Network Policies and Procedures Presentation for DoE Office of Assurance Cybersecurity Review visit to SLAC August 2005.

Slides:



Advertisements
Similar presentations
CN Objectives of the course To build and maintain a UNIX-based Network Systems & Servers Install Linux, fine tune the system, enable required server,
Advertisements

Remote Viewing Setup DVR & IP Video Devices
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Controlling access with packet filters and firewalls.
SLAC Vulnerability Scanning Cyber Security Working Group - LBL December 5, 2005 Teresa Downey - SLAC.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
MANAGED SERVICES OPERATIONS. Increasing IP Infrastructure Complexity Requires Greater Need for Services Data Center B2B Links Branch Offices Distribution.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Network security policy: best practices
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Terri Lahey EPICS Collaboration Meeting June June 2006 LCLS Network & Support Planning Terri Lahey.
1 Remote Access July 10, What we’ll cover Remote access to NCAR’s network Remote access to Servers, Routers, Switches.
Advanced Networking for DVRs
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Networking Components
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Campus IPv6 Deployment Phillip Deneault WPI Network Security Officer 1.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Computing services for the Traveling Physicist Alberto Pace CERN – Information Technology Division.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
CERN’s Computer Security Challenge
September 29, 2009Computer Security Awareness Day1 Fermilab.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Prepared by: Les Cottrell SLAC, for SLAC Network & Telecommunications groups Presented to Kimberley Clarke March 8 th 2011 SLAC’s Networks.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
Module 11: Remote Access Fundamentals
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
A powerful network monitoring system
Overview Managing a DHCP Database Monitoring DHCP
1 Overview of IEPM-BW - Bandwidth Testing of Bulk Data Transfer Tools Connie Logg & Les Cottrell – SLAC/Stanford University Presented at the Internet 2.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
Connect. Communicate. Collaborate perfSONAR MDM Service for LHC OPN Loukik Kudarimoti DANTE.
NIB Networking & Security Issues Data Networks Recent Activities Additional RAS & Router cards procured and installed at “A” and “B” type.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
ICFA/SCIC Aug '05 SLAC Site Report 1 SLAC Site Report Les Cottrell, Gary Buhrmaster, Richard Mount, SLAC For ICFA/SCIC meeting 8/22/05
Wireless ISP Infrastructure
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Windows Vista Configuration MCTS : Advanced Networking.
Open source IP Address Management Software Review
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Instructor Materials Chapter 9: Testing and Troubleshooting
Chapter 2: Basic Switching Concepts and Configuration
Wide Area Networking at SLAC, Feb ‘03
Network hardening Chapter 14.
Chapter 10: Advanced Cisco Adaptive Security Appliance
6. Application Software Security
Network Monitoring System
Presentation transcript:

Network Policies and Procedures Presentation for DoE Office of Assurance Cybersecurity Review visit to SLAC August 2005

Written policies m/phone/phoneusersguide/PhoneUsersGu ide.htm#tamperhttp://www2.slac.stanford.edu/comp/teleco m/phone/phoneusersguide/PhoneUsersGu ide.htm#tamper No tampering with telephone, network cables or equipment –Disconnect equipment when found and may charge back labor to discover, rectify situation.

Multi-homed hosts cy/multi-homed.htmlhttp:// cy/multi-homed.html Outlines reason for multi-homed hosts and problem –Consult with net-admin –Do not turn on routing

Network devices inventory & access cy/device-inv.htmlhttp:// cy/device-inv.html Outlines reasons for needing a policy Devices must be in database Password must be available (escrow) Notification of testing new devices

Remote Access server policy y/csc-policies/remote-access.htmlhttp:// y/csc-policies/remote-access.html Why do we need to be concerned Policies: –Ways to access SLAC –How to add more remote access servers –How to admin RAS

Policy for Visitor & Wireless networks cy/visitor.htmlhttp:// cy/visitor.html General Guidelines for all SLAC subnets Define Visitor subnet and how it is to be used Wireless network and how it is to be used

Support Infrastructure Database of equipment – CANDO open to users, integrated with other processes (security, reports etc.) DNS registration forms Password escrow, password changed every 6 months, passwords chosen well Router & switch configuration –SSH access to routers with escrowed passwords, on a separate Internet Free subnet (accessible only from within SLAC) –SNMP access to routers/switches restricted – s if configuration changes –Router configurations archived in AFS, local disk and USB memory stick, restoration done when necessary Network topology knowledge: –Switch ports disabled by default –Twice daily automatically map network (CDP, ARP …) –Track what is connected to ports –Automatically look for duplicate IPs Firewalls, border & internal Migrate away from legacy protocols to focus on main needs (no Netware, AppleTalk, very limited DECnet …) Try to make easy for user to request switch ports, Wireless APs rather than “Do It Yourself” Close cooperation with security (shared person), systems (Linux, Windows) Network problems –reported to net-admin, from Unix Trouble Ticket System, and HelpTrack, & archived –Network monitoring automatically paging when detects problems (e.g. router/switch problems, system availability etc.)

