beautypg.com

Google Networking Best Practices for Large Deployments User Manual

Page 4

background image

4

Networking Best Practices for Large Deployments

Network Addressing and Protocols ..................................................................... 19

Google IPv4 Addresses ................................................................................ 19
Google Host Names...................................................................................... 20
Google Global Cache.................................................................................... 20
Google Protocols........................................................................................... 21
Google Talk Voice and Video and Google+ Hangouts ................................. 21

Network Routing .................................................................................................. 22

WAN Optimization......................................................................................... 22
Traffic Prioritization ....................................................................................... 23
Peering.......................................................................................................... 23
Network Routing Tools.................................................................................. 24

Proxy Servers ...................................................................................................... 24

Proxy Server Configuration ........................................................................... 24
Filtering Google Apps traffic through a Proxy ............................................... 25
Proxy PAC file configuration ......................................................................... 25
SSL Inspection .............................................................................................. 26
Blocking Access to Google Consumer Services ........................................... 26
Monitor URI Filtering ..................................................................................... 27
Proxy Configuration Tools............................................................................. 28

Other Network Services....................................................................................... 28

DNS Resolution............................................................................................. 29
Firewall Configuration ................................................................................... 30
Mail Routing .................................................................................................. 31

Chapter 7: Client Configuration ....................................................................... 33
Summary ............................................................................................................. 33
Client Access....................................................................................................... 33

Browser Requirements.................................................................................. 33
Mobile............................................................................................................ 34
Google Drive Sync Client .............................................................................. 36

Authentication...................................................................................................... 36

Single Sign-On .............................................................................................. 36
Authentication Tools...................................................................................... 38

Migration.............................................................................................................. 38

Server-side Migration .................................................................................... 39

Chapter 8: Network Monitoring ........................................................................ 41
Summary ............................................................................................................. 41
Monitoring Tools .................................................................................................. 41
Network Packet Captures.................................................................................... 42