have deep impact on the entire body and mind complex, it affects different systems in the body like muscular, respiratory, circulation, digestive, excretory, reproductive, endocrine, nervous system. which  is currently practiced for exercise and as alternate medicine.

In the context of Yoga practice, asana refers to two things:

ude variations from lying on the back and standing on the head, to a variety of other positions. the Yoga sutras, Patanjali mentions the execution of an asana as the third of the eight limbs of Classical or Raja yoga.

The word asana in Sanskrit does appear in many contexts denoting a static physical position, although, as noted, traditional usage is specific to the practice of yoga. Traditional usage defines asana as both singular and plural

Third of the eight limbs

In the Yoga Sutras, Patanjali describes asana as the third of the eight limbs of classical, or Raja Yoga. Asanas are the physical movements of yoga practice and, in combination with pranayama or breathing techniques constitute the style of yoga referred to as Hatha Yoga.

                  In the Yoga Sutra, Patanjali describes asana as a "firm, comfortable posture", referring specifically to the seated posture, most basic of all the asanas. He further suggests that meditation is the path to samādhi; transpersonal self-realization.

The eight limbs are, in order, the

1.     Yama (The five "abstentions"): non-violence, non-lying, non-covetousness, non-sensuality, and non-possessiveness.

2.     Niyama (The five "observances"): purity, contentment, austerity, study, and surrender to god.

3.     Asana: Literally means "seat", and in Patanjali's Sutras refers to the seated position used for meditation.

4.     Pranayama ("Suspending Breath"): Prāna, breath, "āyāma", to restrain or stop. Also interpreted as control of the life force.

5.     Pratyahara ("Abstraction"): Withdrawal of the sense organs from external objects.

6.     Dharana ("Concentration"): Fixing the attention on a single object.

7.     Dhyana ("Meditation"): Intense contemplation of the nature of the object of meditation.

8.     Samādhi ("Liberation"): merging consciousness with the object of meditation.

 

 

Common practices

In the Yoga Sutras, Patanjali suggests that the only requirement for practicing asanas is that it be "steady and comfortable". The body is held poised, and relaxed, with the practitioner experiencing no discomfort.

When control of the body is mastered, practitioners free themselves from the duality of heat/cold, hunger/satiety, joy/grief, which is the first step toward the unattachment that relieves suffering. 

traditional practices for performing asana

§                     The stomach should be relatively empty.

§                     Force or pressure should not be used, and the body should not tremble.

§                     Lower the head and other parts of the body slowly; in particular, raised heels should be lowered slowly.

§                     The breathing should be controlled. The benefits of asanas increase if the specific pranayama to the yoga type is performed.

§                     If the body is stressed, perform Corpse Pose or Child Pose

§                     Such asanas as Sukhasana or Savasana help to reduce headaches.

§                     Some claim that asanas, especially inverted poses, are to be avoided during menstruation.

§                     Asanas are generally not performed on floor, but on Yoga mats instead.

§                     At the end of the yoga session one must do a deeper, final relaxation. Should not go for a sleep

Pranayama and asana

Pranayama

Pranayama, or breath control, is the Fourth Limb of ashtanga, as set out by Patanjali in the Yoga  Sutra. The practice is an integral part of both Hatha Yoga and Ashtanga Vinyasa Yoga in the execution of asanas.

describes pranayama as the control of the enhanced "life force" that is a result of practicing the various breathing techniques, rather than the exercises themselves. The entirety of breathing practices, those classified as pranayama, and other is called svarodaya, or the science of Breath. It is a vast practice that goes far beyond the limits of pranayama as applied to asana.

Surya Namaska

Surya Namaskara, or the Sun Salutation, is a form of worshiping Surya, the Hindu solar deity by concentrating on the Sun, for vitalization. The physical aspect of the practice 'links together' (Sanskrit: vinyāsa) twelve asanas in a dynamically expressed series. A full round of Surya namaskara is considered to be two sets of the twelve poses, with a change in the second set where the opposing leg is moved first. The asanas included in the sun salutation differ from tradition to tradition.

Benefits of practice

Physically, the practice of asanas is considered to improve:

§                     muscle flexibility

§                     tendon strength

§                     stamina

§                     better functioning of respiratory system

§                     empirical evidence suggests it helps control blood pressure and other issues related to the functioning of the circulatory system

§                     improvement in health problems related to stress

§                     It can aid in the improvement of concentration with school, in the workforce, and everyday activities.

