Closing SFSU border firewall Prepared by E.Rayz DoIT Network Services Coordinator February 14, 2012.

Slides:



Advertisements
Similar presentations
Common Timetabling Platform Project Update January 2009.
Advertisements

1 Conference Etiquette 1 Video Attendees: - Please mute your microphones until you are ready to ask a question. On Site Attendees: - Please mute your cell.
Module 5: Configuring Access to Internal Resources.
Clarity Educational Community Clarity Educational Community Integration Interface Strategies and Methods.
Senior Design Lab Policies Presented by: Trey Murdoch CSC IT Staff.
Technology Update TSAG Meeting 9/12/02. Announcements: Mandatory Password Changes Coming in October! (Postponed) End of BootP (November 1) DNS Cleanup.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Technology Update TSAG Meeting 3/13/03. Announcements: Disaster Recovery Test:[Bill]  (2/18-19) Networking Infrastructure: DNS, DHCP, Authentication.
Technology Update TSAG Meeting 2/13/03. Announcements: Self-Service Account Utility Available Disaster Recovery Test:  (2/18-19)
University of Michigan Administrative Information Services Merit Information HRMS Unit Liaison Meeting June 15, 2007.
University of Michigan Administrative Information Services 2006 Merit Information HRMS Unit Liaison Meeting May 19, 2006.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
BADGER 3-8 EXAM : Wisconsin Smarter Assessment Updates & Resources 02/20/2015.
Update and Discussions on Technology Initiatives TSAG Meeting 4/11/02.
Payment Card Industry (PCI) Data Security Standard
SSL From Your Smartphone Support for Android Smartphones /
1 Enabling Secure Internet Access with ISA Server.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
TMDE Web Site Ed Chergoski NAVSEA 04L52 4 November 2003.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Python and more Spring 2004: Intro & Python Larry Rudolph Administration Check the wiki daily; please contribute Pick.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Clarity Educational Community Get the Results You Need When You Need Them Transitioning to CA PPM On Demand Presented by: Joshua.
Computation for Physics 計算物理概論 Introduction to Linux.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 6: Packet Filtering
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Presented by: Eric Rosenberg – Student Manager Client Support Behzad Barzideh – Network Manager Stony Brook Remote Support For Students.
Mr C Johnston ICT Teacher
Access Control List ACL. Access Control List ACL.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
Beginning Network Security Monitor and control flow into and out of the LAN Ingress Egress Only let in the good guys Only let out the corp. business.
Sudarshan Yadav Sr. Program Manager, Microsoft
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Data Communications and Networks
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
HOW I SURVIVED AIST2330 AND LEARNED TO LOVE SERVER ADMIN Fall 2015 Edition.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
System Migration to the PCI Environment BRIAN BENINGA, INFORMATION SECURITY ARCHITECT NOVEMBER 12, 2015.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
Senior Design Lab Policies Presented by: Trey Murdoch CSC IT Staff.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Lab 11 Overview Windows Server Last Labs wk14
NHS Pension - Webinars Greater East Midlands Commissioning Support Unit (GEM CSU) has arranged for NHS Shared Business Services (NHS SBS) to provide a.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Getting Connected to NGS while on the Road…
OCF servers a very brief overview
Firewall Exercise.
WELCOME Start of Semester Meeting Fall 2018
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Getting Connected to NGS while on the Road…
Computer Networks Protocols
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Closing SFSU border firewall Prepared by E.Rayz DoIT Network Services Coordinator February 14, 2012

Topics covered by this presentation CSU San Francisco Edge Network Design overview Firewall rules - how they work Best practices when closing the borders On-going support overview Q&A

CSU San Francisco Edge Network Design

Firewall rules - how they work

- VPN software available for faculty and staff, also some sponsored contractors -systems administrators are encouraged to use sftp, ssh, and https vs other unencrypted protocols - systems administrators need to use static ip addresses for servers, and register those ip addresses in dns via to - requests for justified exceptions will follow an established process and change control procedure, and may take approximately 1 week Best practices when closing the borders

On-going support for exemptions requests The completed “Border FW inbound Port exemption” form should be ed by authorized Change Control contact to with a CC to by Thursday, March 1 st, The border firewall closure is scheduled for Thursday, March 15 th, You will be contacted within 3 business days regarding your request The following unencrypted and shell access protocols will not be allowed through the firewall except where there is a business justification (e.g. anonymous FTP). End users and administrators are encouraged to use campus VPN for systems needing access via any of the following: Telnet FTP Secure Shell Remote Desktop

NameJonSmith DepartmentEducation BuildingBurk Hall Room #999 Phone ApplicationActionProtocolSource IP Source Port Destinati on IP Destin ation Port Operating System (Drop- Down Choices) Device (Drop- Down Choices) Reason for Exemption wwwALLOWTCPANY MacOSServerWeb Server Border firewall inbound port exemption template example:

Q&A A comprehensive border firewall workshop is scheduled for February 20 th 10:30 a.m. – 12 noon, please stay tuned for details on location and full agenda