Safe and secure control of VLBI stations from remote Alexander Neidhardt (FESG, TUM) Martin Ettl (FESG/MPIfR), Jim Lovell (UTAS),

Slides:



Advertisements
Similar presentations
Dominik Stokłosa Pozna ń Supercomputing and Networking Center, Supercomputing Department INGRID 2008 Lacco Ameno, Island of Ischia, ITALY, April 9-11 Workflow.
Advertisements

Enabling Secure Internet Access with ISA Server
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Module 5: Configuring Access for Remote Clients and Networks.
A Computation Management Agent for Multi-Institutional Grids
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
1 Enabling Secure Internet Access with ISA Server.
VLBI Report LBA Operations & eVLBI Tasso Tzioumis ATNF May 2008.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
G4 Control and Management Solution for Data- Centers and Computer Rooms.
Innovative Broadband Services C hanging the way we present information: Digital Signs : Effective business promotion Nikolaos Desypris, Chief Executive.
E-RemoteCtrl: Concepts for VLBI station control as part of NEXPReS Arpad Szomoru (JIVE) Alexander Neidhardt (FESG), Martin Ettl (FESG), Matthias Mühlbauer.
Session 11: Security with ASP.NET
Building service testbeds on FIRE D5.2.5 Virtual Cluster on Federated Cloud Demonstration Kit August 2012 Version 1.0 Copyright © 2012 CESGA. All rights.
Psiphon Program By Amine Moubtasim.
Microsoft Azure Introduction ISYS 512. Microsoft Azure Microsoft Azure is a cloud.
NetVuze Precision Network Meter standalone, easy to use, networked with data logging.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Tutorial 10 Adding Spry Elements and Database Functionality Dreamweaver CS3 Tutorial 101.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Module 7: Fundamentals of Administering Windows Server 2008.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by: Santosh kumar Swain Technical Seminar Presentation by SANTOSH KUMAR SWAIN Roll # CS
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 5: Configuring Access for Remote Clients and Networks.
VLBI Storage Manager (VSM) Matteo Stagni – Mauro Nanni 0.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Hybrid Cloud and Windows Server 2003 end of support on Azure Rod Kruetzfeld Data Center Technical Strategist Microsoft Canada.
RM Monitor and RMAlerts Installation, Setup, and Requirements January 23, 2010 John Raffenbeul presented this live via an internet connection. These slides.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Page 1 A remotely monitored VLBI-network of autonomous telescope agents (e-RemoteCtrl for VLBI) Alexander Neidhardt (FESG, TUM)
Managing File Resource Using File Server Resource Manager Chapter 9 Advance Computer Network Lecture Sorn Pisey
Clever Framework Name MARCH 27, Meeting Agenda  Framework Overview  Prototype 1 Design Goals  Prototype 1 Demo  Prototype 2 Design Goals  Timeline.
The new generation of Supervisory System Main Features: MONITORING is based on reading and saving the values from the field and then using these values.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
NEXPReS Period 3 Overview WP 6: High Bandwidth on Demand Paul Boven, JIVE.
NEXPReS Period 3 Overview WP8 FlexBuff High-Bandwidth, High-Capacity Networked Storage Ari Mujunen Aalto University Metsähovi Radio Observatory Finland.
SA1: second year overview Arpad Szomoru JIVE January 30EXPReS Board Meeting, Utrecht, the Netherlands: SA1Slide #2 Outline Accomplishments in 2007.
WP5: Cloud Correlation Arpad Szomoru Joint Institute for VLBI in Europe.
PRESENTATION DATEEXPReS- TITLE OF YOUR PRESENTATIONSlide #1 What is EXPReS? EXPReS = Express Production Real-time e-VLBI Service Three year project (March.
NEXPReS Period 3 Overview WP5 Cloud Correlation Arpad Szomoru, JIVE.
Introduction to Fabric Kiwi Team PSNC. E-VLBI system – general idea.
WP7: Computation in a shared infrastructure Mark Kettenis JIVE Presented by Norbert Meyer PSNC.
WfMS and external systems Katarzyna Bylec PSNC. Agenda Introduction Pre-corelation ▫ North Star ▫ NRAO SCHED ▫ Vlbeer FTP ▫ Log2vex ▫ drudg Correlation.
WP7: Computation in a shared infrastructure Mark Kettenis JIVE Presented by Norbert Meyer PSNC.
NEXPReS WP5 - Cloud Correlation Work Package Overview Arpad Szomoru JIVE.
Your name Your title, institution. RI READ ME To modify “Event – Location – Date” footer on all slides, go to Insert > Header & Footer. Change.
EVLBI MPIfR,Bonn A. Roy, W. Alef, D. Graham, A. Oberreuter
SA1: overview, first results
TrueSight Operations Management 11.0 Architecture
SECURING NETWORK TRAFFIC WITH IPSEC
Configuring and Troubleshooting Routing and Remote Access
TYPES OF SERVER. TYPES OF SERVER What is a server.
04 | Web Applications Gerry O’Brien | Technical Content Development Manager Paul Pardi | Senior Content Publishing Manager.
Anja Burghardt, Institute for Employment Research (IAB)
Presentation transcript:

Safe and secure control of VLBI stations from remote Alexander Neidhardt (FESG, TUM) Martin Ettl (FESG/MPIfR), Jim Lovell (UTAS), Walter Alef (MPIfR), Ed Himwich (NASA/GSFC), Christopher Beaudoin (MIT-Haystack), Christian Plötz (BKG), Arpad Szomoru (JIVE), Matthias Mühlbauer (BKG),