§                     Can help with dieting and losing weight.

The emphasis on the physical part has given rise to the perception that yoga consists only of asana practice. A more esoteric intention is to facilitate the flow of prana (vital energy) to aid in balancing the koshas (sheaths) of the physical and metaphysical body.

Depending on the level of mastery, the practitioner of asanas is supposed to achieve many supernatural abilities. For instance, a yogi who has mastered Mayurasana will not be affected by eating any poison.

Variety of positions

66 basic postures and 136 variations of those postures.  "there are an infinite number of asanas, as an offering of devotion to his guru, Swami Kailashananda Maharaj. Through this effort, he compiled 1300 variations, derived from gurus, and yogis, as well as both ancient and contemporary texts.Although it is impossible to establish a complete and exact set of yoga postures, this work is considered a leading collection by students and yogis alike

Some common asanas

 

 

                              Standing Position - Yoga Postures or Asana in standing position

Stand erect with the feet quite close together heels and the big toes touching each other.

Hands touching thighs, this position helps achieve stability of pulse.
Stand erect with the feet quite close together heels and the big toes touching each other. Hands touching thighs, this position helps achieve stability of pulse.

 

List of Postures or Asana In Standing Position

 

Sitting Position - Yoga Postures or Asana in Sitting position
This is the sitting position with both legs together and stretched, toes erect, spine erect and both hands straight and palms resting on the floor

supine Position (Yoga Postures in Supine position)
Lie down on the back with legs together, straight extended, the toes erect and hands straight and palms resting on the floor.
 

Prone Position (Yoga Postures in Prone position)
In this position you lie down in prone on front side of the chest and abdomen with the chin on the floor. Both hands lying besides the thighs, and palms resting on the floor.

  •  

     

     

     

     

     

     

     

     

     

     

    Indo-Pakistani War of 1971 

     

    Strength

    India 

    India

    500,000 troops

    pakisthan

    Pakistan

    365,000 troops

    Casualties and losses

    3,843 killed [1]
    9,851 wounded[1]
    1 Frigate
    1 Naval Plane

    9,000 killed[2]
    4,350 wounded
    97,368 captured[3]
    2 Destroyers[4]
    1 Minesweeper[4]
    1 Submarine[5][6]
    3 Patrol vessels
    7 Gunboats

    The Indo-Pakistani War of 1971 was a military conflict between India and Pakistan. Indian and Bangladeshi sources consider the beginning of the war to be Operation Chengiz Khan, Pakistan's December 3, 1971 pre-emptive strike on 11 Indian airbases. However, Pakistan considers it to be a part of the overall Bangladesh Liberation War, in which India had been providing direct financial and military support for the Mukti Bahini Bengali rebels.

    During the course of the war, Indian and Pakistani forces clashed on the eastern and western fronts. The war effectively came to an end after the Eastern Command of the Pakista Military signed the Instrument of Surrender, following which East Pakistan seceded as the independent state of Bangladesh. Around 97,368 West Pakistanis who were in East Pakistan at the time of its independence, including some 79,700 Pakistan Army soldiers and paramilitary personne and 12,500 civilians were taken as prisoners of war by India.

    Naval hostilities

    In the western theatre of the war, the Indian Navy, under the command of Vice Admiral Kohli, achieved success by attacking Karachi's port in the code-named Operation Trident on the night of 4-5 December, which resulted in the sinking of the Pakistani destroyer PNS Khyber and a minesweeper PNS Muhafiz; PNS Shajehan was badly damaged. This resulted in tactical Indian success with Pakistan losing 720 sailors killed and wounded apart from losing reserve fuel and many commercial ships, thus crippling the Pakistan Navy's further involvement in the conflict. Operation Python followed Operation Trident which was on the night of 8-9 December ,  in which Indian rocket-armed motor torpedo boats attacked the Karachi Roads that resulted in further destruction of reserve fuel tanks, as well as the sinking of three Pakistani commercial ships in Karachi Harbour

