1 Facilities Control Systems Carroll W. Jones December 1, 2010 Remote Access Review.

Slides:



Advertisements
Similar presentations
District networked computers give students access to a variety of educational programs, applications programs as well as the Internet. Providing a safe.
Advertisements

Impact of the Recent UC Denver Remote Computing Audit May, 2010.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Virtual Private Network (VPN) Jeffery Jones James Santana BA479 March 15,2006.
Virtual Private Networks Globalizing LANs Timothy Hohman.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
CU-VPN Status Campus-wide VPN Service March 21, 2007.
CDS-130: Computing for Scientists Remote Access to Matlab at Mason Fall August – 8 December Innovation Hall, Room 222 Instructor: Joseph Marr
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
What is a Computer Network? Two or more computers which are connected together.
Accelerator Controls Brad Cumbia Anthony Cuffe December 1, 2010 Remote Access Review.
Virtual Private Network
Access to UK computing You will need a U-connect account to access the workstations on campus. UK Computing facilities information available at
Remote Access Mark Nicolay Computing & Communications.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Smart Buildings Microgrid Innovations Energy and Construction Best Practices Summit | June 23, 2011.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
STRATEGIES INVOLVED IN REMOTE COMPUTATION
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
How to access office computer from home Presented by Mingyang Wang 11/20/2007 Updated by Raja Karkutla 07/10/2009 To use SSL VPN instead of VPN Client.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Efficient, Pure and Simple enerVIEW.com: Using ActiveView for Internet-Based Remote Process Management Efficient, Pure and Simple Kevin Hann Director.
PPD & CLRC's response to the (IS) Security Threat Gareth Smith PPD/CG Christmas Lectures 2002.
Jefferson Lab Site Report Sandy Philpott Thomas Jefferson National Accelerator Facility Newport News, Virginia USA
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Outline IT Organization SciComp Update CNI Update
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Smart Grid: Opportunities in the Data Center January 22, 2010 Charles O’Donnell, Vice President, Engineering Liebert AC Power Emerson Network Power.
Module 11: Remote Access Fundamentals
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Shai Tirosh Windows Server Regional Director artNET Experts.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson.
Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson National Accelerator Facility Mike Memory.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
HDice Michael Lowry December 1, 2010 Remote Access Review.
Cryogenics Group Jonathan Creel December 1, 2010 Remote Access Review.
1 Connecting to a Database Server. 2 We all have accounts, with a single database each, on a Microsoft SQL Server on the USF network: allman.forest.usf.edu.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
VCE IT Theory Slideshows
Information Security Planning Considerations for Telecommuting
Getting Connected to NGS while on the Road…
Jordan Population and Housing Census 2015
Centralized Management for Barracuda Networks products
An Introduction to… ® The only automated filing solution that begins filing as you begin typing Medical Solutions.
Self-service enrollment for Windows desktops
Take into account all our needs, Please!
PPPoE Internet Point to Point Protocol over Ethernet
VPN What, where, who, why when?.
IS4680 Security Auditing for Compliance
السلوك التنظيمى المعاصر
Getting Connected to NGS while on the Road…
How Computers Work.
Networks Your Name Roll No To be continued.... 1/12/2019 Your Name.
Online Learning.
Near and Far Where are Feds working from?
SBS 2008 – One year on David Overton
Presentation transcript:

1 Facilities Control Systems Carroll W. Jones December 1, 2010 Remote Access Review

2 Facilities Control Systems Facilities Control Systems that are remotely accessed or will be in the near future American Automatrix Control Workstation (aam-varc) Honeywell Control System (ebiserver) Johnson Controls Metasys PMI Workstation (jci-varc) (being phased out) Johnson Controls Integrator Workstation (ADX10M-001) Liebert Sitescan Control System (sitescan2) TAC Control System (invensys2) Energy Metering System (currently under construction)

3 Facilities Control Systems How your systems are remotely accessed from –on-site (e.g. office): Most on-site access (American Automatrix, both JCI systems, and TAC) is via workstations located in VARC Room 61. The Liebert Sitescan System is accessed from lab networked computers via Internet Explorer. The Energy Metering System will also be accessed via Internet Explorer (procedures are being developed). JCI Integrator and TAC can also be accessed from certain lab networked computers via Putty tunneling. –off-site (e.g. home): The two older systems (American Automatrix and JCI Metasys PMI) are accessed via pcAnywhere dial-up connections. The newer systems are accessed via Remote Desktop after Putty tunneling through the Jefferson Lab firewall. Energy Metering System offsite access is being developed. Currently, a VPN access exists for subcontractor development and support.

4 Facilities Control Systems Engineered solutions, policies, procedures, operations and QA/performance measures Access to VARC Room 61 controlled by CANS System pcAnywhere dial-up access to older control systems (JCI Metasys PMI and American Automatrix) with passwords Newer control systems require JLAB user account and password in addition to JLAB group password for use with Putty tunneling access

5 Facilities Control Systems Future plans or needs for enhancing/upgrading remote access, e.g. changed systems, different controls, access for PDAs, etc. Older systems are being migrated to newer platforms as funding is made available (TAC done, JCI is process – new workstation operational…ARC $48,670…CEBAF Center $41,613… FEL $17,595… Bldg. 98-Magnet Shed $9,539.45) Energy Metering System – site users need easy access to system dashboard (specific area energy use information)…limited Facilities Management onsite and offsite access required to main system

6 Facilities Control Systems Computer Center has been vital in the transition to and support of newer systems