Monitoring NetFlow –Enables characterization of SLAC traffic, top talkers, top applications, length of flows etc. –Look for anomalies for intrusions, misuse –Detailed results have restricted access Automated network discover and monitoring (switch/router SNMP, CDP, ARP, ping …) – guide.htmlhttp:// guide.html

Science Requirements Have to explain needs for security etc. to scientist, they need to be partners Collaborations worldwide –Most of traffic is with Europe (NOT with other DoE labs or even with US) –Access to data is with many countries Needs for high throughput –SLAC is one of the top production users of ESnet and one of the top users of Internet2 Connections via ESnet and CENIC/I2 currently 1Gbps ea soon to be 10Gbps

Terabytes/Month Fermilab (US)  WestGrid (CA) SLAC (US)  INFN CNAF (IT) SLAC (US)  RAL (UK) Fermilab (US)  MIT (US) SLAC (US)  IN2P3 (FR) IN2P3 (FR)  Fermilab (US) SLAC (US)  Karlsruhe (DE) Fermilab (US)  Johns Hopkins LIGO (US)  Caltech (US) LLNL (US)  NCAR (US) Fermilab (US)  SDSC (US) Fermilab (US)  Karlsruhe (DE) LBNL (US)  U. Wisc. (US) Fermilab (US)  U. Texas, Austin (US) BNL (US)  LLNL (US) Fermilab (US)  UC Davis (US) Qwest (US)  ESnet (US) Fermilab (US)  U. Toronto (CA) BNL (US)  LLNL (US) CERN (CH)  BNL (US) NERSC (US)  LBNL (US) DOE/GTN (US)  JLab (US) U. Toronto (CA)  Fermilab (US) NERSC (US)  LBNL (US) CERN (CH)  Fermilab (US) DOE Lab-International R&E Lab-U.S. R&E (domestic) Lab-Lab (domestic) Lab-Comm. (domestic) Recent Monthly ESnet usage

Network Speed Internet Land Speed Record (twice, in 2004 Guinness Book of Records) SuperComputing 2004 and 2004 Bandwidth Challenge winners for maximum BW util (102Gbits/s) Network research: –evaluate achieving hi-speed network performance, –measure and track network achievable bandwidth, –monitoring of all places wherever there are physicists (> 100 countries, > 3000 sites) Set expectations, find problems etc. –Worldwide collaborators, e.g. Pakistan, Russia

Visitor Network r_net.htmhttp://www2.slac.stanford.edu/comp/net/wireless/visito r_net.htm Large numbers of visitors, conferences, guest house, vendors etc. requires easy access, low management overhead Outside SLAC firewall, NOT in SLAC class B IP address space, separate AS and routing Users treated as if on any commercial or public ISP “Do not place mission critical applications on the Visitor network” Assigned via DHCP, a n.n IP address –No registration required

Wireless On visitor subnet In process of extending procedures for wireless network monitoring – –War walking (Kismet/GPS), identify APs and find rogues (non registered APs) –Locate with protocol analyzer with directional antenna (YellowJacket) Evaluating management system –Have about 90 APs, all Cisco –Use to automatically identify rogue APs as they appear

DHCP hcp.htmhttp://www2.slac.stanford.edu/comp/net/dhcp/d hcp.htm Connection logs archived so can track back abnormal utilization Internal network DHCP is 100% registration driven –Users & sys-admins required to keep machines patched –Machines are scanned daily for security updates Visitor network: –DHCP no registration, –separate infrastructure

Dialup Requires a dial-up account, password changed yearly –Accounts closed when people leave Use RADIUS for authentication In process of placing modem dial-up outside SLAC firewall (on visitor subnet) Guidelines on how to configure and use

Wireless Support for policy –War walking with Yellow Jacket etc. –Track APs offsite, and onsite, look for uknown