Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
1 13-Jun-15 S Ward Abingdon and Witney College LAN design CCNA Exploration Semester 3 Chapter 1.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Web Server Administration
Ch.6 - Switches CCNA 3 version 3.0.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
 Distributed Software Chapter 18 - Distributed Software1.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Barracuda Load Balancer Server Availability and Scalability.
Chapter 7: Using Windows Servers to Share Information.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Comparing modem and other technologies
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Honeypot and Intrusion Detection System
Vantage Report 3.0 Product Sales Guide
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
1 LAN design- Chapter 1 CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino.
Endian Firewall Community Edition Roy Hickman Technology Director Peck Community Schools #
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
Networks.
VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
Introduce the project Africa IXP (Team 4). Introduce team members.
Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
NIB Networking & Security Issues Data Networks Recent Activities Additional RAS & Router cards procured and installed at “A” and “B” type.
Module 11: Designing Security for Network Perimeters.
ISA SERVER 2004 Group members : Sagar Bhakta – [intro] Orit Ahmed – [installation] Michael Wijaya [advantages] Rene Salazar - [features]
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Cofax Scalability Document Version Scaling Cofax in General The scalability of Cofax is directly related to the system software, hardware and network.
Client Server Model. Server Applications (Software) Management and maintenance of Data including Management and maintenance of Data including User login.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Chapter 7: Using Windows Servers
3.1 Types of Servers.
3.1 Types of Servers.
3.1 Types of Servers.
Data Networking Fundamentals
Module 5 - Switches CCNA 3 version 3.0.
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:

Agenda  Existing System Architecture  ISP Operations  Security  Existing ISP Problems  TSPT Recommendations

Existing System Architecture Insert Pictures here …

ISP Operations Network Part System Part

ISP Operations Network Part

The gateway router Cisco7507 (the Core Layer) Not redundant! What if the Gateway totally fails? Highly overloaded routing traffic towards the two international links and high bandwidth leased line customers. Minimum 100baseT VIP card interfaces required on the gateway to support ever-growing traffic. The BGP configuration needs to be revised with the Gateway Capacity.

Catalyst Cisco switch 5509 (the distribution Layer) Needs to be redundant. Should be high-speed gigabit but it isn’t The Ethernet interfaces should be replaced to accommodate Internet traffic growth since it is an aggregate point.

Access Points Cisco 3640 for POP’s Recommended to be redundant. Upgrade need to be done. The routing configuration should use dynamic routing in case scalability and flexibility are required.

Access Points … Cisco 3640 for Leased line Upgrade needed to support interfaces supporting bandwidth greater than 128Kbs. Policy based routing should be implemented to define security layer. Processing capability should be improved with growing leased line traffic.

Access Points … Access Server Cisco AS5300 Upgrade to Cisco AS5400 as CISCO Recommends. Additional Modem cards over the existing 24*E1 to handle increasing dial up users The traffic behavior should be studied

ISP Operations System Part

Firewall Server  The type and functionality of the firewall currently in use should be revised strictly.  The server in use isn’t designed to accommodate the ever-growing Internet traffic. Thus processor, memory and license issues need to be addressed.  The firewall needs to be upgraded.  Routing and policy of the firewall need to be revised.  Redundancy required.

AAA server  The processing capability and the memory should be revised.  The radius server needs to be revised in terms of license and updates with growing dialup user and time.  It should be configured fully redundant in terms of all software and license and should be automatic  The overall capacity needs to be upgraded.

Mail server ( mail.telecom.net.et ) Increased Virus attacks via No Anti-Virus installed. Insufficient Hard disk Space for storing user mail boxes. The SMTP server is not well secured. I.e. anybody can send mass mailings or spam to anyone of our customers using any address.

Fre server ( ) Free Mail Server is using a trial version No anti-virus is activated on it. The fre server is not in a position to accommodate the ever-growing fre users unless the hard disk capacity is upgraded.

Web Server ( ) Poor GUI administration Doesn’t support the famous ASP scripts and PHP scripts. Loss of configuration files when the server is down due to reasons such as power failure.

FTP Server No Standalone FTP Server, The Web Server is acting as an FTP Server

Security Lack of proper skilled man power and security policy. Lack of proper system password allocation and management. No mass mailing and intrusion detection mechanism. Lack of proper troubleshooting procedure and documentation on the overall system.

Existing Problems on Focus

Existing ISP Problems Poor system design on both Network and System part: Traffic Analysis Users behavior Redundancy & Hot stand by System Sizing (Memory, Hard disk, Processor speed, etc …) E.g. Gateway Router, Mail Server, Firewall Server Use of 10 base T Interface to the Gateway

Continued … System Insecurity Technology wise Spam and Intrusion Detection Anti-virus, etc … Expert wise Security Expert Network Management Expert System Expert Expert on proper resource management Communication Gap

Continued … Frequent service interruptions and total service failures Lack of appropriately trained staff Lack of expertise Lack of documentation

TSPT Recommendations Short run /immediate solution/ Upgrading the firewall to detect any internal/external attacks Upgrading the Gateway Router. Upgrading the Access Server. Deploying Anti-Virus Solution for ISP. Making the traffic at the gateway to follow simple and dynamic routing as well as to avoid any memory consuming matters like policy editing, avoiding direct leased line connections to the Gateway.

TSPT Recommendations … Long run solution A well-designed ISP Network properly addressing the following issues Redundancy Security Versatile NMS and Systematic Troubleshooting Procedures Well trained staff specializing in network, system and security

The END!! Thank you!!