OCF servers a very brief overview

Slides:



Advertisements
Similar presentations
What you will get? Or what you like to know?
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Senior Design Lab Policies Presented by: Trey Murdoch CSC IT Staff.
Did You Know? Number of spam s sent each day? 100 billion.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Macintosh Configuration Management Will Jorgensen 1.
Mr. Mark Welton.  Good documentation is key in a network design  Well-written documentation saves both time and money  Makes troubleshooting issues.
1 Enabling Secure Internet Access with ISA Server.
Internet Publishing and Network Topology The Internet yahoo.com to the rest of the Internet 3dbang.htm “web.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Connecting To A Remote Computer Via ‘Remote Desktop Web Connection’ Compatible With ‘Most Any’ Computer.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
TRD 1: NMRbox Development
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
0 If you have set-up the equipment and are unable to access your service, call 1(888)ONE-ATT0/1(888) or for
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
A few project ideas… Gareth Tyson
Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Part of slides provided by J.F Kurose and K.W. Ross, All Rights Reserved Network Security7-1 Chapter 7 Network Security Extra Slides Communication Networks.
RAL PPD Computing A tier 2, a tier 3 and a load of other stuff Rob Harper, June 2011.
Update on Campus Networks December 2009 Bruce Campbell Director, Network Services Information Systems and Technology.
Closing SFSU border firewall Prepared by E.Rayz DoIT Network Services Coordinator February 14, 2012.
WISER: Remote access to databases and datasets This session will help you to set up access to Oxford online resources from your home computer. The session.
Teleworking Effectively Or, how to work from home without SNA or a token. Don’t be this guy:
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Module 10: Windows Firewall and Caching Fundamentals.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
U1. Daily Operations of Computer Network Presented by: Law Hing Man.
Internet Bellsouth Router Linksys Router WRT54G Linksys Access Point WAP54G Laptop Current Setup.
Internet, Intranet and extranet. By Ghazia Sohail And Elliot Goulding.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Introduction Name Company affiliation Title/function Job responsibility Windows experience Your expectations for the course.
Installation Guacamole Is a web application that provides access to desktop environments using remote desktop protocols (such as VNC or RDP); Installation.
 Midas PC touch is one of the fastest growing companies that offer 24X7 technical assistance and online computer support services to computer users worldwide.
Dirk Zimoch, EPICS Collaboration Meeting October SLS Beamline Networks and Data Storage.
Enterprise Vitrualization by Ernest de León. Brief Overview.
Lab 12 – Cisco Firewall.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Computer Data Security & Privacy
OpenLabs Security Laboratory
Control system network security issues and recommendations
WSU Linux Users Group By Haven Hash
3.1 Types of Servers.
3.2 Virtualisation.
Lab 1 introduction, debrief
6.6 Firewalls Packet Filter (=filtering router)
HOW TO SETUP CISCO ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
الانترنت والبريد الإلكتروني
Level 2 Diploma Unit 11 IT Security
Introduction to Servers
Firewalls Chapter 8.
Presentation transcript:

OCF servers a very brief overview

The server rack

Three main physical servers jaws newest, fastest production servers and nfs pandemic dev/staging server software mirroring hal mega old staff VMs and backups

Three main physical servers blackhole fancy network switch

Three main physical servers see https://ocf.io/servers

OCF internet/networking border (and how to access OCF from outside)

ocf internet setup internet (IST) cisco firewall (owned by IST)

ethernet jack in our server room

ethernet jack in our server room

ethernet jack in our server room internet cisco firewall (owned by IST) ethernet jack in our server room

blackhole connected to internet everything connected to blackhole

all outbound traffic allowed* internet all outbound traffic allowed* *one exception: email (for spam reasons) desktops (computer lab) services (web, email, ...) login (ssh)

X all outbound traffic allowed* desktops (computer lab) services internet X some inbound allowed (ssh) no inbound allowed some inbound allowed desktops (computer lab) services (web, email, ...) login (ssh)

X what if I want to access a desktop or server remotely? desktops internet X desktops (computer lab) services (web, email, ...) login (ssh)

X bastions! what if I want to access a desktop or server remotely? internet bastions! X desktops (computer lab) services (web, email, ...) login (ssh)

bastions! first, connect via SSH to a login server desktops internet first, connect via SSH to a login server desktops (computer lab) login (ssh)

bastions! first, connect via SSH to a login server internet first, connect via SSH to a login server then, connect to anything else desktops (computer lab) login (ssh)

OCF has two login servers: tsunami public, all OCF users can access it no access to other OCF stuff supernova private, only OCF staff can access it full access to other OCF stuff

always connect to supernova first! first step: SSH to supernova from your machine

always connect to supernova first! second step: SSH to some other server from your laptop (e.g. anthrax)

always connect to supernova first! third step: do whatever!

X one thing we skipped... desktops (computer lab) services internet X desktops (computer lab) services (web, email, ...) login (ssh)

X hozers (your staff VMs!) desktops (computer lab) services internet hozers (your staff VMs!) X desktops (computer lab) services (web, email, ...) login (ssh)

X hozers (your staff VMs!) desktops (computer lab) services internet hozers (your staff VMs!) X desktops (computer lab) services (web, email, ...) login (ssh)

congrats! now you can log in to the OCF!