Consortium Conference 13 July 2012 Operational Developments Ian Lehmann Chief Operations Officer London Grid for Learning.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Enabling Secure Internet Access with ISA Server
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
LGfL Managed Services Brian Durrant Chief Executive London Grid for Learning.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
_IT Security and Intellectual Property Summer 2006 Bashar Al Takrouri Personal Firewalls “Case study ::ZoneAlarm Security Suite” Instructor: Prof. Dr.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Controlling access with packet filters and firewalls.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Spring 2004 CMPE 151: Network Administration Lecture 6.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
FIREWALL Mạng máy tính nâng cao-V1.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 13 – Network Security
London Grid for Learning technical conference 30th june 2014 Your Choice.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Content Control Stewart Duncan Technical Manager.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Proxy Server PROXY SERVER. What is a Web Proxy? Proxy Server A proxy is a host which relays web access requests from clients Used when clients do not.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Module 3: Enabling Access to Internet Resources
CONNECTING TO THE INTERNET
Implementing TMG Server Publishing
IIS.
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Jiang Long Spring 2002.
Windows Firewall Adem Enes POLAT
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Consortium Conference 13 July 2012 Operational Developments Ian Lehmann Chief Operations Officer London Grid for Learning

LGfL 2.0 Network

LGfL 2.0 Network Design

LGfL 2.0 firewall delivers Standard Networks: Admin Curriculum Optional Networks VC VOIP Wireless

LGfL 2.0 Option 1 MIP/Firewall Rules Allow In FTP WAIS UDP TCP/UDP 53 SIP IPSEC NAT-T Ranger Outpost Allow Out UDP 53 FTP WAIS 1433 UDP Blackberry TCP 53 SIP IPSEC NAT-T Ranger Outpost Deny Out Deny In Wont work will not NAT FTPS GRE ESP AH Refer to LGfL 3389 Large Range PPTP

Information, guidance and safeguards on the use of remote access products Web based remote access categories Head Teacher authorisation Two-factor authentication (USO-OTP) LGfL USO-Authenticated Log Me In RDP Gateway Service LGfL Security Guidance

Option 2 OPTION 2 – Public IP addresses with school’s own managed firewall This option is suitable where a school would wish to have total control and responsibility for network security. LGfL will supply the school with a quantity of public IP addresses for use on its firewall. The quantity of IP addresses supplied will be based on the current and expected usage. All firewall policies and Network Address Translation (NAT) are the responsibility of the school.

LGfL 2.0 Option 2

Option 2 Does not have MIPS or firewall rules on LGfL 2.0 firewall. Access to all LGfL 2.0 services where possible. – VMB Network Statistic Portal instead of on LGfL support site. (1 day course) – No relay & No outgoing MailProtect without conforming to port 25 rules. (See next slide.)

Option 2 Mail Server If a school based mail server is hosted on Option 2 which means it has a public IP, it can receive and post on port 25 going to and from the Internet given the schools firewall rules allows it to and the schools dns server points the mx records to the school based mail server. After the schools domain is configured on the LGfL content control, If the school wants to use LGfL content control for incoming scanning, it changes the schools dns server to point the mx records at the LGfL content control. The LGfL content control then delivers to the school based mail server via its public IP address. The schools dns controls which way mail is delivered into the school. The school based mail server and the schools firewall control the mail route out of the school.

LGfL 2.0 Option 2 Advantages Complete control over all ports interacting with the internet. No waiting for firewall ports & MIP configuration. Closest thing to ‘Raw Internet’. There is only one return path from the internet. Maybe easier transtion for LGfL1 Option 2 schools.

LGfL 2.0 Option 2 Disadvantages Complete exposure of all ports interacting with the internet and other Option 2 LGfL schools. Attack Bandwidth from other schools will be the smallest of bandwidth of both schools. Attack Bandwidth from the internet will be the bandwidth of the school. Restricted access over Janet UK due to Janet UK policy.

Services for the London Grid for Learning community provided by: LGfL MailProtect 2.0 Protection against borne threat including: -Viruses -Spam -Pornography -Phishing and Denial of Service attacks Hosted on resilient, fault tolerant servers within the core LGfL 2.0 infrastructure

Services for the London Grid for Learning community provided by: LGfL MailProtect 2.0 -View a log of scanned messages -See details of s blocked by MailProtect -Release ‘false positives’ ( -Add trusted senders to a personal ‘allow’ list -Opt in/or out of daily ‘spam digest’ s -Nominated Contacts, with appropriate permissions, can perform tasks on behalf of their users

Services for the London Grid for Learning community provided by: LGfL MailProtect 2.0

Services for the London Grid for Learning community provided by: LGfL 2.0….more than just broadband Option 2