Central Network Management in the University Environment alias Ballad on One University Network Administration Milan Šorm, Petr Dadák, Hana Netrefová.

Slides:



Advertisements
Similar presentations
WEB CONNECT FOR EASYNVR : WEB CONNECT INCREASES YOUR PROFITABILITY BY REDUCING INSTALLATION LABOR COSTS WHILE SIMULTANEOUSLY CREATING NEW REVENUE.
Advertisements

Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Make Life in Technology Easier! Presenter: Jacob Quade Ties Conference December 16, 2013.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
SUMMER TRAINING REPORT PRESENTATION By Mohammed Al_Ibrahim
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Implementing a Secure Console Server The Cyclades Project Co-Op Summer 2003 by Robert Perriero.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
Bc. n prap. Petr Gryc University of Defence Brno, Czech republic.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
What is the UF VPN Client, and How Do I Use it? (for Windows XP/7/ 8 Users). Presented by the Course Reserves Unit, George A. Smathers Libraries
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Virtual Company Group 8 Presentation Date: June /04/2017
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
New roles in Technology Migration issues – Rule of PO 2.7(b)1.
Module 4: Add Client Computers and Devices to the Network.
ResCom AUTH Research Committee - 1 Secretariat of Research Committee Aristotle University of Thessaloniki IT Department Project Management and Monitoring.
Using SWHS: The AUP [Acceptable Use Policy]
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Academy : Red Hat Certified Engineer (RHCE) is an advanced level certification for Red Hat Certified System Administrator (RHCSA) and determines.
Virtual Networking. Module Objectives By the end of this module participants will be able to: Understand the use of virtual LANs Create VLAN subinterfaces.
Fundamentals Pages 1 to 19 in your workbook. A Tour of VTScada WEB – Script based, using its own programming language VTS – Visual Tag System. Added a.
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
A Web Based Workorder Management System for California Schools.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
Identity Management in the Environment of Mendel University in Brno Milan Šorm.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
1 SUSE LINUX School Server, Peter Varkoly SUSE LINUX School Server Peter Varkoly, Developer
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Desert View TCS By Charlene Cooley and Dan Austin.
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
Training and Evaluation Tool Milan Jovic Dusan Jevtic Dr Dragan Jankovic Public Reporting on Project Results TEMPUS project.
Parnell Aerospace Group Members: Hau Sheng Yeu Stella Chan Chua Chong Yee Wong Kah Choy
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
MINISTRY OF FINANCE OF THE REPUBLIC OF TAJIKISTAN.
STAAR Assessment Management System and StAAR Online Testing Platform
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
What’s New in Fireware v WatchGuard Training.
Research Support in University Information System at Mendel University in Brno Milan Šorm, Hana Netrefová, Tereza Černá, Arnošt Motyčka Institute of Informatics,
Threaded Case Study Acacia School Project Project Members: Md. Shafayet Hossain Md. Shakhawat Hossain Md. Moniruzzaman Md. Maksudur Rahman.
What’s New in WatchGuard Mobile VPN with IPSec WatchGuard Training.
Configuring Network Devices
Mendel University IS/ICT Strategy For
Jordan Population and Housing Census 2015
Oracle Database Administration
My University Portal as a Result of Personalization Process
Information Technology (IT) Department
Institution Affiliated
Department of Computer Science Course : Pre Computer Skills
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Central Network Management in the University Environment alias Ballad on One University Network Administration Milan Šorm, Petr Dadák, Hana Netrefová Institute of Informatics, Faculty of Business and Economics Mendel University Brno, Czech Republic EUNIS 2005 Manchester, June 21 – 24, 2005

June 21-24, 2005EUNIS 2005, Manchester2 Motivation Speedy development of ICT doubled IT equipment connected to university network in the past few years Since the role of the technology is only to support other university staff and not to yield profit which could be used to finance administration, it is impossible to staff the central offices for IT administration at the same speed

June 21-24, 2005EUNIS 2005, Manchester3 Problem definition We need decrease number of network administrators to minimum but administer increasing number of tools in many geographically varied regions Three intuitive theses to help this (unify logging in and working environment, minimize changes in the network topology and self-monitoring of installed technologies)

June 21-24, 2005EUNIS 2005, Manchester4 Use only one login per user To effectuate the unified system of logging in and working conditions for all users, we designed a central LDAP system, which distribute the users’ accounts in the computer network according to the rules set in the university IS LDAP tree contains information about all users of the network as well as authorization of individual users to enter certain systems or servers

June 21-24, 2005EUNIS 2005, Manchester6

June 21-24, 2005EUNIS 2005, Manchester7

June 21-24, 2005EUNIS 2005, Manchester8 Standard working environment Standard working conditions for all users have been provided by central file server (or more servers at individual faculties) whose home volumes are connected at the place of the users’ registration Home volumes assist in distributing the user’s profile so the working environment and the set-up of all applications is the same for offices as well as for classrooms

June 21-24, 2005EUNIS 2005, Manchester9 Disallow changing of network topology Need to guarantee minimum of changes in the network topology without previous notice to the administrators Problem solved by progressive transition of the computer network to Cisco switches New UIS module for configuring port security by Cisco IOS in whole network End users can’t change the connection of their workstations and create discrepancies between the documentation and the reality

June 21-24, 2005EUNIS 2005, Manchester10

June 21-24, 2005EUNIS 2005, Manchester11

June 21-24, 2005EUNIS 2005, Manchester12 Disallow changing of network topology We also generate DNS, DHCP, WINS, firewall rules etc. A thoroughly administered topology helps to locate the problem user quickly, ensures his rapid disconnection or implementing limited net services for computer laboratory (a teacher can permit or forbid his students to access the Internet at his lectures through UIS, etc.)

June 21-24, 2005EUNIS 2005, Manchester13 Self monitoring tools Tools which monitor whole ICT non-stop and supervise all active elements and servers at the university Their function is also going to be to notify the supervising systems, s and mobile phones of problems and in case of increasing number of problems to report to the head officers

June 21-24, 2005EUNIS 2005, Manchester14 Self monitoring tools These tools process thousands of data every minute, analyse them and require the help of the administrators only in case of error or non-standard operation (syslog, logcheck, nagios) Next we use tools for automatic upgrade, backing-up and synchronization of all servers Result: the number of administrators reduced to 5 despite the 3,000 connected devices

June 21-24, 2005EUNIS 2005, Manchester15 Conclusions Central user database with distributed working environment (LDAP, samba) Disallow network changes (Cisco IOS) Self monitoring tools (logcheck, nagios) Standardize of operations (guides, principles) Result: 1 network administrator, 4 technicians, 3,000 devices, 10,000 users

June 21-24, 2005EUNIS 2005, Manchester16 Thank you for your attention Milan Šorm: Petr Dadák: Hana Netrefová: