NAVY FTP POLICY September 06 CDR Dave Pashkevich CNMOC N64.

Slides:



Advertisements
Similar presentations
Tropical Cyclone Basins
Advertisements

SIX INTERNATIONAL WORKSHOP ON TROPICAL CYCLONES 2006 IWTC-VI SAN JOSE, COSTA RICA NOVEMBER 2006 TOPIC 0.1 QUANTITATIVE FORECASTS OF TROPICAL CYCLONES LANDFALL.
1 GOES-R Hurricane Intensity Estimation (HIE) Validation Tool Development Winds Application Team Tim Olander (CIMSS) Jaime Daniels (STAR)
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
Medical Devices on the Network Presented by: CDR James Martin & CDR Richard Makarski February 2011 Medical Devices on the Network.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
1 JAG/CCM Status Updates and Recommendations Fall COPC Meeting Nov 4-5, 2014 JAG-CCM Team.
Consistency and Replication Chapter 7 Part II Replica Management & Consistency Protocols.
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
ITIS 3110 Jason Watson. Replication methods o Primary/Backup o Master/Slave o Multi-master Load-balancing methods o DNS Round-Robin o Reverse Proxy.
EXtreme Debugging! (with apologies to Kent Beck, et al) (with apologies to Kent Beck, et al) David T Watts CTO Fig Leaf Software 30 Jul 2000.
Catastrophic Backup Action Plan Recommendations for short-term corrective action involving selected shortfalls (Go after “low hanging fruit”)
Working Group for Consolidated Communications Management (JAG-CCM) Update Spring CSAB 2008 Mr. Charles Abel AFWA JAG Representative.
Effects of restricting ports 20/21 on DoD Networks and Information Transfer Operations Fall COPC 2007 Mr. Walter L. Coley, Jr. JAG/CCM Chair.
1 COPC Shared-Network Infrastructure Brief Prepared for: COPC Working Group for Cooperative Support and Backup (WG/CSAB) October 21 and 22, 2008 Meetings.
Secure Data Transmission James Matheke Information Security Architect Ohio Department of Job and Family Services.
Himawari-8 Project Plans and Status. Background 2 NESDIS is implementing a capability to ingest Advanced Himawari Imager data from JMA, process and generate.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Course 201 – Administration, Content Inspection and SSL VPN
Additional SugarCRM details for complete, functional, and portable deployment.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Working Group for Cooperative Support and Backup (WG-CSAB) Update Fall COPC 2007 John Zapotocny CSAB Chair.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Fleet Numerical… Supercomputing Excellence for Fleet Safety and Warfighter Decision Superiority… Remote HPC Computing Mr. Robert Burke 1.
System Administration and Maintenance. Proxy Server 1 Purpose – – To separate internal network from internet (NAT) To cache often used content User control:
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
NPOESS Data Quality Monitoring (DQM) Interface Functionality at DoD Centrals Jim Vermeulen 28 May 2008.
1 NAVOCEANO’S NPOESS DATA EXPLOITATION SYSTEM FALL COPC Meeting Nov 08 George M. Mason.
NESDIS/ORA March 2004 IT Security Incident Recovery Plan and Status April 12, 2004 Joe Brust, ORA Technical Support Team Lead.
JAG/CCM Update COPC Spring 2006 Mr. Walter Coley JAG/CCM Chairman Distribution Authorized to U.S. Government Agencies and their Contractors only.
Computer Emergency Notification System (CENS)
NAVY UTN-P & FTP POLICY UPDATE 16 April 07 CDR Dave Pashkevich CNMOC N64.
JAG/ODAA Fall 2008 James Vermeulen & Jon Whiteside JAG-ODAA Co-Chairs Recommend NCEP's Bradley Ballish replace Jon Whiteside (term completed)
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Weather Agency FTP Replacement Briefing 08 Sep 06.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
DoD Network Initiatives CEISC 13 Apr 2006 Mr. Walter Coley Ms. Kathy Cotton AFWA/SCM Distribution Authorized to U.S. Government Agencies and their Contractors.
SECRET LABS AB The Nordrad 2 Software System presented by SMHI and Secret Labs AB.
Fleet Numerical… Atmospheric & Oceanographic Prediction Enabling Fleet Safety and Decision Superiority… Fleet Numerical Meteorology & Oceanography Center.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Action Item NCEP Central Operations 4-5 November 2015 COPC – Fall 2015.
Secure FTP implementation on DATMS-U Walter L. Coley, Jr JAG/CCM.
INFSO-RI ETICS Local Setup Experiences A Case Study for Installation at Customers Location 4th. All Hands MeetingUwe Müller-Wilm VEGA Bologna, Nov.
JLAB Password Security Ian Bird Jefferson Lab HEPiX-SLAC 6 Oct 1999.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Web Cache. What is Cache? Cache is the storing of data temporarily to improve performance. Cache exist in a variety of areas such as your CPU, Hard Disk.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
CHAPTER THREE TEST REVIEW COMPTIA SECURITY+ SYO-401.
Chapter 13 FTP and Telnet Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle River,
Administering the SOWN Network David R Newman & Chris Malton.
REPLICATION & LOAD BALANCING
Backdoor Attacks.
Managing Software.
NERC CIP Implementation – Lessons Learned and Path Forward
Technical Coordinators Meeting
Chapter 7 Network Applications
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

