HEPiXBNL, Brookhaven18 October 2004 NIKHEF Site Report Paul Kuipers

Slides:



Advertisements
Similar presentations
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Advertisements

Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
CT NIKHEF Nov MS NIKHEF (ET special) CT system support.
Technology Update TSAG Meeting 9/12/02. Announcements: Mandatory Password Changes Coming in October! (Postponed) End of BootP (November 1) DNS Cleanup.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
SERVER INTEGRATION. OVERVIEW In our project we are integrating Widows server to facilitate interaction between diverse operating systems and applications.
Mozilla Thunderbird Roderick Bautista Cheryl Knott Gyeong Lee Lee Raynes Kelly Santos.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Module 1: Installing Internet Information Services 5.0.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Chapter 7: Using Windows Servers to Share Information.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Module 4: Add Client Computers and Devices to the Network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
Characteristics of Communication Systems
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Site Report HEPiX/HEPNT 17 April 2002 Catania Paul Kuipers.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Paul Scherrer Institut 5232 Villigen PSI HEPIX_AMST / / BJ95 PAUL SCHERRER INSTITUT THE PAUL SCHERRER INSTITUTE Swiss Light Source (SLS) Particle accelerator.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
NESDIS/ORA March 2004 IT Security Incident Recovery Plan and Status April 12, 2004 Joe Brust, ORA Technical Support Team Lead.
HEPiX/HEPNT TRIUMF,Vancouver 1 October 18, 2003 NIKHEF Site Report Paul Kuipers
RAL PPD Computing A tier 2, a tier 3 and a load of other stuff Rob Harper, June 2011.
Windows PostgreSQL installation. Pre-requisites Define a local non-administrative Windows account (eg. postgres) Must install on Console, not through.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Unzip the attachment and double click to run it..
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Retina Network Security Scanner
Gareth Smith RAL PPD RAL PPD Site Report. Gareth Smith RAL PPD RAL Particle Physics Department Overview About 90 staff (plus ~25 visitors) Desktops mainly.
Installing or Upgrading to Windows Overview Preparing for Installation Installing Windows 2000 Professional from a Compact Disc Installing Windows.
P. Kuipers Nikhef Amsterdam Computer- Technology Nikhef Site Report Paul Kuipers
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
MT. CARMEL BAPTIST CHURCH NETWORK OVERHAUL L. Kennerly Newlin Networking and Database.
Go to Start >> Programs >> Outlook Express ( as shown)
Getting Connected CPSC 1010 August 21, Connecting to the SOC Servers Why would we need to connect Work with files Transfer files from your local.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Nikhef Site Report Paul Kuipers
LO2 Understand the key components used in networking.
XXIII HTASC Meeting – CERN March 2003 LIP and the Traveling Physicist Jorge Gomes LIP - Computer Centre.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
ZIMBRA DESKTOP USER MANUAL
Introduction to Operating Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Paul Kuipers Nikhef Site Report Paul Kuipers
Logging into the linux machines
Chapter 4 Core TCP/IP Protocols
Connecting Remotely Winter 2014.
ICT Computing Lesson 4: Computing Network.
COSC-100 (Elements of Computer Science) Prof. Juola
Pavel Dobrý Engineering Director
Module 1: Overview of Systems Management Server 2003
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

HEPiXBNL, Brookhaven18 October 2004 NIKHEF Site Report Paul Kuipers

HEPiXBNL, Brookhaven218 October 2004 Overview Windows Domain Migration Mail Network Linux Security GRID

HEPiXBNL, Brookhaven318 October 2004 Windows Domain Migration 1 Before –Windows NT 4 –Windows 2000 Server After –Windows 2003 Server

HEPiXBNL, Brookhaven418 October 2004 Windows Domain Migration 2 Conversion Domain Controllers –Tested Temporary Domain Controller During conversion shut off –Migration New Hardware Dual Ethernet –Second IP Net –Browsing –DDNS Netlogon (Q246804) –GPO

HEPiXBNL, Brookhaven518 October 2004 Windows Domain Migration 3 File Server –Quota Advisor (Quinn) –Quota Server (Northern Parklife) Restart Reporting –Diskeeper

HEPiXBNL, Brookhaven618 October 2004 Windows Domain Migration 4 Windows Terminal Servers –RDP 5 rdesktop bit color High Security Connection

HEPiXBNL, Brookhaven718 October 2004 Mail Virus Checking –Sophos Download.Trojan –Symantec AntiVirus

HEPiXBNL, Brookhaven818 October 2004 Network Gigabit Copper –Servers only

HEPiXBNL, Brookhaven918 October 2004 Linux SLC3 –Desktop –Servers

HEPiXBNL, Brookhaven1018 October 2004 Security 1 Intrusion –Windows Terminal Server –Known Username/Password –Source is (probably) known –Administrator Account Desktop IP Address changed –Recovery Clean Install Passwords Changed

HEPiXBNL, Brookhaven1118 October 2004 Security 2 Network Security –MAC adresses (wireless) –Update policy OS/Virus Scanner How to test? Services –To server only SSH –login.nikhef.nl HTTP, SMTP, POP, IMAP, etc. –No Plain Text Passwords

HEPiXBNL, Brookhaven1218 October 2004 LCG-2 GRID Core Site NIKHEF/SARA Tier-1

HEPiXBNL, Brookhaven1318 October 2004 Questions?