Accelerator Controls Brad Cumbia Anthony Cuffe December 1, 2010 Remote Access Review.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Connect communicate collaborate DRAFT ON NETWORK MANAGEMENT ARCHITECTURE Esad Saitovic, Ivan Ivanovic AMRES Network monitoring workshop for GN3/NA3/T4.
1 Facilities Control Systems Carroll W. Jones December 1, 2010 Remote Access Review.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Accelerate Your Business RP IaaS (Infrastructure as a Service) IaaS.
04/07/06 DePaul University - Teaching and Technology Conference Remote Networking Labs for Hands-on Exercises James Yu, Ph.D. Scholl of CTI DePaul University.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Jefferson Lab Remote Access Andy Kowalski December 1, 2010.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Sample Diagram.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Course 201 – Administration, Content Inspection and SSL VPN
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Networking Technologies
TRD 1: NMRbox Development
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Windows 7 Firewall.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Remote Operation of Light Source Beamlines with (Free)NX Zhijian Yin, Peter Siddons, NSLS, BNL Controls at NSLS Facility Beamlines What Is NX, FreeNX Cybersecurity.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Chapter 3: Authentication, Authorization, and Accounting
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Module 10: Providing Secure Access to Remote Offices.
Configuring AAA Kamyar Miremadi Laila Sherif Summer 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Controls Group Web-Enabled Medm Matt Bickley. Controls Group On-Call Support Controls staff provides support 24/7 Home computers are provided by the lab.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
HDice Michael Lowry December 1, 2010 Remote Access Review.
Cryogenics Group Jonathan Creel December 1, 2010 Remote Access Review.
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
LO2 Understand the key components used in networking.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Installation Guacamole Is a web application that provides access to desktop environments using remote desktop protocols (such as VNC or RDP); Installation.
Getting Connected to NGS while on the Road…
Chapter 1 Introduction to Networking
Virtual Private Networks
Working at a Small-to-Medium Business or ISP – Chapter 8
INTEGRATING LINUX WITHIN A CORPORATE ENVIRONMENT Kai Ponte
XWN740 X-Windows Configuring and Using Remote Access
Note: All Public IPs are from Same Range ISP Router
Chapter 1: Exploring the Network
Chapter 4: Access Control Lists (ACLs)
Unit 27: Network Operating Systems
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Getting Connected to NGS while on the Road…
Network Hardware and Protocols
CEBAF Control System Access
Firewalls Chapter 8.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Global One Communications
Presentation transcript:

Accelerator Controls Brad Cumbia Anthony Cuffe December 1, 2010 Remote Access Review

Accelerator Controls Identify Lab systems in your area that are remotely accessed or will be in the near future - Network Systems (Network Administrators) - Switches - Routers - Management systems (Cisco Works, Network Node Manger, etc..) - Accelerator Control Systems (On-Call Personnel and Administrators) - IOCs (On-call and Administrators) - Unix systems (On-call and Administrators) - Windows systems (All users) - Web servers (All users)

Accelerator Controls Explain how your systems are remotely accessed from - Network Systems - on-site - Access via ssh protocol only (from Linux and Windows) - Authentication control by TACACS+ Server (Cisco ACS) - ACLs for finer access restrictions - Network Systems - off-site - Access via ssh protocol through login.jlab.org and then Accel system - Equivalent to on-site after authenticating

Accelerator Controls Cont. - Accelerator Control Systems - on-site - Access to Unix systems via ssh protocol (terminal) - Access to Unix desktop via NXclient over ssh - Access to Windows systems via rdp protocol - Access to IOCs via dedicated Terminal Servers (ssh only) - Accelerator Control Systems - off-site (through login.jlab.org) - Access to Unix systems (terminal) via ssh protocol w/tcp wrappers - Access to Unix desktop via NXclient tunneled over ssh - Access to Windows systems via rdp protocol tunneled over ssh - Access to IOCs via dedicated Terminal Servers (ssh only) - Access to Web servers via a proxy server tunneled over ssh

Accelerator Controls Cont. - Global Measures - Write Access to IOCs controlled by Channel Access (host and user) - tcp wrappers employed widely to restrict access to systems. - Network level ACLs blocking protocols and restricting access to systems. - Procedures - How to Access Internal Web servers from Off-Site - - How to Open A Remote Windows Desktop - ndows - How to Open A Remote Linux Desktop - ux

Accelerator Controls Describe future plans or needs for enhancing/upgrading remote access, e.g. changed systems, different controls, access for PDAs, etc. - Extended use of NXclient (Linux Desktop) over RDP (Windows Desktop). - Develop remote access procedures and tools for smart phones and tablet devices. - Stronger ACLs with hardware based firewalls.

Area Comments