    the eastern theatre of the war, the Indian Eastern Naval Command, under Vice Admiral Krishnan, completely isolated East Pakistan by establishing a naval blockade in the Bay of Bengal, trapping the Eastern Pakistani Navy as well as eight foreign merchant ships in their ports. From 4 December onwards, the aircraft carrier INS Vikrant was deployed in which its Sea Hawk fighter-bombers attacked many coastal towns in East Pakistan includingChittagong and Cox's Bazaar. Pakistan responded by sending the submarine PNS Ghazi to negate the threat. Though Indians claim to have laid a trap to sink the submarine, the Ghazi sank off Vishakapatnam's coast under unclear circumstances thus reducing Pakistan's control of Bangladeshi coastline[6] . But on 9 December, the Indian Navy suffered its biggest wartime loss when the Pakistani submarine PNS Hangor sank the frigate INS Khukriin the Arabian Sea resulting in a loss of 18 officers and 176 sailors. The damage inflicted on the Pakistani Navy stood at 7 gunboats, 1 minesweeper, 1 submarine, 2 destroyers, 3 patrol crafts belonging to the coast guard, 18 cargo, supply and communication vessels, and large scale damage inflicted on the naval base and docks in the coastal town of Karachi. Three merchant navy ships; Anwar Baksh, Pasni and Madhumathi and ten smaller vessels were captured. Around 1900 personnel were lost, while 1413 servicemen were captured by Indian forces in Dhaka. According to one Pakistan scholar, Tariq Ali, the Pakistan Navy lost a third of its force in the war.

    Air operations

    After the initial preemptive strike, PAF adopted a defensive stance in response to the Indian retaliation. As the war progressed, the Indian Air Force continued to battle the PAF over conflict zones[31], but the number of sorties flown by the PAF gradually decreased day-by-day. The Indian Air Force flew 4,000 sorties while its counterpart, the PAF offered little in retaliation, partly because of the paucity of non-Bengali technical personnel. This lack of retaliation has also been attributed to the deliberate decision of the PAF High Command to cut its losses as it had already incurred huge losses in the conflict. The PAF also did not intervene during the Indian Navy's raid on Pakistani naval port city of Karachi.

    In the east, the small air contingent of Pakistan Air Force No. 14 Sqn was destroyed, putting the Dhaka airfield out of commission and resulting in Indian air superiority in the east.

    Ground operations

    Pakistan attacked at several places along India's western border with Pakistan, but the Indian army successfully held their positions.[citation needed] The Indian Army quickly responded to the Pakistan Army's movements in the west and made some initial gains, including capturing around 5,500 square miles (14,000 km2) of Pakistan territory (land gained by India in Pakistani Kashmir, Pakistani Punjab and Sindh sectors was later ceded in the Simla Agreement of 1972, as a gesture of goodwill).

    On the Eastern front, the Indian Army joined forces with the Mukti Bahini to form the Mitro Bahini ("Allied Forces"); Unlike the 1965 war which had emphasized set-piece battles and slow advances, this time the strategy adopted was a swift, three-pronged assault of nine infantry divisions with attached armored units and close air support that rapidly converged on Dhaka, the capital of East Pakistan.

    Lieutenant General Jagjit Singh Aurora, who commanded the eighth, twenty-third, and fifty-seventh divisions, led the Indian thrust into East Pakistan. As these forces attacked Pakistani formations, the Indian air force rapidly destroyed the small air contingent in East Pakistan and put the Dhaka airfield out of commission. In the meantime, the Indian navy effectively blockaded East Pakistan.

    The Indian campaign employed "blitzkrieg" techniques, exploiting weakness in the enemy's positions and bypassing opposition, and resulted in a swift victory.[34] Faced with insurmountable losses, the Pakistani military capitulated in less than a fortnight. On 16 December, the Pakistani forces stationed in East Pakistan surrendered.

