VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.

Slides:



Advertisements
Similar presentations
Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Advertisements

The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Firewalls and Intrusion Detection Systems
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Presented by Serge Kpan LTEC Network Systems Administration 1.
RIT Campus Data Network. General Network Statistics Over 23,000 wired outlets Over 14,500 active switched ethernet ports > 250 network closets > 1,000.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wi-Fi Structures.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Hardware & Software Needed For LAN and WAN
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Computer Networks IGCSE ICT Section 4.
Computer Networking Devices Seven Different Networking Components.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
Networking Components Mike Yardley LTEC 4550 Assignment 3
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Common Devices Used In Computer Networks
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
Network Components and their functions By Travis Halsell LTEC 4550 – 020.
Module 14: Configuring Server Security Compliance
Hub  A hub is a piece of hardware that connects multiple wired devices together on a single network. Hubs work at the physical layer (layer 1) of the.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
EDUCAUSE & Internet2 Security Professionals Conference The Challenge: Securing a Large Multicampus Network Kirk Kelly – Pima Community College Scott Ferguson.
N ETWORKING C OMPONENTS A-3 LTEC 4550 by Joe Garcia.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Background Info - The state of the campus telecommunications infrastructure in December 2001.
Basic Network Gear Created by Alex Schatz. Hub A hub is a very basic internetworking device. Hubs connect multiple machines together and allow them to.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
Networking Components By: Timothy O’Grady. Ethernet Hub Ethernet hubs link PC’s and peripherals and allow them to communicate over networks. Data transferring.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Update on Campus Networks December 2009 Bruce Campbell Director, Network Services Information Systems and Technology.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Computers Are Your Future Eleventh Edition
Georgia Tech Information Security Campus Architecture for ECE6612 November 2, 2005 Peter N. Wan Senior Information Security Engineer Office of Information.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Module 11: Designing Security for Network Perimeters.
Network Components By Cameron Baker.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
Network Equipment Assignment 3 LTEC 4550 Aaron Whitaker.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Networking Components
CERN Campus Network Infrastructure Specificities Jean-Michel Jouanigot Campus Network Leader CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH EUROPEAN LABORATORY.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Network System Security - Task 2. Russell Johnston.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Computer Networking Devices
Presentation transcript:

VolNet2 Bill White Network Services

September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols are widely used Insecure protocols used on the wireless network for financial transactions Proliferation of virus activity Lack of network authentication

September 20, 2004OIT Fall Staff Meeting Goals for Volnet2 Provide a layered approach to security Encourage use of secure protocols and anti-virus software Apply filtering per port for every customer Continue anti-spoofing access control in the core Provide virus and DoS protection at our borders Continue to filter TCP/UDP ports at our border Provide a more redundant firewall solution for server sanctuaries and special applications Upgrade our Wireless infrastructure

September 20, 2004OIT Fall Staff Meeting Core Upgrades New supervisor modules provide 10 Gbps core connections IPv6 will be implemented campus-wide SNMPv3 supported for secure communications with HP OpenView Redundant supervisor modules installed on OIT core server switch Mitigation of DoS attacks on core routers

September 20, 2004OIT Fall Staff Meeting Intrusion Prevention Systems Blocks virus-related traffic at wirespeed Blocks common attacks like DoS Digital Vaccines are automatically updated (sometimes faster than McAfee) 2 Gbps throughput Will be placed on the dorm network between the Internet and the rest of campus Will be placed on the Faculty/Staff network

September 20, 2004OIT Fall Staff Meeting Firewalls New Juniper/Netscreen firewalls were installed November 18 Firewalls are ASIC based with 12 Gbps performance and can process 1,000,000 concurrent sessions Can support 24 Gigabit or 72 10/100 ports Firewalls will support the SAP/IRIS subnet, OIT server segments, and other special projects Redundancy (core routers via HSRP, firewall chassis via NSRP, interfaces, and new switch redundancy)

September 20, 2004OIT Fall Staff Meeting Wireless Upgrades Rogue Access Point detection 802.1x network authentication for those Operating Systems that support it (gateways used for others) Encrypted traffic from the client to the AP “G” kit upgrade will double the capacity Wireless network will be segmented The project started on October 1 and ends Jan. 12

September 20, 2004OIT Fall Staff Meeting Building Rewires Buildings that still have COAX cabling will be rewired as originally mandated by the first Volnet project

September 20, 2004OIT Fall Staff Meeting Edge Switch Upgrades Can provide 1 Gbps to desktops in high traffic buildings SNMPv3 supported for secure communications with HP OpenView Can apply ACLs to every Ethernet port on campus to help control virus activity and machines from becoming the gateway BPDU Guard to block PCs from bridging wireless and the wired network 802.1x network authentication can be implemented for those Operating Systems that support it Can apply per port rate-limiting on P2P applications

September 20, 2004OIT Fall Staff Meeting Time Line The wireless upgrade has already started and will finish in December The Netscreen firewalls were installed this past week Intrusion Prevention Systems will be installed in January The new supervisor modules for our core routers will be installed in December 2 new core nodes will be purchased and installed in June of 2005

September 20, 2004OIT Fall Staff Meeting Time Line continued The edge switch installations will start in November of this year and will take approximately 20 months to complete Additional firewalls will be installed as required by special security projects Building rewires will continue for several years

September 20, 2004OIT Fall Staff Meeting Questions or Concerns Check the Volnet2 volnet2.utk.edu Send to