This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344.

Slides:



Advertisements
Similar presentations
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Advertisements

Terena Mobility Taskforce update Klaas Wierenga SURFnet.
The Business Solutions Revolution Xavier Villegas Chief Business Market Officer September 17, 2013.
IPv6 Planning and Implementation at PSU.  1986 – PSU gets Class B network ( ) & 5 Class C networks  1988 – Department of Computer.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Enabling IPv6 in Corporate Intranet Networks
1:16 Multiplier Effect 1:16 Multiplier Effect Expanded Reach and Scale 17,000 Cisco Sales and Marketing 282,000+ Channel Employees.
NAG Meeting October 29, Agenda Welcome New technical staff member – Amanda Berlin Dialog on Web Filtering Requirements E-Rate Opportunities.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
UAB VPN Service David Wolford, Communications Network Specialist.
Lawrence Livermore National Laboratory Lee Neely CISSP, MSP ISSO LLNL-PRES Lawrence Livermore National Laboratory, P. O. Box 808, Livermore, CA.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Roles Based Network Access Controls James R. Clifford Los Alamos.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
CNIL Report April 4 th, CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Sample Diagram.
Public Key Infrastructure Ammar Hasayen ….
© 2014 Cisco and/or its affiliates. All rights reserved. Updated: 4/30/14 Routing WAN Iconsslide 2slide 2 Network Management Iconsslide 2slide 2 Endpoint.
Barracuda Networks Steve Scheidegger Commercial Account Manager
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Introduction Why is internetworking technology essential for Technology majors?Why is internetworking technology essential for Technology majors? Pursuing.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
PKI interoperability and policy in the wireless world.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
LLNL-PRES-XXXXXX This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Network Services Update Bruce Campbell Director, Network Services Information Systems and Technology January 14,2011.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
LLNL-PRES-?????? This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Myles Fenton January 2008 Monash Internet service 2008.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
7.4 Update - ISE Session.
LLNL-PRES-XXXXXX This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344.
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
IPv6 Status Update & Discussion Phil DeMar Winter 2014 ESCC meeting February 25, 2014.
IPv6 – The New Technology to Embrace Product Management Group Enterprise Data Product.
Open source IP Address Management Software Review
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Linux Firewalls By Shane Lofgren. Definition from wikipedia.org: A firewall is a security device which is configured to permit, deny or proxy data connections.
Web Content Security Unlock the Power of the Web
Chapter 1: Explore the Network
CudaLaunch for Barracuda NG Firewall.
What are the strategic imperatives?
Web Content Security Unlock the Power of the Web
Chapter 1: Exploring the Network
Network Security Solution
Information Technology and Telecommunication
April 2008 IVY+ Ron Rusnak Jeff Westphal Bob Vonderohe.
Cisco VOIP & Unified Communications ICTF 2008
Cisco VOIP & Unified Communications ICTF 2008
Chapter 10: Advanced Cisco Adaptive Security Appliance
Office 365 – How NOT to do it UKNOF43.
Preferred solution (continued)
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA Lawrence Livermore National Security, LLC ESCC Meeting January 17, 2013

Lawrence Livermore National Laboratory LLNL-PRES-xxxxxx 2  Extranet Environment Site-to-site VPN — Cisco ASR1006  Wireless on restricted network Proof of Concept 2-factor auth: AD PKI Cert and HSPD-12 Card

Lawrence Livermore National Laboratory LLNL-PRES-xxxxxx 3  Network Refresh Since FY11, continuing to replace EOL equipment  Next Generation Firewall Deployment Performs IPS, filters web content, restricts internet access via captive portal authentication Future: ssl inspection, application inspection, NAC  Data and Voice Network Consolidation  Video Conferencing solutions Telepresence systems, Jabber  Wireless Authentication in support of mobile devices

Lawrence Livermore National Laboratory LLNL-PRES-xxxxxx 4  IPv6 Adoption / Deployment Completed IPv6 Address schema Enabled IPv6 presence on the edge Defined approach, equipment, effort Modified Oracle backend to support home grown IPAM — IPv6 subnets — AAAA/v6.arpa DNS records