UNM Enterprise Firewall

Slides:



Advertisements
Similar presentations
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
Module 5: Configuring Access for Remote Clients and Networks.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 Enabling Secure Internet Access with ISA Server.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Networking Components
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Networking Components Christopher Biles LTEC Assignment 3.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 7: Linux Network Services Chapter 10: Networking and the Internet By Fred R. McClurg Linux.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 4: Designing Routing and Switching Requirements.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Security fundamentals Topic 10 Securing the network perimeter.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
IS3220 Information Technology Infrastructure Security
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Security fundamentals
Virtual Private Network Access for Remote Networks
Chapter 1: Explore the Network
Network Admission Control: A Survey of Approaches Educause 2008
Network Security Solution
Networking in the Enterprise
NET 3710 WAN Data Networks.
Virtual Private Network (VPN)
Working at a Small-to-Medium Business or ISP – Chapter 8
Logo here Module 8 Implementing and managing Azure networking 1.
Chapter 1: WAN Concepts Connecting Networks
Your Business Opportunity
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Virtual Private Network (VPN)
ISMS Information Security Management System
Virtual Private Networks
Firewalls Routers, Switches, Hubs VPNs
Firewall.
Wide Area Network Fundamentals
Office 365 – How NOT to do it UKNOF43.
Topic 12: Virtual Private Networks
AT&T Firewall Battlecard
Global One Communications
Presentation transcript:

UNM Enterprise Firewall Service Design & Operations

Our Goals Protect Data Center and Campus Networks Prevent breaches and outages Provide accessible internet services 11/12/2018

Enterprise Firewall Features Application Visibility and Control (App-ID) User Visibility (User-ID) IPS Anti-Malware Network-level Antivirus Exploit Protection Logging and Reporting Wildfire sandboxing Active/Passive Redundancy IPv6 Capable VPN services Full routing and switching capability 11/12/2018

Architecture Separate Firewalls for each service area Lobo Zone for Departments Data Center Branch Campuses Remote Offices Voice-over-IP Networks Redundant Firewalls in each area High Speed Backbone 100G internet connectivity 11/12/2018

Remote Office and Cloud Connectivity IPSEC tunnels with IKEv2 Utilizing DSL links on remote campuses Dedicated Fiber = Expensive Encrypted connectivity to cloud services Data Center Redundancy 11/12/2018

What is a Security Policy on the firewall? Describes what is allowed or denied Initiating IP Address, Country, or User Destination IP address, Country, or User What Application What Ports and Protocols 11/12/2018

Firewall Operations All departments have basic security policy Vulnerability Protection Anti-Malware Known bad actors Allowed outbound traffic from UNM networks Specific security policy rules can be made upon request 11/12/2018

How do I make a request to change security policy? Enter a ticket in Help.UNM - Refer to FastInfo #5474 Initial consultation with IT Data Network Group Ticket sent to Information Security & Privacy Office Application name: Source (Un-trust) IP(s): Destination (Trust) IP(s): Network port(s) and protocol(s): Function: Justification: Implementation and Testing by IT Data Network Group 11/12/2018

Firewall Roadmap FY19 More segmentation for departments Client based VPN access Wireless Migration 11/12/2018

Central Management Demo 11/12/2018

Thank you for listening! For support visit https://help.unm.edu Or call us at 505-277-5757 11/12/2018