WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.

Slides:



Advertisements
Similar presentations
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Advertisements

1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
UNITS meeting September 30, 2004 Network Security Roger Safian
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
COEN 252: Computer Forensics Router Investigation.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Security Guidelines and Management
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
EDUCAUSE Security 2006 Internet John Brown University.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Virtual Company Group 8 Presentation Date: June /04/2017
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Vantage Report 3.0 Product Sales Guide
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
Security at NCAR David Mitchell February 20th, 2007.
Firewalls Julie Petrusa S.A.M. Matiur Rahman Carlo Mormina.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
12/1/2015Faculty : Trần Thị Ngọc Hoa1 ISA server Overview 1. Introducing ISA Server 2. Deployment Scenario for ISA Server.
Module 11: Designing Security for Network Perimeters.
WINS Monthly Meeting www2.widener.edu/wins 10/12/2007 www2.widener.edu/wins
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
WINS Monthly Meeting 10/1/2004 WINS Monthly Meeting 10/1/2004.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /03/2009 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /05/2008 www2.widener.edu/wins
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004.
WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 www2.widener.edu/wins.
WINS Monthly Meeting www2.widener.edu/wins 5/5/2006 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 www2.widener.edu/wins.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /04/2011 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /02/2008 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins 2/4/2005 WINS Monthly Meeting www2.widener.edu/wins 2/4/2005 www2.widener.edu/wins.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
WINS Monthly Meeting www2.widener.edu/wins 10/05/2006 www2.widener.edu/wins
WINS Monthly Meeting 4 /2/2004 WINS Monthly Meeting 4 /2/2004.
WINS Monthly Meeting www2.widener.edu/wins 03/02/2007 www2.widener.edu/wins
WINS Monthly Meeting 02/07/2003 WINS Monthly Meeting 02/07/2003.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Defining Network Infrastructure and Network Security Lesson 8.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
CompTIA Security+ Study Guide (SY0-401)
NET 536 Network Security Firewalls and VPN
CONNECTING TO THE INTERNET
Backdoor Attacks.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
WINS Monthly Meeting www2. widener. edu/wins widener
Welcome To : Group 1 VC Presentation
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
ISMS Information Security Management System
IS 4506 Server Configuration (HTTP Server)
Chapter 4: Protecting the Organization
WINS Monthly Meeting www. widener. edu/wins internet2
Global One Communications
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003

Agenda Introductions Introductions DCIU Move Update DCIU Move Update Management Resources Part 1 Management Resources Part 1 Management Resources Part 2 Management Resources Part 2 Management Resources Part 3 Management Resources Part 3 Management Resources Part 4 Management Resources Part 4 Nortel 8600 Upgrade Nortel 8600 Upgrade Port Scans Anyone? Port Scans Anyone? Question & Answers Question & Answers

Introductions Name Name Title Title Location Location

DCIU Move Update William Penn Secondary is live William Penn Secondary is live Ridley Secondary not yet live Ridley Secondary not yet live June 21 st – Moving the Old DCIU blg 8600 to new building. Only effects the 10.10, new net and DCIU remote sites. DCIU DNS will be down during move. June 21 st – Moving the Old DCIU blg 8600 to new building. Only effects the 10.10, new net and DCIU remote sites. DCIU DNS will be down during move. CCIU connection will be removed CCIU connection will be removed

Management Resources Part 1 What’s Up Gold - Provides real time status and E Mail notification of network devices. or What’s Up Gold - Provides real time status and E Mail notification of network devices. or WINS FTP Server – Provides a place to store and retrieve software. ftp:// or ftp:// WINS FTP Server – Provides a place to store and retrieve software. ftp:// or ftp:// ftp:// ftp:// ftp:// ftp:// CfReporter – Provides Internet traffic usage information. CfReporter – Provides Internet traffic usage information. Concord Health – Provides fiber backbone bandwidth utilization. Concord Health – Provides fiber backbone bandwidth utilization.

Management Resources Part 2 WINS Web Page : WINS Web Page : Yipes Bandwidth : Internet Bandwidth Usage ( 45M ) - Select Customer Care Login Name : Widener-OW-1JL Password : 459widener Yipes Bandwidth : Internet Bandwidth Usage ( 45M ) - Select Customer Care Login Name : Widener-OW-1JL Password : 459widener SNIP Bandwidth : Internet Bandwidth Usage ( 25M ) ID : Password : aav4c9fn SNIP Bandwidth : Internet Bandwidth Usage ( 25M ) ID : Password : aav4c9fn I2 Bandwidth : Internet2 Bandwidth Usage ( 10M ) name : widener pwd : Aliw!0987 I2 Bandwidth : Internet2 Bandwidth Usage ( 10M ) name : widener pwd : Aliw!0987

Management Resources Part 3 Shasta Firewall : Internet Firewall Services. Accessible only to Widener Staff. Customized for each school district. Shasta Firewall : Internet Firewall Services. Accessible only to Widener Staff. Customized for each school district. Caching Server/Content Filter : Internet Caching and Content Filtering. Accessible only to Widener Staff. Customized for each school district. Caching Server/Content Filter : Internet Caching and Content Filtering. Accessible only to Widener Staff. Customized for each school district. Remote Access : Internet VPN access via Shasta. One account per school district. Configured only by Widener Staff. IPSEC Client software. Remote Access : Internet VPN access via Shasta. One account per school district. Configured only by Widener Staff. IPSEC Client software.

Management Resources Part 4 Nat Services : Making Internal resources available to the Internet. Accessible only to Widener Staff. Customized for each school district. Configured in Cisco Router ( ). Nat Services : Making Internal resources available to the Internet. Accessible only to Widener Staff. Customized for each school district. Configured in Cisco Router ( ). Intrusion Detection : ISS Real Secure Console and probes detect hacking attempts and Virus infected PC’s. Only accessible by Widener Staff. Intrusion Detection : ISS Real Secure Console and probes detect hacking attempts and Virus infected PC’s. Only accessible by Widener Staff. Intrusion Prevention : Top Layer Attack Mitigator stops malicious behavior and Virus infected PC’s. Only accessible by Widener Staff. Intrusion Prevention : Top Layer Attack Mitigator stops malicious behavior and Virus infected PC’s. Only accessible by Widener Staff.

Nortel 8600 Upgrade Upgrade from Version to Upgrade from Version to Latest software Latest software Outage 30 minutes max… Outage 30 minutes max… Please provide me with good date and time??? Please provide me with good date and time???

Port Scans Anyone? Wondering what ports are open on your servers? Wondering what ports are open on your servers? Give me your server IP address and I will run a port scan of ports 1 – 1000 and a list of Hack Ports. Give me your server IP address and I will run a port scan of ports 1 – 1000 and a list of Hack Ports.

Questions & Answers Skipping meeting in July! Skipping meeting in July! Next Meeting Thursday Aug 7 th ! Next Meeting Thursday Aug 7 th ! Have a GREAT Summer! Have a GREAT Summer!