    Surrender of Pakistani forces in East Pakistan

     

    The Instrument of Surrender of Pakistani forces stationed in East Pakistan was signed at Ramna Race Course in Dhaka at 16.31 IST on 16 December 1971, by Lieutenant General Jagjit Singh Aurora, General Officer Commanding-in-chief of Eastern Command of the Indian Army and Lieutenant General A. A. K. Niazi, Commander of Pakistani forces in Bangladesh. As Aurora accepted the surrender, the surrounding crowds on the race course began shouting anti-Niazi and anti-Pakistan slogans. India took approximately 90,000 prisoners of war, including Pakistani soldiers and their East Pakistani civilian supporters. 79,676 prisoners were uniformed personnel, of which 55,692 were Army, 16,354 Paramilitary, 5,296 Police, 1000 Navy and 800 PAF.[36] The remaining prisoners were civilians - either family members of the military personnel or collaborators (razakars). The Hamoodur Rahman Commission report instituted by Pakistan lists the Pakistani POWs as follows:


    American and Soviet involvement

    The Blood Telegram

    The United States supported Pakistan both politically and materially. President Nixon and his Secretary of State Henry Kissinger feared Soviet expansion into South and Southeast Asia.[37] Pakistan was a close ally of the People's Republic of China, with whom Nixon had been negotiating a rapprochement and where he intended to visit in February 1972. Nixon feared that an Indian invasion of West Pakistan would mean total Soviet domination of the region, and that it would seriously undermine the global position of the United States and the regional position of America's new tacit ally, China. In order to demonstrate to China thebona fides of the United States as an ally, and in direct violation of the US Congress-imposed sanctions on Pakistan, Nixon sent military supplies to Pakistan, routing them through Jordan and Iran,[38] while also encouraging China to increase its arms supplies to Pakistan. The Nixon administration also ignored reports it received of the "genocidal" activities of the Pakistani Army in East Pakistan, most notably the Blood telegram. This prompted widespread criticism and condemnation both by Congress and in the international press.[11][39][40]

    When Pakistan's defeat in the eastern sector seemed certain, Nixon ordered the USS Enterprise into the Bay of Bengal. The Enterprise arrived on station on 11 December 1971. It has been documented that Nixon even persuaded Iran and Jordan to send their F-86, F-104 and F-5 fighter jets in aid of Pakistan.[41] On 6 December and 13 December, the Soviet Navy dispatched two groups of ships and a submarine, armed with nuclear missiles, from Vladivostok; they trailed U.S. Task Force 74 into the Indian Ocean from 18 December 1971 until 7 January 1972. The Soviets also had a nuclear submarine to help ward off the threat posed by USS Enterprise task force in the Indian Ocean.[42]

    The Soviet Union sympathized with the Bangladeshis, and supported the Indian Army and Mukti Bahini during the war, recognizing that the independence of Bangladesh would weaken the position of its rivals—the United States and China. The USSR gave assurances to India that if a confrontation with the United States or China developed, it would take counter-measures. This assurance was enshrined in the Indo-Soviet friendship treaty signed in August 1971.

     

     

     

 

Virtual Routers.doc Virtual Routers.doc
Size : 80 Kb
Type : doc

Storage virtualization is a concept in System Administration, referring to the abstraction(separation) of logical storage from physical storage. This separation allows the Systems Admin increased flexibility in how they manage storage for end users.

Address space remapping

Virtualization of storage helps achieve location independence by abstracting the physical location of the data. The virtualization system presents to the user a logical space for data storage and itself handles the process of mapping it to the actual physical location.

In a block-based storage environment, a single block of information is addressed using a logical unit identifier (LUN) and an offset within that LUN - known as a Logical Block Address (LBA). The address space mapping is between a logical disk, usually referred to as a virtual disk (vdisk) and a logical unit presented by one or more storage controllers. The LUN itself may be also a product of virtualization in a different layer.

Meta-data

The virtualization software or device is responsible for maintaining a consistent view of all the mapping information for the virtualized storage. This mapping information is usually called meta-data and is stored as a mapping table.

I/O redirection

The virtualization software or device uses the meta-data to re-direct I/O requests. It will receive an incoming I/O request containing information about the location of the data in terms of the logical disk (vdisk) and translates this into a new I/O request to the physical disk location.

Capabilities

Most implementations allow for heterogeneous management of multi-vendor storage devices, within the scope of a given implementation's support matrix. This means that the following capabilities are not limited to a single vendor's device (as with similar capabilities provided by specific storage controllers) and are in fact possible across different vendor's devices.

Replication

  • Remote data replication for disaster recovery

    • Synchronous Mirroring - where I/O completion is only returned when the remote site acknowledges the completion. Applicable for shorter distances (<200 km)

    • Asynchronous Mirroring - where I/O completion is returned before the remote site has acknowledged the completion. Applicable for much greater distances (>200 km)

  • Point-In-Time Snapshots to copy or clone data for diverse uses

    • When combined with thin provisioning, enables space-efficient snapshots

Disk management

The software or device providing storage virtualization becomes a common disk manager in the virtualized environment. Logical disks (vdisks) are created by the virtualization software or device and are mapped (made visible) to the required host or server, thus providing a common place or way for managing all volumes in the environment.

