03/20/10Plug-and-Play Deployment of Network Devices Tina TSOU Juergen Schoenwaelder

Slides:



Advertisements
Similar presentations
Remote Monitoring System 90% of organizations dont know: – # of devices in population – # of model numbers – # of pages printed – Toner levels in each.
Advertisements

EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
Meraki Mobile Device Management
DHCP Security Analysis Dallas Holmes / Matt MacClary ECE 478 Project Spring 2003.
CAPWAP BOF Control And Provisioning of Wireless Access Points James Kempf DoCoMo Labs USA Dorothy Stanley Agere Systems WAP!
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
SSL From Your Smartphone Support for Android Smartphones /
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
FLIP Architecture & Requirements Roger Cummings Symantec
Wireless and Security CSCI 5857: Encoding and Encryption.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Common Devices Used In Computer Networks
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Information Model for LMAP draft-ietf-lmap-information-model-00 IETF 89, London, March 2014 Trevor Burbridge, BT Philip Eardley, BT Marcelo Bagnulo Braun,
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Dynamic Host Configuration Protocol Engr. Mehran Mamonai.
IPv6, the Protocol of the Future, Today Mathew Harris.
BASIC FUNCTIONALITY. Page 2 Agenda Main topics Policy Manager Communication Understanding communication Information flow Communication modules F-Secure.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
draft-ietf-netconf-zerotouch
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on Home Networking in CCSA Duo LIU, Deputy Secretary General of.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
RADIUS issues in IPv6 deployments draft-hu-v6ops-radius-issues-ipv6-01 J. Hu, YL. Ouyang, Q. Wang, J. Qin,
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
PANA Framework Prakash Jayaraman, Rafa Marin Lopez, Yoshihiro Ohba, Mohan Parthasarathy, Alper Yegin IETF 59.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
A Paradigm Shift for the Internet of Things Today sensing and actuation is expensive and static with little or no economies of scale. μPnP changes the.
DNS/DHCP REFRESH June, Executive Summary The Domain Name System (DNS) and Dynamic Host Protocol (DHCP) are the lifeblood of the network. Without.
Module 12: Implementing ISA Server 2004 Enterprise Edition: Back-to-Back Firewall Scenario.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
Standardization activities on Home Networking in CCSA CCSA DOCUMENT #:GSC13-GTSC6-08 FOR:Presentation or Information SOURCE:CCSA AGENDA ITEM:GTSC; 4.3.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
1/7 zerouter BoF Problem Statement 19 th Nov th IETF - Atlanta, Georgia, USA
1 Brian Carpenter Sheng Jiang IETF 85 November 2012 Next steps for 6renum work.
DHCPv4 option for PANA Authentication Agents draft-suraj-dhcpv4-paa-option-00.txt DHC/PANA WG IETF-63 France, Paris.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Anima IETF 93 draft-pritikin-anima-bootstrapping- keyinfra-02 Design Team Update.
Mobile IP Security Konidala M. Divyan International Research Center for Information Security Network Security (ICE 615) Term Project – 2002 Autumn.
UDP Socket Programming
<draft-ohba-pana-framework-00.txt>
Configuring and Troubleshooting Routing and Remote Access
Firmware Notification
NETW 208 Enthusiastic Studysnaptutorial.com
CIT 249Competitive Success/snaptutorial.com
CIT 249 Education for Service-- snaptutorial.com
CIT 249 Teaching Effectively-- snaptutorial.com
Chapter 10: Advanced Cisco Adaptive Security Appliance
Read this to find out how the internet works!
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
O&M Area Working Group WG
Presentation transcript:

03/20/10Plug-and-Play Deployment of Network Devices Tina TSOU Juergen Schoenwaelder Yang Shi Problem Statement for Plug-and-Play Deployment of Network Devices draft-tsou-network-configuration-problem- statement-03 IETF 77, Anaheim, California, USA

03/20/10Plug-and-Play Deployment of Network Devices The Basic Problem New networks are being deployed with thousands of new devices Need to establish best practices for minimizing the cost of configuration Central Configuration System Other Operator's Network Home Network

03/20/10Plug-and-Play Deployment of Network Devices Stages of Installation Factory/warehouse pre-configuration Physical installation and testing Neighbour discovery Address configuration Connection to central configuration system Upload of local connectivity information Back-end adjustment of configuration scripts (as necessary) ● Note that this could involve manual intervention and take some time Download of configuration scripts Establishment of routing Verification

03/20/10Plug-and-Play Deployment of Network Devices Requirements for Interoperability Common neighbour discovery protocol, e.g., SEND (but what for IPv4?) Common address configuration protocol, e.g., DHCP Common protocol for securing connection between central configuration system and new network device, e.g., DTLS, SSL Common protocol for uploading local connectivity information, e.g., SNMP, NETCONF Common protocol for delivery of configuration scripts, e.g., TFTP

03/20/10Plug-and-Play Deployment of Network Devices Requirements for Security Mutual authentication and authorization of communications between neighbouring devices Mutual authentication and authorization of communications between new device and address server Mutual authentication and authorization of communications between new device and central configuration system Integrity protection for communications between new device and central configuration system

03/20/10Plug-and-Play Deployment of Network Devices Proposed BCP BCP to cover the following topics: Pre-configuration requirements Protocol support What else? BCP as OPSAWG work item?