Secure High Performance Networking at BNL Winter 2013 ESCC Meeting John Bigrow Honolulu Hawaii.

Slides:



Advertisements
Similar presentations
Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Advertisements

Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Business Solutions Network Security Solutions Gateway Security
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
IS Network and Telecommunications Risks
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
COEN 252: Computer Forensics Router Investigation.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Network Perimeter Security Yu Wang. Main Topics Border Router Firewall IPS/IDS VLAN SPAM AAA Q/A.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Firewall Typical Networking and Troubleshooting Common Faults.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
What is FORENSICS? Why do we need Network Forensics?
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
The Security Aspect of Social Engineering Justin Steele.
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Windows 7 Firewall.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
 Lecturer : Ch. Nabeel Ahmed Superior University Grw Campus 1.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
US LHC Tier-1 WAN Data Movement Security Architectures Phil DeMar (FNAL); Scott Bradley (BNL)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Brookhaven Science Associates U.S. Department of Energy 1 Network Services BNL USATLAS Tier 1 / Tier 2 Meeting John Bigrow December 14, 2005.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
BNL PDN Enhancements. Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
OVERVIEW OF ACTIVE DIRECTORY
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Brookhaven Science Associates U.S. Department of Energy 1 Network Services LHC OPN Networking at BNL Summer 2006 Internet 2 Joint Techs John Bigrow July.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
The sign of success.
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Chapter 4: Routing Concepts
Introduction to Networking
Computer Technology Notes #4
Unit 27: Network Operating Systems
Firewalls Purpose of a Firewall Characteristic of a firewall
Chapter 10: Advanced Cisco Adaptive Security Appliance
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Secure High Performance Networking at BNL Winter 2013 ESCC Meeting John Bigrow Honolulu Hawaii

Objectives:  Highlight the BNL security techniques for RHIC and ATLAS Current Architecture User Access and Controls Configuration Management Vulnerability Scanners Autoblocker  Illustrate our proposed 100gb/sec Science DMZ 100 gb/sec. full mesh architecture 100 gb/sec. production migration

Dark Fiber Deployment  Dedicated fiber infrastructure  Protected ring topology A North Shore and South Shore loop South Shore has mid-span repeater North Shore Point-to-Point (BNL - NYC)  Lots of dark strands (spares) available  Classical Routing and Light Path connections

Basic Architecture  Dedicated security appliances are not available ES net modified “Science DMZ” configuration Separate data and control channel networks - WAN NIC – can’t firewall here - Campus NIC – can firewall here Host-based firewall (IP tables) on dCache servers (WAN)  Policy Based Routing (PBR) on ATLAS links Default Free Routing for High Performance Links PBR for others (reverse logic)  Autoblocker (router ACL) on Internet interfaces Minimal block is 4 hours

Basic Architecture cont.  Dedicated High Bandwidth Links Directly connected to border routers - Virtual Gateway (HSRP) for fault tolerance No network-based access controls on data path - No Firewall or Router ACL’s Secure the “Control Channel” - Firewall or Load Balancer - Host based ACL’s

Basic Architecture cont.  Tiered Firewall Architecture for BNL Campus Access PDN Firewall / Proxies - Access is either firewalled or proxied - Load Balancer on PDN Proxies - One IP address / service - Limits outside access into BNL - Secures ATLAS control channel Internal Firewalls / Proxies - Access is either firewalled or proxied - Limits intra-campus access into RHIC / ATLAS - Slightly more liberal access controls

RHIC ATLAS Internal Architecture  Internal Access Access is either firewalled or proxied Limits intra-campus access into RHIC – ATLAS Slightly more liberal access controls than PDN

User Authentication  Internal RHIC / ATLAS Access User access is either firewalled or proxied Kerberos authentication Active Directory for Windows environment Centrify Active Directory for Unix X.509 Certificates for grid SSH Keys Local Accounts

Configuration Management  RHIC / ATLAS uses Puppet  ITD uses CFEngine and RedHat Satellite Server  ORDO in-house tool for host configuration Collects config files and s them to the ordo master Runs on multiple Unix-like OS’s

Vulnerability Scanners  Both External and Internal scanners External scans are more intensive Must pass scans to maintain firewall conduit Quarterly, daily and continuous scanning - Quarterly are the most intensive - Continuous for high risk vulnerabilities

Autoblocker  Pseudo real-time dynamic ACL generator Emulates a network engineer manually configuring an ACL - ACL blocks at the Generic Internet links - Time-based penalty box with cumulative sentence Data sources include - Netflow / Sflow records - Centralized System Log Analysis applications - Manual additions and deletions

100gb Science DMZ Entry Level  100gb/sec Provides native 100gb/sec. interfaces LR-4 2 port layer-3 cards Can interface to ANI and Production waves Ether channel between Nexus units 2 attachment ports at 100gb/sec

100gb Science DMZ Full Blown  100gb/sec full mesh Provides native 100gb/sec. intefaces Can interface to ANI and Production waves Supports multiple 10gb/sec. and 40gb/sec. connections 2 attachment ports at 100gb/sec.

??? Thank You