Enhanced features are easy to provide in this environment :

  • Thin Provisioning to maximize storage utilization

    • This is relatively easy to implement as physical storage is only allocated in the mapping table when it is used.

  • Disk expansion and shrinking

    • More physical storage can be allocated by adding to the mapping table (assuming the using system can cope with online expansion)

    • Similarly disks can be reduced in size by removing some physical storage from the mapping (uses for this are limited as there is no guarantee of what resides on the areas removed)

Benefits

Non-disruptive data migration

One of the major benefits of abstracting the host or server from the actual storage is the ability to migrate data while maintaining concurrent I/O access.

The host only knows about the logical disk (vdisk) and so any changes to the meta-data mapping is transparent to the host.

The process of moving the physical location is known as data migration Most implementations allow for this to be done in a non-disruptive manner, that is concurrently while the host continues to perform I/O to the logical disk (vdisk).

The mapping granularity dictates how quickly the meta-data can be updated, how much extra capacity is required during the migration, and how quickly the previous location is marked as free.

  •  

  • Moving data off an over-utilized storage device.

  • Moving data onto a faster storage device as needs require

  • Implementing a Information Lifecycle Management policy

  • Migrating data off older storage devices (either being scrapped or off-lease)

Improved utilization

Utilization can be increased by virtue of the pooling, migration and Thin Provisioning services.

When all available storage capacity is pooled, system administrators no longer have to search for disks that have free space to allocate to a particular host or server. A new logical disk can be simply allocated from the available pool, or an existing disk can be expanded.

Pooling also means that all the available storage capacity can potentially be used. In a traditional environment, an entire disk would be mapped to a host. This may be larger than is required, thus wasting space. In a virtual environment, the logical disk (vdisk) is assigned the capacity required by the using host.

Storage can be assigned where it is needed at that point in time, reducing the need to guess how much a given host will need in the future.

Risks

Backing out a failed implementation

 

Interoperability and vendor support

Meta-data management

Once virtualized, the meta-data are the glue in the middle. If the meta-data are lost, so is all the actual data as it would be virtually impossible to reconstruct the logical drives without the mapping information.

Complexity

Complexity affects several areas :

  • Management of environment : determination and fault isolation can also become complex, due to the abstraction layer.

  • Infrastructure design : Traditional design ethics may no longer apply

  • The software or device itself : Some implementations are more complex to design and code - network based, especially in-band (symmetric) designs in particular — these implementations actually handle the I/O requests and so latency becomes an issue.

  •  

 












Virtual Routers

Support for multiple Virtual Routers (VRs) is an important security virtualization capability in the integrated firewall/VPN security device. A virtual router is a separate routing instance within the security device, with its own routing protocol, settings, route table, and routing updates. Each virtual router participates in its own routing domain. Multiple virtual routers allow the single device to participate in multiple routing domains completely separated from each other.

This separation adds a critical element of security to the routing functionality of the security device. It does this by having different routing instances for say Trust and Untrust, that completely hides the internal network addresses and topology information from any outside or untrusted network segments e.g. the Internet or other internal subnet. In addition to having a virtual router for Trust and Untrust, (all NetScreen integrated firewall/VPN devices have at least two virtual routers) multiple virtual routers support additional routing instances for additional security domains, especially important for managed security services.

In addition to the security benefit mentioned above, virtual routers also provide general administrative domain separation of routing for improved scalability and control.

The way it works is that security zones are assigned to virtual routers. A zone can only belong to one virtual router, and multiple zones can be assigned to the same VR. Zones that share a virtual router are in the same routing domain and thus have layer-3 reachability amongst each other. Zones assigned to a particular virtual router must not have overlapping IP address space, while zones defined to different VRs can have overlapping IP space or even identical IP space. Layer-3 reachability between virtual routers must be explicitly configured in routing tables, in addition to being enabled via security policy of course.

