Securing your Colleague Network Environment

Slides:



Advertisements
Similar presentations
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 6 – Switch Configuration Switch Configuration Starting the.
Application Guide For Mesh AP – MAP-3120
WHG Product Training Oct 2011 For authorized partners only
WAN Connectivity The VMO Wide Area Network will extend between all stores, offices, and Lyon, France We have designed a highly redundant network with.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Hardware Firewall Feature © N. Ganesan, Ph.D.. Chapter Objectives Show the configuration of a hardware firewall such as Dlink DI 604 Illustrate the sharing.
 All of you should be able to describe how a network works.  Most of you will be able to identify the main devices necessary for a network.  Some of.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
MTA Networking Fundamentals
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
HPLL Demo. How did we get here? Brainstormed how we would utilize the WAN Talked with TEACH about our plan Presented this idea to the TRITON Board Converted.
Module 1: Configuring Windows Server Module Overview Describe Windows Server 2008 roles Describe Windows Server 2008 features Describe Windows Server.
1 Semester 3 Threaded Case Study Royal Palm A/3B Ip Siu Tik Tsang Man Wu Wai Hung Wong Lai Ting.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Campus Wireless Network kitenet Koji OKAMURA Research Institute for Information Technology, Kyushu University.
VLANs. Current Setup Why VLAN? Allows DL Codec connections anywhere in your building Don’t have to purchase separate switches for your codec network.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Module 5 : Security I Jong S. Bok
Case study: Data Provider setup Sergey Sukhonosov National Oceanographic Data Centre, Russia Expert training on the Ocean Data Portal technology, Buenos.
1 The Hotspot Menu. 2 The Hotspot Menu Hotspot The GD eSeries Hotspot application is a captive portal solution that can be run over a wireless (or wired)
Panasonic UC Pro - UC Pro Server setup with Active Directory -
19 May 2003 © The JNT Association Terena Technical Advisory Council Terena Mobility Task Force
Panasonic UC Pro - UC Pro Web Service Basic setup -
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Wireless Network Security Wireless Gateways For Home And Office Use Muhamad Nur Ariffin Ajis TSI
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Architecting Enterprise Workloads on AWS Mike Pfeiffer.
Network Address Translation
Migration and Preparation
CompTIA Network+ Certification Exam
Security fundamentals
Chapter 1 Introduction to Networking
Nassau Community College
Installing TMG & Choosing a Client Type
Module 3: Enabling Access to Internet Resources
Top 5 Open Source Firewall Software for Linux User
PCNSE7 Palo Alto Networks Certified Network Security Engineer
Chapter 2 Overview of Networking Components
Thoughts on our network
Configuring and Troubleshooting DHCP
1.
Planning and Troubleshooting Routing and Switching
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Implementing TMG Server Publishing
Introduction to Networking
1Y0-253 Exam Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CompTIA Network+ Certification Exam
Welcome To : Group 1 VC Presentation
How do You attend the meetings?
IS4550 Security Policies and Implementation
LINKSYS SUPPORT NUMBER. Linksys Support Number for upgrading firewall, Installation and Repair and Connecting Device and Fix Error Messages by Linksys.
2018 Real CompTIA N Exam Questions Killtest
Chapter 27: System Security
External Management A HQ/Data Center Road Warriors Master Server
Securing and Protecting Citizens' Data
Networking Essentials
Unit 36: Internet Server Management
Computer Technology Networks & Internet.
LAN Connection Image at TTEC Parkway
Implement Web Application Proxy (WAP)
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Introduction to Network Security
6. Application Software Security
Presentation transcript:

Securing your Colleague Network Environment

Session Scope: The goal of this session is to assist the IIPS Security Committee in developing a high-level network configuration for administrative systems support, which can be applied as a system-wide baseline in the IIPS Security Manual Agree on nomenclature We tend to use the terms “inside” or “outside” the firewall. Better terminology would be “In the …” “DMZ”, “Secure (server) Zone”, or “User Zone” Provide a high-level overview of why Colleague and associated services should be secured and discuss some of the system-wide implications of failing to do so Look at examples of specific colleges securing their systems Have open discussion, feedback, and concerns on this topic

No control of the who or where (source IP addresses) System Office Internet Firewall DM Zone Secure Zone User Zone(s) All servers requiring access from non-specified sources on the Internet No control of the who or where (source IP addresses) Control what (ports) All servers with PII data All servers accessed from specific authenticated trusted sources Control of who and where (Source IP addresses) Control what (ports) End-User internal access Limit access to servers in the Secure Zone

Self Service Front-end Server E-Commerce Payment Gateway Firewall DM Zone Core Switch DM VLAN Public Web Servers Web Advisor Web Server Self Service Front-end Server E-Commerce Payment Gateway Portal Front-end Server External DNS Server E-Procurement Mobile

Administrative Systems VLAN Colleague Server UI Server Firewall Secure Zone Core Switch Administrative Systems VLAN Colleague Server UI Server Self Service DB Server Portal DB Server WebAPI for E-Transcript CFNC Crossroute Accuplacer WebAPI Authentication VLAN Active Directory Student Systems VLAN

Admin User External IP Address Student User External IP Address System Office Daily Cash Reporting Data Warehouse Admin User External IP Address Student User External IP Address Firewall User Zone Core Switch User Zone Wired VLAN for Students Wired VLAN for Staff/Faculty Wireless VLAN for Staff/Faculty Wireless VLAN for Students

Discussion and Questions