“Enterprise Network Design and Implementation for Airports” Master’s Thesis: By Ashraf Ali and advised by professor Nicholas Rosasco Introduction Practical.

Slides:



Advertisements
Similar presentations
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Troubleshooting Working at a Small-to-Medium Business or ISP – Chapter 9.
History DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 1: Configuring Network Load Balancing
Lesson 19: Configuring Windows Firewall
A Guide to major network components
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Virtual Company Group 8 Presentation Date: June /04/2017
Module 13: Network Load Balancing Fundamentals. Server Availability and Scalability Overview Windows Network Load Balancing Configuring Windows Network.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Firewall Security.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Packet Capture and Analysis: An Introduction to Wireshark 1.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
NAME :WAN MUHAMMAD ASWAD BIN ZULKIFLI NO.MATRIK : CLASS : 2TSK2.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
“Enterprise Network Design and Implementation for Airports” Master’s Thesis - Ashraf Ali Department of Computing and Information Sciences This project.
Unit 7: DHCP, APIPA and NTP. Static versus dynamic IP addressing Dynamic IP addresses can change each time you connect to the Internet, while static IP.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Introduction to Windows Server 2008
Firewall Techniques Matt Cupp.
Introduction to Operating Systems
Top 5 Open Source Firewall Software for Linux User
CompTIA Security+ SY0-401 Real Exam Question Answer
CONNECTING TO THE INTERNET
Computer Data Security & Privacy
Introduction to Networking
Introduction to Networking
Firewalls.
Introduction to Networks
Chapter 2: Basic Switching Concepts and Configuration
Welcome To : Group 1 VC Presentation
Security in Networking
Unit 27: Network Operating Systems
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Network Security: IP Spoofing and Firewall
Synthesizing knowledge During Project
IS4680 Security Auditing for Compliance
Network Models, Hardware, Protocols and number systems
Network Hardware and Protocols
Firewalls Jiang Long Spring 2002.
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Firewall Installation
Instructor Materials Chapter 8: Applied Networking
Protection Mechanisms in Security Management
Presentation transcript:

“Enterprise Network Design and Implementation for Airports” Master’s Thesis: By Ashraf Ali and advised by professor Nicholas Rosasco Introduction Practical Work Airport’s network design and implementation was the aim of this project to introduce a suitable network for most airports around the world. This project focused on three main parts which are; security, quality, and safety. In security part, the project have been provided by different utilities to introduce a network with high security level for the airport’s network. These utilities are hardware firewalls, IP access control list, Mac address port security, domain server and Proxy server. All of these tools have been configured to provide a secure environment for the entire network by preventing hackers form entering sensitive departments like flight management and service providers departments. In quality part, improving the performance of any network need a high quality of techniques and services that help to improve the general task of the network. The technical services that have been placed in the airport’s network are; failover firewalls utility, PXE server (Pre-boot Execution Environment), DHCP Server (Dynamic Host Configuration Protocol), DNS Server (Domain Name System) and cabling system. These tools increases the preferment of the network as a general and provide a stable internet service for the Air Traffic Control System with using dual internet service providers and the failover utility. In safety part, The Dual internet providers’ roles was providing the flight management department which help to confirm the backup operation for the Backup Air Traffic Control Complex (BATCX) system to outside the local network by using Windows servers backup (iSCSI initiators and iSCSI target) servers. This help to keep the Air Traffic Control systems’ information in safe place. Also, web server was the second service that help to save passengers’ lives by saving their personal information. Methods Airport Network Security followed the following techniques in order to make the Network more secure. Hardware Firewalls to increase the level of security and setup rules for network’s activities. IP access control list to prevent unauthorized activities from guest department. Mac address port security to prevent foreign devices from connecting to the sensitive departments. Domain Server to establish specific groups for specific tasks depending on needs. Proxy server to setup permission for users depending on their positions and authority. Airport Network Quality follows these techniques in order to increase the network quality of services. Fail over firewalls utility to support the network with ISP when the first fail. PXE server (Pre-boot Execution Environment) to provide operating systems. DHCP Server (Dynamic Host Configuration Protocol) to provide IPs. DNS Server (Domain Name System) to manage Airport’s website. Cabling system to provide the network an appropriate connection’s system. Airport Network safety follows these techniques in order to insure the safety for passengers. Dual ISPs to provide Air Traffic Control System (ATC). Web Server to keep the passengers’ information's in safe place. Figure 1. Airport's Network Figure 2. Airport's Building Results and discussion Future work Dual internet service providers helps the Air Traffic Control System’s backup to work 24 hours and place the data outside the network in safe area. Filtering the ins and outs connections in the airport’s network. Prevent the users from accessing the management system in the airport which represent by the Air Traffic Control System. The authorized devices can not connect to the physical part of the network. The network’s users assigned to small groups to verify the identity of local users. The outside attack has been prevented by squid proxy server and limit the inside requests to the internet from users. Failover utility in firewalls provide 24 house of internet services when one of the services goes down. The connected devices in the local network has operating systems that available to access any time. Assign internet protocols (IPs) to any device in the network automatically for each department during the operations hours. Translate the IPs to the airport’s website internally. The cabling system between buildings helps to reduce the time that used o transferee the data. Passengers’ information protected in the local web server which placed inside the network. Involve the Windows Servers in the security aspect to filter the untested data that entered into the flight management system. Bootable operating system from different buildings or the cloud when the local System fails or in the case of sudden fire in any department. Apply the failover configurations on the firewalls’ user interface in a state of the terminal that has been used in the Packet Tracer program to ensure the configurations process steps. Use the IP subnet utility to limit the IPs in the network which allows the network to be organized more easily. Increase the target storage capacity for the Air Traffic Control System backup to make sure that the target server has enough space to store the data, especially in big airports which have many traffic activities during the work operations. 1. Burns, S. F. GIAC Security Essentials Certification (GSEC) Practical Assignment v1. 4c January 5, 2005. Threat Modeling: A Process to Ensure Application Security. 2. Lambert, P. (2012). The basics of using a proxy server for privacy and security. Tech Republic. 3. Chadwick, D. W. (2001). Network Firewall Technologies. NATO SCIENCE SERIES SUB SERIES III COMPUTER AND SYSTEMS SCIENCES, 178, 149-168. 4. Cezar, M. (2014, October 16). Setting up a ‘PXE Network Boot Server’ for Multiple Linux Distribution Installations in RHEL/CentOS 7. Retrieved March 22, 2016, from http://www.tecmint.com/install-pxe-network-boot-server-in-centos-7/ 5. Bipin. (2014, April 01). Configure iSCSI SAN in Server 2012 R2. Retrieved April 01, 2016, from http://www.mustbegeek.com/configure-iscsi-san-in-server-2012-r2/ References