UNC E-For³t Installation Update. UNC E-For³t Getting started UNC’s approach Current status Future considerations Questions.

Slides:



Advertisements
Similar presentations
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Advertisements

GETS Transformation Kick Off Active Directory and Blackberry Migration Firewall and Network Changes 04/21/
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Web Server Administration
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Microsoft Windows Domains Structure and Services Chatziioannidis Christos Computer & Informatics Engineer Computer & Networking Services Computer Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Domain Name Services Oakton Community College CIS 238.
Sample Diagram.
Virtual Private Network
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
November 2009 Network Disaster Recovery October 2014.
Course 201 – Administration, Content Inspection and SSL VPN
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Alabama Supercomputer Authority A partnership of … and.
ENUM? “ Telephone Number Mapping (ENUM or Enum, from TElephone NUmber Mapping) is a suite of protocols to unify the telephone numbering system E.164 with.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—2-1 Administering Cisco Unified Communications Manager Understanding Cisco Unified Communications.
Corporate Information Systems Delivery of Infrastructure IT Services.
Web Authoring Rico Yu. Ch.11 Web Posting and Web Hosting Web Host Types of Web Host Web Posting.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Chapter 13 Microsoft DNS Server n DNS server: A Microsoft service that resolves computer names to IP addresses, such as resolving the computer name Brown.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
DNS Zones. DNS records kept in zones DNS server is authoritative for a domain if it hosts the zone for that domain Sub-domains can be kept in same zone.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
MP Failover DNS Option 1 for API Failover The same DNS structure that allows ERCOT to fail over services between sites can also be used to allow MPs to.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.
CITA 310 Section 3 Additional Topics. Common IPv4 Classes ClassFirst numberSubnet maskNumber of networks Number of addresses Class A0 – ,777,216.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Open source IP Address Management Software Review
Pass Microsoft Installing and Configuring Windows Server 2012 exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Microsoft Installing.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
E-FOR3T Scott Baily CSU.
السلوك التنظيمى المعاصر
Disaster Recovery at UNC
Designing IIS Security (IIS – Internet Information Service)
worlds largest IT service provider
Presentation transcript:

UNC E-For³t Installation Update

UNC E-For³t Getting started UNC’s approach Current status Future considerations Questions

UNC – E-For³t approach Building blocks – Discuss scope – Technical and Administrative – Setting expectations – Cold, Warm, Hot – acceptable recovery time of critical services. – Complete E-For³t paperwork – Verify physical layout of facility with ViaWest and E-For³t personnel – Establish connectivity - Security, security, security. – Establish DNS Services – Establish Authorization - eToken, ILO – Establish Authentication – AD services – Establish services – Web, , critical databases, etc.

UNC – E-For³t Getting Started Forms, forms and more forms – PPOC – SPOC – “Badges?, we don’t need no stinking badges” – IP address and subnet request ( /26) – Premise rules – Equipment inventory (serial numbers, model, etc) – Power requirements DP Guardian visit Conference calls with Kristine Champion and Phil Bisant – Very important!

UNC – E-For³t Current Status Three racks – One network – One server/service – One dedicated for documentation and expansion Cisco PIX bundle Cisco 3750 HP C7000 blade chassis – Six server blades – One storage blade

UNC – E-For³t Current Status

Remote access via VPN terminating on PIX – Authentication via etoken. DNS services installed Zone transfer of unco.edu forward lookup zone. ns1e.unco.edu Establish pointer record with State of Colorado Established “forwarder” to unco.edu DNS servers ,

UNC – E-For³t Current Status

UNC – E-For³t Future Considerations VMWare Intrusion Prevention System SPAM protection Additional storage options – UNC owned – ViaWest – State storage user group Remote site for backups (VTL) Business Continuity – Internet Native Banner – Luminus portal – VoIP (Call Manager subscriber) Password escrow services

UNC – E-For³t questions?