By default there is a Trust-VR and an Untrust-VR, with the default configuration having all zones assigned to the Trust- VR to allow “out of the box” IP connectivity. (Note: Again, all traffic must also be specifically permitted by a security policy for any IP connectivity to occur.)


 

 

 

 

 

Multiple virtual routers also have a role to play in higher levels of virtualization in the NetScreen integrated firewall/VPN security solutions. While security zone functionality provides security segmentation, support for multiple virtual routers adds routing domain segmentation, that makes the device capable of supporting multiple truly separate domains within an enterprise, or among various customers in a Service Provider based managed security service offering.

A virtual router configured for use by one set of zones (or customer) is independent of other virtual routers of another set of zones (or customer). There is no exchange of routing information between virtual routers, and the routing updates from the one domain are not seen by the other domains. There is complete separation; that is unless the virtual routers are specifically configured to share information across with a static route or route export configuration. This is completely under administrative control.

Additionally, having multiple virtual routers adds the ability to support networks with overlapping IP address space, as long as the overlapping IP addresses/subnets belong to zones assigned to different virtual routers. Overlapping IP address space is quite common with multi-customer environments like a service provider, or large enterprise where acquisition or consolidation brings two previously separate entities together.

We have previously examined the basic building blocks of virtualization with VLAN based sub-interfaces, multiple security zones and multiple virtual routers. The combination of these capabilities creates the foundation for virtualized firewall and VPN services within a single device. It is the Virtual System or VSYS functionality that then adds the significant value in resource assignment, manageability and scalability of the virtualized system, especially important to larger scale implementations like a service provider offering network-based managed security services to it’s customers.

 

Virtual System (VSYS)

The NetScreen security systems can be logically partitioned into multiple firewall/VPN instances called Virtual Systems (VSYS), each with its own security zones, virtual routers, address book, policy rule set and management domain. It is t VSYS that segments a system into multiple security devices, and makes it practical to manage the multiple security domains that can range from the tens to hundreds. VSYS enables the single high performance security device to support multiple individual customers; leveraging the device cost and lowering overall total cost of ownership (TCO) with easier maintenance, management and support.

Once a custom VSYS has been created by the admin, it provides the logical segmentation to the system. Objects like address book entries, VPN tunnels, users, and policy rule set then get specifically created and modified under the contextual umbrella of the virtual system. The management interfaces are also specific to the VSYS being configured and managed-each VSYS appears as a discreet security device. This means that each distinct VSYS will have its own WebUI interface, and NetScreen Security Manager connections and views. Importantly, the administrator(s) of one VSYS are isolated to the configuration and operation of their own virtual system. This per VSYS management is crucial if customers are to be given a management interface into “their own” security system, and is also a necessity in environments where a single central administrator is responsible for configuring and maintaining a number of virtual systems in a complex multi-customer deployment.



Additional per-VSYS resource configurations include:

 

 

• Authentication mechanisms

• Dedicated log information

• Web Filtering

• Deep Inspection

• Mapped IPs (MIP)

• Dynamic IPs (DIP)

• User defined services

• User defined Zones

• User database

Incoming traffic can be classified into a VSYS based on source and/or destination of the following in information; VLAN, Interface, or IP address, giving great flexibility in how VSYS gets deployed

 

In addition to the one or more custom VSYS, there is a ROOT VSYS that is controlled and administered by a central, overarching security and system administrator, who can access and configure all of the custom VSYS specific resources, as well as manage any shared resources, such as the SHARED-UNTRUST zone, which is a commonly shared connection to the Internet used by multiple internal security zones. The ROOT VSYS administrator also controls the initial assignment of interfaces, zones, and virtual routers to the specific custom VSYS, and also sets up the specific VSYS administrative accounts. Alternatively, all virtual systems can remain under the administration of the service providers ROOT ADMIN control in centralized management environments

 

 

 

High security alert!!!

creation is going on.......   

The page cannot be found

The page you are looking for might have been removed, had its name changed, or is temporarily unavailable.

Please try the following:

  • If you typed the page address in the Address bar, make sure that it is spelled correctly.
  • Open the home page, and then look for links to the information you want.
  • Click the button to try another link.
  • Click search.gif (114 bytes)  to look for information on the Internet.


HTTP 404 - File not found
Internet Explorer

         

                                         so   please   move  next

page


















































 

























































                                                               n...................o....................o.....................o..................o.................. .