NAVY FTP POLICY September 06 CDR Dave Pashkevich CNMOC N64

Background: Provided in Air Force brief Anticipated Action: JTF-GNO will issue a Warning Order (WARNORD) within days for closure actions to take place –A "Temporary Exception“ policy will be implemented; however, the exception will only be sufficient to complete required action to comply with the WARNORD NAVY FTP POLICY

FNMOC Plan to Mitigate JTF-GNO CTO FTP Port Closure Notify all non-DOD customers and data providers of 15 December deadline Convert existing software to FTP-SSL Transition to http(s) options as available

Non-DOD Data Providers to FNMOC: FTP pull NWS - ncep mrf forecast data, TAF data, MTR data, all GTS data NHC - Pick up hurricane and tropical cyclone data NOAA - hurricane and TC data. UKMetoffice - UKMET forecast data NESDIS - pick up AIRS and AMSR data University of Wisconsion - Wind data. FTP push NESDIS - Processed Satellite data Non-DOD Data Customers of FNMOC: FTP pull NWS - Hurricane track data FTP push NHC - Hurricane/TC track data. NSA - Selected field of almost all of out forecast data. Lawrence Livermore - Most of our forecast data. NCEP - NOGAPS for backup. Processed Satellite data. Several NOAA sites - TC and Hurricane track data. UKMET - Forecast data. University of Wisconsin - Most of our forecast data. John Hopkins APL - some of our forecast data. FNMOC FTP Data Providers and Customers

Convert existing Distributed Processing System (DPS) to FTP-SSL requires passwords ( CTO (PKI) non-compliant ) quickest solution, but temporary?? (unknown when passwords will be disallowed) consider both open source and commercial (may require $$) requires FTP-SSL service at data provider or customer (external dependency)

FNMOC Transition to HTTPS Options No passwords required Customer pull from passive cache, no PKI (already existing for some pull) Customer pull from active cache with PKI (CAGIPS IOC 20 September, but FOC > 15 Dec) FNMOC pull from data providers, no PKI (working version has been developed) requires HTTPS service at data provider or customer (external dependency)

FNMOC Summary short term: FTP-SSL, some http(s) long term: http(s) with PKI dependency on external customers and data providers service changes FNMOC POC: Chuck Skupniewicz, IT-DM (831)

NAVO Plan to Migrate JTF-GNO CTO FTP Port Closure Impacts –Unclassified LAN External: Will require completing transition to SFTP/SSH Internal: Will require some production codes to modify scripts/software used for data transfers –Classified LAN Will require changes to data transfer methods between NAVO and MSRC Will require DPS customer base to discontinue accepting connections, i.e. DPS will no longer be an effective method to deliver products. Actions Required Migration of existing FTP to SFTP/SSH on DMZ FTP servers (external users) Installation of MSRC SSH kit on classified systems Notification of customer base of FTP changes Modification of data transfer scripts/software by production codes

NAVO Plan to Migrate JTF-GNO CTO FTP Port Closure Unknown –Suspect there are FTP processes that we are not aware of, plan is to monitor firewall Port 21 connections and notify users. –POR systems (Surf Eagle IPL, etc). Requested Exclusions –Some devices require telnet/ftp accesses. –Specifically we require Telnet/FTP access to SAN fiber-channel switches which are located on the isolated management network. (NAVOCEANO POC – David Hasenkampf at ,