Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Guide to Computer Network Security
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Module 11: Designing Security for Network Perimeters.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NetTech Solutions Protecting the Computer Lesson 10.
A Network Security -Firewall Bruce Turin.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Welcome To : Group 1 VC Presentation
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
Cybersecurity Strategy
Guide to Computer Network Security
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
ISMS Information Security Management System
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
دیواره ی آتش.
Firewalls Chapter 8.
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at IHEP-Net

Outline  The Introduction  Why we need to improve IHEP-Net security protection capability  The measures we used –Firewall & VPN –Anti-Virus system –Anti-Spam system –The security control and management center –Emergency Response Team  Summary Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 2

The Introduction IHEP was the first to connect the computers to Internet in China at the beginning of 90s of last century The outlet bandwidth is 10M IHEP-Net backbone is Gigabit Ethernet The intranet bandwidth connected to each host is 100M The intranet has a star structure with a main switch connected to each laboratory Switch-based network There are more than 2000 hosts, many servers based on PC/Linux, Win2000,etc. IHEP-Net is for Providing computing environment for BESII and BESIII experiments Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 3

The Current Topology of IHEP-Net Main Building 2ndfloor Computerlab Big hammer6808 Main Building 2nd floor hammer CSTNE T Physics Building 2ndfloor Computerlab Big hammer6808 Chemistry Building 2nd floor hammer Physics building 2nd floor hammer Main Buileing 5th floor hammer Main Buileing 5th floor hammer Main Building 2nd floor hammer Main Building 426 Bes farm cisco catalyst3750 Physics building 2nd floor hammer Blue line 100TX Purple line 100FX 1000LX PC-FARM BES - FARM Computing Center SSR SX First Hall ELS100 Second Hall Library Building Report Building Online Building Computing center Cisco3640 Third hall ssr2000 Orb lab ssr2000 Bes Center control SSR2000 Twelfth Hall Second workshop SSR2000 Fourth Hall Fifth Hall Sixth Hall thirteenth Hall 4

 Before 2002, The firewall system was too simple It was easy to be attacked by hackers There was no anti-virus system There was no anti-spam system The Security problem is one of the important issues at IHEP-net At the end of 2001, the network security group was organized in the computing center of IHEP to enact the security policy and strategy against the attacks and improve the IHEP-Net security Why need to improve IHEP-Net Security Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 5

The measures to improve IHEP-Net Security Re-Constructed IHEP-Net infrastructure: –IHEP-Net consists of 3 areas: one intranet, one DMZ and one special hosts area Re-Configured Firewall system: –Some servers and some special hosts move to DMZ and SA. –The new rules to control the access among Internet, the intranet, DMZ and special hosts area IDS (An intrusion detection system) –work with firewall so that all of packets from outside IHEP are checked and filtered VPN at IHEP-Net –Access to the hosts inside of IHEP from outside must be via FW or VPN Anti-Spam system Anti-Virus System The network security control and management center The emergency response team Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 6

The Security Protection System of IHEP-Net Internet Security Scanner System Administration platform Anti-virus,Anti- spam system DMZ Special using machine LAN The SOC of IHEP-Net Security Policy Administrator System Security Incident Response Team Monitor system —— Forensic agent —— Trap system —— survive system —— IDS agent —— backup system Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 7

The Secure IHEP-Net  Firewall system  VPN system  Access the hosts inside of IHEP from outside of IHEP must be via FW or VPN Interne t Intranet VPN DMZ SA FW Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 8

The Firewall System  Firewall system Has been reconfigured prevent unauthorized access to our network from other networks Control the access among Internet, intranet, DMZ and special hosts area Some servers and some special hosts move to DMZ and SA. Access each other among Internet, intranet,DMZ and SA are allowed as rules The intranet consists of the o The isolated hosts, which are not allowed to access Internet, just access the hosts inside IHEP o The hosts,which access Internet via NAT o The host outside of IHEP cannot connect to intranet directly Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 9 Internet Intranet DMZSA

The VPN System  VPN system The hosts outside of IHEP access IHEP intranet via FW or VPN VPN server + PPTP as a tunneling protocol Clients OS: Win2000/XP/2003/Linux Authentication USBKEY authentication The only IP address is assigned to the client host VPN server also have packet filtering function Control the access level of each VPN account through packet filtering rules Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 10

The Anti-Virus System  Anti-Virus Wall at gateway level provides real-time virus detection and cleanup for all SMTP,HTTP and FTP Internet traffic at gateway.  Desktop Anti-Virus system Desktop anti-virus system: offers centralized virus protection to all the Windows OS across the network Server/Client structure Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 11

 For SMTP –All s sent and received are filtered by this system –To support outbound mail processing, specify your local domains. –Enable anti-relay  Using web proxy to filter viruses for HTTP traffic  Using FTP proxy to filter viruses for FTP traffic. This system can acts as a file transfer proxy itself. The topology of Anti-Virus System at Gateway Interne t FW Route Anti-Virus system at gateway for SMTP, HTTP, FTP Web proxy server Mail Servers Clients Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 12

Refusing access from the IP address that attack the IHEP-Net at firewall All s sent and received must be filtered by this system The anti-spam gateway is the only host sending s to Internet and receiving s from Internet Low filtering level is used normally in order not lose s Spam mails decrease significantly The topology of Anti-Spam System at Gateway Interne t FW Route Anti-Spam system at gateway Mail Servers Clients Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 13

 The anti-spam system work well with anti- virus system together so that all of s sent and received are filtered by anti- spam system and anti-virus system. This makes it possible that the amount of spam s reached to users mail boxes are as low as possible and no virus mails reach to users mail boxes. Anti-Spam and Anti-Virus Work Together Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 14

Some home-made software to Make statistics and analyze the network flux Detect and monitor the hosts that have exceptional flux Detect and monitor the hosts that scan other hosts and give response disconnect the host from the network if the hosts have security problem and cause the network does not work Connection is refused to mail server for the hosts that spread virus mails The Security Control and Management Center Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 15

The Emergency Response Team  Security problem response team for locale service –Respond to security problem (system/application) Cleanup virus for the host that is infected virus Patch their system Scan system leak for hosts, etc  The technique support methods –Hotline –Helpdesk system for users to submit service via webpage –Mail system for users to get our help Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 16

 Now, We successfully –prevent attacking from outside and inside –prevent virus spread –Reduce spam dramatically –Respond and deal with security problems of local users  The IHEP-Net is becoming more and more secure  In the future, We should also consider that: –The VPN connection among IHEP-Net –Users can choose their own spam filtering level –The capability of the firewall system and SOC need to be improved Summary Interlaken,Switzerland CHEP2004, 30 September Lanxin Ma 17