Using Topological Mapping to Manage & Secure Large Networks NANOG23: October 23, 2001 karl@lumeta.com.

Slides:



Advertisements
Similar presentations
TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between.
Advertisements

Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Virtual Private Networking Karlene R. Samuels COSC513.
Network Components T. Meredith 5460 – Summer 2014.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Diploma in Information Technology Principles of Information Systems and Data Management Classroom Local Area Network & Internet.
Virtual Private Network
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Networking Components
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Unit 4, Lesson 11 How Data Travels the Internet
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
Introduction to Routing and Routing Protocols By Ashar Anwar.
Network Components: Assignment Three
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Networks QUME 185 Introduction to Computer Applications.
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
Year 10 – Chapter 4 – Computer Networks Lesson 2: Setting up a Network Starter Task – Can you think of reasons to set up a network? Why Use Networks? 1.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
The Intranet.
Module 10: Providing Secure Access to Remote Offices.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
Network Components Reginald Randolph Assignment 3 LTEC 4550.
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
VyperNet A Framework for Programmable Virtual Private Networks Adam Hudson Supervisor: Bob Kummerfeld.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Virtual Private Network
WELCOME ALL.
Fundamentals of Information Systems, Sixth Edition
E-business Infrastructure
The Intranet.
Chapter 13 Network Address Translation
Virtual Private Network (VPN)
Year 11 – Chapter 4 – Computer Networks
Connecting LANs, Backbone Networks
E-Commerce.
Link-State Routing Protocols
Filtering Spoofed Packets
Introduction to Computers
Chapter 1 Internetworking
Introduction to Networking
Network Components.
What Do We Do? Managed IT services
CS 457 – Lecture 10 Internetworking and IP
CPE 401 / 601 Computer Network Systems
Virtual Private Network (VPN)
router component and memory? How its work Console access
PPPoE Internet Point to Point Protocol over Ethernet
Outline Basics of network security Definitions Sample attacks
Link-State Routing Protocols
NAT Configuration For ZyXEL ADSL Wireless Router
Firewalls Jiang Long Spring 2002.
Link-State Routing Protocols
— Scalable Networks for the ever evolving Student
Read this to find out how the internet works!
In-network computation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

Using Topological Mapping to Manage & Secure Large Networks NANOG23: October 23, 2001 karl@lumeta.com

Lumeta: What we do Connect to a client network, send and receive lots of packets, and deliver maps and data It all started with mapping the Internet...

The Internet

Why is this Important? Images convey more information in less “real estate.” Maps call attention to anomalies more clearly. You can’t secure what you can’t manage. You can’t manage what you can’t define.

A Typical Intranet

Specifics for ISPs Order Matters: For an ISP, the network is their business The business portions of ISP networks are highly organized and methodically laid out Yet, there are still organic components, e.g., the corporate intranet

What an ISP Looks Like

What can be Found? Undocumented infrastructure or incomplete mergers Legacy connections to forgotten business partners or spun off business units Mismanaged firewalls and routers

Routing Table Errors

Incomplete Divestitures

Another Look at the ISP

Conclusion Network maps condense complex structural information into a manageable form Topological features can readily point out anomalies Assertion: Any large network can be improved by being mapped