Geodetic Observatory Wettzell

The ideas behind …

Local - Standard operations - Local operator

The ideas behind … Local - Standard operations - Local operator Remote - Check system states from everywhere at the observatory - Tele-working - Remote assistance and diagnostics - Control very remote, inaccessible telescopes Internet

The ideas behind … Local - Standard operations - Local operator Remote - Check system states from everywhere at the observatory - Tele-working - Remote assistance and diagnostics - Control very remote, inaccessible telescopes Internet Shared Internet - Save, passive data live monitoring - Dedicated control access by responsible person - Shared access from different observatories - Shared night shifts

The ideas behind … Local - Standard operations - Local operator Remote - Check system states from everywhere at the observatory - Tele-working - Remote assistance and diagnostics - Control very remote, inaccessible telescopes Internet Shared Internet - Save, passive data live monitoring - Dedicated control access by responsible person - Shared access from different observatories - Shared night shifts Unattended - Observations run autonomous, (semi-) automated and unattended

The ideas behind … NEXPReS Novel EXplorations Pushing Robust e-VLBI Services

NEXPReS WP5/Task 3: Continuous quality monitoring & Station Remote Control - three-year project from July 2010 to June with the goal to develop future e-VLBI services of the European VLBI Network (EVN) and to use e-VLBI for each astronomical observation of the EVN - cooperation of 15 astronomical institutes and National Research and Education Network (NREN) providers - funded by the European Union's Seventh Framework Programme as e ‑ Infrastructure project - with the four technical main activities: - Cloud Correlation - Dynamically Provisioned Network Resources - Computing in a Shared Infrastructure - Provisioning High-Bandwidth, High-Capacity Networked Storage Novel EXplorations Pushing Robust e-VLBI Services WP5/Task 3: (TUM, MPIfR, JIVE) - identify and re-act on observation failures in near real-time - improve diagnostics - allow direct (read) access to the field system control parameters - extend the capabilities of the NASA Field System with - a secure remote control (authentication, authorization, operator roles) and - system monitoring

NEXPReS WP5/Task 3: Continuous quality monitoring & Station Remote Control _ now July 1 st

The ideas behind … NEXPReS Novel EXplorations Pushing Robust e-VLBI Services The solution: e-RemoteCtrl

e-RemoteCtrl wxWidgets Software generator idl2rpc.pl Linux User Credentials System Monitoring Wettzell Software Toolbox (well tested modules & components)

The ideas behind … NEXPReS Novel EXplorations Pushing Robust e-VLBI Services The solution: e-RemoteCtrl Security

Security Tunneled e-RemoteCtrl Wettzell Software Toolbox (well tested modules & components) sshbroker rbash

Security SSH-Broker configuration (passwords are AES encrypted)

Security User role management with authentication and authorization ReadChatSchedule (drudg) Adapt (attenuation) ControlSystem change Currently not used Static Roles Observer Notifier Scheduler Agent Operator Superuser Operator Notifier Dynamic Roles SupervisorOperator User rights Number of users Role change

Security Role change as three-way-handshake (1) Push role change button Send role change request to server Inform active operators about request User 1ServerUser 2 Reply OK/NOK Verify request Accept role change Verify request Reply OK/NOK Inform requestor about accept Confirm role change Reply OK/NOK Verify request Change active operator Step 1: REQUEST Step 2: CONFIRM Inform requestor about change esu (superuser) eoper (notifier)

Security Role change as three-way-handshake (2) Push role change button Send role change request to server Inform active operators about request User 1ServerUser 2 Reply OK/NOK Verify request Accept role change Verify request Reply OK/NOK Inform requestor about accept Confirm role change Reply OK/NOK Verify request Change active operator Step 1: REQUEST Step 2: ACCEPT Inform requestor about change esu (superuser) eoper (notifier)

Security Role change as three-way-handshake (3) Push role change button Send role change request to server Inform active operators about request User 1ServerUser 2 Reply OK/NOK Verify request Accept role change Verify request Reply OK/NOK Inform requestor about accept Confirm role change Reply OK/NOK Verify request Change active operator Step 1: REQUEST Step 2: ACCEPT Step 3: CONFIRM Inform requestor about change esu (superuser) eoper (notifier)

Security Role change as three-way-handshake (3) Push role change button Send role change request to server Inform active operators about request User 1ServerUser 2 Reply OK/NOK Verify request Accept role change Verify request Reply OK/NOK Inform requestor about accept Confirm role change Reply OK/NOK Verify request Change active operator Step 1: REQUEST Step 2: ACCEPT Step 3: CONFIRM Inform requestor about change esu (superuser) eoper operator esu superuser eoper (notifier) eoper (operator) esu (superuser)

The ideas behind … NEXPReS Novel EXplorations Pushing Robust e-VLBI Services The solution: e-RemoteCtrl Security Features

Features Status monitor Logging Command input Mark 5 capacity System temperatures Connection status Connection information Chat Main window

Features Checklists

Features Station specific system monitoring (HTML or plain text) Data for science and analysis Data for system operations Data for diagnosis MCI

Features Parallel control of several telescopes Acknowledgements to Jim Lovell, UTAS for his support of the project, the access to the AuScope systems and the usage of the software.

The ideas behind … NEXPReS Novel EXplorations Pushing Robust e-VLBI Services The solution: e-RemoteCtrl Security Features Test bed and e-RemoteCtrl network

Remote control on site Tele-working regular usage Hartebeesthoek NyAlesund

Thank you The software is available on the Web page See also our demo today!!!